Search results for: trust message
1103 Use of Personal Rhythm to Authenticate Encrypted Messages
Authors: Carlos Gonzalez
Abstract:
When communicating using private and secure keys, there is always the doubt as to the identity of the message creator. We introduce an algorithm that uses the personal typing rhythm (keystroke dynamics) of the message originator to increase the trust of the authenticity of the message originator by the message recipient. The methodology proposes the use of a Rhythm Certificate Authority (RCA) to validate rhythm information. An illustrative example of the communication between Bob and Alice and the RCA is included. An algorithm of how to communicate with the RCA is presented. This RCA can be an independent authority or an enhanced Certificate Authority like the one used in public key infrastructure (PKI).Keywords: authentication, digital signature, keystroke dynamics, personal rhythm, public-key encryption
Procedia PDF Downloads 3031102 Fears of Strangers: Causes of Anonymity Rejection on Virtual World
Authors: Proud Arunrangsiwed
Abstract:
This research is a collaborative narrative research, which is mixed with issues of selected papers and researcher's experience as an anonymous user on social networking sites. The objective of this research is to understand the reasons of the regular users who reject to contact with anonymous users, and to study the communication traditions used in the selected studies. Anonymous users are rejected by regular users, because of the fear of cyber bully, the fear of unpleasant behaviors, and unwillingness of changing communication norm. The suggestion for future research design is to use longitudinal design or quantitative design; and the theory in rhetorical tradition should be able to help develop a strong trust message.Keywords: anonymous, anonymity, online identity, trust message, reliability
Procedia PDF Downloads 3581101 Application of Modulo-2 Arithmetic in Securing Communicated Messages throughout the Globe
Authors: Ejd Garba, Okike Benjamin
Abstract:
Today, the word encryption has become very popular even among non-computer professionals. There is no doubt that some works have been carried out in this area, but more works need to be done. Presently, most of the works on encryption is concentrated on the sender of the message without paying any attention to the message recipient. However, it is a good practice if any message sent to someone is received by the particular person whom the message is sent to. This work seeks to ensure that at the receiving end of the message, there is a security to ensure that the recipient computes a key that would enable the encrypted message to be accessed. This key would be in form of password. This would make it possible for a given message to be sent to several people at the same time. When this happens, it is only those people who computes the key correctly that would be given the opportunity to access even the encrypted message, which can in turn be decrypted using the appropriate key.Keywords: arithmetic, cyber space, modulo-2, information security
Procedia PDF Downloads 3191100 Advertising Message Strategy on Ghana’s TV
Authors: Aisha Iddrisu, Ferruh Uztuğ
Abstract:
This study is a quantitative content analysis of advertising message strategies used in Ghana’s TV commercials (2020-2021) using the modified strategy of Wang and Praet (2016) with the objective of exploring the various advertising message strategies used in Ghana’s TV advertisement, its variation according to product category including the most widely used message strategy. The findings indicate that, out of the 220 commercials used in the study, the Affective message strategy (n=122, 55%) was the dominant message strategy used in Ghana’s TV commercials. The most advertised product category in Ghana’s TV commercials (2020-2021) was the food category, and a significant relationship was observed between message strategy and product category as well as message strategy and brand type.Keywords: advertising, message strategy, Ghana, television
Procedia PDF Downloads 1831099 Mathematical Model That Using Scrambling and Message Integrity Methods in Audio Steganography
Authors: Mohammed Salem Atoum
Abstract:
The success of audio steganography is to ensure imperceptibility of the embedded message in stego file and withstand any form of intentional or un-intentional degradation of message (robustness). Audio steganographic that utilized LSB of audio stream to embed message gain a lot of popularity over the years in meeting the perceptual transparency, robustness and capacity. This research proposes an XLSB technique in order to circumvent the weakness observed in LSB technique. Scrambling technique is introduce in two steps; partitioning the message into blocks followed by permutation each blocks in order to confuse the contents of the message. The message is embedded in the MP3 audio sample. After extracting the message, the permutation codebook is used to re-order it into its original form. Md5sum and SHA-256 are used to verify whether the message is altered or not during transmission. Experimental result shows that the XLSB performs better than LSB.Keywords: XLSB, scrambling, audio steganography, security
