Computing Science Studies
Permanent URI for this community
Browse
Browsing Computing Science Studies by Issue Date
Now showing 1 - 20 of 48
Results Per Page
Sort Options
Item Tabu search heuristic for university course timetabling problem(African Journal of Science and Technology, 2006) Mushi, Allen R.In this study we have addressed the NP-Hard problem of academic course timetabling. This is the problem of assigning resources such as lecturers, rooms and courses to a fixed time period normally a week, while satisfying a number of problem-specific constraints. This paper describes a Tabu Search algorithm that creates timetables by heuristically minimizing penalties over infeasibilities. The algorithm is developed with special focus on the University of Dar-assalaam and compares the results with a previous manually generated timetable. It has been found that, the Tabu Search technique gives better results given a careful selection of parameters.Item A closer look on conceptual modeling of trust to develop trustman system(International Journal of Computer Science, 2011) Msanjila, Simon SamwelDesigning comprehensive trust models and mechanisms to address challenges related to mediating business oriented collaboration among organizations has become a fundamental focus of research on trust and particularly those focused on organizational Trust Management (TrustMan) Systems. Despite recent achievements from research addressing the modeling of trust, there are still insufficient generic and customizable models, mechanisms and tools to support emerging requirements on inter-organizational trust analysis. Most available model solutions supporting trust analysis are limited to: a specific application case (e.g. multi-agent systems), known actors (organizations or individuals), or domain of study (e.g. health domain). These solutions are also limited to some specific set of trust criteria applied to their development such as a small set of trust criteria for analysis of rational trust in organization. In this article we advocate that a large number of elements must be properly specified and modeled to comprehensively cover the trust objectives of organizations towards developing a supportive TrustMan system. This article analyzes and proposes three specific modeling formalisms that best represent trust relationships among organizations and presents some examples for those formalisms. It also analyzes classes of models of inter-organizational trust, namely: hard models, soft models and semi-soft models.Item E-government adoption in developing countries: Trends in the use of models(ESARBICA Journal, 2011) Komba, Mercy Mlay; Ngulube, P.Like the evaluation of all other information systems initiatives, the evaluation of e-government in both theory and practice has proven to be important and complex. The importance of e-government evaluation is due to the enormous investment put in by governments for delivering e-government services and to the considerable pace of growth in the field of e-government. However, despite the importance of the evaluation of e-government services, the literature shows that e-government evaluation is still an immature area in terms of development and management. The main aim of this article is to explore various theories and models which have been used in the developing countries context to evaluate e-government adoption. Developing countries suffer from poor citizen utilization of egovernment initiatives. An assessment of various theories and models for e-government adoption in developing countries may positively contribute to enhancing government understanding of the factors that influence citizen utilization of e-government systems. Moreover, the understanding of these models can be used as means for providing valuable feedback for the planning of future egovernment initiatives in the developing countries.Item Cultivating recognition: a classic Grounded Theory of E-Learning providers working in East Africa(University of Cape Town, 2012) Tossy, TitusThe purpose of this thesis is to identify and examine the main concern amongst e-learning providers tasked with e-learning activities (design, delivery, implementation, etc.) in East Africa, including Tanzania, Kenya and Uganda. In this study the Classic Grounded Theory research methodology was used in order to identify the main concern of e-learning providers in these countries. In the course of repeated encounters with e-learning providers, this study found the concept of “Cultivating Recognition” to emerge as the main concern or core variable amongst these e-learning providers. The core variable within the Classic Grounded Theory research method is the main entity that accounts for most of the variation in the data. The e-learning providers were shown to be continually striving to resolve the issue of how to cultivate recognition from those who sponsor and monitor the projects with which they are tasked. Without proper recognition from their various stakeholders, the e-learning providers were unable to successfully deliver e-learning programs to the targeted learners. The research discovered that there were two key sub-core variables that enabled the "Cultivation of Recognition": "Legitimizing" and "Credentializing". The process of "Legitimizing" involves convincing the e-learning stakeholders that the e-learning programs and projects will be delivered in a timely, valid and sustainable manner. "Credentializing” aims to enhance the stakeholders' belief in the e-learning provider’s competence prior to the start of the e-learning project, given that sponsors and stakeholders would be unwilling to commission a project if they believe an e-learning professionals ability to deliver in terms of both financial and operational quality parameters is in question. In addition