Search results for: trust message
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1103

Search results for: trust message

983 The Philippines’ War on Drugs: a Pragmatic Analysis on Duterte's Commemorative Speeches

Authors: Ericson O. Alieto, Aprillete C. Devanadera

Abstract:

The main objective of the study is to determine the dominant speech acts in five commemorative speeches of President Duterte. This study employed Speech Act Theory and Discourse analysis to determine how the speech acts features connote the pragmatic meaning of Duterte’s speeches. Identifying the speech acts is significant in elucidating the underlying message or the pragmatic meaning of the speeches. From the 713 sentences or utterances from the speeches, assertive with 208 occurrences from the corpus or 29% is the dominant speech acts. It was followed by expressive with 177 or 25% occurrences, directive accounts for 152 or 15% occurrences. While commisive accounts for 104 or 15% occurrences and declarative got the lowest percentage of occurrences with 72 or 10% only. These sentences when uttered by Duterte carry a certain power of language to move or influence people. Thus, the present study shows the fundamental message perceived by the listeners. Moreover, the frequent use of assertive and expressive not only explains the pragmatic message of the speeches but also reflects the personality of President Duterte.

Keywords: commemorative speech, discourse analysis, duterte, pragmatics

Procedia PDF Downloads 286
982 Understanding the Interplay between Consumer Knowledge, Trust and Relationship Satisfaction in Financial Services

Authors: Torben Hansen, Lars Gronholdt, Alexander Josiassen, Anne Martensen

Abstract:

Consumers often exhibit a bias in their knowledge; they often think that they know more or less than they do. The concept of 'knowledge over/underconfidence' (O/U) has in previous studies been used to investigate such knowledge bias. O/U appears as a combination of subjective and objective knowledge. Subjective knowledge relates to consumers’ perception of their knowledge, while objective knowledge relates to consumers’ absolute knowledge measured by objective standards. This separation leads to three scenarios: The consumer can either be knowledge calibrated (subjective and objective knowledge are similar), overconfident (subjective knowledge exceeds objective knowledge) or underconfident (objective knowledge exceeds subjective knowledge). Knowledge O/U is a highly useful concept in understanding consumer choice behavior. For example, knowledge overconfident individuals are likely to exaggerate their ability to make right choices, are more likely to opt out of necessary information search, spend less time to carry out a specific task than less knowledge confident consumers, and are more likely to show high financial trading volumes. Through the use of financial services as a case study, this study contributes to previous research by examining how consumer knowledge O/U affects two types of trust (broad-scope trust and narrow-scope trust) and consumer relationship satisfaction. Trust does not only concern consumer trust in individual companies (i.e., narrow.-scope confidence NST), but also concerns consumer confidence in the broader business context in which consumers plan and implement their behavior (i.e., broad scope trust, BST). NST is defined as "the expectation that the service provider can be relied on to deliver on its promises’, while BST is defined as ‘the expectation that companies within a particular business type can generally be relied on to deliver on their promises.’ This study expands our understanding of the interplay between consumer knowledge bias, consumer trust, and relationship marketing in two main ways: First, it is demonstrated that the more knowledge O/U a consumer becomes, the higher/lower NST and levels of relationship satisfaction will be. Second, it is demonstrated that BST has a negative moderating effect on the relationship between knowledge O/U and satisfaction, such that knowledge O/U has a higher positive/negative effect on relationship satisfaction when BST is low vs. high. The data for this study comprises 756 mutual fund investors. Trust is particularly important in consumers’ mutual fund behavior because mutual funds have important responsibilities in providing financial advice and in managing consumers’ funds.

Keywords: knowledge, cognitive bias, trust, customer-seller relationships, financial services

Procedia PDF Downloads 301
981 Participation in Decision Making and Work Outcomes: The Moderating Role of Ethical Climate

Authors: Ali Muhammad

Abstract:

The study examines the consequences of decision making in Kuwait work organization. The framework used in this study proposes that participation in decision making improves organizational ethical climate, which in turn increases employee’s trust in supervisor and trust in the organization. Furthermore, the model suggests that allowing employees to voice their opinions positively effects their perceptions of organizational justice. Providing employees with the opportunity to participate in decision making (voice), enhances their perceptions of the fairness of those decisions. Allowing employees to express their opinions and feeling about decisions being made show that the organization respect appreciates their views. This feeling of respect and appreciation reflects positively on employee’s perception of justice. Survey data were collected from a sample of 292 employees working in Kuwaiti work organizations. Pearson correlation, non-parametric tests, and structural equation models were used to analyze the data. Results of the analysis show that participation in decision making enhances employee perception of ethical climate, which in turn increases perception organizational justice and organizational trust. Implications of the findings and directions for future research are discussed.

