WorldWideScience

Sample records for broken trust lessons

  1. Betrayed trust: healing a broken hospital through servant leadership.

    Science.gov (United States)

    Yancer, Deborah A

    2012-01-01

    An investigative reporter with The Washington Post broke the news of a no-confidence vote by the medical staff of a hospital in the suburbs of Washington, District of Columbia. The chaos that followed created a perfect storm for needed change and offered the rare opportunity for unbridled deep and creative collaboration. Issues the hospital faced as a result of this crisis and subsequent events that tested the authenticity of change are summarized. This article focuses on the approach used by the registered nurse chief executive officer (RN-CEO) to humanize the hospital, viewing it as though it were a patient and leading a clinical approach to organizational recovery and health. The relationship that developed between the medical staff leaders and the RN-CEO was pivotal to the hospital's recovery and evolved as a hybrid of servant leadership. Outcomes achieved over a 7-year period and attributable to this relational model are summarized. Finally, the RN-CEO shares lessons learned through experience and reflection and advice for nurses interested in pursuing executive leadership roles.

  2. Broken trusts: The Texas Attorney General versus the oil industry, 1889-1909

    Science.gov (United States)

    Singer, Jonathan Whitney

    The legal history of state antitrust enforcement and the oil industry in Texas illustrates how and why antitrust law contemplated complementary enforcement at the state and federal government level. Historians, economists, and lawyers have concentrated on federal antitrust law and enforcement, ignoring state efforts. Yet for most of the first twenty-five years following the enactment of the Sherman Antitrust Act, federal enforcement efforts were extremely limited, leaving the field to the states. Texas was one of several states that had strong antitrust laws, and whose attorneys general prosecuted antitrust violations with vigor. Political ambition was a factor in the decisions to investigate and prosecute cases against a highly visible target, the petroleum industry, but there was also a genuine belief in the goals of antitrust policy, and in the efficacy of enforcement of the laws. Enforcement efforts were also complicated by the fact that large oil companies provided vital commodities, articles of "prime necessity," to the citizens of Texas and following the discovery of large oil fields, played an increasingly important role in the economies of many Texas communities. The Texas Attorney General's antitrust enforcement efforts against the oil industry in this time of transition from an agricultural society to an industrial society provide insights into the litigation process, and reveal how well the rhetoric of trust-busting fit with the reality of antitrust enforcement. The antitrust crusade against the petroleum industry also highlights the changing roles of state government in the late nineteenth and early twentieth centuries, particularly the Attorney General's Department. The experience of Texas undermines the view that federal action has always dominated antitrust enforcement efforts and that antitrust litigation against Standard Oil was ineffective and ineffectual. Rather, the Texas Attorney General's litigations and their results suggest that some states

  3. Trust, Reciprocity and Institutional Design: Lessons from Behavioural Economics

    OpenAIRE

    Pelligra, Vittorio

    2006-01-01

    Trust and reciprocity are the bond of society (Locke), but economic agents are both self-interested and intrinsically untrustworthy. These assumptions impair severely economists' accounts of social relationships. The paper examines strategies to escape this paradox by enlarging our conception of rationality: the assumptions of self-interest and consequentialism are critically discussed as well as relational behavioural principles (e.g. trust and reciprocity). The implications of this enlarged...

  4. Trust

    OpenAIRE

    Söllner, Matthias; Benbasat, Izak; Gefen, David; Leimeister, Jan Marco; Pavlou, Paul A.

    2016-01-01

    Trust is the enabler of social interaction. Although the origins of research on trust traditionally lie outside the Information Systems (IS) domain, the importance of trust for IS research rapidly grew in the late 1990s, and it is still growing with the increasing ubiquity and advancement of technology in organizations, virtual teams, online markets, and user-technology interactions. Theoretically, the central role of trust is tied to the growing social change that Information and Communicati...

  5. Trust

    OpenAIRE

    Fojtů, Dominik

    2015-01-01

    This rigorous thesis is focused on a status of trust in an application practise in a Czech legislation with a context of historical aspects of institutes similar to trusts as well as actual legislation. The thesis includes also analyses of more difficult provisions concerning the trust, including economic impacts representing accounting and tax consequences. Also comparison with established modifications trusts in Europe and their possible utilization of the Czech point of view of the settlor...

