Abstract: Networked environments which provide platforms for
business organizations are configured in different forms depending
on many factors including life time, member characteristics,
communication structure, and business objectives, among others.
With continuing advances in digital technologies the distance has
become a less barrier for business minded collaboration among
organizations. With the need and ease to make business collaborate
nowadays organizations are sometimes forced to co-work with others
that are either unknown or less known to them in terms of history and
performance. A promising approach for sustaining established
collaboration has been establishment of trust relationship among
organizations based on assessed trustworthiness for each participating
organization. It has been stated in research that trust in organization is
dynamic and thus assessment of trust level must address such
dynamic nature. This paper assesses relevant aspects of trust and
applies the assessed concepts to propose a semi-automated system for
the management of Sustainability and Evolution of trust in
organizations participating in specific objective in a networked
organizations environment.
Abstract: Mobile Ad Hoc Networks (MANETs) is a collection
of mobile devices forming a communication network without
infrastructure. MANET is vulnerable to security threats due to
network’s limited security, dynamic topology, scalability and the lack
of central management. The Quality of Service (QoS) routing in such
networks is limited by network breakage caused by node mobility or
nodes energy depletions. The impact of node mobility on trust
establishment is considered and its use to propagate trust through a
network is investigated in this paper. This work proposes an
enhanced Associativity Based Routing (ABR) with Fuzzy based
Trust (Fuzzy- ABR) routing protocol for MANET to improve QoS
and to mitigate network attacks.
Abstract: Information generated from various computerization processes is a potential rich source of knowledge for its designated community. To pass this information from generation to generation without modifying the meaning is a challenging activity. To preserve and archive the data for future generations it’s very essential to prove the authenticity of the data. It can be achieved by extracting the metadata from the data which can prove the authenticity and create trust on the archived data. Subsequent challenge is the technology obsolescence. Metadata extraction and standardization can be effectively used to resolve and tackle this problem. Metadata can be categorized at two levels i.e. Technical and Domain level broadly. Technical metadata will provide the information that can be used to understand and interpret the data record, but only this level of metadata isn’t sufficient to create trustworthiness. We have developed a tool which will extract and standardize the technical as well as domain level metadata. This paper is about the different features of the tool and how we have developed this.
Abstract: Nowadays, cloud environments are becoming a need for companies, this new technology gives the opportunities to access to the data anywhere and anytime. It also provides an optimized and secured access to the resources and gives more security for the data which is stored in the platform. However, some companies do not trust Cloud providers, they think that providers can access and modify some confidential data such as bank accounts. Many works have been done in this context, they conclude that encryption methods realized by providers ensure the confidentiality, but, they forgot that Cloud providers can decrypt the confidential resources. The best solution here is to apply some operations on the data before sending them to the provider Cloud in the objective to make them unreadable. The principal idea is to allow user how it can protect his data with his own methods. In this paper, we are going to demonstrate our approach and prove that is more efficient in term of execution time than some existing methods. This work aims at enhancing the quality of service of providers and ensuring the trust of the customers.
Abstract: The Trustworthy link failure recovery algorithm is
introduced in this paper, to provide the forwarding continuity even
with compound link failures. The ephemeral failures are common in
IP networks and it also has some proposals based on local rerouting.
To ensure forwarding continuity, we are introducing the compound
link failure recovery algorithm, even with compound link failures.
For forwarding the information, each packet carries a blacklist, which
is a min set of failed links encountered along its path, and the next
hop is chosen by excluding the blacklisted links. Our proposed
method describes how it can be applied to ensure forwarding to all
reachable destinations in case of any two or more link or node
failures in the network. After simulating with NS2 contains lot of
samples proved that the proposed protocol achieves exceptional
concert even under elevated node mobility using Trustworthy link
Failure Recovery Algorithm.
Abstract: Structural Equation Modeling (SEM) was used to test
a hypothesized model explaining Malaysian hypermarket customers’
perceptions of brand trust (BT), customer perceived value (CPV) and
perceived service quality (PSQ) on building their brand loyalty
(CBL) and generating positive word-of-mouth communication
(WOM). Self-administered questionnaires were used to collect data
from 374 Malaysian hypermarket customers from Mydin, Tesco,
Aeon Big and Giant in Kuala Lumpur, a metropolitan city of
Malaysia. The data strongly supported the model exhibiting that BT,
CPV and PSQ are prerequisite factors in building customer brand
loyalty, while PSQ has the strongest effect on prediction of customer
brand loyalty compared to other factors. Besides, the present study
suggests the effect of the aforementioned factors via customer brand
loyalty strongly contributes to generate positive word of mouth
communication.
Abstract: Indonesian higher education has experienced
significant changes over the last decade. In 1999, the government
published an overall strategy for decentralisation and enhancement of
local autonomy in many sectors, including (higher) education.
