scholarly journals Risky Business: Social Trust and Community in the Practice of Cybersecurity for Internet Infrastructure

Author(s):  
Ashwin Mathew ◽  
Coye Cheshire
1984 ◽  
Vol 29 (1) ◽  
pp. 14-15
Author(s):  
Joan Rosenbaum Asarnow
Keyword(s):  

2009 ◽  
Vol 39 (1) ◽  
pp. 9
Author(s):  
GREG FEERO
Keyword(s):  

2005 ◽  
Vol 12 (1) ◽  
pp. 1-21
Author(s):  
Randall Martin
Keyword(s):  

2011 ◽  
Vol 13 (2) ◽  
pp. 56-85 ◽  
Author(s):  
Nora S. Eggen

In the Qur'an we find different concepts of trust situated within different ethical discourses. A rather unambiguous ethico-religious discourse of the trust relationship between the believer and God can be seen embodied in conceptions of tawakkul. God is the absolute wakīl, the guardian, trustee or protector. Consequently He is the only holder of an all-encompassing trusteeship, and the normative claim upon the human being is to trust God unconditionally. There are however other, more polyvalent, conceptions of trust. The main discussion in this article evolves around the conceptions of trust as expressed in the polysemic notion of amāna, involving both trust relationships between God and man and inter-human trust relationships. This concept of trust involves both trusting and being trusted, although the strongest and most explicit normative claim put forward is on being trustworthy in terms of social ethics as well as in ethico-religious discourse. However, ‘trusting’ when it comes to fellow human beings is, as we shall see, framed in the Qur'an in less absolute terms, and conditioned by circumstantial factors; the Qur'anic antithesis to social trust is primarily betrayal, ‘khiyāna’, rather than mistrust.


10.1596/27490 ◽  
2010 ◽  
Author(s):  
◽  
Research and Services Foundation Hacettepe Training ◽  
Turkey The Ministry of Health ◽  
Keyword(s):  

Author(s):  
Priyanshu Srivastava ◽  
Rizwan Khan

Today is the era of Cloud Computing Technology in IT Industries. Cloud computing which is based on Internet has the most powerful architecture of computation. It reckons in of a compilation of integrated and networked hardware, software and internet infrastructure. It has various avails atop grid computing and other computing. In this paper, I have given a brief of evaluation of cloud computing by reviewing more than 30 articles on cloud computing. The outcome of this review signalizes the face of the IT industries before and after the cloud computing.


Author(s):  
K Sobha Rani

Collaborative filtering suffers from the problems of data sparsity and cold start, which dramatically degrade recommendation performance. To help resolve these issues, we propose TrustSVD, a trust-based matrix factorization technique. By analyzing the social trust data from four real-world data sets, we conclude that not only the explicit but also the implicit influence of both ratings and trust should be taken into consideration in a recommendation model. Hence, we build on top of a state-of-the-art recommendation algorithm SVD++ which inherently involves the explicit and implicit influence of rated items, by further incorporating both the explicit and implicit influence of trusted users on the prediction of items for an active user. To our knowledge, the work reported is the first to extend SVD++ with social trust information. Experimental results on the four data sets demonstrate that our approach TrustSVD achieves better accuracy than other ten counterparts, and can better handle the concerned issues.


Sign in / Sign up

Export Citation Format

Share Document