-
101
Building Brand Loyalty: The Role of Brand Communication, Brand Identity, and Brand Experience Mediated by Brand Trust
Published 2024-09-01“…Sarung Mangga has the problem of inefficient and effective branding budgeting, so branding objectives have not been achieved optimally. This study aims to determine the effect of brand communication, brand identity, and brand experience on brand loyalty mediated by brand trust in Sarong Mangga. …”
Get full text
Article -
102
Intelligent Trust Evaluation Method for Underwater Sensor Networks Based on Fuzzy Clustering and Dynamic Weight Allocation
Published 2025-04-01“…However, most existing trust evaluation methods rely on the linear weighting of trust features and the decision-making method based on threshold comparison. …”
Get full text
Article -
103
Influence of short video content on consumers purchase intentions on social media platforms with trust as a mediator
Published 2025-05-01“…This research extends the application of the SOR model to the context of social media short videos, highlighting the crucial role of consumer trust in shaping consumer purchase decisions. Based on these findings, we propose actionable strategies for businesses to optimize short video content and build consumer trust, ultimately enhancing marketing effectiveness and driving consumer purchases.…”
Get full text
Article -
104
Perception of modern technologies by the older generation: comparative analysis
Published 2024-01-01Subjects: Get full text
Article -
105
SGRiT: Non-Negative Matrix Factorization via Subspace Graph Regularization and Riemannian-Based Trust Region Algorithm
Published 2025-03-01“…Additionally, this paper presents a solution for addressing the Stiefel manifold problem and utilizes a Riemannian-based trust region algorithm to optimize the loss function. …”
Get full text
Article -
106
A Consensus Reaching Process for Product Design Decision-Making by Integrating Intuitionistic Fuzzy Sets and Trust Network
Published 2024-11-01“…By establishing a consensus measurement model, DMs contributing less to consensus are identified, and consensus optimization is achieved through the modification of DMs’ preferences or the calibration of their trust relationships. …”
Get full text
Article -
107
SIMULATION OF PERIPHERAL DEVICE SECURITY: IMPLEMENTATION AND PRACTICAL EVLUATION OF ADDRESS SPACES PROTECTION IN A TRUSTED MICROPROCESSOR EMULATOR
Published 2025-07-01“…Necessary security can be achieved through the use of trusted microprocessors and systems based on them. …”
Get full text
Article -
108
SC-Route: A Scalable Cross-Layer Secure Routing Method for Multi-Hop Inter-Domain Wireless Networks
Published 2025-05-01Subjects: Get full text
Article -
109
Developing an Efficient Deep Learning-Based Trusted Model for Pervasive Computing Using an LSTM-Based Classification Model
Published 2020-01-01“…The role of pervasive computing is foremost in the field where it provides the ability to distribute computational services to the surroundings where people work and leads to issues such as trust, privacy, and identity. To provide an optimal solution to these generic problems, the proposed research work aims to implement a deep learning-based pervasive computing architecture to address these problems. …”
Get full text
Article -
110
Trust as the Foundation of Effective Management: Between Control and Support in the Context of Douglas McGregor’s Theories X and Y
Published 2025-07-01“…The article proposes an original classification of employee types based on motivational traits, with a corresponding optimal managerial approach (X, Y, or hybrid). Special emphasis is placed on the role of trust, autonomy, and maturity in shaping a productive organizational culture. …”
Get full text
Article -
111
Secure Latency-Aware Task Offloading Using Federated Learning and Zero Trust in Edge Computing for IoMT
Published 2025-01-01“…Although offloading medical tasks to Edge Servers (ESs) improves the agility of medical services and enhances real-time processing capabilities, it simultaneously introduces significant security and trust concerns in heterogeneous and delay-sensitive IoMT environments. …”
Get full text
Article -
112
Interpretable Optimization: Why and How We Should Explain Optimization Models
Published 2025-05-01“…Enhancing interpretability strengthens both efficiency and ethical responsibility, enabling decision-makers to trust, validate, and implement optimization-driven insights with confidence.…”
Get full text
Article -
113
Multiobjective, trust-aware, artificial hummingbird algorithm-based secure clustering and routing with mobile sink for wireless sensor networks
Published 2024-12-01“…A secure route is found by M-TAAHA with trust, energy, and interspace between SCH and MS. …”
Get full text
Article -
114
The Role of Artificial Intelligence in Boosting Cybersecurity and Trusted Embedded Systems Performance: A Systematic Review on Current and Future Trends
Published 2025-01-01“…To address this gap, this article systematically reviews 63 articles on AI in cybersecurity and trusted embedded systems. The reviewed articles are categorized into four application domains: 1) Intrusion Detection and Prevention (IDPS), 2) Malware Detection, 3) Industrial Control and Cyber-Physical Systems (CPS) and 4) Distributed Denial-of-Service (DDoS) Detection and Prevention. …”
Get full text
Article -
115
Commercialisation fears and preferred forms of governance: a mixed methods investigation to identify a trusted Australian genomics repository
Published 2024-12-01“…Contrary to what was expected based on the interviews, when certain baseline operating conditions were included (e.g., public management, data access committee to ensure data is restricted to human health research), none of the additional tested governance mechanisms (e.g., financial penalties for misuse) increased trust or donation willingness. Thus, providing suitable baseline conditions are in place, a feasible Australian genomic repository may not require external oversight or new legislation to optimize recruitment, even if commercial users are anticipated.…”
Get full text
Article -
116
Enhancing MANET Security Through Long Short-Term Memory-Based Trust Prediction in Location-Aided Routing Protocols
Published 2025-01-01“…To address this, we propose LSTMT-LAR, an LSTM-based trust prediction mechanism integrated with Location-Aided Routing (LAR) to enhance MANET security. …”
Get full text
Article -
117
Research on the blockchain-based trusted ownership confirmation and value transfer system and its light weight of industrial data assets
Published 2025-06-01“…To solve the contradiction between security and efficiency, a lightweight trusted blockchain model was proposed, which measured the trustworthiness of nodes based on their behavior and status, and provided a dynamic initial value calculation method for nodes and an overall trust value measurement model for trust management. …”
Get full text
Article -
118
Establishing trust through home visits during pregnancy: a realist evaluation of a Danish breastfeeding support intervention
Published 2025-01-01“…In realist terms, our central mechanism of change, the establishment of trust, had optimal conditions for success in the contextual setting of the pregnancy home visit where there was time, peace, undisturbed conversations, mental capacity to reflection, and a perceived more even power balance between the family and the health visitor which resulted in a range of positive outcomes. …”
Get full text
Article -
119
Standardization of epistemic trust/mistrust/credulity questionnaire: Examining validity and reliability among adolescents Standardization of ETMCQ among adolescents
Published 2024-08-01“…The factor structure, reliability, and reliability of the epistemic trust/mistrust/credulity questionnaire for research applications and clinical diagnosis are acceptable and it can be said that the questionnaire is a useful and valid tool for conducting research related to epistemic trust in different areas of the relationship.IntroductionOne of the prerequisites for optimal interpersonal functioning is the capacity for mentalization (Fonagy et al., 1991; Frith, 1989) , which is closely related to concepts such as emotion recognition and trust (Bateman & Fonagy, 2016) . …”
Get full text
Article -
120
A Biologically Inspired Cost-Efficient Zero-Trust Security Approach for Attacker Detection and Classification in Inter-Satellite Communication Networks
Published 2025-07-01“…To overcome these challenges, a new bio-inspired ZTS framework called Manta Ray Foraging Cost-Optimized Zero-Trust Security (MRFCO-ZTS) has been introduced. …”
Get full text
Article