Keywords: participation in decision making, organizational trust, trust in supervisor, organizational justice, ethical climate

Procedia PDF Downloads 113
980 Artificial Intelligence in Ethiopian Higher Education: The Impact of Digital Readiness Support, Acceptance, Risk, and Trust on Adoption

Authors: Merih Welay Welesilassie

Abstract:

Understanding educators' readiness to incorporate AI tools into their teaching methods requires comprehensively examining the influencing factors. This understanding is crucial, given the potential of these technologies to personalise learning experiences, improve instructional effectiveness, and foster innovative pedagogical approaches. This study evaluated factors affecting teachers' adoption of AI tools in their English language instruction by extending the Technology Acceptance Model (TAM) to encompass digital readiness support, perceived risk, and trust. A cross-sectional quantitative survey was conducted with 128 English language teachers, supplemented by qualitative data collection from 15 English teachers. The structural mode analysis indicated that implementing AI tools in Ethiopian higher education was notably influenced by digital readiness support, perceived ease of use, perceived usefulness, perceived risk, and trust. Digital readiness support positively impacted perceived ease of use, usefulness, and trust while reducing safety and privacy risks. Perceived ease of use positively correlated with perceived usefulness but negatively influenced trust. Furthermore, perceived usefulness strengthened trust in AI tools, while perceived safety and privacy risks significantly undermined trust. Trust was crucial in increasing educators' willingness to adopt AI technologies. The qualitative analysis revealed that the teachers exhibited strong content and pedagogical knowledge but needed more technology-related knowledge. Moreover, It was found that the teachers did not utilise digital tools to teach English. The study identified several obstacles to incorporating digital tools into English lessons, such as insufficient digital infrastructure, a shortage of educational resources, inadequate professional development opportunities, and challenging policies and governance. The findings provide valuable guidance for educators, inform policymakers about creating supportive digital environments, and offer a foundation for further investigation into technology adoption in educational settings in Ethiopia and similar contexts.

Keywords: digital readiness support, AI acceptance, perceived risc, AI trust

Procedia PDF Downloads 18
979 Implementation of ADETRAN Language Using Message Passing Interface

Authors: Akiyoshi Wakatani

Abstract:

This paper describes the Message Passing Interface (MPI) implementation of ADETRAN language, and its evaluation on SX-ACE supercomputers. ADETRAN language includes pdo statement that specifies the data distribution and parallel computations and pass statement that specifies the redistribution of arrays. Two methods for implementation of pass statement are discussed and the performance evaluation using Splitting-Up CG method is presented. The effectiveness of the parallelization is evaluated and the advantage of one dimensional distribution is empirically confirmed by using the results of experiments.

Keywords: iterative methods, array redistribution, translator, distributed memory

Procedia PDF Downloads 269
978 Artificial Intelligence in Ethiopian Universities: The Influence of Technological Readiness, Acceptance, Perceived Risk, and Trust on Implementation - An Integrative Research Approach

Authors: Merih Welay Welesilassie

Abstract:

Understanding educators' readiness to incorporate AI tools into their teaching methods requires comprehensively examining the influencing factors. This understanding is crucial, given the potential of these technologies to personalise learning experiences, improve instructional effectiveness, and foster innovative pedagogical approaches. This study evaluated factors affecting teachers' adoption of AI tools in their English language instruction by extending the Technology Acceptance Model (TAM) to encompass digital readiness support, perceived risk, and trust. A cross-sectional quantitative survey was conducted with 128 English language teachers, supplemented by qualitative data collection from 15 English teachers. The structural mode analysis indicated that implementing AI tools in Ethiopian higher education was notably influenced by digital readiness support, perceived ease of use, perceived usefulness, perceived risk, and trust. Digital readiness support positively impacted perceived ease of use, usefulness, and trust while reducing safety and privacy risks. Perceived ease of use positively correlated with perceived usefulness but negatively influenced trust. Furthermore, perceived usefulness strengthened trust in AI tools, while perceived safety and privacy risks significantly undermined trust. Trust was crucial in increasing educators' willingness to adopt AI technologies. The qualitative analysis revealed that the teachers exhibited strong content and pedagogical knowledge but needed more technology-related knowledge. Moreover, It was found that the teachers did not utilise digital tools to teach English. The study identified several obstacles to incorporating digital tools into English lessons, such as insufficient digital infrastructure, a shortage of educational resources, inadequate professional development opportunities, and challenging policies and governance. The findings provide valuable guidance for educators, inform policymakers about creating supportive digital environments, and offer a foundation for further investigation into technology adoption in educational settings in Ethiopia and similar contexts.

Keywords: digital readiness support, AI acceptance, risk, trust

Procedia PDF Downloads 15
977 Consumer Trust and Online Payment Options: Determinants of E-Commerce in the Least Developed Countries

Authors: Mohamed Muse Hassan

Abstract:

Selling through the Internet is changing the norms of doing business globally. Today, selling and buying from the Internet is not only an option but the dominant form of shopping. But, this phenomenon is not thriving in the developing countries, mainly in Africa. Therefore, although previous studies focused on the e-retailers’ side, this study investigates the effect of consumer trust and online payment options on the awareness and perception of e-commerce in Africa. We developed a five-construct model and empirically tested the model by targeting professionals and college students who reside in Somalia. We employed structural equation modeling (SEM) technique for path analysis to probe answers for the variables under study. The main findings of the study show that there is significant evidence that online payment option impacts both the awareness level and perception of e-commerce in Somalia. Consumer trust was also found to determine both the awareness and perception of online shopping in the country. Moreover, the current global payment options available ignore local technologies popular in Africa. For example, the inclusion of a mobile payment option alone would make a big difference in Africa. The paper also determined that consumer trust toward online retailers is very low and this can be solved if consumers are given assurances for their financial transactions. The paper concludes that increased online payment options are needed in Somalia and, in Africa, in general. Limitations and further research suggestions are also included at the end of this paper.

