iTrans.ir
سفارش ترجمه
خانه
راهنما
چگونه سفارش ترجمه دهیم
تماس با ما
ترجمه فوری
راهنمای استفاده از سایت
API
بیشتر...
پرسش و پاسخ
قیمت ترجمه
ثبت نام
ورود
021-66989400
021-66989500
0935-173-0404
نشانی و اطلاعات تماس
تگ trust
جزئیات خدمات ترجمه در ترجمه تخصصی
nodes
trust
investment trust
justice
mobile
trust
user
user
brand
trust
Information & Management 50 (2013) 144–153
ORGANIZATIONAL RESPONSES TO CRISIS: THE CENTRALITY OF TRUST
Simplifying Client-Server Application Development
Crisis Management
lived well. By the time we had Anna, I was thirty-three, and
lived well. By the time we had Anna, I was thirty-three, and
Simplifying Client-Server Application Development
Simplifying Client-Server Application Development
Equity and trusts Equity is a body of rules that
Occasional Paper 5
Occasional Paper 5
Occasional Paper 5
THE RECOVERY OF TRUST: CASE STUDIES OF ORGANISATIONAL FAILURES AND TRUST REPAIR – CASE STUDY 2: MATTEL
THE RECOVERY OF TRUST: CASE STUDIES OF ORGANISATIONAL FAILURES AND TRUST REPAIR – CASE STUDY 2: MATTEL
MAKERERE UNIVERSITY
Secured E-commerce Architeture
Accepted Manuscript
SECURITY AND COMMUNICATION NETWORKS
Lessons from Jordan a b s t r a c
The current issue and full text archive of this journal is available at
JBR-08154;NoofPages8
1 The Challenges of Virtual Teaming J ill N emiro
Journal of Air Transport Management xxx (2014) 1e8
Expert Systems with Applications 40 (2013) 5439–5447
The current issue and full text archive of this journal is available at
Trust in your broken heart
Building global partnerships
INFORMATION SECURITY
INFORMATION SECURITY
Available online at www.sciencedirect.com
The current issue and full text archive of this journal is available at
North Cumbria University Hospitals
2013 International Conference on Computer Sciences and Applications
2013 International Conference on Computer Sciences and Applications
International Journal of Learning & Development
International Journal of Learning & Development
International Journal of Learning & Development
ToktamBorhani banking authorization for releasing the block fund in favor
DECSUP-12148; No of Pages 13
This study underlines the value of the brand personality and
Third, this paper also contributes to organizational trust and innovation literature with a new perspective. Most prior
Third, this paper also contributes to organizational trust and innovation literature with a new perspective. Most prior
1 Introduction to Electronic Voting
A flexible framework for context-aware recommendations
1 Introduction In the previous chapter we presented the architecture
AbstractIn order to maximize business profit and general performance
Shopping online for tourism products and services in South Korea
satisfaction of the existinginformation on online environmentAbstractThe
The moderating role of habit and its antecedentsCustomer loyalty
IDN scalability can be achieved through completely decentralized topology design
The mediatorsThis study aims to examine the relation between
G Model
G Model
andgxxxralizedtrustismorecharacteristicofxbstract insights xegarding the use and management of open B2B
andgxxxralizedtrustismorecharacteristicofxbstract insights xegarding the use and management of open B2B
andgxxxralizedtrustismorecharacteristicofxbstract insights xegarding the use and management of open B2B
G Model
G Model
This article was downloaded by: [137.205.250.164]
Abstract Interorganizational trust is a crucial but understudied topic in
STUDYING INTERORGANIZATIONAL TRUST IN PUBLIC ADMINISTRATION A Conceptual and Analytical
EXAMINING THE RELATIONSHIP BETWEEN
or institution wholly for public religious purposes or wholly for
or institution wholly for public religious purposes or wholly for
or institution wholly for public religious purposes or wholly for
or institution wholly for public religious purposes or wholly for