to the findings, two main implications emerged from the research. Firstly, for those working within the context of e-learning delivery within East African countries, it is not sufficient for e-learning providers simply to possess or demonstrate a high level of technical competence. They need also to be trained and mentored in how to cultivate the recognition of potential stakeholders before they canvas for e-learning projects. Secondly the possibility exists for career academics in any discipline to enhance their own research funding prospects by mastering the process of Cultivating Recognition.Item Factors for e-government adoption: Lessons from selected African countries(UNISA Press, 2012) Komba, Mercy Mlay; Ngulube, PThis article discusses various problematic issues of providing access to, and promoting the wider utilisation of government information as important factors in e-government adoption. The Tunisian, Mauritian and Egyptian e-government experiences are examined in this article in order to highlight both good practices and remaining challenges in e-government adoption. Some of the good practices that we can benefit from, may be summarised as: formulating a viable national information and communication technology strategy (ICT-based) for modernising the telecommunications infrastructure, developing a regulatory framework for the deployment of a digital economy, obtaining international cooperation in ICT, developing skilled human resources management in ICT, developing a national digital culture in order to overcome the problems of low individual usage and adoption of ICT, establishing an information infrastructure to connect the various local government authorities, and establishing security standards in order to address threats. The study concludes that overcoming the obstacles of providing access to, and promoting the wider utilisation of government information, remain some of the biggest challenges for any government planning to adopt and implement e-government.Item Modelling the adoption of mobile payment system for paying examination fees in Tanzanian major cities.(International Journal of Computing & ICT Research, 2014) Tossy, TitusThis paper examines the different factors affecting the intention to use the mobile payment systems for examination fee payment in the National Examination Council of Tanzania (NECTA). Using Structural Equation modelling technique from a Tanzanian major cities perspective, the paper examines whether the mobile payment systems technology acceptance level is affected by the factors affecting the intention to use. The rationale for the investigation stems from the fact that while more than 61% of Tanzanians own or have access to mobile phones and the mobile usage in major cities increases, there is decrease of NECTA candidates who opt mobile examination fee payment method. The paper attempts to model the individual intention to use mobile payment systems for paying examination fees in Tanzania major cities. It concludes that the factors that had significant impact on the individual intention to use mobile payment systems, performance expectance, social influences and trust is necessary.Item Modelling the adoption of mobile payment system for primary and secondary school student examination fees in developing countries: Tanzanian experience(International Journal of Information Technology and Business Management, 2014) Tossy, TitusThis paper examines the Use of Mobile Phones for Examination Fees Payment among Primary and Secondary School Students. The paper analyses whether there are factors affecting the use of mobile payment systems for examination fee payment. The rationale of this study is based on the fact that most scholars claim that while number of mobile phones ownership, access and usage in primary and secondary school student’s increases, there is decrease of who opt mobile examination fee payment method. From the perspective of primary and secondary school exam candidates in Tanzania, this paper used Structural Equation modelling technique to examine whether the mobile payment systems technology acceptance level is affected by factors affecting the mobile phone uses. The study identified three significant factors: performance expectancy, social influences and trust.Item Investigating factors influencing the adoption and use of Free and Open Source Software (FOSS) in Tanzanian higher learning institutions: towards an Individual-Technology-Organizational-Environmental (ITOE) framework(International Journal of Research in Business and Technology, 2014) Kisanjara, Simeo; Tossy, TitusThis paper is located within the global debates about adoption and use of Free and Open Source Software (FOSS) in developing countries. From the Tanzanian Higher Learning Institutions (HLIs), this paper investigates factors influencing the adoption and use of the FOSS. The rationale for the investigation stems from the notion that Tanzanian HLIs is yet to fully adopt and use FOSS, despite huge investments and efforts being made on ground. This is facilitated by the lack of clear FOSS adoption and use framework. The source of this data was a questionnaire which comprised of structured questions, using a five-point Likert Scale. The population sample for the study was all HLIs stakeholders in Tanzania. Participants included both public and private HLIs. The positive factors include autonomy for code modifications, IT staffs and decision makers, organization awareness, trustworthiness of FOSS, licensing and scalability, collaboration and knowledge sharing, collaboration on international ICT, organization policy and good social economic policy. The negative influences that emerged included, Lack of proper plan, low confidence, lack of expertise, unfit for purpose, difficult to implement, lack of