Keywords: Africa, consumer trust, e-commerce, online payment

Procedia PDF Downloads 255
976 The Role of Trust in Intention to Use Prescribed and Non-prescribed Connected Devices

Authors: Jean-michel Sahut, Lubica Hikkerova, Wissal Ben Arfi

Abstract:

The Internet of Things (IoT) emerged over the last few decades in many fields. Healthcare can significantly benefit from IoT. This study aims to examine factors influencing the adoption of IoT in eHealth. To do so, an innovative framework has been developed which applies both the Technology Acceptance Model (TAM) and the United Theory of Acceptance and Use of Technology (UTAUT) model and builds on them by analyzing trust and perceived-risk dimensions to predict intention to use IoT in eHealth. In terms of methodology, a Partial Least Approach Structural Equation Modelling was carried out on a sample of 267 French users. The findings of this research support the significant positive effect of constructs set out in the TAM (perceived ease of use) on predicting behavioral intention by adding the effects identified for UTAUT variables. This research also demonstrates how perceived risk and trust are significant factors for models examining behavioral intentions to use IoT. Perceived risk enhanced by the trust has a significant effect on patients’ behavioral intentions. Moreover, the results highlight the key role of prescription as a moderator of IoT adoption in eHealth. Depending on whether an individual has a prescription to use connected devices or not, ease of use has a stronger impact on adoption, while trust has a negative impact on adoption for users without a prescription. In accordance with the empirical results, several practical implications can be proposed. All connected devices applied in a medical context should be divided into groups according to their functionality: whether they are essential for the patient’s health and whether they require a prescription or not. Devices used with a prescription are easily accepted because the intention to use them is moderated by the medical trust (discussed above). For users without a prescription, ease of use is a more significant factor than for users who have a prescription. This suggests that currently, connected e-Health devices and online healthcare systems have to take this factor into account to better meet the needs and expectations of end-users.

Keywords: internet of things, Healthcare, trust, consumer acceptance

Procedia PDF Downloads 144
975 Analysis of Importance of Culture in Distributed Design Based on the Case Study at the University of Strathclyde

Authors: Zixuan Yang

Abstract:

This paper presents an analysis of the necessary consideration culture in distributed design through a thorough literature review and case study. The literature review has identified that the need for understanding cultural differences in product design and user evaluations is highlighted by analyzing cross-cultural influences; culture plays a significant role in distributed work, particularly in establishing team cohesion, trust, and credibility early in the project. By applying approaches of Geert Hofstede's dimensions and Fukuyama's trust analysis, a case study of a global design project, i.e., multicultural distributed teamwork solving the problem in terms of reducing the risk of deep vein thrombosis, showcases cultural dynamics, emphasizing trust-building and decision-making. The lessons learned emphasized the importance of cultural awareness, adaptability, and the utilization of scientific theories to enable effective cross-cultural collaborations in global design, providing valuable insights into navigating cultural diversity within design practices.

Keywords: culture, distributed design, global design, Geert Hofstede's dimensions, Fukuyama's trust analysis

Procedia PDF Downloads 68
974 The Impact of Corporate Social Responsibilities on Employees’ Green Behavior: The Moderating Role of Organizational Trust

Authors: Zubair Ahmad

Abstract:

Drawing from social exchange theory, this study proposes to explore the association between corporate social responsibility as external CSR and Internal CSR with employees' green behavior. Furthermore, the author also analyzed the moderating role of organizational trust among the aforementioned associations. The target respondents for this descriptive study were employees working hotel industry of Pakistan. An online questionnaire link was sent to hotel managers and is requested to share the questionnaire link with employees. The respondents for this study were selected through the convenience sampling technique. The collected data from participants is analyzed through AMOS and SPSS. The findings show that both internal corporate social responsibility and external corporate social responsibility exert a positive and significant influence on employees' green behavior. Thus it is concluded that the key driver behind the green behavior of hotel employees is the social setting of their workplace. Findings also revealed that organizational trust plays a positive role in enhancing the green behavior of hotel employees. This study extends the literature on corporate social responsibility by exploring the boundary role of organizational trust between internal and external corporate social responsibility and employees' green behavior in hotels. Moreover, CSR activities should be performed for attaining a competitive edge and maintaining a balance between progress and sustainability of the environment.

Keywords: corporate social responsibility, internal corporate social responsibility, external corporate social responsibility, social exchange theory, employee green behavior, organizational trust

Procedia PDF Downloads 107
973 Emotions and Message Sharing on the Chinese Microblog

Authors: Yungeng Xie, Cong Liu, Yi Liu, Xuanao Wan

Abstract:

The study aims to explore microblog users’ emotion expression and sharing behaviors on the Chinese microblog (Weibo). The first theme of study analyzed whether microblog emotions impact readers’ message sharing behaviors, specifically, how the strength of emotion (positive and negative) in microblog messages facilitate/inhibit readers’ sharing behaviors. The second theme compared the differences among the three types of microblog users (i.e., verified enterprise users, verified individual users and unverified users) in terms of their profiles and microblog behaviors. A total of 7114 microblog messages about 24 hot public events in China were sampled from Sina Weibo. The first study results show that strength of negative emotions that microblog messages carry significantly increase the possibility of the message being shared. The second study results indicate that there are significant differences across the three types of users in terms of their emotion expression and its influence on microblog behaviors.