Procedia PDF Downloads 3621098 The Decision to Remit is a Matter of Interpersonal Trust
Authors: Kamal Kasmaoui, Farid Makhlouf
Abstract:
This article seeks to assess the role of the level of interpersonal trust in a country in the remittance landscape. Using historical data from the 2010-2014 wave of the World Value Survey (WVS) for interpersonal trust, our findings underline the substitution role played by the interpersonal trust with remittances. More accurately, remittances tend to drop when the rate of interpersonal trust in the country of origin is high. Overall, a rise in trust is likely to underpin social cohesion, limiting, therefore, the need for remittances. These results are still fairly solid and unambiguous after controlling for confounding factors and possible reverse causality.Keywords: interpersonal trust, social capital, remittances, 2SLS
Procedia PDF Downloads 1731097 To Remit or not to Remit: It is a Question of Interpersonal Trust
Authors: Kasmaoui Kamal, Makhlouf farid
Abstract:
This article seeks to assess the role of the level of interpersonal trust in a country in the remittance landscape. Using historical data from the 2010-2014 wave of the World Value Survey (WVS) for interpersonal trust, our findings underline the substitution role played by the interpersonal trust with remittances. More accurately, remittances tend to drop when the rate of interpersonal trust in the country of origin is high. Overall, a rise in trust is likely to underpin social cohesion, limiting, therefore, the need for remittances. These results are still fairly solid and unambiguous after controlling for confounding factors and possible reverse causality.Keywords: interpersonal trust, remittances, social capital, social cohesion
Procedia PDF Downloads 1011096 Assessment of Trust in Virtual Teams of College Students in Egypt
Authors: Bashayer Alsana
Abstract:
Emerging technologies present human interaction with new challenges. Individuals are required to interact and collaborate to achieve mutual gain. Accomplishing shared goals requires all parties involved to trust others commitment to fulfill their specified obligations. Trust is harder to establish when groups work virtually and members transcend time, space, and culture. This paper identifies the importance of trust in virtual groups of students at Cairo University by exposing them to electronic projects on which they collaborate.Students respond to a survey to assess their range of trust within their teams and how the outcome is affected. Gender differences and other demographic factors are analyzed to understand results and rates of trust. The paper concludes with summarizing factors influencing trust development and possible implications.Keywords: students, teams, trust, virtual
Procedia PDF Downloads 2591095 Exploring Framing Effect and Repetition Effect of the Persuasive Message on Moral Decision Making in Conflict of Interests
Authors: Sae-Yeon Seong, EunSun Chung, Dongjoo Chin
Abstract:
Conflict of interest (COI) is one of the dominant circumstantial factors of moral corruption across various fields. Several management strategies have been proposed to prevent self-interested decision making in COIs. Among these strategies, message persuasion has been considered as a practical and effective approach. Framing and repetition are two of the major factors in the persuasion effect of message. Therefore, their effect on moral decision making in COI should be explored systematically. The purpose of this study was to compare the differential effects of positively framed message and negatively framed message, and secondly, to investigate how the effectiveness of persuasive message changes through repetitive exposures. A total of 63 participants were randomly assigned to one of 3 framing conditions: positive framing, negative framing, and no-message condition. Prior to the online experiment involving a consultation task, the differently framed persuasive message was presented to the participants. This process was repeated four times in a row. The results showed that participants with positive-framing message were less likely to provide self-interested consultation than participants in the no-message condition. Also, a U-shaped quadric relation between repetition and self-interest consultation was found. Implications and limitations are further discussed.Keywords: conflicts of interest, persuasive message, framing effect, repetition effect, self-interested behavior
Procedia PDF Downloads 1741094 Pattern in Splitting Sequence in Okike’s Merged Irregular Transposition Cipher for Encrypting Cyberspace Messages
Authors: Okike Benjamin, E. J. D. Garba
Abstract:
The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable to these threats. The researchers in this work propose a new encryption technique to be known as Merged Irregular Transposition Cipher. In this proposed encryption technique, a message to be encrypted will first of all be split into multiple parts depending on the length of the message. After the split, different keywords are chosen to encrypt different parts of the message. After encrypting all parts of the message, the positions of the encrypted message could be swapped to other position thereby making it very difficult to decrypt by any unauthorized user.Keywords: information security, message splitting, pattern, sequence