supporting software. Furthermore, this paper motivates other researchers to analyze why the adoption and use of Free and Open source software is still low to higher learning Institutions in East Africa even though their potential benefits that have been advocated in many previous studies. Finally, the paper has proposed Individual-Technological-Organizational- Environmental (ITOE) framework for adoption and use of FOSS.Item Major challenges and constraint of integrating health information systems in african countries: a Namibian experience(International Journal of Information and Communication Technology, 2014) Tossy, TitusThis paper is located within the global debates about integrated Health Information Systems (HIS) in developing countries. From a Namibian experience, this paper examines the major challenges and constrains facing the integration of HIS. The rationale for the examination stems from the notion that the Namibia healthcare is yet to integrate the HIS, despite huge investments and efforts being made on ground. Based on own experience and backed up by a literature review, semi-structured interviews, and participant observation, major challenges and constraint in the integration of HIS and possible solutions are presented and structured. Finally the paper proposes measures within the HIS in the form of annual health provider’s workshop that could be implemented in order to share the experiences and lesson learned.Item Doing classic grounded theory methodology in information systems research: how to create and sustain transparency?(International Journal of Computing & ICT Research, 2014) Tossy, TitusInformation Systems(IS) field is fast growing. There is increase application of Classic Grounded theory (CGT) methodology in the Information Systems (ISs) studies. However, "how to create and sustain transparency when using Classic Grounded theory in studies is still answered." The Classic Grounded Theory [CGT] research method reveals latent patterns of human behaviour. It is a general research methodology because it makes use of all kinds of data. Whether the data are qualitative or quantitative, CGT main objective is to discover a robust empirically derived hypothesis or core variable. The core variable articulates the main concern of the respondents. It is so called because the core variable is able to explain most of the variation in the data. The particular feature of the CGT research method is that it is transcendent of both time and place. This is because CGT delivers a conceptual explanation rather than a low level descriptive context based narrative. As the number of IS researchers using CGT increases so does the likelihood for more confusion regarding the legitimate criteria for its evaluation. To contribute towards eliminating the confusion, this paper investigates how to create and sustain transparency in IS research when using the Classic Grounded Theory research method. This will, hopefully, enable IS researchers, supervisors and respective institutions to make more informed decisions on how to evaluate research, which has used the CGT research methodology.Item Evolutionary collaborative partnership model (ECPM): The East African elearning provider's project-based legitimization strategy(International Journal of Computing and ICT Research, 2014) Tossy, TitusThe paper examines the lack of legitimacy of e-learning projects including academic certificates through online distance programs. The paper analyses whether the lack of legitimacy that exist among e-learning projects can be eradicated through a sound proposed strategy. The rationale of this study is based on the fact that most scholars claim that various e-learning projects and programs lack legitimization, and the literature related to legitimization issues is limited. From the perspective of e-learning providers working in East Africa, this paper used Classic Grounded Theory. The study developed an Evolutionary Collaborative Partnership Model (ECPM). For legitimization to be achieved, the study revealed that three processes needed to be followed: the identifying and acquiring of collaborating partners, referral networking and strategic alliances. The study identified two types of collaborating partnerships: asymmetrical and reciprocal collaborating . The study discovered five stages in an incremental sequential process in the evolutionary e-learning collaborative partnership model including identification of key drivers, problem setting, direction setting, structuring and outcomes.Item Students’ attitudes and readiness assessment towards e-learning in higher learning institutions(International Journal of Engineering Research & Technology (IJERT), 2014) Kisanjara, SimeoLearning institutions particularly in developing countries such as Tanzania have been adopting teaching and knowledge exchange and sharing digital solutions without much consideration of the actual needs and readiness of users. E-learning technologies in particular have been adopted in many universities through purchase and installation mostly imported from abroad or customized from open sources. However, the success rate has proven to be very low particularly when looking into ratio of students using these technologies for intended purposes. It is not clear whether the readiness and attitudes of students towards those technologies is supportive enough. This paper assesses the readiness and attitudes of students in higher learning institutions in Tanzania in comparisons with the adoption speed of the e-learning technologies.Item Use of Airborne Laser Scanner Data in demanding forest conditions(Lappeenranta University of Technology, 2015) Maguya, Almasi S.Most of the applications of airborne laser scanner data to forestry require that the point cloud be normalized, i.e., each point