  6. Broken bone

    Science.gov (United States)

    ... Drugs & Supplements Videos & Tools Español You Are Here: Home → Medical Encyclopedia → Broken bone URL of this page: //medlineplus.gov/ency/ ... following steps to reduce your risk of a broken bone: Wear protective ... pads. Create a safe home for young children. Place a gate at stairways ...

  7. Symanzik–Becchi–Rouet–Stora lessons on renormalizable models with broken symmetry: The case of Lorentz violation

    Energy Technology Data Exchange (ETDEWEB)

    Del Cima, Oswaldo M.; Franco, Daniel H.T.; Piguet, Olivier, E-mail: opiguet@pq.cnpq.br

    2016-11-15

    In this paper, we revisit the issue intensively studied in recent years on the generation of terms by radiative corrections in models with broken Lorentz symmetry. The algebraic perturbative method of handling the problem of renormalization of the theories with Lorentz symmetry breaking, is used. We hope to make clear the Symanzik's aphorism: “Whether you like it or not, you have to include in the lagrangian all counter terms consistent with locality and power-counting, unless otherwise constrained by Ward identities.”{sup 1}.

  8. Broken Arm

    Science.gov (United States)

    ... of falling — including football, soccer, gymnastics, skiing and skateboarding — also increases the risk of a broken arm. ... for high-risk activities, such as in-line skating, snowboarding, rugby and football. Don't smoke. Smoking ...

  9. Trust

    OpenAIRE

    Bentham, R

    2016-01-01

    Rachel Bentham's 'Let All Tongues Flower' won her many new admirers for its 'openness to form' and 'strong yet subtle feminine sensibility'. It was also a Top 3 selling book on Amazon Kindle Women's Poetry. Here, in her new book 'Trust', she shows she is equally at home with the increasingly popular haiku form - using both classic 5-7-5 and free form haiku, she gives us more treasured and crafted glimpses into her 'unhindered and mostly joyful life'.

  10. Trust

    OpenAIRE

    Carro, Salvatore

    2006-01-01

    Il lavoro eseguito ha per oggetto il trust, istituto, come noto, estraneo alla nostra cultura giuridica, tipico dei sistemi di common law, riconosciuto e regolato dalla Convenzione dell’ Aja, firmata il 1°luglio 1985, ratificata in Italia con L. 16 ottobre 1989, n. 364, ed entrata in vigore il 1° giugno 1992. La ricerca svolta ha, in primo luogo, esaminato la fattispecie, con un approccio comparatistico, analizzando, nella prima parte, il contenuto e la controversa natura giuridica della c...

  11. Trust Building Recruitment Strategies for Researchers Conducting Studies in African American (AA) Churches: Lessons Learned.

    Science.gov (United States)

    Bonner, Gloria; Williams, Sharon; Wilkie, Diana; Hart, Alysha; Burnett, Glenda; Peacock, Geraldine

    2017-12-01

    An initial and vital important step in recruiting participants for church-based hospice and palliative care research is the establishment of trust and credibility within the church community. Mistrust of medical research is an extremely important barrier hindering recruitment in African American (AA) communities. A church-based EOL dementia education project is currently being conducted at four large urban AA churches. Church leaders voiced mistrust concerns of previous researchers who conducted investigations in their faith-based institutions. We explored strategies to ameliorate the mistrust concerns. Specific aim: To identify trust-rebuilding elements for researchers following others who violated trust of AA church leaders. Face-to-face, in-depth interviews were conducted from a convenient sample of four established AA church leaders. Interviews were held in the informants' churches to promote candor and comfort in revealing sensitive information about trust /mistrust. Content analysis framework was used to analyze the data. Elements identified from the analysis were then used to create themes. Multidimensional overarching themes emerged from the analysis included: Experience with researchers (positive and extremely negative), violation of trust and trust building strategies. Findings suggest that researchers who wish to conduct successful studies in the AA religious institutions must implement trust rebuilding strategies that include mutual respect, collaboration and partnership building. If general moral practices continue to be violated, threat to future hospice and palliative care research within the institutions may prevail. Thus, potential benefits are thwarted for the church members, AA community, and advancement of EOL care scholarship.

  12. Broken Bones (For Parents)

    Science.gov (United States)

    ... Safe Videos for Educators Search English Español Broken Bones KidsHealth / For Parents / Broken Bones What's in this ... bone fragments in place. When Will a Broken Bone Heal? Fractures heal at different rates, depending upon ...