Procedia PDF Downloads 2861093 Trust in Virtual Groups: An Exploratory Study Applied to University Students in Kuwait
Authors: Bashaiar Alsanaa
Abstract:
Emerging technologies present human interaction with new challenges. Individuals are required to interact and collaborate to achieve mutual gain. Accomplishing shared goals requires all parties involved to trust others’ commitment to fulfilling their specified obligations. Trust is harder to establish when groups work virtually and members transcend time, space, and culture. This paper identifies the importance of trust in virtual groups of students at Kuwait University by exposing them to electronic projects on which they collaborate. Students respond to a survey to assess their range of trust within their teams and how the outcome is affected. Gender differences and other demographic factors are analyzed to understand results and rates of trust. The paper concludes with summarizing factors influencing trust development and possible implications.Keywords: groups, students, trust, virtual
Procedia PDF Downloads 2911092 The Veil of Virtuality: Anonymity and Trust in the Metaverse's New Frontier
Abstract:
Utilizing a preregistered randomized experiment, this study explores the effects of anonymity and curated identity on trust within the Metaverse. Participants were randomly assigned to different conditions of anonymity and identity curation and engaged in a series of tasks designed to mirror the complexities of trust in real-world social interactions. Trust was measured using the classical trust game, allowing for a nuanced understanding of how these factors interact and influence trust. The findings reveal that higher levels of anonymity negatively impact trust, while identity curation can moderate this effect. Mechanism analysis uncovers how anonymity influences perceived reciprocity and group cohesion, and how curation can moderate these relationships. The results demonstrate a nuanced interaction between anonymity and trust, with variations across different curation levels. These insights provide a multifaceted understanding of trust within virtual environments, contributing valuable knowledge to the design, policy-making, and ethical considerations of the MetaverseKeywords: metaverse, anonymity, curated identity, social behavior, trust
Procedia PDF Downloads 1371091 Why Trust Matters for Women Entrepreneurs: Insights from Malaysia
Authors: Suraini Mohd Rhouse, Noor Lela Ahmad, Nek Kamal Yeop Yunus, Rosfizah Md Taib
Abstract:
This article aims to explore the importance of trust to women entrepreneurs. In particular, the research uses a social constructionist lens to examine ways in which women entrepreneurs construct trust in relation to their various stakeholders. A semi-structured interview was used to gather the data. The findings suggest women highlight the importance of trust in order to establish customer satisfaction that can further develop customer loyalty. In addition, aspect of trust with the employees is seen as vital for building organizational commitment to the business organization. Women also see the trust dimension in terms of their relationships with financial providers in order to gain approval for financial resources. This article contributes to the literature on the value of trust to women’s business environments.Keywords: qualitative, social constructionist, trust, women entrepreneurship
Procedia PDF Downloads 5581090 SOTM: A New Cooperation Based Trust Management System for VANET
Authors: Amel Ltifi, Ahmed Zouinkhi, Mohamed Salim Bouhlel
Abstract:
Security and trust management in Vehicular Ad-hoc NETworks (VANET) is a crucial research domain which is the scope of many researches and domains. Although, the majority of the proposed trust management systems for VANET are based on specific road infrastructure, which may not be present in all the roads. Therefore, road security should be managed by vehicles themselves. In this paper, we propose a new Self Organized Trust Management system (SOTM). This system has the responsibility to cut with the spread of false warnings in the network through four principal components: cooperation, trust management, communication and security.Keywords: ative vehicle, cooperation, trust management, VANET
Procedia PDF Downloads 4291089 When Messages Cause Distraction from Advertising: An Eye-Tracking Study
Authors: Nilamadhab Mohanty
Abstract:
It is essential to use message formats that make communication understandable and correct. It is because; the information format can influence consumer decision on the purchase of a product. This study combines information from qualitative inquiry, media trend analysis, eye tracking experiment, and questionnaire data to examine the impact of specific message format and consumer perceived risk on attention to the information and risk retention. We investigated the influence of message framing (goal framing, attribute framing, and mix framing) on consumer memory, study time, and decisional uncertainty while deciding on the purchase of drugs. Furthermore, we explored the impact of consumer perceived risk (associated with the use of the drug, i.e., RISK-AB and perceived risk associated with the non-use of the drug, i.e., RISK-EB) on message format preference. The study used eye-tracking methods to understand the differences in message processing. Findings of the study suggest that the message format influences information processing, and participants' risk perception impacts message format preference. Eye tracking can be used to understand the format differences and design effective advertisements.Keywords: message framing, consumer perceived risk, advertising, eye tracking
