Showing 61 - 80 results of 747 for search '"reputation"', query time: 0.06s Refine Results
  1. 61
  2. 62
  3. 63
  4. 64

    The relationship between sports sponsorship and corporate image, reputation and intention to buy: TORKU case by Abdullah Sencer Temel, Erkan Faruk Sırın

    Published 2017-08-01
    “…The purpose of this research is to examine the relationship between the recognition (being heard or not) of TORKU’s (Konya Seker) sports sponsorships and image, reputation and intention to buy. In addition to this, the effects of the image the customers perceive and reputation on the buying decisions. …”
    Get full text
    Article
  5. 65
  6. 66

    RPRep: A Robust and Privacy-Preserving Reputation Management Scheme for Pseudonym-Enabled VANETs by Jin Wang, Yonghui Zhang, Youyuan Wang, Xiang Gu

    Published 2016-03-01
    “…Most of the previous reputation management systems focus on the effectiveness of the reputation management system in handling the liars who send false service messages. …”
    Get full text
    Article
  7. 67
  8. 68

    An efficient cooperative message authentication based on reputation mechanism in vehicular ad hoc networks by Yong Xie, Songsong Zhang, Xiang Li, Yanggui Li

    Published 2019-06-01
    “…In this article, we propose an efficient cooperative message authentication based on reputation mechanism. In the proposed scheme, reputation model is used to assess authentication efforts of vehicles, which enhances initiative for cooperative message authentication and inhabits selfish behavior; sequence optimization algorithm solves messages overflowing on condition limited computation of onboard unit and improves the speed of message authentication at the premise of ensuring the reliability of message authentication. …”
    Get full text
    Article
  9. 69
  10. 70

    A bibliometric and thematic analysis of the reputation-performance relationship within the triple bottom line framework by Francisca Castilla-Polo, María Isabel Sánchez-Hernández

    Published 2025-01-01
    “…This study analyses the academic literature on the relationship between reputation and performance, exploring the different perspectives applied. …”
    Get full text
    Article
  11. 71

    Reputation Revision Method for Selecting Cloud Services Based on Prior Knowledge and a Market Mechanism by Qingtao Wu, Xulong Zhang, Mingchuan Zhang, Ying Lou, Ruijuan Zheng, Wangyang Wei

    Published 2014-01-01
    “…The experimental results showed that this method filtered unfair ratings in an effective manner, which greatly improved the precision of the reputation revision system.…”
    Get full text
    Article
  12. 72
  13. 73

    Detecting and Mitigating Smart Insider Jamming Attacks in MANETs Using Reputation-Based Coalition Game by Ashraf Al Sharah, Taiwo Oyedare, Sachin Shetty

    Published 2016-01-01
    “…The nodes will form a stable grand coalition in order to make a strategic security defense decision, maintain the grand coalition based on node reputation, and exclude any malicious node based on reputation value. …”
    Get full text
    Article
  14. 74

    Systematic Literature Review: How Financial Literacy, Trust and Firm Reputation Affect Investment Decision by Sinta Carolina, Mohammad Iqbal, Ari Darmawan

    Published 2025-01-01
    Subjects: “…financial literacy; trust; firm reputation; investment…”
    Get full text
    Article
  15. 75

    Method for detecting collusion attack node in road condition information sharing based on reputation point by Shichang XUAN, Hao TANG, Wu YANG

    Published 2021-04-01
    “…Aiming at the problem that on occasion of the release of false road condition information by collusion nodes in the Internet of vehicles collaboratively, message authenticity could not be guaranteed in the process of road condition information sharing, a method for detecting collusion attack nodes in road condition information sharing based on reputation points was proposed.In the process of road condition information aggregation, a malicious information detection algorithm was designed to detect false messages issued by colluding nodes, which could ensure the authenticity and accuracy of messages delivered in the system.Experimental results show that the proposed method has higher detection efficiency for collusion nodes and adaption to a proportion of collusion nodes through security evaluation and experiments in comparison with the existing schemes.…”
    Get full text
    Article
  16. 76
  17. 77
  18. 78
  19. 79
  20. 80