Keywords: emotion expression, information diffusion, microblog, sharing

Procedia PDF Downloads 239
972 Data Collection with Bounded-Sized Messages in Wireless Sensor Networks

Authors: Min Kyung An

Abstract:

In this paper, we study the data collection problem in Wireless Sensor Networks (WSNs) adopting the two interference models: The graph model and the more realistic physical interference model known as Signal-to-Interference-Noise-Ratio (SINR). The main issue of the problem is to compute schedules with the minimum number of timeslots, that is, to compute the minimum latency schedules, such that data from every node can be collected without any collision or interference to a sink node. While existing works studied the problem with unit-sized and unbounded-sized message models, we investigate the problem with the bounded-sized message model, and introduce a constant factor approximation algorithm. To the best known of our knowledge, our result is the first result of the data collection problem with bounded-sized model in both interference models.

Keywords: data collection, collision-free, interference-free, physical interference model, SINR, approximation, bounded-sized message model, wireless sensor networks

Procedia PDF Downloads 221
971 Improving Cryptographically Generated Address Algorithm in IPv6 Secure Neighbor Discovery Protocol through Trust Management

Authors: M. Moslehpour, S. Khorsandi

Abstract:

As transition to widespread use of IPv6 addresses has gained momentum, it has been shown to be vulnerable to certain security attacks such as those targeting Neighbor Discovery Protocol (NDP) which provides the address resolution functionality in IPv6. To protect this protocol, Secure Neighbor Discovery (SEND) is introduced. This protocol uses Cryptographically Generated Address (CGA) and asymmetric cryptography as a defense against threats on integrity and identity of NDP. Although SEND protects NDP against attacks, it is computationally intensive due to Hash2 condition in CGA. To improve the CGA computation speed, we parallelized CGA generation process and used the available resources in a trusted network. Furthermore, we focused on the influence of the existence of malicious nodes on the overall load of un-malicious ones in the network. According to the evaluation results, malicious nodes have adverse impacts on the average CGA generation time and on the average number of tries. We utilized a Trust Management that is capable of detecting and isolating the malicious node to remove possible incentives for malicious behavior. We have demonstrated the effectiveness of the Trust Management System in detecting the malicious nodes and hence improving the overall system performance.

Keywords: CGA, ICMPv6, IPv6, malicious node, modifier, NDP, overall load, SEND, trust management

Procedia PDF Downloads 184
970 Secure Text Steganography for Microsoft Word Document

Authors: Khan Farhan Rafat, M. Junaid Hussain

Abstract:

Seamless modification of an entity for the purpose of hiding a message of significance inside its substance in a manner that the embedding remains oblivious to an observer is known as steganography. Together with today's pervasive registering frameworks, steganography has developed into a science that offers an assortment of strategies for stealth correspondence over the globe that must, however, need a critical appraisal from security breach standpoint. Microsoft Word is amongst the preferably used word processing software, which comes as a part of the Microsoft Office suite. With a user-friendly graphical interface, the richness of text editing, and formatting topographies, the documents produced through this software are also most suitable for stealth communication. This research aimed not only to epitomize the fundamental concepts of steganography but also to expound on the utilization of Microsoft Word document as a carrier for furtive message exchange. The exertion is to examine contemporary message hiding schemes from security aspect so as to present the explorative discoveries and suggest enhancements which may serve a wellspring of information to encourage such futuristic research endeavors.

Keywords: hiding information in plain sight, stealth communication, oblivious information exchange, conceal, steganography

Procedia PDF Downloads 241
969 The Impact of Sports Employees' of Perceptions of Organizational Climate and Organizational Trust on Work Motivation

Authors: Bilal Okudan, Omur F. Karakullukcu, Yusuf Can

Abstract:

Work motivation is one of the fundamental elements that determine the attitudes and performance of employees towards work. In this sense, work motivation depends not only on individual and occupational factors but also on employees' perception of organizational climate and organizational trust. Organizations that are aware of this have begun to do more research on work motivation in recent years to ensure that employees have the highest possible performance. In this framework of the purpose of this study is to examine the effect of sports employees' perceptions of organizational climate and organizational trust on work motivation. In the study, it has also been analyzed if there is any significant difference in the department of sports services’ employees’ organizational climate and organizational trust perception, and work motivation levels in terms of gender, age, duty status, year of service and level of education. 278 sports managers, who work in the department of sports service’s central and field organization at least as a chief in the manager position, have been chosen with random sampling method and they have voluntarily participated in the study. In the study, the organizational climate scale which was developed by Bilir (2005), organizational trusts scale developed by koksal (2012) and work motivation scale developed by Mottaz J. Clifford (1985) have been used as a data collection tool. The questionnaire form used as a data collection tool in the study includes a personal information form consisting of 5 questions; questioning gender, age, duty status, years of service and level of education. In the study, Pearson Correlation Analysis has been used for defining the correlation among organizational climate, organizational trust perceptions and work motivation levels in sports managers and regression analysis has been used to identify the effect of organizational climate and organizational trust on work motivation. T-test for binary grouping and ANOVA analysis have been used for more than binary groups in order to determine if there is any significant difference in the level of organizational climate, organizational trust perceptions and work motivations in terms of the participants’ duty status, year of service and level of education. According to the research results, it has been found that there is a positive correlation between the department of sports services’ employees’ organizational climate, organizational trust perceptions and work motivation levels. According to the results of the regression analysis; it is understood that the sports employees’ perception of organizational climate and organizational trust are two main factors which affects the perception of work motivation. Also, the results show that there is a significant difference in the level of organizational climate and organizational trust perceptions and work motivations of the department of sports services’ employees in terms of duty status, year of service, and level of education; however, the results reveal that there is no significant difference in terms of age groups and gender.