A group of wireless mobile hosts making a temporary network
International Business Review 19 (2010) 34–45
Advanced Secure Routing in Ad hoc mobile
7 . Participatory Governance
there was much evidence of very strong leadership from the
there was much evidence of very strong leadership from the
held by any university or other educational institution or any
Scientific Research and the Public Trust Abstract This essay analyzes
Available online at www.sciencedirect.com
Computers in Human Behavior 35 (2014) 464–478
AXA Property Trust Limited
Chavoshan
JournalofExperimentalSocialPsychology56(2015)104–109
Available online at www.sciencedirect.com
Journal of Air Transport Management 42 (2015) 47e54
The impact of, brand satisfactionand brand citizenship behavioron trust brand مقاله تلفیقی : بررسی تأثیر رضایت از برند و رفتار شهروندی بر اعتماد به برند
International Journal of Information Management 35 (2015) 352–363
the moderating influenceof trust on the relationship betweenswitching
LOYALTY OF INTERNET BANKING USERS ABSTRACT The objective of this
Journal of Business Research 66 (2013) 1153–1160
the increased flexibility andinsecurity that characterize relations in the labour
ComputerStandards&Interfaces36(2014)480–488
IntroductionCustomer loyalty increasingly becomes very important and appears to
IntroductionCustomer loyalty increasingly becomes very important and appears to
Web Semantics: Science, Services and Agents on the World Wide Web 8 (2010) 26–36
International Journal of Computer Applications (0975 – 8887)
ScienceDirect
ScienceDirect
Acknowledgements
Information technology has been established as an imperativeelement of continuous
International Journal of Islamic and Middle Eastern Finance and
International Journal of Islamic and Middle Eastern Finance and
A LITERATURE REVIEW OF ONLINE TRUST IN BUSINESS TO CONSUMER
Association for Information Systems
Switching costs The concept of switching costs is theoretically backed
identified eight separateindicators of switching costs that make up
Computer Networks 72 (2014) 45–61
Computer Networks 72 (2014) 45–61
IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 7, NO. 3, JULY-SEPTEMBER 2014 333
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE Globecom 2011 proceedings.
AcceptedManuscript
Abstract Online Reputation Systems help mitigate the information asymmetry between
Abstract Online Reputation Systems help mitigate the information asymmetry between
Single Sign-On (SSO) is the ability to share credentials across systems. There are many SSO
Single Sign-On (SSO) is the ability to share credentials across systems. There are many SSO
Agric Hum Values (2011) 28:67–79
The current issue and full text archive of this journal is available at
Journal of Network and Computer Applications∎ (∎∎∎∎)∎∎∎–∎∎∎
Journal of Network and Computer Applications∎ (∎∎∎∎)∎∎∎–∎∎∎
3. Conceptual framework and research hypotheses
). The analysis per- formed validated the second-order structures
You are recommended to take appropriate legal or other professional
PROJECT AGREEMENT
10 REPRESENTATIVES
determined to be the case in accordance with Schedule 14 (Dispute
Performance failure escalation to be via the MES Operations Manager, then to the
SCHEDULE 11
APPENDIX 2 TO SCHEDULE 3
International Journal of Health Care Quality Assurance
MULTI-TENANT ACCESS CONTROL FOR CLOUD SERVICES
CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE
CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE
S e e d i s c u s s i o n s , s t a t s , a n d a u t h o r p r o f i l e s f o r t h i s p u b l i c a t i o n a t :
I.J. Information Engineering and Electronic Business, 2014, 5, 1-9
Introduction This chapter will open with a review of the
Introduction This chapter will open with a review of the
Alignment-based Trust for Resource Finding
Generating trusted graphs for trust evaluation in online social networks( ) –
Alignment-based Trust for Resource Finding
CHAPTER
CHAPTER
TRUST AND IT INNOVATION IN ASYMMETRIC ENVIRONMENTS OF THE SUPPLY CHAIN
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
based social networks are a special form of social networks
based social networks are a special form of social networks
ijcrb.com
International Journal of Hospitality Management 33 (2013) 406–415
A Security Model for
Journal of Retailing and Consumer Services 28 (2016) 209–218
This article was downloaded by: [University of York]
This article was downloaded by: [University of York]
A Security Model for
1042-2587
The interplay of counter-conformity motivation, social
The interplay of counter-conformity motivation, social
JBR-08032;NoofPages7
183 The Economies of Balkan and Eastern Europe Countries in
183 The Economies of Balkan and Eastern Europe Countries in
183 The Economies of Balkan and Eastern Europe Countries in
Reputation Reputation of a company is also crucial in online
Reputation Reputation of a company is also crucial in online
Perceived Integrity refers to the perception of bidder on the
The essential determinants of perceived website quality consist of a
2013 10th Web Information System and Application Conference 2013 10th
2013 10th Web Information System and Application Conference 2013 10th
Heidari
The Role of Trust in Effective Knowledge
Journal of Retailing and Consumer Services 28 (2016) 36–44
Measuring DANE TLSA
Journal of Air Transport Management 53 (2016) 150e160
Downloaded from http://jpo.oxfordjournals.org/ by guest on August 17, 2015
S e e d i s c u s s i o n s , s t a t s , a n d a u t h o r p r o f i l e s f o r t h i s p u b l i c a t i o n a t : h t t p : / / w w w . r e s e a r c h g a t e . n e t / p u b l i c a t i o n / 2 6 9 7 3 0 2 3 4
The current issue and full text archive of this journal is available at
Eugene Kaspersky tells FRANCE 24 he is innocent and has
Nodes in most of the deployments of Wireless Sensor Networks (WSNs) remain un-administered and exposed to variety of security attacks. Characterized by constrained resources and dynamically changing behavior of
Knowledgesharingininformationsystemsdevelopmentprojects:Explicating
Knowledgesharingininformationsystemsdevelopmentprojects:Explicating
BIG DATA, CLOUD & MOBILE COMPUTING
BIG DATA, CLOUD & MOBILE COMPUTING
GOVINF-01165;No.ofpages:14;4C:
GOVINF-01165;No.ofpages:14;4C:
GOVINF-01165;No.ofpages:14;4C:
GOVINF-01165;No.ofpages:14;4C:
GOVINF-01165;No.ofpages:14;4C:
Deed of Dist & Indem
Hello
Luarn & Lin: A Customer Loyalty Model for E-Service Context
S e e d i s c u s s i o n s , s t a t s , a n d a u t h o r p r o f i l e s f o r t h i s p u b l i c a t i o n a t : h t t p s : / / w w w . r e s e a r c h g a t e . n e t / p u b l i c a t i o n / 2 7 2 7 4 4 6 2 4
Robert W. Palmatier, Cheryl Burke Jarvis, Jennifer R. Bechkoff, &
JOURNAL OF INFORMATION ARCHITECTURE | VOLUME 5 ISSUES 1 – 2
Omega 36 (2008) 206–220
Omega 36 (2008) 206–220
JournalofHighTechnologyManagementResearch27(2016)88–100
Marketing and Branding Research 2(2015) 44-63
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 5, ISSUE 02, FEBRUARY 2016 ISSN 2277-8616
یک ماده از حساب با بانک
Accepted Manuscript
Information & Management 52 (2015) 151–159
Information & Management 52 (2015) 151–159
S e e d i s c u s s i o n s , s t a t s , a n d a u t h o r p r o f i l e s f o r t h i s p u b l i c a t i o n a t : h t t p s : / / w w w . r e s e a r c h g a t e . n e t / p u b l i c a t i o n / 2 7 7 0 2 6 6 0 7
Revista Española de Investigación de Marketing ESIC (2015) 19, 1---11
مکاتبه مسئول بانک خارجی با مشتری
e marketing
پاسخ وکیل خارجی به یک درخواست کننده ایرانی
A Survey of Trust Models for Enterprise Information Systems
The Coevolution of Trust, Control, and Learning in Joint Ventures
Organization Science informs
14th Intl Conf on Pervasive Intelligence 2016 IEEE 14th Intl
Virtual Collaboration and the
Electronic Commerce Research and Applications 13 (2014) 266–282
14th Intl Conf on Pervasive Intelligence 2016 IEEE 14th Intl
14th Intl Conf on Pervasive Intelligence 2016 IEEE 14th Intl
14th Intl Conf on Pervasive Intelligence 2016 IEEE 14th Intl
Information Sciences 191 (2012) 128–145
Available online at www.sciencedirect.com
is normally regarded as an important solution for detecting various
A Survey of Trust in Social Networks
Journal of Network and Computer Applications 66 (2016) 198–213
An executive summary for managers and executivereaders can be found
An executive summary for managers and executivereaders can be found
Tourism Management 46 (2015) 20e29
Electronic Commerce Research and Applications 15 (2016) 26–37
Electronic Commerce Research and Applications 15 (2016) 26–37
Electronic Commerce Research and Applications 15 (2016) 26–37
Electronic Commerce Research and Applications 15 (2016) 26–37
International Journal of Information Management 36 (2016) 284–296
there are several inherent problems identified from the exploratory study
Hindawi Publishing Corporation
JBR-09357;NoofPages7
The current issue and full text archive of this journal is available at
The determinants of satisfaction
Hindawi Publishing Corporation
Hindawi Publishing Corporation
Combating Web Spam with TrustRank
Aboriginal People and Confidence
Downloaded from http://iranpaper.ir
Downloaded from http://iranpaper.ir
A Survey of Trust in Social Networks
DECSUP-12342; No of Pages 8
DECSUP-12342; No of Pages 8
Journal of Business Research 82 (2018) 103–116
DECSUP-12342; No of Pages 8
Distributed argumentative model for Group Decision Making processes Up to
The current issue and full text archive of this journal is available at
A New Trust Model based on Social Characteristics and Reputation
Expert Systems with Applications 40 (2013) 5439–5447
Analysing user trust in electronic banking using data mining methods
Analysing user trust in electronic banking using data mining methods
ترس ته. مووجی
Keeping up with our social networks online helps us get
ARTICLE IN PRESS
CHAPTER 34
A$AP Rocky و Selena Gomez زا Good For You
Wireless Networks
Wireless Networks
2 J. Windsperger et al.
What Makes Franchisees Trust Their
2 J. Windsperger et al.
What Makes Franchisees Trust Their
Using Blockchains to Strengthen the
Six Dimensions of Web Design
2.4.1. Six Dimensions of Web Design
DOES THE SEASONALITY AFFECT HYIPS It is believed that the
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/325012801
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/300372396
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/325012801
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/300372396
Journal of Management Policies and Practices
Journal of Management Policies and Practices
sustainability
sustainability
Materials Today: Proceedings xxx (xxxx) xxx
A Review on Trust Models of Social
Revocable Trust Agreement koi-7T5uZukiklou/20210527/E
Revocable Trust Agreement ioo-8U7iIopoikuj/20210527/E
JournalPre-proof
applied
Malekshahi Rad et al.
Journal of Retailing and Consumer Services 52 (2020) 101920
How to Implement a Zero Trust Security Strategy How Does
How to Implement a Zero Trust Security Strategy How Does
Securing the edge with Zero Trust The proliferation of cloud
Downloaded from https://iranpaper.ir
Trust Computational Heuristic for Social Internet of
Downloaded from https://iranpaper.ir
Downloaded from https://iranpaper.ir
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TNSM.2020.3046906, IEEE
AcceptedManuscript
THE GIVING ENVIRONMENT:
International Journal of Scientific and Research Publications, Volume 5, Issue 9, September 2015 1
Technology in Society 78 (2024) 102644
Technology in Society 78 (2024) 102644
Technology in Society 78 (2024) 102644
JournalofBehavioralandExperimentalFinance36(2022)100739