WorldWideScience

Sample records for broken trust lessons

  1. Betrayed trust: healing a broken hospital through servant leadership.

    Science.gov (United States)

    Yancer, Deborah A

    2012-01-01

    An investigative reporter with The Washington Post broke the news of a no-confidence vote by the medical staff of a hospital in the suburbs of Washington, District of Columbia. The chaos that followed created a perfect storm for needed change and offered the rare opportunity for unbridled deep and creative collaboration. Issues the hospital faced as a result of this crisis and subsequent events that tested the authenticity of change are summarized. This article focuses on the approach used by the registered nurse chief executive officer (RN-CEO) to humanize the hospital, viewing it as though it were a patient and leading a clinical approach to organizational recovery and health. The relationship that developed between the medical staff leaders and the RN-CEO was pivotal to the hospital's recovery and evolved as a hybrid of servant leadership. Outcomes achieved over a 7-year period and attributable to this relational model are summarized. Finally, the RN-CEO shares lessons learned through experience and reflection and advice for nurses interested in pursuing executive leadership roles.

  2. Symanzik-Becchi-Rouet-Stora lessons on renormalizable models with broken symmetry: the case of Lorentz violation

    CERN Document Server

    Del Cima, Oswaldo M; Piguet, Olivier

    2016-01-01

    In this paper, we revisit the issue intensively studied in recent years on the generation of terms by radiative corrections in models with broken Lorentz symmetry. The algebraic perturbative method of handling the problem of renormalization of the theories with Lorentz symmetry breaking, is used. We hope to make clear the Symanzik's aphorism: "{\\it Whether you like it or not, you have to include in the lagrangian all counter terms consistent with locality and power-counting, unless otherwise constrained by Ward identities.}"

  3. Forms, Sources and Processes of Trust

    NARCIS (Netherlands)

    Nooteboom, B.

    2006-01-01

    This chapter reviews some key points in the analysis of trust, based on Nooteboom (2002)i.The following questions are addressed.What can we have trust in?What is the relation between trust and control?What are the sources of trust? And what are its limits?By what process is trust built up and broken

  4. Improving service quality in NHS Trust hospitals: lessons from the hotel sector.

    Science.gov (United States)

    Desombre, T; Eccles, G

    1998-01-01

    This article looks to review recent practice undertaken within the UK hotel sector to improve customer service, and suggests ideals that could be implemented within National Health (NHS) Trust hospitals. At a time of increasing competition, hotel firms are using service enhancement as a means to gain competitive advantage, and therefore developing a range of techniques to measure levels of service quality improvement. With continued change in the health service, where greater focus now lies with patient satisfaction, so there is a requirement for managers to adapt techniques presently being offered in other service industries to improve levels of customer service and ensure patients are targeted to define their levels of satisfaction. PMID:10177367

  5. Facts about Broken Bones

    Science.gov (United States)

    ... White House Lunch Recipes The Facts About Broken Bones KidsHealth > For Kids > The Facts About Broken Bones ... through the skin . continue What Happens When a Bone Breaks? It hurts to break a bone! It's ...

  6. The trust formula: Trust = fairness + leadership

    Energy Technology Data Exchange (ETDEWEB)

    Lovenheim, R. [Regulatory and Legislative Consultants, Inc., Rochester, NY (United States)

    1995-11-01

    Many state and compact LLW siting processes have been characterized by slippage and failure. The paper focuses on two major {open_quotes}lessons learned{close_quotes} regarding public interaction and trust, and how these lessons are being applied to current siting efforts. The relationship of environmental idealism and trust will be explored further in this paper. Supreme Court Justice Stephen Breyer concludes his 1994 book, Breaking the Vicious Circle by stating: {open_quotes}Finally, this book also reflects a belief that trust in institutions arises not simply as a result of openness in government, responses to local interest groups, or priorities emphasized in the press -- though these attitudes and actions play an important role -- but also from those institutions doing a difficult job well.{close_quotes}

  7. Trust in agile teams

    DEFF Research Database (Denmark)

    Tjørnehøj, Gitte; Fransgård, Mette; Skalkam, Signe

    2012-01-01

    of the problems of DSD. However important incompatibilities between the challenges of DSD and the key tenets of agility exist and achieving a beneficially balanced agile practice in DSD can be difficult. Trust could be the key to this, since trust is crucial for the necessary corporate behavior that leads to team...... success. This article reports from a study of two agile DSD teams with very different organization and collaboration patterns. It addresses the role of trust and distrust in DSD by analyzing how the team members’ trust developed and erode through the lifetime of the two collaborations and how management...... actions influenced this. We see two important lessons from the analysis. First the agile practices of daily Scrum and self organizing team can empower DSD teams to manage their own development of trust and thereby alleviate the obstacles of DSD. Second if management fails to support the development...

  8. Organizational trust or beyond appearances

    Directory of Open Access Journals (Sweden)

    Maria Dromereschi

    2010-12-01

    Full Text Available People and organizations to whom I am giving life to have an enormous need to trust and be trustworthy. Trust represents a fragile asset who needs to be invested in, which is difficult to obtain and takes time to obtain it, but which can be easily broken. Paradoxically, it is a universal trade currency, world-widely understood and appreciated. The relations based on trust are those which determine a company to grow and create a competitive advantage. Trust generates trust. It is the one that inspires and motivates, requires the preservation of a certain set of values, mainly sincerity, fairness, perseverance and a real preoccupation for meeting the needs of other people.

  9. Inferring trust

    NARCIS (Netherlands)

    Dastani, M.; Herzig, A.; Hulstijn, J.; Torre, L.W.N. van der

    2005-01-01

    In this paper we discuss Liau's logic of Belief, Inform and Trust (BIT), which captures the use of trust to infer beliefs from acquired information. However, the logic does not capture the derivation of trust from other notions. We therefore suggest the following two extensions. First, like Liau we

  10. Weakly broken galileon symmetry

    Energy Technology Data Exchange (ETDEWEB)

    Pirtskhalava, David [Scuola Normale Superiore, Piazza dei Cavalieri 7, 56126 Pisa (Italy); Santoni, Luca; Trincherini, Enrico [Scuola Normale Superiore, Piazza dei Cavalieri 7, 56126 Pisa (Italy); INFN, Sezione di Pisa, Piazza dei Cavalieri 7, 56126 Pisa (Italy); Vernizzi, Filippo [Institut de Physique Théorique, Université Paris Saclay, CEA, CNRS, Gif-sur-Yvette cédex, F-91191 (France)

    2015-09-01

    Effective theories of a scalar ϕ invariant under the internal galileon symmetryϕ→ϕ+b{sub μ}x{sup μ} have been extensively studied due to their special theoretical and phenomenological properties. In this paper, we introduce the notion of weakly broken galileon invariance, which characterizes the unique class of couplings of such theories to gravity that maximally retain their defining symmetry. The curved-space remnant of the galileon’s quantum properties allows to construct (quasi) de Sitter backgrounds largely insensitive to loop corrections. We exploit this fact to build novel cosmological models with interesting phenomenology, relevant for both inflation and late-time acceleration of the universe.

  11. How Cryptosystems Get Broken

    Institute of Scientific and Technical Information of China (English)

    Adi Shamir

    2009-01-01

    @@ It's all us pleasure to come to China.a great deal of cheerful times already.I hope that we have additional opportunity to meet,talk about cryptography and other components.Today I am going to give a general talk which is not designed for special lists,about how could the systems get broken like this.I think I don't assume you know much about cryptography and some of the basics.Cryptography deals with issue how to send secret information from a sender which is usually called Alice.to a receiver which is usually called Bob.The usual way how to encrypt data is to use an encryption box that accepts the plaintext,the plaintext is the message that you would like to send encrypted.It could be just"Good morning".By using a secret cryptographic key K,you put ciphertext which looks very very strange."zqvkj…".

  12. Rethinking trust.

    Science.gov (United States)

    Kramer, Roderick M

    2009-06-01

    Will we ever learn? We'd barely recovered from Enron and WorldCom before we faced the subprime mortgage meltdown and more scandals that shook our trust in businesspeople. Which raises the question: Do we trust too much? In this article, Stanford professor and social psychologist Kramer explores the reasons we trust so easily--and, often, so unwisely. He explains that genetics and childhood learning make us predisposed to trust and that it's been a good survival mechanism. That said, our willingness to trust makes us vulnerable. Our sense of trust kicks in on remarkably simple cues, such as when people look like us or are part of our social group. We also rely on third parties to verify the character of others, sometimes to our detriment (as the victims of Bernard Madoff learned). Add in our illusions of invulnerability and our tendencies to see what we want to see and to overestimate our own judgment, and the bottom line is that we're often easily fooled. We need to develop tempered trust. For those who trust too much, that means reading cues better; for the distrustful, it means developing more receptive behaviors. Everyone should start with small acts of trust that encourage reciprocity and build up. Having a hedge against potential abuses also helps. Hollywood scriptwriters, for instance, register their treatments with the Writers Guild of America to prevent their ideas from being stolen by the executives they pitch. To attract the right relationships, people must strongly signal their own honesty, proactively allay concerns, and, if their trust is abused, retaliate. Trusting individuals in certain roles, which essentially means trusting the system that selects and trains them, also works but isn't foolproof. And don't count on due diligence alone for protection; constant vigilance is needed to make sure the landscape hasn't changed. PMID:19496472

  13. After trust

    OpenAIRE

    Corsín Jiménez, Alberto

    2005-01-01

    Everybody talks about trust these days. Or rather, everybody talks about a crisis in public trust and its fatal consequences for the institutional organisation of society (e.g. O'Hara 2004; O'Neill 2002). Trust, so the argument goes, is one of our most precious social virtues and its disappearance or misuse threatens not only our moral order but the very foundations of our polity. The crisis in trust is indicative of the general crisis-society in which we live today (Strathern ...

  14. The affordances of broken affordances

    DEFF Research Database (Denmark)

    Grünbaum, Martin Gielsgaard; Simonsen, Jakob Grue

    2015-01-01

    important: how users may (i) achieve their goals in the presence of such broken affordances, and may (ii) repurpose or otherwise interact with artefacts with broken affordances. We argue that (A) thorough analyses of breakdowns of affordances and their associated signifiers and feedbacks have implication...

  15. Trust matters

    DEFF Research Database (Denmark)

    Østergaard, Lise Rosendal

    2015-01-01

    This article makes a contribution to the debate about health service utilisation and the role of trust in fostering demand for health services in sub-Saharan Africa. It is framed as a narrative literature review based on a thematic analysis of nine empirical, qualitative studies. For the purposes...... of this article trust is defined as a voluntary course of action, which involves the optimistic expectation that the trustee will do no harm to the trustor and is increasingly perceived as an important influence on health system functioning. The article looks at trust issues in interpersonal, intergroup...

  16. Universal lessons learned by a gastroenterologist from a deaf and mute patient: the importance of nonverbal communication and establishing patient rapport and trust.

    Science.gov (United States)

    Cappell, Mitchell S

    2009-01-01

    Deaf and mute patients may require minimal extra attention to establish trust and allay anxieties before minor medical maneuvers such as rectal examination. An extreme case is reported of the consequences from failure to accomplish this. A generally cooperative deaf and mute patient struggled and suffered a rectal tear and perforation during enema insertion that required emergency colorectal surgery; his nurse had failed to establish a trusting relationship before enema insertion. Ironically, the patient's physician had earlier easily performed digital rectal examination, a similar medical maneuver, with patient cooperation after establishing patient rapport. This report demonstrates the importance of treating individuals with disabilities like everyone else in addressing anxieties before medical maneuvers. The health care worker has the same responsibility of calming the patient, whether deaf or not; the sole difference is that communication between deaf and hearing requires greater skill and patience.

  17. Broken Bones, Sprains, and Strains (For Parents)

    Science.gov (United States)

    ... 5 Things to Know About Zika & Pregnancy Broken Bones, Sprains, and Strains KidsHealth > For Parents > Broken Bones, ... home. What to Do: For a Suspected Broken Bone: Do not move a child whose injury involves ...

  18. Broken toe - self-care

    Science.gov (United States)

    Fractured toe - self-care; Broken bone - toe - self-care; Fracture - toe - self-care; Fracture phalanx - toe ... often treated without surgery and can be taken care of at home. Severe injuries include: Breaks that ...

  19. Job loss and broken partnerships

    DEFF Research Database (Denmark)

    Kriegbaum, Margit; Christensen, Ulla; Lund, Rikke;

    2008-01-01

    The aim of this study was to investigate the effects of the accumulated number of job losses and broken partnerships (defined as the end of cohabitation) on the risk of fatal and nonfatal events of ischemic heart disease (IHD).......The aim of this study was to investigate the effects of the accumulated number of job losses and broken partnerships (defined as the end of cohabitation) on the risk of fatal and nonfatal events of ischemic heart disease (IHD)....

  20. Can we trust robots?

    NARCIS (Netherlands)

    Coeckelbergh, Mark

    2011-01-01

    Can we trust robots? Responding to the literature on trust and e-trust, this paper asks if the question of trust is applicable to robots, discusses different approaches to trust, and analyses some preconditions for trust. In the course of the paper a phenomenological-social approach to trust is arti

  1. 7 CFR 51.2717 - Broken.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Broken. 51.2717 Section 51.2717 Agriculture... Standards for Shelled Runner Type Peanuts Definitions § 51.2717 Broken. Broken means that more than one-fourth of the peanut kernel is broken off....

  2. 7 CFR 51.2759 - Broken.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Broken. 51.2759 Section 51.2759 Agriculture... Standards for Shelled Virginia Type Peanuts Definitions § 51.2759 Broken. Broken means that more than one-fourth of the peanut kernel is broken off....

  3. 46 CFR 9.8 - Broken periods.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Broken periods. 9.8 Section 9.8 Shipping COAST GUARD... § 9.8 Broken periods. In computing extra compensation where the services rendered are in broken periods and less than 2 hours intervene between such broken periods the time served should be...

  4. 7 CFR 51.2737 - Broken.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Broken. 51.2737 Section 51.2737 Agriculture... Standards for Grades of Shelled Spanish Type Peanuts Definitions § 51.2737 Broken. Broken means that more than one-fourth of the peanut kernel is broken off....

  5. Recovering from trust breakdowns in large system Implementations

    DEFF Research Database (Denmark)

    Schlichter, Bjarne Rerup; Andersen, Povl Erik Rostgård

    On the basis of experiences from the Faroese large-scale implementation of integrated healthcare information systems and insights into dynamic aspects of trust, we offer the following lessons learned for the successful management and recovery of trust (breakdowns) in large system implementations...

  6. Recovering from trust breakdowns in large system implementations

    DEFF Research Database (Denmark)

    Rerup Schlichter, Bjarne Rerup; Andersen, Povl Erik Rostgård

    2011-01-01

    On the basis of experiences from the Faroese large-scale implementation of integrated healthcare information systems and insights into dynamic aspects of trust, we offer the following lessons learned for the successful management and recovery of trust (breakdowns) in large system implementations...

  7. Trusted Domain

    DEFF Research Database (Denmark)

    Hjorth, Theis Solberg; Torbensen, Rune

    2012-01-01

    In the digital age of home automation and with the proliferation of mobile Internet access, the intelligent home and its devices should be accessible at any time from anywhere. There are many challenges such as security, privacy, ease of configuration, incompatible legacy devices, a wealth...... of wireless standards, limited resources of embedded systems, etc. Taking these challenges into account, we present a Trusted Domain home automation platform, which dynamically and securely connects heterogeneous networks of Short-Range Wireless devices via simple non-expert user. interactions, and allows...... that enables secure end-to-end communication with home automation devices, and it supports device revocations as well as a structure of intersecting sets of nodes for scalability. Devices in the Trusted Domain are registered in a list that is distributed using a robust epidemic protocol optimized...

  8. Trusted Objects

    Energy Technology Data Exchange (ETDEWEB)

    CAMPBELL,PHILIP L.; PIERSON,LYNDON G.; WITZKE,EDWARD L.

    1999-10-27

    In the world of computers a trusted object is a collection of possibly-sensitive data and programs that can be allowed to reside and execute on a computer, even on an adversary's machine. Beyond the scope of one computer we believe that network-based agents in high-consequence and highly reliable applications will depend on this approach, and that the basis for such objects is what we call ''faithful execution.''

  9. Broken Ergodicity in MHD Turbulence

    Science.gov (United States)

    Shebalin, John V.

    2010-01-01

    Ideal magnetohydrodynamic (MHD) turbulence may be represented by finite Fourier series, where the inherent periodic box serves as a surrogate for a bounded astrophysical plasma. Independent Fourier coefficients form a canonical ensemble described by a Gaussian probability density function containing a Hermitian covariance matrix with positive eigenvalues. The eigenvalues at lowest wave number can be very small, resulting in a large-scale coherent structure: a turbulent dynamo. This is seen in computations and a theoretical explanation in terms of 'broken ergodicity' contains Taylor s theory of force-free states. An important problem for future work is the case of real, i.e., dissipative flows. In real flows, broken ergodicity and coherent structure are still expected to occur in MHD turbulence at the largest scale, as suggested by low resolution simulations. One challenge is to incorporate coherent structure at the largest scale into the theory of turbulent fluctuations at smaller scales.

  10. Architecture of Trusted PC

    Institute of Scientific and Technical Information of China (English)

    WU Shuhua; ZHU Yuefei

    2006-01-01

    This paper, focusing on the trusted computing group's standards, explained the key concept of trusted computing and provided the architecture of trusted PC. It built trust bottom-up by starting with trusted hardware and adding layers of trusted software. It is a system-level solution available to all applications running on the member platforms. This solution reduces the security burden on applications and thus simplifies application programming.

  11. Broken Windows and Collective Efficacy

    Directory of Open Access Journals (Sweden)

    Aldrin Abdullah

    2015-01-01

    Full Text Available The broken windows thesis posits that signs of disorder increase crime and fear, both directly and indirectly. Although considerable theoretical evidence exists to support the idea that disorder is positively related to fear of crime, the empirical literature on examining the indirect effect of the individual’s perception of incivilities on fear of crime is limited, especially in developing countries. This research was conducted to assess the indirect relationship between perceived disorder and fear of crime through collective efficacy. A total of 235 households from Penang, Malaysia, participated in this study. Results reveal that high perception of disorder is negatively associated with collective efficacy. High collective efficacy is associated with low fear of crime. Moreover, a significant and indirect effect of disorder on fear of crime exists through collective efficacy. The results provide empirical support for the broken windows theory in the Malaysian context and suggest that both environmental conditions and interactions of residents play a role in the perceived fear of crime.

  12. Broken links and black boxes

    DEFF Research Database (Denmark)

    Sindbæk, Søren Michael

    2013-01-01

    Long-distance communication has emerged as a particular focus for archaeological exploration using network theory, analysis, and modelling. Initial attempts to adapt methods from social network analysis to archaeological data have, however, struggled to produce decisive results. This paper argues...... that the archaeological study of communication networks in the past calls for radically different analytical methods from those employed by most other forms of social network analysis. The fragmentary archaeological evidence presents researchers with the task of reconstructing the broken links of a ruined network from...... observable distributions and patterns of association in the archaeological record. In formal terms this is not a problem of network analysis, but network synthesis: the classic problem of cracking codes or reconstructing black-box circuits....

  13. Trust and Leadership

    DEFF Research Database (Denmark)

    Bordum, Anders

    2005-01-01

    The concept and phenomenon of trust and its relation to leadership has recently come into focus. What role does trust play? Can trust be created strategically? Questions like these are often raised. How we conceive of and conceptualize trust is not as often discussed. Among those conceptualizations...... flexibility of form for example, the idea that one with leadership tools can consciously bring forth trust. In the conclusion, the question about trust communication is addressed. In this section I argue that trust is positively value-laden, becausesincerity is a functional and pragmatic condition...

  14. Balancing Trust and Control

    DEFF Research Database (Denmark)

    Jagd, Søren

    This paper focuses on the leadership challenge of balancing trust and control. The relation between trust and control has for a long time been a puzzling issue for management researchers. In the paper I first show that there has been a dramatic change in the way the relation between trust...... and control has been conceptualized in trust research. While the relation between trust and control earlier was conceptualized as a more or less stable balance between trust and control, more recent research conceptualizes the relation between trust and control more as a dynamical process that involves...... an ongoing process of balancing the relation between trust and control. Second, taking the departure in the recent conceptualization of the balance between trust and control as an interactive process I discuss the challenges for management in handling this more subtle balancing of trust and control...

  15. Trust Responsiveness and Beliefs.

    OpenAIRE

    Gerardo A. Guerra; Zizzo, Daniel John

    2002-01-01

    Trust responsiveness is the tendency to fulfill trust because you believe that it has been placed on you. The experiment presented in this paper uses two simple trust games to measure directly or indirectly the robustness of trust responsiveness in three conditions: when beliefs are elicited and a summary of these beliefs is transmitted; when beliefs are elicited but not transmitted, when beliefs are not elicited. Insofar as we can tell, trust responsiveness is robust to our belief manipulati...

  16. Building trust

    International Nuclear Information System (INIS)

    'Activate' is the energy magazine for secondary schools and is part of the Education Programme which is managed on behalf of the British Nuclear Industry Forum by AEA Technology. activate is the flagship communication device between the British Nuclear Industry Forum's Education Programme and secondary schools in the UK. It was developed from a previous publication, Nuclear Bulletin. There is a need for the nuclear industry to build trust with teachers and students in the UK, where for a long time, everything that the industry has said, written or printed has been disregarded by school teachers as propaganda. Over the last few years the industry has put in a great deal of effort to position itself as a provider of educationally sound and socially acceptable information. 'Activate' was an evolution of this idea and there was a hole in the market for a lively, activity and article based magazine that could be used in the classroom. The target audience is principally teachers of science, mathematics and geography, but also includes teachers of art,, English and history with students of between 11 and 18. The results were very positive in that teachers appreciated the colourful and lively nature of activate and they felt that it provided information and opinions in an un biased and non-propagandist way. Their comments about layout, number of activities style of presentation were taken into account and during the summer of 1994 activate was remodelled ready for re launch in September. The feedback so far is good with more teachers signing up every week to receive their own free copy

  17. Dimensions of trust

    DEFF Research Database (Denmark)

    Frederiksen, Morten

    2012-01-01

    Georg Simmel is the seminal author on trust within sociology, but though inspired by Simmel, subsequent studies of intersubjective trust have failed to address Simmel’s suggestion that trust is as differentiated as the social relations of which it is part. Rather, trust has been studied within...... limited sets of exchange or work relations. This article revisits Simmel’s concept of trust as social form in order to investigate this differentiation. From an interview study, the differentiation and limits of trust are analysed within different types of social relations. Trust is found to vary greatly...... in scope and mode influenced by the intersecting dimensions of relations, objects and situations. Furthermore, trust exists between an outer threshold of expected deceit and an inner threshold of confident reliance. The findings from the qualitative study contribute new knowledge on the diversity of trust...

  18. Calculativeness and trust

    DEFF Research Database (Denmark)

    Frederiksen, Morten

    2014-01-01

    . Contrary to Williamson, however, Løgstrup’s contention is that trust, not calculativeness, is the default attitude and only when suspicion is awoken does trust falter. The paper argues that while Williamson’s distinction between calculativeness and trust is supported by phenomenology, the analysis needs......Williamson’s characterisation of calculativeness as inimical to trust contradicts most sociological trust research. However, a similar argument is found within trust phenomenology. This paper re-investigates Williamson’s argument from the perspective of Løgstrup’s phenomenological theory of trust...... to take actual subjective experience into consideration. It points out that, first, Løgstrup places trust alongside calculativeness as a different mode of engaging in social interaction, rather conceiving of trust as a state or the outcome of a decision-making process. Secondly, the analysis must take...

  19. 49 CFR 230.39 - Broken staybolts.

    Science.gov (United States)

    2010-10-01

    ..., DEPARTMENT OF TRANSPORTATION STEAM LOCOMOTIVE INSPECTION AND MAINTENANCE STANDARDS Boilers and Appurtenances Staybolts § 230.39 Broken staybolts. (a) Maximum allowable number of broken staybolts. No boiler shall be... inside the firebox or combustion chamber on a straight line. No boiler shall be allowed to remain...

  20. Looking for Trust

    DEFF Research Database (Denmark)

    Bøge, Ask Risom; Lauritsen, Peter

    Trust and surveillance are often seen as opposites. Trust is regularly characterized as the glue that holds society together, while surveillance is seen as corrosive. However, in Scandinavia high levels of trust and surveillance coexist. It is therefore interesting to investigate if there is a co......Trust and surveillance are often seen as opposites. Trust is regularly characterized as the glue that holds society together, while surveillance is seen as corrosive. However, in Scandinavia high levels of trust and surveillance coexist. It is therefore interesting to investigate...

  1. Modeling Trusted Computing

    Institute of Scientific and Technical Information of China (English)

    CHEN Shuyi; WEN Yingyou; ZHAO Hong

    2006-01-01

    In this paper, a formal approach based on predicate logic is proposed for representing and reasoning of trusted computing models. Predicates are defined to represent the characteristics of the objects and the relationship among these objects in a trusted system according to trusted computing specifications. Inference rules of trusted relation are given too. With the semantics proposed, some trusted computing models are formalized and verified, which shows that Predicate calculus logic provides a general and effective method for modeling and reasoning trusted computing systems.

  2. Reliable Design Versus Trust

    Science.gov (United States)

    Berg, Melanie; LaBel, Kenneth A.

    2016-01-01

    This presentation focuses on reliability and trust for the users portion of the FPGA design flow. It is assumed that the manufacturer prior to hand-off to the user tests FPGA internal components. The objective is to present the challenges of creating reliable and trusted designs. The following will be addressed: What makes a design vulnerable to functional flaws (reliability) or attackers (trust)? What are the challenges for verifying a reliable design versus a trusted design?

  3. Trust Drives Internet Use

    DEFF Research Database (Denmark)

    Ljunge, Jan Martin

    This paper estimates the effect of trust on internet use by studying the general population as well as second generation immigrants in 29 European countries with ancestry in 87 nations. There is a significant positive effect of trust on internet use. The positive trust effect is not universal...

  4. The productivity of trust

    DEFF Research Database (Denmark)

    Bjørnskov, Christian; Méon, Pierre-Guillaume

    This paper returns to one of the early questions of the literature on social trust, whether trust affects total factor productivity (TFP). Using both development and growth accounting, we find strong evidence of a causal effect of trust on the level and growth of TFP. Using a three-stage least...

  5. Trust in Strategic Alliances

    DEFF Research Database (Denmark)

    Nielsen, Bo

    2011-01-01

    . Emphasising the multi-dimensional and dynamic role of trust, the framework illustrates how initial levels of a particular type of trust may co-evolve with the alliance and influence subsequent phases of the relationship – either on its own or in combination with other types or dimensions of trust...

  6. The Process of Trust Development

    DEFF Research Database (Denmark)

    Jagd, Søren; Højland, Jeppe

    by high trust and co-operation? In this paper we explore the process of trust development during an organisational change project in a Danish SME by looking at two kinds of trust relations: employee trust in management and trust relations among employees. We find substantial differences in trust...

  7. Trust Based Pervasive Computing

    Institute of Scientific and Technical Information of China (English)

    LI Shiqun; Shane Balfe; ZHOU Jianying; CHEN Kefei

    2006-01-01

    Pervasive computing environment is a distributed and mobile space. Trust relationship must be established and ensured between devices and the systems in the pervasive computing environment. The trusted computing (TC) technology introduced by trusted computing group is a distributed-system-wide approach to the provisions of integrity protection of resources. The TC' notion of trust and security can be described as conformed system behaviors of a platform environment such that the conformation can be attested to a remote challenger. In this paper the trust requirements in a pervasive/ubiquitous environment are analyzed. Then security schemes for the pervasive computing are proposed using primitives offered by TC technology.

  8. Social Trust and Fractionalization:

    DEFF Research Database (Denmark)

    Bjørnskov, Christian

    2008-01-01

    a much larger country sample than in previous literature confirms that fractionalization in the form of income inequality and political diversity adversely affects social trust while ethnic diversity does not. However, these effects differ systematically across countries, questioning standard......This paper takes a closer look at the importance of fractionalization for the creation of social trust. It first argues that the determinants of trust can be divided into two categories: those affecting individuals' trust radii and those affecting social polarization. A series of estimates using...... interpretations of the influence of fractionalization on trust....

  9. Planning Lessons

    Institute of Scientific and Technical Information of China (English)

    Linda Jensen

    2007-01-01

    @@ Jensen's "Lesson Planning"article serves aS a guide fOr novice teachers who need to create formalized lesson plans.The article covers why,when,and how teachers plan lessons,as well aS basic lesson plan principles and a lesson plan template.

  10. Nobel Prize for work on broken symmetries

    CERN Multimedia

    2008-01-01

    The 2008 Nobel Prize for Physics goes to three physicists who have worked on broken symmetries in particle physics. The announcement of the 2008 Nobel Prize for physics was transmitted to the Globe of Science and Innovation via webcast on the occasion of the preview of the Nobel Accelerator exhibition.On 7 October it was announced that the Royal Swedish Academy of Sciences had awarded the 2008 Nobel Prize for physics to three particle physicists for their fundamental work on the mechanisms of broken symmetries. Half the prize was awarded to Yoichiro Nambu of Fermilab for "the discovery of the mechanism of spontaneous broken symmetry in subatomic physics". The other half is shared by Makato Kobayashi of Japan’s KEK Institute and Toshihide Maskawa of the Yukawa Institute at the University of Kyoto "for the discovery of the origin of the broken symmetry which predicts the existence of at least three families of quarks in Nature". At th...

  11. Balancing Trust and Control

    DEFF Research Database (Denmark)

    Jagd, Søren

    2010-01-01

    The purpose of this paper is to show that conceptualizing trust and control as interactively related processes, as opposed to more static conceptualizations of the two concepts and the relations between them, adds importantly towards understanding the challenges involved in balancing of trust...... and control in organizations. The paper examines recent literature on the conceptualization of the relation between trust and control in and between organizations. The literature review shows that trust and control has been conceptualized as either substituting or complementing each other. Further......, it is found that the complementary/substitution debate calls for an explicit conceptualization of the relation between trust and control as an interactive process, in contrast to earlier conceptualizations of trust and control as two relatively static and isolated concepts. While the static perspective...

  12. Trust, Innovation and Prosperity

    OpenAIRE

    Stanislav Szabo; Vojtech Ferencz; Andreja Pucihar

    2013-01-01

    Economic development and its determinants, esp. trust or innovation are subjects of several scientific studies. Several authors claim the importance of innovation for economic development. Some studies identified that one of the most crucial factor for economic growth and prosperity is the trust between people. Within the research in this paper we have tried to identify the role of interpersonal trust within the innovation vs. prosperity relation. For this purpose and for causality analysis, ...

  13. Trust in interprofessional collaboration

    Science.gov (United States)

    Gregory, Paul A. M.; Austin, Zubin

    2016-01-01

    Background: Trust is integral to effective interprofessional collaboration. There has been scant literature characterizing how trust between practitioners is formed, maintained or lost. The objective of this study was to characterize the cognitive model of trust that exists between pharmacists and family physicians working in collaborative primary care settings. Methods: Pharmacists and family physicians who work collaboratively in primary care were participants in this study. Family health teams were excluded from this study because of the distinct nature of these settings. Through a snowball convenience sampling method, a total of 11 pharmacists and 8 family physicians were recruited. A semistructured interview guide was used to guide discussion around trust, relationships and collaboration. Constant-comparative coding was used to identify themes emerging from these data. Results: Pharmacists and family physicians demonstrate different cognitive models of trust in primary care collaboration. For pharmacists, trust appears to be conferred on physicians based on title, degree, status and positional authority. For family physicians, trust appears to be earned based on competency and performance. These differences may lead to interprofessional tension when expectations of reciprocal trust are not met. Conclusions: Further work in characterizing how trust is developed in interprofessional relationships is needed to support effective team formation and functioning.

  14. Trusting is for doing: on goals, mindsets, and trust

    OpenAIRE

    Johansen, Svein Tvedt; Selart, Marcus; Espedal, Bjarne; Grønhaug, Kjell

    2014-01-01

    In this paper we seek to disentangle goals and trust, and argue that people’s goals while interacting with other people is likely to influence the experience of trust. This again builds on the assumptions that trust is not merely a basis for decisions but a factor that influences (often favorably) other valued outcomes. Our experience of trust helps us display trust which furthers relational goals (e.g. developing work-relationships). Thus, this paper adopts a pragmatic perspective on trust (...

  15. The Duty to Trust and the Duty to be Trustful

    OpenAIRE

    Origgi, Gloria

    2009-01-01

    Trust is a complex attitude that has emotional, cognitive and moral dimensions. A difficulty to reduce trust to a simple emotional attitude is that trust raises normative pressures: if someone asks you to be trusted you feel the normative pressure of not letting him or her down, and if someone trusts you, you feel the normative pressure of honoring his or her trust. These normative pressures seem to have an irreducibly social character: pressures are effective insofar as they may raise emotio...

  16. Softly Broken Supersymmetric Gauge Theories through Compactifications

    CERN Document Server

    Takenaga, K

    1998-01-01

    Effects of boundary conditions of fields for compactified space directions on the supersymmetric gauge theories are discussed. For general and possible boundary conditions the supersymmetry is explicitly broken to yield universal soft supersymmetry breaking terms, and the gauge symmetry of the theory can also be broken through the dynamics of non-integrable phases, depending on number and the representation under the gauge group of matters. The 4-dimensional supersymmetric QCD is studied as a toy model when one of the space coordinates is compactified on $S^1$.

  17. 75 FR 40820 - City of Broken Bow, Oklahoma; Project No. 12470-001-Oklahoma Broken Bow Re-Regulation Dam...

    Science.gov (United States)

    2010-07-14

    ... Energy Regulatory Commission City of Broken Bow, Oklahoma; Project No. 12470-001--Oklahoma Broken Bow Re... included in, or eligible for inclusion in, the National Register of Historic Places at the Broken Bow Re..., 2010, for the Broken Bow Re-Regulation Dam Hydroelectric Project No. 12470 is revised to add...

  18. 75 FR 33802 - City of Broken Bow, OK; Broken Bow Re-Regulation Dam; Hydropower Project; Notice of Proposed...

    Science.gov (United States)

    2010-06-15

    ... Energy Regulatory Commission City of Broken Bow, OK; Broken Bow Re-Regulation Dam; Hydropower Project... eligible for inclusion in, the National Register of Historic Places at the Broken Bow Re-Regulation Dam... the Broken Bow Re-Regulation Dam Hydropower Project would be fulfilled through the...

  19. Trust and Financial Crisis Experiences

    OpenAIRE

    Carin van der Cruijsen; Jakob De Haan; David-Jan Jansen

    2013-01-01

    Using eight annual surveys from the Netherlands between 2006 and 2013, we examine whether financial crisis experiences affect trust in banks, trust in the banking supervisor, and generalized trust. Adverse experiences during the financial crisis do not only directly lower trust in banks, but also have a negative effect on generalized trust. Customers of a bank that ran into problems have less trust in banks than respondents without this experience. Our results also indicate that respondents w...

  20. Does trust pay off?

    NARCIS (Netherlands)

    R. de Bliek (Ruben)

    2012-01-01

    textabstractIt is believed that a society's level of trust in strangers, also known as generalized or interpersonal trust, is an accurate reflection of the quality of civil society and of the success of its accompanying economy. Two unresolved issues remain. The first issue concerns the generalizabi

  1. Trust vs. Crisis

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    2014-01-01

    to judge whom to trust. One logical solution to a crisis is to rebuild a shared understanding of the norms involved in any given context. Banking is used as a case. Central concepts are borrowed from Niklas Luhmann Trust (1968), Alf Ross Directives and Norms (1967), and Arthur G. Neal National Trauma...

  2. Trust, Innovation and Prosperity

    Directory of Open Access Journals (Sweden)

    Stanislav Szabo

    2013-12-01

    Full Text Available Economic development and its determinants, esp. trust or innovation are subjects of several scientific studies. Several authors claim the importance of innovation for economic development. Some studies identified that one of the most crucial factor for economic growth and prosperity is the trust between people. Within the research in this paper we have tried to identify the role of interpersonal trust within the innovation vs. prosperity relation. For this purpose and for causality analysis, we have applied decision tree models. Through our analysis of country based data (involved in trust related WVS surveys in opposition to current studies, we have identified, that interpersonal trust is more significant determinant of innovation development as prosperity.

  3. Monopoles and strings in broken symmetry

    International Nuclear Information System (INIS)

    When a U(1) gauge theory is spontaneously broken, work has shown that a monopole cannot exist isolated but must be attached to a string carrying both energy and a quantized magnetic flux. The authors wish to consider whether and how this result can be generalized to non-abelian theories. (author)

  4. Broken windows, mediocre methods, and substandard statistics

    NARCIS (Netherlands)

    J.M. Wicherts; M. Bakker

    2013-01-01

    Broken windows theory states that cues of inappropriate behavior like litter or graffiti amplify norm-violating behavior. In a series of quasi-experiments, Keizer, Lindenberg, and Steg altered cues of inappropriate behavior in public places and observed how many passersby subsequently violated norms

  5. Responses to Broken Promises: Does Personality Matter?

    Science.gov (United States)

    Ho, Violet T.; Weingart, Laurie R.; Rousseau, Denise M.

    2004-01-01

    This paper examined the effects of personality traits on individuals' reactions to broken promises. We studied the effects of Neuroticism and Agreeableness on emotive and cognitive responses to breach and investigated whether these effects varied across different types (economic vs. social) and severity (high vs. low) of breach. We collected data…

  6. PERIODIC-SOLUTIONS IN SPONTANEOUSLY BROKEN THEORIES

    NARCIS (Netherlands)

    BRIHAYE, Y; KUNZ, J

    1992-01-01

    A class of spontaneously broken field theories is proposed, and the occurrence of their periodic, classical solutions is investigated in detail. The emergence of multiple solutions is observed, their normal modes of oscillation are studied, and the bifurcations of the classical energy functional are

  7. Broken Scale Invariance and Anomalous Dimensions

    Science.gov (United States)

    Wilson, K. G.

    1970-05-01

    Mack and Kastrup have proposed that broken scale invariance is a symmetry of strong interactions. There is evidence from the Thirring model and perturbation theory that the dimensions of fields defined by scale transformations will be changed by the interaction from their canonical values. We review these ideas and their consequences for strong interactions.

  8. Ratchet device with broken friction symmetry

    DEFF Research Database (Denmark)

    Norden, Bengt; Zolotaryuk, Yaroslav; Christiansen, Peter Leth;

    2002-01-01

    An experimental setup (gadget) has been made for demonstration of a ratchet mechanism induced by broken symmetry of a dependence of dry friction on external forcing. This gadget converts longitudinal oscillating or fluctuating motion into a unidirectional rotation, the direction of which is in...

  9. Trust and Wellbeing

    Directory of Open Access Journals (Sweden)

    John F. Helliwell

    2011-01-01

    Full Text Available

    This paper presents new evidence linking trust and subjective wellbeing, based primarily on data from the Gallup World Poll and cycle 17 of the Canadian General Social Survey (GSS17. Because several of the general explanations for subjective wellbeing examined here show large and significant linkages to both household income and various measures of trust, it is possible to estimate income-equivalent compensating differentials for different types of trust. Measures of trust studied include general social trust, trust in management, trust in co-workers, trust in neighbours, and trust in police. In addition, some Canadian surveys and the Gallup World Poll ask respondents to estimate the chances that a lost wallet would be returned to them if found by different individuals, including neighbours, police and strangers.

    Our results reveal strong linkages between several trust measures and subjective well-being, as well as strong linkages between social trust and two major global causes of death—suicides and traffic fatalities. This suggests the value of learning more about how trust can be built and maintained, or repaired where it has been damaged. We therefore use data from the Canadian GSS17 to analyze personal and neighbourhood characteristics, including education, migration history, and mobility, that help explain differences in trust

  10. Trust transitivity in social networks

    CERN Document Server

    Richters, Oliver

    2010-01-01

    Non-centralized recommendation-based decision making is a central feature of several social and technological processes, such as market dynamics, peer-to-peer file-sharing and the web of trust of digital certification. We investigate the properties of trust propagation on networks, based on a simple metric of trust transitivity. We investigate analytically the percolation properties of trust transitivity in random networks with arbitrary degree distribution, and compare with numerical realizations. We find that the existence of a non-zero fraction of absolute trust (i.e. entirely confident trust) is a requirement for the viability of global trust propagation in large systems: The average pair-wise trust is marked by a discontinuous transition at a specific fraction of absolute trust, below which it vanishes. Furthermore, we perform an extensive analysis of the Pretty Good Privacy (PGP) web of trust, in view of the concepts introduced. We compare different scenarios of trust distribution: community- and author...

  11. Quantifying and Qualifying Trust: Spectral Decomposition of Trust Networks

    NARCIS (Netherlands)

    Pavlovic, D.

    2010-01-01

    In a previous FAST paper, I presented a quantitative model of the process of trust building, and showed that trust is accumulated like wealth: the rich get richer. This explained the pervasive phenomenon of adverse selection of trust certificates, as well as the fragility of trust networks in genera

  12. Autonomy, Trust, and Respect.

    Science.gov (United States)

    Nys, Thomas

    2016-02-01

    This article seeks to explore and analyze the relationship between autonomy and trust, and to show how these findings could be relevant to medical ethics. First, I will argue that the way in which so-called "relational autonomy theories" tie the notions of autonomy and trust together is not entirely satisfying Then, I will introduce the so-called Encapsulated Interest Account as developed by Russell Hardin. This will bring out the importance of the reasons for trust. What good reasons do we have for trusting someone? I will criticize Hardin's business model as insufficiently robust, especially in the context of health care, and then turn to another source of trust, namely, love. It may seem that trust-through-love is much better suited for the vulnerability that is often involved in health care, but I will also show that it has its own deficiencies. Good health care should therefore pay attention to both models of trust, and I will offer some tentative remarks on how to do this. PMID:26668168

  13. Chimpanzees Trust Their Friends.

    Science.gov (United States)

    Engelmann, Jan M; Herrmann, Esther

    2016-01-25

    The identification and recruitment of trustworthy partners represents an important adaptive challenge for any species that relies heavily on cooperation [1, 2]. From an evolutionary perspective, trust is difficult to account for as it involves, by definition, a risk of non-reciprocation and defection by cheaters [3, 4]. One solution for this problem is to form close emotional bonds, i.e., friendships, which enable trust even in contexts where cheating would be profitable [5]. Little is known about the evolutionary origins of the human tendency to form close social bonds to overcome the trust problem. Studying chimpanzees (Pan troglodytes), one of our closest living relatives, is one way of identifying these origins. While a growing body of research indicates that at least some of the properties of close human relationships find parallels in the social bonds of chimpanzees [6-10] and that chimpanzees extend favors preferentially toward selected individuals [11-14], it is unclear whether such interactions are based on trust. To fill this gap in knowledge, we observed the social interactions of a group of chimpanzees and established dyadic friendship relations. We then presented chimpanzees with a modified, non-verbal version of the human trust game and found that chimpanzees trust their friends significantly more frequently than their non-friends. These results suggest that trust within closely bonded dyads is not unique to humans but rather has its evolutionary roots in the social relationships of our closest primate relatives. PMID:26776735

  14. Trusted dynamic level scheduling based on Bayes trust model

    Institute of Scientific and Technical Information of China (English)

    WANG Wei; ZENG GuoSun

    2007-01-01

    A kind of trust mechanism-based task scheduling model was presented. Referring to the trust relationship models of social persons, trust relationship is built among Grid nodes, and the trustworthiness of nodes is evaluated by utilizing the Bayes method. Integrating the trustworthiness of nodes into a Dynamic Level Scheduling (DLS) algorithm, the Trust-Dynamic Level Scheduling (Trust-DLS) algorithm is proposed. Theoretical analysis and simulations prove that the Trust-DLS algorithm can efficiently meet the requirement of Grid tasks in trust, sacrificing fewer time costs, and assuring the execution of tasks in a security way in Grid environment.