Procedia PDF Downloads 1211088 Antecedents of Online Trust Towards E-Retailers for Repeat Buyers: An Empirical Study in Indian Context
Authors: Prageet Aeron, Shilpi Jain
Abstract:
The present work explores the trust building mechanisms in the context of e-commerce vendors and reconciles trust as a cognitive as well as a knowledge-based mechanism in the framework which is developed. The paper conducts an empirical examination of the variables integrity, benevolence, and ability with trust as the dependent variable and propensity to trust as the mediating variable. Authors establish ability and integrity as primary antecedents as well as establish the central role of trust propensity in the online context for Indian buyers. Authors further identify that benevolence in the context of Indian buyers online behaviour seems insignificant, and this seems counter-intutive given the role of discounts in the Indian market. Lastly, authors conclude that the role of media and social influencers in building a perception of trust seems of little consequence.Keywords: e-commerce, trust, e-retailers, propensity to trust
Procedia PDF Downloads 3551087 Consumer Trust in User-Generated Brand Recommendations on Social Networking Sites
Authors: Minimol M. C.
Abstract:
The study provides insights into the consumer’s trust on user generated brand recommendations on social networking sites and also investigates the role of ad scepticism in generating consumer trust in user generated brand recommendations. The work contributes to a better understanding of trust development in the context of social networking sites. Specifically, the study reveals that not all dimensions of trustworthiness are equal. The individual user characteristics vary according to the person. The major finding of this study is that high degrees of trust toward user generated brand recommendations can be generated on the basis of high trust toward social networking sites and ad scepticism. Consumers trust the user generated brand recommendations based on the individual’s trust in the particular social networking platform and the level of their individual ad-scepticism. The study pinpoints that as consumers’ trust in user generated brand recommendations is affected by their trust in social networking sites, it is influenced by benevolence, integrity, the propensity to trust, and individual user characteristics to a great extent, and hence, it is imperative for brands should attempt to build on these factors so that they can engage consumers to generate user generated content on social media.Keywords: Consumer trust, user-generated brand recommendations, ad scepticism, social networking sites
Procedia PDF Downloads 1001086 A Tool for Rational Assessment of Dynamic Trust in Networked Organizations
Authors: Simon Samwel Msanjila
Abstract:
Networked environments which provides platforms and environments for business organizations are configured in different forms depending on many factors including life time, member characteristics, communication structure, and business objectives, among others. With continuing advances in digital technologies the distance has become a less barrier for business minded collaboration among organizations. With the need and ease to make business collaborate nowadays organizations are sometimes forced to co-work with others that are either unknown or less known to them in terms of history and performance. A promising approach for sustaining established collaboration has been establishment of trust relationship among organizations based on assessed trustworthiness for each participating organization. It has been stated in research that trust in organization is dynamic and thus assessment of trust level must address such dynamic nature. This paper assess relevant aspects of trust and applies the concepts to propose a semi-automated system for assessing the Sustainability and Evolution of trust in organizations participating in specific objective in a networked organizations environment.Keywords: trust evolution, trust sustainability, networked organizations, dynamic trust
Procedia PDF Downloads 4301085 Unsupervised Sentiment Analysis for Indonesian Political Message on Twitter
Authors: Omar Abdillah, Mirna Adriani
Abstract:
