A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Building Reputations for Internet Clients
2007
Electronical Notes in Theoretical Computer Science
We propose a design of a client reputation system that can be used to reduce unwanted traffic in the Internet. ...
We survey the challenges of building client reputations, discuss two different approaches to information collectiona reporter and a monitor model -and propose their combination that successfully handles ...
input for client reputation building. ...
doi:10.1016/j.entcs.2006.11.033
fatcat:4rgxjweebbfilhltsbjsp3ok7e
Building accountability into the future Internet
2008
2008 4th Workshop on Secure Network Protocols
Reputations provide information about previously unseen clients to servers that can use it to decide whether a client should be granted a ticket. ...
The top layer contains a reputation system that collects server reports about malicious client behaviors. ...
This enables us to build client reputations and use them as input to capabilitygranting decisions.
B. ...
doi:10.1109/npsec.2008.4664880
fatcat:uhix2ukygrf7tihvcbld5nz6lm
Dynamical Trust and Reputation Computation Model for B2C E-Commerce
2015
Future Internet
., Liu, K. and Chen, Y. (2015) Dynamical trust and reputation computation model for B2C ECommerce. Future Internet, 7 (4). pp. 405428. ...
In this paper, a dynamical computation model of reputation for B2C e-commerce is proposed. ...
Bo Tian carried out the literature review and proposed the trust and reputation computation system. Kecheng Liu and Yuanzhong Chen contributed to the simulation and modification of the manuscript. ...
doi:10.3390/fi7040405
fatcat:2sexrs2b2bbhjlw7m57ep5koza
Image Development in the Internet - Opportunities and Threats
2012
Transactions of the Institute of Aviation
Online reputation management is here to stay and there is hardly any need to convince anyone of the necessity to use internet tools for image building. ...
Another tool available for image building in the net is Google. Apart from being used as a search engine it also provides a system for building coherent image and relationships in the Internet. ...
doi:10.5604/05096669.1077486
fatcat:mdpeusxzrbat3oqjty4ygswogu
Antecedents of trust in online environment: A case of Pakistan
2016
Management Science Letters
This study aims to investigate the antecedents of trust including Company Reputation, Website Design, Service Quality, and Security and Privacy Policy in an online environment within the Pakistani context ...
Literature review For retaining customers, it is necessary to build the trust of the customers. ...
Parties go through for business by means of internet trading rather than a face-to-face transaction (Guo, 2011) . ...
doi:10.5267/j.msl.2016.1.008
fatcat:n2pph4r5r5herkeixeit7oayam
Internet marketing and e-commerce – interaction
2021
SHS Web of Conferences
Internet advertising brings benefits for advertisers because it needs a lower budget and is flexible when directed to a specific target group. ...
The conclusion generalizes on the use of social media, e-mail marketing, VibeMarket, online display ads as the main channels for internet advertising - a means through which the consumer may widen their ...
This employs strategies for managing reputation, that engage clients to answer questions. ...
doi:10.1051/shsconf/202112002024
fatcat:jbie7cvao5a3bht2qag5sun7su
Factors Influencing Customer Trust in Mobile Banking: Case of Latvia
2017
Economics and Culture
However, after summarizing all the subfactors, it became clear that the most powerful in the trust-building process is convenience/practicality of using a mobile application. ...
In order to encourage customers to use m-banking services, it is extremely important to get clients to trust the M-banking services provided by the bank. ...
In fact, the reputation of a commercial bank is one of the most important criteria for choosing a bank. ...
doi:10.1515/jec-2017-0019
fatcat:kffh54d2xvfrjahmr3fsrup3dq
The influence of digital media on the success of a health care unit
2018
Journal of Medicine and Life
The first factor from which the building of a reputation starts is the relationship between the company and the client, namely the medical unit and the patient. ...
In fact, more and more patients are looking for a doctor and choosing him "on the internet". The Internet has opened the way for new opportunities in healthcare marketing. ...
The first factor from which the building of a reputation starts is the relationship between the company and the client, namely the medical unit and the patient. ...
doi:10.25122/jml-2018-0064
pmid:30364609
pmcid:PMC6197523
fatcat:xt2thn5kongpnlh26tz3itar5y
A Public Keys Based Architecture for P2P Identification, Content Authenticity and Reputation
2009
2009 International Conference on Advanced Information Networking and Applications Workshops
Security proposals currently found in technical literature try to adapt techniques from client-server architecture to P2P environments, which it is not the most appropriate approach. ...
In 1 the classic use of P2P, e.g. file sharing, there is no concern about persistent peer identification, peer and content reputation and content authenticity. ...
However, to facilitate the reputation building, a client peer may associate a good degree of credibility for a public key without having a history for positive reputation of it. ...
doi:10.1109/waina.2009.139
dblp:conf/aina/BrisolaSLRV09
fatcat:zx25cxdwxrcd3jzgmn36yrcjme
Reputation and endorsement for web services
2001
ACM SIGecom Exchanges
We propose an approach wherein software agents assist in this task by disseminating reputations and endorsements through a specialized agency, which augments the capabilities of current standards. ...
The web services set of standards promise the dynamic creation of loosely coupled systems, such as those that are required for e-commerce applications. ...
Typical architecture for a service client. Internet
WS
Impl. ...
doi:10.1145/844331.844335
fatcat:sqtlujfbp5arxkoxmov2tkn76q
Page 531 of AIDS Care Vol. 14, Issue 4
[page]
2002
AIDS Care
terminals available to clients. ...
Day 1: Information and motivation for Internet use. ...
Reputation management in the age of the world-wide web
2010
Trends in Cognitive Sciences
For comments on earlier versions of this manuscript we thank Amrisha Vaish, Anke Bullinger, Kevin Langergraber, Emily Wyman and Guido Olschewski. ...
Acknowledgements We are grateful to the participants in the Reputation Management Workshop held at the University of Aarhus in December 2009, supported by the AHRC CNCC scheme AH/E511112/1 and the Danish ...
With increasing social interactions on the internet, there is a pressing need to build workable systems for evaluating trust and discovering fraud as rapidly as possible. ...
doi:10.1016/j.tics.2010.07.003
pmid:20685154
fatcat:nb7xazefo5gz7atcevi627hvji
Agent based infrastructure for real-time applications
2011
Annales UMCS Informatica
To ensure greater security and high reliability of the system, we have provided a reputation mechanism. ...
In VoD services agents also analyze popularity of streamed media, which helps build intelligent video cache. ...
Those reputation indices are used for supporting mechanisms for building routing tables. ...
doi:10.2478/v10065-011-0035-2
fatcat:57ttqvskzjhepdqwg6fqj6osxu
Human Resources Management Effectiveness for Client Satisfactions and Bank Reputations (Case of State-owned Banks in Indonesia)
2018
KnE Social Sciences
reputation of the banks. ...
The study revealed that bank reputation significantly correlated to service quality, employee credibility, and client satisfactions, but less related to corporate communications. ...
HR managers could focus on initiatives that build employee competencies that add value to important organizational outcome, including corporate reputation. ...
doi:10.18502/kss.v3i10.3390
fatcat:44h6hwyfnfetvo75sbbus3ynti
Detecting Malware Based on DNS Graph Mining
2015
International Journal of Distributed Sensor Networks
Malware remains a major threat to nowadays Internet. In this paper, we propose a DNS graph mining-based malware detection approach. ...
A DNS graph is composed of DNS nodes, which represent server IPs, client IPs, and queried domain names in the process of DNS resolution. ...
By analyzing DNS traffic between clients and recursive DNS servers, we build a DNS query response graph QR = ( , ) as follows. ...
doi:10.1155/2015/102687
fatcat:whbj2sdb5refznvfcvu5skvj5y
« Previous
Showing results 1 — 15 out of 34,663 results