  15. Trust repertoires for collaboration

    DEFF Research Database (Denmark)

    Fuglsang, Lars

    This case study analyses the role of trust in a public private innovation network that involved a private consultancy company as a facilitator. We know that collaboration is a important for innovation, and that collaboration across organizational boundaries is not a trivial issue. But we know very...... little about how such processes develop and how trust, understood as “confident positive expectations” (Lewicki et al. 1998) to collaborative activities, arises out of collaboration. The paper contributes by showing how trust and collaboration are intertwined. The main finding is that a facilitator can...

  16. Trust vs. Crisis

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    2014-01-01

    The three social phenomena -- norms, trust, and crisis -- are in this paper combined into one model that illustrates their function and relationship. Crisis is seen as a reaction to serious violations of expectations that leave people disoriented, insecure about situational norms, and unable...... to judge whom to trust. One logical solution to a crisis is to rebuild a shared understanding of the norms involved in any given context. Banking is used as a case. Central concepts are borrowed from Niklas Luhmann Trust (1968), Alf Ross Directives and Norms (1967), and Arthur G. Neal National Trauma...

  17. Competition Fosters Trust

    DEFF Research Database (Denmark)

    Huck, Steffen; Lünser, Gabriele; Tyran, Jean-Robert Karl

    2012-01-01

    We study the effects of reputation and competition in a trust game. If trustees are anonymous, outcomes are poor: trustees are not trustworthy, and trustors do not trust. If trustees are identifiable and can, hence, build a reputation, efficiency quadruples but is still at only a third of the first...... best. Adding more information by granting trustors access to all trustees' complete history has, somewhat surprisingly, no effect. On the other hand, we find that competition, coupled with some minimal information, eliminates the trust problem almost completely...

  18. Trust and Credit

    DEFF Research Database (Denmark)

    Harste, Gorm

    The present paper is an answer to the question, how did trust and credit emerge. The systems of trust and credit reduce the environmental and contextual complexities in which trust and credit are embedded. The paper analyses the forms of this reduction in a number of stages in the evolution...... of history from the present risk of modern systems back to early modernity, the Reformation and the high medieval Revolutions in law, organization and theology. It is not a history of economics, but a history of the conditions of some communication codes used in economic systems....

  19. Trust vs. Crisis

    Directory of Open Access Journals (Sweden)

    Kirsten Mogensen

    2014-06-01

    Full Text Available The three social phenomena -- norms, trust, and crisis -- are in this paper combined into one model that illustrates their function and relationship. Crisis is seen as a reaction to serious violations of expectations that leave people disoriented, insecure about situational norms, and unable to judge whom to trust. One logical solution to a crisis is to rebuild a shared understanding of the norms involved in any given context. Banking is used as a case. Central concepts are borrowed from Niklas Luhmann Trust (1968, Alf Ross Directives and Norms (1967, and Arthur G. Neal National Trauma & Collective Memory (1998.

  20. Broken Ergodicity in Ideal, Homogeneous, Incompressible Turbulence

    Science.gov (United States)

    Morin, Lee; Shebalin, John; Fu, Terry; Nguyen, Phu; Shum, Victor

    2010-01-01

    We discuss the statistical mechanics of numerical models of ideal homogeneous, incompressible turbulence and their relevance for dissipative fluids and magnetofluids. These numerical models are based on Fourier series and the relevant statistical theory predicts that Fourier coefficients of fluid velocity and magnetic fields (if present) are zero-mean random variables. However, numerical simulations clearly show that certain coefficients have a non-zero mean value that can be very large compared to the associated standard deviation. We explain this phenomena in terms of broken ergodicity', which is defined to occur when dynamical behavior does not match ensemble predictions on very long time-scales. We review the theoretical basis of broken ergodicity, apply it to 2-D and 3-D fluid and magnetohydrodynamic simulations of homogeneous turbulence, and show new results from simulations using GPU (graphical processing unit) computers.

  1. Development of Trusted Computing Research

    Institute of Scientific and Technical Information of China (English)

    ZHANG Huanguo; LUO Jie; JIN Gang; ZHU Zhiqiang; YU Fajiang; YAN Fei

    2006-01-01

    Trusted computing is the new trend of information security today. This paper surveys the theory and technology of trusted computing. The development history of trusted computing, and the development of trusted computing in China are introduced in this paper,and then it analyzes some problems of trusted computing at present which are delay in theory research, some key technologies to be developed and lack of trusted software system. Some fields are worthy to be explored on are pointed out including key technology, basic theory and application in trusted computing.

  2. Theory of broken gauge symmetry of families

    International Nuclear Information System (INIS)

    A theoretical scheme is considered, based on the gauge spontaneously-broken SU(3)H symmetry of families. The generation of quark and lepton masses is induced by their mixing with hypothetical superheavy fermions, providing a relationship of the observed mass hierarchy and mixing of quarks and leptons with the structure of horizontal symmetry breaking. The model predicts the existance of invisible axion, being simultaneously familon and Majoron, as well as the existence of neutrino Majorana mass hierarchy

  3. Trusts and Financialization

    DEFF Research Database (Denmark)

    Harrington, Brooke

    2016-01-01

    This article identifies trusts as a legal structure associated with the global spread of financialization. Although trusts originated in Medieval England, they have acquired a new significance in contemporary finance by virtue of their advantages in terms of 10 profit maximization and capital...... mobility. As a result, trusts have become common in contemporary structured finance for corporations, in addition to their traditional functions as estate planning and asset protection vehicles for high-net-worth individuals. This article specifies three ways in which the trust structure has facilitated...... the global spread of financialization: by privileging the rentier–investor within the 15 world economy; by perpetuating a distinctively Anglo-American approach to finance internationally; and by increasing the autonomy of finance vis-a-vis the nation-state. This study shares the primarily descriptive...

  4. Some correlates of trust.

    Science.gov (United States)

    Frost, T; Stimpson, D V; Maughan, M R

    1978-05-01

    Trust has been variously defined by behavioral scientists and not very thoroughly investigated. In this study trust was defined as an expectancy held by an individual that the behavior of another person or a group would be altruistic and personally beneficial. An attempt was made, using this conceptual definition, to identify some personality and behavioral correlates of trust. Seven interpersonal relations groups with approximately 10 male and female undergraduates per group were studied with use of the Janis and Field self-esteem inventory, Schutz's FIRO-B scale, and the Rotter internal-external scale. It was discovered that a trusted person is one who is highly influential, has an internal locus of control, a low need to control others, high self-esteem, and is open to being influenced by others.

  5. Broken Heart Syndrome: A Typical Case.

    Science.gov (United States)

    Therkleson, Tessa; Stronach, Shona

    2015-12-01

    This case describes a combination external treatment for "Broken Heart Syndrome" that includes a lavender footbath, massage using moor extract, and oxalis ointment to the abdomen applied by an Anthroposophic nurse for a specific personality type. Lavender footbaths have been used since ancient times for relaxation and calming, while moor extract has been used medicinally in Europe since the middle ages for warmth and environmental protection. Rhythmical massage using moor extract and oxalis ointment poultice to the abdomen are part of the tradition of Anthroposophic nursing when managing stress induced by emotional and physical trauma. An elderly lady with specific characteristics diagnosed as Broken Heart Syndrome received one treatment a week for 4 weeks given by an Anthroposophic nurse at an integrative medical center. Between treatments, education was given to enable self-treatment in the home. The nursing treatments, each using lavender footbaths, moor extract massage, and oxalis ointment poultice to the abdomen, proved very effect, and no negative effects were reported. External applications need to be considered by nurses caring for specific personality types with Broken Heart Syndrome. PMID:25673580

  6. Trust and virtual worlds

    DEFF Research Database (Denmark)

    Ess, Charles; Thorseth, May

    2011-01-01

    We collect diverse philosophical analyses of the issues and problems clustering around trust online with specific attention to establishing trust in virtual environments. The book moves forward important discussions of how virtual worlds and virtuality are to be defined and understood; the role...... by virtuality, such as virtual child pornography. The introduction further develops a philosophical anthropology, rooted in Kantian ethics, phenomenology, virtue ethics, and feminist perspectives, that grounds a specific approach to ethical issues in virtual environments....

  7. Organizational Identity and Trust

    OpenAIRE

    Puusa, Anu; Tolvanen, Ulla

    2006-01-01

    This paper focuses on organizational identity and trust. The paper is being created from a theoretical point of view. Exploring concept and their interrelation is important and valuable scientific work with the purpose of better understanding their meaning and interrelation. This kind of conceptual and theoretical examination has an important task as a basis for theorizing and theory creation. Both identity and trust are multilevel notions. Both concepts describe an abstract phenomenon ...

  8. Trusted Computing Technologies, Intel Trusted Execution Technology.

    Energy Technology Data Exchange (ETDEWEB)

    Guise, Max Joseph; Wendt, Jeremy Daniel

    2011-01-01

    We describe the current state-of-the-art in Trusted Computing Technologies - focusing mainly on Intel's Trusted Execution Technology (TXT). This document is based on existing documentation and tests of two existing TXT-based systems: Intel's Trusted Boot and Invisible Things Lab's Qubes OS. We describe what features are lacking in current implementations, describe what a mature system could provide, and present a list of developments to watch. Critical systems perform operation-critical computations on high importance data. In such systems, the inputs, computation steps, and outputs may be highly sensitive. Sensitive components must be protected from both unauthorized release, and unauthorized alteration: Unauthorized users should not access the sensitive input and sensitive output data, nor be able to alter them; the computation contains intermediate data with the same requirements, and executes algorithms that the unauthorized should not be able to know or alter. Due to various system requirements, such critical systems are frequently built from commercial hardware, employ commercial software, and require network access. These hardware, software, and network system components increase the risk that sensitive input data, computation, and output data may be compromised.

  9. A New Trust Evaluation for Trust-based RS

    Directory of Open Access Journals (Sweden)

    Sajjawat Charoenrien

    2014-01-01

    Full Text Available Trust-based recommender systems provide the recommendations on the most suitable items for the individual users by using the trust values from their trusted friends. Usually, the trust values are obtained directly from the users, or by calculated using the similarity values between the pair of users. However, the current trust value evaluation can cause the following three problems. First, it is difficult to identify the co-rated items for calculating the similarity values between the users. Second, the current trust value evaluation still has symmetry property which makes the same trust value on both directions (trustor and trustee. Finally, the current trust value evaluation does not focus on how to adjust the trust values for the remote user. To eliminate all of these problems, our purposed method consists of three new factors. First, the similarity values between the users are calculated using a latent factor model instead of the co-rated items. Second, in order to identify the trustworthiness for every user in trust network, the degrees of reliability are calculated. Finally, we use the number of hops for adjusting the trust value for the remote users who are expected to be low trust as shown in the real-world application concept. This trust evaluation leads to better predicted rating and getting more predictable ratings. Consequently, from our experiment, the more efficiency trust-based recommender system is obtained, comparing with the classical method on both accuracy and coverage.

  10. 7 CFR 868.254 - Broken kernels determination.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Broken kernels determination. 868.254 Section 868.254 Agriculture Regulations of the Department of Agriculture (Continued) GRAIN INSPECTION, PACKERS AND STOCKYARD... Governing Application of Standards § 868.254 Broken kernels determination. Broken kernels shall...

  11. 46 CFR 9.9 - Two hours between broken periods.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Two hours between broken periods. 9.9 Section 9.9... COMPENSATION FOR OVERTIME SERVICES § 9.9 Two hours between broken periods. Where 2 hours or more intervene between broken periods, one-half day's extra pay will be allowed for each distinct 2-hour period or...

  12. 7 CFR 868.304 - Broken kernels determination.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Broken kernels determination. 868.304 Section 868.304 Agriculture Regulations of the Department of Agriculture (Continued) GRAIN INSPECTION, PACKERS AND STOCKYARD... Application of Standards § 868.304 Broken kernels determination. Broken kernels shall be determined by the...

  13. 7 CFR 51.2125 - Split or broken kernels.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Split or broken kernels. 51.2125 Section 51.2125... STANDARDS) United States Standards for Grades of Shelled Almonds Definitions § 51.2125 Split or broken kernels. Split or broken kernels means seven-eighths or less of complete whole kernels but which will...

  14. Trust transitivity in social networks.

    Directory of Open Access Journals (Sweden)

    Oliver Richters

    Full Text Available Non-centralized recommendation-based decision making is a central feature of several social and technological processes, such as market dynamics, peer-to-peer file-sharing and the web of trust of digital certification. We investigate the properties of trust propagation on networks, based on a simple metric of trust transitivity. We investigate analytically the percolation properties of trust transitivity in random networks with arbitrary in/out-degree distributions, and compare with numerical realizations. We find that the existence of a non-zero fraction of absolute trust (i.e. entirely confident trust is a requirement for the viability of global trust propagation in large systems: The average pair-wise trust is marked by a discontinuous transition at a specific fraction of absolute trust, below which it vanishes. Furthermore, we perform an extensive analysis of the Pretty Good Privacy (PGP web of trust, in view of the concepts introduced. We compare different scenarios of trust distribution: community- and authority-centered. We find that these scenarios lead to sharply different patterns of trust propagation, due to the segregation of authority hubs and densely-connected communities. While the authority-centered scenario is more efficient, and leads to higher average trust values, it favours weakly-connected "fringe" nodes, which are directly trusted by authorities. The community-centered scheme, on the other hand, favours nodes with intermediate in/out-degrees, in detriment of the authorities and its "fringe" peers.

  15. Trusted Translation Services

    Science.gov (United States)

    Atif, Yacine; Serhani, Mohamed Adel; Campbell, Piers; Mathew, Sujith Samuel

    Administering multilingual Web sites and applications reliably, involves interconnected and multipart tasks, where trust in the involved parties and content translation sources is paramount. Published Web sites may reflect content from databases, content management systems and other repositories to manage related Web content. But a Web site mirrored wholly or selectively onto a target language version requires streamlined trusted processes. Traditionally, files are translated and transferred via FTP, e-mail, or other communication means. Similarly, translation instructions are communicated between involved parties through verbal instruction, e-mail, and instruction files lead to a variety of inconsistencies and lack of trust in the translation process. This paper proposes a Web service approach to streamline the translation processes and an integration of trust properties in the proposed translation Web services. Web Services have been instrumental in handling problems inherent to systems integration, allowing web-based systems to converse and communicate data automatically. The OASIS Translation Web Services Technical Committee has released a standard way for Web Services to serve the translation and localization business. This article proposes a framework to centralize translation services at a reputable source providing a workflow and a mechanism to quantify service trust. An implementation of the framework is also described in the context of a localization case study.

  16. Effective theories with broken flavour symmetry

    International Nuclear Information System (INIS)

    The work of Ovrut and Schnitzer on effective theories derived from a non Abelian Gauge Theory is generalised to include the physically interesting case of broken flavour symmetry. The calculations are performed at the 1-loop level. It is shown that at an intermediate stage in the calculations two distinct renormalised gauge coupling constants appear, one describing gauge field coupling to heavy particles and the other describing coupling to light particles. Appropriately modified Slavnov-Taylor identities are shown to hold. A simple alternative to the Ovrut-Schnitzer rules for calculating with effective theories is also considered

  17. Broken Lifshitz invariance, spin waves and hydrodynamics

    CERN Document Server

    Roychowdhury, Dibakar

    2016-01-01

    In this paper, based on the basic principles of thermodynamics, we explore the hydrodynamic regime of interacting Lifshitz field theories in the presence of broken rotational invariance. We compute the entropy current and discover new dissipative effects those are consistent with the principle of local entropy production in the fluid. In our analysis, we consider both the parity even as well as the parity odd sector upto first order in the derivative expansion. Finally, we argue that the present construction of the paper could be systematically identified as that of the hydrodynamic description associated with \\textit{spin waves} (away from the domain of quantum criticality) under certain limiting conditions.

  18. Rotating optical microcavities with broken chiral symmetry

    CERN Document Server

    Sarma, Raktim; Wiersig, Jan; Cao, Hui

    2014-01-01

    We demonstrate in open microcavities with broken chiral symmetry, quasi-degenerate pairs of co-propagating modes in a non-rotating cavity evolve to counter-propagating modes with rotation. The emission patterns change dramatically by rotation, due to distinct output directions of CW and CCW waves. By tuning the degree of spatial chirality, we maximize the sensitivity of microcavity emission to rotation. The rotation-induced change of emission is orders of magnitude larger than the Sagnac effect, pointing to a promising direction for ultrasmall optical gyroscopes.

  19. Neutrino masses and spontaneously broken flavor symmetries

    Energy Technology Data Exchange (ETDEWEB)

    Staudt, Christian

    2014-06-16

    We study the phenomenology of supersymmetric flavor models. We show how the predictions of models based on spontaneously broken non-Abelian discrete flavor symmetries are altered when we include so-called Kaehler corrections. Furthermore, we discuss anomaly-free discrete R symmetries which are compatible with SU(5) unification. We find a set of symmetries compatible with suppressed Dirac neutrino masses and a unique symmetry consistent with the Weinberg operator. We also study a pseudo-anomalous U(1){sub R} symmetry which explains the fermion mass hierarchies and, when amended with additional singlet fields, ameliorates the fine-tuning problem.

  20. Trust Models in Ubiquitous Computing

    DEFF Research Database (Denmark)

    Nielsen, Mogens; Krukow, Karl; Sassone, Vladimiro

    2008-01-01

    We recapture some of the arguments for trust-based technologies in ubiquitous computing, followed by a brief survey of some of the models of trust that have been introduced in this respect. Based on this, we argue for the need of more formal and foundational trust models.......We recapture some of the arguments for trust-based technologies in ubiquitous computing, followed by a brief survey of some of the models of trust that have been introduced in this respect. Based on this, we argue for the need of more formal and foundational trust models....

  1. Fuzzy Model for Trust Evaluation

    Institute of Scientific and Technical Information of China (English)

    Zhang Shibin; He Dake

    2006-01-01

    Based on fuzzy set theory, a fuzzy trust model is established by using membership function to describe the fuzziness of trust. The trust vectors of subjective trust are obtained based on a mathematical model of fuzzy synthetic evaluation. Considering the complicated and changeable relationships between various subjects, the multi-level mathematical model of fuzzy synthetic evaluation is introduced. An example of a two-level fuzzy synthetic evaluation model confirms the feasibility of the multi-level fuzzy synthesis evaluation model. The proposed fuzzy model for trust evaluation may provide a promising method for research of trust model in open networks.

  2. Quantifying and qualifying trust: Spectral decomposition of trust networks

    CERN Document Server

    Pavlovic, Dusko

    2010-01-01

    In a previous FAST paper, I presented a quantitative model of the process of trust building, and showed that trust is accumulated like wealth: the rich get richer. This explained the pervasive phenomenon of adverse selection of trust certificates, as well as the fragility of trust networks in general. But a simple explanation does not always suggest a simple solution. It turns out that it is impossible to alter the fragile distribution of trust without sacrificing some of its fundamental functions. A solution for the vulnerability of trust must thus be sought elsewhere, without tampering with its distribution. This observation was the starting point of the present paper. It explores different methods for securing trust: not by redis- tributing, but by qualifying it. The methods used to break privacy can be used to secure trust.

  3. Trust in media information

    Directory of Open Access Journals (Sweden)

    Miquel Rodrigo

    2003-06-01

    Full Text Available For Miquel Rodrigo, cultural diversity places informative discourse in a crisis because it needs new categories to explain reality, and these categories are not always shared by journalists and by those who receive the information. Instead of gaining an easy trust drawnfrom stereotypes, he proposes, as a better way of overcoming the crisis, fostering the existence of sceptical readers. The media interprets social phenomena with its personal and professional limitations. The sceptical reader is one who knows why the media says what it says and understands that its truths are not absolute, since all ways of seeing are ways of concealing. The relationship between scepticism and trust is that which opposes a blind, acrylic and capitulating trust.

  4. Governance, Trust and Taxes

    DEFF Research Database (Denmark)

    Weihe, Guri; Joensen, E. Juanna Schröter

    This paper examines the role of social capital (trust) vis-à-vis the propensity of a country to be a tax haven. The empirical analysis corroborates that better governed countries have a higher ceteris paribus probability to be tax havens. However, social capital counteracts the effect of governance...... quality. This effect is so strong that the partial effect of governance quality is reversed for countries with the trust index in the top quartile – making these high trust countries less likely to be tax havens – even as governance quality is increased. Thus it is crucial to consider the interaction...... between institutions and social capital, since the same governance institutions have a different impact on the tax haven propensity for countries with different social capital....

  5. Managing healthcare information: analyzing trust.

    Science.gov (United States)

    Söderström, Eva; Eriksson, Nomie; Åhlfeldt, Rose-Mharie

    2016-08-01

    Purpose - The purpose of this paper is to analyze two case studies with a trust matrix tool, to identify trust issues related to electronic health records. Design/methodology/approach - A qualitative research approach is applied using two case studies. The data analysis of these studies generated a problem list, which was mapped to a trust matrix. Findings - Results demonstrate flaws in current practices and point to achieving balance between organizational, person and technology trust perspectives. The analysis revealed three challenge areas, to: achieve higher trust in patient-focussed healthcare; improve communication between patients and healthcare professionals; and establish clear terminology. By taking trust into account, a more holistic perspective on healthcare can be achieved, where trust can be obtained and optimized. Research limitations/implications - A trust matrix is tested and shown to identify trust problems on different levels and relating to trusting beliefs. Future research should elaborate and more fully address issues within three identified challenge areas. Practical implications - The trust matrix's usefulness as a tool for organizations to analyze trust problems and issues is demonstrated. Originality/value - Healthcare trust issues are captured to a greater extent and from previously unchartered perspectives. PMID:27477934

  6. Absorption of solar radiation in broken clouds

    Energy Technology Data Exchange (ETDEWEB)

    Zuev, V.E.; Titov, G.A.; Zhuravleva, T.B. [Institute of Atmospheric Optics, Tomsk (Russian Federation)

    1996-04-01

    It is recognized now that the plane-parallel model unsatisfactorily describes the transfer of radiation through broken clouds and that, consequently, the radiation codes of general circulation models (GCMs) must be refined. However, before any refinement in a GCM code is made, it is necessary to investigate the dependence of radiative characteristics on the effects caused by the random geometry of cloud fields. Such studies for mean fluxes of downwelling and upwelling solar radiation in the visible and near-infrared (IR) spectral range were performed by Zuev et al. In this work, we investigate the mean spectral and integrated absorption of solar radiation by broken clouds (in what follows, the term {open_quotes}mean{close_quotes} will be implied but not used, for convenience). To evaluate the potential effect of stochastic geometry, we will compare the absorption by cumulus (0.5 {le} {gamma} {le} 2) to that by equivalent stratus ({gamma} <<1) clouds; here {gamma} = H/D, H is the cloud layer thickness and D the characteristic horizontal cloud size. The equivalent stratus clouds differ from cumulus only in the aspect ratio {gamma}, all the other parameters coinciding.

  7. Competition Fosters Trust

    DEFF Research Database (Denmark)

    Huck, Steffen; Ruchala, Gabriele K.; Tyran, Jean-Robert

    We study the effects of reputation and competition in a stylized market for experience goods. If interaction is anonymous, such markets perform poorly: sellers are not trustworthy, and buyers do not trust sellers. If sellers are identifiable and can, hence, build a reputation, efficiency quadruples...... but is still at only a third of the first best. Adding more information by granting buyers access to all sellers’ complete history has, somewhat surprisingly, no effect. On the other hand, we find that competition, coupled with some minimal information, eliminates the trust problem almost completely...

  8. Trust and Social Commerce

    Directory of Open Access Journals (Sweden)

    Julia Y. Lee

    2016-01-01

    The Article focuses on the rise of “social commerce,” a socio-economic phenomenon centered on the use of social media and other modes of social connection in electronic commerce. It identifies three mechanisms that are central to the development of trust in social commerce: communication and voluntary disclosure; barriers to entry; and community policing. These mechanisms simulate the characteristics of closely-knit environments, creating conditions conducive to trust. The Article describes these mechanisms in four new commercial settings: the sharing economy; next generation electronic commerce; online escort services; and online black markets in credit cards and controlled substances.

  9. A matter of trust

    DEFF Research Database (Denmark)

    Smed, Sinne; Andersen, Laura Mørch; Kærgård, Niels;

    2013-01-01

    This article shows that trust in the organic label as well as perceived positive health effects of consumption of organic products have positive causal effects on actual organic consumption. Furthermore perceived positive environmental effects and perceived better animal welfare related to organic...... in 2002 and again in 2007. The results point towards that the most efficient way of increasing organic consumption seems to be to continuously increasing the trust in the organic label and/or to document the positive health effects of organic food by e.g. focussing on measurable things such as a lower...... frequency of findings of pesticide residues in organic foods compared to conventional foods....

  10. Provenance and Trust

    OpenAIRE

    Garijo Verdejo, Daniel; Corcho, Oscar; Gómez-Pérez, A.

    2010-01-01

    The interest in data provenance and trust has been increasing in the last years and the community is putting now a lot of effort in finding a standard model representation. The W3C provenance incubator group is focused on this area, analyzing different provenance models and making mappings between them and the Open Provenance Model (OPM)[1], which is the model they intend to make the standard. We want to develop a provenance system based in OPM and a trust algorithm from that provenance in...

  11. The Determinants of Trust

    DEFF Research Database (Denmark)

    Bjørnskov, Christian

    of a series of social and economic phenomena. The early literature was unavoidably indiscriminate as to distinguishing between the various elements of social capital, but more recent literature has stressed the need to distinguish between the constituent elements of Putnam’s social capital concept...... that the empirical associations between social trust and e.g. education or rule of law reflect the reverse causal direction, i.e. that trust has caused part of the cross-country differences in these factors. The aim of this paper is to assess the impact of a number of the central factors proposed in the literature...

  12. Trusted cloud computing

    CERN Document Server

    Krcmar, Helmut; Rumpe, Bernhard

    2014-01-01

    This book documents the scientific results of the projects related to the Trusted Cloud Program, covering fundamental aspects of trust, security, and quality of service for cloud-based services and applications. These results aim to allow trustworthy IT applications in the cloud by providing a reliable and secure technical and legal framework. In this domain, business models, legislative circumstances, technical possibilities, and realizable security are closely interwoven and thus are addressed jointly. The book is organized in four parts on "Security and Privacy", "Software Engineering and

  13. The Process of Trust Development

    DEFF Research Database (Denmark)

    Jagd, Søren; Højland, Jeppe

    Trust is critical for the quality of social interaction especially in organisations based on employee cooperation and empowerment. An important question is how organisations pass from a situation with low trust between management and employees and among employees to a situation characterised by...... high trust and co-operation? In this paper we explore the process of trust development during an organisational change project in a Danish SME by looking at two kinds of trust relations: employee trust in management and trust relations among employees. We find substantial differences in trust in...... group' of employees in the project coordination group, by a change of attitude towards employees by management during the project, by the specific actions taken by management as a response to employee complains and by the creation of occasions such as employee seminars where employees can meet and...

  14. Understanding Trust in Financial Services

    DEFF Research Database (Denmark)

    Hansen, Torben

    2012-01-01

    Although the financial crisis has elevated the interest for factors such as consumer financial healthiness, broad-scope trust, financial knowledge, and consumer relationship satisfaction, no existing model describes how these factors may influence consumer financial relationship trust....... This research extends prior research by developing a conceptual framework explaining how these constructs affect consumers' trust in their financial service provider. Based on two surveys comprising 764 pension consumers and 892 mortgage consumers, respectively, the results of this study indicate that financial...... healthiness, broad-scope trust, knowledge, and satisfaction positively affect narrow-scope trust in financial services. Furthermore, it is found that broad-scope trust negatively moderates the relationships between financial healthiness and narrow-scope trust and between satisfaction and narrow-scope trust...

  15. Incremental Trust in Grid Computing

    DEFF Research Database (Denmark)

    Brinkløv, Michael Hvalsøe; Sharp, Robin

    2007-01-01

    This paper describes a comparative simulation study of some incremental trust and reputation algorithms for handling behavioural trust in large distributed systems. Two types of reputation algorithm (based on discrete and Bayesian evaluation of ratings) and two ways of combining direct trust and ...... of Grid computing systems....

  16. Constitutional Verbosity and Social Trust

    DEFF Research Database (Denmark)

    Bjørnskov, Christian; Voigt, Stefan

    2014-01-01

    A common argument in the trust literature is that high-trust cultures allow efficient commercial contracts to be shorter, covering fewer contingencies. We take this idea to the topic of social contracts. Specifically, we ask whether social trust affects the length and detail of constitutions. Cro...

  17. Trust It or Trash It?

    Science.gov (United States)

    Trust It or Trash It? About | Contact | Español Tab 1 Tab 2 What is Trust It or Trash It? This is a tool to help you think ... here for the developer version. Home Who Said It? Who wrote it? Think about TRUSTING IT if: ...

  18. Trusting Relationships in International Politics

    DEFF Research Database (Denmark)

    Keating, Vincent Charles; Ruzicka, Jan

    2014-01-01

    How can trusting relationships be identified in international politics? The recent wave of scholarship on trust in International Relations answers this question by looking for one or the combination of three indicators – the incidence of cooperation; discourses expressing trust; or the calculated...

  19. Trust in the Contemporary Principalship

    Science.gov (United States)

    Noonan, Brian; Walker, Keith; Kutsyuruba, Benjamin

    2008-01-01

    The social relevance of trust and the principals' obligation to foster trust in schools have been strongly advocated. This paper describes an in-depth, qualitative study that engaged a group of twenty-five Canadian school principals over a period of seven months, exploring the issues of trust as it affects principals' roles and responsibilities.…

  20. Why Teachers Trust School Leaders

    Science.gov (United States)

    Handford, Victoria; Leithwood, Kenneth

    2013-01-01

    Purpose: Trust among teachers in schools is significantly related to student achievement and trust in school leaders is an important influence on such trust. The purpose of this study is to identify leadership practices which teachers interpret as signs of trustworthiness on the part of their principals. Design/methodology/approach: Evidence for…

  1. Reclaiming the Public Trust.

    Science.gov (United States)

    Bok, Derek

    1994-01-01

    The former president of Harvard University (Massachusetts) argues that college and university public relations specialists must attempt to understand what underlies the public's concerns about higher education, rather than simply to react to individual complaints. To reclaim public trust, higher education's leaders must consider carefully how they…

  2. Trust transparency and PPP

    NARCIS (Netherlands)

    Lousberg, L.H.M.J.; Noorderhaven, N.

    2014-01-01

    This paper argues how transparency can increase trust and therefore indirectly enhances the results of Public Private Partnerships in complex construction projects. Complex construction projects, e.g. large infrastructure or urban development projects, with public client organizations and private co

  3. Trust, Collegiality, and Community

    Science.gov (United States)

    DeShaw, Michele

    2009-01-01

    The purpose of this study was to examine and describe the role of trust, a complex and understudied aspect of working relationships, among teachers in smaller learning communities (SLC). Based on a review of the literature, four kinds of interpersonal professional relationships were defined and described from individualism to community. An…

  4. Initial Formation of Trust

    DEFF Research Database (Denmark)

    Schärfe, Henrik; Dougerthery, Elizabeth Ann

    2011-01-01

    In this paper we present a study of how touch may be used as a way of inducing trust in the meeting with a teloperated android, the Geminoid-DK. The use of hapics with Gestalt-based 'Balance Theory' is used as a persuasive desing of the interaction between human and robot. Balance theory includes...

  5. Effective Action of Softly Broken Supersymmetric Theories

    CERN Document Server

    Nibbelink, S G; Nibbelink, Stefan Groot; Nyawelo, Tino S.

    2007-01-01

    We study the renormalization of (softly) broken supersymmetric theories at the one loop level in detail. We perform this analysis in a superspace approach in which the supersymmetry breaking interactions are parameterized using spurion insertions. We comment on the uniqueness of this parameterization. We compute the one loop renormalization of such theories by calculating superspace vacuum graphs with multiple spurion insertions. To preform this computation efficiently we develop algebraic properties of spurion operators, that naturally arise because the spurions are often surrounded by superspace projection operators. Our results are general apart from the restrictions that higher super covariant derivative terms and some finite effects due to non-commutativity of superfield dependent mass matrices are ignored. One of the soft potentials induces renormalization of the Kaehler potential.

  6. Restoring broken entanglement by injecting separable correlations

    CERN Document Server

    Pirandola, Stefano

    2012-01-01

    The distribution of entanglement is central in many protocols of quantum information and computation. However it is also known to be a very fragile process when loss and noise come into play. The inevitable interaction of the quantum systems with the external environment induces effects of decoherence which may be so strong to destroy any input entanglement, a phenomenon known as "entanglement breaking". Here we study this catastrophic process in a correlated-noise environment showing how the presence of classical-type correlations can restore the distribution of entanglement. In particular, we consider a Gaussian environment whose thermal noise is strong enough to break the entanglement of two bosonic modes of the electromagnetic field. In this scenario, we show that the injection of separable correlations from the same environment is able to reactivate the broken entanglement. This paradoxical effect happens both in schemes of direct distribution, where a third party (Charlie) broadcasts entangled states to...

  7. Effects of broken affordance on visual extinction.

    Science.gov (United States)

    Wulff, Melanie; Humphreys, Glyn W

    2015-01-01

    Previous studies have shown that visual extinction can be reduced if two objects are positioned to "afford" an action. Here we tested if this affordance effect was disrupted by "breaking" the affordance, i.e., if one of the objects actively used in the action had a broken handle. We assessed the effects of broken affordance on recovery from extinction in eight patients with right hemisphere lesions and left-sided extinction. Patients viewed object pairs that were or were not commonly used together and that were positioned for left- or right-hand actions. In the unrelated pair conditions, either two tools or two objects were presented. In line with previous research (e.g., Riddoch et al., 2006), extinction was reduced when action-related object pairs and when unrelated tool pairs were presented compared to unrelated object pairs. There was no significant difference in recovery rate between action-related (object-tool) and unrelated tool pairs. In addition, performance with action-related objects decreased when the tool appeared on the ipsilesional side compared to when it was on the contralesional side, but only when the tool handle was intact. There were minimal effects of breaking the handle of an object rather than a tool, and there was no effect of breaking the handle on either tools or objects on single item trials. The data suggest that breaking the handle of a tool lessens the degree to which it captures attention, with this attentional capture being strongest when the tool appears on the ipsilesional side. The capture of attention by the ipsilesional item then reduces the chance of detecting the contralesional stimulus. This attentional capture effect is mediated by the affordance to the intact tool.

  8. Effects of broken affordance on visual extinction

    Directory of Open Access Journals (Sweden)

    Melanie eWulff

    2015-09-01

    Full Text Available Previous studies have shown that visual extinction can be reduced if two objects are positioned to afford an action. Here we tested if this affordance effect was disrupted by breaking the affordance – if one of the objects actively used in the action had a broken handle. We assessed the effects of broken affordance on recovery from extinction in eight patients with right hemisphere lesions and left-sided extinction. Patients viewed object pairs that were or were not commonly used together and that were positioned for left- or right-hand actions. In the unrelated pair conditions, either two tools or two objects were presented. In line with previous research (e.g., Riddoch et al., 2006, extinction was reduced when action-related object pairs and when unrelated tool pairs were presented compared to unrelated object pairs. There was no significant difference in recovery rate between action-related (object-tool and unrelated tool-tool pairs. In addition, performance with action-related objects decreased when the tool appeared on the ipsilesional side compared to when it was on the contralesional side, but only when the tool handle was intact. There were minimal effects of breaking the handle of an object rather than a tool, and there was no effect of breaking the handle on either tools or objects on single item trials. The data suggest that breaking the handle of a tool lessens the degree to which it captures attention, with this attentional capture being strongest when the tool appears on the ipsilesional side. The capture of attention by the ipsilesional item then reduces the chance of detecting the contralesional stimulus. This attentional capture effect is mediated by the affordance to the intact tool.

  9. Modified broken rice starch as fat substitute in sausages

    Directory of Open Access Journals (Sweden)

    Valéria Maria Limberger

    2011-09-01

    Full Text Available The demand for low-fat beef products has led the food industry to use fat substitutes such as modified starch. About 14% of broken rice is generated during processing. Nevertheless, this by-product contains high levels of starch; being therefore, great raw material for fat substitution. This study evaluated the applicability of chemically and physically modified broken rice starch as fat substitute in sausages. Extruded and phosphorylated broken rice was used in low-fat sausage formulation. All low-fat sausages presented about 55% reduction in the fat content and around 28% reduction in the total caloric value. Fat replacement with phosphorylated and extruded broken rice starch increased the texture acceptability of low-fat sausages, when compared to low-fat sausages with no modified broken rice. Results suggest that modified broken rice can be used as fat substitute in sausage formulations, yielding lower caloric value products with acceptable sensory characteristics.

  10. HMM-based Trust Model

    DEFF Research Database (Denmark)

    ElSalamouny, Ehab; Nielsen, Mogens; Sassone, Vladimiro

    2010-01-01

    Probabilistic trust has been adopted as an approach to taking security sensitive decisions in modern global computing environments. Existing probabilistic trust frameworks either assume fixed behaviour for the principals or incorporate the notion of ‘decay' as an ad hoc approach to cope with thei...... the major limitation of existing Beta trust model. We show the consistency of the HMM-based trust model and contrast it against the well known Beta trust model with the decay principle in terms of the estimation precision....

  11. Modeling trust context in networks

    CERN Document Server

    Adali, Sibel

    2013-01-01

    We make complex decisions every day, requiring trust in many different entities for different reasons. These decisions are not made by combining many isolated trust evaluations. Many interlocking factors play a role, each dynamically impacting the others.? In this brief, 'trust context' is defined as the system level description of how the trust evaluation process unfolds.Networks today are part of almost all human activity, supporting and shaping it. Applications increasingly incorporate new interdependencies and new trust contexts. Social networks connect people and organizations throughout

  12. Homo economicus belief inhibits trust.

    Science.gov (United States)

    Xin, Ziqiang; Liu, Guofang

    2013-01-01

    As a foundational concept in economics, the homo economicus assumption regards humans as rational and self-interested actors. In contrast, trust requires individuals to believe partners' benevolence and unselfishness. Thus, the homo economicus belief may inhibit trust. The present three experiments demonstrated that the direct exposure to homo economicus belief can weaken trust. And economic situations like profit calculation can also activate individuals' homo economicus belief and inhibit their trust. It seems that people's increasing homo economicus belief may serve as one cause of the worldwide decline of trust. PMID:24146907

  13. Homo economicus belief inhibits trust.

    Directory of Open Access Journals (Sweden)

    Ziqiang Xin

    Full Text Available As a foundational concept in economics, the homo economicus assumption regards humans as rational and self-interested actors. In contrast, trust requires individuals to believe partners' benevolence and unselfishness. Thus, the homo economicus belief may inhibit trust. The present three experiments demonstrated that the direct exposure to homo economicus belief can weaken trust. And economic situations like profit calculation can also activate individuals' homo economicus belief and inhibit their trust. It seems that people's increasing homo economicus belief may serve as one cause of the worldwide decline of trust.

  14. Trust and New Communication Technologies

    DEFF Research Database (Denmark)

    Ess, Charles

    2010-01-01

    philosophical analyses of trust online by first offering an introductory taxonomy of diverse accounts of trust that have emerged over the past decade or so. In the face of important objections to the possibility of establishing and fostering trust in online environments – objections that emerge especially from...... with a summary of some additional reasons for optimism regarding trust online, followed by a final question that emerges out of recent CMC research on social networking sites (SNSs) that poses, I argue, fundamental challenges indeed to how we understand and may foster and experience trust online.......I approach philosophical analyses of the phenomenon of trust vis-à-vis online communication, beginning with an overview from within the framework of computer-mediated communication (CMC) of concerns and paradigmatic failures of trust in the history of online communication. I turn to more directly...

  15. Social Trust of Virtual Identities

    Science.gov (United States)

    Seigneur, Jean-Marc

    Most other chapters of this book discuss computational models of trust in broader terms, giving definitions of trust, explaining how trust should evolve over time, surveying the different facets of trust .On the other hand, this chapter has a clear focus on the important element of identity in computational trust mechanisms. Trust and reputation are easier to form in face-to-face situations than in situations involving the use of computers and networks because the identity of the trustee is more difficult to verify. In this chapter, the different means to recognise virtual identities are surveyed. Next, their integration into computational trust engines is discussed, especially according to four main requirements: Adaptability, Security, Usability and Privacy (ASUP).

  16. Lesson on Demand. Lesson Plan.

    Science.gov (United States)

    Weaver, Sue

    This lesson plan helps students understand the role consumer demand plays in the market system, i.e., how interactions in the marketplace help determine pricing. Students will participate in an activity that demonstrates the concepts of demand, demand schedule, demand curve, and the law of demand. The lesson plan provides student objectives;…

  17. Trust in Internet Election

    DEFF Research Database (Denmark)

    Markussen, Randi; Ronquillo, Lorena; Schürmann, Carsten

    2014-01-01

    This paper discusses the Decryption and Counting Ceremony held in conjunction with the internet voting trial on election day in the Ministry of Local Government and Regional Development of Norway in 2013. We examine the organizers' ambition of making the decryption and counting of electronic votes...... public in order to sustain trust in internet voting. We introduce a pragmatic approach to trust that emphasises the inseparability of truth from witnessing it. Based on this and on a description of how the event was made observable and how the complexities in the counting process were disclosed, we...... discuss what we term economy of truth from the perspective of the IT community involved in the ceremony. We claim that broadening the economy of truth by including more explicitly social and political perspectives in the ceremony, and in internet elections in general, and how witnessing is brought about...

  18. Trust and Corruption

    DEFF Research Database (Denmark)

    Graeff, Peter; Svendsen, Gert Tinggaard

    2013-01-01

    Why are the Scandinavian countries in the European Union significantly richer than South-ern/Eastern European countries? We try to answer this question from an empirical social capital perspective. In particular, we are interested in the interplay of social trust as a positive and corruption...... capital by applying a path model that accounts for Granger-like causal effects. Our empirical results, referring to a sample of up to 25 EU countries, show that corruption might harm poor European countries but is not able to affect social trust. However, corruption in itself means that resources end up...... in the wrong places and not in socioeconomically optimal investments. There is, therefore, a direct damaging effect of corruption on wealth. This implies that economic actors have to invest higher transaction and control costs which will bind resources to non-productive purposes and thus destroy economic...

  19. Trust and Estate Planning

    DEFF Research Database (Denmark)

    Harrington, Brooke

    2012-01-01

    , these professionals keep a significant portion of the world’s private wealth beyond the reach of the state. Trust and estate planning thus contributes to creating and maintaining socioeconomic inequality on a global scale. The significance of the profession has grown as wealth itself has become more fungible......, spurring innovation in legal, organizational, and financial strategies, and thwarting a myriad of laws and policies designed to limit enduring inequality in modern, democratic societies....

  20. Trust in anthropology

    OpenAIRE

    Corsín Jiménez, Alberto

    2011-01-01

    The article explores some of the assumptions behind the current valence of the notion of trust and in particular its entanglement in discourses of social robustness, the management and reporting of (corporate) knowledge, and its underlying culture and systems of responsibility. It unfolds by contrasting classic and contemporary anthropological work on cultures of suspicion, culpability and spiritual ambiguity with the new vocabulary of capitalist corporate ethics. Finally, the argument examin...