  13. Forms, Sources and Processes of Trust

    NARCIS (Netherlands)

    Nooteboom, B.

    2006-01-01

    This chapter reviews some key points in the analysis of trust, based on Nooteboom (2002)i.The following questions are addressed.What can we have trust in?What is the relation between trust and control?What are the sources of trust? And what are its limits?By what process is trust built up and broken

  14. Improving service quality in NHS Trust hospitals: lessons from the hotel sector.

    Science.gov (United States)

    Desombre, T; Eccles, G

    1998-01-01

    This article looks to review recent practice undertaken within the UK hotel sector to improve customer service, and suggests ideals that could be implemented within National Health (NHS) Trust hospitals. At a time of increasing competition, hotel firms are using service enhancement as a means to gain competitive advantage, and therefore developing a range of techniques to measure levels of service quality improvement. With continued change in the health service, where greater focus now lies with patient satisfaction, so there is a requirement for managers to adapt techniques presently being offered in other service industries to improve levels of customer service and ensure patients are targeted to define their levels of satisfaction.

  15. Facts about Broken Bones

    Science.gov (United States)

    ... Safe Videos for Educators Search English Español Broken Bones KidsHealth / For Kids / Broken Bones What's in this ... sticking through the skin . What Happens When a Bone Breaks? It hurts to break a bone! It's ...

  16. The UK National Health Service's 'innovation agenda': lessons on commercialisation and trust.

    Science.gov (United States)

    Sterckx, Sigrid; Cockbain, Julian

    2014-01-01

    The UK National Health Service (the 'NHS'), encouraged by the 2011 report Innovation Health and Wealth, Accelerating Adoption and Diffusion in the NHS, and empowered by the Health and Social Care Act 2012, is in the process of adopting a new agenda for stimulating innovation in healthcare. For this, the bodies, body materials, and confidential health information of NHS patients may be co-opted. We explain why this brings the NHS into a moral conflict with its basic goal of providing a universal healthcare service. Putting NHS databases at the disposal of industry, without addressing ethical concerns regarding the privacy, autonomy, and moral integrity of patients and without requiring a 'kick-back' to enhance the service that the NHS provides, is inappropriate. As this article shows, with reference to the commercial arena of direct-to-consumer genetic testing, it is crucial that patient and public trust in the NHS is not eroded. © The Author 2014. Published by Oxford University Press; all rights reserved. For Permissions, please email: journals.permissions@oup.com.

  17. Broken or dislocated jaw

    Science.gov (United States)

    ... broken or dislocated jaw requires prompt medical attention. Emergency symptoms include difficulty breathing or heavy bleeding. ... safety equipment, such as a helmet when playing football, or using ... can prevent or minimize some injuries to the face or jaw.

  18. Lessons learned in Liberia: preliminary examination of the psychometric properties of trust and teamwork among maternal healthcare workers.

    Science.gov (United States)

    Lori, Jody R; Munro, Michelle L; Moore, Jennifer E; Fladger, Jessica

    2013-04-11

    Post-conflict Liberia has one of the fastest growing populations on the continent and one of the highest maternal mortality rates among the world. However, in the rural regions, less than half of all births are attended by a skilled birth attendant. There is a need to evaluate the relationship between trained traditional healthcare providers and skilled birth attendants to improve maternal health outcomes. This evaluation must also take into consideration the needs and desires of the patients. The purpose of this pilot study was to establish the validity and reliability of a survey tool to evaluate trust and teamwork in the working relationships between trained traditional midwives and certified midwives in a post-conflict country. A previously established scale, the Trust and Teambuilding Scale, was used with non- and low-literate trained traditional midwives (n=48) in rural Liberia to evaluate trust and teamwork with certified midwives in their communities. Initial results indicated that the scale and response keys were culturally inadequate for this population. A revised version of the scale, the Trust and Teamwork Scale - Liberia, was created and administered to an additional group of non- and low-literate, trained traditional midwives (n=42). Exploratory factor analysis using Mplus for dichotomous variables was used to determine the psychometric properties of the revised scale and was then confirmed with the full sample (n=90). Additional analyses included contrast validity, convergent validity, and Kuder-Richardson reliability. Exploratory factor analysis revealed two factors in the revised Trust and Teamwork Scale - Liberia. These two factors, labeled trust and teamwork, included eleven of the original eighteen items used in the Trust and Teamwork Scale and demonstrated contrast and convergent validity and adequate reliability. The revised scale is suitable for use with non- and low-literate, trained traditional midwives in rural Liberia. Continued cross

  19. Fractures (Broken Bones): First Aid

    Science.gov (United States)

    First aid Fractures (broken bones) Fractures (broken bones): First aid By Mayo Clinic Staff A fracture is a ... 10, 2018 Original article: http://www.mayoclinic.org/first-aid/first-aid-fractures/basics/ART-20056641 . Mayo Clinic ...

