An Examination and Extension of the Zone-of-Tolerance Model

2004 ◽  
Vol 6 (3) ◽  
pp. 272-286 ◽  
Author(s):  
R. Kenneth Teas ◽  
Thomas E. DeCarlo
2012 ◽  
Vol 24 (2) ◽  
pp. 50-73 ◽  
Author(s):  
Narasimhaiah Gorla

Information system service quality has been a very important theme in both IS practice and research. User service expectations affect perceived service quality and user satisfaction. The objectives of this research are to i) to explore the relationship between perceived IS service quality and user satisfaction across the three regions of zone of tolerance (ZOT) and ii) to validate the associations between service expectations (adequate service and desired service) and service performance. The analysis of the data obtained from 193 IS users revealed a positive and significant association between perceived service quality and user satisfaction across the service zones and service dimensions with stronger associations in the acceptable service zone and weaker associations in the inadequate and superior service zones. Thus, the results demonstrate that the relationship between IS service quality and user satisfaction is affected by ZOT. It is found that the desired service expectation measure is more strongly related to service performance compared to the adequate service expectation measure. It is also observed that irrespective of the ZOT, the service dimension that contributes most to service performance is assurance. Tangibles have the widest ZOT and assurance has the narrowest ZOT compared to most other service dimensions. The author discusses the implications of the present study for both research and practice.


2008 ◽  
Vol 11 (1) ◽  
pp. 206-208
Author(s):  
David E. Stuart
Keyword(s):  

2019 ◽  
Vol 19 (10) ◽  
pp. 298c
Author(s):  
Lili Zhang ◽  
Rachel Albert ◽  
Joohwan Kim ◽  
David Luebke
Keyword(s):  

2021 ◽  
Vol 28 (2) ◽  
pp. 89-100

It is inevitable for networks to be invaded during operation. The intrusion tolerance technology comes into being to enable invaded networks to provide the necessary network services. This paper introduces an automatic learning mechanism of the intrusion tolerance system to update network security strategy, and derives an intrusion tolerance finite automaton model from an existing intrusion tolerance model. The proposed model was quantified by the Markov theory to compute the stable probability of each state. The calculated stable probabilities provide the theoretical guidance and basis for administrators to better safeguard network security. Verification results show that it is feasible, effective, and convenient to integrate the Markov model to the intrusion tolerance finite automaton.


2019 ◽  
Vol 3 (1) ◽  
pp. 160-170
Author(s):  
Yudhi Kawangung

The study of religious tolerance this century has been entering the culmination point of saturation, in which it is no longer viewed relevantly with technology 4.0 or it is generally called millennium generation. Technology development is directly proportional to social life because humans enter the digital era in which the actualization and self-existence are prioritized. Therefore, in social interaction, it often makes friction and horizontal conflict and even social media felt more concerned about. Tolerance is gradually degraded in its implementation because it is assumed that tolerance givers have a higher level (majority) than the recipient of tolerance (minority). In this case, the tolerance model needs contextual modification, namely religious moderation as a fundamental of more acceptable social interaction among citizens and netizens.


Author(s):  
Sejal Atit Bhavsar ◽  
Kirit J Modi

Fog computing is a paradigm that extends cloud computing services to the edge of the network. Fog computing provides data, storage, compute and application services to end users. The distinguishing characteristics of fog computing are its proximity to the end users. The application services are hosted on network edges like on routers, switches, etc. The goal of fog computing is to improve the efficiency and reduce the amount of data that needs to be transported to cloud for analysis, processing and storage. Due to heterogeneous characteristics of fog computing, there are some issues, i.e. security, fault tolerance, resource scheduling and allocation. To better understand fault tolerance, we highlighted the basic concepts of fault tolerance by understanding different fault tolerance techniques i.e. Reactive, Proactive and the hybrid. In addition to the fault tolerance, how to balance resource utilization and security in fog computing are also discussed here. Furthermore, to overcome platform level issues of fog computing, Hybrid fault tolerance model using resource management and security is presented by us.


Author(s):  
Reem Khalid Mahjoub ◽  
Khaled Elleithy

Wireless sensor and actor networks (WSAN) is an area where sensors and actors collaborate to sense, handle and perform tasks in real-time. Thus, reliability is an important factor. Due to the natural of WSAN, actor nodes are open to failure. Failure of actor nodes degrades the network performance and may lead to network disjoint. Thus, fault tolerance techniques should be applied to insure the efficiency of the network. In an earlier work, the authors proposed an efficient actor recovery paradigm (EAR) for WSAN which handles the critical actor node failure and recovery while maintaining QoS. EAR is supported with node monitoring and critical node detection (NMCND), network integration and message forwarding (NIMF), priority-based routing for node failure avoidance (PRNFA) and backup selection algorithms. In this article, the authors extend the work by adding a fault tolerance mathematical model. By evaluating the model, EAR shows to manage fault tolerance in deferent levels. To evaluate the effectiveness, the EAR fault tolerance is evaluated by simulation using OMNET++ Simulation. In addition, EAR reliability is measured and compared with RNF, DPCRA, ACR, and ACRA.


Sign in / Sign up

Export Citation Format

Share Document