  1. Trust in Digital Repositories

    Directory of Open Access Journals (Sweden)

    Elizabeth Yakel

    2013-06-01

    Full Text Available ISO 16363:2012, Space Data and Information Transfer Systems - Audit and Certification of Trustworthy Digital Repositories (ISO TRAC, outlines actions a repository can take to be considered trustworthy, but research examining whether the repository’s designated community of users associates such actions with trustworthiness has been limited. Drawing from this ISO document and the management and information systems literatures, this paper discusses findings from interviews with 66 archaeologists and quantitative social scientists. We found similarities and differences across the disciplines and among the social scientists. Both disciplinary communities associated trust with a repository’s transparency. However, archaeologists mentioned guarantees of preservation and sustainability more frequently than the social scientists, who talked about institutional reputation. Repository processes were also linked to trust, with archaeologists more frequently citing metadata issues and social scientists discussing data selection and cleaning processes. Among the social scientists, novices mentioned the influence of colleagues on their trust in repositories almost twice as much as the experts. We discuss the implications our findings have for identifying trustworthy repositories and how they extend the models presented in the management and information systems literatures.

  2. Fully Countering Trusting Trust through Diverse Double-Compiling

    CERN Document Server

    Wheeler, David A

    2010-01-01

    An Air Force evaluation of Multics, and Ken Thompson's Turing award lecture ("Reflections on Trusting Trust"), showed that compilers can be subverted to insert malicious Trojan horses into critical software, including themselves. If this "trusting trust" attack goes undetected, even complete analysis of a system's source code will not find the malicious code that is running. Previously-known countermeasures have been grossly inadequate. If this attack cannot be countered, attackers can quietly subvert entire classes of computer systems, gaining complete control over financial, infrastructure, military, and/or business systems worldwide. This dissertation's thesis is that the trusting trust attack can be detected and effectively countered using the "Diverse Double-Compiling" (DDC) technique, as demonstrated by (1) a formal proof that DDC can determine if source code and generated executable code correspond, (2) a demonstration of DDC with four compilers (a small C compiler, a small Lisp compiler, a small malic...

  3. Gluons as Goldstone Bosons when Flavor Symmetry is Broken Spontaneously

    CERN Document Server

    Törnqvist, N A

    1997-01-01

    The mechanism where flavor symmetry is broken spontaneously is discussed within a scalar QCD model with effective three-meson couplings. For sufficiently large coupling the model is unstable with respect to quantum loops from mesonic vacuum polarization. It is argued that color and gluons naturally can account for the Goldstone degrees of freedom expected when flavor symmetry is spontaneously broken.

  4. Planck driven by vision, broken by war

    CERN Document Server

    Brown, Brandon R

    2015-01-01

    Planck's Law, an equation used by physicists to determine the radiation leaking from any object in the universe, was described by Albert Einstein as "the basis of all twentieth-century physics." Max Planck is credited with being the father of quantum theory, and his work laid the foundation for our modern understanding of matter and energetic processes. But Planck's story is not well known, especially in the United States. A German physicist working during the first half of the twentieth century, his library, personal journals, notebooks, and letters were all destroyed with his home in World War II. What remains, other than his contributions to science, are handwritten letters in German shorthand, and tributes from other scientists of the time, including his close friend Albert Einstein. In Planck: Driven by Vision, Broken by War, Brandon R. Brown interweaves the voices and writings of Planck, his family, and his contemporaries-with many passages appearing in English for the first time-to create a portrait of...

  5. A Cosmological Mass Function with Broken Hierarchy

    CERN Document Server

    Lee, J

    2006-01-01

    We construct an analytic formalism for the mass function of cold dark matter halos, assuming that there is a break in the hierarchical merging process. According to this {\\it broken-hierarchy} scenario, due to the inherent nature of the gravitational tidal field the formation of massive pancakes precedes that of dark halos of low-mass. In the framework of the Zel'dovich approximation which generically predicts the presence of pancakes, we first derive analytically the conditional probability that a low-mass halo observed at present epoch was embedded in an isolated pancake at some earlier epoch. Then, we follow the standard Press-Schechter approach to count analytically the number density of low-mass halos that formed through anti-hierarchical fragmentation of the massive pancakes. Our mass function is well approximated by a power-law dN/dM = M^{-l} in the mass range 10^{6}M_{sun}/h < M < 10^{10}M_{sun}/h with the slope l=1.86 shallower than that of the currently popular Sheth-Tormen mass function l = 2...

  6. Optimal Distinctiveness Signals Membership Trust.

    Science.gov (United States)

    Leonardelli, Geoffrey J; Loyd, Denise Lewin

    2016-07-01

    According to optimal distinctiveness theory, sufficiently small minority groups are associated with greater membership trust, even among members otherwise unknown, because the groups are seen as optimally distinctive. This article elaborates on the prediction's motivational and cognitive processes and tests whether sufficiently small minorities (defined by relative size; for example, 20%) are associated with greater membership trust relative to mere minorities (45%), and whether such trust is a function of optimal distinctiveness. Two experiments, examining observers' perceptions of minority and majority groups and using minimal groups and (in Experiment 2) a trust game, revealed greater membership trust in minorities than majorities. In Experiment 2, participants also preferred joining minorities over more powerful majorities. Both effects occurred only when minorities were 20% rather than 45%. In both studies, perceptions of optimal distinctiveness mediated effects. Discussion focuses on the value of relative size and optimal distinctiveness, and when membership trust manifests. PMID:27140657

  7. International Trust and Public Diplomacy

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    Countries struggle to find ways to be perceived as trustworthy by people around the world because trust is linked to efficiency, business opportunities and political influence. Social trust is also important for democracy to function. A central concept in this paper is International Trust...... Council’s strategy for trust-building in China (2012); Russian President Vladimir Putin’s letter in The New York Times (2013), and the USA’s trust-building effort in Turkey (from 2006). The best results have been obtained where Public Diplomacy has been linked to successful traditional diplomacy at state...... for a Public Diplomacy initiative to succeed. From a social responsible perspective journalists may have a role to play in creating international trust, and Public Diplomacy staffs consider it already important...

  8. Towards a politics of trust.

    Science.gov (United States)

    Gilbert, T

    1998-05-01

    This paper draws upon sociological theory to demonstrate that the manufacture and deployment of trust is an integral part of the function of complex systems such as health care. The discussion begins by identifying the error within the nursing literature which arises from a rather technical conceptualization of trust. This tends to limit the dimensions to trust which is established, and fails to recognize that trust may be subject to competition and conflict. The paper continues by drawing upon the work of two theorists, Niklas Luhmann and Susan P. Shapiro, to demonstrate how trust functions within systems such as health care and the mechanisms through which it is controlled. The title of this paper, 'Towards a politics of trust', identifies that this is merely the first stage in the analysis. Further stages are necessary which analyse the ways in which power is exercised in the conflict for control within discrete elements of the system.

  9. Metaphoric Conceptualization of Interpersonal Trust

    OpenAIRE

    Rodrigo Yáñez Gallardo; Jorge Osorio Baeza; Iraide Ibarretxe – Antuñano

    2008-01-01

    Since there is no agreement among researchers on how to conceptualizethe interpersonal trust, we analyzed the metaphoric expressions made by students about trust, identifying the conceptual metaphors, the most frequent dimensions of interpersonal trust that are the most frequent ones in these expressions, and establishing the possible relations among those dimensions. A survey was carried out on 61 students from Psychology and Nursery Departments. 124 metaphoric expressions related to 17 conc...

  10. Does trust influence consumer behaviour?

    OpenAIRE

    Dierks, Leef H.

    2007-01-01

    Against the background of diverse food scandals this article investigates the role of trust as a determinant of consumer behaviour in Germany. As empirical analyses indicate, the impact of trust on consumer behaviour in a quotidian and presumably safe setting is to be neglected. In the environment of a food scandal, however, trust proves to be a crucial element with regard to a more in-depth understanding of consumer behaviour under uncertainty. Moreover, it is analysed whether different valu...

  11. Homo Economicus Belief Inhibits Trust

    OpenAIRE

    Ziqiang Xin; Guofang Liu

    2013-01-01

    As a foundational concept in economics, the homo economicus assumption regards humans as rational and self-interested actors. In contrast, trust requires individuals to believe partners' benevolence and unselfishness. Thus, the homo economicus belief may inhibit trust. The present three experiments demonstrated that the direct exposure to homo economicus belief can weaken trust. And economic situations like profit calculation can also activate individuals' homo economicus belief and inhibit t...

  12. A General Definition of Trust

    OpenAIRE

    O'Hara, Kieron

    2009-01-01

    This paper gives a general definition of trust as a trustor’s belief in the trustworthiness of a trustee. The definition is analysed to uncover the variables in the relationship, including restrictions on the accredited representation of the trustee’s intentions, capacities and motivations, and on the contextual limits to the trustor’s belief. The essential problem of trust is outlined, linking trust and trustworthiness, and mistrust and untrustworthiness are also characterised. Mechanisms fo...

  13. Mediating Trust in Terrorism Coverage

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    crisis. While the framework is presented in the context of television coverage of a terror-related crisis situation, it can equally be used in connection with all other forms of mediated trust. Key words: National crisis, risk communication, crisis management, television coverage, mediated trust.......Mass mediated risk communication can contribute to perceptions of threats and fear of “others” and/or to perceptions of trust in fellow citizens and society to overcome problems. This paper outlines a cross-disciplinary holistic framework for research in mediated trust building during an acute...

  14. The Need to Trust and to Trust More Wisely in Academe

    Science.gov (United States)

    Bowman, Richard F.

    2012-01-01

    Where trust is an issue, there is no trust. Trust in diverse organizations has never been lower. A shadow of doubt stalks one's every decision to trust collegially and institutionally. Still, colleagues sense intuitively that institutions cannot function optimally without a bedrock level of trust. In academic life, trust is a form of social…

  15. Free Riding or Trust?

    DEFF Research Database (Denmark)

    Svendsen, Gert Tinggaard; Nilsson, Jerker

    2011-01-01

    . These competing explanations refer to the theory of collective action and the social capital paradigm, respectively, and may be linked to the classical Gesellschaft and Gemeinschaft concepts. Hence, one may expect free-rider behavior when conditions of Gesellschaft exist and trustful behavior when Gemeinschaft...... conditions rule. These propositions get support from five studies of members’ readership of their cooperatives’ annual reports. In large and heterogeneous memberships there is free-riding behavior, which explains the members’ low interest in governing their cooperatives. To a limited extent a membership may...

  16. Trust for intelligent recommendation

    CERN Document Server

    Bhuiyan, Touhid

    2013-01-01

    Recommender systems are one of the recent inventions to deal with the ever-growing information overload in relation to the selection of goods and services in a global economy. Collaborative Filtering (CF) is one of the most popular techniques in recommender systems. The CF recommends items to a target user based on the preferences of a set of similar users known as the neighbors, generated from a database made up of the preferences of past users. In the absence of these ratings, trust between the users could be used to choose the neighbor for recommendation making. Better recommendations can b

  17. In archiving we trust

    OpenAIRE

    Seadle, Michael; Greifeneder, Elke

    2008-01-01

    If 25 specialists in preserving scholarly information had sat together in June of 1907 at the University of Berlin on Unter den Linden (Humboldt–Universität zu Berlin), they could likely have agreed that materials stored in the libraries of one of the world’s great research universities in the capitol of the richest and most powerful state in Europe could reasonably be trusted to survive long term. One hundred years later, after the events of the twentieth century had assaulted the collection...

  18. Generalized Trust and Trust in Institutions in Confucian Asia

    Science.gov (United States)

    Tan, Soo Jiuan; Tambyah, Siok Kuan

    2011-01-01

    This study examines generalized trust and trust in institutions in Confucian Asia, covering six countries namely, China, Japan, Singapore, South Korea, Taiwan and Vietnam, and one dependent region, Hong Kong. Using data from the 2006 AsiaBarometer Survey, our study affirms the reliability and validity of using a two-item scale to measure…

  19. Trust beyond reputation: A computational trust model based on stereotypes

    CERN Document Server

    Liu, Xin; Rzadca, Krzysztof

    2011-01-01

    Trust plays important roles in diverse, large scale, open environments. Computational trust models help to, for instance, guide users' judgements in online auction sites about other users; or determine quality of contributions in web 2.0 sites. Most existing trust models, however, require historical information about past behavior of a specific agent in question -- information that is not always available. In contrast, in real life interactions, in order to make the first guess about the trustworthiness of a stranger, we commonly use our "instinct" -- essentially stereotypes developed from our past interactions with "similar" other people. In this paper, we propose StereoTrust, a computational trust model inspired by use of stereotypes in real life. A stereotype contains certain features of agents and an expected outcome of the transaction. These features can be taken from the agents' profile information, or the agents' observed behavior. When facing a stranger, the stereotypes matching stranger's profile are...

  20. Dynamics, robustness and fragility of trust

    CERN Document Server

    Pavlovic, Dusko

    2008-01-01

    Trust is often conveyed through delegation, or through recommendation. This makes the trust authorities, who process and publish the trust recommendations, into an attractive target for attacks and spoofing. In some recent empiric studies, this was shown to lead to a remarkable phenomenon of *adverse selection*: a greater percentage of unreliable or malicious web merchants were found among those with certain types of trust certificates, then among those without. While such findings can be attributed to a lack of diligence in trust authorities, or even to conflicts of interest, our analysis of trust dynamics suggests that the public trust networks would probably remain vulnerable even if the trust authorities were perfectly diligent. The reason is that the main processes of trust building, under reasonable modeling assumptions, naturally lead to power-law distributions of trust: the rich get richer, the trusted attract more trust. The evolutionary processes governed by such distributions, ubiquitous in nature,...

  1. The Virginia Generalist Initiative: Lessons Learned in a Statewide Consortium.

    Science.gov (United States)

    Morse, R. Michael; Plungas, Gay S.; Duke, Debra; Rollins, Lisa K.; Barnes, H. Verdain; Brinson, Betsy K.; Martindale, James R.; Marsland, David W.

    1999-01-01

    To increase supply of generalist physicians, three state-supported Virginia medical schools formed a partnership with governmental stakeholders in the Generalist Physician Initiative. Lessons learned concerning stakeholder participation in planning, shared philosophical commitment, support for risk-taking, attitudes toward change, and trust are…

  2. An intercultural concept of trust in management

    OpenAIRE

    Rittenhofer, Iris

    2012-01-01

    The proposed paper takes outset in the findings of a research review on trust in management literature (Rittenhofer 2012) conducted within a transdisciplinary research project MULTI-TRUST. The paper takes outset in the following findings: there is no consensus on trust in management research; the creation and maintenance of trust is seriously underresearched; trust research on the role of culture is only emerging; trust is seriously under-theorized; an interdisciplinary conceptualization of t...

  3. Towards a Formal Notion of Trust

    DEFF Research Database (Denmark)

    Nielsen, Mogens; Krukow, Karl Kristian

    2003-01-01

    Trust management systems have been proposed as an alternative to traditional security mechanisms in Global Computing. We present some challenges in establishing a formal foundation for the notion of trust, and some preliminary ideas towards a category of trust models.......Trust management systems have been proposed as an alternative to traditional security mechanisms in Global Computing. We present some challenges in establishing a formal foundation for the notion of trust, and some preliminary ideas towards a category of trust models....

  4. Trust and Financial Crisis Experiences

    NARCIS (Netherlands)

    van der Cruijsen, Carin; de Haan, Jakob; Jansen, David-Jan

    2016-01-01

    Using eight annual household surveys for the Netherlands between 2006 and 2013, we find that respondents' personal adverse financial crisis experiences do not only reduce their trust in banks, but also have an immediate negative effect on generalized trust. Respondents who were customers of a bank t

  5. Mediating Trust in Terrorism Coverage

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    crisis. While the framework is presented in the context of television coverage of a terror-related crisis situation, it can equally be used in connection with all other forms of mediated trust. Key words: National crisis, risk communication, crisis management, television coverage, mediated trust....

  6. Towards Trust Engineering for Opportunistic Cloud Services

    DEFF Research Database (Denmark)

    Kuada, Eric

    2014-01-01

    The systematic review methodology has been employed to review trust related studies in cloud computing. It was observed that trusted computing technologies and reputation based approaches are the main approaches to trust engineering in cloud computing. Also, trusted third party approaches...... and the deployment model play a significant role in enhancing trust between service providers and consumers. It was observed that the concept of trust is used loosely without any formal specification in cloud computing discussions and trust engineering in general. As a first step towards addressing this problem, we...... have contextualized the formal trust specification in multi-agent environments for cloud computing....

  7. Trusted computing strengthens cloud authentication.

    Science.gov (United States)

    Ghazizadeh, Eghbal; Zamani, Mazdak; Ab Manan, Jamalul-lail; Alizadeh, Mojtaba

    2014-01-01

    Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM). Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM) are great technologies for solving the trust and security concerns in the cloud identity environment. Single sign-on (SSO) and OpenID have been released to solve security and privacy problems for cloud identity. This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in .Net environment. Security analyzing, simulation, and BLP confidential model are three ways to evaluate and analyze our proposed model.

  8. International trust and public diplomacy

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    2015-01-01

    National leaders struggle to communicate in ways that are perceived as trustworthy by citizens of other nations because trust is linked to efficiency, business opportunities, and political influence. In this article, four recent public diplomacy activities are analyzed from a trust-building persp......National leaders struggle to communicate in ways that are perceived as trustworthy by citizens of other nations because trust is linked to efficiency, business opportunities, and political influence. In this article, four recent public diplomacy activities are analyzed from a trust...... descriptions of public diplomacy activities, public polls, and scholarly literature. Public diplomacy ideas discussed include lightshow, hand-on cooperation, win-win projects, and the creation of frameworks for self-expression. A central concept is international trust as described by Brewer, Gross, Aday...

  9. Elastoconductivity as a probe of broken mirror symmetries

    OpenAIRE

    Hlobil, Patrik; Maharaj, Akash V.; Hosur, Pavan; Shapiro, M. C.; Fisher, I. R.; Raghu, S.

    2015-01-01

    We propose the possible detection of broken mirror symmetries in correlated two-dimensional materials by elastotransport measurements. Using linear response theory we calculate the shearconductivity $\\Gamma_{xx,xy}$, defined as the linear change of the longitudinal conductivity $\\sigma_{xx}$ due to a shear strain $\\epsilon_{xy}$. This quantity can only be non-vanishing when in-plane mirror symmetries are broken and we discuss how candidate states in the cuprate pseudogap regime (e.g. various ...

  10. Broken Images : Eliot, Lorca, Neruda and the discontinuity of Modernism

    OpenAIRE

    Young, Howard T.

    1998-01-01

    T. S. Eliot's powerful trope in The Waste Land ("a heap of broken images"), which may derive in part from Tennyson's Idylls of the King, has overflowed into Lorca's Poeta en Nueva York and Neruda's Residencia en la tierra. What these three poets see while "walking around" is the detritus of urban life, broken and abandoned objects. With values fractured and icons turned into shards, Eliot's image relates as well to the discontinuity that underlines many examples of modern...

  11. Broken Ergodicity in Two-Dimensional Homogeneous Magnetohydrodynamic Turbulence

    Science.gov (United States)

    Shebalin, John V.

    2010-01-01

    Two-dimensional (2-D) homogeneous magnetohydrodynamic (MHD) turbulence has many of the same qualitative features as three-dimensional (3-D) homogeneous MHD turbulence.The se features include several ideal invariants, along with the phenomenon of broken ergodicity. Broken ergodicity appears when certain modes act like random variables with mean values that are large compared to their standard deviations, indicating a coherent structure or dynamo.Recently, the origin of broken ergodicity in 3-D MHD turbulence that is manifest in the lowest wavenumbers was explained. Here, a detailed description of the origins of broken ergodicity in 2-D MHD turbulence is presented. It will be seen that broken ergodicity in ideal 2-D MHD turbulence can be manifest in the lowest wavenumbers of a finite numerical model for certain initial conditions or in the highest wavenumbers for another set of initial conditions.T he origins of broken ergodicity in ideal 2-D homogeneous MHD turbulence are found through an eigen analysis of the covariance matrices of the modal probability density functions.It will also be shown that when the lowest wavenumber magnetic field becomes quasi-stationary, the higher wavenumber modes can propagate as Alfven waves on these almost static large-scale magnetic structures

  12. The Business of Trust.

    Science.gov (United States)

    Frisse, Mark E

    2016-04-01

    New mobile devices, social networks, analytics, and communications technologies are emerging at an unparalleled rate. As a result, academic health centers will face both new opportunities and formidable challenges. Unlike previous transitions from paper-based systems to networked computer systems, these new technologies are the product of new entrepreneurial and commercial interests driven by consumers. As these new commercial products and services are more widely adopted, the likelihood grows that data will be used in unanticipated ways inconsistent with societal norms. Academic health centers will have to understand the implications of these technologies and engage more actively in processes governing the collection, aggregation, and use of health data produced in a new era of consumer-driven health care technology. Maintaining public trust should be a paramount concern. PMID:26630611

  13. Trusted Data Repositories

    Science.gov (United States)

    Giaretta, D.

    2008-08-01

    Data is valuable, expensive to create, and may be impossible to re-create, so who can be trusted to look after it in the long term? This is a question which applies to all the types of digital data on which most astronomical research, and much of the rest of civilisation, depends. This talk will outline the work which has been, and continues to be, carried out to provide an answer to the question of how to judge whether any given data repository is up to the task and deserves to be funded. The OAIS Reference Model (ISO 14721) forms the basis of most serious work on digital preservation and the aim of the work described here is to build on OAIS to create an international standard on which an accreditation and certification process can be based. The talk will touch on some of the fundamental ideas about preservation of digital objects and on ways to detect preservation snakeoil salesmen.

  14. Pricing and Trust

    DEFF Research Database (Denmark)

    Huck, Steffen; Ruchala, Gabriele K.; Tyran, Jean-Robert

    We experimentally examine the effects of flexible and fixed prices in markets for experience goods in which demand is driven by trust. With flexible prices, we observe low prices and high quality in competitive (oligopolistic) markets, and high prices coupled with low quality in non......-competitive (monopolistic) markets. We then introduce a regulated intermediate price above the oligopoly price and below the monopoly price. The effect in monopolies is more or less in line with standard intuition. As price falls volume increases and so does quality, such that overall efficiency is raised by 50%. However......, quite in contrast to standard intuition, we also observe an efficiency rise in response to regulation in oligopolies. Both, transaction volume and traded quality are, in fact, maximal in regulated oligopolies...

  15. International trust and public diplomacy

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    2015-01-01

    National leaders struggle to communicate in ways that are perceived as trustworthy by citizens of other nations because trust is linked to efficiency, business opportunities, and political influence. In this article, four recent public diplomacy activities are analyzed from a trust-building persp......National leaders struggle to communicate in ways that are perceived as trustworthy by citizens of other nations because trust is linked to efficiency, business opportunities, and political influence. In this article, four recent public diplomacy activities are analyzed from a trust......-building perspective: Iranian President Hassan Rouhani's letter in The Washington Post, The British Council's strategy for trust building in China, Russian President Vladimir V. Putin's letter in The New York Times, and the USA's trust-building effort in Turkey. The analyses are based on already publicized...... descriptions of public diplomacy activities, public polls, and scholarly literature. Public diplomacy ideas discussed include lightshow, hand-on cooperation, win-win projects, and the creation of frameworks for self-expression. A central concept is international trust as described by Brewer, Gross, Aday...

  16. Trust management in cloud services

    CERN Document Server

    Noor, Talal H; Bouguettaya, Athman

    2014-01-01

    This book describes the design and implementation of Cloud Armor, a novel approach for credibility-based trust management and automatic discovery of cloud services in distributed and highly dynamic environments. This book also helps cloud users to understand the difficulties of establishing trust in cloud computing and the best criteria for selecting a service cloud. The techniques have been validated by a prototype system implementation and experimental studies using a collection of real world trust feedbacks on cloud services.The authors present the design and implementation of a novel pro

  17. The multileveled division of trust labour

    DEFF Research Database (Denmark)

    Frederiksen, Morten

    The trust concept is inherently linked to institutional issues. Trust, according to contemporary research, may be directed at both people and institutions and the influence of institutions may affect both trust in other people and trust in other institutions. This conceptual stretching takes plac...

  18. 12 CFR 7.2022 - Voting trusts.

    Science.gov (United States)

    2010-01-01

    ... Practices § 7.2022 Voting trusts. The shareholders of a national bank may establish a voting trust under the applicable law of a state selected by the participants and designated in the trust agreement, provided the implementation of the trust is consistent with safe and sound banking practices....

  19. Revealing Preconditions for Trustful Collaboration in CSCL

    Science.gov (United States)

    Gerdes, Anne

    2010-01-01

    This paper analyses preconditions for trust in virtual learning environments. The concept of trust is discussed with reference to cases reporting trust in cyberspace and through a philosophical clarification holding that trust in the form of self-surrender is a common characteristic of all human co-existence. In virtual learning environments,…

  20. The Process Perspective on Trust in Organizations

    DEFF Research Database (Denmark)

    Jagd, Søren

    all process oriented trust researchers have applied the weak process perspective having studied questions like: how trust processes get started; how the trust process may grow and develop over time; and how to understand the qualitative transformations of trust in the course of a relationship...

  1. 7 CFR 1400.100 - Revocable trust.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Revocable trust. 1400.100 Section 1400.100... AND SUBSEQUENT CROP, PROGRAM, OR FISCAL YEARS Payment Limitation § 1400.100 Revocable trust. A revocable trust and the grantor of the trust will be considered to be the same person....

  2. A Formal Model for Trust Lifecycle Management

    DEFF Research Database (Denmark)

    Wagealla, Waleed; Carbone, Marco; English, Colin;

    2003-01-01

    We propose a formal model of trust informed by the Global Computing scenario and focusing on the aspects of trust formation, evolution, and propagation. The model is based on a novel notion of trust structures which, building on concepts from trust management and domain theory, feature at the same...

  3. The Relationship between Teamwork and Organizational Trust

    Directory of Open Access Journals (Sweden)

    Musab Işık

    2015-04-01

    Full Text Available The aim of this study is to investigate the relationship between teamwork and organizational trust. In the implementation section the data from the survey of 250 workers is employed in call centers in Erzurum by using relevant statistical methods. Consequently, it is found that there is a positive and significant relationship between teamwork and organizational trust. Thus, the hypothesis of the study is supported as it was expected. Besides, it is found that there are positive and significant relationships between communication, openness to innovation, participation-trust in teamwork and organizational trust, trust in management, trust in co-workers, and trust in workplace.

  4. TEE-Based Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe

    trusted storage for personal data. We believe that this role can be taken over by systems equipped with Trusted Execution Environments (TEE), such as ARM’s TrustZone. Indeed, even if TEEs provide weaker security guarantees than crypto-processors, they already provide a secure area on many personal devices......Today, it is safe to assume that any program or data can be compromised, if they are not protected by hardware within a secure area. Systems based on crypto-processors (e.g., a trusted platform module, a smart card or a hardware security module) rely on the properties of tamper resistant hardware...... to establish a tight security parameter around a reduced set of predefined functionalities. Such systems are very secure, but they impose strong constraints on the functionalities, the connectivity or the resources available within the secure area. They have not proven versatile enough to provide mainstream...

  5. Trust, dependence and interorganizational systems

    NARCIS (Netherlands)

    Ibrahim, M.K.M.

    2006-01-01

    Organizations form interorganizational relationships and utilize information technology to improve performance. This thesis discusses the influences of dependence and different types of trust on the use of interorganizational systems and subsequently the attainment of strategic benefits. The finding

  6. Ethnic Diversity and Social Trust

    DEFF Research Database (Denmark)

    Dinesen, Peter Thisted; Sønderskov, Kim Mannemar

    2015-01-01

    We argue that residential exposure to ethnic diversity reduces social trust. Previous within-country analyses of the relationship between contextual ethnic diversity and trust have been conducted at higher levels of aggregation, thus ignoring substantial variation in actual exposure to ethnic......, whereas the effect vanishes in larger contextual units. This supports the conjecture that interethnic exposure underlies the negative relationship between ethnic diversity in residential contexts and social trust....... diversity. In contrast, we analyze how ethnic diversity of the immediate micro-context—where interethnic exposure is inevitable—affects trust. We do this using Danish survey data linked with register-based data, which enables us to obtain precise measures of the ethnic diversity of each individual...

  7. Trust Propagation in Small Worlds

    DEFF Research Database (Denmark)

    Gray, Elizabeth; Seigneur, Jean-Marc; Chen, Yong;

    2003-01-01

    The possibility of a massive, networked infrastructure of diverse entities partaking in collaborative applications with each other increases more and more with the proliferation of mobile devices and the development of ad hoc networking technologies. In this context, traditional security measures...... do not scale well. We aim to develop trust-based security mechanisms using small world concepts to optimise formation and propagation of trust amongst entities in these vast networks. In this regard, we surmise that in a very large mobile ad hoc network, trust, risk, and recommendations can...... be propagated through relatively short paths connecting entities. Our work describes the design of trust-formation and risk-assessment systems, as well as that of an entity recognition scheme, within the context of the small world network topology....

  8. International Trust and Public Diplomacy

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    as described by Brewer, Gross, Aday and Willnat (2004). The paper is based on case studies of five Public Diplomacy activities: Iranian President Hassan Rouhani’s letter in The Washington Post (2013); Denmark’s trust-building effort in Pakistan following the so-called “Muhammad crisis” (from 2010); The British...... Council’s strategy for trust-building in China (2012); Russian President Vladimir Putin’s letter in The New York Times (2013), and the USA’s trust-building effort in Turkey (from 2006). The best results have been obtained where Public Diplomacy has been linked to successful traditional diplomacy at state...... for a Public Diplomacy initiative to succeed. From a social responsible perspective journalists may have a role to play in creating international trust, and Public Diplomacy staffs consider it already important...

  9. Trust as a Critical Concept

    DEFF Research Database (Denmark)

    Bordum, Anders

    2004-01-01

    address in this article. One is the standpoint we find in business strategy, that trust is naïve to show, and control or contracts are presumed better. In the strategy game the idealistic good guys seems to lose (Arrow 1974), (Williamson 1975). The other position is the position taken by systems theory...... that there is a need for clear directions and specifications in organisations and systems as to whether trust or distrust is appropriate and rational (Luhmann 1979:93). Yet I challenge these positions described above with an alternative understanding inspired by Jürgen Habermas which can be applied as an operational...... strategy for analyzing trust in its' empirical and social distribution, without ignoring the questions of validity in real social settings where trust is actively playing a direct or indirect constitutional role in the foundation of most interactions, organisations, institutions, and societies....

  10. Proton-neutron correlations in a broken-pair model

    International Nuclear Information System (INIS)

    In this thesis nuclear-structure calculations are reported which were performed with the broken-pair model. The model which is developed, is an extension of existing broken-pair models in so far that it includes both proton and neutron valence pairs. The relevant formalisms are presented. In contrast to the number-non-conserving model, a proton-neutron broken-pair model is well suited to study the correlations which are produced by the proton-neutron interaction. It is shown that the proton-neutron force has large matrix elements which mix the proton- with neutron broken-pair configurations. This occurs especially for Jsup(PI)=2+ and 3- pairs. This property of the proton-neutron force is used to improve the spectra of single-closed shell nuclei, where particle-hole excitations of the closed shell are a special case of broken-pair configurations. Using Kr and Te isotopes it is demonstrated that the proton-neutron force gives rise to correlated pair structures, which remain remarkably constant with varying nucleon numbers. (Auth.)

  11. Bifurcation and catastrophe of seepage flow system in broken rock

    Institute of Scientific and Technical Information of China (English)

    MIAO Xie-xing; LI Shun-cai; CHEN Zhan-qing

    2009-01-01

    The study of dynamical behavior of water or gas flows in broken rock is a basic research topic among a series of key projects about stability control of the surrounding rocks in mines and the prevention of some disasters such as water inrush or gas outburst and the protection of the groundwater resource. It is of great theoretical and engineering importance in respect of promo-tion of security in mine production and sustainable development of the coal industry. According to the non-Darcy property of seepage flow in broken rock dynamic equations of non-Darcy and non-steady flows in broken rock are established. By dimensionless transformation, the solution diagram of steady-states satisfying the given boundary conditions is obtained. By numerical analysis of low relaxation iteration, the dynamic responses corresponding to the different flow parameters have been obtained. The stability analysis of the steady-states indicate that a saddle-node bifurcaton exists in the seepage flow system of broken rock. Consequently, using catastrophe theory, the fold catastrophe model of seepage flow instability has been obtained. As a result, the bifurcation curves of the seepage flow systems with different control parameters are presented and the standard potential function is also given with respect to the generalized state variable for the fold catastrophe of a dynamic system of seepage flow in broken rock.

  12. Building effective partnerships: the role of trust in the Virus Resistant Cassava for Africa project

    Directory of Open Access Journals (Sweden)

    Ezezika Obidimma C

    2012-11-01

    Full Text Available Abstract Background Virus Resistant Cassava for Africa (VIRCA is an agricultural biotechnology public-private partnership (PPP comprising the Donald Danforth Plant Sciences Center (DDPSC, National Agricultural Research Organization (NARO of Uganda and Kenya Agricultural Research Institute (KARI. The project seeks to develop virus-resistant cassava for farmers in Kenya and Uganda. Yet, there is much public skepticism about the use of genetically modified (GM crops and private sector involvement in Africa. This case study sought to understand the role of trust in the VIRCA partnership. Methods We conducted semi-structured, face-to-face interviews to obtain stakeholders’ views on the challenges to, and practices for, building trust in the VIRCA partnership. Interviewee responses, together with relevant documents and articles, were analyzed to generate descriptions of how trust is operationalized in this evolving agbiotech PPP. Data were analyzed based on recurring and emergent themes from the interviewee responses. Results Various factors undermine and build trust in agbiotech PPPs. Individual and institutional enthusiasm and detailed collaborative agreements stipulating partner roles and responsibilities are likely to enhance trust among partners. On the other hand, negative perceptions propagated by international partners about the capacities of African institutions and scientists, coupled with slow regulatory processes in Africa, are likely to be impediments to trust building. Conclusions Based on the findings of this study, we have derived four key lessons. First, differences in the capacity of the partner institutions and individuals should be respected. Second, technical and infrastructural capacity support for regulatory processes in Africa must be built. Third, detailed agreements and open and transparent partner practices during project implementation are necessary to dispel perceptions of inequality among partners. Fourth, institutional

  13. Trust and Online Reputation Systems

    Science.gov (United States)

    Kwan, Ming; Ramachandran, Deepak

    Web 2.0 technologies provide organizations with unprecedented opportunities to expand and solidify relationships with their customers, partners, and employees—while empowering firms to define entirely new business models focused on sharing information in online collaborative environments. Yet, in and of themselves, these technologies cannot ensure productive online interactions. Leading enterprises that are experimenting with social networks and online communities are already discovering this fact and along with it, the importance of establishing trust as the foundation for online collaboration and transactions. Just as today's consumers must feel secure to bank, exchange personal information and purchase products and services online; participants in Web 2.0 initiatives will only accept the higher levels of risk and exposure inherent in e-commerce and Web collaboration in an environment of trust. Indeed, only by attending to the need to cultivate online trust with customers, partners and employees will enterprises ever fully exploit the expanded business potential posed by Web 2.0. But developing online trust is no easy feat. While various preliminary attempts have occurred, no definitive model for establishing or measuring it has yet been established. To that end, nGenera has identified three, distinct dimensions of online trust: reputation (quantitative-based); relationship (qualitative-based) and process (system-based). When considered together, they form a valuable model for understanding online trust and a toolbox for cultivating it to support Web 2.0 initiatives.

  14. Trusted counsellor retires

    CERN Multimedia

    2006-01-01

    His astute counsel, knowing smile and distinguished eloquence will be missed by many. With a pang of regret, the man himself admits that 'CERN was like a drug for me'. Last week, Jean-Daniel Mandica retired, after 40 years of loyal service. He was the trusted counsellor of every Director of the Administration and Director-General for eighteen years, from 1986 to 2003. Head of the planning unit for the Directorate and the Administration from 1986 to 1996, he was then named Head of the Directorate Services Unit in 1996, a position he held until the end of 2003. Throughout that time, he conducted key tasks for the Organization, such as restructuring the Administration and carrying out audits. His role in the creation of Microcosm and his commitment to CERN's participation in the Universal Exposition at Seville in 1992 contributed in no small part to the spread of the Laboratory's fame. Jean-Daniel Mandica's incomparable knowledge of the Administration, sense of diplomacy and great ability to listen made him a v...

  15. Neutrino mixing: from the broken μ-τ symmetry to the broken Friedberg–Lee symmetry

    International Nuclear Information System (INIS)

    I argue that the observed flavor structures of leptons and quarks might imply the existence of certain flavor symmetries. The latter should be a good starting point to build realistic models towards deeper understanding of the fermion mass spectra and flavor mixing patterns. The μ-τ permutation symmetry serves for such an example to interpret the almost maximal atmospheric neutrino mixing angle (θ23 ~ 45°) and the strongly suppressed CHOOZ neutrino mixing angle (θ13 < 10°). In this talk I like to highlight a new kind of flavor symmetry, the Friedberg–Lee symmetry, for the effective Majorana neutrino mass operator. Luo and I have shown that this symmetry can be broken in an oblique way, such that the lightest neutrino remains massless but an experimentally-favored neutrino mixing pattern is achievable. We get a novel prediction for θ13 in the CP-conserving case: sinθ13 = tanθ12|(1 - tanθ23)/(1 + tanθ23)|. Our scenario can simply be generalized to accommodate CP violation and be combined with the seesaw mechanism. Finally I stress the importance of probing possible effects of μ-τ symmetry breaking either in terrestrial neutrino oscillation experiments or with ultrahigh-energy cosmic neutrino telescopes. (author)

  16. A Longitudianl Study of the Link Between Broken Homes and Criminality.

    Science.gov (United States)

    McCord, Joan

    Possible explanatory theories of the relationship between broken homes and crime include the following: (1) broken homes lead to crimes if there are "catalytic agents"; (2) broken homes lead to crime if these homes fail to provide certain conditions which promote socialization; and (3) broken homes and crime have a common source, but not a causal…

  17. Strongly broken Peccei-Quinn symmetry in the early Universe

    Energy Technology Data Exchange (ETDEWEB)

    Takahashi, Fuminobu [Department of Physics, Tohoku University,Sendai, Miyagi 980-8578 (Japan); Kavli IPMU (WPI), TODIAS, The University of Tokyo,Kashiwa, Chiba 277-8583 (Japan); Yamada, Masaki [Kavli IPMU (WPI), TODIAS, The University of Tokyo,Kashiwa, Chiba 277-8583 (Japan); Institute for Cosmic Ray Research, ICRR, The University of Tokyo,Kashiwa, Chiba 277-8582 (Japan)

    2015-10-06

    We consider QCD axion models where the Peccei-Quinn symmetry is badly broken by a larger amount in the past than in the present, in order to avoid the axion isocurvature problem. Specifically we study supersymmetric axion models where the Peccei-Quinn symmetry is dynamically broken by either hidden gauge interactions or the SU(3){sub c} strong interactions whose dynamical scales are temporarily enhanced by the dynamics of flat directions. The former scenario predicts a large amount of self-interacting dark radiation as the hidden gauge symmetry is weakly coupled in the present Universe. We also show that the observed amount of baryon asymmetry can be generated by the QCD axion dynamics via spontaneous baryogenesis. We briefly comment on the case in which the PQ symmetry is broken by a non-minimal coupling to gravity.

  18. Misunderstanding that the Effective Action is Convex under Broken Symmetry

    CERN Document Server

    Asanuma, Nobu-Hiko

    2016-01-01

    The widespread belief that the effective action is convex and has a flat bottom under broken global symmetry is shown to be wrong. We show spontaneous symmetry breaking necessarily accompanies non-convexity in the effective action for quantum field theory, or in the free energy for statistical mechanics, and clarify the magnitude of non-convexity. For quantum field theory, it is also explicitly proved that translational invariance breaks spontaneously when the system is in the non-convex region, and that different vacua of spontaneously broken symmetry cannot be superposed. As applications of non-convexity, we study the first-order phase transition which happens at the zero field limit of spontaneously broken symmetry, and we propose a simple model of phase coexistence which obeys the Born rule.

  19. Electromagnetic media with Higgs-type spontaneously broken transparency

    International Nuclear Information System (INIS)

    In the framework of standard electrodynamics with linear local response, we construct a model that provides spontaneously broken transparency. The functional dependence of the medium parameter turns out to be of the Higgs type. - Highlights: • We study a class of electrodynamics models endowed with a symmetric-type skewon field. • We describe a spontaneous broken transparence phenomenon in some subclass of these models. • The phenomenon is turned out to be of the Higgs-type known from particle physics. • We construct a simple explicit 1-parametric skewon model and calculate the corresponding dispersion relation

  20. Multiple Trust Model in Online Transaction by Trusted Third Party

    Directory of Open Access Journals (Sweden)

    R. Suganya

    2016-02-01

    Full Text Available the information fortune and the connectivity are provided by the universe of E-commerce over an enormous distance at all time. In an open and distributed environment the buyers or providers will not act in a mutually understood or agreed manner by which the incomplete practices and fraudulent activities happen. So in any online transaction the security and trust are two important factors that are to be considered. In Ecommerce markets the above mentioned problems are criticized as the most important barriers. In order to improve these barriers a trust based third party mechanism is successfully adopted as a self-regulatory system to improve the buyer and seller trust. The online transactions are made very easy now days by E-commerce technologies. Built integrity belief approach (BIB, Support Vector Mechanic approach (SVM and Random Number Generation approach (RNG are the three approaches which are mainly used in this paper for online trust management. The seller and the buyer communication will be handled through the trusted third party. Apart from this a coupon based approach is introduced as an advancement in this paper for providing discount schemes which is helpful in attracting the customer who purchase beyond the threshold level fixed by the seller. Moreover a product review study is integrated in order to reduce the scam reviews in online transactions.

  1. Countering Trusting Trust through Diverse Double-Compiling

    CERN Document Server

    Wheeler, David A

    2010-01-01

    An Air Force evaluation of Multics, and Ken Thompson's famous Turing award lecture "Reflections on Trusting Trust," showed that compilers can be subverted to insert malicious Trojan horses into critical software, including themselves. If this attack goes undetected, even complete analysis of a system's source code will not find the malicious code that is running, and methods for detecting this particular attack are not widely known. This paper describes a practical technique, termed diverse double-compiling (DDC), that detects this attack and some compiler defects as well. Simply recompile the source code twice: once with a second (trusted) compiler, and again using the result of the first compilation. If the result is bit-for-bit identical with the untrusted binary, then the source code accurately represents the binary. This technique has been mentioned informally, but its issues and ramifications have not been identified or discussed in a peer-reviewed work, nor has a public demonstration been made. This pa...

