The Research on Trust Mechanism Between Client and Contractor in Construction

Author(s):  
Yao Wang ◽  
Yi-lin Yin
Keyword(s):  
2011 ◽  
Vol 308-310 ◽  
pp. 1740-1745 ◽  
Author(s):  
Xiao Lan Xie ◽  
Liang Liu ◽  
Ying Zhong Cao

Aiming at the existing trust issues under manufacturing environment. This paper proposes a trust model based on feedback evaluation, TMBFCM, from the characteristics of human of trust relationship of human society. The model proposed a set of evaluation indicators of cloud manufacturing services properties, introduced the dynamic trust mechanism for attenuation by time,established the service which cloud manufacturing services providers provided and the feedback evaluation and incentive mechanism given by the user of cloud manufacturing service, improved the dynamic adaptability of the model. The results show that, compared with the existing trust model, the evaluation results are closer to the true service behavior of cloud manufacturing services provider, it can resist all kinds of malicious attacks acts effectively, demonstrated good robustness and recognition.


2014 ◽  
Vol 2014 ◽  
pp. 1-10 ◽  
Author(s):  
Yan Gao ◽  
Wenfen Liu

With the rapid development and application of medical sensor networks, the security has become a big challenge to be resolved. Trust mechanism as a method of “soft security” has been proposed to guarantee the network security. Trust models to compute the trustworthiness of single node and each path are constructed, respectively, in this paper. For the trust relationship between nodes, trust value in every interval is quantified based on Bayesian inference. A node estimates the parameters of prior distribution by using the collected recommendation information and obtains the posterior distribution combined with direct interactions. Further, the weights of trust values are allocated through using the ordered weighted vector twice and overall trust degree is represented. With the associated properties of Tsallis entropy, the definition of path Tsallis entropy is put forward, which can comprehensively measure the uncertainty of each path. Then a method to calculate the credibility of each path is derived. The simulation results show that the proposed models can correctly reflect the dynamic of node behavior, quickly identify the malicious attacks, and effectively avoid such path containing low-trust nodes so as to enhance the robustness.


2021 ◽  
Vol 23 (2) ◽  
pp. 154-170
Author(s):  
One-Ki Daniel Lee ◽  
Ramakrishna Ayyagari ◽  
Farzaneh Nasirian ◽  
Mohsen Ahmadian

PurposeThe rapid growth of artificial intelligence (AI)-based voice-assistant systems (VASs) has created many opportunities for individuals to use VASs for various purposes in their daily lives. However, traditional quality success factors, such as information quality and system quality, may not be sufficient in explaining the adoption and use of AI-based VASs. This study aims to propose interaction quality as an additional, yet more important quality measure that leads to trust in an AI-based VAS and its adoption. Design/methodology/approachThe authors propose a research model that highlights the importance of interaction quality and trust as underlying mechanisms in the adoption of AI-based VASs. Based on survey methodology and data from 221 respondents, the proposed research model is tested with a partial least squares approach. FindingsThe results suggest that interaction quality and trust are critical factors influencing the adoption of AI-based VASs. The findings also indicate that the impacts of traditional quality factors (i.e. information quality and system quality) occur through interaction quality in the context of AI-based VASs. Originality/valueThis research adds interaction quality as a new quality factor to the traditional quality factors in the information systems success model. Further, given the interactive nature of VASs, the authors use social response theory to explain the importance of the trust mechanism when individuals interact with AI-based VASs. Contribution to Impact


2022 ◽  
Vol 14 (1) ◽  
pp. 28
Author(s):  
Yelena Trofimova ◽  
Pavel Tvrdík

In wireless ad hoc networks, security and communication challenges are frequently addressed by deploying a trust mechanism. A number of approaches for evaluating trust of ad hoc network nodes have been proposed, including the one that uses neural networks. We proposed to use packet delivery ratios as input to the neural network. In this article, we present a new method, called TARA (Trust-Aware Reactive Ad Hoc routing), to incorporate node trusts into reactive ad hoc routing protocols. The novelty of the TARA method is that it does not require changes to the routing protocol itself. Instead, it influences the routing choice from outside by delaying the route request messages of untrusted nodes. The performance of the method was evaluated on the use case of sensor nodes sending data to a sink node. The experiments showed that the method improves the packet delivery ratio in the network by about 70%. Performance analysis of the TARA method provided recommendations for its application in a particular ad hoc network.


Author(s):  
Zou Huixia ◽  
Jiang Lingwei

According to this article, core venture capital enterprise, government, technologist, other related enterprise, agent organization and financing institution etc. compose a venture capital network. The market demand is uncertain; the human resource is proprietary; the task is complicated; the freguent trading the frequency is multifarious in venture capital network. Interactive mechanism, trust mechanism, moderated & integration mechanism, incentive mechanism and maintenance mechanism constitute a governance mechanism of venture capital network. Among them, the trust mechanism is the foundation, interactive mechanism, moderated & integration mechanism are a core, incentive mechanism is the lubricant, maintenance mechanism is the guarantee.


2011 ◽  
Vol 403-408 ◽  
pp. 3166-3169
Author(s):  
Jie Lu ◽  
Jun Wang ◽  
Yan Xu

Family enterprise needs to absorb and integrate new management resource continuously and has unique trust mechanism; In the process of retaining professional managers, there exists the absence of trust entertainment, mechanism, and ideal and so on. It is effective to adopt pan-family regulation to integrate management resource, expand the trust space of family enterprises and retain multiple competitive systems to restrain professional executives. Consequently,effective integration of professional managers,trust and family enterprises will come true.


2017 ◽  
Vol 11 (1) ◽  
pp. 163-179 ◽  
Author(s):  
Jenn Tang

Purpose In the context of an economic downturn and three transitions of political power, Taiwan’s Kuomintang (KMT) kick-started the cross-strait mutual trust mechanism, encouraging university graduates to find employment in mainland China’s job market (in both mainland China and Hong Kong). Academia and industry are both paying great attention to this issue. There is still a paucity of discussions about cognitive style with regard to working in mainland China (Macau) Design/methodology/approach This study is based on the Q methodology using a sample of Taiwanese university graduates to explore how behavioral factors relate to cognitive style. Findings This paper defines four cognitive styles based on differences in focus and motivation: lifestyles of health and sustainability (LOHAS), word-of-mouth (WOM), learning/practice match and local market disappointment. Originality/value An association is drawn between cognition theory and psychology’s classification of cognitive style. In the context of the four cognitive styles, this paper explores the practical implications of employment and provides recommendations for those intending to work abroad.


Sign in / Sign up

Export Citation Format

Share Document