scholarly journals CUSTOMER’S TRUST MANAGEMENT IN POLISH E-COMMERCE – CASE STUDY

2018 ◽  
Vol 7 (4) ◽  
pp. 258-268
Author(s):  
Paulina Rutecka ◽  
Karina Cicha
Keyword(s):  

2008 ◽  
pp. 981-1005
Author(s):  
P. Giorgini ◽  
H. Mouratidis ◽  
N. Zannone

Although the concepts of security and trust play an important issue in the development of information systems, they have been mainly neglected by software engineering methodologies. In this chapter, we present an approach that considers security and trust throughout the software development process. Our approach integrates two prominent software engineering approaches, one that provides a security-oriented process and one that provides a trust management process. The result is the de-velopment of a methodology that considers security and trust issues as part of its development process. Such integration represents an advance over the current state of the art by providing the ?rst effort to consider security and trust issues under a single software engineering methodology. A case study from the health domain is employed to illustrate our approach.


2018 ◽  
Vol 2018 ◽  
pp. 1-15
Author(s):  
Nawal Ait Aali ◽  
Amine Baina ◽  
Loubna Echabbi

Due to the necessity of Critical Infrastructure (CI) Protection against different threats, several security policies must be applied among the organizations of CI. Based on our conducted study about the different constraints and requirements of the collaborative systems within CI, we reached a security solution: Tr-OrBAC. Its principle is to evaluate the trustworthiness of collaborating organizations based on relevant trust criteria aimed at enhancing collaboration decision-making. The taken decision presents the attribution of the access to the desired service based on calculated trust score which is the result of the combination of the trust criteria values. Generally, the desired services do not meet the same criticism, security requirements, sensitivity, etc. Also, the collaboration context varies from a set of collaborating organizations to another. In this sense, the importance of each trust criterion depends on the desired service and the collaboration context. In this paper, we focus on detailing the trust criteria used in our approach for collaborative system security. Then, we analyze the context variability with the trust evaluation process. In addition, we present a case study to demonstrate and illustrate the feasibility of our solution for CI protection, especially the electrical grid.


Author(s):  
P. Giorgini ◽  
H. Mouratidis ◽  
N. Zannone

Although the concepts of security and trust play an important issue in the development of information systems, they have been mainly neglected by software engineering methodologies. In this chapter, we present an approach that considers security and trust throughout the software development process. Our approach integrates two prominent software engineering approaches, one that provides a security-oriented process and one that provides a trust management process. The result is the de-velopment of a methodology that considers security and trust issues as part of its development process. Such integration represents an advance over the current state of the art by providing the ?rst effort to consider security and trust issues under a single software engineering methodology. A case study from the health domain is employed to illustrate our approach.


2014 ◽  
Vol 38 (01) ◽  
pp. 102-129
Author(s):  
ALBERTO MARTÍN ÁLVAREZ ◽  
EUDALD CORTINA ORERO

AbstractUsing interviews with former militants and previously unpublished documents, this article traces the genesis and internal dynamics of the Ejército Revolucionario del Pueblo (People's Revolutionary Army, ERP) in El Salvador during the early years of its existence (1970–6). This period was marked by the inability of the ERP to maintain internal coherence or any consensus on revolutionary strategy, which led to a series of splits and internal fights over control of the organisation. The evidence marshalled in this case study sheds new light on the origins of the armed Salvadorean Left and thus contributes to a wider understanding of the processes of formation and internal dynamics of armed left-wing groups that emerged from the 1960s onwards in Latin America.


2020 ◽  
Vol 43 ◽  
Author(s):  
Michael Lifshitz ◽  
T. M. Luhrmann

Abstract Culture shapes our basic sensory experience of the world. This is particularly striking in the study of religion and psychosis, where we and others have shown that cultural context determines both the structure and content of hallucination-like events. The cultural shaping of hallucinations may provide a rich case-study for linking cultural learning with emerging prediction-based models of perception.


2019 ◽  
Vol 42 ◽  
Author(s):  
Daniel J. Povinelli ◽  
Gabrielle C. Glorioso ◽  
Shannon L. Kuznar ◽  
Mateja Pavlic

Abstract Hoerl and McCormack demonstrate that although animals possess a sophisticated temporal updating system, there is no evidence that they also possess a temporal reasoning system. This important case study is directly related to the broader claim that although animals are manifestly capable of first-order (perceptually-based) relational reasoning, they lack the capacity for higher-order, role-based relational reasoning. We argue this distinction applies to all domains of cognition.


2019 ◽  
Vol 42 ◽  
Author(s):  
Penny Van Bergen ◽  
John Sutton

Abstract Sociocultural developmental psychology can drive new directions in gadgetry science. We use autobiographical memory, a compound capacity incorporating episodic memory, as a case study. Autobiographical memory emerges late in development, supported by interactions with parents. Intervention research highlights the causal influence of these interactions, whereas cross-cultural research demonstrates culturally determined diversity. Different patterns of inheritance are discussed.


Author(s):  
D. L. Callahan

Modern polishing, precision machining and microindentation techniques allow the processing and mechanical characterization of ceramics at nanometric scales and within entirely plastic deformation regimes. The mechanical response of most ceramics to such highly constrained contact is not predictable from macroscopic properties and the microstructural deformation patterns have proven difficult to characterize by the application of any individual technique. In this study, TEM techniques of contrast analysis and CBED are combined with stereographic analysis to construct a three-dimensional microstructure deformation map of the surface of a perfectly plastic microindentation on macroscopically brittle aluminum nitride.The bright field image in Figure 1 shows a lg Vickers microindentation contained within a single AlN grain far from any boundaries. High densities of dislocations are evident, particularly near facet edges but are not individually resolvable. The prominent bend contours also indicate the severity of plastic deformation. Figure 2 is a selected area diffraction pattern covering the entire indentation area.


Sign in / Sign up

Export Citation Format

Share Document