represents height from the ground instead of elevation. To normalize the point cloud, a digital terrain model (DTM), which is derived from the ground returns in the point cloud, is employed. Unfortunately, extracting accurate DTMs from airborne laser scanner data is a challenging task, especially in tropical forests where the canopy is normally very thick (partially closed), leading to a situation in which only a limited number of laser pulses reach the ground. Therefore, robust algorithms for extracting accurate DTMs in low-ground-point-density situations are needed in order to realize the full potential of airborne laser scanner data to forestry. The objective of this thesis is to develop algorithms for processing airborne laser scanner data in order to: (1) extract DTMs in demanding forest conditions (complex terrain and low number of ground points) for applications in forestry; (2) estimate canopy base height (CBH) for forest fire behavior modeling; and (3) assess the robustness of LiDAR-based high-resolution biomass estimation models against different field plot designs. Here, the aim is to find out if field plot data gathered by professional foresters can be combined with field plot data gathered by professionally trained community foresters and used in LiDAR-based high-resolution biomass estimation modeling without affecting prediction performance. The question of interest in this case is whether or not the local forest communities can achieve the level technical proficiency required for accurate forest monitoring. The algorithms for extracting DTMs from LiDAR point clouds presented in this thesis address the challenges of extracting DTMs in low-ground-point situations and in complex terrain while the algorithm for CBH estimation addresses the challenge of variations in the distribution of points in the LiDAR point cloud caused by things like variations in tree species and season of data acquisition. These algorithms are adaptive (with respect to point cloud characteristics) and exhibit a high degree of tolerance to variations in the density and distribution of points in the LiDAR point cloud. Results of comparison with existing DTM extraction algorithms showed that DTM extraction algorithms proposed in this thesis performed better with respect to accuracy of estimating tree heights from airborne laser scanner data. On the other hand, the proposed DTM extraction algorithms, being mostly based on trend surface interpolation, can not retain small artifacts in the terrain (e.g., bumps, small hills and depressions). Therefore, the DTMs generated by these algorithms are only suitable for forestry applications where the primary objective is to estimate tree heights from normalized airborne laser scanner data. On the other hand, the algorithm for estimating CBH proposed in this thesis is based on the idea of moving voxel in which gaps (openings in the canopy) which act as fuel breaks are located and their height is estimated. Test results showed a slight improvement in CBH estimation accuracy over existing CBH estimation methods which are based on height percentiles in the airborne laser scanner data. However, being based on the idea of moving voxel, this algorithm has one main advantage over existing CBH estimation methods in the context of forest fire modeling: it has great potential in providing information about vertical fuel continuity. This information can be used to create vertical fuel continuity maps which can provide more realistic information on the risk of crown fires compared to CBH.Item Antecedents of continued usage intentions of web-based learning management system in Tanzania(Education + Training, 2015) Komba Mercy; Tandi LuogaPurpose – The purpose of this paper is to examine factors that predict students’ continued usage intention of web-based learning management systems (LMS) in Tanzania, with a specific focus on the School of Business of Mzumbe University. Specifically, the study investigated major predictors of actual usage and continued usage intentions of e-learning system, and challenges of using the e-learning system. Design/methodology/approach – Data were collected through a questionnaire survey of 300 third year undergraduate students, with a rate of return of 77 per cent. A total of 20 faculty members were also interviewed. The unified theory of acceptance and use of technology (UTAUT) was utilized in the study. Findings – The results show that actual usage was determined by self-efficacy, while continued usage intentions of web-based learning system was predicted by performance expectancy, effort expectancy, social influence, self-efficacy, and actual usage. Challenges for using web-based LMS were related to information and communications technology (ICT) infrastructure barrier, LMS user interface was not user friendly, weak ICT policies, management and technical support, limited skills, lack of awareness, resistance to change, and lack of time to prepare e-content and use the e-learning system. Practical implications – The study findings are useful to e-learning managers and university management to identify important factors and develop appropriate policies and strategies to encourage long-term usage of e-learning systems for future studies and lifelong learning. Originality/value – By using UTAUT in the context of continued usage intentions and the integration of an additional construct (“self-efficacy”), the extended UTAUT model fits very well in the web-based learning systems in Tanzania, in particular where such studies are scant. The findings can be used in other institutions with similar conditions in investigating the continued usage intentions of e-learning systems.Item Factors that influence eBusiness adoption in selected districs in Tanzania(International Conference on