  2. Social trust and ionizing radiation

    International Nuclear Information System (INIS)

    The linkages that exist between the environmental risks associated with nuclear energy production (both perceived and real) and the myriad of social and political issues and processes that influence social trust are a current issue in literature, but are not well explored, particularly for the Canadian context. This paper will examine one particular issue and its relationship with social trust: ionizing radiation and public health. Social trust is defined for this paper as including interpersonal trust, but having a much broader focus, extending to public trust in governments, institutions, corporations, and the power elite, and across whole societies. Of particular interest for the nuclear energy issue is how waning social trust may impact the functioning of democratic decision-making processes, particularly those associated with the siting of waste facilities. Social trust is a central issue in the management of environmental risks, particularly those related to high technology; its absence is seen as a major cause of intractable conflict in decisions related to nuclear power generation and waste disposal. Understanding the dynamics of social trust is important if a resolution is to be found to the nuclear waste management debate in Canada, that is, one that involves broad public, or social, support. For instance, what factors cause distrust to emerge, and when distrust emerges, what authorities do members of affected communities seek out for information and support? This paper begins to examine social trust in relation to human health and ionizing radiation, particularly low dose radiation from radioactive wastes resulting from uranium and radium processing activities in Port Hope, Ontario. These activities date back to the 1930s and are of great concern to community members. This paper looks at some of the roots of public concern, for example, scientific uncertainty around whether or not human health is compromised by exposure to low dose ionizing radiation

  3. Trust Management System for Opportunistic Cloud Services

    DEFF Research Database (Denmark)

    Kuada, Eric

    2013-01-01

    We have over the past three years been working on the feasibility of Opportunistic Cloud Services (OCS) for enterprises. OCS is about enterprises strategically contributing and utilizing spare IT resources as cloud services. One of the major challenges that such a platform faces is data security...... and trust management issues. This paper presents a trust management system for OCS platforms. It models the concept of trust and applies it to OCS platforms. The trust model and the trust management system are verified through the simulation of the computation of the trust values with Infrastructure...

  4. PP-waves and softly broken N=1 SYM

    OpenAIRE

    Bigazzi, F.; Cotrone, A. L.

    2004-01-01

    We review the Penrose limit of the Type IIB dual of softly broken N=1 SYM in four dimensions obtained as a deformation of the Maldacena-Nunez background. We extract the string spectrum on the resulting pp-wave background and discuss some properties of the conjectured dual gauge theory hadrons, the so called ``Annulons''.

  5. Quantum restoration of broken symmetry in onedimensional loop space

    Indian Academy of Sciences (India)

    Pinaki Patra; Tanmay Mandal; Jyoti Prasad Saha

    2014-06-01

    For one-dimensional loop space, a nonlinear nonlocal transformation of fields is given to make the action of the self-interacting quantum field to the free one. A specific type of classically broken symmetry is restored in quantum theory. One-dimensional sine-Gordon system and sech interactions are treated as the explicit examples.

  6. Remanent magnetization model for the broken ridge satellite magnetic anomaly

    Science.gov (United States)

    Johnson, B. D.

    1983-01-01

    A crustal model for the interpretation of the Broken Ridge satellite magnetic anomaly was constructed from bathymetric data assuming an Airy-type isostatic compensation. An average crustal magnetization of 6 A.m is required to account for the observed anomaly amplitudes provided that the whole crust is homogeneously magnetized. In contrast, a model representing only the topographic expression of the Broken Ridge, above the surrounding sea floor, requires a magnetization of the order of 40 A.m-1. Since this latter figure is much higher than is to be expected from studies of magnetic properties of oceanic rocks, it is concluded that the majority of the crustal volume of Broken Ridge is magnetized relatively uniformly. The direction of the source magnetization is consistent with an inclination shallower than the present geomagnetic field and close to that of an axial dipole. Since a more northerly source location for Broken Ridge is contrary to the paleolatitude data it is though that the magnetization represents a magnetization obtained by averaging the geomagnetic field direction over a sufficient time to remove secular variation effects. This pattern is indicative of viscous magnetization.

  7. Weaving Broken Threads: A Portrait of Artist Phil Young.

    Science.gov (United States)

    Akwe:kon Journal, 1993

    1993-01-01

    The artwork of Phil Young represents his quest to reconnect his identity with the land and with his Cherokee ancestors and thereby "weave broken threads" of his family history back together. Young discusses his training as an artist, the process of creating his artwork, and what his Cherokee heritage means to him. (LP)

  8. Dynamically broken Anti-de Sitter action for gravity

    OpenAIRE

    Tresguerres, Romualdo

    2008-01-01

    Due to a suitable Higgs mechanism, a standard Anti-de Sitter gauge theory becomes spontaneously broken. The resulting Lorentz invariant gravitational action includes the Hilbert-Einstein term of ordinary Einstein-Cartan gravity with cosmological constant, plus contributions quadratic in curvature and torsion, and a scalar Higgs sector.

  9. Design and Implementation of Trusted-Router Based on Trust Management System

    Institute of Scientific and Technical Information of China (English)

    Sun Bin; Mao Yuankui

    2011-01-01

    This paper presents a scheme to perform QoS management and assure network security by using the trusted-router based on the Trust Management System.In this trusted-router,every IP packet is forwarded and queued by its trust value,which is the quantification of the network's expectation for this packet's and its owner's behavior in the network.We outline the algorithms to calculate the trust value of the trusted-router and the IP packet.We also introduce the trust-based QoS management algorithm and the deployment of the trusted-routers which carry out this algorithm.The simulation results show that the least trusted IP packets will be dropped to save resources for those highly trusted IP packets.This will ecourage all the elements in the network to keep a good trust record.

  10. Lesson Learning at JPL

    Science.gov (United States)

    Oberhettinger, David

    2011-01-01

    A lessons learned system is a hallmark of a mature engineering organization A formal lessons learned process can help assure that valuable lessons get written and published, that they are well-written, and that the essential information is "infused" into institutional practice. Requires high-level institutional commitment, and everyone's participation in gathering, disseminating, and using the lessons

  11. Trust me, I am Robot!

    DEFF Research Database (Denmark)

    Stoyanova, Angelina; Drefeld, Jonas; Tanev, Stoyan;

    The aim of this paper is to discuss some of the issues regarding the emergence of trust within the context of the interaction between human patients and medical rehabilitation technology based on robot system solutions. The starting assumption of the analysis is that the articulation...... of the emerging trust relationship is a key component of the use value of the robotic system and of the value proposition of the robotic system producers. The study is based on a qualitative research approach combining the phenomenological research paradigm with a grounded theory building approach based....../developers to further refine their product design. The paper will conclude with a more detailed conceptual analysis of interpersonal trust in human-technology interactions. The personalization of technological artifacts or assigning personality to active objects has been considered as natural to human beings (Gombrich...

  12. Trust in Government: A Note from Nigeria

    Directory of Open Access Journals (Sweden)

    Iroghama Paul Iroghama

    2012-06-01

    Full Text Available The relationship between trust in government and factors that accounts for Nigerians citizen trust in their government has been of interest due a dearth of literature on such issue. This study is an attempt to bridge the gap from a public policy perspective. One of the measures usually used in the literature to measure trust or distrust in government is perception of corruption, but there are other yardsticks with which to measure determinant of trust in government, such as economic performance or political participation. This study used a micro-level analysis of public opinion survey data (question by question to ascertain empirical linkages of political trust within Nigeria. To this end, Afrobarometer survey Round Four conducted in 2008 was used for the analyses. Descriptive statistics provide background information on the sample, while multivariate logistic regression using SPSS were used to model the citizens’ trust for government in Nigeria. This study revealed that political trust or trust in governments in Nigeria stems from a number of factors. These are economy performance, media, interest in public affairs, religious membership, political participation, interpersonal trust, lack of basic needs, and management of corruption. Furthermore, the variables that influence trust in government the most are interpersonal trust and government management of corruption issue. Those that reported interpersonal trust also reported that they have trust for the government. While those that believe the governments are fighting or managing corruption nicely have a tendency to trust in the government. Although this study does not claim to provide all the answer on political trust or trust in governments in Nigeria, its attempt is to bridge gap in the literature on the topic and to assist future research in the area, as nothing exist on the topic as the moment. It is hope the subject will forms a basis upon which further analytical work on political

  13. A Calculus for Trust Management

    DEFF Research Database (Denmark)

    Carbone, Marco; Nielsen, Mogens; Sassone, Vladimiro

    2004-01-01

    We introduce ctm, a process calculus which embodies a notion of trust for global computing systems. In ctm each principal (location) is equipped with a policy, which determines its legal behaviour, and with a protocol, which allows interactions between principals and the flow of information from...... principals to policies. We elect to formalise policies using a Datalog-like logic, and to express protocols in the process algebra style. This yields an expressive calculus very suitable for the global computing scenarios, and provides a formalisation of notions such as trust evolution. For ctm we define...... barbed equivalences and study their possible applications....

  14. Commitment And Trust In International Marketing Relations

    OpenAIRE

    Nes, E B; Solberg, C A

    1999-01-01

    In this working paper, we discuss the influence of national culture and communication on the commitment and trust perceived by exporters towards importers and agents, and indicate the effect of trust and commitment on performance.

  15. Trust or Consequences: The Relationship between Faculty Trust and Faculty Learning Communities in Higher Education

    Science.gov (United States)

    Wilson, Gaye R.

    2011-01-01

    The purpose of this study was to investigate relationships between FLC membership and faculty trust in higher education colleagues and faculty trust in higher education administration in public and private universities in the United States. This quantitative study examines trust in colleagues and trust in administration in higher education, two…

  16. A SELF-ADAPTIVE TRUST REGION ALGORITHM

    Institute of Scientific and Technical Information of China (English)

    Long Hei

    2003-01-01

    In this paper we propose a self-adaptive trust region algorithm. The trust region radius is updated at a variable rate according to the ratio between the actual reduction and the predicted reduction of the objective function, rather than by simply enlarging or reducing the original trust region radius at a constant rate. We show that this new algorithm preserves the strong convergence property of traditional trust region methods. Numerical results are also presented.

  17. On the deployment of Mobile Trusted Modules

    OpenAIRE

    Schmidt, Andreas U.; Kuntze, Nicolai; Kasper, Michael

    2007-01-01

    In its recently published TCG Mobile Reference Architecture, the TCG Mobile Phone Work Group specifies a new concept to enable trust into future mobile devices. For this purpose, the TCG devises a trusted mobile platform as a set of trusted engines on behalf of different stakeholders supported by a physical trust-anchor. In this paper, we present our perception on this emerging specification. We propose an approach for the practical design and implementation of this concept and how to deploy ...

  18. Control Is Good, But Trust Is Cheaper

    DEFF Research Database (Denmark)

    Jensen, Keld; Svendsen, Gert Tinggaard

    2014-01-01

    Trust or Control? Trust-Based Management and the Thriving Workplace Lenin once said, “Trust is good, but control is better” – and many a modern manager seems to agree. One sees precious time and resources plowed into paper-pushing, form-filling, and the drafting of voluminous, hyper-detailed cont...

  19. Public trust: expectancies, beliefs, and behavior

    NARCIS (Netherlands)

    D. Alink

    2014-01-01

    Most people think of trust as the bonding force between people in romantic, professional, and family relationships. Of growing importance however is public trust: trust in organizations that are not represented by a single person, such as companies, non-profit organizations and governmental institut

  20. Making sense of institutional trust in organizations

    DEFF Research Database (Denmark)

    Fuglsang, Lars; Jagd, Søren

    2015-01-01

    Institutional-based approaches to trust can explain how trust logics can exist in a societal context as compared to logics of distrust. Strong institutions in the form of regulative, normative and cognitive structures can enable and inspire trust-relations among people at the interpersonal and in...

  1. 76 FR 60757 - Executive Branch Qualified Trusts

    Science.gov (United States)

    2011-09-30

    ... portfolio must meet the diversification requirements of Sec. 2634.406(b)(2) of this subpart. (2) In the case... of the trust's portfolio would be materially enhanced. Additionally, as with the blind trust, the... qualified trusts provisions for the executive branch in subparts D and E of 5 CFR part 2634 (see 57 FR...

  2. Trust and Relationship Building in Electronic Commerce.

    Science.gov (United States)

    Papadopoulou, Panagiota; Andreou, Andreas; Kanellis, Panagiotis; Martakos, Drakoulis

    2001-01-01

    Discussion of the need for trust in electronic commerce to build customer relationships focuses on a model drawn from established theoretical work on trust and relationship marketing that highlights differences between traditional and electronic commerce. Considers how trust can be built into virtual environments. (Contains 50 references.)…

  3. Heuritic Trust in IoT

    DEFF Research Database (Denmark)

    Kaur, Bipjeet; Tange, Henrik

    2015-01-01

    Increasing use of Internet of things in diverse fields has demanding association in security and trust of such services. The trust on the services cannot exist independent. It is greatly depended on the security of system at each layer. In this paper we analyze different existing trust algorithms...

  4. 46 CFR 67.36 - Trust.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 2 2010-10-01 2010-10-01 false Trust. 67.36 Section 67.36 Shipping COAST GUARD... Citizenship Requirements for Vessel Documentation § 67.36 Trust. (a) For the purpose of obtaining a registry or recreational endorsement, a trust arrangement meets citizenship requirements if: (1) Each of...

  5. 40 CFR 280.102 - Trust fund.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 26 2010-07-01 2010-07-01 false Trust fund. 280.102 Section 280.102...) Financial Responsibility § 280.102 Trust fund. (a) An owner or operator may satisfy the requirements of § 280.93 by establishing a trust fund that conforms to the requirements of this section. The...

  6. An Adaptive Trust Model of Web Services

    Institute of Scientific and Technical Information of China (English)

    SU Jin-dian; GUO He-qing; GAO Yin

    2005-01-01

    This paper proposes a dynamic Web service trust(WS Trust ) model, and some corresponding trust metric evaluation algorithms. The main goal is to evaluate the trustworthiness and predict the future behaviors of entities in order to help users find trustworthy Web service providers and prevent users from providing unfair ratings against service providers.

  7. Toward a generic model of trust for electronic commerce

    NARCIS (Netherlands)

    Tan, YH; Thoen, W

    2000-01-01

    The authors present a generic model of trust for electronic commerce consisting of two basic components, party trust and control trust, based on the concept that trust in a transaction with another party combines trust in the other parry and trust in the control mechanisms that ensure the successful

  8. Trusted Certificates in Quantum Cryptography

    OpenAIRE

    Perkins, William

    2006-01-01

    This paper analyzes the performance of Kak's three stage quantum cryptographic protocol based on public key cryptography against a man-in-the-middle attack. A method for protecting against such an attack is presented using certificates distributed by a trusted third party.

  9. Trusted advisers build business success

    NARCIS (Netherlands)

    V.M. Strike (Vanessa)

    2010-01-01

    textabstractThe role of the trusted and most loyal adviser has been a crucial one to family concerns throughout the ages. During the Korean Joseon Dynasty, Kim Cheo-Seon, a eunuch, advised successive kings wisely. Sir Francis Walsingham, Principal Secretary to Queen Elizabeth I of England, is rememb

  10. Ombud's Corner: tried and trusted

    CERN Multimedia

    Sudeshna Datta-Cockerill

    2014-01-01

    Trust is an essential ingredient in all working relationships. When trust breaks down, conflicts may arise and teams may stop working in harmony. The Ombud is there to help you to find your way out before the point of no return is reached.   Reliability, integrity, expertise and good will: these are the four pillars on which trust is built. Trust between colleagues may break down for many different reasons, including misunderstandings, and the way to restoring the relationship is through working on these four pillars. For instance, if we assume that we do indeed have the expertise to deal with a particular task assigned to us, we may need to improve our reliability by making sure that we meet deadlines and expectations or demonstrate our integrity by acknowledging and accepting accountability for this, all the while showing that we are doing our best to do whatever it takes to achieve the common goals and restore our colleagues’ faith in us. All four of these pillars need to be in...

  11. Trust enhances IT service management.

    Science.gov (United States)

    2007-08-01

    ITIL process adoption may be a prerequisite for the National Programme for IT (NPfIT), but implementation is far from straightforward. IT services company Plan-Net has been assisting Barts and The London NHS Trust with implementing its ambitious ITIL processes deployment. PMID:17847874

  12. Trust enhances IT service management.

    Science.gov (United States)

    2007-08-01

    ITIL process adoption may be a prerequisite for the National Programme for IT (NPfIT), but implementation is far from straightforward. IT services company Plan-Net has been assisting Barts and The London NHS Trust with implementing its ambitious ITIL processes deployment.

  13. The Sutton Trust: Mobility Manifesto

    Science.gov (United States)

    Sutton Trust, 2014

    2014-01-01

    Ahead of the party conference season, the Sutton Trust is urging fairer admissions to comprehensives, grammar schools and independent schools as part of a 10-point Mobility Manifesto setting out ten practical policy steps designed to put social mobility at the heart of the 2015 election campaign. The manifesto urges greater use of ballots (random…

  14. Description of the Wellcome Trust

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    @@ Introduction The Wellcome Trust supports research of the highest quality with the aim of improving human and animal health, and our Strategic Plan provides the framework for how we intend to evolve our support to be even more effective in achieving this aim.

  15. Trust and Punishment (Invited paper)

    NARCIS (Netherlands)

    Etalle, S.; Hartog, den J.I.; Marsh, S.

    2007-01-01

    In recent years we have witnessed a great increase in the interest in Trust Management (TM) techniques both from the industrial and the academic sectors. The booming research has also determined a duality in the very definition of TM system which can lead to confusion. In one of the two categories o

  16. Taxability of Educational Benefits Trusts

    Science.gov (United States)

    Temple Law Quarterly, 1976

    1976-01-01

    Corporations have found the promise of providing a college education to the children of employees--without the recognition of income to the parent-employee--to be a popular fringe benefit. The Internal Revenue Service has attacked educational benefit trusts in Revenue Ruling 75-448. Implications are discussed. (LBH)

  17. Unpacking Professional Trust – Dimensions of Trust in Swedish Auditors' Client Relations

    OpenAIRE

    Bengt Larsson

    2007-01-01

    This paper studies client trust in professionals, theoretically and empirically. The theoretical elaboration, founded on general sociological theories of trust, aims to distinguish different dimensions of trust – personal, impersonal, and process trust – and to explicate the stabilizing identities and control mechanisms on which they are based: persons, roles, programs and values. The empirical case study concerns what aspects of trust, and what expectations and controls, are most importa...

  18. Afterglow Light Curves and Broken Power Laws: A Statistical Study

    CERN Document Server

    J'ohannesson, G; Gudmundsson, E H; J\\'ohannesson, Gudlaugur; Bj\\"ornsson, Gunnlaugur; Gudmundsson, Einar H.

    2006-01-01

    In gamma-ray burst research it is quite common to fit the afterglow light curves with a broken power law to interpret the data. We apply this method to a computer simulated population of afterglows and find systematic differences between the known model parameters of the population and the ones derived from the power law fits. In general, the slope of the electron energy distribution is overestimated from the pre-break light curve slope while being underestimated from the post-break slope. We also find that the jet opening angle derived from the fits is overestimated in narrow jets and underestimated in wider ones. Results from fitting afterglow light curves with broken power laws must therefore be interpreted with caution since the uncertainties in the derived parameters might be larger than estimated from the fit. This may have implications for Hubble diagrams constructed using gamma-ray burst data.

  19. Broken detailed balance at mesoscopic scales in active biological systems.

    Science.gov (United States)

    Battle, Christopher; Broedersz, Chase P; Fakhri, Nikta; Geyer, Veikko F; Howard, Jonathon; Schmidt, Christoph F; MacKintosh, Fred C

    2016-04-29

    Systems in thermodynamic equilibrium are not only characterized by time-independent macroscopic properties, but also satisfy the principle of detailed balance in the transitions between microscopic configurations. Living systems function out of equilibrium and are characterized by directed fluxes through chemical states, which violate detailed balance at the molecular scale. Here we introduce a method to probe for broken detailed balance and demonstrate how such nonequilibrium dynamics are manifest at the mesosopic scale. The periodic beating of an isolated flagellum from Chlamydomonas reinhardtii exhibits probability flux in the phase space of shapes. With a model, we show how the breaking of detailed balance can also be quantified in stationary, nonequilibrium stochastic systems in the absence of periodic motion. We further demonstrate such broken detailed balance in the nonperiodic fluctuations of primary cilia of epithelial cells. Our analysis provides a general tool to identify nonequilibrium dynamics in cells and tissues. PMID:27126047

  20. Toward the differentiation of trust in supervisor and trust in organization.

    Science.gov (United States)

    Tan, H H; Tan, C S

    2000-05-01

    Trust in supervisor and trust in organization are argued to be distinct but related constructs, each with its own set of antecedents and outcomes. Empirical field results supported the proposition. Although trust in supervisor and trust in organization were positively and significantly correlated, trust in supervisor was more strongly associated with proximal variables (ability, benevolence, and integrity of supervisor), whereas trust in organization was more strongly correlated with global variables (perceived organizational support and justice). This conclusion held despite the inclusion of proximal variables in the regression on trust in organization and the inclusion of global variables in the regression on trust in supervisor. In addition to the differential antecedents of trust in supervisor and trust in organization, the outcomes for both variables were different. Trust in supervisor was related to increased innovative behavior and satisfaction with supervisor, and trust in organization was related to higher organizational commitment and lower intention to leave. Therefore, the authors provide clear preliminary data on the distinctiveness of trust in supervisor and trust in organization. One implication of this set of results is that organizations should adopt a more holistic approach in building trust, which can be achieved by focusing on the various constituents of the organization and the various levels (e.g., the supervisor level and the organizational level). PMID:10846623

  1. The Quantum Hall Effect: Novel Excitations and Broken Symmetries

    OpenAIRE

    Girvin, Steven M.

    1999-01-01

    These pedagogical lecture notes present a general introduction to most aspects of the integer and fractional quantum Hall effects. This is followed by an extensive discussion of quantum Hall ferromagnetism, both for spins in single-layer systems and `pseudospins' in double-layer systems. The effective field theories describing various broken symmetry states and `skyrmion' and `meron' spin textures are derived and discussed in some detail. Pedagogical presentations on Berry phases and lowest L...

  2. Mass Formulae for Broken Supersymmetry in Curved Space-Time

    CERN Document Server

    Ferrara, Sergio

    2016-01-01

    We derive the mass formulae for ${\\cal N}=1$, $D=4$ matter-coupled Supergravity for broken (and unbroken) Supersymmetry in curved space-time. These formulae are applicable to de Sitter configurations as is the case for inflation. For unbroken Supersymmetry in anti-de Sitter (AdS) one gets the mass relations modified by the AdS curvature. We compute the mass relations both for the potential and its derivative non-vanishing.

  3. Mental Suffering in Protracted Political Conflict: Feeling Broken or Destroyed

    Science.gov (United States)

    Barber, Brian K.; McNeely, Clea A.; Daher, Mahmoud; Giacaman, Rita; Arafat, Cairo; Barnes, William; Abu Mallouh, Mohammed

    2016-01-01

    Purpose This mixed-methods exploratory study identified and then developed and validated a quantitative measure of a new construct of mental suffering in the occupied Palestinian territory: feeling broken or destroyed. Methods Group interviews were conducted in 2011 with 68 Palestinians, most aged 30–40, in the West Bank, East Jerusalem, and the Gaza Strip to discern local definitions of functioning. Interview participants articulated of a type of suffering not captured in existing mental health instruments used in regions of political conflict. In contrast to the specific difficulties measured by depression and PTSD (sleep, appetite, energy, flashbacks, avoidance, etc.), participants elaborated a more existential form of mental suffering: feeling that one’s spirit, morale and/or future was broken or destroyed, and emotional and psychological exhaustion. Participants articulated these feelings when describing the rigors of the political and economic contexts in which they live. We wrote survey items to capture these sentiments and administered these items—along with standard survey measures of mental health—to a representative sample of 1,778 32–43 year olds in the occupied Palestinian territory. The same survey questions also were administered to a representative subsample (n = 508) six months earlier, providing repeated measures of the construct. Results Across samples and time, the feeling broken or destroyed scale: 1) comprised a separate factor in exploratory factor analyses, 2) had high inter-item consistency, 3) was reported by both genders and in all regions, 4) showed discriminate validity via moderate correlations with measures of feelings of depression and trauma-related stress, and 5) was more commonly experienced than either feelings of depression or trauma-related stress. Conclusions Feeling broken or destroyed can be reliably measured and distinguished from conventional measures of mental health. Such locally grounded and contextualized

  4. General Broken Lines as advanced track fitting method

    OpenAIRE

    Kleinwort., C

    2012-01-01

    In HEP experiments the description of the trajectory of a charged particle is obtained from a fit to measurements in tracking detectors. The parametrization of the trajectory has to account for bending in the magnetic field, energy loss and multiple scattering in the detector material. General broken lines implement a track model with proper description of multiple scattering leading to linear equations with a special structure of the corresponding matrix allowing for a fast solution with the...

  5. Is optical bistability an example of a broken symmetry

    International Nuclear Information System (INIS)

    The purpose of this paper is to examine the behaviour of the phase of the electric field in the phenomenon of optical bistability. Present theories treat optical bistability as a broken symmetry caused by the locking of the phase of the field in the cavity to the phase of the driving laser field. The author obtains new results by a method similar to the method used by Glauber to model the laser radiation field over twenty years ago

  6. Trust, Welfare States and Income Equality

    DEFF Research Database (Denmark)

    Bergh, Andreas; Bjørnskov, Christian

    2014-01-01

    The cross-country correlation between social trust and income equality is well documented, but few studies examine the direction of causality. We show theoretically that by facilitating cooperation, trust may lead to more equal outcomes, while the feedback from inequality to trust is ambiguous....... Using a structural equation model estimated on a large country sample, we find that trust has a positive effect on both market and net income equality. Larger welfare states lead to higher net equality but neither net income equality nor welfare state size seems to have a causal effect on trust. We...

  7. Trust-Based Leadership in the Making

    DEFF Research Database (Denmark)

    Bentzen, Tina Øllgaard; Jagd, Søren

    I spite of the popularity of trust-based leadership in consultancy and popular management writings empirical research on the transformation from traditional top-down to trust-based leadership is still limited. In this paper we study the implementation of a trust-based leadership reform in the City...... of Copenhagen taking place since 2012. We focus on understanding the trust dynamics in this major transformation. We show that the implementation of trust-based leadership should be seen as an emergent process involving a variety of actors within the organization. The case study reveals that the...

  8. Trust Building in PPPs for Service Delivery

    DEFF Research Database (Denmark)

    Schulze, Christiane

    it has been shown that also here trust relates positively with positive outcomes. Given the impact of trust and distrust on partnership outcome, the question imposes itself of how trust and distrust evolve, a puzzle which is addressed in this paper. The analysis of two in depth studies of PPPs...... for service delivery in Denmark leads to two main findings. First, despite the existence of rather formalized procedures trust based on the perception of the other managers’ competence is already important before the contract is entered. Second, this trust is not automatically transferred onto the next...

  9. Exploring trust relationships during times of change

    Directory of Open Access Journals (Sweden)

    Hartmut Von der Ohe

    2010-03-01

    Full Text Available Orientation: In the current economic climate and the resulting fast-changing global business and political environment, trust among different role players in organisations has become critical for survival.Research purpose: The objective of this study was to explore the impact of different variables such as demographics on trust relationships in South African organisations.Motivation for the study: Anecdotal evidence and preliminary data collected for a national trust indicator seemed to suggest a shift in trust levels in organisations.Research design: A trust questionnaire was administered to a convenience sample of 307 respondents in all economic sectors. Parametric and nonparametric analyses were used to determine significant differences among economic sectors, job levels and sample periods.Main findings: No significant differences were found for job levels or the different sample periods. However, significant differences were found for the economic sectors and, specifically, between government participants and other sectors for the dimensions of change, team management, organisational trust, information sharing and credibility.Practical implications: In times of change, leadership in organisations need to be aware of the impact on trust levels. It is therefore important that leaders in government focus more on trust-enhancing behaviours needed to repair mistrust in organisations.Contribution: Although the effect of time on trust levels is inconclusive, the clearly differing levels of trust in various economic sectors point to the importance of appropriate and fitting approaches to building trust and not a ‘one-size-fits-all’ attitude.

  10. Does Religiosity Promote or Discourage Social Trust?

    DEFF Research Database (Denmark)

    Berggren, Niclas; Bjørnskov, Christian

    We look at the effect of religiosity on social trust, defined as the share of a population that thinks that people in general can be trusted. This is important since social trust is related to many desired outcomes, such as growth, education, democratic stability and subjective well-being. The ef......We look at the effect of religiosity on social trust, defined as the share of a population that thinks that people in general can be trusted. This is important since social trust is related to many desired outcomes, such as growth, education, democratic stability and subjective well...... countries and the U.S. states, measuring religiosity by the share of the population that answers yes to the question "Is religion an important part of your daily life?". Our empirical results, making use of regression analysis whereby we control for other possible determinants of social trust and, by using...

  11. Trust-Based Leadership in the Making

    DEFF Research Database (Denmark)

    Bentzen, Tina Øllgaard; Jagd, Søren

    may be seen as a process involving multiple actors contributing to the implementation in diverse ways. The Trust Reform is a complex and fragile process giving rise to radical changes in roles and competences needed for leaders and for employees at different levels in the organization. The study also......I spite of the popularity of trust-based leadership in consultancy and popular management writings empirical research on the transformation from traditional top-down to trust-based leadership is still limited. In this paper we study the implementation of a trust-based leadership reform in the City...... of Copenhagen taking place since 2012. We focus on understanding the trust dynamics in this major transformation. We show that the implementation of trust-based leadership should be seen as an emergent process involving a variety of actors within the organization. The case study reveals that the Trust Reform...

  12. Trust dynamics in a large system implementation

    DEFF Research Database (Denmark)

    Schlichter, Bjarne Rerup; Rose, Jeremy

    2013-01-01

    A large information systems implementation (such as Enterprise Resource Planning systems) relies on the trust of its stakeholders to succeed. Such projects impact diverse groups of stakeholders, each with their legitimate interests and expectations. Levels of stakeholder trust can be expected...... outcomes, but largely ignored the dynamics of trust relations. Giddens, as part of his study of modernity, theorises trust dynamics in relation to abstract social systems, though without focusing on information systems. We use Giddens’ concepts to investigate evolving trust relationships in a longitudinal...... to vary in large-scale implementations (which can take several years), and cannot be taken for granted. Previous studies have largely focused on the taxonomic deconstruction of the trust construct, through point-in-time variance studies. They have identified the relationship between trust and project...

  13. Trust Dynamics in a Large System Implementation

    DEFF Research Database (Denmark)

    Schlichter, Bjarne Rerup; Rose, Jeremy

    2013-01-01

    A large information systems implementation (such as ERP systems) relies on the trust of its stakeholders to suc-ceed. Such projects impact diverse groups of stakeholders, each with their legitimate interests and expectations. Levels of stakeholder trust can be expected to vary in large scale...... the dynamics of trust relations. Giddens, as part of his study of modernity, theorises trust dynamics in relation to abstract social systems, though without focusing on information systems. We use Gid-dens’ concepts to investigate evolving trust relationships in a longitudinal case analysis of a large...... implementations (which can take several years), and cannot be taken for granted. Previous studies have largely focused on the taxonomic deconstruction of the trust construct, through point-in-time variance studies. They have identified the relationship between trust and project outcomes, but largely ignored...

  14. Research on Trust Mechanism in Rural Cooperatives

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    The thesis introduces the generation and mechanism of action of trust during cooperation, which indicates that trust can activate the members’ participation in management and investment, and preclude the generation of members’ will and behavior of breach of contract so as to guarantee the stable development of farmers’ cooperatives; the decreasing degree of trust can put sand in the wheels of farmers’ cooperatives. Based on these, we conduct survey of questionnaire on 197 rural households of 10 farmers’ cooperatives in Yanliang, Xi’an, Lintong and Yanglin . By analyzing the generation of trust mechanism and survey data, some suggestions are put forward as follows: promote inner communication; remodel the trust culture of informal system; hew to contractual system; perfect the system of motivation and punishment; establish the system of equal property right and investment; implement management and supervision by job rotation so as to promote the trust degree among the members of farmers’ cooperatives and keep the benign recycle of "trust-cooperation".

  15. Personalised and Dynamic Trust in Social Networks

    CERN Document Server

    Walter, Frank E; Schweitzer, Frank

    2009-01-01

    We propose a novel trust metric for social networks that is personalised and dynamic. It allows to compute the indirect trust between two agents in a social network which are not neighbours based on the direct trust between agents that are neighbours. In analogy with some personalised versions of PageRank, this metric is based on the notion of feedback centrality and overcomes some of the limitations of other trust metrics. It takes into account all the paths in the graph, including cycles. In particular, it does not neglect the patterns responsible for the high clustering coefficient that characterises social networks, as some other algorithms do. From a mathematical point of view, the resulting expression of indirect trust in terms of the original, direct trust matrix involves only simple linear algebra. We also propose a way to make trust dynamic over time and we show, by means of analytical approximations and computer simulations, that it converges to the desired behaviour.

  16. The Relationship between Teamwork and Organizational Trust

    Directory of Open Access Journals (Sweden)

    Musab Isik

    2016-01-01

    Full Text Available The aim of this study is to investigate the relationship between teamwork and organizational trust. In the implementation section the data from the survey of 250 workers is employed in call centers in Erzurum by using relevant statistical  methods. Consequently, it is found that there is a positive and significant relationship between teamwork and organizational trust. Thus, the hypothesis of the study is supported as it was expected. Besides, it is found that there are positive and significant relationships between communication, openness to innovation, participation-trust in teamwork and organizational trust, trust in management, trust in co-workers, and trust in workplace.

  17. Multiple Trust Model in Online Transaction by Trusted Third Party

    OpenAIRE

    R Suganya; C. Merlin Pauliester

    2016-01-01

    the information fortune and the connectivity are provided by the universe of E-commerce over an enormous distance at all time. In an open and distributed environment the buyers or providers will not act in a mutually understood or agreed manner by which the incomplete practices and fraudulent activities happen. So in any online transaction the security and trust are two important factors that are to be considered. In Ecommerce markets the above mentioned problems are criticized as the most im...

  18. Public knowledge and public trust.

    Science.gov (United States)

    Cunningham-Burley, Sarah

    2006-01-01

    As health care applications derived from human genetics research are likely to move increasingly from 'clinic to community', there is growing interest not just in how patients understand and take up health-related genetic information but also in the views of the wider population, as well as a range of professional groups. In this paper, issues relating public knowledge and public trust are raised and discussed in an attempt to move forward debates about public involvement in genomic research and the role of sociologists within interdisciplinary teams. As the field of public understanding of science has developed, we have seen a shift from a focus on the lack of scientific literacy as problem to a recognition of the range of different knowledges that people have and use as they confront science and technology in their everyday lives. As a mood for dialogue pervades many institutions in their relations with 'publics', attention must now be paid to the way in which knowledge and expertise is expressed, heard and acted upon in dialogic encounters. There is increasing concern about public trust in science and calls to increase public confidence, particularly through more open engagement with a range of publics. However, lack of trust or loss of confidence may be constructed as problems rather than reflecting empirical reality, where more complex relationships and attitudes prevail. Lack of trust is often privatized, deeply rooted in lived experience and routinely managed. Trust relations are generally characterized by ambivalence, uncertainty and risk, and are always provisional. Drawing on selected literature and empirical research to review and illustrate this field, this paper argues that scepticism or ambivalence on the part of publics are not necessarily problems to be overcome in the interest of scientific progress, but rather should be mobilized to enhance open and public debates about the nature and direction of genomics research, medicine, and the related

  19. 77 FR 19661 - City of Broken Bow, OK; Notice of Technical Conference

    Science.gov (United States)

    2012-04-02

    ... Energy Regulatory Commission City of Broken Bow, OK; Notice of Technical Conference March 21, 2012. Take.... Forest Service on November 16, 2007 for the Broken Bow Re-Regulation Dam Hydroelectric Project No. 12470.... Forest Service's Hochatown Office, Route 4, Broken Bow, OK 74728. All local, state, and federal...

  20. Dimensionality of trust: An analysis of the relations between propensity, trustworthiness and trust

    Directory of Open Access Journals (Sweden)

    Marita Heyns

    2015-02-01

    Full Text Available Orientation: Research concerning trust relationships on the interpersonal level, particularly when studied in dyadic relationships from the follower’s point of view, is relatively scarce. Only a few researchers have attempted to link multiple dimensions of trust in the same study.Research purpose: This study examined the dynamic interplay between trust propensity, trustworthiness beliefs and the decision to trust, as perceived within dyadic workplace relationships. Motivation for the study: No studies, as far as the authors are aware, have ever attempted to use a combination of Mayer and Davis’s well-known assessment of trustworthiness and Gillespie’s measure of behavioural trust within the same study. By including measures of main antecedents and the actual decision to trust in the same study, the multidimensionality of trust can be established more concretely.Research approach, design and method: A cross-sectional survey design with a convenience sample (N = 539 was used. The Behavioural Trust Inventory and the Organisational Trust Instrument were administered.Main findings: Results confirmed the distinctness of propensity, trustworthiness and trust as separate main constructs. Trust was strongly associated with trustworthiness beliefs. Trustworthiness beliefs fully mediated the relationship between propensity and trust. The observed relations between propensity and trustworthiness suggest that individuals with a natural predisposition to trust others will be more inclined to perceive a specific trust referent as trustworthy.Practical/managerial implications: Leaders should realise that their attitudes and behaviour have a decisive impact on trust formation processes: if they are being perceived as trustworthy, followers will be likely to respond by engaging in trusting behaviours towards them. Tools to assess followers’ perceptions of the trustworthiness of the leader may provide useful feedback that can guide leaders

  1. Trust and Traditions in Transitions

    DEFF Research Database (Denmark)

    McQuaid, Sara Dybris

    and the state and more recently, trust in the peace process. As the contest over meaning is always determined by the context of articulation, this paper examines the role of parades in the current ‘post-conflict’ phase of the peace process. Using theories of cultural and collective memory (Assman 2011, Olick......On New Year’s Eve 2013, months of talks on ‘Dealing with the past’, ‘Flags’ and ‘Parades’ ended without agreement on how to move towards a reconciliation of positions in Northern Ireland. The failure of the talks illustrates the importance of culture and (mis)trust in divided societies, where...... politics often pivot around whose culture shall be official and whose subordinated, whose history shall be remembered and whose forgotten (Jordan and Weedon 1995). These struggles are particularly intense in times of transition where traditions, power relations and frames of relevant remembrance...

  2. Parental Divorce and Generalized Trust

    OpenAIRE

    Viitanen, Tarja K.

    2011-01-01

    This paper examines the effect of parental divorce during childhood on generalized trust later on in life using Australian HILDA panel data. The dependent variable is composed of answers to the statement: “Generally speaking, most people can be trusted”. The main explanatory variables include the occurrence of parental divorce for the whole sample and the age at which parents divorced for the sub-sample. The analysis is conducted using random effects ordered probit, correlated random effects ...

  3. Multilevel Contracts for Trusted Components

    Directory of Open Access Journals (Sweden)

    Mohamed Messabihi

    2010-10-01

    Full Text Available This article contributes to the design and the verification of trusted components and services. The contracts are declined at several levels to cover then different facets, such as component consistency, compatibility or correctness. The article introduces multilevel contracts and a design+verification process for handling and analysing these contracts in component models. The approach is implemented with the COSTO platform that supports the Kmelia component model. A case study illustrates the overall approach.

  4. Multilevel Contracts for Trusted Components

    CERN Document Server

    Messabihi, Mohamed; Attiogbé, Christian; 10.4204/EPTCS.37.6

    2010-01-01

    This article contributes to the design and the verification of trusted components and services. The contracts are declined at several levels to cover then different facets, such as component consistency, compatibility or correctness. The article introduces multilevel contracts and a design+verification process for handling and analysing these contracts in component models. The approach is implemented with the COSTO platform that supports the Kmelia component model. A case study illustrates the overall approach.

  5. Can Audit (still) be Trusted?

    OpenAIRE

    Mueller, Frank; Carter, Chris; Whittle, Andrea

    2015-01-01

    This paper analyses audit as an exemplar of an expert system. The paper explores the premise that systemic trust in audit has been damaged and requires repair, looking specifically at the role of the institutionalised mechanism of the public inquiry. This is examined empirically in relation to the interaction between the Heads of the Big Four accounting firms in the UK and the House of Lords Economic Select Committee in the course of the recent parliamentary investigation into the UK Audit ma...

  6. Viewpoint: Trust and the sociology of the professions

    OpenAIRE

    Groenewegen, Peter P

    2006-01-01

    There is a fast-growing literature on trust in health care, especially interpersonal trust, but also public or institutional trust, reflecting the growing awareness in both the research and policy communities of the importance of trust. At a general level, trust as part of the broader concept of social capital is related to people’s health and wellbeing. Trust within provider-patient relations is important for its non-specific treatment effects. Finally, trust is also important for the smooth...

  7. Strategies for building trust with farmers: the case of Bt maize in South Africa

    Directory of Open Access Journals (Sweden)

    Ezezika Obidimma C

    2012-11-01

    Full Text Available Abstract Background In 1999, South Africa became the first African country to approve commercial production of subsistence genetically modified (GM maize. The introduction of GM crop technology is often met with skepticism by stakeholders including farmers. The involvement of the private sector in this process can further breed mistrust or misperceptions. To examine these issues more closely, the objective of this case study was to understand the role of trust in the public-private partnership (PPP arrangement involved in the development of Bacillus thuringiensis (Bt maize in South Africa. Methods We conducted semi-structured, face-to-face interviews to obtain stakeholders’ understanding of trust in general as well as in the context of agricultural biotechnology (agbiotech PPPs. A thematic analysis of the interview transcripts, documents, reports and research articles was conducted to generate insights into the challenges to, and practices for, building trust among the partners and with the public. Results The findings of this study are organized into four main lessons on trust building. First, as the end users of GM technology, farmers must be engaged from the start of the project through field demonstrations and educational activities. Second, an effective technology (i.e., the seed is key to the success of an agbiotech PPP. Third, open communication and full disclosure between private sector companies and government regulatory bodies will build trust and facilitate the regulatory processes. Fourth, enforcing good agronomic practices, including appropriate management of the refuge areas, will serve the interests of both the farmers and the seed companies. Conclusions Trust has proven to be a critical factor determining the success of the Bt maize project in South Africa. Distrust of the private sector and of GM technology were cited as major barriers to building trust. The trust-building practices described in this case study have often

  8. Does Interpersonal Trust Influence Organizational Behavior?

    Directory of Open Access Journals (Sweden)

    Aziz BAKAY

    2015-05-01

    Full Text Available This research investigates into interpersonal trust and workplace outcomes in organizations within social exchange perspective. Current study is building upon the theoretical underpinnings of trust studies that pose trust as a psychological state and a social glue. Current research develops a theoretical model of interpersonal trust presuming that different trust objects -namely peers and senior managementhave unique and direct effects on global workplace outcomes: Affective commitment, turnover intention, and job satisfaction. The data was collected via convenience sampling and data consists of 134 professionals working in Turkey. Structural Equation Modeling (SEM using Partial Least Squares (PLS is employed to test our model. Findings suggest that trust in peers and trust in senior management translate into higher affective commitment. Results indicate a positive association between job satisfaction and trust in senior management. Turnover intention however, did not significantly associate with any of the trust variables suggesting the difference between economic exchange and social exchange, which involves reciprocal behaviors. Simultaneous investigation of two trust objects in organizations as well as inclusion of variety of contextual factors bring rigor to the scope of the research and the explanations of workplace outcomes.