In this work, we perform new approach for analyzing public sentiment towards the presidential candidate in the 2014 Indonesian election that expressed in Twitter. In this study we propose such procedure for analyzing sentiment over Indonesian political message by understanding the behavior of Indonesian society in sending message on Twitter. We took different approach from previous works by utilizing punctuation mark and Indonesian sentiment lexicon that completed with the new procedure in determining sentiment towards the candidates. Our experiment shows the performance that yields up to 83.31% of average precision. In brief, this work makes two contributions: first, this work is the preliminary study of sentiment analysis in the domain of political message that has not been addressed yet before. Second, we propose such method to conduct sentiment analysis by creating decision making procedure in which it is in line with the characteristic of Indonesian message on Twitter.Keywords: unsupervised sentiment analysis, political message, lexicon based, user behavior understanding
Procedia PDF Downloads 4791084 The Relation between the Organizational Trust Level and Organizational Justice Perceptions of Staff in Konya Municipality: A Theoretical and Empirical Study
Authors: Handan Ertaş
Abstract:
The aim of the study is to determine the relationship between organizational trust level and organizational justice of Municipality officials. Correlational method has been used via descriptive survey model and Organizational Justice Perception Scale, Organizational Trust Inventory and Interpersonal Trust Scale have been applied to 353 participants who work in Konya Metropolitan Municipality and central district municipalities in the study. Frequency as statistical method, Independent Samples t test for binary groups, One Way-ANOVA analyses for multi-groups and Pearson Correlation analysis have been used to determine the relation in the data analysis process. It has been determined in the outcomes of the study that participants have high level of organizational trust, “Interpersonal Trust” is in the first place and there is a significant difference in the favor of male officials in terms of Trust on the Organization Itself and Interpersonal Trust. It has also been understood that officials in district municipalities have higher perception level in all dimensions, there is a significant difference in Trust on the Organization sub-dimension and work status is an important factor on organizational trust perception. Moreover, the study has shown that organizational justice implementations are important in raising trust of official on the organization, administrator and colleagues, and there is a parallel relation between Organizational Trust components and Organizational Trust dimensions.Keywords: organizational trust level, organizational justice perceptions, staff, Konya
Procedia PDF Downloads 3461083 How Trust Functions in Fostering Innovation and Technology Development
Authors: Obidimma Ezezika
Abstract:
In light of the increasing importance of trust in development programs, the purpose of this study, was to identify how trust functions as an essential key determinant in successful innovation and technology development programs. Using projects in the agricultural sector as case studies, we determined how the concept of trust is understood. Our data collection relied on semi-structured, face-to-face interviews conducted as part of a larger study investigating the role of trust in development programs. Interview transcripts were analyzed to create a narrative on how trust is understood by the study’s participants and how trust functions in fostering innovation. We identified six themes and showed how trust plays an important factor in innovation. These themes included the practice of integrity and honesty; delivery of results in an accountable manner; capability and competency; sharing of the same objectives and interests; transparency about actions and intentions through clear communication; and the targeting of services toward the interests of the public. The results of this study can provide guidance on how to enhance implementation mechanisms and provide impetus for organizations to implement trust building activities in fostering effective innovation.Keywords: trust, research, innovation, technology
Procedia PDF Downloads 4811082 Trust Management for an Authentication System in Ubiquitous Computing
Authors: Malika Yaici, Anis Oussayah, Mohamed Ahmed Takerrabet
Abstract:
Security of context-aware ubiquitous systems is paramount, and authentication plays an important aspect in cloud computing and ubiquitous computing. Trust management has been identified as vital component for establishing and maintaining successful relational exchanges between trading partners in cloud and ubiquitous systems. Establishing trust is the way to build good relationship with both client and provider which positive activates will increase trust level, otherwise destroy trust immediately. We propose a new context-aware authentication system using a trust management system between client and server, and between servers, a trust which induces partnership, thus to a close cooperation between these servers. We defined the rules (algorithms), as well as the formulas to manage and calculate the trusting degrees depending on context, in order to uniquely authenticate a user, thus a single sign-on, and to provide him better services.Keywords: ubiquitous computing, authentication, context-awareness, trust management