eBusiness, eCommerce, eManagement, eLearning and eGovernance (2015): 1-19. Print., 2015) Komba, Mercy Mlay; Ngulube, PPurpose-Tanzania government has been making efforts to provide its information and services through internet. However, e-government adoption has been quite slow. Few publications explore e-government adoption in the Tanzanian context; therefore, this paper aims to assess factors that influence citizen adoption of e-government in Tanzania.Design/methodology/approach- A survey was administered to elicit factors for e-government adoption in Tanzania. Findings- The results of multiple linear regressions indicate that social influence and system quality significantly influence e-government adoption in Tanzania. Research limitation/implications- In light of these findings, researchers should conduct a similar study using other different e-government adoption models to identify more factors that influence e-government adoption in Tanzania. Practical implications- Policymakers and e-government project teams should consider these factors to facilitate e-government adoption within theItem A framework for Online Resources and E-Learning Implementation (OREI) in Tanzania Secondary Schools(Nelson Mandela African Institution of Science and Technology, 2016) Kihoza, Patrick D.The generic model of an education system is formed by pedagogy, social interaction, and technological components. Current generation is born into a digital world, distinguished from other generations by the presence of sophisticated media, World Wide Web, mobile devices, and the multitasking computer systems that enhance learning beyond the classroom walls. In recent years, the shortcomings on the traditional learning approaches have forced an increased demand for the use of digital educational resources that enhance effectiveness to the pre-existed approaches. However, deployment of Information and Communication Technologies (ICTs) in schools face internal and external challenges that are either related to lack of funding, lack of ICT implementation strategic plan, lack of experts’ involvement, lack of user’s competencies and or relevant infrastructures and technologies to be used. As a gap to this study, most of previous studies focused on the design of e-learning tools (software, mobile apps, and interactive systems). However, the lack of a framework that integrates efforts of all key players for the planning of ICT use in secondary education exists. In addition, ICT tools are dumped in schools where users have no skills and their readiness is not well determined. A solid approach for technology and infrastructure deployment in the education system is essential. This study introduced an integrated online resources and e-learning implementation (OREI) framework. In Tanzania, applying pedagogical ICT tools in secondary education is highly considered as a necessity. The need therefore for teachers’ professional development should be aligned to the overall education objectives and the opportunities of the pedagogical use of ICTs. In this study, a mixed research design used qualitative and quantitative approaches to collect data using questionnaires, interviews and document reviews from the MoEVT head office, Tanzania institute of education (TIE), Schools’ inspection eastern zone office, Morogoro Teachers Training College, Mzumbe University, four public Secondary Schools (Kilakala, Kipera, Mongola and Lupanga) from Morogoro region. This study found that, teachers are passionate to know and use ICTs but failed due to existing external limitations (e.g. accessibility to hardware and software) and internal limitations-(e.g. personal attitudes, skills and perceptions about a technology). Teachers’ education level could not determine their ICT use competency levels. Majorities are poorly prepared in ICT use and could fail to mix digital and non-digital technologies in classrooms when enabled. The challenges secondary schools face in relation to ICT use are complex and should not be resolved from single direction. The uses of ICTs have mostly focused on infrastructures and less on ICT associated learning opportunities. Among the worst practices have been dumping hardware in schools without relevant e-contents, adopting ICT-related models and practices of the developed nations hoping for them to work, lack of clearly defined ICT in education implementation plan and framework. Emerging from the reviewed literature and the empirical data, we introduced an innovative framework to support the process of planning, deployment, and monitoring and evaluation of the ICTs in education in Tanzania, which is a study case. The study identified seven components of the OREI framework namely: (1) government support, (2) ICT infrastructures, (3) technology deployment, (4) policies and guidelines, (5) training and recruitment, (6) stake holder’s involvement and (7) the monitoring and evaluation; followed by the design based approach which led to the initial framework design. ELearning application in developing countries could only be realized when the ICT in education policies, the education vision strategic plan and the implementation framework are well coordinated. This study presents key recommendations. The government should clearly define the model of technology use in secondary education. The strategic plan should state measurable achievements to avoid entering the worst ICT investment practices. There is a need for authoritative approach to the study of the degree of ICT in education integration that makes use of such indicators within developmental models of integration of ICT in education with considerations of local circumstances. Tanzania as a nation should define levels of ICT integration and break them into goal oriented phases. For the government to know whether one model