  9. Experimental study for sensorless broken bar detection in induction motors

    International Nuclear Information System (INIS)

    This study presents experimental results of sensorless broken bar detection in induction motors based on fluctuations of the stator current zero crossing instants before actual breakdown occurs. These fluctuations are sensed by a microcontroller (μC), and transferred to a computer for monitoring the amplitude changes on specific frequency components using fast Fourier transformation algorithms. The motor current signal is also monitored for verification purposes. The main reasons of rotor faults are broken bars, end ring faults and bearing faults. Most recent efforts are focusing on current spectrum analysis, as the current signal is easily accessible for all induction motors. Instead of sampling motor current with a high resolution analog to digital converter, zero crossing instants are recorded as the waveforms cross zero. Fluctuations in the intervals between successive zero crossings of the three phase current waveforms are analyzed in the frequency domain. Broken bars and end ring breakages, supply unbalances, rotor eccentricities and shaft misalignment faults are distinguished by monitoring amplitude changes of the 2sf, fr, and 2f spectral components, where s is the motor slip, f is supply frequency and fr is rotor speed. Appearance of only the 2sf component in zero crossing times (ZCT) of the signal spectrum implies rotor faults. The 2f component occurs only when supply is unbalanced or in the case of stator winding faults. Separation of these two faults is implemented by monitoring both components. In addition, when there is additional rotor eccentricity due to bearing deterioration or shaft misalignment, it is also necessary to monitor the fr fault signature component to distinguish mixed faults. It may be necessary to include additional signals such as motor vibration or temperature to extend the reliability of the fault detection system for critical machines

  10. Massive Kaluza-Klein theories and their spontaneously broken symmetries

    Energy Technology Data Exchange (ETDEWEB)

    Hohm, O.

    2006-07-15

    In this thesis we investigate the effective actions for massive Kaluza-Klein states, focusing on the massive modes of spin-3/2 and spin-2 fields. To this end we determine the spontaneously broken gauge symmetries associated to these 'higher-spin' states and construct the unbroken phase of the Kaluza-Klein theory. We show that for the particular background AdS{sub 3} x S{sup 3} x S{sup 3} a consistent coupling of the first massive spin-3/2 multiplet requires an enhancement of local supersymmetry, which in turn will be partially broken in the Kaluza-Klein vacuum. The corresponding action is constructed as a gauged maximal supergravity in D=3. Subsequently, the symmetries underlying an infinite tower of massive spin-2 states are analyzed in case of a Kaluza-Klein compactification of four-dimensional gravity to D=3. It is shown that the resulting gravity-spin-2 theory is given by a Chern-Simons action of an affine algebra and also allows a geometrical interpretation in terms of 'algebra-valued' differential geometry. The global symmetry group is determined, which contains an affine extension of the Ehlers group. We show that the broken phase can in turn be constructed via gauging a certain subgroup of the global symmetry group. Finally, deformations of the Kaluza-Klein theory on AdS{sub 3} x S{sup 3} x S{sup 3} and the corresponding symmetry breakings are analyzed as possible applications for the AdS/CFT correspondence. (Orig.)

  11. From the general to the specific: How social trust motivates relational trust.

    Science.gov (United States)

    Robbins, Blaine G

    2016-01-01

    When people form beliefs about the trustworthiness of others with respect to particular matters (i.e., when individuals trust), theory suggests that they rely on preexistent cognitive schemas regarding the general cooperativeness of individuals and organizations (i.e., social trust). In spite of prior work, the impact of social trust on relational trust-or what Russell Hardin (2002) calls trust as a three-part relation where actor A trusts actor B with reference to matter Y-is not well established. Four vignette experiments were administered to Amazon.com Mechanical Turk workers (N = 1388 and N = 1419) and to public university undergraduate students (N = 995 and N = 956) in order to investigate the relationship between social trust and relational trust. Measures of general social trust and particular social trust produced statistically equivalent effects that were positively associated with relational trust. Political trust, however, was statistically unrelated to relational trust. These results support the idea that people rely on schemas and stereotypes concerned with the general cooperativeness and helpfulness of others when forming beliefs about another person's trustworthiness with respect to a particular matter at hand.

  12. Children’s Trust Beliefs in Others and Trusting Behavior in Peer Interaction

    Directory of Open Access Journals (Sweden)

    Ken J. Rotenberg

    2013-01-01

    Full Text Available The relation between children’s trust beliefs and trusting behavior in peer interaction was examined. One hundred and 5 Italian children (54 boys; mean age = 10 years-7 months completed standardized scales of reliability (i.e., promise keeping trust beliefs in parents and peers. The children participated in mixed-motive interactions with classmates which assessed behavior-dependent reliability trust on peers. The children’s reliability trustworthiness towards peers/classmates was assessed by peer reports. The SEM analyses supported the hypothesized model by showing: (1 a path between trust beliefs in parents and trust beliefs in peers; (2 paths between both types of trust beliefs and behavior-dependent trust on peers; (3 a path between behavior-dependent trust in peers and trustworthiness towards peers. Trust beliefs in peers were found to mediate the relation between trust beliefs in parents and behavior-dependent trust in peers. The findings yielded support for the basis, domain, and target trust framework and attachment theory.

  13. Trusted Routing Based on Dynamic Trust Mechanism in Mobile Ad-Hoc Networks

    Science.gov (United States)

    Peng, Sancheng; Jia, Weijia; Wang, Guojun; Wu, Jie; Guo, Minyi

    Due to the distributed nature, mobile ad-hoc networks (MANETs) are vulnerable to various attacks, resulting in distrusted communications. To achieve trusted communications, it is important to build trusted routes in routing algorithms in a self-organizing and decentralized fashion. This paper proposes a trusted routing to locate and to preserve trusted routes in MANETs. Instead of using a hard security mechanism, we employ a new dynamic trust mechanism based on multiple constraints and collaborative filtering. The dynamic trust mechanism can effectively evaluate the trust and obtain the precise trust value among nodes, and can also be integrated into existing routing protocols for MANETs, such as ad hoc on-demand distance vector routing (AODV) and dynamic source routing (DSR). As an example, we present a trusted routing protocol, based on dynamic trust mechanism, by extending DSR, in which a node makes a routing decision based on the trust values on its neighboring nodes, and finally, establish a trusted route through the trust values of the nodes along the route in MANETs. The effectiveness of our approach is validated through extensive simulations.

  14. H-Trust:A Group Trust Management System for Peer-to-Peer Desktop Grid

    Institute of Scientific and Technical Information of China (English)

    Huanyu Zhao; Xiaolin Li

    2009-01-01

    Peer-to-Peer Desktop Grid(P2PDG)has emerged as a pervasive cyber-infrastructure tackling many largescale applications with high impacts.As a burgeoning research area,P2PDG can support numerous applications,including scientific computing,file sharing,web services,and virtual organization for collaborative activities and projects.To handle trustworthiness issues of these services.trust and reputation schemes are proposed to establish trust among peers in P2PDG.In this paper,we propose a robust group trust management system,called H-Trust,inspired by the H-index aggregation technique.Leveraging the robustness of the H-index algorithm under incomplete and uncertain circumstances.H-Trust offers a robust personalized reputation evaluation mechanism for both individual and group trusts with minimal communication and computation overheads.We present the H-Trust scheme in five phases,including trust recording,local trust evaluation,trust query phase,spatiai-temporal update phase,and group reputation evaluation phases.The rationale for its design,the analysis of the algorithm are further investigated.To validate the performance of H-Trust scheme.we designed the H-Trust simulator HTrust-Sim to conduct multi-agent-based simulations.Simulation results demonstrate that H-Trust is robust and can identify and isolate malicious peers in large scale systems even when a large portion of peers are malicious.

  15. Instabilities of Hexagonal Patterns with Broken Chiral Symmetry

    CERN Document Server

    Echebarria, B; Echebarria, Blas; Riecke, Hermann

    1999-01-01

    Three coupled Ginzburg-Landau equations for hexagonal patterns with broken chiral symmetry are investigated. They are relevant for the dynamics close to onset of rotating non-Boussinesq or surface-tension-driven convection. Steady and oscillatory, long- and short-wave instabilities of the hexagons are found. For the long-wave behavior coupled phase equations are derived. Numerical simulations of the Ginzburg-Landau equations indicate bistability between spatio-temporally chaotic patterns and stable steady hexagons. The chaotic state can, however, not be described properly with the Ginzburg-Landau equations.

  16. Conformal bootstrap with slightly broken higher spin symmetry

    Science.gov (United States)

    Alday, Luis F.; Zhiboedov, Alexander

    2016-06-01

    We consider conformal field theories with slightly broken higher spin symmetry in arbitrary spacetime dimensions. We analyze the crossing equation in the double light-cone limit and solve for the anomalous dimensions of higher spin currents γ s with large spin s. The result depends on the symmetries and the spectrum of the unperturbed conformal field theory. We reproduce all known results and make further predictions. In particular we make a prediction for the anomalous dimensions of higher spin currents in the 3d Ising model.

  17. Broken current anomalous dimensions, conformal manifolds and RG flows

    CERN Document Server

    Bashmakov, Vladimir; Raj, Himanshu

    2016-01-01

    We consider deformations of a conformal field theory explicitly breaking some global symmetries of the theory, addressing both cases of marginal and relevant deformations. Exploiting the constraints put by conformal symmetry, we compute anomalous dimensions of broken currents. Our analysis is done using field theory techniques and also holographic ones, where necessary. Field theoretical methods suffice to discuss e.g. symmetry-breaking deformations of the $O(N )$ model in $d=4-\\epsilon$ dimensions. Holography is instrumental, instead, to compute current anomalous dimensions in $\\beta$-deformed superconformal field theories, and in a class of $N = 1$ RG flows at large 't Hooft coupling.

  18. Raman amplification in the broken-wave regime

    CERN Document Server

    Farmer, John P

    2015-01-01

    In regimes far beyond the wavebreaking theshold of Raman amplification, we show that significant amplifcation can occur after the onset of wavebreaking, before phase mixing destroys the coupling between pump and probe. The amplification efficiency in this regime is therefore strongly dependent on the energy-transfer rate when wavebreaking occurs, and is, as such, sensitive to both the probe amplitude and profile. In order to access the higher-efficiency broken-wave regime, a short, intense probe is required. Parameter scans show the marked difference in behaviour compared to below wavebreaking, where longer, more energetic pulses lead to improved efficiencies.

  19. Broken symmetry and heavy-fermions - are small moments real?

    Energy Technology Data Exchange (ETDEWEB)

    Buyers, W.J.L. [AECL, Ontario (Canada); Taillefer, L.; Lussier, B. [McGill Univ., Montreal, Quebec (Canada)] [and others

    1996-12-31

    A phase of broken symmetry signalled by the appearance of extremely weak Bragg peaks precedes the superconducting phase in UPt{sub 3} and URu{sub 2}Si{sub 2}. The authors present evidence for and against explanations for the satellites. These fall into the categories of either a hidden primary order such as an exotic multispin correlator, or quadrupolar order in a conventional crystal field scheme with an unknown link to the magnetic order, or directly visible magnetic order suppressed by hybridization with the conduction electrons, possibly through the local ligand states.

  20. Repair for a broken market: the medical service company.

    Science.gov (United States)

    Greene, A

    1993-01-01

    Sky-rocketing costs are fueling debate over whether market mechanisms can work for the healthcare services industry. The market for health care certainly seems to be broken. Value is decreasing, services are fragmented and costly transactions among providers are exacting a great toll in efficiency and service. Perhaps ironically, this situation presents a golden opportunity for providers who understand that the market is merely responding to the combined stimuli of inflated demand and excessive regulation. We believe that Medical Service Companies, which unite physicians and hospitals under one corporate roof, can reduce market friction, improve the responsiveness of providers and provide better value than traditional provider organizations. PMID:10133278

  1. A New Kind of Subjective Trust Model

    Institute of Scientific and Technical Information of China (English)

    ZHANG Guangwei; KANG Jianchu; LUO Ziqiang; MENG Xiangyi; FANG Peici; LI Deyi

    2006-01-01

    Based on the outstanding characteristics of Cloud Model on the process of transforming a qualitative concept to a set of quantitative numerical values, a formalized model of subjective trust is introduced by which we can transform between qualitative reputation and quantitative voting data. The present paper brings forward algorithms to compute direct trust and recommender trust. Further more, an effective similarity measuring method used to distinguish two users'reputation on knowledge level is also proposed. The given model properly settles the uncertainty and fuzziness properties of subjective trust which is always the weakness of traditional subjective trust model, and provides a step in the direction of proper understanding and definition of human trust.

  2. Trust in a Time of Increasing Diversity

    DEFF Research Database (Denmark)

    Dinesen, Peter Thisted; Sønderskov, Kim Mannemar

    2012-01-01

    In this study, we examine the impact of ethnic diversity in Danish municipalities on citizens’ social trust over the last three decades. During this period, Danish society has grown increasingly ethnically diverse, and this begs the question whether this has influenced trust in others negatively....... Existing evidence from the Anglo-Saxon countries would suggest that this is the case, whereas evidence from the European continent mainly suggests that no link exists between ethnic diversity and social trust. The empirical analysis uses individual-level data on social trust from several surveys in Denmark...... in the period from 1979 to 2009 coupled with diversity at the municipality level. Individual-level measures of trust over time enable us to estimate the impact on social trust of changes in ethnic diversity within municipalities and, we argue, thereby obtain a more precise estimate of the effect of ethnic...

  3. Exploring the Change from Low-Trust to High-Trust Organizations

    DEFF Research Database (Denmark)

    Jagd, Søren

    projects of personal and organizational change leading to high-trust organizations. In this paper I explore how we may understand this change towards high-trust organizations: What does it mean, what is the content of such a change, and what may be the consequences. I show that it is still rather unclear...... what the notion of high-trust organization actually means, and that the change process in the direction of high trust organizations involves not only a quantitative growth in trust, but may involve important qualitative changes in the organization, especially concerning the relations between management......A growing body of literature point to the increasing importance of trust for organizations and for the explicit use of trust as a management tool. The explicit or implicit message in both management literature and research literature on trust as a management tool is that managers should pursue...

  4. Trust in Spanish Governments: Antecedents and Consequences

    OpenAIRE

    Gloria Alarcón García; Edgardo Ayala Gaytán

    2013-01-01

    We used the Fiscal Observatory Survey of the University of Murcia (2007) to examine the antecedents of trust in the Spanish government (at city, regional and state levels). We found that the main drivers of trust are individuals’ perception of the government’s performance and the socio-economic environment in which they live. Regarding the consequences, we tested a variant of the rule compliance hypothesis: the higher the trust in the government, the higher the citizens’ fiscal awareness, mea...

  5. Trust and its Relationship to Demographic Factors

    Directory of Open Access Journals (Sweden)

    Asghar Mirfardi

    2011-01-01

    Full Text Available Problem statement: Social trust is the main theme in the social life. Trust is “the expectation that arises within a community of regular, honest and cooperative behavior, based on commonly shared norms”. Development, social trust and security are intertwined categories and have interaction to each other. Social trust, as a main factor in social capital, provide social context for developmental programs. This study, examine the affect of Demographic factors on the social trust to others. As social trust is a key factor in social relationship, this study is needed to evaluate such factor according to demographic factors. Approach: This study has been done on existing data about Iranian values and attitudes. Some factors such as gender, age, education level, job situation, marital situation have been studied in this study. Some of these variables such as education, correspondence to development level, especially in social development. This study is done via documental method (archive and Documental data about mentioned themes and second analysis of The Iranian National Values and attitudes Survey (2000. Results: Findings of this study indicated that there is significant relationship between all of independent variables (Gender, age, education level, job situation, marital situation and social trust to families and relatives, there is significant relationship between variables such as gender, education level, job situation, marital situation (independent variables and social trust to friends. Analyzing the data showed that, the residents of less and more developed cities have different situation in trust. Conclusion/Recommendations: This study introduces three types of trust upon the development level of societies. Trust in Iran is an example of trust structure in developing societies.

  6. Exploring trust relationships during times of change

    OpenAIRE

    Hartmut Von der Ohe; Nico Martins

    2010-01-01

    Orientation: In the current economic climate and the resulting fast-changing global business and political environment, trust among different role players in organisations has become critical for survival.Research purpose: The objective of this study was to explore the impact of different variables such as demographics on trust relationships in South African organisations.Motivation for the study: Anecdotal evidence and preliminary data collected for a national trust indicator seemed to sugge...

  7. Exploring Trust in Personal Learning Environments

    OpenAIRE

    Li, Na; Najafian-Razavi, Maryam; Gillet, Denis

    2011-01-01

    The design of effective trust and reputation mechanisms for personal learning environments (PLEs) is believed to be a promising research direction. In this paper, we propose a 4-dimensional trust model that complies with the specific requirements of PLEs. Trust is explored in four dimensions: trustor, trustee, context and visibility. The importance of these four dimensions is investigated through a number of scenarios. The model is implemented in a PLE platform named Graaasp. Preliminary eval...

  8. Trust Authentication Protocol on the Web

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    It is unsuitable to use traditional identity-based authentication on the Web where entities are not foreknown to each other. Trust relationship must be established between strangers before authentication. To achieve trust authentication, the resource-constrained trust negotiation is addressed, and traditional authentication key exchange protocol is extended. Owing to avoiding the heavy computational demands the public key cryptography operations bring about, the authentication protocol is well-suited for security authentication on the Web.

  9. PEERS ORGANIZING TRUST BASED ON METRICS

    OpenAIRE

    Sheshadri Shirisha; K. Chandra Sekharaiah

    2014-01-01

    Every system in the network considered as peer, which are open to malicious activities in nature. Prevention of these malicious activities is achieved by developing trust between the peers. Trustworthiness of a peer can be calculated based on the prior interactions with other peers in the network. Peers create their own trust network in their proximity by using local information available and do not try to learn global trust information. Interactions and recommendations are ...

  10. Trust Issues: Evidence from Second Generation Immigrants

    OpenAIRE

    Ljunge, Martin

    2012-01-01

    This paper estimates the intergeneration transmission of trust by studying second generation immigrants in 29 European countries with ancestry in 87 nations. There is significant transmission of trust on the mother’s side. The transmission is stronger in Northern Europe. Ancestry from more developed countries suggests a stronger transmission of trust, but the heterogeneity in ancestry dissipates for individuals who reside in Northern Europe. The results suggest an interaction between cultural...

  11. Immigrant Assimilation, Trust and Social Capital

    OpenAIRE

    Cox, James C.; Orman, Wafa Hakim

    2010-01-01

    Trust is a crucial component of social capital. We use an experimental moonlighting game with a representative sample of the U.S. population, oversampling immigrants, to study trust, positive, and negative reciprocity between first-generation immigrants and native-born Americans as a measure of immigrant assimilation. We also survey subjects in order to relate trusting and trustworthy behavior with demographic characteristics and traditional, survey-based measures of social capital. We find t...

  12. Defining Trust Using Expected Utility Theory

    OpenAIRE

    Arai, Kazuhiro

    2009-01-01

    Trust has been discussed in many social sciences including economics, psychology, and sociology. However, there is no widely accepted definition of trust. Inparticular, there is no definition that can be used for economic analysis. This paper regards trust as expectation and defines it using expected utility theory together with concepts such as betrayal premium. In doing so, it rejects the widely accepted black-and-white view that (un) trustworthy people are always (un)trustworthy. This pape...

  13. Representing Trust in cognitive social simulations

    OpenAIRE

    Pollock, Shawn S.; Alt, Jonathan K.; Darken, Christian J.

    2011-01-01

    Trust plays a critical role in communications, strength of relationships, and information processing at the individual and group level. Cognitive social simulations show promise in providing an experimental platform for the examination of social phenomena such as trust formation. This paper describes the initial attempts at representation of trust in a cognitive social simulation using reinforcement learning algorithms centered around a cooperative Public Commodity game within a dynamic soc...

  14. Viewpoint : Trust and the sociology of the professions

    NARCIS (Netherlands)

    Groenewegen, Peter P.

    2006-01-01

    There is a fast-growing literature on trust in health care, especially interpersonal trust, but also public or institutional trust, reflecting the growing awareness in both the research and policy communities of the importance of trust. At a general level, trust as part of the broader concept of soc

  15. 78 FR 21424 - Royce Value Trust, Inc., et al.;

    Science.gov (United States)

    2013-04-10

    ... company, and to distribute the shares of Global Trust common stock to Value Trust's common stockholders... investment company. Global Trust filed a registration statement under the Securities Act of 1933 (the ``1933... investment company, and the value of Value Trust's holdings of Global Trust common stock will exceed 5%...

  16. An adaptive trust region method and its convergence

    Institute of Scientific and Technical Information of China (English)

    章祥荪; 张菊亮; 廖立志

    2002-01-01

    In this paper, a new trust region subproblem is proposed. The trust radius in the new subproblem adjusts itself adaptively. As a result, an adaptive trust region method is constructed based on the new trust region subproblem. The local and global convergence results of the adaptive trust region method are proved.Numerical results indicate that the new method is very efficient.

  17. Lessons learned bulletin

    International Nuclear Information System (INIS)

    During the past four years, the Department of Energy -- Savannah River Operations Office and the Westinghouse Savannah River Company (WSRC) Environmental Restoration (ER) Program completed various activities ranging from waste site investigations to closure and post closure projects. Critiques for lessons learned regarding project activities are performed at the completion of each project milestone, and this critique interval allows for frequent recognition of lessons learned. In addition to project related lessons learned, ER also performs lessons learned critiques. T'he Savannah River Site (SRS) also obtains lessons learned information from general industry, commercial nuclear industry, naval nuclear programs, and other DOE sites within the complex. Procedures are approved to administer the lessons learned program, and a database is available to catalog applicable lessons learned regarding environmental remediation, restoration, and administrative activities. ER will continue to use this database as a source of information available to SRS personnel

  18. Soflty broken supersymmetry and the fine-tuning problem

    Energy Technology Data Exchange (ETDEWEB)

    Foda, O.E.

    1984-02-20

    The supersymmetry of the simple Wess-Zumino model is broken, in the tree-approximation, by adding all possible parity-even(mass)-dimension 2 and 3 terms. The model is then renormalized using BPHZ and the normal product algorithm, such that supersymmetry is only softly broken (in the original sense of Schroer and Symanzik). We show that, within the above renormalization scheme, none of the added breaking terms give rise to technical fine-tuning problems (defined in the sense of Gildener) in larger models, with scalar multiplets and hierarchy of mass scales, which is in contrast to what we obtain via analytic schemes such as dimensional renormalization, or supersymmetry extension of which. The discrepancy (which can be shown to persist in more general models) originates in the inherent local ambiguity in the finite parts of subtracted Feynman integrals. Emphasizing that the issue is purely technical (as opposed to physical) in origin, and that all physical properties are scheme-independent (as they should be), we conclude that the technical fine-tuning problem, in the specific sense used in this paper, being scheme dependent, is not a well-defined issue within the context of renormalized perturbation theory. 30 references.

  19. Broken Ergodicity in MHD Turbulence in a Spherical Domain

    Science.gov (United States)

    Shebalin, John V.; wang, Yifan

    2011-01-01

    Broken ergodicity (BE) occurs in Fourier method numerical simulations of ideal, homogeneous, incompressible magnetohydrodynamic (MHD) turbulence. Although naive statistical theory predicts that Fourier coefficients of fluid velocity and magnetic field are zero-mean random variables, numerical simulations clearly show that low-wave-number coefficients have non-zero mean values that can be very large compared to the associated standard deviation. In other words, large-scale coherent structure (i.e., broken ergodicity) in homogeneous MHD turbulence can spontaneously grow out of random initial conditions. Eigenanalysis of the modal covariance matrices in the probability density functions of ideal statistical theory leads to a theoretical explanation of observed BE in homogeneous MHD turbulence. Since dissipation is minimal at the largest scales, BE is also relevant for resistive magnetofluids, as evidenced in numerical simulations. Here, we move beyond model magnetofluids confined by periodic boxes to examine BE in rotating magnetofluids in spherical domains using spherical harmonic expansions along with suitable boundary conditions. We present theoretical results for 3-D and 2-D spherical models and also present computational results from dynamical simulations of 2-D MHD turbulence on a rotating spherical surface. MHD turbulence on a 2-D sphere is affected by Coriolus forces, while MHD turbulence on a 2-D plane is not, so that 2-D spherical models are a useful (and simpler) intermediate stage on the path to understanding the much more complex 3-D spherical case.

  20. Large scale implementation of guided wave based broken rail monitoring

    Science.gov (United States)

    Burger, Francois A.; Loveday, Philip W.; Long, Craig S.

    2015-03-01

    A guided wave ultrasound system has been developed over the past 17 years to detect breaks in continuously welded rail track. Installation of the version 4 system on an 840 km long heavy duty freight line was conducted between January 2013 and June 2014. The system operates in pitch - catch mode with alternate transmit and receive transducers spaced approximately 1km apart. If the acoustic signal is not received at the receive station an alarm is triggered to indicate a break in the rail between the transmit station and the receive station. The system is permanently installed, powered by solar panels and issues broken rail alarms using the GSM network where available, and digital radio technology in other areas. A total of 931 stations were installed and the entire length of rail is interrogated every fifteen minutes. The system operates reliably although some problems involving unreliable GSM communication and theft of solar panels have been experienced. In the first two months of operation four broken rails were detected and train operation was halted temporarily for repairs.

  1. Evidence of Broken Reciprocity in Chiral Liquid Crystals

    Science.gov (United States)

    Moreira, Michele; Venkataraman, Nithya; Taheri, Bahman; Palffy-Muhoray, Peter

    2008-03-01

    Reciprocity in light scattering is predicated on bounded scattering media with symmetric and linear permittivity, conductivity and permeability. Due to their anisotropy and chirality, cholesteric liquid crystal form periodic dielectric structures. If the periodicity is comparable to the wavelength of light, these phases are self-assembled photonic band gap structures. There appear in the permittivity odd powers of the wave vector resulting from nonlocality and broken inversion symmetry. Evidence of non-reciprocity has been found in optically active crystals by Bennett [1] and in stacks of cholesteric and nematic liquid crystal cells by Takezoe [2]. We present experimental data showing broken reciprocity in transmittance and reflectance in cholesteric cells with different pitches having overlapping but distinct reflection bands. We explain our results in terms of simple analytic descriptions of material properties and propagating modes. [1] P.J. Bennett, S. Dhanjal, Yu. P. Svirko and N. I. Zheludev, Opt. Lett. 21, 1955 (1996) [2] J. Hwang; M.H. Song; B. Park; S. Nishimura; T. Toyooka; J.W. Wu; Y. Takanishi; K. Ishikawa; H. Takezoe, Nat. Mat. 4, 383 (2005).

  2. Water-resisting ability of cemented broken rocks

    Institute of Scientific and Technical Information of China (English)

    Yu Bangyong; Chen Zhanqing; Yu Linli

    2016-01-01

    Using the self-designed testing system, the seepage tests for cemented broken rocks were conducted, and the impact of different factors on water-resisting ability was analyzed. The results show that (1) seepage process of the cemented broken rocks can be divided into two categories:in one category, seepage insta-bility occurs after a period of time, in the other, the permeability decreases slowly and tends to be stable, and seepage instability does not occur;(2) cementing performance of cementing agent and grain size dis-tribution are the decisive factors for water-resisting ability, with the increase of cementing performance and the mass percentage of large grains, the water-resisting ability of the specimen strengthens; (3) aggregate type has little effect on seepage stability, for the specimens with different aggregate types, the permeability and the duration of seepage instability have small difference; (4) initial porosity has a certain effect on the water-resisting ability of the specimen, but has no decisive role. With the increase of the initial porosity, the duration of seepage instability decreases.

  3. Mass spectra in softly broken ${\\cal N}=2$ SQCD

    CERN Document Server

    Chernyak, Victor L

    2016-01-01

    Considered is ${\\cal N}=2\\,\\, SU(N_c)$ or $U(N_c)$ SQCD with $N_c+1broken down to ${\\cal N}=1$ by the mass term $\\mu_{\\rm x}{\\rm Tr} (X^2)$ of colored adjoint scalar partners of gluons, $\\mu_{\\rm x}\\ll\\Lambda_2$ ( $\\Lambda_2$ is the scale factor of the $SU(N_c)$ gauge coupling). There is a large number of different types of vacua in this theory with both unbroken and spontaneously broken global flavor symmetry $U(N_F)\\rightarrow U({\\rm n}_1)\\times U({\\rm n}_2)$. We consider in this paper the large subset of these vacua with the unbroken nontrivial $Z_{2N_c-N_F\\geq 2}$ discrete symmetry, at different hierarchies between the Lagrangian parameters $m\\gtrless\\Lambda_2,\\, \\mu_{\\rm x}\\gtrless m$. The forms of low energy Lagrangians, quantum numbers of light particles and mass spectra are described for all these vacua. Our results differ from corresponding results in recent papers arXiv:1304.0822; 1403.60...

  4. Soflty broken supersymmetry and the fine-tuning problem

    International Nuclear Information System (INIS)

    The supersymmetry of the simple Wess-Zumino model is broken, in the tree-approximation, by adding all possible parity-even[mass]-dimension 2 and 3 terms. The model is then renormalized using BPHZ and the normal product algorithm, such that supersymmetry is only softly broken (in the original sense of Schroer and Symanzik). We show that, within the above renormalization scheme, none of the added breaking terms give rise to technical fine-tuning problems (defined in the sense of Gildener) in larger models, with scalar multiplets and hierarchy of mass scales, which is in contrast to what we obtain via analytic schemes such as dimensional renormalization, or supersymmetry extension of which. The discrepancy (which can be shown to persist in more general models) originates in the inherent local ambiguity in the finite parts of subtracted Feynman integrals. Emphasizing that the issue is purely technical (as opposed to physical) in origin, and that all physical properties are scheme-independent (as they should be), we conclude that the technical fine-tuning problem, in the specific sense used in this paper, being scheme dependent, is not a well-defined issue within the context of renormalized perturbation theory. (orig.)

  5. A LINE SEARCH AND TRUST REGION ALGORITHM WITH TRUST REGION RADIUS CONVERGING TO ZERO

    Institute of Scientific and Technical Information of China (English)

    Jin-yan Fan; Wen-bao Ai; Qun-ying Zhang

    2004-01-01

    In this paper, we present a new line search and trust region algorithm for unconstrained optimization problem with the trust region radius converging to zero. The new trust region algorithm performs a backtracking line search from the failed. Point instead of resolving the subproblem when the trial step results in an increase in the objective function. We show that the algorithm preserves the convergence properties of the traditional trust region algorithms. Numerical results are also given.

  6. Playing Attack and Defense with Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe; Bouganim, Luc

    2014-01-01

    It is often convenient to assume in a data management platform that one or several computing devices are trusted, specially when the goal is to provide privacy guarantees over personal data. But what does it take for a computing device to be trusted? More specifically, how can a personal device...... provide trusted storage? This is the question we tackle in this demonstration. We describe how secure devices, equipped with a trusted execution environment, differ from general purpose devices. We illustrate with our demonstration scenario, that it is much more difficult to attack a storage service...... running on a secure device, than to attack the same service running on a general purpose device....

  7. Assessing User Trust to Improve Web Usability

    Directory of Open Access Journals (Sweden)

    Punam Bedi

    2006-01-01

    Full Text Available The technological advancement has significantly influenced the style of human-computer interaction, especially for World Wide Web. The users can now afford to choose amongst multiple websites offering similar services. The website which provides a usable interface along with requisite services, scores over its competitors. User interaction with a website is driven by two major factors- the performance factors associated with the site and the emotional factors associated with human being. Amongst the emotional factors, trust is a dominant driving factor of web usage. The more a user trusts a website, more shall be the usage and vice-versa. Trust has almost always been specified qualitatively. This study presents a distinct method of measuring user trust on a website, by considering the features of that website. Four distinct states of a feature are considered in the study. Each of these states has a different impact on user trust formation. The method proposed considers the features, their states and their contribution towards trust formation to compute the user trust on a website. Such a measure can be effectively employed to determine the trust level of a website as perceived by its users. Comparison of different websites with respect to their trust levels can therefore, provide the designer an insight into the weak features of that site. Identifying and correcting these, can help in retaining the users and hence increase the usability of that site.

  8. Explaining the emergence of social trust

    DEFF Research Database (Denmark)

    Svendsen, Gunnar Lind Haase; Tinggaard Svendsen, Gert; Graeff, Peter

    2012-01-01

    How does social trust emerge in a country? By comparing the cases of Denmark and Germany through six historical phases, we suggest that a plausible explanation is long run political stability. In Denmark, social trust was arguably allowed to accumulate slowly over time and was probably not destro......How does social trust emerge in a country? By comparing the cases of Denmark and Germany through six historical phases, we suggest that a plausible explanation is long run political stability. In Denmark, social trust was arguably allowed to accumulate slowly over time and was probably...

  9. A mobile and portable trusted computing platform

    Directory of Open Access Journals (Sweden)

    Nepal Surya

    2011-01-01

    Full Text Available Abstract The mechanism of establishing trust in a computing platform is tightly coupled with the characteristics of a specific machine. This limits the portability and mobility of trust as demanded by many emerging applications that go beyond the organizational boundaries. In order to address this problem, we propose a mobile and portable trusted computing platform in a form of a USB device. First, we describe the design and implementation of the hardware and software architectures of the device. We then demonstrate the capabilities of the proposed device by developing a trusted application.

  10. History-based trust negotiation model

    Institute of Scientific and Technical Information of China (English)

    ZHAO Yi-zhu; ZHAO Yan-hua; LU Hong-wei

    2009-01-01

    Trust negotiation (TN) is an approach to establish trust between strangers through iterative disclosure of digital credentials. Speeding up subsequent negotiations between the same negotiators is a problem worth of research. This paper introduces the concept of visiting card, and presents a history-based trust negotiation (HBTN) model. HBTN creates an account for a counterpart at the first negotiation and records valid credentials that the counterpart disclosed during each trust negotiation in his historical information base (HIB). For the following negotiation, no more credentials need to be disclosed for both parties. HBTN speeds up subsequent negotiations between the entities that interact with each other frequently without impairing the privacy preservation.

  11. Going global: Trust research and international relations

    DEFF Research Database (Denmark)

    Ruzicka, Jan; Keating, Vincent Charles

    2015-01-01

    In this review article we explore the growing body of literature on the subject of trust in the field of international relations. We argue that the international level represents a unique challenge for trust research. This is so because some of the most pressing problems facing the world today...... relations – rationalist, social and psychological. We not only note the contributions these have made to understanding the role of trust internationally, but also highlight areas where more research is needed. Particularly, we argue that this includes theorising processes of trust-building, the...

  12. 26 CFR 26.2654-1 - Certain trusts treated as separate trusts.

    Science.gov (United States)

    2010-04-01

    ... shares or trusts as separate trusts for GST tax purposes generally permits the allocation of GST tax exemption, the making of various elections permitted for GST tax purposes, and the occurrence of a taxable distribution or termination with regard to a particular resulting share or trust, with no GST tax impact on...

  13. Is It a Trust Issue? Factors That Influence Trust for Persons Living With HIV/AIDS.

    Science.gov (United States)

    Krause, Denise D; May, Warren L

    2016-09-01

    Trust in one's health care provider, trust in the health care system in general, and even trust in one's community affects engagement in HIV-related health care. This article examines the issue of trust among a random sample of HIV-infected individuals residing in Mississippi, an area hard-hit by the HIV/AIDS epidemic. Five constructs based on survey responses from these individuals were developed: (1) trust in one's provider to offer the best possible medical care, (2) trust in one's provider to protect patient privacy, (3) willingness to disclose HIV status to one's provider, (4) trust in the health care system, and (5) trust in one's community. Findings suggest that interventions to improve trust in providers to deliver the highest quality of care should be targeted to young people, African Americans, and the more highly educated. Interventions to increase trust in providers to protect privacy should focus on creating and strengthening social support groups or networks that build relationships and foster trust. Interventions aimed to increase community trust also should be targeted to young people. This information is useful to researchers, policy makers, health care providers, and organizations interested in prioritizing interventions and strategies that have the greatest potential to reduce health disparities in HIV diagnosis and treatment in the Deep South. PMID:27095034

  14. Exploring the Change from Low-Trust to High-Trust Organizations

    DEFF Research Database (Denmark)

    Jagd, Søren

    and employees. An especially important issue is the trust/self-control nexus. Following this analysis it may be argued that the distinction low versus high-trust is much more complex and involves radical changes in organizational culture and identity than assumed by most management literature on trust a new...

  15. Consumer trust in the Australian food system - The everyday erosive impact of food labelling.

    Science.gov (United States)

    Tonkin, Emma; Webb, Trevor; Coveney, John; Meyer, Samantha B; Wilson, Annabelle M

    2016-08-01

    Consumer trust in food system actors is foundational for ensuring consumer confidence in food safety. As food labelling is a direct communication between consumers and food system actors, it may influence consumer perceptions of actor trustworthiness. This study explores the judgements formed about the trustworthiness of the food system and its actors through labelling, and the expectations these judgements are based on. In-depth, semi-structured interviews with 24 Australian consumers were conducted. Theoretical sampling focussed on shopping location, dietary requirements, rurality, gender, age and educational background. The methodological approach used (adaptive theory) enabled emerging data to be examined through the lens of a set of guiding theoretical concepts, and theory reconsidered in light of emerging data. Food labelling acted as a surrogate for personal interaction with industry and government for participants. Judgements about the trustworthiness of these actors and the broader food system were formed through interaction with food labelling and were based on expectations of both competence and goodwill. Interaction with labelling primarily reduced trust in actors within the food system, undermining trust in the system as a whole. Labelling has a role as an access point to the food system. Access points are points of vulnerability for systems, where trust can be developed, reinforced or broken down. For the participants in this study, in general labelling demonstrates food system actors lack goodwill and violate their fiduciary responsibility. This paper provides crucial insights for industry and policy actors to use this access point to build, rather than undermine, trust in food systems. PMID:27063669

  16. Does conflict shatter trust or does trust obliterate conflict? Revisiting the relationships between team diversity, conflict, and trust

    NARCIS (Netherlands)

    Curseu, P.; Schruijer, S.G.L.

    2010-01-01

    This article explores the interplay between trust and conflict as antecedents of team effectiveness. In the first cross-sectional study, two alternative path models are tested in a sample of 174 teams (897 participants) with the emergent states of task conflict, relationship conflict, and trust acti

  17. Mining Trust Relationships from Online Social Networks

    Institute of Scientific and Technical Information of China (English)

    Yu Zhang; Tong Yu

    2012-01-01

    With the growing popularity of online social network,trust plays a more and more important role in connecting people to each other.We rely on our personal trust to accept recommendations,to make purchase decisions and to select transaction partners in the online community.Therefore,how to obtain trust relationships through mining online social networks becomes an important research topic.There are several shortcomings of existing trust mining methods.First,trust is category-dependent.However,most of the methods overlook the category attribute of trust relationships,which leads to low accuracy in trust calculation.Second,since the data in online social networks cannot be understood and processed by machines directly,traditional mining methods require much human effort and are not easily applied to other applications.To solve the above problems,we propose a semantic-based trust reasoning mechanism to mine trust relationships from online social networks automatically.We emphasize the category attribute of pairwise relationships and utilize Semantic Web technologies to build a domain ontology for data communication and knowledge sharing.We exploit role-based and behavior-based reasoning functions to infer implicit trust relationships and category-specific trust relationships.We make use of path expressions to extend reasoning rules so that the mining process can be done directly without much human effort.We perform experiments on real-life data extracted from Epinions.The experimental results verify the effectiveness and wide application use of our proposed method.

  18. SERVANT LEADERSHIP AND ORGANIZATIONAL TRUST: THE MEDIATING EFFECT OF THE LEADER TRUST AND ORGANIZATIONAL COMMUNICATION

    Directory of Open Access Journals (Sweden)

    Morad Rezaei

    2012-01-01

    Full Text Available The purpose of this paper aims to clarify the relationship between servant leadership and organizational trust, and tries to demonstrate the mediator role of leader trust and organizational communication in this relationship. The study sample included 258 employees of Guilan province Tax Administration and for sampling we used cluster method. Previous studies have also focused on the positive impact of servant leadership in organizational trust and in this article the results show that there is a significant relationship between servant leadership, organizational trust, leader trust and organizational communication.

  19. Building trusted national identity management systems: Presenting the privacy concern-trust (PCT) model

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    This paper discusses the effect of trust and information privacy concerns on citizens’ attitude towards national identity management systems. We introduce the privacyconcerns- trust model, which shows the role of trust in mediating and moderating citizens’ attitude towards identity management...... systems. We adopted a qualitative research approach in our analysis of data that was gathered through a series of interviews and a stakeholder workshop in Ghana. Our findings indicate that, beyond the threshold level of trust, societal information privacy concern is low; hence, trust is high, thereby...... encouraging further institutional collaboration and acceptance of citizens’ informational self-determination....

  20. Trusted computing for embedded systems

    CERN Document Server

    Soudris, Dimitrios; Anagnostopoulos, Iraklis

    2015-01-01

    This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. Case studies are used to present new techniques designed as industrial security solutions. Coverage includes development of tamper resistant hardware and firmware mechanisms for lightweight embedded devices, as well as those serving as security anchors for embedded platforms required by applications such as smart power grids, smart networked and home appliances, environmental and infrastructure sensor networks, etc. ·         Enables readers to address a variety of security threats to embedded hardware and software; ·         Describes design of secure wireless sensor networks, to address secure authen...

  1. Technology Trust in Internet-Based Interorganizational Electronic Commerce

    OpenAIRE

    Pauline Ratnasingam; Paul A. Pavlou

    2003-01-01

    Trust in Internet-based Business-to-Business (B2B) e-commerce is an important issue for both practicioners and academicians. Whereas the traditional notion of dyadic interfirm trust primarily focuses on trust in a trading partner firm, trust in e-commerce also implicitly incorporates the notion of trust in the transaction infrastructure and underlying control mechanisms (technology trust), which deals with transaction integrity, authentication, confidentliality, non-repudiation, and best busi...

  2. Trust Model for Social Network using Singular Value Decomposition

    OpenAIRE

    Bundi Ntwiga, Davis; Weke, Patrick; Kiura Kirumbu, Michael

    2016-01-01

    For effective interactions to take place in a social network, trust is important. We model trust of agents using the peer to peer reputation ratings in the network that forms a real valued matrix. Singular value decomposition discounts the reputation ratings to estimate the trust levels as trust is the subjective probability of future expectations based on current reputation ratings. Reputation and trust are closely related and singular value decomposition can estimate trust using the...

  3. A Strategic Model of Trust Management in Web Services

    Science.gov (United States)

    Sun, Junqing; Sun, Zhaohao; Li, Yuanzhe; Zhao, Shuliang

    This article examines trust and trust management in web services and proposes a multiagent model of trust relationship in web services. It looks at the hierarchical structure of trust management in web services and proposes a strategic model of trust management in web services. The proposed approach in this article will facilitate research and development of trust management in e-commerce, web services and social networking.

  4. 7 CFR 46.46 - Statutory trust.

    Science.gov (United States)

    2010-01-01

    ... THAN RULES OF PRACTICE) UNDER THE PERISHABLE AGRICULTURAL COMMODITIES ACT, 1930 Statutory Trust § 46.46... proffered. (2) “Dissipation” means any act or failure to act which could result in the diversion of trust assets or which could prejudice or impair the ability of unpaid suppliers, sellers, or agents to...

  5. Trust region minimization of orbital localization functions

    DEFF Research Database (Denmark)

    Høyvik, Ida-Marie; Jansik, Branislav; Jørgensen, Poul

    2012-01-01

    The trust region method has been applied to the minimization of localization functions, and it is shown that both local occupied and local virtual Hartree–Fock (HF) orbitals can be obtained. Because step sizes are size extensive in the trust region method, large steps may be required when the...

  6. New Superintendents: Trust, Networking, and Social Capital

    Science.gov (United States)

    Ripley, Joan; Mitchell, Roxanne M.; Richman, John A.

    2013-01-01

    This instrumental case study explored how five newly appointed superintendents identified key stakeholders and built trust and social capital with stakeholders in their districts. Stakeholder, trust, and social capital theory were the lenses that guided this study. We utilized a pragmatic research design and thematic data analysis to interpret our…

  7. Going global: Trust research and international relations

    DEFF Research Database (Denmark)

    Ruzicka, Jan; Keating, Vincent Charles

    2015-01-01

    In this review article we explore the growing body of literature on the subject of trust in the field of international relations. We argue that the international level represents a unique challenge for trust research. This is so because some of the most pressing problems facing the world today...