Indonesian higher education reforms have forced universities to
restructure their internal university governance to become more
entrepreneurial. These new types of internal university governance
are likely to affect the institutions’ leadership and management. This
paper discusses the approach and findings of a study on the
managerial leadership styles of deans in Indonesian universities. The
study aims to get a better understanding of styles exhibited by deans
manifested in their behaviours. Using the theories of reasoned action
and planned behaviour, in combination with the competing values
framework, a large-scale survey was conducted to gather information
on the deans’ behaviours, attitudes, subjective norms, and perceived
behavioural control. Based on the responses of a sample of 218
deans, the study identifies a number of leadership styles: the Master,
the Competitive Consultant, the Consensual Goal-Setter, the Focused
Team Captain, and the Informed Trust-Builder style. The study
demonstrates that attitudes are the primary determinant of the styles
that were found. Perceived behavioural control is a factor that
explains some managerial leadership styles. By understanding the
attitudes of deans in Indonesian universities, and their leadership
styles, universities can strengthen their management and governance,
and thus improve their effectiveness.
Abstract: In its efforts to utilize the information and
communication technology to enhance the quality of public service
delivery, national and local governments around the world are
competing to introduce more ICT applications as tools to automate
processes related to law enforcement or policy execution, increase
citizen orientation, trust, and satisfaction, and create one-stop-shops
for public services. In its implementation, e-Government ICTs need
to maintain transparency, participation, and collaboration. Due to this
diverse of mixed goals and requirements, e-Government systems
need to be designed based on special design considerations in order
to eliminate the risks of failure to compliance to government
regulations, citizen dissatisfaction, or market repulsion.
In this article we suggest a framework with guidelines for
designing government information systems that takes into
consideration the special requirements of the public sector. Then we
introduce two case studies and show how applying those guidelines
would result in a more solid system design.
Abstract: In reference to the legal state in the Thai legal system,
most people understand the minor principles of the legal state form,
which are the principles that can be explained and understood easily
and the results can be seen clearly, especially in the legitimacy of
administrative acts. Therefore, there is no awareness of justice, which
is the fundamental value of Thai law. The legitimacy of administrative
acts requires the administration to adhere to the constitution and
legislative laws in enforcement of the laws. If it appears that the
administrative acts are illegitimate, the administrative court, as the
court of justice, will revoke those acts as if they had never been set in
the legal system, this will affect people’s trust as they are unaware as
to whether the administrative acts that appoint their lives are
legitimate or not. Regarding the revocation of administrative orders
by the administrative court as if those orders had never existed, the
common individual surely cannot be expected to comprehend the
security of their juristic position. Therefore, the legal state does not
require a revocation of the government’s acts to terminate its legal
results merely because those acts are illegitimate, but there should be
considerations and realizations regarding the “The Principle of the
Protection of Legitimate Expectation,” which is a minor principle in
the legal state’s content that focuses on supporting and protecting
legitimate expectations of the juristic position of an individual and
maintaining justice, which is the fundamental value of Thai law.
Abstract: The development of the United Arab Emirates (UAE)
into a regional trade, tourism, finance and logistics hub has
transformed its real estate markets. However, speculative activity and
price volatility remain concerns. UAE residential market values
(MV) are exposed to fluctuations in capital flows and migration
which, in turn, are affected by geopolitical uncertainty, oil price
volatility and global investment market sentiment. Internally, a
complex interplay between administrative boundaries, land tenure,
building quality and evolving location characteristics fragments UAE
residential property markets. In short, the UAE Residential Valuation
System (UAE-RVS) confronts multiple challenges to collect, filter
and analyze relevant information in complex and dynamic spatial and
capital markets. A robust (RVS) can mitigate the risk of unhelpful
volatility, speculative excess or investment mistakes. The research
outlines the institutional, ontological, dynamic and epistemological
issues at play. We highlight the importance of system capabilities,
valuation standard salience and stakeholders trust.
Abstract: In this study, attempt has been made to investigate the
relationship specifically the causal relation between fund unit prices
of Islamic equity unit trust fund which measure by fund NAV and the
selected macro-economic variables of Malaysian economy by using
VECM causality test and Granger causality test. Monthly data has
been used from Jan, 2006 to Dec, 2012 for all the variables. The
findings of the study showed that industrial production index,
political election and financial crisis are the only variables having
unidirectional causal relationship with fund unit price. However the
global oil price is having bidirectional causality with fund NAV.
Thus, it is concluded that the equity unit trust fund industry in
Malaysia is an inefficient market with respect to the industrial
production index, global oil prices, political election and financial
crisis. However the market is approaching towards informational
efficiency at least with respect to four macroeconomic variables,
treasury bill rate, money supply, foreign exchange rate, and
corruption index.