Keywords: sports manager, organizational climate, organizational trust, work motivation

Procedia PDF Downloads 241
968 Application of Chinese Remainder Theorem to Find The Messages Sent in Broadcast

Authors: Ayubi Wirara, Ardya Suryadinata

Abstract:

Improper application of the RSA algorithm scheme can cause vulnerability to attacks. The attack utilizes the relationship between broadcast messages sent to the user with some fixed polynomial functions that belong to each user. Scheme attacks carried out by applying the Chinese Remainder Theorem to obtain a general polynomial equation with the same modulus. The formation of the general polynomial becomes a first step to get back the original message. Furthermore, to solve these equations can use Coppersmith's theorem.

Keywords: RSA algorithm, broadcast message, Chinese Remainder Theorem, Coppersmith’s theorem

Procedia PDF Downloads 341
967 The Impact of Regulation of Energy Prices on Public Trust in Europe during Energy Crisis: A Cross-Sectional Study in the Aftermath of the Russia-Ukraine Conflict

Authors: Sempiga Olivier, Dominika Latusek-Jurczak

Abstract:

The conflict in Ukraine has had far-reaching economic consequences, not only for the countries directly involved in it but also for their trading partners and allies, and on the global economy in general. Different European Union (EU) countries, being some of Ukraine and Russia's major trading partners, have also felt the impact of the conflict on their economy. In a special way, the energy sector has suffered the most due to the fact that Russia is a huge exporter of gas and other energy sources on which rely European countries. Energy is a locomotive of the economy and once energy prices skyrocket there is a spill over effects in other areas causing different commodities’ prices to rise thereby affecting people’s social economic lifestyles. To minimise the impact energy crisis’ socio-political and economic consequences, the EU and countries have tightened their regulatory mechanisms to stop some energy firms exploit the crisis at the expense of the vulnerable mass. The key question is to what extent these regulatory instruments put in place during the energy crisis times have an affect on citizen trust in the governing institutions. The question is of paramount importance after years of declining trust in the EU and in most countries in Europe. Earlier research have analysed how wars or global political risks relate to citizen trust in government and organizations but very few empirical research have examined the relationship between regulatory instruments during the time of crisis on citizen trust in government and institutions. Using data from INSEE (the French National Institute of Statistics and Economic Studies) and European Social Survey (ESS), it carry out a multilinear regression analysis and investigate the impact of regulation both from the EU and different countries on energy prices on citizen trust. To understand the dynamics between regulatory actions during crises and citizen trust, this study draws on the theoretical framework of institutional trust and regulatory legitimacy. Institutional trust theory posits that citizens’ trust in government and institutions is influenced by perceptions of fairness, transparency, and efficacy in governance. Regulatory legitimacy, a related concept, suggests that regulatory measures, especially in response to crises, are more effective when perceived as just, necessary, and in the public interest. Results of this cross sectional study show that regulatory frameworks strongly affect the levels of trust, the association varying from strong to moderate depending on countries and period. This study contributes to the understanding of the vital relationship between regulatory measures implemented during crises and citizen trust in government institutions. By identifying the conditions under which trust is fostered or eroded, the findings provide policymakers with valuable insights into effective strategies for enhancing public confidence, ultimately guiding interventions that can mitigate the socio-political impacts of future energy crises.

Keywords: energy crisis, price, regulation, russia-Ukraine conflict, trust

Procedia PDF Downloads 8
966 Lexical Based Method for Opinion Detection on Tripadvisor Collection

Authors: Faiza Belbachir, Thibault Schienhinski

Abstract:

The massive development of online social networks allows users to post and share their opinions on various topics. With this huge volume of opinion, it is interesting to extract and interpret these information for different domains, e.g., product and service benchmarking, politic, system of recommendation. This is why opinion detection is one of the most important research tasks. It consists on differentiating between opinion data and factual data. The difficulty of this task is to determine an approach which returns opinionated document. Generally, there are two approaches used for opinion detection i.e. Lexical based approaches and Machine Learning based approaches. In Lexical based approaches, a dictionary of sentimental words is used, words are associated with weights. The opinion score of document is derived by the occurrence of words from this dictionary. In Machine learning approaches, usually a classifier is trained using a set of annotated document containing sentiment, and features such as n-grams of words, part-of-speech tags, and logical forms. Majority of these works are based on documents text to determine opinion score but dont take into account if these texts are really correct. Thus, it is interesting to exploit other information to improve opinion detection. In our work, we will develop a new way to consider the opinion score. We introduce the notion of trust score. We determine opinionated documents but also if these opinions are really trustable information in relation with topics. For that we use lexical SentiWordNet to calculate opinion and trust scores, we compute different features about users like (numbers of their comments, numbers of their useful comments, Average useful review). After that, we combine opinion score and trust score to obtain a final score. We applied our method to detect trust opinions in TRIPADVISOR collection. Our experimental results report that the combination between opinion score and trust score improves opinion detection.

Keywords: Tripadvisor, opinion detection, SentiWordNet, trust score

Procedia PDF Downloads 198
965 Governance Framework for an Emerging Trust Ecosystem with a Blockchain-Based Supply Chain

Authors: Ismael Ávila, José Reynaldo F. Filho, Vasco Varanda Picchi

Abstract:

The ever-growing consumer awareness of food provenance in Brazil is driving the creation of a trusted ecosystem around the animal protein supply chain. The traceability and accountability requirements of such an ecosystem demand a blockchain layer to strengthen the weak links in that chain. For that, direct involvement of the companies in the blockchain transactions, including as validator nodes of the network, implies formalizing a partnership with the consortium behind the ecosystem. Yet, their compliance standards usually require that a formal governance structure is in place before they agree with any membership terms. In light of such a strategic role of blockchain governance, the paper discusses a framework for tailoring a governance model for a blockchain-based solution aimed at the meat supply chain and evaluates principles and attributes in terms of their relevance to the development of a robust trust ecosystem.