  8. Social Trust and the Growth of Schooling

    DEFF Research Database (Denmark)

    Bjørnskov, Christian

    The paper develops a simple model to exemplify how social trust might affect the growth of schooling through lowering transaction costs. In a sample of 52 countries, the paper thereafter provides empirical evidence that trust has indeed led to faster growth of schooling in the period 1960...

  9. TRUSTED CLOUD COMPUTING FRAMEWORK FOR HEALTHCARE SECTOR

    Directory of Open Access Journals (Sweden)

    Mervat Adib Bamiah

    2014-01-01

    Full Text Available Cloud computing is rapidly evolving due to its efficient characteristics such as cost-effectiveness, availability and elasticity. Healthcare organizations and consumers lose control when they outsource their sensitive data and computing resources to a third party Cloud Service Provider (CSP, which may raise security and privacy concerns related to data loss and misuse appealing threats. Lack of consumers’ knowledge about their data storage location may lead to violating rules and regulations of Health Insurance Portability and Accountability Act (HIPAA that can cost them huge penalty. Fear of data breach by internal or external hackers may decrease consumers’ trust in adopting cloud computing and benefiting from its promising features. We designed a Healthcare Trusted Cloud Computing (HTCC framework that maintains security, privacy and considers HIPAA regulations. HTCC framework deploys Trusted Computing Group (TCG technologies such as Trusted Platform Module (TPM, Trusted Software Stack (TSS, virtual Trusted Platform Module (vTPM, Trusted Network Connect (TNC and Self Encrypting Drives (SEDs. We emphasize on using strong multi-factor authentication access control mechanisms and strict security controls, as well as encryption for data at storage, in-transit and while process. We contributed in customizing a cloud Service Level Agreement (SLA by considering healthcare requirements. HTCC was evaluated by comparing with previous researchers’ work and conducting survey from experts. Results were satisfactory and showed acceptance of the framework. We aim that our proposed framework will assist in optimizing trust on cloud computing to be adopted in healthcare sector.

  10. The Winston Churchill Memorial Trust of Australia

    Science.gov (United States)

    Hilton, Nicolette

    2013-01-01

    The Churchill Trust was established in 1965 to honour the memory of Sir Winston Churchill by awarding overseas research Fellowships known as "Churchill Fellowships". Since its inception, The Churchill Trust has awarded Churchill Fellowships to more than 3,700 Australians who, like Churchill, are innovative, filled with a spirit of…

  11. Communicating Trust Between Parents and Their Children

    DEFF Research Database (Denmark)

    Demant, Jakob Johan; Ravn, Signe

    2013-01-01

    This article discusses how Danish parents and their children communicate trust. Based on Niklas Luhmann’s sociological theory, the article explores new aspects of communication about alcohol-related rules. The analysis shows how the parents emphasize the importance of communicating trust, while...

  12. Perceptions of Trust in Public Examinations

    Science.gov (United States)

    Simpson, Lucy; Baird, Jo-Anne

    2013-01-01

    Over recent years, the credibility of public examinations in England has increasingly come to the fore. Government agencies have invested time and money into researching public perceptions of the reliability and validity of examinations. Whilst such research overlaps into the conceptual domain of trust, trust in examinations remains an elusive…

  13. The Early Childhood Generalized Trust Belief Scale

    Science.gov (United States)

    Betts, Lucy R.; Rotenberg, Ken J.; Trueman, Mark

    2009-01-01

    The study was designed to develop and evaluate the Early Childhood Generalized Trust Belief Scale (ECGTBS) as a method of assessing 5-8-year-olds' generalized trust. Two hundred and eleven (103 male and 108 female) children (mean age 6 years and 2 months at Time 1) completed the ECGTBS twice over a year. A subsample of participants completed the…

  14. The Importance of Trust in Electronic Commerce.

    Science.gov (United States)

    Ratnasingham, Pauline

    1998-01-01

    Introduces the new concept of trust and how it influences the process of managing the security of an organization operating in an electronic commerce environment. Theoretically, the study aims to develop a framework of trust and security to provide a set of guidelines for secure electronic commerce. (Author/LRW)

  15. Building Trust in High-Performing Teams

    Directory of Open Access Journals (Sweden)

    Aki Soudunsaari

    2012-06-01

    Full Text Available Facilitation of growth is more about good, trustworthy contacts than capital. Trust is a driving force for business creation, and to create a global business you need to build a team that is capable of meeting the challenge. Trust is a key factor in team building and a needed enabler for cooperation. In general, trust building is a slow process, but it can be accelerated with open interaction and good communication skills. The fast-growing and ever-changing nature of global business sets demands for cooperation and team building, especially for startup companies. Trust building needs personal knowledge and regular face-to-face interaction, but it also requires empathy, respect, and genuine listening. Trust increases communication, and rich and open communication is essential for the building of high-performing teams. Other building materials are a shared vision, clear roles and responsibilities, willingness for cooperation, and supporting and encouraging leadership. This study focuses on trust in high-performing teams. It asks whether it is possible to manage trust and which tools and operation models should be used to speed up the building of trust. In this article, preliminary results from the authors’ research are presented to highlight the importance of sharing critical information and having a high level of communication through constant interaction.

  16. How Does Social Trust Affect Economic Growth?

    DEFF Research Database (Denmark)

    Bjørnskov, Christian

    Social capital in the form of generalized trust has been shown to be a determinant of economic growth in a number of studies. Other studies have explored other consequences of trust, such as its effects on governance, corruption, education and investment. This paper connects the two strands...

  17. Young Children and Trust in Turkey

    Science.gov (United States)

    Alat, Zeynep

    2014-01-01

    The aim of the study was to examine differences in children's generalised trust and the maternal behaviour, child temperament, and demographic factors on the levels of trust in children. A total of 314 mothers and their children participated in the study. Results showed no evidence of sex differences in children's beliefs. Children…

  18. Numerical and physical modelling of oil spreading in broken ice

    Energy Technology Data Exchange (ETDEWEB)

    Gjoesteen, Janne K. Oekland

    2002-07-01

    The present work focuses on oil spreading in broken ice and the content of this thesis falls into three categories: 1) The physical and numerical modelling of oil spreading in ice. 2) Ice models and parameters describing the ice cover. 3) Experiments on oil spreading in broken ice. A background study was carried out to investigate existing models for simulating oil in broken ice. Most of them describe motion of oil simply as a function of the ice motion and do not take advantage of the possibilities that recent ice models provide. We decided to choose another direction, starting from scratch with equations describing the flow of oil on top of a water surface. The equations were implemented numerically, including proper boundary conditions to account for the presence of physical restrictions in the form of ice floes in the simulation area. The implementation was designed to be able to apply data on ice motion calculated by an existing dynamic ice model. A first validation of the model was carried out using existing experimental data. As those data were obtained in a different setting, the recorded parameters and set-up of the experiment were not ideal for our purpose. However, we were able to conclude that our model behaviour was reasonable. We have carried out statistical analysis on meteorological data of wind speeds, temperatures, flow sizes and ice thickness to obtain probability distributions describing the parameters. Those data has been collected in the Pechora Sea. Wind and temperature had been recorded for a period of 30-40 years. For this region we also had available Argos satellite data from four buoys drifting in the ice in April-June 1998. The Argos data were carefully analysed to suggest probability distributions and return periods for certain speeds. (Indoor basin tests were carried out to obtain data on spreading of oil in broken ice. A set of 20 tests was conducted, each with different type of oil, ice concentration, slush concentration or ice

  19. Locally Broken Crystal Symmetry Facilitates Singlet Exciton Fission.

    Science.gov (United States)

    Petelenz, Piotr; Snamina, Mateusz

    2016-05-19

    Photovoltaic yield is normally limited to at most two charge carriers per photon. In solid pentacene this limit may be potentially bypassed owing to singlet exciton fission into a pair of triplets. The process occurs via a superexchange mechanism mediated by charge-transfer (CT) configurations and is sensitive to their energies. As demonstrated recently, these strongly depend on the local environment of the two molecules on which the charges reside. Using a multiscale model, here we show that in the crystal bulk approximate local symmetry affects CT state energetics in a way unfavorable for fission, so that at the places where this symmetry is broken the fission probability is enhanced by up to an order of magnitude. These fission-favorable locations entail the vicinity of vacancies, specific impurities, and interfaces, such as crystallite boundaries. Hence, photovoltaic yield might be substantially increased by using nanoscopically disordered pentacene rather than highly ordered specimens. PMID:27152577

  20. Bounce and cyclic cosmology in weakly broken galileon theories

    CERN Document Server

    Banerjee, Shreya

    2016-01-01

    We investigate the bounce and cyclicity realization in the framework of weakly broken galileon theories. We study bouncing and cyclic solutions at the background level, reconstructing the potential that can give rise to a given scale factor, and presenting analytical expressions for the bounce requirements. We proceed to a detailed investigation of the perturbations, which after crossing the bouncing point give rise to various observables, such as the scalar and tensor spectral indices and the tensor-to-scalar ratio. Although the scenario at hand shares the disadvantage of all bouncing models, namely that it provides a large tensor-to-scalar ratio, introducing an additional light scalar significantly reduces it through the kinetic amplification of the isocurvature fluctuations.

  1. Gauge-Higgs unification with broken flavour symmetry

    Energy Technology Data Exchange (ETDEWEB)

    Olschewsky, M.

    2007-05-15

    We study a five-dimensional Gauge-Higgs unification model on the orbifold S{sup 1}/Z{sub 2} based on the extended standard model (SM) gauge group SU(2){sub L} x U(1){sub Y} x SO(3){sub F}. The group SO(3){sub F} is treated as a chiral gauged flavour symmetry. Electroweak-, flavour- and Higgs interactions are unified in one single gauge group SU(7). The unified gauge group SU(7) is broken down to SU(2){sub L} x U(1){sub Y} x SO(3){sub F} by orbifolding and imposing Dirichlet and Neumann boundary conditions. The compactification scale of the theory is O(1) TeV. Furthermore, the orbifold S{sup 1}/Z{sub 2} is put on a lattice. This setting gives a well-defined staring point for renormalisation group (RG) transformations. As a result of the RG-flow, the bulk is integrated out and the extra dimension will consist of only two points: the orbifold fixed points. The model obtained this way is called an effective bilayered transverse lattice model. Parallel transporters (PT) in the extra dimension become nonunitary as a result of the blockspin transformations. In addition, a Higgs potential V({phi}) emerges naturally. The PTs can be written as a product e{sup A{sub y}}e{sup {eta}}e{sup A{sub y}} of unitary factors e{sup A{sub y}} and a selfadjoint factor e{sup {eta}}. The reduction 48 {yields} 35 + 6 + anti 6 + 1 of the adjoint representation of SU(7) with respect to SU(6) contains SU(2){sub L} x U(1){sub Y} x SO(3){sub F} leads to three SU(2){sub L} Higgs doublets: one for the first, one for the second and one for the third generation. Their zero modes serve as a substitute for the SM Higgs. When the extended SM gauge group SU(2){sub L} x U(1){sub Y} x SO(3){sub F} is spontaneously broken down to U(1){sub em}, an exponential gauge boson mass splitting occurs naturally. At a first step SU(2){sub L} x U(1){sub Y} x SO(3){sub F} is broken to SU(2){sub L} x U(1){sub Y} by VEVs for the selfadjoint factor e{sup {eta}}. This breaking leads to masses of flavour changing SO(3){sub F

  2. Gauge-Higgs unification with broken flavour symmetry

    International Nuclear Information System (INIS)

    We study a five-dimensional Gauge-Higgs unification model on the orbifold S1/Z2 based on the extended standard model (SM) gauge group SU(2)L x U(1)Y x SO(3)F. The group SO(3)F is treated as a chiral gauged flavour symmetry. Electroweak-, flavour- and Higgs interactions are unified in one single gauge group SU(7). The unified gauge group SU(7) is broken down to SU(2)L x U(1)Y x SO(3)F by orbifolding and imposing Dirichlet and Neumann boundary conditions. The compactification scale of the theory is O(1) TeV. Furthermore, the orbifold S1/Z2 is put on a lattice. This setting gives a well-defined staring point for renormalisation group (RG) transformations. As a result of the RG-flow, the bulk is integrated out and the extra dimension will consist of only two points: the orbifold fixed points. The model obtained this way is called an effective bilayered transverse lattice model. Parallel transporters (PT) in the extra dimension become nonunitary as a result of the blockspin transformations. In addition, a Higgs potential V(Φ) emerges naturally. The PTs can be written as a product eAyeηeAy of unitary factors eAy and a selfadjoint factor eη. The reduction 48 → 35 + 6 + anti 6 + 1 of the adjoint representation of SU(7) with respect to SU(6) contains SU(2)L x U(1)Y x SO(3)F leads to three SU(2)L Higgs doublets: one for the first, one for the second and one for the third generation. Their zero modes serve as a substitute for the SM Higgs. When the extended SM gauge group SU(2)L x U(1)Y x SO(3)F is spontaneously broken down to U(1)em, an exponential gauge boson mass splitting occurs naturally. At a first step SU(2)L x U(1)Y x SO(3)F is broken to SU(2)L x U(1)Y by VEVs for the selfadjoint factor eη. This breaking leads to masses of flavour changing SO(3)F gauge bosons much above the compactification scale. Such a behaviour has no counterpart within the customary approximation scheme of an ordinary orbifold theory. This way tree-level flavour-changing-neutral-currents are

  3. Excitation of dark plasmonic modes in symmetry broken terahertz metamaterials.

    Science.gov (United States)

    Chowdhury, Dibakar Roy; Su, Xiaofang; Zeng, Yong; Chen, Xiaoshuang; Taylor, Antoinette J; Azad, Abul

    2014-08-11

    Plasmonic structures with high symmetry, such as double-identical gap split ring resonators, possess dark eigenmodes. These dark eigenmodes are dominated by magnetic dipole and/or higher-order multi-poles such as electric quadrapoles. Consequently these dark modes interact very weakly with the surrounding environment, and can have very high quality factors (Q). In this work, we have studied, experimentally as well as theoretically, these dark eigenmodes in terahertz metamaterials. Theoretical investigations with the help of classical perturbation theory clearly indicate the existence of these dark modes in symmetric plasmonic metamaterials. However, these dark modes can be excited experimentally by breaking the symmetry within the constituting metamaterial resonators cell, resulting in high quality factor resonance mode. The symmetry broken metamaterials with such high quality factor can pave the way in realizing high sensitivity sensors, in addition to other applications.

  4. Broken-Plane Maneuver Applications for Earth to Mars Trajectories

    Science.gov (United States)

    Abilleira, Fernando

    2007-01-01

    Optimization techniques are critical when investigating Earth to Mars trajectories since they have the potential of reducing the total (delta)V of a mission. A deep space maneuver (DSM) executed during the cruise may improve a trajectory by reducing the total mission V. Nonetheless, DSMs not only may improve trajectory performance (from an energetic point of view) but also open up new families of trajectories that would satisfy very specific mission requirements not achievable with ballistic trajectories. In the following pages, various specific examples showing the potential advantages of the usage of broken plane maneuvers will be introduced. These examples correspond to possible scenarios for Earth to Mars trajectories during the next decade (2010-2020).

  5. Inflation via Gravitino Condensation in Dynamically Broken Supergravity

    CERN Document Server

    Alexandre, Jean; Mavromatos, Nick E

    2015-01-01

    Gravitino-condensate-induced inflation via the super-Higgs effect is a UV-motivated scenario for both inflating the early universe and breaking local supersymmetry dynamically, entirely independent of any coupling to external matter. As an added benefit, this also removes the (as of yet unobserved) massless Goldstino associated to global supersymmetry breaking from the particle spectrum. In this review we detail the pertinent properties and outline previously hidden details of the various steps required in this context in order to make contact with current inflationary phenomenology. The class of models of SUGRA we use to exemplify our approach are minimal four-dimensional N=1 supergravity and conformal extensions thereof (with broken conformal symmetry). Therein, the gravitino condensate itself can play the role of the inflaton, however the requirement of slow-roll necessitates unnaturally large values of the wave-function renormalisation. Nevertheless, there is an alternative scenario that may provide Staro...

  6. Phases of holographic superconductors with broken translational symmetry

    CERN Document Server

    Baggioli, Matteo

    2015-01-01

    We consider holographic superconductors in a broad class of massive gravity backgrounds. These theories provide a holographic description of a superconductor with broken translational symmetry. Such models exhibit a rich phase structure: depending on the values of the temperature and the doping the boundary system can be in superconducting, normal metallic or normal pseudo-insulating phases. Furthermore the system supports interesting collective excitations of the charge carriers, which appears in the normal phase, persists in the superconducting phase, but eventually gets destroyed by the superconducting condensate. We also show the possibility of building a phase diagram of a system with the superconducting phase occupying a dome-shaped region, therefore resembling more of a real-world doped high-Tc superconductor.

  7. NASA Engineering Network Lessons Learned

    Data.gov (United States)

    National Aeronautics and Space Administration — The NASA Lessons Learned system provides access to official, reviewed lessons learned from NASA programs and projects. These lessons have been made available to the...

  8. DualTrust: A Distributed Trust Model for Swarm-Based Autonomic Computing Systems

    Energy Technology Data Exchange (ETDEWEB)

    Maiden, Wendy M.; Dionysiou, Ioanna; Frincke, Deborah A.; Fink, Glenn A.; Bakken, David E.

    2011-02-01

    For autonomic computing systems that utilize mobile agents and ant colony algorithms for their sensor layer, trust management is important for the acceptance of the mobile agent sensors and to protect the system from malicious behavior by insiders and entities that have penetrated network defenses. This paper examines the trust relationships, evidence, and decisions in a representative system and finds that by monitoring the trustworthiness of the autonomic managers rather than the swarming sensors, the trust management problem becomes much more scalable and still serves to protect the swarm. We then propose the DualTrust conceptual trust model. By addressing the autonomic manager’s bi-directional primary relationships in the ACS architecture, DualTrust is able to monitor the trustworthiness of the autonomic managers, protect the sensor swarm in a scalable manner, and provide global trust awareness for the orchestrating autonomic manager.

  9. Trusting Facebook in Crisis Situations: The Role of General Use and General Trust Toward Facebook.

    Science.gov (United States)

    Szymczak, Hermann; Kücükbalaban, Pinar; Lemanski, Sandra; Knuth, Daniela; Schmidt, Silke

    2016-01-01

    An important concept that has been rather neglected in research on social media is the concept of trust. Although there is a considerable amount of research on online trust in general, little has been done in the area of social media. As a situation of risk is necessary for trust, the perceived trustworthiness of Facebook in crisis situations was examined in this study. A sample of 340 European Facebook users were questioned as part of a large European study about social media in the context of emergency situations. We found that participants' general trust toward Facebook as a medium predicted to a significant degree how much they would trust Facebook in a crisis situation. General use of Facebook and dispositional trust were also significantly associated with trust toward Facebook in a crisis situation.

  10. Analysis of Trusted Identity Based Encryption (IBE-Trust Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yusnani Mohd Yussoff

    2011-12-01

    Full Text Available The peculiarity of Wireless Sensor Networks demands extra consideration during the design of the security protocol. One of the most challenging yet important security features in Wireless Sensor Network is in establishing trusted communication between sensor node and base station. While the term trusted has been widely used referring to valid nodes in the group, this paper discuss the term trusted based on the specifications of Trusted Computing Group (TCG and presents an IBE-Trust security protocol utilizing well-known identity based encryption scheme. The protocol incorporates ideas from Trusted Computing Group and Identity-based cryptosystem by Boneh Franklin in ensuring trusted and secured communications between sender and receiver. The proposed protocols were then modeled using the high-level formal language HLPSL and verified using the model checking tool AVISPA. Analysis on the proposed protocols is presented at the end of this paper.

  11. UTILIZATION OF AMINO ACIDS OF BROKEN RICE IN GROWING PIGS

    Directory of Open Access Journals (Sweden)

    Matej Brestenský

    2014-02-01

    Full Text Available The six cannulated gilts (initial body weight 35.8 ± 0.5 kg fitted with a T-cannula in terminal ileum, were used to determine the apparent (AID and standardized (SID ileal digestibility of nitrogen (N and amino acids (AA in broken rice. Animals were fed twice daily in a two equal doses at a daily rate of 80 g.kg - 0.75. Water was offered ad libitum. The tested feed was the sole source of protein in the diet. The N-free diet was used to determine the ileal endogenous flow of AA and N. Chromium oxide (Cr2O3 was added to the diets as an indigestible marker in an amount of 0.3 % per kg of diet. After a 14 d postoperative period a 6 d adaptation period followed during which the animals were fed with an experimental diet. On d 7 ileal digesta was collected continuously for 24 h. The AID and SID of AA and N were calculated using analytically determined values of N, Cr2O3 and AA. The SID of AA was in a range from 81.6 % (tyrosine to 112.6 % (proline (P 0.05, respectively. There were no differences between standardized ileal digestibility of essential amino acids (94.3 % and nonessential amino acids (95.3 %. Regarding the ileal digestibility of AA, broken rice, a by-product from the food industry, is an appropriate source of digestible AA for growing pigs.

  12. Fractal Characteristics and Fractal Dimension Measurement on Broken Surfaces of Aluminum Electric Porcelain

    Institute of Scientific and Technical Information of China (English)

    YANG Zhiyuan; ZHOU Anning

    2005-01-01

    The characteristics of broken surfaces were researched by a scanning electron microscope (SEM) and a reflection microscope, and the fractal dimensions of broken surfaces were measured by the Slit Island method. The experimental results indicate that the broken surface of aluminum electric porcelain is a fractal body in statistics, and the fractal dimensions of broken surfaces are different with the different amplification multiple value.In all of measured fractal dimensions,both of values measured in 100× under reflection microscope and in 500× under SEM are maximum, whereas the values measured in 63× under reflection microscope and in 2000× under SEM are obviously minimum. The fractal dimensions of broken surfaces are also affected by the degrees of gray comparison and the kinds of measuring methods. The relationships between the fractal dimensions of broken surfaces and porcelain bend strengths are that they are in positive correlation on the low multiples and in negative correlation on the high multiples.

  13. Extension of Subjective Logic for Time- Related Trust

    Institute of Scientific and Technical Information of China (English)

    HUANG Chen-lin; HU Hua-ping

    2005-01-01

    To describe the dynamic property of trust relationship, we propose a time-related trust model and extend Josang's subjective logic to fit for time-related trust model.The extension includes propositional conjunction, disjunction and negation for traditional logic and discounting and consensus operators that are evidential operators specially designed for the propagation and computation of trust relationships.With the extension of subjective logic for time-related trust,our time-related trust model is suitable to model the dynamic trust relationship in practice. Finally an example of reputation assessment is offered to demonstrate the usage of our trust model.

  14. Collaborative Trust: A Novel Paradigm of Trusted Mobile Computing

    CERN Document Server

    Mal-Sarkar, Tatini

    2010-01-01

    With increasing complexity of modern-day mobile devices, security of these devices in presence of myriad attacks by an intelligent adversary is becoming a major issue. The vast majority of cell phones still remain unsecured from many existing and emerging security threats. To address the security threats in mobile devices we are exploring a technology, which we refer as "Collaborative Trust". It is a technology that uses a system of devices cooperating with each other (working in a fixed or ad-hoc network) to achieve the individual security of each device. The idea is that each device is insecure by itself, since in many cases it is incapable of checking its safety by itself (e.g. when it is compromised it may lose its ability to monitor its own trustworthiness), but together, they can ensure each other's security in a collaborative manner.

  15. Radio: The Media of Not Capitalized Trust

    Directory of Open Access Journals (Sweden)

    Marina Mučalo

    2010-12-01

    Full Text Available New data on trends in radiophonics are rare and often radio as a medium is ignored entirely within academic studies. When it does appear in research, however, the achieved results depict an entirelydiff erent story: radio not only remains popular, but it also enjoys a high level of public trust. These conclusions primarily derive from a September 2009 study compiled on trust in the media. This study concludes that, in terms of trust, radio is positioned in front of the television and print media, and next to the internet. This article presents two themes. The first comments on the nature of the radio audience; the second deals with the issue of trust in radio content. The conclusion attempts to settle the question of if radio will again become active as a media source with a high degree of social responsibility, or rather remain a medium that fails to utilize its high level of the public trust?

  16. Does Education Lead to Higher Generalized Trust?

    DEFF Research Database (Denmark)

    Charron, Nicholas; Rothstein, Bo

    2016-01-01

    Generalized trust has become a prominent concept at the nexus of several disciplines, and the wide differences in trust between different societies continue to puzzle the social sciences. In this study, we explore the effects of micro and macro level factors in explaining an individual's propensity...... to ‘trust others'. We hypothesize that higher levels of education will lead to higher social trust in individuals, given that the context (country or regions within countries) in which they reside has a sufficiently impartial and non-corrupt institutional setting. However, the positive effect of education...... on trust among individuals is expected to be negligible in contexts with greater levels of corruption and favoritism toward certain people are more inclined to view the system as ‘rigged' as they become more educated. This multi-level interaction effect is tested using original survey data of 85...

  17. Hybrid Trust Model for Internet Routing

    CERN Document Server

    Rantala, Pekka; Isoaho, Jouni

    2011-01-01

    The current Internet is based on a fundamental assumption of reliability and good intent among actors in the network. Unfortunately, unreliable and malicious behaviour is becoming a major obstacle for Internet communication. In order to improve the trustworthiness and reliability of the network infrastructure, we propose a novel trust model to be incorporated into BGP routing. In our approach, trust model is defined by combining voting and recommendation to direct trust estimation for neighbour routers located in different autonomous systems. We illustrate the impact of our approach with cases that demonstrate the indication of distrusted paths beyond the nearest neighbours and the detection of a distrusted neighbour advertising a trusted path. We simulated the impact of weighting voted and direct trust in a rectangular grid of 15*15 nodes (autonomous systems) with a randomly connected topology.

  18. Net Benefits from growing lucerne (Medicago sativa) on the Broken Plains of north eastern Victoria

    OpenAIRE

    Trapnell, Lindsay N.; Malcolm, Bill

    2008-01-01

    Clearing of trees and native vegetation over the past 160 years has led to increasing rates of dryland salinization in the Goulburn-Broken Catchment area. In its dryland section, within the Goulburn Highlands, South West Goulburn, and the Broken Highlands subcatchments, hydrologic balance exists. But in the Riverine Plains comprising the Goulburn and Broken Plains sub-catchments, where average annual rainfalls are less than 600 mm per annum, it will be many decades before hydrologic balance i...

  19. Formation of coated vesicles from coated pits in broken A431 cells

    OpenAIRE

    1989-01-01

    Biochemical and morphological techniques were used to demonstrate the early steps in the endocytosis of transferrin in broken A431 cells. After binding 125I-transferrin, the cells were broken by scraping and then warmed. 125I-transferrin became inaccessible to exogenous anti- transferrin antibody providing a measure of the internalization process. Parallel morphological experiments using transferrin coupled to horseradish peroxidase confirmed internalization in broken cells. The process was c...

  20. Partnering for bioregionalism in England: a case study of the Westcountry Rivers Trust

    Directory of Open Access Journals (Sweden)

    Hadrian Cook

    2016-06-01

    Full Text Available The adoption of bioregionalism by institutions that are instrumental in river basin management has significant potential to resolve complex water resource management problems. The Westcountry Rivers Trust (WRT in England provides an example of how localized bioregional institutionalization of adaptive comanagement, consensus decision making, local participation, indigenous technical and social knowledge, and "win-win" outcomes can potentially lead to resilient partnership working. Our analysis of the WRT's effectiveness in confronting nonpoint source water pollution, previously impervious to centralized agency responses, provides scope for lesson-drawing on institutional design, public engagement, and effective operation, although some evident issues remain.

  1. Genetic influences are virtually absent for trust.

    Directory of Open Access Journals (Sweden)

    Paul A M Van Lange

    Full Text Available Over the past decades, numerous twin studies have revealed moderate to high heritability estimates for individual differences in a wide range of human traits, including cognitive ability, psychiatric disorders, and personality traits. Even factors that are generally believed to be environmental in nature have been shown to be under genetic control, albeit modest. Is such heritability also present in social traits that are conceptualized as causes and consequences of social interactions or in other ways strongly shaped by behavior of other people? Here we examine a population-based sample of 1,012 twins and relatives. We show that the genetic influence on generalized trust in other people (trust-in-others: h2 = 5%, ns, and beliefs regarding other people's trust in the self (trust-in-self: h2 = 13%, ns, is virtually absent. As test-retest reliability for both scales were found to be moderate or high (r = .76 and r = .53, respectively in an independent sample, we conclude that all variance in trust is likely to be accounted for by non-shared environmental influences. We show that, relative to cognitive abilities, psychiatric disorders, and classic personality variables, genetic influences are smaller for trust, and propose that experiences with or observations of the behavior of other people shape trust more strongly than other traits.

  2. Trust and the transformation of energy systems

    Energy Technology Data Exchange (ETDEWEB)

    Rayner, Steve [James Martin Institute for Science and Civilization, Said Business School, Park End Street, Oxford, OX1 1HP (United Kingdom)

    2010-06-15

    The author looks at diverse concepts and roles of trust in the challenge of decarbonising energy systems, drawing on 25 years of personal experience in the fields of energy and environmental policy research. The paper focuses on three issues-public trust in science, institutional trust in making technology choices, and the idea that high-trust societies are more sustainable than those exhibiting low-trust. While trust is a key concept in understanding the public acceptability of technology choices, it is only one of a suite of interrelated concepts that must be addressed, which also includes liability, consent, and fairness. Furthermore, rational distrust among competing institutional world views may be critical in understanding the role of social capital in socioeconomic and technological development. Thus the concept of trust has become a portmanteau, carrying a diverse range of ideas and conditions for sustainable energy systems. The paper concludes with three emphases for decision makers. First, the issue is the energy system, not particular generating technologies. Second, the energy system must be recognized to be as much a social system as it is a technical one. Third, the system requires incorporation of the minimum level of diversity of engineering technologies and social actors to be sustainable. (author)

  3. Trust and cooperation: a new experimental approach.

    Science.gov (United States)

    Acedo, Cristina; Gomila, Antoni

    2013-09-01

    Several theories within different disciplines emphasize the role of trust in fostering cooperation in human social life. Despite differences, the core of these notions of trust is affectively motivated loyalty, which makes the individuals feel mutually committed and willing to accept vulnerability because of positive expectations about each other's behavior. In evolutionary game theory and experimental economics, the notion of trust is much simpler: it is an expectation about another's behavior, a kind of wager, in which the sense of mutual commitment and vulnerability is completely absent. In order to extend the paradigm of trust games typical in those fields to explore the fuller sense of trust relationships, we have developed a new experimental design, in which an iterated prisoner dilemma is played by participants who do or do not hold a trusting personal relationship, while anonymity is preserved. We present here the results of our two pilot studies, which indicate the relevance of personal trust in fostering cooperation and suggest the influence of the structure of social networks on the degree of cooperation achieved. PMID:25708082

  4. Sudden Trust Collapse in Networked Societies

    CERN Document Server

    Batista, João da Gama; Challet, Damien

    2014-01-01

    Trust is a collective, self-fulfilling phenomenon that suggests analogies with phase transitions. We introduce a stylized model for the build-up and collapse of trust in networks, which generically displays a first order transition. The basic assumption of our model is that whereas trust begets trust, panic also begets panic, in the sense that a small decrease in trust may be amplified and ultimately lead to a sudden and catastrophic drop of trust. We show, using both numerical simulations and mean-field analytic arguments, that there are extended regions of the parameter space where two equilibrium states coexist: a well-connected network where confidence is high, and a poorly connected network where confidence is low. In these coexistence regions, spontaneous jumps from the well-connected state to the poorly connected state can occur, corresponding to a sudden collapse of trust that is not caused by any major external catastrophe. In large systems, spontaneous crises are replaced by history dependence: whet...

  5. Ben Franklin. [Lesson Plan].

    Science.gov (United States)

    Discovery Communications, Inc., Bethesda, MD.

    Based on Benjamin Franklin's "Poor Richard's Almanac," this lesson plan presents activities designed to help students understand that Ben Franklin is known, among other things, for his wit and wisdom; that Franklin published an almanac for 25 years; and he scattered aphorisms throughout the almanac. The main activity in the lesson is for students…

  6. "Frankenstein." [Lesson Plan].

    Science.gov (United States)

    Simon, Melanie

    Based on Mary Shelley's novel "Frankenstein," this lesson plan presents activities designed to help students understand that active readers interpret a novel (its characters, plot, setting, and theme) in different ways; and the great literature can be and has been adapted in many ways over time. The main activity of the lesson involves students…

  7. Great Expectations. [Lesson Plan].

    Science.gov (United States)

    Devine, Kelley

    Based on Charles Dickens' novel "Great Expectations," this lesson plan presents activities designed to help students understand the differences between totalitarianism and democracy; and a that a writer of a story considers theme, plot, characters, setting, and point of view. The main activity of the lesson involves students working in groups to…

  8. The Contextual Antecedents of Organizational Trust

    DEFF Research Database (Denmark)

    Li, Peter Ping; Bai, Yuntao; Xi, Youmin

    2012-01-01

    In this article we seek to explore the contextual antecedents of organizational trust. In light of the complex links between organizational contexts and organizational behaviours, we focus on the effects of the three most critical contextual antecedents, i.e., leadership role, structural rule......, and cultural norm at the organizational level, on organizational trust directly, and their behavioural outcomes at the individual level indirectly, using organizational trust as a cross-level mediator. The empirical results, based on a hierarchical linear model with a sample of 444 employees from 82 firms...

  9. Factors influencing trust of teachers among students

    Directory of Open Access Journals (Sweden)

    Kurnianingsih, Sri

    2012-01-01

    Full Text Available In Indonesia, Ki Hajar Dewantoro is one of the most respected scholars in education philosophy. He stated the importance of trust earned by teachers in guiding students in their learning activities. The teacher, as the leader in the class, needs to develop mutual trust between students and teachers. Trust to teachers is strongly required by students as a foundation in developing and expanding their relationship and also social network. It is also the fundamental element in their desire to pursue higher education, for it is only through a sense of trust that student will embrace an empowering sense of freedom and pursuit the knowledge. The exercise of this freedom requires a risk on behalf of students based on the trust of their teachers and the learning experience that they provide. If students trust their teachers, they will be more able to focus on the task at hand and to work and learn more effectively. A total number of 291 senior high school students in Yogyakarta (males=147, females=144 completed an open-ended questionnaire developed for this study that asks how much they trust their teachers and the reason why they trust their teachers. The data was analyzed using indigenous psychological approach of analyzing the content of open-ended responses, categorization of the responses and cross-tabulating with demographic/background information. Results indicated that 63% of participants stated that they trusted their teachers. The main reason for trusting their teachers are as follows: they are perceived as being similar to their parents, teachers’ ability in transferring knowledge, the relationship with teacher, and their abilities of guiding students. The study concluded that trust of senior high school students was established because of views that teachers are parents that have competence in delivering knowledge and are formally established as teachers. Therefore a teacher’s behavior that similarly represents a parent’s behavior at

  10. Trust Ownership of the Tata Group

    DEFF Research Database (Denmark)

    Thomsen, Steen

    structure is characterized by managerial distance between trusts and Group companies. The Trusts are almost exclusively concerned with philanthropy, and according to the Articles of Association of Tata Sons Limited, their governance role is limited to nominating two members to the Selection Committee which...... of the Shapoorji Pallonji Group, a minority shareholder in Tata Sons, is to succeed Mr. Ratan Tata as chairman of Tata Sons in 2012. Trustees in the major Trusts are paid nominal fees of as little as $10 and $20 a year....

  11. Mediated Trust in the Innovation Ecosystem

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    should be considered trustworthy. When receiving the message, the audience will decode the signals. Trust is considered fundamental for mass media if these are to fulfill their normative functions in the innovation ecosystem. However, the concept of trust is not clearly defined in the literature and we......This paper introduces a framework for further studies in the role of mediated trust in the innovation ecosystems. Combining insight from scholars like Etzkowitz, Russel and Nordfors, the concept of innovation ecosystem is described as an extended Triple Helix where media is seen as a fourth strand...

  12. Trusting the other or taking a chance?

    DEFF Research Database (Denmark)

    Frederiksen, Morten; Heinskou, Marie Bruvik

    2016-01-01

    Theories of modernity and risk society argue that increasing levels of risk fundamentally alter or lower the level of trust in society. In this article we argue that this assumption is based in a fallacious theoretical link between trust and risk. Rather than calculative assessment of risk......, respectively, reside. Secondly, the issue of temporality is traced in Luhmann’s work on trust and it is demonstrated how his dichotomous treatment of social time conflates markedly different temporal experiences. As a solution to this, the article presents the notion of a third temporal mode of the process...

  13. Building Trust in High-Performing Teams

    OpenAIRE

    Aki Soudunsaari; Mila Hakanen

    2012-01-01

    Facilitation of growth is more about good, trustworthy contacts than capital. Trust is a driving force for business creation, and to create a global business you need to build a team that is capable of meeting the challenge. Trust is a key factor in team building and a needed enabler for cooperation. In general, trust building is a slow process, but it can be accelerated with open interaction and good communication skills. The fast-growing and ever-changing nature of global business sets dema...

  14. Trust in Co-sourced Software Development

    DEFF Research Database (Denmark)

    Schlichter, Bjarne Rerup; Persson, John Stouby

    2014-01-01

    . We present a case study of how the co-sourcing relationship between a certified CMMI-level 5 Danish software company and an offshoring supplier can be conceptualized as an Abstract System. An Abstract System is a dis-embedded social system (such as banking) that is trusted despite lack of detailed...... understanding or personal trust relations. The paper suggest how certain work practices among developers and managers can be explained using a dynamic trust lens based on Abstract Systems, especially dis- and re-embedding mechanisms....

  15. Do Reputation Systems Undermine Trust? Divergent Effects of Enforcement Type on Generalized Trust and Trustworthiness.

    Science.gov (United States)

    Kuwabara, Ko

    2015-03-01

    Research shows that enforcing cooperation using contracts or tangible sanctions can backfire, undermining people's intrinsic motivation to cooperate: when the enforcement is removed, people are less trusting or trustworthy than when there is no enforcement to begin with. The author examines whether reputation systems have similar consequences for generalized trust and trustworthiness. Using a web-based experiment simulating online market transactions (studies 1 and 2), he shows that reputation systems can reinforce generalized trust and trustworthiness, unlike contractual enforcement or relational enforcement based on repeated interactions. In a survey experiment (study 3), he finds that recalling their eBay feedback scores made participants more trusting and trustworthy. These results are predicated on the diffuse nature of reputational enforcement to reinforce perceptions of trust and trustworthiness. These results have implications for understanding how different forms of governance affect generalized trust and trustworthiness. PMID:26421343

  16. DualTrust: A Trust Management Model for Swarm-Based Autonomic Computing Systems

    Energy Technology Data Exchange (ETDEWEB)

    Maiden, Wendy M. [Washington State Univ., Pullman, WA (United States)

    2010-05-01

    Trust management techniques must be adapted to the unique needs of the application architectures and problem domains to which they are applied. For autonomic computing systems that utilize mobile agents and ant colony algorithms for their sensor layer, certain characteristics of the mobile agent ant swarm -- their lightweight, ephemeral nature and indirect communication -- make this adaptation especially challenging. This thesis looks at the trust issues and opportunities in swarm-based autonomic computing systems and finds that by monitoring the trustworthiness of the autonomic managers rather than the swarming sensors, the trust management problem becomes much more scalable and still serves to protect the swarm. After analyzing the applicability of trust management research as it has been applied to architectures with similar characteristics, this thesis specifies the required characteristics for trust management mechanisms used to monitor the trustworthiness of entities in a swarm-based autonomic computing system and describes a trust model that meets these requirements.

  17. 12 CFR 330.10 - Revocable trust accounts.

    Science.gov (United States)

    2010-01-01

    ... includes a natural person as well as a charitable organization and other non-profit entity recognized as... with informal and formal testamentary revocable trusts. Such informal trusts are commonly referred to as payable-on-death accounts, in-trust-for accounts or Totten Trust accounts, and such formal...

  18. Institutional and social trust: Is there a causal relationship?

    DEFF Research Database (Denmark)

    Dinesen, Peter Thisted; Sønderskov, Kim Mannemar

    affecting both types of trust. Therefore, conventional analyses using cross-sectional data are ill-suited to determine whether institutional trust actually cause social trust. In contrast to previous analyses, this paper utilizes two Danish panel surveys containing measures of the two types of trust for the...

  19. Social Trust Aware Item Recommendation for Implicit Feedback

    Institute of Scientific and Technical Information of China (English)

    郭磊; 马军; 姜浩然; 陈竹敏; 邢长明

    2015-01-01

    Social trust aware recommender systems have been well studied in recent years. However, most of existing methods focus on the recommendation scenarios where users can provide explicit feedback to items. But in most cases, the feedback is not explicit but implicit. Moreover, most of trust aware methods assume the trust relationships among users are single and homogeneous, whereas trust as a social concept is intrinsically multi-faceted and heterogeneous. Simply exploiting the raw values of trust relations cannot get satisfactory results. Based on the above observations, we propose to learn a trust aware personalized ranking method with multi-faceted trust relations for implicit feedback. Specifically, we first introduce the social trust assumption — a user’s taste is close to the neighbors he/she trusts — into the Bayesian Personalized Ranking model. To explore the impact of users’ multi-faceted trust relations, we further propose a category-sensitive random walk method CRWR to infer the true trust value on each trust link. Finally, we arrive at our trust strength aware item recommendation method SocialBPRCRWR by replacing the raw binary trust matrix with the derived real-valued trust strength. Data analysis and experimental results on two real-world datasets demonstrate the existence of social trust influence and the effectiveness of our social based ranking method SocialBPRCRWR in terms of AUC (area under the receiver operating characteristic curve).

  20. RCCtrust: A Combined Trust Model for Electronic Community

    Institute of Scientific and Technical Information of China (English)

    Yu Zhang; Hua-Jun Chen; Xiao-Hong Jiang; Hao Sheng; Zhao-Hui Wu

    2009-01-01

    Previous trust models are mainly focused on reputational mechanism based on explicit trust ratings.However,the large amount of user-generated content and community context published on Web is often ignored.Without enough information,there are several problems with previous trust models:first,they cannot determine in which field one user trusts in another,so many models assume that trust exists in all fields.Second some models are not able to delineate the variation of trust SCales,therefore they regard each user trusts all his friends to the same extent.Third,since these models only focus on explicit trust ratings,so the trust matrix is very sparse.To Solve these problems,we present RCCtrust-a trust model which combines Reputation-,Content-and Context-based mechanisms to provide more accurate,fine-grained and efficient trust management for the electronic community.We extract trust-related information from user-generated content and community context from Web to extend reputation-based trust models. We introduce role-based and behavior-based reasoning functionalities to infer users'i nterests and category-specific trust relationships.Following the study in sociology, RCCtrust exploits similarities between pairs of users to depict difierentiated trust scales.The experimental results show that RCCtrust outperforin8 pure user similarity method and linear decay trust-aware technique in both accuracy and coverage for a Recommender System.

  1. A Novel Trust Service Provider for Internet Based Commerce Applications.

    Science.gov (United States)

    Siyal, M. Y.; Barkat, B.

