Hu, Hao Lu, Rongxing Huang, Cheng Zhang, Zonghua
Published in
Peer-to-Peer Networking and Applications
As one of the essential components of Intelligent Transport Systems (ITS), Vehicular Ad Hoc Network (VANET) plays a significant role in enabling various on-road applications, most of which primarily rely on two-hop Vehicle-to-Infrastructure communications. To make such communications reliable and secure, it is significant to ensure that only the tr...
Duffy, Andrew Michael
Ideas about trust have been based on information scarcity. To overcome the uncertainty associated with choice, people gather information; when that is not enough, they turn to trust in order to make a decision. Consumer-review Web sites offer information abundance, however, which demands a re-evaluation of the function of trust under such circumsta...
Manglos-Weber, Nicolette D.
Published in
Social Indicators Research
Prominent versions of social capital theory presume a positive link between voluntary memberships—including religious memberships—and generalized trust in society. Yet this relationship has not been tested in sub-Saharan Africa, a region with low average levels of generalized trust and high levels of religious membership and participation, where th...
Hofhuis, Joep van der Rijt, Pernill G. A. Vlug, Martijn
Published in
SpringerPlus
Diversity climate, defined as an organizational climate characterized by openness towards and appreciation of individual differences, has been shown to enhance outcomes in culturally diverse teams. To date, it remains unclear which processes are responsible for these findings. This paper presents two quantitative studies (n = 91; 246) that identify...
Kanagaretnam, Kiridaran Khokhar, Abdul-Rahman Mawani, Amin
Published in
Journal of Business Ethics
We examine the association between societal trust and the levels of CEO compensation and the proportion of equity-based compensation of 897 firm-years from 18 countries over the 2007–2013 period. We find both the levels of CEO compensation as well as the proportion of equity-based compensation to be lower in countries with higher levels of societal...
Mtita, Collins
This thesis addresses the security and privacy challenges relevant to the resource constrained devices in the era of pervasive computing. Pervasive computing, a term coined by Schechter to describe the idea of computing services available anytime, anywhere and on demand, is characterized by seamless interactions between heterogeneous players in the...
Smith, Michael
Published in
The Journal of Ethics
Reflection on the wrongs done by characters in Woody Allen’s romantic comedy “Manhattan” helps us get clear about the evidence required to judge them responsible and so liable to blame them for those wrongs. On the positive side, what is required is evidence that trust remains a possibility, despite the fact that they wrong, and this in turn requir...
Heimann, Marco Bonnefon, Jean-François Lobre, Katia
The housing crisis of 2008 and more recently the European debt crisis spread a climate of mistrust amongst investors and the general public. We argue that financial institutions can foster trust through socially responsible investment funds thus contributing to global economic performance. We predict, however, that only funds with moral values simi...
Bormann, Inka Adamczyk, Judith
Published in
Zeitschrift für Bildungsforschung
Eltern gelten als wichtige Anspruchsgruppe von Schulen. Das Vertrauen, das sie der Schule ihres Kindes entgegenbringen, wird in der deutschsprachigen schulbezogenen Elternforschung bislang erst selten untersucht. Gegenstand des Aufsatzes ist die vertrauenstheoretisch fundierte empirische Untersuchung der Beziehung, die Eltern zur Schule ihres Kinde...
Menaka, R. Ranganathan, V. Sowmya, B.
Published in
Wireless Personal Communications
In ad hoc networks, nodes act as routers and transmit data packets originating from other nodes to destinations beyond the transmission range of the source node. Traditional routing protocols designed for Mobile Ad hoc Network all nodes in the network are trustworthy. Security of routing protocol is challenging in realistic setting as networks are ...