Keywords: blockchain, governance, trust ecosystem, supply chain, traceability

Procedia PDF Downloads 119
964 Secure Automatic Key SMS Encryption Scheme Using Hybrid Cryptosystem: An Approach for One Time Password Security Enhancement

Authors: Pratama R. Yunia, Firmansyah, I., Ariani, Ulfa R. Maharani, Fikri M. Al

Abstract:

Nowadays, notwithstanding that the role of SMS as a means of communication has been largely replaced by online applications such as WhatsApp, Telegram, and others, the fact that SMS is still used for certain and important communication needs is indisputable. Among them is for sending one time password (OTP) as an authentication media for various online applications ranging from chatting, shopping to online banking applications. However, the usage of SMS does not pretty much guarantee the security of transmitted messages. As a matter of fact, the transmitted messages between BTS is still in the form of plaintext, making it extremely vulnerable to eavesdropping, especially if the message is confidential, for instance, the OTP. One solution to overcome this problem is to use an SMS application which provides security services for each transmitted message. Responding to this problem, in this study, an automatic key SMS encryption scheme was designed as a means to secure SMS communication. The proposed scheme allows SMS sending, which is automatically encrypted with keys that are constantly changing (automatic key update), automatic key exchange, and automatic key generation. In terms of the security method, the proposed scheme applies cryptographic techniques with a hybrid cryptosystem mechanism. Proofing the proposed scheme, a client to client SMS encryption application was developed using Java platform with AES-256 as encryption algorithm, RSA-768 as public and private key generator and SHA-256 for message hashing function. The result of this study is a secure automatic key SMS encryption scheme using hybrid cryptosystem which can guarantee the security of every transmitted message, so as to become a reliable solution in sending confidential messages through SMS although it still has weaknesses in terms of processing time.

Keywords: encryption scheme, hybrid cryptosystem, one time password, SMS security

Procedia PDF Downloads 128
963 A Study on the Relationship between Nonverbal Communication, Perceived Expertise, Service Quality, and Trust: Focusing on Cosmetic Stores in Korea

Authors: Park Sung-Min, Chan Kwon Park, Kim Chae-Bogk

Abstract:

This study aims to analyze the relationship between nonverbal communication, perceived expertise, service quality, and trust. The study was conducted with clients using cosmetic stores in the Daegu area of Korea. Based on the prior study, the measurement questions are correctly amended and organized in this study. The exploration factor analysis was performed using SPSS 22 for the configured measurement questions. And PLS 2.0 was used to perform a confirmatory factor analysis and path analysis. As a result of the analysis, nonverbal communication has been categorized as physical appearance, kinesics, vocal behavior and proxemics. It has been shown that all of the factors in nonverbal communication have a (+) significant effect on perceived expertise. The degree of impact has been analyzed to influence the perceived expertise in the order in which physical appearance, vocal behavior, kinesics and proxemics. The perceived expertise was analyzed to have a (+) significant effect on the service quality. It has been shown that the service quality has a (+) significant effect on trust.

Keywords: nonverbal communication, perceived expertise, service quality, trust

Procedia PDF Downloads 284
962 The Disposable Identities; Enabling Trust-by-Design to Build Sustainable Data-Driven Value

Authors: Lorna Goulden, Kai M. Hermsen, Jari Isohanni, Mirko Ross, Jef Vanbockryck

Abstract:

This article introduces disposable identities, with reference use cases and explores possible technical approaches. The proposed approach, when fully developed as an open-source toolkit, enables developers of mobile or web apps to employ a self-sovereign identity and data privacy framework, in order to rebuild trust in digital services by providing greater transparency, decentralized control, and GDPR compliance. With a user interface for the management of self-sovereign identity, digital authorizations, and associated data-driven transactions, the advantage of Disposable Identities is that they may also contain verifiable data such as the owner’s photograph, official or even biometric identifiers for more proactive prevention of identity abuse. These Disposable Identities designed for decentralized privacy management can also be time, purpose and context-bound through a secure digital contract; with verification functionalities based on tamper-proof technology.

Keywords: dentity, trust, self-sovereign, disposable identity, privacy toolkit, decentralised identity, verifiable credential, cybersecurity, data driven business, PETs, GDPRdentity, trust, self-sovereign, disposable identity, privacy toolkit, decentralised identity, verifiable credential, cybersecurity, data driven business, PETs, GDPRI

Procedia PDF Downloads 218
961 An Analysis of Privacy and Security for Internet of Things Applications

Authors: Dhananjay Singh, M. Abdullah-Al-Wadud

Abstract:

The Internet of Things is a concept of a large scale ecosystem of wireless actuators. The actuators are defined as things in the IoT, those which contribute or produces some data to the ecosystem. However, ubiquitous data collection, data security, privacy preserving, large volume data processing, and intelligent analytics are some of the key challenges into the IoT technologies. In order to solve the security requirements, challenges and threats in the IoT, we have discussed a message authentication mechanism for IoT applications. Finally, we have discussed data encryption mechanism for messages authentication before propagating into IoT networks.