Abstract: Science and technology has a major impact on many
societal domains such as communication, medicine, food,
transportation, etc. However, this dominance of modern technology
can have a negative unintended impact on indigenous systems, and in
particular on indigenous foods. This problem serves as a motivation
to this study whose aim is to examine the perceptions of learners on
the usefulness of Information and Communication Technologies
(ICTs) for learning about indigenous foods. This aim will be
subdivided into two types of research objectives. The design and
identification of theories and models will be achieved using literature
content analysis. The objective on the empirical testing of such
theories and models will be achieved through the survey of
Hospitality studies learners from different schools in the iLembe and
Umgungundlovu Districts of the South African Kwazulu-Natal
province. SPSS is used to quantitatively analyze the data collected by
the questionnaire of this survey using descriptive statistics and
Pearson correlations after the assessment of the validity and the
reliability of the data. The main hypothesis behind this study is that
there is a connection between the demographics of learners, their
perceptions on the usefulness of ICTs for learning about indigenous
foods, and the following personality and eLearning related theories
constructs: Computer self-efficacy, Trust in ICT systems, and
Conscientiousness; as suggested by existing studies on learning
theories. This hypothesis was fully confirmed by the survey
conducted by this study except for the demographic factors where
gender and age were not found to be determinant factors of learners’
perceptions on the usefulness of ICTs for learning about indigenous
foods.
Abstract: E-service quality plays a significant role to achieve
success or failure in any organization, offering services online. It will
increase the competition among the organizations, to attract the
customers on the basis of the quality of service provided by the
organization. Better e-service quality will enhance the relationship
with customers and their satisfaction. So the measurement of eservice
quality is very important but it is a complex process due to
the complex nature of services. Literature predicts that there is a lack
of universal definition of e-service quality. The e-service quality
measures in banking have great importance in achieving high
customer base. This paper proposes a conceptual model for
measuring e-service quality in Indian Banking Industry. Nine
dimensions reliability, ease of use, personalization, security and trust,
website aesthetic, responsiveness, contact and fulfillment had been
identified. The results of this paper may help to develop a proper
scale to measure the e-service quality in Indian Banking Industry,
which may assist to maintain and improve the performance and
effectiveness of e-service quality to retain customers.
Abstract: Apps are today the most important possibility to adapt
mobile phones and computers to fulfill the special needs of their
users. Location- and context-sensitive programs are hereby the key to
support the interaction of the user with his/her environment and also
to avoid an overload with a plenty of dispensable information. The
contribution shows, how a trusted, secure and really bi-directional
communication and interaction among users and their environment
can be established and used, e.g. in the field of home automation.
Abstract: This study discovers a novel framework of individual
level technology adoption known as I-P (Individual- Privacy) towards
health information application in Smart National Identity Card. Many
countries introduced smart national identity card (SNIC) with various
applications such as health information application embedded inside
it. However, the degree to which citizens accept and use some of the
embedded applications in smart national identity remains unknown to
many governments and application providers as well. Moreover, the
factors of trust, perceived risk, Privacy concern and perceived
credibility need to be incorporated into more comprehensive models
such as extended Unified Theory of Acceptance and Use of
Technology known as UTAUT2. UTAUT2 is a mainly widespread
and leading theory up to now. This research identifies factors
affecting the citizens’ behavioural intention to use health information
application embedded in SNIC and extends better understanding on
the relevant factors that the government and the application providers
would need to consider in predicting citizens’ new technology
acceptance in the future. We propose a conceptual framework by
combining the UTAUT2 and Privacy Calculus Model constructs and
also adding perceived credibility as a new variable. The proposed
framework may provide assistance to any government planning,
decision, and policy makers involving e-government projects.
Empirical study may be conducted in the future to provide proof and
empirically validate this I-P framework.
Abstract: Communication and effective information exchange
within technology has become a crucial part of delivering knowledge
to students during the learning process. It enables better
understanding, builds trust and respect, and increases the sharing of
knowledge between students. This paper examines the
communication between undergraduate students and their lecturers
during the traditional lecture and when using the Interactive
Electronic Lecture System (IELS). The IELS is an application that
offers a set of components which support the effective
communication between students and their peers and between
students and their lecturers. Moreover, this paper highlights
communication skills such as sender, receiver, channel and feedback.
It will show how the IELS creates a rich communication environment
between its users and how they communicate effectively. To examine
and assess the effectiveness of communication, an experiment was
conducted on groups of users; students and lecturers. The first group
communicated in the traditional lecture while the second group
communicated by means of the IELS application. The results show
that there was more effective communication between the second
group than the first.