  20. Spontaneously broken mass

    International Nuclear Information System (INIS)

    Endlich, Solomon; Nicolis, Alberto; Penco, Riccardo

    2015-01-01

    The Galilei group involves mass as a central charge. We show that the associated superselection rule is incompatible with the observed phenomenology of superfluid helium 4: this is recovered only under the assumption that mass is spontaneously broken. This remark is somewhat immaterial for the real world, where the correct space-time symmetries are encoded by the Poincaré group, which has no central charge. Yet it provides an explicit example of how superselection rules can be experimentally tested. We elaborate on what conditions must be met for our ideas to be generalizable to the relativistic case of the integer/half-integer angular momentum superselection rule.

  1. Topics in broken supersymmetry

    International Nuclear Information System (INIS)

    Lee, I.H.

    1984-01-01

    Studies on two topics in the framework of broken supersymmetry are presented. Chapter I is a brief introduction in which the motivation and the background of this work are discussed. In Chapter II, the author studies the decay K + → π + γγ in models with spontaneous supersymmetry breaking and find that it is generally suppressed relative to the decay K + → π + anti nu nu of the conventional model, except possibly for a class of models where the scalar quark masses are generated by radiative corrections from a much larger supersymmetry breaking scale. For a small range of scalar quark and photino mass parameters, the cascade decay process K + → π + π 0 → π + γγ will become dominant over the anti nu nu mode. The author also comments on the possibility of probing the neutrino mass through the K + → π + π 0 → π + anti nu nu cascade decay. Chapter III is concerned with the implications of explicit lepton number violating soft operators in a general low energy effective theory with softly broken supersymmetry

  2. Trust in agile teams

    DEFF Research Database (Denmark)

    Tjørnehøj, Gitte; Fransgård, Mette; Skalkam, Signe

    2012-01-01

    actions influenced this. We see two important lessons from the analysis. First the agile practices of daily Scrum and self organizing team can empower DSD teams to manage their own development of trust and thereby alleviate the obstacles of DSD. Second if management fails to support the development...

  3. A broken symmetry ontology: Quantum mechanics as a broken symmetry

    International Nuclear Information System (INIS)

    Buschmann, J.E.

    1988-01-01

    The author proposes a new broken symmetry ontology to be used to analyze the quantum domain. This ontology is motivated and grounded in a critical epistemological analysis, and an analysis of the basic role of symmetry in physics. Concurrently, he is led to consider nonheterogeneous systems, whose logical state space contains equivalence relations not associated with the causal relation. This allows him to find a generalized principle of symmetry and a generalized symmetry-conservation formalisms. In particular, he clarifies the role of Noether's theorem in field theory. He shows how a broken symmetry ontology already operates in a description of the weak interactions. Finally, by showing how a broken symmetry ontology operates in the quantum domain, he accounts for the interpretational problem and the essential incompleteness of quantum mechanics. He proposes that the broken symmetry underlying this ontological domain is broken dilation invariance

  4. Trust makers, breakers and brokers: building trust in the Australian food system

    OpenAIRE

    Wilson, Annabelle; Coveney, John; Henderson, Julie; Meyer, Samantha; Calnan, Michael; Caraher, Martin; Webb, Trevor; Elliott, Anthony; Ward, Paul

    2013-01-01

    Background The importance of consumer trust in the food supply has previously been identified, and dimensions of consumer trust in food?who they trust and the type of trust that they exhibit?has been explored. However, there is a lack of research about the mechanisms through which consumer trust in the food supply is developed, maintained, broken and repaired. This study seeks to address this gap by exploring if, and how, consumer trust in the food supply is considered by the media, food indu...

  5. Time, trust, and transparency: Lessons learned from collecting blood biospecimens for cancer research from the Asian American community.