Procedia PDF Downloads 2421081 In Online and Laboratory We Trust: Comparing Trust Game Behavior in Three Environments
Authors: Kaisa M. Herne, Hanna E. Björkstedt
Abstract:
Comparisons of online and laboratory environments are important for assessing whether the environment influences behavioral results. Trust game behavior was examined in three environments: 1) The standard laboratory setting with physically present participants (laboratory), 2) An online environment with an online meeting before playing the trust game (online plus a meeting); and 3) An online environment without a meeting (online without a meeting). In laboratory, participants were present in a classroom and played the trust game anonymously via computers. Online plus a meeting mimicked the laboratory in that participants could see each other in an online meeting before sessions started, whereas online without a meeting was a standard online experiment in which participants did not see each other at any stages of the experiment. Participants were recruited through pools of student subjects at two universities. The trust game was identical in all conditions; it was played with the same software, anonymously, and with stranger matching. There were no statistically significant differences between the treatment conditions regarding trust or trustworthiness. Results suggest that conducting trust game experiments online will yield similar results to experiments implemented in a laboratory.Keywords: laboratory vs. online experiment, trust behavior, trust game, trustworthiness behavior
Procedia PDF Downloads 771080 Knowledge Sharing within a Team: Exploring the Antecedents and Role of Trust
Authors: Li Yan Hei, Au Wing Tung
Abstract:
Knowledge sharing is a process in which individuals mutually exchange existing knowledge and co-create new knowledge. Previous research has confirmed that trust is positively associated with knowledge sharing. However, only few studies systematically examined the antecedents of trust and these antecedents’ impacts on knowledge sharing. In order to explore and understand the relationships between trust and knowledge sharing in depth, this study proposed a relationship maintenance-based model to examine the antecedents of trust in knowledge sharing in project teams. Three critical elements within a project team were measured, including the environment, project team partner and interaction. It was hypothesized that the trust would lead to knowledge sharing and in turn result in perceived good team performance. With a sample of 200 Hong Kong employees, the proposed model was evaluated with structural equation modeling. Expected findings are trust will contribute to knowledge sharing, resulting in better team performance. The results will also offer insights into antecedents of trust that play a heavy role in the focal relationship. The present study contributes to a more holistic understanding of relationship between trust and knowledge sharing by linking the antecedents and outcomes. The findings will raise the awareness of project managers on ways to promote knowledge sharing.Keywords: knowledge sharing, project management, team, trust
Procedia PDF Downloads 6161079 From the Lack of Trust Law to a Controversial Judicial Case Law: Implications for Perfecting Vietnam’s Legal System
Authors: Le Bich Thuy
Abstract:
A trust is an alien notion in Vietnamese law until 2021, which not only dissatisfies the practical demands of the nation’s civilians but also results in some detrimental shortcomings. The Judicial Case Law No 2 to be applied in adjudicating subsequent cases is a typical example of such negative consequences, implying a need for an application of trust law into Vietnam’s legal system. This paper first presents the similarity in nature between parties’ relationship in the mentioned case and a proprietary trust relationship, followed by an analysis of such a case from a trusted perspective. Subsequently, an introduction of potential obstacles hindering the introduction of trust law into the Vietnamese legal framework is presented. Finally, some implications are suggested for perfecting Vietnam’s legal system.Keywords: Vietnamese case law no 2, trust law, private property management, patrimony
Procedia PDF Downloads 2101078 Carrier Communication through Power Lines
Authors: Pavuluri Gopikrishna, B. Neelima
Abstract:
Power line carrier communication means audio power transmission via power line and reception of the amplified audio power at the receiver as in the form of speaker output signal using power line as the channel medium. The main objective of this suggested work is to transmit our message signal after frequency modulation by the help of FM modulator IC LM565 which gives output proportional to the input voltage of the input message signal. And this audio power is received from the power line by the help of isolation circuit and demodulated from IC LM565 which uses the concept of the PLL and produces FM demodulated signal to the listener. Message signal will be transmitted over the carrier signal that will be generated from the FM modulator IC LM565. Using this message signal will not damage because of no direct contact of message signal from the power line, but noise can disturb our information.Keywords: amplification, fm demodulator ic 565, fm modulator ic 565, phase locked loop, power isolation