Keywords: Internet of Things (IoT), message authentication, privacy, security

Procedia PDF Downloads 382
960 The Effect of Socio-Affective Variables in the Relationship between Organizational Trust and Employee Turnover Intention

Authors: Paula A. Cruise, Carvell McLeary

Abstract:

Employee turnover leads to lowered productivity, decreased morale and work quality, and psychological effects associated with employee separation and replacement. Yet, it remains unknown why talented employees willingly withdraw from organizations. This uncertainty is worsened as studies; a) priorities organizational over individual predictors resulting in restriction in range in turnover measurement; b) focus on actual rather than intended turnover thereby limiting conceptual understanding of the turnover construct and its relationship with other variables and; c) produce inconsistent findings across cultures, contexts and industries despite a clear need for a unified perspective. The current study addressed these gaps by adopting the theory of planned behavior (TPB) framework to examine socio-cognitive factors in organizational trust and individual turnover intentions among bankers and energy employees in Jamaica. In a comparative study of n=369 [nbank= 264; male=57 (22.73%); nenergy =105; male =45 (42.86)], it was hypothesized that organizational trust was a predictor of employee turnover intention, and the effect of individual, group, cognitive and socio-affective variables varied across industry. Findings from structural equation modelling confirmed the hypothesis, with a model of both cognitive and socio-affective variables being a better fit [CMIN (χ2) = 800.067, df = 364, p ≤ .000; CFI = 0.950; RMSEA = 0.057 with 90% C.I. (0.052 - 0.062); PCLOSE = 0.016; PNFI = 0.818 in predicting turnover intention. The findings are discussed in relation to socio-cognitive components of trust models and predicting negative employee behaviors across cultures and industries.

Keywords: context-specific organizational trust, cross-cultural psychology, theory of planned behavior, employee turnover intention

Procedia PDF Downloads 248
959 The Role of Interpersonal and Institutional Trusts for the Public Support of Welfare State

Authors: Nazim Habibov, Alena Auchynnikava, Lida Fan

Abstract:

The exploration of the relationship between social trust and the support of the welfare system in transitional countries has attracted growing interests in recent decades. This study estimates the effects of interpersonal and institutional trust on the support of the welfare system in 27 countries in Eastern Europe the former Soviet Union. We estimate the data sets from the Life-in-Transition Survey 2010 and 2016 with binomial regression models. The results indicate that both interpersonal and institutional trust have positive effects on the support for the welfare system in all the three areas under investigation: helping the needy, public healthcare and public education, both in the less developed countries of the former Soviet Union and in the more developed Eastern European countries. Furthermore, the positive effects of interpersonal and institutional trust on support for helping the needy, public healthcare and public education were found to grow over time. In conclusion, this study confirms that interpersonal and institutional trusts have positive effects for the public support of the welfare system in these transitional countries under investigation, regardless of their level of development.

Keywords: central and eastern Europe, former Soviet union, international social welfare policy, comparative social welfare policy

Procedia PDF Downloads 130
958 Robot Movement Using the Trust Region Policy Optimization

Authors: Romisaa Ali

Abstract:

The Policy Gradient approach is one of the deep reinforcement learning families that combines deep neural networks (DNN) with reinforcement learning RL to discover the optimum of the control problem through experience gained from the interaction between the robot and its surroundings. In contrast to earlier policy gradient algorithms, which were unable to handle these two types of error because of over-or under-estimation introduced by the deep neural network model, this article will discuss the state-of-the-art SOTA policy gradient technique, trust region policy optimization (TRPO), by applying this method in various environments compared to another policy gradient method, the Proximal Policy Optimization (PPO), to explain their robust optimization, using this SOTA to gather experience data during various training phases after observing the impact of hyper-parameters on neural network performance.

Keywords: deep neural networks, deep reinforcement learning, proximal policy optimization, state-of-the-art, trust region policy optimization

Procedia PDF Downloads 169
957 Country of Origin, Ethnocentrism and Initial Trust in Indonesia: The Role of Religiosity and Subjective Knowledge

Authors: Adilla Anggraeni

Abstract:

The purpose of the paper is to investigate the effects of religiosity and subjective knowledge towards initial trust that a consumer has towards a product manufacturer. Since globalization enters the point of no return, it should be acknowledged that further exploration of country of origin image, its influences and possible limiting factors is imperative. This model aims to broaden COO-related research, especially related to different product categories based on the perception of consumers in emerging markets. The study employs quantitative method, aiming to involve 200 Indonesian respondents to evaluate different product categories (food/apparel). Relationships between variables are evaluated using structural equation modeling. It is expected that subjective knowledge will have significant influence towards initial trust that an individual possesses towards food products. A major contribution of this study will be the inclusion of religiosity and subjective knowledge in the country of origin study’s body of knowledge. Companies are also expected to benefit from the study as the acceleration of globalization may again repose the question of whether companies should market their product using similar strategies across different countries or different ones. Religiosity dimension is expected to add values to international marketing literature concerning emerging economies in particular, as many companies view the emerging economies as promising markets.