    2002-01-01

    Presents a framework for enhancing trust in Internet commerce. Shows how trust can be provided through a network of Trust Service Providers (TSp). Identifies a set of services that should be offered by a TSp. Presents a distributed object-oriented implementation of trust services using CORBA, JAVA and XML. (Author/AEF)

  2. Trust Building via Risk Taking: A Cross-Societal Experiment

    Science.gov (United States)

    Cook, Karen S.; Yamagishi, Toshio; Cheshire, Coye; Cooper, Robin; Matsuda, Masafumi; Mashima, Rie

    2005-01-01

    The role of risk taking in building trust relations has largely been overlooked in the burgeoning literature on trust in the social sciences; yet it is central to understanding how trust develops. We argue that a series of risk-taking behaviors is indispensable to building a trust relation. We conducted experiments in Japan and the United States…

  3. 26 CFR 1.664-2 - Charitable remainder annuity trust.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 8 2010-04-01 2010-04-01 false Charitable remainder annuity trust. 1.664-2... TAX (CONTINUED) INCOME TAXES Estates and Trusts Which May Accumulate Income Or Which Distribute Corpus § 1.664-2 Charitable remainder annuity trust. (a) Description. A charitable remainder annuity trust...

  4. Dynamic Trust Management for Mobile Networks and Its Applications

    Science.gov (United States)

    Bao, Fenye

    2013-01-01

    Trust management in mobile networks is challenging due to dynamically changing network environments and the lack of a centralized trusted authority. In this dissertation research, we "design" and "validate" a class of dynamic trust management protocols for mobile networks, and demonstrate the utility of dynamic trust management…

  5. Trust Matters: Leadership for Successful Schools, 2nd Edition

    Science.gov (United States)

    Tschannen-Moran, Megan

    2014-01-01

    Make your school soar by escalating trust between teachers, students, and families. Trust is an essential element in all healthy relationships, and the relationships that exist in your school are no different. How can your school leaders or teachers cultivate trust? How can your institution maintain trust once it is established? These are the…

  6. 24 CFR 92.500 - The HOME Investment Trust Fund.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false The HOME Investment Trust Fund. 92... Investment Trust Fund. (a) General. A HOME Investment Trust Fund consists of the accounts described in this... Investment Trust Fund United States Treasury account for each participating jurisdiction. Each...

  7. 12 CFR 745.9-1 - Trust accounts.

    Science.gov (United States)

    2010-01-01

    ... AND APPENDIX Clarification and Definition of Account Insurance Coverage § 745.9-1 Trust accounts. (a) For purposes of this section, “trust” refers to an irrevocable trust. (b) All trust interests (as... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Trust accounts. 745.9-1 Section 745.9-1...

  8. 76 FR 65717 - City of Broken Bow, OK; Notice of Availability of Final Environmental Assessment

    Science.gov (United States)

    2011-10-24

    ... Commission's (Commission or FERC) regulations, 18 CFR part 380 (Order No. 486, 52 FR 47897), the Office of Energy Projects has reviewed the application for an Original Major License for the Broken Bow Re... Energy Regulatory Commission City of Broken Bow, OK; Notice of Availability of Final...

  9. 75 FR 33290 - City of Broken Bow, OK; Notice of Availability of Environmental Assessment

    Science.gov (United States)

    2010-06-11

    ... Regulatory Commission's (Commission) regulations, 18 CFR part 380 (Order No. 486, 52 FR 47897), the Office of Energy Projects has reviewed the application for an Original Major License for the Broken Bow Re... Energy Regulatory Commission City of Broken Bow, OK; Notice of Availability of Environmental...

  10. Dynamically broken gauge model without fundamental scalar fields

    Energy Technology Data Exchange (ETDEWEB)

    Snyderman, N. J.; Guralnik, G. S.

    1976-01-01

    It is shown that the structure that must be generated by dynamical symmetry breaking solutions to gauge theories can be explicitly implemented with a 4-fermion interaction. This structure arises in order to obtain consistency with the constraints imposed by a Goldstone commutator proportional to (anti psi psi). One demonstrates these ideas within the context of axial electrodynamics, dynamically breaking chiral symmetry. As a pre-requisite it is shown how the Nambu-Jona-Lasinio model becomes renormalizable with respect to a systematic approximation scheme that respects the Goldstone commutator of dynamically broken chiral symmetry to each order of approximation. (This approximation scheme is equivalent to a l/N expansion, where N is set to unity at the end of the calculations). This solution generates new interactions not explicitly present in the original Lagrangian and does not have a 4-fermion contact interaction. The renormalized Green's functions are shown to correspond to those of the sigma-model, summed as though the fermions had N components, and for which lambda/sub 0/ = 2g/sub 0//sup 2/. This correspondence is exact except for the possibility that the renormalized coupling of the Nambu-Jona-Lasinio model may be a determined number.

  11. Higgs boson physics and broken flavor symmetry -- LHC phenomenology

    CERN Document Server

    Berger, Edmond L

    2014-01-01

    The LHC implications are presented of a simplified model of broken flavor symmetry in which a new scalar (a flavon) emerges with mass in the TeV range. We summarize the influence of the model on Higgs boson physics, notably on the production cross section and decay branching fractions. Limits are obtained on the flavon $\\varphi$ from heavy Higgs boson searches at the LHC at 7 and 8 TeV. The branching fractions of the flavon are computed as a function of the flavon mass and the Higgs-flavon mixing angle. We explore possible discovery of the flavon at 14 TeV, particularly via the $\\varphi \\rightarrow Z^0Z^0$ decay channel in the $2\\ell2\\ell'$ final state, and through standard model Higgs boson pair production $\\varphi \\rightarrow hh$ in the $b\\bar{b}\\gamma\\gamma$ final state. The flavon mass range up to $500$ GeV could probed down to quite small values of the Higgs-flavon mixing angle with 100 fb$^{-1}$ of integrated luminosity at 14 TeV.

  12. Broken particle-hole symmetry in critical fluids

    Science.gov (United States)

    Goldstein, Raymond E.; Parola, Alberto

    1988-06-01

    The quantitative validity of asymptotic particle-hole symmetry in a fluid at its liquid-vapor critical point is determined by means of the exact mapping of the fluid Hamiltonian onto that of an effective Landau-Ginzburg-Wilson model studied first by Hubbard and Schofield. A particular three-particle correlation of a reference fluid is identified as that which controls the breaking of liquid-vapor symmetry, as manifested in a linear mixing of the pure Ising-like scaling fields and a singularity in the coexistence curve diameter. The inherent smallness of the mixing coefficient in a pair-potential fluid is shown to reflect the weak density dependence of the second moment of the two-particle direct correlation function of the reference system. It is further demonstrated that three-body interactions of the Axilrod-Teller-type enhance the broken particle-hole symmetry found in a purely pairwise-additive Hamiltonian, and detailed calculations give diameter anomaly amplitudes which vary linearly with the fluid polarizability, in quantitative agreement with recent experiments.

  13. Evidence of Broken Reciprocity in Cholesteric Liquid Crystals

    Science.gov (United States)

    Venkataraman, Nithya; Moreira, Michele; Taheri, Bahman; Palffy-Muhoray, Peter

    2007-03-01

    Reciprocity of scattering of a plane incident wave is predicated on bounded scattering media with symmetric and linear permittivity, conductivity and permeability. In chiral media, such as cholesteric liquid crystals, the dielectric tensor is asymmetric due the presence of odd powers of the wave vector resulting from nonlocality and broken inversion symmetry. Evidence of non-reciprocity has been found in optically active crystals by Bennet [1] and in stacks of cholesteric and nematic liquid crystal cells [2]. Here we present transmittance and reflectance data for cholesteric cells with different pitches having overlapping but distinct reflection bands. We relate our results to simple analytic descriptions of the materials properties and of propagating modes and assess them in light of the requirements for reciprocity. 1. P.J. Bennett, S. Dhanjal, Yu. P. Svirko and N. I. Zheludev, Opt. Lett. 21, 1955 (1996) 2. J. Hwang; M.H. Song; B. Park; S. Nishimura; T. Toyooka; J.W. Wu; Y. Takanishi; K. Ishikawa; H. Takezoe, Nat. Mat. 4, 383 (2005).

  14. Detection of a Misaligned Broken Pipe by Electromagnetic Interaction

    Science.gov (United States)

    Di Gregorio, Pietro Paolo; Frezza, Fabrizio; Mangini, Fabio; Ferrara, Vincenzo

    2016-04-01

    The study we are presenting concerns electromagnetic scattering of a plane wave due to the presence of a misaligned broken pipe buried in a half-space occupied by cement and by asphalt/ground, for civil-engineering applications. In order to simulate a realistic scenario, the pipe is supposed cylindrical and made of metallic or poly-vinyl chloride (PVC) material whose electromagnetic properties are known in the literature and dimensions are the most used in civil-engineering applications. We consider the longitudinal axis of the pipe running parallel to the air-cement interface. We suppose, after the break of the pipe, that the longitudinal axes of the two parts move on a plane parallel to the separation interface, in opposite directions. The study focuses on the electromagnetic response of the scattered electric field along a line above the interface of the media considering different distances between the longitudinal axis of the tubes in two cases: PVC and metallic material. To accomplish the study, a commercially available simulator based on the Finite Element Method (FEM) is adopted and a circularly-polarized plane wave impinging normally to the interface is considered. This kind of study could be useful for monitoring the status of buried pipes using ground penetrating radar (GPR) techniques in many applications of Civil Engineering without the need to intervene destructively in the structure. Acknowledgement This work is a contribution to COST Action TU1208 "Civil Engineering Applications of Ground Penetrating Radar" (www.GPRadar.eu, www.cost.eu).

  15. Broken R-parity, stop decays, and neutrino physics

    CERN Document Server

    Restrepo, D A; Valle, José W F; Restrepo, Diego; Porod, Werner; Valle, Jose W. F.

    2001-01-01

    We discuss the phenomenology of the lightest stop in models where R-parity is broken by bilinear superpotential terms. In this class of models we consider scenarios where the R-parity breaking two-body decay ~t_1->\\tau^+b competes with the leading three-body decays such as ~t_1->W^+b~\\chi^0_1. We demonstrate that the R-parity violating decay can be sizable and in some parts of the parameter space even the dominant one. Moreover we discuss the expectations for \\~t_1->\\mu^+b and ~t_1->e^+b. The recent results from solar and atmospheric neutrinos suggest that these are as important as the tau bottom mode. The \\~t_1->l^+b decays are of particular interest for hadron colliders, as they may allow a full mass reconstruction of the lighter stop. Moreover these decay modes allow cross checks on the neutrino mixing angle involved in the solar neutrino puzzle complementary to those possible using neutralino decays. For the so--called small mixing angle or SMA solution ~t_1->e^+b should be negligible, while for the large...

  16. Fano resonance engineering in mirror-symmetry-broken THz metamaterials

    Science.gov (United States)

    Li, Xuefeng; Bian, Xinya; Milne, William I.; Chu, Daping

    2016-04-01

    We introduce a comprehensive approach to the design of mirror-symmetry-broken terahertz (THz) metamaterials and present both the simulation and experimental results which show the desired asymmetric Fano resonances and electromagnetically induced transparency-like windows. With a full-wave simulation, we find these asymmetry-induced resonance modes possess extremely high quality factors and they broaden with an increase in the structure asymmetry. This phenomenon arises from the destructive interference of a super-radiative bright mode and a sub-radiative dark mode which cannot be excited directly. Surface current and electric field distributions are analyzed to explain the emergence of these Fano resonances. An intuitive mechanical coupled oscillator model is derived to explain the unique line-shape of such Fano resonances. Moreover, large resonant frequency tuning (50 GHz) of Fano resonance has been demonstrated by temperature-induced phase change in liquid crystals. We believe that the Fano resonance in THz metamaterials may serve as a strong building block for passive or active THz elements with potential applications for future detection and sensing systems and devices.

  17. Trust and Electronic Commerce in the Agrifood Sector. A Trust Model and Experimental Experiences

    OpenAIRE

    Fritz, Melanie; Hausen, Tobias; Schiefer, Gerhard; Canavari, Maurizio

    2005-01-01

    Opportunities coming from electronic commerce provide interesting support options for the Agrifood sector. However, due to the product specific information asymmetry in the agrifood sector, the anonymity of the medium creates a lack of trust increasing transaction costs to engage in e-commerce. This paper develops a trust model for electronic commerce in the agrifood industry allowing for the analysis of trust determinants in traditional agrifood transaction relationships and their transfer t...

  18. SERVANT LEADERSHIP AND ORGANIZATIONAL TRUST: THE MEDIATING EFFECT OF THE LEADER TRUST AND ORGANIZATIONAL COMMUNICATION

    OpenAIRE

    Morad Rezaei; Sajjad Salehi; Masomeh Shafiei; Somaye Sabet

    2012-01-01

    The purpose of this paper aims to clarify the relationship between servant leadership and organizational trust, and tries to demonstrate the mediator role of leader trust and organizational communication in this relationship. The study sample included 258 employees of Guilan province Tax Administration and for sampling we used cluster method. Previous studies have also focused on the positive impact of servant leadership in organizational trust and in this article the results show that there ...

  19. Administrational Trust: An empirical examination of interorganisational trust and distrust in the Flemish administration

    OpenAIRE

    Oomsels, Peter

    2016-01-01

    This dissertation focuses on interorganisational trust in the Flemish public administration, and is the result of a four-year research project in the framework of the Flemish Policy Research Centre – Governmental Organisation – Decisive Governance (2012-2015). The objectives of our research were threefold: 1) to define and identify interorganisational trust in the empirical reality of public administration, 2) to explain the mechanisms of interorganisational trust in the empirical reality of...

  20. A trans-domain convergence trust model for network trust architecture

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    This paper presents and analyses five existing trust models for the establishment of network trust architecture, based on that, a new public key infrastructure (PKI) interoperability trust mode with trans-domain convergence is proposed, moreover, its applications on the construction of interoperability models are compared with those of other five models, which shows that this new model maintains the independence and self-management of own system, namely, accords with practical PKI architecture operation.

  1. Making Sense of Context as a Basis for Trust

    DEFF Research Database (Denmark)

    Fuglsang, Lars; Jagd, Søren

    or institutional trust raises the more general question of how we may understand the role of context in interpersonal trust relations. The paper attempts to fill the gap in the organizational trust literature, between interpersonal and institutional trust research, by investigating the more general problem......The concept of interpersonal trust has been important in organizational trust research for at least a decade, but recently a growing literature is stressing the need to focus more on the institutional dimensions of trust-creation. The opposition between traditions stressing either interpersonal...

  2. Model of Trust Management in Open Network Environment

    Institute of Scientific and Technical Information of China (English)

    曹元大; 宁宇鹏

    2003-01-01

    To keep open network more efficacious and secure, it is necessary that a nice trust model and method of trust management must be developed. The reason why traditional trust models are incomplete in their function to manage trust is explained, and a general model based on hybrid trust model and introducer protocol is provided. The hybrid model is more flexible and efficacious to manage trust compared with hierarchy model and Web model. The introducer protocol is a better solution to build, maintain and refresh the trust relationship in open network environment.

  3. BIOS Security Analysis and a Kind of Trusted BIOS

    Science.gov (United States)

    Zhou, Zhenliu; Xu, Rongsheng

    The BIOS's security threats to computer system are analyzed and security requirements for firmware BIOS are summarized in this paper. Through discussion about TCG's trust transitivity, a new approach about CRTM implementation based on BIOS is developed. In this paper, we also put forward a new trusted BIOS architecture-UTBIOS which is built on Intel Framework for EFI/UEFI. The trustworthiness of UTBIOS is based on trusted hardware TPM. In UTBIOS, trust encapsulation and trust measurement are used to construct pre-OS trust chain. Performance of trust measurement is also analyzed in the end.

  4. A new approach to detect broken rotor bars in induction machines by current spectrum analysis

    Science.gov (United States)

    Didier, G.; Ternisien, E.; Caspary, O.; Razik, H.

    2007-02-01

    This paper deals with a new technique to detect broken rotor bars in polyphase induction machines. Like most techniques, we employ the Fourier Transform of the stator current to make detection. But where the other methods use the Fourier Transform modulus, this alternative approach proposes to analyse its phase. As shown by results, the Fourier Transform phase allows to detect one broken rotor bar when the motor operates under a low load but the method robustness decreases for a half-broken rotor bar. So, in order to improve the diagnosis and to permit the detection of incipient broken rotor bar, the analysis is completed with the Hilbert Transform. This transform provides good results and a partially broken rotor bar can be detected when the load torque is equal or greater than 25%. The main advantage of these methods is that the final decision on the rotor cage state is took without the healthy motor reference.

  5. Development of trust during large scale system implementation

    DEFF Research Database (Denmark)

    Schlichter, Bjarne Rerup

    2010-01-01

      Implementations of information systems are complex and problematic with a reputation for being delayed and exceeding budget. A critical factor in implementations is trust in the system, trust in the project and trust between the various stakeholders. This case charts the evolution of trust in t...... in the implementation of the Faroese integrated healthcare system and shows how trust relations at various points in the project became difficult, what the causes and consequences of these trust difficulties were, and how they were successfully resolved in the project.......  Implementations of information systems are complex and problematic with a reputation for being delayed and exceeding budget. A critical factor in implementations is trust in the system, trust in the project and trust between the various stakeholders. This case charts the evolution of trust...

  6. Analysing Trust Transitivity and The Effects of Unknown Dependence

    Directory of Open Access Journals (Sweden)

    Touhid Bhuiyan

    2010-03-01

    Full Text Available Trust can be used to improve online automated recommendation within a given domain. Trust transitivity is used to make it successful. But trust transitivity has different interpretations. Trust and trust transitivity; both are the human mental phenomenon and for this reason, there is no such thing as objective transitivity. Trust transitivity and trust fusion both are important elements in computational trust. This paper analyses the parameter dependence problem in trust transitivity and proposes some definitions considering the effects of base rate. In addition, it also proposes belief functions based on subjective logic to analyse trust transitivity of three specified cases with sensitive and insensitive based rate. Then it presents a quantitative analysis of the effects of unknown dependence problem in an interconnected network environment; such Internet.

  7. Touchstone of Trust inside Organizations: Antecedents of high-trust manager-employee relationships

    OpenAIRE

    Schafheitle, Simon Daniel; Weibel, Antoinette; Möllering, Guido

    2016-01-01

    This paper investigates what makes managers trust their employees whereby the leap of faith is taken to be the irrational touchstone of high-trust interpersonal relationships to emerge. We employ an explorative-inductive research design using semi-structured expert-interviews. Embedded within a framework of organizational decision-making, we find five cues to matter for high-trust manager-employee dyads: (1) managers’ expectations of an employee’s trust-worthiness, (2) his/her personal dispos...

  8. Mediated Trust in the Innovation Ecosystem

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    besides industry, state and academia. In this paper, the concept mediated trust refers to the process in which an independent institution produces a form of mass medium. As is the case with any message, the content of the mass media is coded so that it signals to what degree information and/or opinions......This paper introduces a framework for further studies in the role of mediated trust in the innovation ecosystems. Combining insight from scholars like Etzkowitz, Russel and Nordfors, the concept of innovation ecosystem is described as an extended Triple Helix where media is seen as a fourth strand...... should be considered trustworthy. When receiving the message, the audience will decode the signals. Trust is considered fundamental for mass media if these are to fulfill their normative functions in the innovation ecosystem. However, the concept of trust is not clearly defined in the literature and we...

  9. HYBRID TRUST MODEL FOR INTERNET ROUTING

    Directory of Open Access Journals (Sweden)

    Pekka Rantala

    2011-05-01

    Full Text Available The current Internet is based on a fundamental assumption of reliability and good intent among actors inthe network. Unfortunately, unreliable and malicious behaviour is becoming a major obstacle forInternet communication. In order to improve the trustworthiness and reliability of the networkinfrastructure, we propose a novel trust model to be incorporated into BGP routing. In our approach,trust model is defined by combining voting and recommendation to direct trust estimation for neighbourrouters located in different autonomous systems. We illustrate the impact of our approach with cases thatdemonstrate the indication of distrusted paths beyond the nearest neighbours and the detection of adistrusted neighbour advertising a trusted path. We simulated the impact of weighting voted and directtrust in a rectangular grid of 15*15 nodes (autonomous systems with a randomly connected topology.

  10. The Volatile Nature of Social Trust

    DEFF Research Database (Denmark)

    Kjærsgård, Andreas Pihl; Anhøj, Anne Iversen

    The countries in Central and Eastern Europe (CEE) have to varying degrees been struggling in their transition to market economies and democracy. Social trust is often argued to be a crucial lubricant in solving collective action problems and thus building and maintaining well-functioning institut......The countries in Central and Eastern Europe (CEE) have to varying degrees been struggling in their transition to market economies and democracy. Social trust is often argued to be a crucial lubricant in solving collective action problems and thus building and maintaining well...... by the development of public sentiment in a given context. The development of social trust in Croatia and Slovenia thus correlate with factors as the sense of trust and corruption among politicians, public officials and public institutions, the general economic and social development in the country as well...

  11. Analyzing Trust Perceptions in System Implementations

    DEFF Research Database (Denmark)

    Schlichter, Bjarne Rerup; Rose, Jeremy

    2009-01-01

    mount, trust relations become strained, leading to a circle of suspicion and disbelief which is both destructive and hard to break out of. This case study analyses trust relations during a problematic period of time in the implementation of the Faroese integrated healthcare information system, using....... A major contribution is that if an implementation project interacts with many or complex abstract systems, the managers must focus on continuous embedding and re-embedding by interacting directly with representatives of the abstract systems in question to maintain trust. Also we observe that actors......Implementations of large scale information systems are complex and problematic with a reputation for being delayed and going over budget. A critical factor in the success of these implementations is trust in the system, in the project and between the various stakeholders. As problems and delays...

  12. Trust in Co-sourced Software Development

    DEFF Research Database (Denmark)

    Schlichter, Bjarne Rerup; Persson, John Stouby

    2014-01-01

    . We present a case study of how the co-sourcing relationship between a certified CMMI-level 5 Danish software company and an offshoring supplier can be conceptualized as an Abstract System. An Abstract System is a dis-embedded social system (such as banking) that is trusted despite lack of detailed......Software development projects are increasingly geographical distributed with offshoring. Co-sourcing is a highly integrative and cohesive approach, seen successful, to software development offshoring. However, research of how dynamic aspects of trust are shaped in co-sourcing activities is limited...... understanding or personal trust relations. The paper suggests how certain work practices among developers and managers can be explained using a dynamic trust lens based on Abstract Systems, especially dis- and re-embedding mechanisms...

  13. Public Trust Doctrine Implications of Electricity Production

    DEFF Research Database (Denmark)

    Noel, Lance Douglas; Firestone, Jeremy

    2015-01-01

    ’s impact on those two areas and the comparatively smaller impacts of renewable energy, electricity production has garnered very little public trust doctrine attention. This Article examines how electricity production implicates the public trust doctrine, primarily through the lens of four states...... development; (2) as a legal defense for states to validate actions encouraging renewable electricity development; (3) as a means for courts to more closely scrutinize electricity decisions made by the state; and (4) as an opportunity for state agencies to supplement and guide imperfect statutes. Together......, these four purposes of the public trust can ensure reasonable and timely development of renewable electricity as well as sufficient protection of trust resources....

  14. Corruption, Trust and their Public Sector Consequences

    DEFF Research Database (Denmark)

    Fritzen, Scott A.; Serritzlew, Søren; Svendsen, Gert Tinggaard

    2014-01-01

    Corruption and trust are two important determinants of the quality of public sectors. Empirical studies in different literatures suggest that corruption and trust have effects on factors such as economic growth, the quality of democratic institutions, life quality, the size and effectiveness...... of the public sector and much more. The purpose of this special issue – one that goes to the heart of the comparative policy ethos which is central to the journal’s mission – is to draw on a number of country examples to shed light on the state of the literature on the connection between corruption and trust....... The aim is to show that these two concepts are highly relevant to each other, and that their interconnections are important to understand the public sector consequences of corruption and trust. By focusing on these concepts, we hope that this special issue can pave the road for further comparative...

  15. Trust Based Routing in Ad Hoc Network

    Science.gov (United States)

    Talati, Mikita V.; Valiveti, Sharada; Kotecha, K.

    Ad Hoc network often termed as an infrastructure-less, self- organized or spontaneous network.The execution and survival of an ad-hoc network is solely dependent upon the cooperative and trusting nature of its nodes. However, this naive dependency on intermediate nodes makes the ad-hoc network vulnerable to passive and active attacks by malicious nodes and cause inflict severe damage. A number of protocols have been developed to secure ad-hoc networks using cryptographic schemes, but all rely on the presence of trust authority. Due to mobility of nodes and limitation of resources in wireless network one interesting research area in MANET is routing. This paper offers various trust models and trust based routing protocols to improve the trustworthiness of the neighborhood.Thus it helps in selecting the most secure and trustworthy route from the available ones for the data transfer.

  16. Usability and trust in e-banking.

    Science.gov (United States)

    Pravettoni, Gabriella; Leotta, Salvatore Nuccio; Lucchiari, Claudio; Misuraca, Raffaella

    2007-12-01

    This study assessed the role of usability in trust of e-banking services. A questionnaire was administered to 185 Italian undergraduate working students who volunteered for the experiment (M age = 30.5 yr., SD = 3.1). Participants were differentiated on computer ability (Expert, n = 104; Nonexpert, n = 81) and e-banking use (User, n = 93; Nonusers, n = 92). Analysis showed that the website usability of e-banking services did not play a very important role for the User group. Instead, institution-based trust, e.g., the trust in the security policy of the Web merchant, customers, and the overall trust of the bank were the crucial factors in the adoption of e-banking.

  17. 26 CFR 301.7701-4 - Trusts.

    Science.gov (United States)

    2010-04-01

    .... 1941), cert. denied, 314 U.S. 701 (1942). An investment trust with a single class of ownership... the other ten percent. The two classes of certificates are identical except that, in the event of...

  18. On the deployment of Mobile Trusted Modules

    CERN Document Server

    Schmidt, Andreas U; Kasper, Michael

    2007-01-01

    In its recently published TCG Mobile Reference Architecture, the TCG Mobile Phone Work Group specifies a new concept to enable trust into future mobile devices. For this purpose, the TCG devises a trusted mobile platform as a set of trusted engines on behalf of different stakeholders supported by a physical trust-anchor. In this paper, we present our perception on this emerging specification. We propose an approach for the practical design and implementation of this concept and how to deploy it to a trustworthy operating platform. In particular we propose a method for the take-ownership of a device by the user and the migration (i.e., portability) of user credentials between devices.

  19. Toward designing for trust in database automation

    International Nuclear Information System (INIS)

    Appropriate reliance on system automation is imperative for safe and productive work, especially in safety-critical systems. It is unsafe to rely on automation beyond its designed use; conversely, it can be both unproductive and unsafe to manually perform tasks that are better relegated to automated tools. Operator trust in automated tools mediates reliance, and trust appears to affect how operators use technology. As automated agents become more complex, the question of trust in automation is increasingly important. In order to achieve proper use of automation, we must engender an appropriate degree of trust that is sensitive to changes in operating functions and context. In this paper, we present research concerning trust in automation in the domain of automated tools for relational databases. Lee and See have provided models of trust in automation. One model developed by Lee and See identifies three key categories of information about the automation that lie along a continuum of attributional abstraction. Purpose-, process-and performance-related information serve, both individually and through inferences between them, to describe automation in such a way as to engender r properly-calibrated trust. Thus, one can look at information from different levels of attributional abstraction as a general requirements analysis for information key to appropriate trust in automation. The model of information necessary to engender appropriate trust in automation [1] is a general one. Although it describes categories of information, it does not provide insight on how to determine the specific information elements required for a given automated tool. We have applied the Abstraction Hierarchy (AH) to this problem in the domain of relational databases. The AH serves as a formal description of the automation at several levels of abstraction, ranging from a very abstract purpose-oriented description to a more concrete description of the resources involved in the automated process

  20. An Investigation of Children's Peer Trust across Culture: Is the Composition of Peer Trust Universal?

    Science.gov (United States)

    Betts, Lucy R.; Rotenberg, Ken J.; Petrocchi, Serena; Lecciso, Flavia; Sakai, Atsushi; Maeshiro, Kazumi; Judson, Helen

    2014-01-01

    The components of children's trust in same-gender peers (trust beliefs, ascribed trustworthiness, and dyadic reciprocal trust) were examined in samples of 8-11-year-olds from the UK, Italy, and Japan. Trust was assessed by children's ratings of the extent to which same-gender classmates kept promises and kept secrets. Social relations…

  1. Patient care: Is interpersonal trust missing?

    Directory of Open Access Journals (Sweden)

    Paul A Bourne

    2010-01-01

    Full Text Available Background : Health statistics and studies in the Caribbean have omitted interpersonal trust in their investigations. Aims : This study will examine the effect of interpersonal trust and other conditions on psychosocial subjective wellbeing and self-reported health, in order to assess the significance of interpersonal trust, as well as other socio-demographic factors on health. Materials and Method : The current study utilized primary data commissioned by the Centre of Leadership and Governance, Department of Government, the University of West Indies, Mona, Jamaica, between July and August 2006. It was a nationally representative probability sampling survey. A sample of 1,338 respondents was interviewed with a detailed 166-item questionnaire. Results : Generally, the psychosocial subjective wellbeing of Jamaicans was high (mean = 6.8 ΁ 1.8, and self-reported health was moderately high (mean = 6.3 ΁ 2.6. The current study has revealed that income, political system, subjective social class, employment status, and interpersonal trust determine psychosocial subjective wellbeing as well as self-reported health. Interpersonal trust accounted for between 9.4 to 10.4% of the explanatory power of the wellbeing and self-reported health of Jamaicans. Conclusion : The current study highlights that the determinants of health include interpersonal trust. It is critical to point out here that trust must be taken into consideration in any evaluation of health statistics, as it is a factor of subjective wellbeing and health. It is within this context that clinicians need to incorporate interpersonal trust along with other conditions, as it is a part of the psychosocial determinants of health, subjective wellbeing, and health treatment.

  2. Social Trust and the Growth of Schooling

    DEFF Research Database (Denmark)

    Bjørnskov, Christian

    2009-01-01

    The paper develops a simple model to examine how social trust might affect the growth of schooling through lowering transaction costs associated with employing educated individuals. In a sample of 52 countries, the paper thereafter provides empirical evidence that trust has led to faster growth...... of schooling in the period 1960-2000. The findings are robust to the inclusion of a set of control variables and being estimated using an instrumental variables approach....

  3. Yoga beyond wellness: Meditation, trust and cooperation

    OpenAIRE

    Di Bartolomeo Giovanni; Papa Stefano; Bellomo Saverio

    2012-01-01

    Our research aims to find out whether meditation has a positive impact on trust and cooperation. By comparing the behavior of agents exposed to meditation before playing an investment game to others not exposed, we find that the formers show more trust on average than the latters. Meditation seems to reduce risk aversion and “competitiveness” among people inducing agents to behave in a more cooperative (and efficient) way.

  4. Procedural justice, trust and institutional legitimacy

    OpenAIRE

    Hough, Mike; Jackson, Jonathan; Bradford, Ben; Myhill, Andy; Quinton, Paul

    2010-01-01

    This paper summarising ‘procedural justice’ approaches to policing, contrasting these to the more politically dominant discourse about policing as crime control. It argues that public trust in policing is needed partly because this may result in public cooperation with justice, but more importantly because public trust in justice builds institutional legitimacy and thus public compliance with the law, and commitment to, the rule of law. Some recent survey findings are presented in support of ...

  5. Website design and trust across cultures

    OpenAIRE

    Cyr, Dianne

    2010-01-01

    The paper provides an overview of culture related to website design and website trust. This is followed by the documentation of previously unpublished results from cross-cultural comparisons of user reactions to websites related to risk and vendor legitimacy, information privacy and quality, and transaction security. In addition, results are reported for how various design elements statistically impact online trust in Canada, Germany, and China. The paper concludes with sugg...

  6. The Relationship between Teamwork and Organizational Trust

    OpenAIRE

    Musab Işık; Kürşad Timuroğlu; Yussuf Aliyev

    2015-01-01

    The aim of this study is to investigate the relationship between teamwork and organizational trust. In the implementation section the data from the survey of 250 workers is employed in call centers in Erzurum by using relevant statistical methods. Consequently, it is found that there is a positive and significant relationship between teamwork and organizational trust. Thus, the hypothesis of the study is supported as it was expected. Besides, it is found that there are positive and significan...

  7. How Trust in Social Dilemmas Evolves with Age

    OpenAIRE

    Kocher, Martin G.

    2015-01-01

    While trust and trustworthiness provide a fundamental foundation for human relationships, little is known about how trusting and trustworthy behavior in social dilemmas is related to age and aging. A few papers use data from surveys such as the World Values Survey to address a potential connection between trust and age. In this chapter, we will mainly focus on trusting and trustworthy behavior elicited with the use of the seminal trust game (Berg et al., 1995) and with games implementing a si...

  8. 产品伤害危机后消费者信任修复策略研究%The Study on the Consumer Trust Repair Strategy after Product-harm Crises

    Institute of Scientific and Technical Information of China (English)

    熊焰; 钱婷婷

    2012-01-01

    Product-harm crisis which is caused by harms to consumers such as quality,servme,behavlor and many other aspects of related products, can bring about disastrous effects on the enterprise. The most direct impact of them is harmness of consumers' trust. Consumers' trust is one of the most valuable intangible resources for the enterprise, the study indicates that the consumer product the essence of product-harm crises is trust crisis. purchase decision is based on the trust to a large extent, Since 2006, SKII, KFC, Sanlu, Guangming, Toyota Motor and some other famous enterprises have broken out crisis successively, compared to previous, the amount of enterprises that are bothered by product-harm crisis and its frequency is increasing, the harm is continued deteriorating. Some enterprises respond properly and get through the crisis successfully, but others not. Therefore how to repair consumer trust in product harm crisis has practical application value. Researchers has given more and more attention to product-harm crisis, the situational crisis communication theory (SCCT) which is presented by Coombs(2007)has achieved extensive attention. The theory is based on the integration of existing results about crisis management, consider that when we do some crisis management, we must think over some crisis situation,crisis response strategy,matching system of crisis scenarios and crisis response strat- egies, etc. SCCT has considered various factors and their integration, is in accord with realistic scenario, and is recognized by many studies. However, the management of repair trust is rarely taken as the key variable in the existing research of product harm crisis. The present study is based on the situational crisis communication theory. It focus on the effectiveness of repairing the consumer trust by three response to crisis strategies put forward by the theory. At the same time, it is put in different critical situations which are divided by the types of

  9. Towards Trusted Network Access Control

    Science.gov (United States)

    Bente, Ingo; von Helden, Josef

    Network Access Control (NAC) solutions promise to significantly increase the security level of modern networks. In short, they allow to measure the integrity state of an endpoint that tries to get access to the network. Based upon the measurement results, which are compared to a defined NAC policy, access to the network can be allowed or denied. One problem of all currently available NAC solutions is referred to as the “lying endpoint” problem. Normally, special software components are responsible for gathering the relevant integrity information on the endpoint. If an attacker modifies those software components, an endpoint can lie about its current integrity state. Therefore, endpoints which are not compliant to the defined NAC policy can get access to the network. Those endpoints must be considered as potential threat. This paper summarizes a possible solution for the lying endpoint problem based upon the specifications of the Trusted Computing Group (TCG) and the results of the two research projects TNC@ FHH and Turaya. The goal is to develop an open source, TNC compatible NAC solution with full TPM support within a new research project: tNAC.

  10. The Corolla Polynomial for Spontaneously Broken Gauge Theories

    Science.gov (United States)

    Prinz, David

    2016-09-01

    In Kreimer and Yeats (Electr. J. Comb. 41-41, 2013), Kreimer et al. (Annals Phys. 336, 180-222, 2013) and Sars (2015) the Corolla Polynomial C ({Γ }) in C [a_{h1}, ldots , a_{h_{ \\vert {Γ }^{[1/2]} \\vert }}] was introduced as a graph polynomial in half-edge variables {ah}_{h in {Γ }^{[1/2]}} over a 3-regular scalar quantum field theory (QFT) Feynman graph Γ. It allows for a covariant quantization of pure Yang-Mills theory without the need for introducing ghost fields, clarifies the relation between quantum gauge theory and scalar QFT with cubic interaction and translates back the problem of renormalizing quantum gauge theory to the problem of renormalizing scalar QFT with cubic interaction (which is super renormalizable in 4 dimensions of spacetime). Furthermore, it is, as we believe, useful for computer calculations. In Prinz (2015) on which this paper is based the formulation of Kreimer and Yeats (Electr. J. Comb. 41-41, 2013), Kreimer et al. (Annals Phys. 336, 180-222, 2013) and Sars (2015) gets slightly altered in a fashion specialized in the case of the Feynman gauge. It is then formulated as a graph polynomial C ({Γ } ) in C [a_{h_{1 ± }}, ldots , a_{h_{ \\vert {Γ }^{[1/2]} \\vert } {h}_{± }}, b_{h1}, ldots , b_{h_{ \\vert {Γ }^{[1/2]} \\vert }}] in three different types of half-edge variables {a_{h+} , a_{h-} , bh}_{h in {Γ }^{[1/2]}} . This formulation is also suitable for the generalization to the case of spontaneously broken gauge theories (in particular all bosons from the Standard Model), as was first worked out in Prinz (2015) and gets reviewed here.

  11. Corn replacement by broken rice in meat-type quail diets

    Directory of Open Access Journals (Sweden)

    TMB Filgueira

    2014-12-01

    Full Text Available An experiment was conducted to evaluate the effects of broken rice inclusion as substitute for corn in the diet on the performance, carcass yield, and economic viability of meat-type quails between 7 and 49 days of age. A number of 288 quails was distributed according to a completely randomized design into six treatments with six replicates of eight birds each. Treatments consisted of increasing levels of broken rice (0, 20, 40, 60, 80 and 100% in replacement of corn. Increasing levels of corn substitution by broken rice in the diet of 7- to 49-day-old meat-type quails did not affect feed intake, weight gain or feed conversion ratio (p>0.05. Relative to carcass traits, the inclusion of broken rice in the diets did not influence (p>0.05 dressing percentage or breast, leg (thigh+drumstick, liver, and gizzard yields. Moreover, feed cost per kilogram of live weight gain, cost index, and economic efficiency index were not influenced by the replacement of corn by broken rice in the diets. The performance, carcass traits and economic viability of broilers fed the different levels of broken rice inclusion were not different from the control group (p>0.05. These results indicate the economic viability of total replacement of corn by broken rice in the feeding of meat-type quails.

  12. The Cognitive Basis of Trust. The Relation between Education, Cognitive Ability, and Generalized and Political Trust

    Science.gov (United States)

    Hooghe, Marc; Marien, Sofie; de Vroome, Thomas

    2012-01-01

    Previous research has established convincingly that there is a strong positive relation between educational attainment and trust. There is less agreement however, about the precise determinants of this relation. In this article, we assess how education is related to generalized and political trust, controlling for cognitive ability and…

  13. Building a Culture of Trust: Trust in the Use of Educational Technology

    Science.gov (United States)

    Kirkman, Jacqueline

    2014-01-01

    This paper investigates the place of trust in a school context and its importance in achieving the aims of schooling, "namely high academic performance and positive affects among members of the school community" (Forsyth, 2008). The role of trust in the use of technology and technological change is examined. Literature is surveyed in the…

  14. Relational Trust and Knowledge Sharing: An Investigation of Principal Trust and School Social Networks

    Science.gov (United States)

    Liou, Yi-Hwa

    2010-01-01

    Trust among teachers is an important aspect of the capacity for reform in schools. In previous research, trust has traditionally been considered as a monolithic variable that characterizes this special element as a relationship across a school (Bryk & Schneider, 2002, 2003; Goddard, 2003; Kochanek, 2005). However, this study proposes that the…

  15. In Money we Trust? Trust Repair and the Psychology of Financial Compensations

    NARCIS (Netherlands)

    P.T.M. Desmet (Pieter)

    2011-01-01

    textabstractDespite the importance of trust in economic relations, people often engage in behavior that may violate their interaction partner’s trust. Given that transgressions in economic relations often result in distributive harm for the victim (i.e. loss of economic resources), a common approach

  16. Music lessons enhance IQ.

    Science.gov (United States)

    Schellenberg, E Glenn

    2004-08-01

    The idea that music makes you smarter has received considerable attention from scholars and the media. The present report is the first to test this hypothesis directly with random assignment of a large sample of children (N = 144) to two different types of music lessons (keyboard or voice) or to control groups that received drama lessons or no lessons. IQ was measured before and after the lessons. Compared with children in the control groups, children in the music groups exhibited greater increases in full-scale IQ. The effect was relatively small, but it generalized across IQ subtests, index scores, and a standardized measure of academic achievement. Unexpectedly, children in the drama group exhibited substantial pre- to post-test improvements in adaptive social behavior that were not evident in the music groups. PMID:15270994

  17. Lessons from the Top

    CERN Document Server

    Acharya, BS; The ATLAS collaboration

    2013-01-01

    These are (draft) slides for a talk at the symposium, "Particle Physics at the Crossroads". The talk is about the 'lessons we have learned from measurements involving top quarks in light of the discovery of a "Higgs-like" particle'.

  18. Can one trust quantum simulators?

    Science.gov (United States)

    Hauke, Philipp; Cucchietti, Fernando M; Tagliacozzo, Luca; Deutsch, Ivan; Lewenstein, Maciej

    2012-08-01

    Various fundamental phenomena of strongly correlated quantum systems such as high-T(c) superconductivity, the fractional quantum-Hall effect and quark confinement are still awaiting a universally accepted explanation. The main obstacle is the computational complexity of solving even the most simplified theoretical models which are designed to capture the relevant quantum correlations of the many-body system of interest. In his seminal 1982 paper (Feynman 1982 Int. J. Theor. Phys. 21 467), Richard Feynman suggested that such models might be solved by 'simulation' with a new type of computer whose constituent parts are effectively governed by a desired quantum many-body dynamics. Measurements on this engineered machine, now known as a 'quantum simulator,' would reveal some unknown or difficult to compute properties of a model of interest. We argue that a useful quantum simulator must satisfy four conditions: relevance, controllability, reliability and efficiency. We review the current state of the art of digital and analog quantum simulators. Whereas so far the majority of the focus, both theoretically and experimentally, has been on controllability of relevant models, we emphasize here the need for a careful analysis of reliability and efficiency in the presence of imperfections. We discuss how disorder and noise can impact these conditions, and illustrate our concerns with novel numerical simulations of a paradigmatic example: a disordered quantum spin chain governed by the Ising model in a transverse magnetic field. We find that disorder can decrease the reliability of an analog quantum simulator of this model, although large errors in local observables are introduced only for strong levels of disorder. We conclude that the answer to the question 'Can we trust quantum simulators?' is … to some extent.

  19. Water, oil, climate: a dried-up broken down world

    International Nuclear Information System (INIS)

    Climate crisis, oil crisis, water crisis, food crisis: the 21. century has started badly. Climate is deteriorating under man's action and natural resources are drying up while demand is still on the rise under the double effect of demographic and economic growth. Even worse, tensions are working together and worsen each other in a climate of financial crisis. All warning lights are on the red and a huge challenge has been launched which involves all countries, developed and developing. Solutions are urgently needed, otherwise our civilization would be threatened. The reasoned use of technologies, but also the abatement of poverty and inequalities and the education of people are essential points to take up the challenge. The authors examine the interconnections between energy, water, food at the time of climate change and explore the possible alternative solutions. The lesson that should be learnt from their analysis is that everyone should contribute to the complex decisions that will have an impact on the future of humanity. (J.S.)