    Science.gov (United States)

    Dang, Julie H T; Chen, Moon S

    2018-04-01

    Biospecimens from racially diverse groups are needed to advance cancer research. The Asian American Cancer Education Study was developed to increase the number and proportion of blood biospecimen donations from Asian Americans for cancer research. The authors' targeted approach included 2 types of community engagement, in-reach (within institution to Asian American patients with cancer) and outreach (external to institution to the general Asian American community). Participants received in-language biospecimen education followed by the opportunity to donate blood biospecimens. Outreach participants donated through our community biospecimen blood drives, and in-reach participants consented to donating an extra tube of blood during their routine blood draws as a patient. Donated blood biospecimens were spun down to serum and plasma to be stored in a biorepository or were sent to the laboratory to test for cancer-related risk factors. Three hundred eighty-eight Asian Americans donated 1127 blood biospecimens for cancer research. Four hundred twenty tubes of plasma and serum are currently being stored at the cancer center's biorepository, 39 tubes have been used for cancer genomic research, and 668 tubes were used to characterize cancer-related risk factors. Building upon the past decade of the National Cancer Institute-funded Asian American Network for Cancer Awareness, Research, and Training's foundation of trust and service among Asian Americans, researchers were able to leverage relationships not only to introduce the idea of biospecimen contribution to the community but to also exceed expectations with regard to the quantity of blood biospecimens collected from Asian Americans. Cancer 2018;124:1614-21. © 2018 American Cancer Society. © 2018 American Cancer Society.

  6. Trust Trust Me (The Additivity)

    OpenAIRE

    Mano , Ken; Sakurada , Hideki; Tsukada , Yasuyuki

    2017-01-01

    Part 4: Trust Metrics; International audience; We present a mathematical formulation of a trust metric using a quality and quantity pair. Under a certain assumption, we regard trust as an additive value and define the soundness of a trust computation as not to exceed the total sum. Moreover, we point out the importance of not only soundness of each computed trust but also the stability of the trust computation procedure against changes in trust value assignment. In this setting, we define tru...

  7. Measuring Trust

    OpenAIRE

    Glaeser, Edward Ludwig; Laibson, David I.; Scheinkman, Jose A.; Soutter, Christine L.

    2000-01-01

    We combine two experiments and a survey to measure trust and trustworthiness—two key components of social capital. Standard attitudinal survey questions about trust predict trustworthy behavior in our experiments much better than they predict trusting behavior. Trusting behavior in the experiments is predicted by past trusting behavior outside of the experiments. When individuals are closer socially, both trust and trustworthiness rise. Trustworthiness declines when partners are of differen...

  8. Organizational trust or beyond appearances

    Directory of Open Access Journals (Sweden)

    Maria Dromereschi

    2010-12-01

    Full Text Available People and organizations to whom I am giving life to have an enormous need to trust and be trustworthy. Trust represents a fragile asset who needs to be invested in, which is difficult to obtain and takes time to obtain it, but which can be easily broken. Paradoxically, it is a universal trade currency, world-widely understood and appreciated. The relations based on trust are those which determine a company to grow and create a competitive advantage. Trust generates trust. It is the one that inspires and motivates, requires the preservation of a certain set of values, mainly sincerity, fairness, perseverance and a real preoccupation for meeting the needs of other people.

  9. Broken toe - self-care

    Science.gov (United States)

    Fractured toe - self-care; Broken bone - toe - self-care; Fracture - toe - self-care; Fracture phalanx - toe ... often treated without surgery and can be taken care of at home. Severe injuries include: Breaks that ...

  10. What is Broken Heart Syndrome

    Science.gov (United States)

    ... pumping action and blood flow, go to the Health Topics How the Heart Works article.) Researchers are trying to identify the precise way in which the stress hormones affect the heart. Broken heart syndrome may result from ...

  11. Job loss and broken partnerships

    DEFF Research Database (Denmark)

    Kriegbaum, Margit; Christensen, Ulla; Lund, Rikke

    2008-01-01

    The aim of this study was to investigate the effects of the accumulated number of job losses and broken partnerships (defined as the end of cohabitation) on the risk of fatal and nonfatal events of ischemic heart disease (IHD).......The aim of this study was to investigate the effects of the accumulated number of job losses and broken partnerships (defined as the end of cohabitation) on the risk of fatal and nonfatal events of ischemic heart disease (IHD)....