Keywords: country of origin, subjective knowledge, initial trust, emerging economy, Indonesia

Procedia PDF Downloads 290
956 Three Foci of Trust as Potential Mediators in the Association Between Job Insecurity and Dynamic Organizational Capability: A Quantitative, Exploratory Study

Authors: Marita Heyns

Abstract:

Job insecurity is a distressing phenomenon which has far reaching consequences for both employees and their organizations. Previously, much attention has been given to the link between job insecurity and individual level performance outcomes, while less is known about how subjectively perceived job insecurity might transfer beyond the individual level to affect performance of the organization on an aggregated level. Research focusing on how employees’ fear of job loss might affect the organization’s ability to respond proactively to volatility and drastic change through applying its capabilities of sensing, seizing, and reconfiguring, appears to be practically non-existent. Equally little is known about the potential underlying mechanisms through which job insecurity might affect the dynamic capabilities of an organization. This study examines how job insecurity might affect dynamic organizational capability through trust as an underling process. More specifically, it considered the simultaneous roles of trust at an impersonal (organizational) level as well as trust at an interpersonal level (in leaders and co-workers) as potential underlying mechanisms through which job insecurity might affect the organization’s dynamic capability to respond to opportunities and imminent, drastic change. A quantitative research approach and a stratified random sampling technique enabled the collection of data among 314 managers at four different plant sites of a large South African steel manufacturing organization undergoing dramatic changes. To assess the study hypotheses, the following statistical procedures were employed: Structural equation modelling was performed in Mplus to evaluate the measurement and structural models. The Chi-square values test for absolute fit as well as alternative fit indexes such as the Comparative Fit Index and the Tucker-Lewis Index, the Root Mean Square Error of Approximation and the Standardized Root Mean Square Residual were used as indicators of model fit. Composite reliabilities were calculated to evaluate the reliability of the factors. Finally, interaction effects were tested by using PROCESS and the construction of two-sided 95% confidence intervals. The findings indicate that job insecurity had a lower-than-expected detrimental effect on evaluations of the organization’s dynamic capability through the conducive buffering effects of trust in the organization and in its leaders respectively. In contrast, trust in colleagues did not seem to have any noticeable facilitative effect. The study proposes that both job insecurity and dynamic capability can be managed more effectively by also paying attention to factors that could promote trust in the organization and its leaders; some practical recommendations are given in this regard.

Keywords: dynamic organizational capability, impersonal trust, interpersonal trust, job insecurity

Procedia PDF Downloads 89
955 The Effect of Regulation and Investment in Sustainable Practices on Environmental Performance and Consumer Trust: a Time Series Analysis of the Dominant Companies within the Energy Sector

Authors: Sempiga Olivier, Dominika Latusek-Jurczak

Abstract:

Climate change has allegedly been attributed to a high consumption of fossil fuels, leading to severe environmental problems. The energy sector has been among the most polluting sectors for many decades. Consequently, there is a lack of trust in several energy firms, especially those in fossil fuels and nuclear energy. A robust regulatory framework is needed, and more investment in renewable energy sources is paramount for a better environmental outcome. Given the significant environmental impact of energy production and consumption in the energy sector, sustainable marketing practices have become increasingly important. Although the latter has had the lion’s share in polluting the environment, much effort has been made recently to move away from fossil fuels and privilege renewable energy sources. How this shift would help rebuild trust in the energy industry is unclear. For the shift to have lasting effects, it may be essential that regulatory agencies examine how energy firms engage in sustainable investment. There is little empirical evidence on whether adopting regulating marketing practices and investment initiatives can help different organizations reduce their environmental impact and promote sustainable development. Little is known about how and whether the environmental value in firms goes beyond rhetoric, greenwashing and publicity to translate into economic gains and environmental performance. The study investigates how regulatory agencies can help energy firms invest sustainably and take sustainable initiatives even amid the energy crisis caused by the Russia-Ukraine conflict and how these sustainable practices relate to renewed consumer trust. Using data from Corporate Knights, the study, through time series, analyses the relationship between sustainable regulation, sustainable practices of energy firms from around the world and their relation to consumer trust and environmental performance over the past 20 years. It examines how their sustainable investment, energy, and carbon productivity relate to environmental sustainability and consumer trust. This longitudinal study provides empirical evidence of the interplay between regulation, trust and environmental performance. The research is grounded in institutional trust theory, which emphasizes the role of regulatory frameworks and organizational practices in shaping public perceptions of fairness, transparency, and legitimacy. Results show that organizations in the energy sector, supported by robust regulatory tools, can overcome the negative image of polluters and compete with other companies in the fight against climate change and global warming. However, to do so, energy firms should consider investing more in renewable energy sources and implementing sustainable strategies and practices that go beyond greenwashing to improve their environmental performance, thereby rebuilding consumer trust in the energy sector. Results allow regulatory regimes and organizations to learn why it is crucial for energy firms to invest in renewable energy sources and engage in various sustainable initiatives and practices to contribute to better environmental outcomes and higher levels of trust.

Keywords: consumer trust, energy, environmental performance, regulation, renewable energy sources, sustainable practices

Procedia PDF Downloads 9
954 Multilevel Gray Scale Image Encryption through 2D Cellular Automata

Authors: Rupali Bhardwaj

Abstract:

Cryptography is the science of using mathematics to encrypt and decrypt data; the data are converted into some other gibberish form, and then the encrypted data are transmitted. The primary purpose of this paper is to provide two levels of security through a two-step process, rather than transmitted the message bits directly, first encrypted it using 2D cellular automata and then scrambled with Arnold Cat Map transformation; it provides an additional layer of protection and reduces the chance of the transmitted message being detected. A comparative analysis on effectiveness of scrambling technique is provided by scrambling degree measurement parameters i.e. Gray Difference Degree (GDD) and Correlation Coefficient.

Keywords: scrambling, cellular automata, Arnold cat map, game of life, gray difference degree, correlation coefficient

Procedia PDF Downloads 377