  20. Time-Based Dynamic Trust Model Using Ant Colony Algorithm

    Institute of Scientific and Technical Information of China (English)

    TANG Zhuo; LU Zhengding; LI Kai

    2006-01-01

    The trust in distributed environment is uncertain, which is variation for various factors. This paper introduces TDTM, a model for time-based dynamic trust. Every entity in the distribute environment is endowed with a trust-vector, which figures the trust intensity between this entity and the others. The trust intensity is dynamic due to the time and the inter-operation between two entities, a method is proposed to quantify this change based on the mind of ant colony algorithm and then an algorithm for the transfer of trust relation is also proposed. Furthermore, this paper analyses the influence to the trust intensity among all entities that is aroused by the change of trust intensity between the two entities, and presents an algorithm to resolve the problem. Finally, we show the process of the trusts'change that is aroused by the time' lapse and the inter-operation through an instance.

  1. A Threshold Signature Scheme with a Weakened Trusted Party

    Directory of Open Access Journals (Sweden)

    Yongquan Cai

    2011-06-01

    Full Text Available In the (t, n threshold signature schemes with the assistance of a trusted party, the trusted party easily becomes the targets of attack. And an authority which can be trusted by all players doesn't exist. So the schemes without a trusted party were proposed to solve those security problems. But all of the conventional schemes without a trusted party cannot withstand conspiracy attacks. A novel (t, n threshold signature scheme with a weakened trusted party is proposed, in which the group secret key is composed of two parts. Any t or more group players cannot cooperate to reveal the group secret key and the weakened trusted party only knows a part of player’s secret key. So the new scheme can effectively withstand conspiracy attacks and as the power of the trusted party is limited, it meets the purpose of designing a threshold signature scheme without a trusted party.

  2. SURFACE SUBSIDENCE ANALYSES BASED ON THE PRINCIPLE OF EXPANSION AND RECONSOLIDATION OF THE BROKEN ROCK STRATA

    Institute of Scientific and Technical Information of China (English)

    王悦汉; 缪协兴

    1997-01-01

    The results of experimental studies about the characteristics of broken rock expansion and reconsolidation were briefly introduced in this paper, and the surface subsidence coefficient under critical mining conditions was also analysed based on the principle of expansion and reconsolidation of the broken rock strata, a equation to calculate the corresponding surface subsidence was finally produced. This calculation method can be used to calculate more accurately the convergence quantity of consolidated rocks in the broken zone of the working face. In addition, case analyses by using the introduced calculation method were conducted and satisfactory results were obtained.

  3. Introduction to Hardware Security and Trust

    CERN Document Server

    Wang, Cliff

    2012-01-01

    The emergence of a globalized, horizontal semiconductor business model raises a set of concerns involving the security and trust of the information systems on which modern society is increasingly reliant for mission-critical functionality. Hardware-oriented security and trust issues span a broad range including threats related to the malicious insertion of Trojan circuits designed, e.g.,to act as a ‘kill switch’ to disable a chip, to integrated circuit (IC) piracy,and to attacks designed to extract encryption keys and IP from a chip. This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade.  Coverage includes security and trust issues in all types of electronic devices and systems such as ASICs, COTS, FPGAs, microprocessors/DSPs, and embedded systems.  This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of,and trust in, modern society�...

  4. Does Generalized (Dis)trust Travel? Examining the Impact of Cultural Heritage and Destination Country Environment on Trust of Immigrants

    DEFF Research Database (Denmark)

    Dinesen, Peter Thisted

    2012-01-01

    with what we experience in the environment in which we live. Analyzing trust of immigrants is an effective way to contrast the two perspectives, as the cultural perspective predicts that immigrants' level of trust will continue to reflect the level of trust of their home country, whereas the experiential...... perspective predicts that trust of immigrants will change according to the environment of the destination country. This article examines how first-generation immigrants from three low-trust countries of origin (Turkey, Poland, and Italy) are affected by migrating to high-trust countries in Northern Europe......, which hold qualities conducive to trust. In contrast to earlier studies examining trust of immigrants, I build on one data set containing data on both migrants and nonmigrants from the same country of origin as well as on a wide range of relevant covariates of trust. Using the method of matching...

  5. Wireless next generation networks a virtue-based trust model

    CERN Document Server

    Harvey, Melissa

    2014-01-01

    This SpringerBrief proposes a trust model motivated by virtue epistemology, addressing the need for a more efficient and flexible trust model for wireless next generation networks. This theory of trust simplifies the computation and communication overhead of strictly cognitive-computational models of trust. Both the advantages and the challenges of virtue-based trust models are discussed. This brief offers new research and a general theory of rationality that enables users to interpret trust and reason as complementary mechanisms that guide our rational conduct at two different epistemic level

  6. Do Institutions or Culture Determine the Level of Social Trust?

    DEFF Research Database (Denmark)

    Nannestad, Peter; Svendsen, Gert Tinggard; Dinesen, Peter Thisted;

    2014-01-01

    hand, the migrants' level of social trust is determined by their culture, it should not be affected by a different institutional setting. Furthermore, culturally diverse immigrant groups should have different levels of social trust in the same host country. Analysing migration from several non......Do institutions or culture determine levels of social trust in society? If quality of institutions determines levels of social trust, migrants from countries with lower-quality institutions should enhance their level of social trust in countries with higher-quality institutions. If, on the other......-western countries to Denmark, this paper demonstrates that institutions rather than culture matter for social trust....

  7. Trust dynamics in multi-agent coalition formation

    Science.gov (United States)

    Mikulski, Dariusz G.; Lewis, Frank L.; Gu, Edward Y.; Hudas, Greg R.

    2011-05-01

    We present a rigorous treatment of coalition formation based on trust interactions in multi-agent systems. Current literature on trust in multi-agent systems primarily deals with trust models and protocols of interaction in noncooperative scenarios. Here, we use cooperative game theory as the underlying mathematical framework to study the trust dynamics between agents as a result of their trust synergy and trust liability in cooperative coalitions. We rigorously justify the behaviors of agents for different classes of games, and discuss ways to exploit the formal properties of these games for specific applications, such as unmanned cooperative control.

  8. Online Trust Mechanisms: A Domain Study of Online Auctions

    Directory of Open Access Journals (Sweden)

    Glenn Robert Bewsell

    2008-05-01

    Full Text Available This research investigates mechanisms that impact trust at online auctions. A qualitative study is discussed within this paper to identify mechanisms that impact trust at online auctions. The mechanisms identified are discussed within normative and grounded theoretical approaches to trust. A result of this discussion I seek to answer the question: what factors do people perceive as important to increase online trust prior to an online transaction? This discussion will help professionals understand the factors that emerge from normative and grounded theoretical approaches to online trust research. A better understanding of online trust adds to the body of theory and can be used to improve the design of online auctions.

  9. The value of trust in biotech crop development: a case study of Bt cotton in Burkina Faso

    Directory of Open Access Journals (Sweden)

    Ezezika Obidimma C

    2012-11-01

    Full Text Available Abstract Background Agricultural biotechnology public-private partnerships (PPPs have been recognized as having great potential in improving agricultural productivity and increasing food production in sub-Saharan Africa. However, there is much public skepticism about the use of GM (genetically modified crops and suspicion about private sector involvement in agbiotech projects. This case study sought to understand the role of trust in the Bacillus thuringiensis (Bt cotton in Burkina Faso project by exploring practices and challenges associated with trust-building, and determining what makes these practices effective from the perspective of multiple stakeholders. Methods We conducted semi-structured, face-to-face interviews to obtain stakeholders’ understanding of trust in general as well as in the context of agbiotech PPPs. Relevant documents and articles were analyzed to generate descriptions of how trust was operationalized in this evolving agbiotech PPP. Data was analyzed based on emergent themes to create a comprehensive narrative on how trust is understood and built among the partners and with the community. Results We derived four key lessons from our findings. First, strong collaboration between research, industry and farmers greatly contributes to both the success of, and fostering of trust in, the partnership. Second, this case study also revealed the important, though often unrecognized, role of researchers as players in the communication strategy of the project. Third, effective and comprehensive communication takes into account issues such as illiteracy and diversity. Fourth, follow-up at the field level and the need for a multifaceted communications strategy is important for helping push the project forward. Conclusions Burkina Faso’s well-established and effective cotton selling system laid the foundation for the implementation of the Bt cotton project – particularly, the strong dialogue and the receptivity to collaboration

  10. Distributed Trust Management for Validating SLA Choreographies

    Science.gov (United States)

    Haq, Irfan Ul; Alnemr, Rehab; Paschke, Adrian; Schikuta, Erich; Boley, Harold; Meinel, Christoph

    For business workflow automation in a service-enriched environment such as a grid or a cloud, services scattered across heterogeneous Virtual Organizations (VOs) can be aggregated in a producer-consumer manner, building hierarchical structures of added value. In order to preserve the supply chain, the Service Level Agreements (SLAs) corresponding to the underlying choreography of services should also be incrementally aggregated. This cross-VO hierarchical SLA aggregation requires validation, for which a distributed trust system becomes a prerequisite. Elaborating our previous work on rule-based SLA validation, we propose a hybrid distributed trust model. This new model is based on Public Key Infrastructure (PKI) and reputation-based trust systems. It helps preventing SLA violations by identifying violation-prone services at service selection stage and actively contributes in breach management at the time of penalty enforcement.

  11. The Role of Trust in Computer Security

    DEFF Research Database (Denmark)

    Jensen, Christian D.

    2012-01-01

    technologies and show how many of them concern the placement of trust on human or system agents. We argue that making such assumptions about trust explicit is an essential requirement for the future of system security and argue why the formalisation of computational trust is necessary when we wish to reason......Summary form only given. Traditional security technologies are based on numerous assumptions about the environment in which systems are used. This includes assumptions about the enforcement of legislative and contractual frameworks, limitations of particular technologies and the constraints...... on human behaviour imposed by social and religious norms. Most of these assumptions, however, are implicit and they will fail when the environment of the systems change, e.g., when systems are used on a global scale on the Internet. This talk identifies such implicit assumptions in current security...

  12. Framing Trust at the Street-Level

    DEFF Research Database (Denmark)

    Perry, Kevin Anthony

    This thesis deals with the phenomenon of distrust and trust between young men with minority ethnic backgrounds and public sector employees at the face-to-face level of interaction. The focus is on trust and distrust which can be understood as cultural resources – a valuable approach to researching...... unrest, antisocial behaviour, crime and unnecessary public spending. The purpose of this in-depth study, based on nine months of ethnographic fieldwork in and around two residential housing estates, is to contribute towards understanding the micro-processes at play in distrust and trust building...... processes between public sector employees and young men with minority ethnic backgrounds, an under-researched and often misunderstood area. The central focus is on the relationship between the young men with minority ethnic backgrounds, a team of youth workers, a job consultant and a police officer. This...

  13. Measuring Institutional Trust: Evidence from Guyana

    Directory of Open Access Journals (Sweden)

    Troy Devon Thomas

    2015-01-01

    Full Text Available Institutional trust is often measured by several items that are analyzed individually or as sum-scores. However, it is difficult to summarize the results of individual-items analyses, whereas sum-scores may be meaningless if the dimensions that the items are assumed to measure are not verified. Although these limitations are circumvented by using factor analysis, response styles may still bias research results. We use data from Guyana to show that a second-order factor model is appropriate for measuring institutional trust. We also demonstrate that response styles can inflate item and factor convergent validity and may either distort regression effects or create completely spurious ones. We therefore recommend using factor models with corrections for response styles in institutional trust research instead of sum-scores and individual-items analyses.

  14. Taxation of Income in Foreign Trusts

    DEFF Research Database (Denmark)

    Schmidt, Peter Koerver

    2016-01-01

    Denmark has introduced a new provision that states that Danish settlors of foreign trusts, under certain circumstances, must include the trust’s income in their own taxable income. The provision forms part of the Danish legislator’s recent attempts to prevent international tax evasion/ avoidance......, and the underlying aim of the provision is to make the rules concerning foreign trusts easier to administrate and enforce by the Danish tax authorities. Based on an analysis of the provision’s area of application and legal effects, it is concluded that the new provision seems to be effective in mitigating the use...... of foreign (family) trusts for tax evasion/avoidance purposes. However, it is also concluded that there is reason to question whether the new provision is sufficiently precise and whether the aim could have been reached in a more expedient way...

  15. Sino-U.S. Strategic Mutual Trust

    Institute of Scientific and Technical Information of China (English)

    Yuan Peng; Zhang Yimeng

    2008-01-01

    Relations between China and the U.S. have been relatively stable for nearly seven years, for the first time since the end of the Cold War. Strategic mutual trust, however, is not enough and there is a long way to go before both countries can achieve a permanent strategic stability. Four problems have prevented stability in bilateral relations, namely structural, internal, accidental, and cognitive issues. The goal of building strategic mutual trust still remains distant, and developing a good understanding between each other is the thorniest problem for both countries. Better mutual understanding can lead to an expansion of bilateral relations. China and the U.S. need to increase mutual trust and work towards achieving strategic stability.

  16. Modelling Users` Trust in Online Social Networks

    Directory of Open Access Journals (Sweden)

    Iacob Cătoiu

    2014-02-01

    Full Text Available Previous studies (McKnight, Lankton and Tripp, 2011; Liao, Lui and Chen, 2011 have shown the crucial role of trust when choosing to disclose sensitive information online. This is the case of online social networks users, who must disclose a certain amount of personal data in order to gain access to these online services. Taking into account privacy calculus model and the risk/benefit ratio, we propose a model of users’ trust in online social networks with four variables. We have adapted metrics for the purpose of our study and we have assessed their reliability and validity. We use a Partial Least Squares (PLS based structural equation modelling analysis, which validated all our initial assumptions, indicating that our three predictors (privacy concerns, perceived benefits and perceived risks explain 48% of the variation of users’ trust in online social networks, the resulting variable of our study. We also discuss the implications and further research opportunities of our study.

  17. Who Adolescents Trust May Impact Their Health: Findings from Baltimore.

    Science.gov (United States)

    Mmari, Kristin; Marshall, Beth; Lantos, Hannah; Blum, Robert Wm

    2016-06-01

    This study is one of the first to explore the relevance of trust to the health of adolescents living in a disadvantaged urban setting. The primary objectives were to determine the differences in the sociodemographic characteristics between adolescents who do and do not trust and to examine the associations between trust and health. Data were drawn from the Well-Being of Adolescents in Vulnerable Environments (WAVE) study, which is a cross-sectional global study of adolescents in very low-income urban settings conducted in 2011-2013. This paper focused on 446 adolescents in Baltimore as it was the primary site where trust was explicitly measured. For the main analyses, six health outcomes were examined: (1) self-rated health; (2) violence victimization; (3) binge drinking; (4) marijuana use; (5) post-traumatic stress disorder (PTSD); and (6) condom use at last sex. Independent variables included sociodemographic variables (age, gender, current school enrolment, perceived relative wealth, and family structure) and two dimensions of trust: community trust (trust in individuals/groups within neighborhood) and institutional trust (trust in authorities). The results show that more than half the sample had no trust in police, and a high proportion had no trust in other types of authority. Among girls, those with higher levels of community trust were less likely to be victimized and involved in binge drinking. Meanwhile, girls with higher levels of institutional trust were more likely to use a condom and less likely to have used marijuana. Among boys, those with higher levels of community trust were more likely to use a condom, while those with higher levels of institutional trust were less likely to use marijuana, but more likely binge drink. Overall, this study highlights the importance of trust for adolescent health. Most surprising were the differences in the associations between boys and girls with regard to the type of trust and specific health outcome that was

  18. Trust, conflict, and cooperation: a meta-analysis.

    Science.gov (United States)

    Balliet, Daniel; Van Lange, Paul A M

    2013-09-01

    Many theories of trust emphasize that trust is most relevant to behavior in situations involving a conflict of interests. However, it is not clear how trust relates to behavior across situations that differ in the degree of conflicting interest: Does trust matter more when the conflict of interest is small or large? According to an interdependence perspective, trust becomes an especially important determinant of behavior in situations involving larger, compared to smaller, degrees of conflicting interests. To examine this perspective, we conducted a meta-analysis involving 212 effect sizes on the relation between trust (both state and dispositional trust in others) and cooperation in social dilemmas-situations that involve varying degrees of conflict between self-interest and collective interest. Results revealed that the positive relation between trust and cooperation is stronger when there is a larger, compared to smaller, degree of conflict. We also examined several other possible moderators of the relation between trust and cooperation. The relation between trust and cooperation was stronger during individual, compared to intergroup, interactions but did not vary as a function of the situation being either a one-shot or repeated interaction. We also find differences across countries in the extent that people condition their own cooperation based on their trust in others. We discuss how the results support an emerging consensus about trust being limited to situations of conflict and address some theoretical and societal implications for our understanding of how and why trust is so important to social interactions and relationships.

  19. Retrieval of a broken guide wire transfixing the hip through the proximal femoral nail hole

    Institute of Scientific and Technical Information of China (English)

    Saurabh Jain; Abhishek Pathak; Rajeev Kant Pandey

    2014-01-01

    Retrieval of a broken guide wire transfixing the acetabulum or with intrapelvic migration is challenging and frustrating for surgeons.We here present a case report on a method to remove a broken guide wire transfixing the acetabulum through the proximal hole of recon nail using a grasping forceps.This method is little invasive,easy,time-saving and without need for changing the inital fixation.

  20. Retrieval of a broken guide wire transfixing the hip through the proximal femoral nail hole

    Directory of Open Access Journals (Sweden)

    Jain Saurabh

    2014-02-01

    Full Text Available 【Abstract】Retrieval of a broken guide wire transfixing the acetabulum or with intrapelvic migration is challenging and frustrating for surgeons. We here present a case report on a method to remove a broken guide wire transfixing the acetabulum through the proximal hole of recon nail using a grasping forceps. This method is little invasive, easy, time-saving and without need for changing the inital fixation.

  1. Continuous vortices with broken symmetry in rotating superfluid 3He-A

    International Nuclear Information System (INIS)

    New NMR measurements are reported on continuous 3He-A vortices in tilted magnetic fields. We introduce a symmetry classification of the continuous vortices with broken axial symmetry. It is found that the discrete internal symmetry may in addition be broken in two inequivalent ways, producing two different continuous vortices. Although NMR may not distinguish between these two vortices, the observed vortex satellite peak is well accounted for by spin waves localized in the soft cores of such vortices

  2. Renormalization group solution for the two-dimensional random bond Potts model with broken replica symmetry

    CERN Document Server

    Dotsenko, V S; Picco, M; Pujol, P; Dotsenko, Viktor; Dotsenko, Vladimir; Picco, Marco; Pujol, Pierre

    1995-01-01

    We find a new solution of the renormalization group for the Potts model with ferromagnetic random valued coupling constants. The solution exhibits universality and broken replica symmetry. It is argued that the model reaches this universality class if the replica symmetry is broken initially. Otherwise the model stays with the replica symmetric renormalization group flow and reaches the fixed point which has been considered before.

  3. Application of extruded broken bean flour for formulation of gluten-free cake blends

    OpenAIRE

    Luciana de Oliveira Froes Gomes; Raquel de Andrade Cardoso Santiago; Ana Vania Carvalho; Rosangela Nunes Carvalho; Iana Gabriela de Oliveira; Priscila Zaczuk Bassinello

    2015-01-01

    The aim of this study was to determine the physical and microbiological characteristics of extruded broken beans flour, in addition to developing mixtures for gluten-free cake with these flours, evaluating their technological and sensory quality. Gluten-free formulations were prepared with 45%, 60% and 75% of extruded broken beans. All analyzes of the flours and mixtures for cakes were performed according to standard techniques found in the literature. Sensory analyzes of cakes applied the 9-...

  4. Integrity Management Infrastructure for Trusted Computing

    Science.gov (United States)

    Munetoh, Seiji; Nakamura, Megumi; Yoshihama, Sachiko; Kudo, Michiharu

    Computer security concerns have been rapidly increasing because of repeated security breaches and leakages of sensitive personal information. Such security breaches are mainly caused by an inappropriate management of the PCs, so maintaining integrity of the platform configuration is essential, and, verifying the integrity of the computer platform and software becomes more significant. To address these problems, the Trusted Computing Group (TCG) has developed various specifications that are used to measure the integrity of the platform based on hardware trust. In the trusted computing technology, the integrity data of each component running on the platform is recorded in the security chip and they are securely checked by a remote attestation. The infrastructure working group in the TCG is trying to define an Integrity Management Infrastructure in which the Platform Trust Services (PTS) is a new key component which deals with an Integrity Report. When we use the PTS in the target platform, it is a service component that collects and measures the runtime integrity of the target platform in a secure way. The PTS can also be used to validate the Integrity Reports. We introduce the notion of the Platform Validation Authority, a trusted third party, which verifies the composition of the integrity measurement of the target platform in the Integrity Reports. The Platform Validation Authority complements the role of the current Certificate Authority in the Public Key Infrastructure which attests to the integrity of the user identity as well as to related artifacts such as digital signatures. In this paper, we cover the research topics in this new area, the relevant technologies and open issues of the trusted computing, and the detail of our PTS implementation.

  5. Overcoming barriers to trust in agricultural biotechnology projects: a case study of Bt cowpea in Nigeria

    Directory of Open Access Journals (Sweden)

    Ezezika Obidimma C

    2012-11-01

    Full Text Available Abstract Background Nigeria, Africa’s most populous country, has been the world’s largest cowpea importer since 2004. The country is currently in the early phases of confined field trials for two genetically modified crops: Bacillus thuringiensis (Bt cowpea and nutritionally enhanced cassava (“BioCassava Plus”. Using the bio-safety guidelines process as a backdrop, we evaluate the role of trust in the operation of the Cowpea Productivity Improvement Project, which is an international agricultural biotechnology public-private partnership (PPP aimed at providing pest-resistant cowpea varieties to Nigerian farmers. Methods We reviewed the published literature and collected data through direct observations and semi-structured, face-to-face interviews. Data were analyzed based on emergent themes to create a comprehensive narrative on how trust is understood and built among the partners and with the community. Results Our findings highlight the importance of respecting mandates and eliminating conflicts of interest; holding community engagement initiatives early on; having on-going internal discussion and planning; and serving a locally-defined need. These four lessons could prove helpful to other agricultural biotechnology initiatives in which partners may face similar trust-related challenges. Conclusions Overcoming challenges to building trust requires concerted effort throughout all stages of project implementation. Currently, plans are being made to backcross the cowpea strain into a local variety in Nigeria. The development and adoption of the Bt cowpea seed hinges on the adoption of a National Biosafety Law in Nigeria. For countries that have decided to adopt biotech crops, the Nigerian cowpea experiment can be used as a model for other West African nations, and is actually applied as such in Ghana and Burkina Faso, interested in developing a Bt cowpea.

  6. Breathing Life into Engineering: A Lesson Study Life Science Lesson

    Science.gov (United States)

    Lawrence, Maria; Yang, Li-Ling; Briggs, May; Hession, Alicia; Koussa, Anita; Wagoner, Lisa

    2016-01-01

    A fifth grade life science lesson was implemented through a lesson study approach in two fifth grade classrooms. The research lesson was designed by a team of four elementary school teachers with the goal of emphasizing engineering practices consistent with the "Next Generation Science Standards" (NGSS) (Achieve Inc. 2013). The fifth…

  7. Distinction of broken cellular wall Ganoderma lucidum spores and G. lucidum spores using FTIR microspectroscopy

    Science.gov (United States)

    Chen, Xianliang; Liu, Xingcun; Sheng, Daping; Huang, Dake; Li, Weizu; Wang, Xin

    2012-11-01

    In this paper, FTIR microspectroscopy was used to identify broken cellular wall Ganoderma lucidum spores and G. lucidum spores. For IR spectra, broken cellular wall G. lucidum spores and G. lucidum spores were mainly different in the regions of 3000-2800, 1660-1600, 1400-1200 and 1100-1000 cm-1. For curve fitting, the results showed the differences in the protein secondary structures and the polysaccharide structures/content between broken cellular wall G. lucidum spores and G. lucidum spores. Moreover, the value of A1078/A1741 might be a potentially useful factor to distinguish broken cellular wall G. lucidum spores from G. lucidum spores. Additionally, FTIR microspectroscopy could identify broken cellular wall G. lucidum spores and G. lucidum spores accurately when it was combined with hierarchical cluster analysis. The result suggests FTIR microspectroscopy is very simple and efficient for distinction of broken cellular wall G. lucidum spores and G. lucidum spores. The result also indicates FTIR microspectroscopy may be useful for TCM identification.

  8. Creating A Guided- discovery Lesson

    Institute of Scientific and Technical Information of China (English)

    田枫

    2005-01-01

    In a guided - discovery lesson, students sequentially uncover layers of mathematical information one step at a time and learn new mathematics. We have identified eight critical steps necessary in developing a successful guided- discovery lesson.

  9. Security, privacy and trust in cloud systems

    CERN Document Server

    Nepal, Surya

    2013-01-01

    The book compiles technologies for enhancing and provisioning security, privacy and trust in cloud systems based on Quality of Service requirements. It is a timely contribution to a field that is gaining considerable research interest, momentum, and provides a comprehensive coverage of technologies related to cloud security, privacy and trust. In particular, the book includes - Cloud security fundamentals and related technologies to-date, with a comprehensive coverage of evolution, current landscape, and future roadmap. - A smooth organization with introductory, advanced and specialist content

  10. Framing Trust at the Street-Level

    DEFF Research Database (Denmark)

    Perry, Kevin Anthony

    unrest, antisocial behaviour, crime and unnecessary public spending. The purpose of this in-depth study, based on nine months of ethnographic fieldwork in and around two residential housing estates, is to contribute towards understanding the micro-processes at play in distrust and trust building...... ethnic backgrounds who reside in and hang out in a local residential housing estate. The main focus of this chapter is on the relationship between a team of youth workers and the young men, which can be described best as highly distrustful. Following this, the thesis reports finding three: trust...

  11. Physical trust-based persistent authentication

    DEFF Research Database (Denmark)

    Fujita, Masahiro; Jensen, Christian D.; Arimura, Shiori;

    2015-01-01

    Recently companies have applied two-factor user authentication. Persistent Authentication is one of the interesting authentication mechanisms to establish security and usability of two-factor authentication systems. However, there is room to improve its feasibility and usability. In this paper, we...... propose a new type of persistent authentication, called Persistent Authentication Based On physical Trust (PABOT). PABOT uses a context of “physical trust relationship” that is built by visual contact between users, and thus can offer a persistent authentication mechanism with better usability and higher...

  12. Scientific Research and the Public Trust

    OpenAIRE

    Resnik, David B.

    2010-01-01

    This essay analyzes the concept of public trust in science and offers some guidance for ethicists, scientists, and policymakers who use this idea defend ethical rules or policies pertaining to the conduct of research. While the notion the public trusts science makes sense in the abstract, it may not be sufficiently focused to support the various rules and policies that authors have tried to derive from it, because the public is not a uniform body with a common set of interests. Well-focused a...

  13. Social trust aspects of rural electrification

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-10-01

    This report is a contribution to a growing body of work which acknowledges the importance of social considerations in the electricity industry, and provides an electricity industry perspective on the role of social trust, which is closely related to concepts such as social responsibility, corporate governance and corporate stewardship. The report provides a full explanation of the concept of social trust, defines its components (competence, commitment, consistency, fairness, respect, caring and empathy) and makes suggestions as to how each of these components could be implemented in a variety of settings and situations such as facility planning, construction and operation, risk management and customer relations.

  14. Capturing Trust in Social Web Applications

    Science.gov (United States)

    O'Donovan, John

    The Social Web constitutes a shift in information flow from the traditional Web. Previously, content was provided by the owners of a website, for consumption by the end-user. Nowadays, these websites are being replaced by Social Web applications which are frameworks for the publication of user-provided content. Traditionally, Web content could be `trusted' to some extent based on the site it originated from. Algorithms such as Google's PageRank were (and still are) used to compute the importance of a website, based on analysis of underlying link topology. In the Social Web, analysis of link topology merely tells us about the importance of the information framework which hosts the content. Consumers of information still need to know about the importance/reliability of the content they are reading, and therefore about the reliability of the producers of that content. Research into trust and reputation of the producers of information in the Social Web is still very much in its infancy. Every day, people are forced to make trusting decisions about strangers on the Web based on a very limited amount of information. For example, purchasing a product from an eBay seller with a `reputation' of 99%, downloading a file from a peer-to-peer application such as Bit-Torrent, or allowing Amazon.com tell you what products you will like. Even something as simple as reading comments on a Web-blog requires the consumer to make a trusting decision about the quality of that information. In all of these example cases, and indeed throughout the Social Web, there is a pressing demand for increased information upon which we can make trusting decisions. This chapter examines the diversity of sources from which trust information can be harnessed within Social Web applications and discusses a high level classification of those sources. Three different techniques for harnessing and using trust from a range of sources are presented. These techniques are deployed in two sample Social Web

  15. Trust in Client-Vendor Relations

    DEFF Research Database (Denmark)

    Tøth, Thomas

    2014-01-01

    In an ever more globalized world we are faced with the challenges of collaborating across geographical distance. This article examines how trust is established in an offshore outsourcing engagement of IT operations between a leading Danish media company and an Indian IT-service provider. The find......In an ever more globalized world we are faced with the challenges of collaborating across geographical distance. This article examines how trust is established in an offshore outsourcing engagement of IT operations between a leading Danish media company and an Indian IT-service provider......, by imitating the way they communicate face-to-face, when collaborating virtually....

  16. The Relationship between Teamwork and Organizational Trust

    OpenAIRE

    Musab Isik

    2016-01-01

    The aim of this study is to investigate the relationship between teamwork and organizational trust. In the implementation section the data from the survey of 250 workers is employed in call centers in Erzurum by using relevant statistical  methods. Consequently, it is found that there is a positive and significant relationship between teamwork and organizational trust. Thus, the hypothesis of the study is supported as it was expected. Besides, it is found that there are positive and significa...

  17. Macroeconomic Dynamics of Assets, Leverage and Trust

    Science.gov (United States)

    Rozendaal, Jeroen C.; Malevergne, Yannick; Sornette, Didier

    A macroeconomic model based on the economic variables (i) assets, (ii) leverage (defined as debt over asset) and (iii) trust (defined as the maximum sustainable leverage) is proposed to investigate the role of credit in the dynamics of economic growth, and how credit may be associated with both economic performance and confidence. Our first notable finding is the mechanism of reward/penalty associated with patience, as quantified by the return on assets. In regular economies where the EBITA/Assets ratio is larger than the cost of debt, starting with a trust higher than leverage results in the highest long-term return on assets (which can be seen as a proxy for economic growth). Therefore, patient economies that first build trust and then increase leverage are positively rewarded. Our second main finding concerns a recommendation for the reaction of a central bank to an external shock that affects negatively the economic growth. We find that late policy intervention in the model economy results in the highest long-term return on assets. However, this comes at the cost of suffering longer from the crisis until the intervention occurs. The phenomenon that late intervention is most effective to attain a high long-term return on assets can be ascribed to the fact that postponing intervention allows trust to increase first, and it is most effective to intervene when trust is high. These results are derived from two fundamental assumptions underlying our model: (a) trust tends to increase when it is above leverage; (b) economic agents learn optimally to adjust debt for a given level of trust and amount of assets. Using a Markov Switching Model for the EBITA/Assets ratio, we have successfully calibrated our model to the empirical data of the return on equity of the EURO STOXX 50 for the time period 2000-2013. We find that dynamics of leverage and trust can be highly nonmonotonous with curved trajectories, as a result of the nonlinear coupling between the variables. This

  18. A Marketing Perspective: Try Looking at Charitable Trusts from the Donor's Point of View.

    Science.gov (United States)

    Thoren, Linda J.

    1979-01-01

    Charitable remainder trusts and charitable income trusts are discussed as essentials in any "marketing mix" of gift-giving options. Unitrusts and annuity trusts are described and tax benefits of the charitable income trust are explained. (MLW)

  19. An Extended Case Study Methoology for Investigating Influence of Cultural, Organizational, and Automation Factors on Human-Automation Trust

    Science.gov (United States)

    Koltai, Kolina Sun; Ho, Nhut; Masequesmay, Gina; Niedober, David; Skoog, Mark; Johnson, Walter; Cacanindin, Artemio

    2014-01-01

    This paper discusses a case study that examined the influence of cultural, organizational and automation capability upon human trust in, and reliance on, automation. In particular, this paper focuses on the design and application of an extended case study methodology, and on the foundational lessons revealed by it. Experimental test pilots involved in the research and development of the US Air Forces newly developed Automatic Ground Collision Avoidance System served as the context for this examination. An eclectic, multi-pronged approach was designed to conduct this case study, and proved effective in addressing the challenges associated with the cases politically sensitive and military environment. Key results indicate that the system design was in alignment with pilot culture and organizational mission, indicating the potential for appropriate trust development in operational pilots. These include the low-vulnerabilityhigh risk nature of the pilot profession, automation transparency and suspicion, system reputation, and the setup of and communications among organizations involved in the system development.

  20. 78 FR 59985 - Variable Insurance Trust, et al.;

    Science.gov (United States)

    2013-09-30

    ... National Association of Insurance Commissioners Variable Life Insurance Model Regulation (the ``NAIC Model... COMMISSION Variable Insurance Trust, et al.; Notice of Application September 24, 2013. AGENCY: Securities and.... Applicants: Variable Insurance Trust (the ``Fund'') and MFund Services LLC (``MFund'')...

  1. Improving the trust algorithm of information in semantic web

    Science.gov (United States)

    Wan, Zong-bao; Min, Jiang

    2012-01-01

    With the rapid development of computer networks, especially with the introduction of the Semantic Web perspective, the problem of trust computation in the network has become an important research part of current computer system theoretical. In this paper, according the information properties of the Semantic Web and interact between nodes, the definition semantic trust as content trust of information and the node trust between the nodes of two parts. By Calculate the content of the trust of information and the trust between nodes, then get the final credibility num of information in semantic web. In this paper , we are improve the computation algorithm of the node trust .Finally, stimulations and analyses show that the improved algorithm can effectively improve the trust of information more accurately.

  2. Trust in automation. Part II. Experimental studies of trust and human intervention in a process control simulation.

    Science.gov (United States)

    Muir, B M; Moray, N

    1996-03-01

    Two experiments are reported which examined operators' trust in and use of the automation in a simulated supervisory process control task. Tests of the integrated model of human trust in machines proposed by Muir (1994) showed that models of interpersonal trust capture some important aspects of the nature and dynamics of human-machine trust. Results showed that operators' subjective ratings of trust in the automation were based mainly upon their perception of its competence. Trust was significantly reduced by any sign of incompetence in the automation, even one which had no effect on overall system performance. Operators' trust changed very little with experience, with a few notable exceptions. Distrust in one function of an automatic component spread to reduce trust in another function of the same component, but did not generalize to another independent automatic component in the same system, or to other systems. There was high positive correlation between operators' trust in and use of the automation; operators used automation they trusted and rejected automation they distrusted, preferring to do the control task manually. There was an inverse relationship between trust and monitoring of the automation. These results suggest that operators' subjective ratings of trust and the properties of the automation which determine their trust, can be used to predict and optimize the dynamic allocation of functions in automated systems. PMID:8849495

  3. Trust and its ramification for the DoD public key infrastructure (PKI)

    OpenAIRE

    Pedersen, Carl M.

    2001-01-01

    Approved for public release; distribution is unlimited Researchers have used a wide variety of trust definitions, leading to a plethora of meanings of the concept. But what does the word trust' mean? While most scholars provide their own definition of trust, they are dissatisfied regarding their own lack of consensus about what trust is. Trust is a cognitive function and modeling trust is an attempt to emulate the way a human assesses trust. Models of trust have been developed in an attemp...

  4. A Lesson-Planning Model

    Science.gov (United States)

    Linder, Sandra M.

    2010-01-01

    Many models of planning and lesson construction in the United States advocate an objective-driven approach whereby teachers create performance-based goals that their students should accomplish by the end of the lesson. Teachers then evaluate lessons by determining if students have accomplished these objectives. Often, this model of planning…

  5. The history of a lesson

    DEFF Research Database (Denmark)

    Rasmussen, Mikkel Vedby

    2003-01-01

    and emphasises the need to study the history of lessons rather than the lessons of history. This approach shows that Munich is the end point of a constitutive history that begins in the failure of the Versailles treaty to create a durable European order following the First World War. The Munich lesson is thus...

  6. Consumer trust and confidence: Some recent ideas in the literature

    OpenAIRE

    Fife-Schaw, C; Barnett, J; J. Chenoweth; Morrison, GM; Lundéhn, C

    2008-01-01

    This paper reflects on two recent debates in the consumer literature on trust that have implications for consumer relations in the water industry. The first concerns an important yet seldom made distinction between trust and confidence. The second concerns when and how trust is related to acceptance of, for example, new tariffs or new technologies, and it challenges the conventional view that trust is usually a precursor of acceptance. New conceptual models addressing these debates are descri...

  7. Between compassionateness and assertiveness: a trust matrix for leaders

    OpenAIRE

    Victor Manuel Monteiro Seco; Miguel Pereira Lopes

    2014-01-01

    Purpose: Construct the structure of trust-building perceived by principals in Portuguese public schools.Design/methodology/approach: A grounded theory approach applied to a survey of open questions answered by school’s principals.Findings: (1) self-trust is the single trait common to all respondents; (2) compassion is a striking antecedent in the process of other-trust; compassionateness and assertiveness must combine with one another to achieve leadership based on smart trust, what is outlin...

  8. Trust hierarchy trees applied in team management and data access

    Directory of Open Access Journals (Sweden)

    Laura Danilescu

    2011-12-01

    Full Text Available Controlling access to data and information within organizations is an important concerntoday and also our aim. This paper is based on the concept of trust, which allows access control andcontrol of actions that can be applied to data and information indocuments held in computer systems.Methods we have used are: defining trust hierarchies applied to team members, data and actions.Results we have obtained are trust policies based on trust hierarchies.

  9. Trust in building high-performing teams : conceptual approach

    OpenAIRE

    Hakanen, Mila; Häkkinen, Mia; Soudunsaari, Aki

    2015-01-01

    Team building is one of the key factors of success in business. This study highlights the key elements of building winning teams, where trust is one essential building block and top-level sports teams serve as instructive examples. This study highlights earlier findings that revealed a strong connection between trust and high-performing teams. High-performing teams need talented people but also constant trust-based cooperation. Trust supports cooperative...

  10. Decoupling, re-Engaging: managing trust relationships in implementation projects

    DEFF Research Database (Denmark)

    Rose, Jeremy; Schlichter, Bjarne Rerup

    2012-01-01

    An important aspect of the successful implementation of large information systems (such as ERP systems) is trust. These implementations impact the legitimate interests of many groups of stakeholders, and trust is a critical factor for success. Trust in the project is contingent upon many factors,...... its goals. Based on concepts from Giddens’ later work on modernity, we develop two approaches for managing dynamic trust relationships in implementation projects: decoupling and re-engaging....

  11. Physical temperature effects on trust behavior: the role of insula

    OpenAIRE

    Kang, Yoona; Williams, Lawrence E.; Clark, Margaret S.; Gray, Jeremy R.; Bargh, John A.

    2010-01-01

    Trust lies at the heart of person perception and interpersonal decision making. In two studies, we investigated physical temperature as one factor that can influence human trust behavior, and the insula as a possible neural substrate. Participants briefly touched either a cold or warm pack, and then played an economic trust game. Those primed with cold invested less with an anonymous partner, revealing lesser interpersonal trust, as compared to those who touched a warm pack. In Study 2, we ex...

  12. Trusted computing platforms TPM2.0 in context

    CERN Document Server

    Proudler, Graeme; Dalton, Chris

    2015-01-01

    In this book the authors first describe the background of trusted platforms and trusted computing and speculate about the future. They then describe the technical features and architectures of trusted platforms from several different perspectives, finally explaining second-generation TPMs, including a technical description intended to supplement the Trusted Computing Group's TPM2 specifications. The intended audience is IT managers and engineers and graduate students in information security.

  13. Trust, Contracting, and Adaptation in Agri-Food Hybrid Structures

    OpenAIRE

    Gaetano Martino

    2011-01-01

    The paper considers the relationship between trust and governance structure from a Transaction Cost Economics perspective. The role of trust in the coordinating decisions is variously conceptualized according to the theoretical view adopted by the scholars. The present study adopt the three-level schema introduced by Williamson (1996) and suggest that determinants of trust may operate both at institutional and governance structure level. The analytical framework depicted maintains that trust ...

  14. Building an e-Government e-Trust Infrastructure

    OpenAIRE

    Hussein A. Omari; Ahmed A. Omari

    2006-01-01

    This paper presents a Trust Model for e-Government implementation. In the first part of the paper, the trust definition from different points of view (psychology, philosophy, linguistic, sociology, and mathematics) was presented. Most people think that to build trust between the government and its customers or citizens, one must start by implementing IT Security and some kinds of Customer Relationship Management (CRM) systems and that will lead to a full customer trust. However, this was not ...

  15. Trust of Second Generation Immigrants: Intergenerational Transmission or Cultural Assimilation?

    OpenAIRE

    Moschion, Julie; Tabasso, Domenico

    2013-01-01

    This paper studies the respective influence of intergenerational transmission and the environment in shaping individual trust. Focusing on second generation immigrants in Australia and the United States, we exploit the variation in the home and in the host country to separate the effect of the cultural background from that of the social and economic conditions on individual trust. Our results indicate that trust in the home country contributes to the trust of second generation immigrants in b...

  16. The lessons learned

    International Nuclear Information System (INIS)

    What happened at TMI-2 and to the United States Nuclear Industry since the accident to that plant is recounted. Four main points are made: commercial use of nuclear power evolved so rapidly that neither industry nor society generally, was able to assimilate this dramatically new technology fast enough; accidents like TMI-2, and now, the much more damaging Chernobyl, are a part of the price paid; we must take every possible step so that the risks from nuclear power are reduced by learning from accidents and putting that knowledge into practice; the lessons learned and applied after TMI-2 have tended to be the readily achievable, shorter term ones. The most drastic changes will take more time. The organizational and institutional lessons are considered first, then the technical ones. The sequence and status of the TMI-2 cleanup is discussed. The design lessons are summarized. (author)

  17. Trusting Relationships and Emotional Epistemologies: A Foundational Leadership Issue

    Science.gov (United States)

    Beatty, Brenda R.; Brew, Christine R.

    2004-01-01

    The connections among relational trust, learning and development are implicit in transformational leadership theory. They have also been established empirically in recent studies. Leadership preparation programs often endorse the need for leaders to build effective collaborative relationships that rely on trust. Trust is an emotional phenomenon.…

  18. 36 CFR 1010.13 - Trust decision-making procedures.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Trust decision-making procedures. 1010.13 Section 1010.13 Parks, Forests, and Public Property PRESIDIO TRUST ENVIRONMENTAL QUALITY § 1010.13 Trust decision-making procedures. To ensure that at major decision-making points all...

  19. 5 CFR 2634.310 - Trusts, estates, and investment funds.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Trusts, estates, and investment funds... EXECUTIVE BRANCH FINANCIAL DISCLOSURE, QUALIFIED TRUSTS, AND CERTIFICATES OF DIVESTITURE Contents of Public Reports § 2634.310 Trusts, estates, and investment funds. (a) In general. (1) Except as otherwise...

  20. On Interorganizational Trust and User-driven Innovation

    DEFF Research Database (Denmark)

    Jacobsen, Alexia; Lassen, Astrid Heidemann

    2012-01-01

    trust itself. With an outset in Project InnoDoors, data has been collected in a business network in the construction material industry that is collaborating for conducting user-driven innovation. The outcome is an 8 Phase process, illustrating the different activities performed during the development...... process of trust and the may different forms of trust that emerge during the process....