of instructional materials is a better choice than another, it must know which students are being exposed to which instructional materials. In the perspective of ICT in education planning, designing and deployment it is necessary to bring ICT into a familiar educational framework as a tool equally to textbooks and in time allow and pro-actively encourage the government to intentionally budget for them equally. It is clear that a balance is required between providing offline digital content resources, online content and online content creation tools that allow teachers and students to create and share their own teaching and learning contents.Item Information technology integration for socio-economic development(IGI Global, 2016) Tossy, TitusAs the developed world continues to become more digitized, lesser developed areas are starting to see more technological advancements being integrated into their society. These advancements are creating opportunities to improve both the economy and the lives of people within these areas. Information Technology Integration for Socio-Economic Development features theoretical concepts and best practices in the implementation of new technologies within developing areas around the world. Highlighting empirical research on the application of information technologies to bridge the digital divide within different countries, the book is ideally suited for technology developers, managers, and policy makers.Item Behavioral factors influencing partner trust in logistics collaboration: a review(Springer Berlin Heidelberg, 2016) Daudi, Morice; Hauge, Jannicke; Thoben, Klaus-DieterLogistics collaboration has emerged a prevalent strategy to mitigate challenge individuals and organizations encounter. A successful collaboration, however, depends on certain trustworthy behaviors partner exhibit. To that end, understanding aspects constituting behavioral uncertainty and mechanisms by which such aspects affect partner trust is a necessary. This necessity counts on emergent behavioral trust uncertainties, constituted by partner’s actions and interactions occurring during collaboration. While this is a necessary requirement, most of the studies in the literature lack to take into account the influence of behavioral uncertainty on collaboration and partner trust. To that effect, this paper uncovers outlined limitation by establishing behavioral factors influencing partner trust in operational stage of logistics collaboration. To accomplish this objective, a systematic literature review (SLR) is deployed to consolidate research domains of logistics, supply chain, collaboration, and trust. SLR proceeds by defining a review protocol, followed by a search process conducted in 5 databases using 20 search terms on articles published between 2001 and 2015 inclusively. Among findings this SLR has revealed are four behavioral factors and thirteen criteria proposed to affect partner trust. Additionally, these factors constitute success and measurable criteria needed for empirical investigation which may employ experimental and/or case-study methods. Moreover, synthesized factors extend further an understanding of behavioral trust in ad hoc collaborative networks, a large part of which being supported by networks of humans and computers.Item Effects of decision synchronization on trust in collaborative networks(Springer International Publishing, 2016) Daudi, Morice; Hauge, Jannicke; Thoben, Klaus-DieterIn collaborative networks, individual and organizational entities encounter many disagreements over many decisions rights. These disagreements procreate conflicting preferences, which in turn, affect trustworthy amongst partners. To that end, it becomes necessary that partners assume a degree of fairness on decision rights by calibrating positions which they initially consider a final. This calibration involves synchronizing partners’ conflicting preferences to a compromise. The objective of this paper, therefore, is to analyze and evaluate the effect of both, compromised and uncompromised preferences on trust. To achieve this, a corresponding behavioral trust model is proposed and evaluated empirically using a logistics collaboration scenario. This evaluation applies a multi-agent systems simulation method. The simulation involves 360 observations with three preferences set as predictor variables. Results show that irrespective of a degree to which conflicting preferences are synchronized, a magnitude of the generated effect on trust, depends as well on other factors like transport cost and extent to which vehicles are loaded. Additionally, if other factors are kept constant, compromised preferences affects trust more positively than uncompromised ones.Item On analysis of trust dynamics in supply chain collaboration(International Conference on Information Systems, 2016) Daudi, Morice; Hauge, Jannicke; Thoben, Klaus-DieterTrust is an essential asset to support Supply Chain Collaboration (SCC), and it is a complex construct of dynamic nature. This dynamic behavior stems from trust ability of changing forms or states over time. Due to this dynamicity, SCC requires that the partners have a clear understanding of how trust changes throughout the lifetime of their alliances. This understanding is necessary in building and maintaining trustworthy relationships in dynamic environments. However, the authors have found no framework that sufficiently describes trust dynamics in SCC. Thus, this research presents the first approach toward a holistic framework describing trust dynamics by considering distinct dimensions, forms, states and roles of trust. The trust framework describing aspects attributing to trust dynamics is applied in an industrial case involving change events accruing to trust dynamics.
- «
- 1 (current)
- 2
- 3
- »