Abstract: Color Histogram is considered as the oldest method
used by CBIR systems for indexing images. In turn, the global
histograms do not include the spatial information; this is why the
other techniques coming later have attempted to encounter this
limitation by involving the segmentation task as a preprocessing step.
The weak segmentation is employed by the local histograms while
other methods as CCV (Color Coherent Vector) are based on strong
segmentation. The indexation based on local histograms consists of
splitting the image into N overlapping blocks or sub-regions, and
then the histogram of each block is computed. The dissimilarity
between two images is reduced, as consequence, to compute the
distance between the N local histograms of the both images resulting
then in N*N values; generally, the lowest value is taken into account
to rank images, that means that the lowest value is that which helps to
designate which sub-region utilized to index images of the collection
being asked. In this paper, we make under light the local histogram
indexation method in the hope to compare the results obtained against
those given by the global histogram. We address also another
noteworthy issue when Relying on local histograms namely which
value, among N*N values, to trust on when comparing images, in
other words, which sub-region among the N*N sub-regions on which
we base to index images. Based on the results achieved here, it seems
that relying on the local histograms, which needs to pose an extra
overhead on the system by involving another preprocessing step
naming segmentation, does not necessary mean that it produces better
results. In addition to that, we have proposed here some ideas to
select the local histogram on which we rely on to encode the image
rather than relying on the local histogram having lowest distance with
the query histograms.
Abstract: From an organizational perspective, leaders are a
variation of the same talent pool in that they all score a larger than
average value on the bell curve that maps leadership behaviors and
characteristics, namely competence, vision, communication,
confidence, cultural sensibility, stewardship, empowerment,
authenticity, reinforcement, and creativity. The question that remains
unanswered and essentially unresolved is how to explain the irony
that leaders are so much alike yet their organizations diverge so
noticeably in their ability to innovate. Leadership intersects with
innovation at the point where human interactions get exceedingly
complex and where certain paradoxical forces cohabit: conflict with
conciliation, sovereignty with interdependence, and imagination with
realism. Rather than accepting that leadership is without context, we
argue that leaders are specialists of their domain and that those
effective at leading for innovation are distinct within the broader pool
of leaders. Keeping in view the extensive literature on leadership and
innovation, we carried out a quantitative study with data collected
over a five-year period involving 240 participants from across five
dissimilar companies based in the United States. We found that while
innovation and leadership are, in general, strongly interrelated (r =
.89, p = 0.0), there are five qualities that set leaders apart on
innovation. These qualities include a large radius of trust, a restless
curiosity with a low need for acceptance, an honest sense of self and
other, a sense for knowledge and creativity as the yin and yang of
innovation, and an ability to use multiple senses in the engagement
with followers. When these particular behaviors and characteristics
are present in leaders, organizations out-innovate their rivals by a
margin of 29.3 per cent to gain an unassailable edge in a business
environment that is regularly disruptive. A strategic outcome of this
study is a psychometric scale named iLeadership, proposed with the
underlying evidence, limitations, and potential for leadership and
innovation in organizations.c
Abstract: Negotiation is a specific form of interaction based on communication in which the parties enter into deliberately, each with clear but different interests or goals and a mutual dependency towards a decision due to be taken at the end of the confrontation. Consequently, negotiation is a complex activity involving many different disciplines from the strategic aspects and the decision making process to the evaluation of alternatives or outcomes and the exchange of information. While gender differences can be considered as one of the most researched topic within negotiation studies, empirical works and theory present many conflicting evidences and results about the role of gender in the process or the outcome. Furthermore, little interest has been shown over gender differences in the definition of what is negotiation, its essence or fundamental elements. Or, as differences exist in practices, it might be essential to study if the starting point of these discrepancies does not come from different considerations about what is negotiation and what will encourage the participants in their strategic decisions. Some recent and promising experiments made with diverse groups show that male and female participants in a common and shared situation barely consider the same way the concepts of power, trust or stakes which are largely considered as the usual driving forces of any negotiation. Furthermore, results from Human Resource self-assessment tests display and confirm considerable differences between individuals regarding essential behavioral dimensions like capacity to improvise and to achieve, aptitude to conciliate or to compete and orientation towards power and group domination which are also part of negotiation skills. Our intention in this paper is to confront these dimensions with negotiation’s usual driving forces in order to build up new paths for further research.
Abstract: Interorganizational knowledge sharing is the major driving force to maximize the operational benefits across supply chain. Trust is considered as the key to facilitate knowledge sharing. This research proposes shared values and relational embeddedness as antecedents of interorganizational trust. Survey based on managers in major industrial parks in Taiwan confirm that trust is enforced when organizations develop shared values and formed social relational embeddedness. Trust leads to interorganizational knowledge sharing. This research has theoretical and practical implications.