  12. Broken Homes: Impact on Adolescents.

    Science.gov (United States)

    Koziey, Paul W.; Davies, Leigh

    1982-01-01

    Tends to support assertion that children from homes broken by separation, divorce, or death are less well-adjusted in terms of California Personality Inventory scales of self-control, socialization, femininity, and good impression, than children from intact homes. Age and sex were not found to be linked to the degree of maladjustment. (AH)

  13. Broken supersymmetries and shifted superpropagators

    International Nuclear Information System (INIS)

    Helayel-Neto, J.A.; Rabelo de Carvalho, F.A.B.; Smith, A.W.

    1985-06-01

    Superfield Feynman rules are derived for a general case where global supersymmetry is spontaneously broken by F-terms. The complete superspace dependence of the superpropagators is factored out and they are employed to discuss the corrections to the effective action and the non-renormalization theorems. Their coupling to external gauge superfields is also contemplated and finite matter contributions to the gaugino mass and the Fayet-Iliopoulos term are considered. (author)

  14. Rethinking trust.

    Science.gov (United States)

    Kramer, Roderick M

    2009-06-01

    Will we ever learn? We'd barely recovered from Enron and WorldCom before we faced the subprime mortgage meltdown and more scandals that shook our trust in businesspeople. Which raises the question: Do we trust too much? In this article, Stanford professor and social psychologist Kramer explores the reasons we trust so easily--and, often, so unwisely. He explains that genetics and childhood learning make us predisposed to trust and that it's been a good survival mechanism. That said, our willingness to trust makes us vulnerable. Our sense of trust kicks in on remarkably simple cues, such as when people look like us or are part of our social group. We also rely on third parties to verify the character of others, sometimes to our detriment (as the victims of Bernard Madoff learned). Add in our illusions of invulnerability and our tendencies to see what we want to see and to overestimate our own judgment, and the bottom line is that we're often easily fooled. We need to develop tempered trust. For those who trust too much, that means reading cues better; for the distrustful, it means developing more receptive behaviors. Everyone should start with small acts of trust that encourage reciprocity and build up. Having a hedge against potential abuses also helps. Hollywood scriptwriters, for instance, register their treatments with the Writers Guild of America to prevent their ideas from being stolen by the executives they pitch. To attract the right relationships, people must strongly signal their own honesty, proactively allay concerns, and, if their trust is abused, retaliate. Trusting individuals in certain roles, which essentially means trusting the system that selects and trains them, also works but isn't foolproof. And don't count on due diligence alone for protection; constant vigilance is needed to make sure the landscape hasn't changed.

  15. Broken color symmetry and weak currents

    International Nuclear Information System (INIS)

    Stech, B.

    1976-01-01

    Broken colour symmetry predicts a very rich spectrum of new particles. If broken colour is relevant at all, charged psi-particles should be found in particular at the 4 GeV region. For the weak hadronic currents no completely satisfactory suggestion exists. Broken colour symmetry describes qualitatively several of the new effects observed recently. (BJ) [de

  16. Universal Lessons Learned by a Gastroenterologist from a Deaf and Mute Patient: The Importance of Nonverbal Communication and Establishing Patient Rapport and Trust

    Science.gov (United States)

    Cappel, Mitchell S.

    2009-01-01

    Deaf and mute patients may require minimal extra attention to establish trust and allay anxieties before minor medical maneuvers such as rectal examination. An "extreme" case is reported of the consequences from failure to accomplish this. A generally cooperative deaf and mute patient struggled and suffered a rectal tear and perforation during…

  17. [Dehydration due to "mouth broken"].

    Science.gov (United States)

    Meijler, D P M; van Mossevelde, P W J; van Beek, R H T

    2012-09-01

    Two children were admitted to a medical centre due to dehydration after an oral injury and the extraction of a tooth. One child complained of "mouth broken". Dehydration is the most common water-electrolyte imbalance in children. Babies and young children are prone to dehydration due to their relatively large body surface area, the high percentage extracellular fluid, and the limited ability of the kidneys to conserve water. After the removal ofa tooth, after an oral trauma or in case of oral discomfort, a child is at greater risk of dehydration by reduced fluid and food intake due to oral pain and/or discomfort and anxiety to drink. In those cases, extra attention needs to be devoted to the intake of fluids.

  18. Trust matters

    DEFF Research Database (Denmark)

    Østergaard, