10,826 Hits in 8.0 sec

Peer Influences on Honesty in Managerial Reporting and Moral Reasoning

Hong Qu, Steven J. Huddart
2012 Social Science Research Network  
Because the reaction to lesshonest peers is stronger and more pervasive, social influences erode honesty, on average.  ...  In a budget reporting experiment, subjects become less honest after seeing a less honest peer and more honest after seeing a more honest peer, on average.  ...  Our second set of hypotheses concerns the effect of peer information on the within-period change in honesty.  ... 
doi:10.2139/ssrn.2133072 fatcat:oz4e2fpxvzgcho5afnq7zg27aq

How does Peer Honesty Affect Focal Manager Honesty in a Budget Reporting Setting? [chapter]

Michael Paz, Bernhard E. Reichert, Alex Woods
2013 Advances in Behavioural Accounting Research  
Retrieved [insert date], from Cornell University, SHA School site: Abstract We examine the effect of peer honesty on focal manager honesty in a budget reporting setting.  ...  We disclose peer honesty to the focal manager at three levels: no, partial, and full disclosure of the reporting behavior of the other managers in the focal managers' cohort.  ...  Acknowledgments We would like to thank Timothy Brown, Doug Stevens, and workshop participants at the 2012 Accounting, Behavior and Organizations Section and the 2013 Management Accounting Section mid-year  ... 
doi:10.1108/s1475-1488(2013)0000016009 fatcat:wsgupziq75hvpb2y4ay6t7bpyu

Towards Trustworthy Peer-To-Peer Environments: An Appraisal Analysis Approach

Farag Azzedin, Salman Khwaja
2010 Journal of Next Generation Information Technology  
In this paper, we focus on the problem of free riding in decentralized collaborative environments. We propose a novel free riders filtering algorithm based on trustworthiness.  ...  The recent and rapid development of P2P systems is paving the way for a distinguished manner of computing where autonomy and decentralization are the foundation of success.  ...  Figure 2 :Figure 3 : 23 Effect of Changing the Activity Constant Value on the Performance Effect of Changing the Activity Constant Value on the Figure 4 : 4 Effect of Changing the Activity Constant Value  ... 
doi:10.4156/jnit.vol1.issue1.6 fatcat:l3wfs4hzhnfwzmh6z7lunyssai

An Efficient Trust Mechanism in P2P Network

Zhenquan Qin, Lei Wang, Mingchu Li, Weifeng Sun
2010 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing  
With the proliferation of P2P application, it is critical to consider how these systems can be run in a trust environment.  ...  Simulation results show that Tw-Trust has the advantages in countering strategic altering behavior and dishonest feedbacks of malicious peers.  ...  Fig.1 shows the trust assessment and peer deal process in a P2P system. A peer first checks its deal peer whether in the black list built by previous deals.  ... 
doi:10.1109/iihmsp.2010.185 dblp:conf/iih-msp/QinWLS10 fatcat:k6e4uxiflrcwpibti5xmrgpz4q

Detecting Malicious Peers in Overlay Multicast Streaming

Samarth Shetty, Patricio Galdames, Wallapak Tavanapong, Ying Cai
2006 Local Computer Networks (LCN), Proceedings of the IEEE Conference on  
These schemes compute a level of trust for each peer in the network. Peers with a trust value below a threshold are considered to be malicious.  ...  They may intentionally wish to disrupt the multicast service or cause confusions to other peers. We propose two new schemes to detect malicious peers in overlay multicast streaming.  ...  For these peers, the Honesty factor controls the time at which the peers start cheating the system. In our simulations, the Honesty factor was set to be either 25%, 50%, or 75%.  ... 
doi:10.1109/lcn.2006.322145 dblp:conf/lcn/ShettyGTC06 fatcat:sxrd2pc3mneajmewufz4uthgnm

An Incentive Compatible Reputation Model for P2P Networks

Jianli Hu, Bin Zhou
2011 International Journal of Wireless and Microwave Technologies  
An important challenge regarding peer's trust assessment in peer-to-peer (P2P) networks is how to cope with such issues as the fraudulent behaviors and the dishonest feedback behaviors from malicious peers  ...  In ICRM, the metric of time zone is used to describe the time property of the transaction experience and the recommendation.  ...  Acknowledgment The authors acknowledge the useful comments from the anonymous reviewers.  ... 
doi:10.5815/ijwmt.2011.02.09 fatcat:jxvrmkffp5clfgqf4a2faoy2ca

Trust-Based Intrusion Detection in Wireless Sensor Networks

Fenye Bao, Ing-Ray Chen, MoonJeong Chang, Jin-Hee Cho
2011 2011 IEEE International Conference on Communications (ICC)  
By statistically analyzing peer-to-peer trust evaluation results collected from sensor nodes, each cluster head applies trust-based intrusion detection to assess the trustworthiness and maliciousness of  ...  We analyze the sensitivity of false alarms with respect to the minimum trust threshold below which a node is considered malicious.  ...  Instead of having a fixed weight ratio to 1 for the special case in which 1, we allow the weight ratio to be adjusted by changing the value of and test its effect on protocol resiliency against malicious  ... 
doi:10.1109/icc.2011.5963250 dblp:conf/icc/BaoCCC11 fatcat:xvd7fig7nrgsjm3skiwcoflzga

The State of the Art in Trust and Reputation Systems: A Framework for Comparison

Zeinab Noorian, Mihaela Ulieru
2010 Journal of Theoretical and Applied Electronic Commerce Research  
It is worthwhile to mention that the significance of each component in the composite trust formula is adjusted automatically according to unforeseen changes in the environment.  ...  agent with the other agents; 2) Witness Reputation (WR) that is based on the direct observation of an agent's behavior by some third-party agent; 3) Certified Reputation (CR), being one of the novelties  ...  In particular, BRS provides sellers with the ability to adaptively change their behavior to increase their benefits while maintaining a satisfactory level of honesty.  ... 
doi:10.4067/s0718-18762010000200007 fatcat:gpnldavetrdc3jaclji2mycl4e

Leader effectiveness and integrity: wishful thinking?

Robert Hooijberg, Nancy Lane, Albert Diversé
2010 International Journal of Organizational Analysis  
We find that the values of Integrity and Flexibility have a significant impact on effectiveness over and above the impact of various leadership behaviors: Integrity for managers and their peers and flexibility  ...  Few have empirically examined the impact of integrity on leadership effectiveness.  ...  As an Innovator, a manager is expected to pay attention to changes in the environment and to identify how to adapt to those changes and facilitate the process.  ... 
doi:10.1108/19348831011033212 fatcat:26mxmb3hzng2rblspxplu5h7ge

Enforcing Trust-Based Intrusion Detection in Cloud Computing Using Algebraic Methods

Amira Bradai, Hossam Afifi
2012 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery  
By statistically analyzing peer-to-peer trust distributed results, we apply trust-based intrusion detection to assess the trustworthiness and maliciousness.  ...  We consider a trust metric based on honesty, cooperation and efficiency for detecting malicious machines. We use Perron-Frobenius theorem to detect intrusion based on trust and observations.  ...  We adapted the trust model cited previously in [17] : We added new parameter: efficiency and we change the definition of honesty.  ... 
doi:10.1109/cyberc.2012.38 dblp:conf/cyberc/BradaiA12 fatcat:uo2shdbfrffm3kotyfer3xu76y

Individual differences in (dis)honesty are represented in the brain's functional connectivity: Robust out-of-sample prediction of cheating behavior [article]

Sebastian Speer, Ale Smidts, Maarten Boksem
2020 bioRxiv   pre-print
Many of the economically most costly forms of unethical behavior such as tax evasion, stock manipulations or movie and music piracy relate to the moral domain of (dis)honesty, in which unethical behavior  ...  but also the medial prefrontal cortex and temporal pole, associated with self-referential thinking, and the caudate nucleus, linked to reward processing, are of central importance in promoting honesty.  ...  have significant effects on cheating behavior.  ... 
doi:10.1101/2020.05.12.091116 fatcat:fdvrgkawlrdshm67preyn3mxca

Dynamic trust management for secure communications in social internet of things (SIoT)

A Meena Kowshalya, M L Valarmathi
2018 Sadhana (Bangalore)  
Out of the many visions of IoT, one revolutionary concept is to make IoT sociable i.e., incorporating social networking within Internet of Things.  ...  This revolution has led to the notion of Social Internet of Things (SIoT).  ...  In a P2P system each peer should have the knowledge of other peers in order to decide whether or not to trust them.  ... 
doi:10.1007/s12046-018-0885-z fatcat:vjzpgphxffei5mgz2zqtg5ecyq

Faculty Observables and Self-Reported Responsiveness to Academic Dishonesty

Robert Burrus, Adam Jones, William Sackley, Michael Walker
2015 Administrative Issues Journal Education Practice and Research  
Self-reported data on faculty vigilance to detect and punish cheating is collected both prior to and after a change in the honor code at a mid-sized public institution in the southeast.  ...  We find that, at the time of the first survey, full professors and faculty with a longer duration of employment were more likely to claim vigilance in cheating detection and harshness in punishing cheaters  ...  of peers cheating may have an important effect on students' behavior.  ... 
doi:10.5929/2015.5.1.2 fatcat:drappc4kdfh4pm7ye5lpk72vyq

Peer Group Effects on Moslem Consumer's Decision To Purchase Halal Labeled Cosmetics

Muniaty Aisyah
2015 Al-Iqtishad: Jurnal Ilmu Ekonomi Syariah  
The purposes of this research are to analyze peer group effects on Moslem consumers'decision to purchase halal-labeled cosmetics directly and indirectly which is mediated by consumers' religious behavior  ...  Peer Group Effects on Moslem Consumer's Decision To Purchase Halal Labeled Cosmetics.  ...  For hypothesis 4, based on Table 1 and 2, the value of standardized direct effects of peer group on consumers' hablumminannas behavior (X -M2) is 0.239, while the value of standardized indirect effects  ... 
doi:10.15408/ijies.v7i2.1682 fatcat:p6luhnrcabfzlgkvf2vmflme2i

The Effect of Personality Type on Human Performance Tool Compliance and General Recommendations for Enhancement of the its Practical Utilization

Kyung-Sun Lee, Jong-Hyun Lee, Yong-Hee Lee
2015 Journal of the Ergonomics Society of Korea  
Acknowledgements This research was supported by the nuclear energy research and development project (Grant. 2012M2A8A-4004256) funded by the Ministry of Education, Science and Technology.  ...  The status of peer check utilization did not show statistical effects.  ...  The definitions and characteristics based on the personality type of HEXACO are as follows: 1) Honesty (H): H type indicates individual honesty and humbleness and the extent to avoid the characteristics  ... 
doi:10.5143/jesk.2015.34.1.45 fatcat:hbinpkfl6rh65cjeq52umthvri
« Previous Showing results 1 — 15 out of 10,826 results