Procedia PDF Downloads 5501077 Enhancing Cloud Computing with Security Trust Model
Authors: John Ayoade
Abstract:
Cloud computing is a model that enables the delivery of on-demand computing resources such as networks, servers, storage, applications and services over the internet. Cloud Computing is a relatively growing concept that presents a good number of benefits for its users; however, it also raises some security challenges which may slow down its use. In this paper, we identify some of those security issues that can serve as barriers to realizing the full benefits that cloud computing can bring. One of the key security problems is security trust. A security trust model is proposed that can enhance the confidence that users need to fully trust the use of public and mobile cloud computing and maximize the potential benefits that they offer.Keywords: cloud computing, trust, security, certificate authority, PKI
Procedia PDF Downloads 4831076 The Impact of Socialization Preferences on Perceptions of Generalized Social Trust in China
Authors: Menghzheng Yao
Abstract:
Generalized social trust among Chinese has been declining in the past few decades, making the search for its causes necessary. Drawing on the symbolic interaction theory and the 2012 Chinese General Social Survey data, this research investigated the impact of people’s socialization preferences and frequencies on their perceptions of generalized social trust in China. This research also took a preliminary step towards understanding the spatial differences of the generalized social trust using the ArcGIS software. The results show that respondents who interacted with their neighbors more frequently were more likely to have higher levels of perceptions of generalized social trust. Several demographics were also significantly related to perception of generalized social trust. Elderly and better educated Chinese and people with higher self-perceived social status were associated with greater levels of generalized social trust perception, while urban dwellers and religious respondents expressed lower levels of such perception. Implications for future research and policy are discussed.Keywords: China, generalized social trust, symbolic interaction, ArcGIS
Procedia PDF Downloads 3751075 Repairing Broken Trust: The Influence of Positive Induced Emotion and Gender
Authors: Zach Banzon, Marina Caculitan, Gianne Laisac, Stephanie Lopez, Marguerite Villegas
Abstract:
The role of incidental positive emotions and gender on people’s trust decisions have been established by existing research. The aim of this experiment is to address the gap in the literature by examining whether these factors will have a similar effect on trust behavior even after the experience of betrayal. A total of 144 undergraduate students participated in a trust game involving the anonymous interaction of a participant and a transgressor. Of these participants, only 125 (63 males and 62 females) were included in the data analyses. A story was used to prime incidental positive emotions or emotions originally unrelated to the trustee. Recovered trust was measured by relating the proportion of the money passed before and after betrayal. Data was analyzed using two-way analysis of variance having two levels for gender (male, female) and two for priming (with, without), with trust propensity scores entered as a covariate. It was predicted that trust recovery will be more apparent in females than in males but the data obtained was not significantly different between the genders. Induced positive emotions, however, had a statistically significant effect on trust behavior even after betrayal. No significant interaction effect was found between induced positive emotion and gender. The experiment provides evidence that the manipulation of situational variables, to a certain extent, can facilitate the reparation of trust.Keywords: gender effect, positive emotions, trust game, trust recovery
Procedia PDF Downloads 2701074 TMBCoI-SIOT: Trust Management System Based on the Community of Interest for the Social Internet of Things
Authors: Oumaima Ben Abderrahim, Mohamed Houcine Elhedhili, Leila Saidane
Abstract:
In this paper, we propose a trust management system based on clustering architecture for the social internet of things called TMBCO-SIOT. The proposed model integrates numerous factors such as direct and indirect trust; transaction factor; precaution factor; and social modeling of trust. The novelty of our approach can be summed up in two aspects. The first aspect concerns the architecture based on the community of interest (CoT) where each community is headed by an administrator (admin). However, the second aspect is the trust management system that tries to prevent On-Off attacks and mitigates dishonest recommendations using the k-means algorithm and guarantor things. The effectiveness of the proposed system is proved by simulation against malicious nodes.Keywords: IoT, trust management system, attacks, trust, dishonest recommendations, K-means algorithm
Procedia PDF Downloads 211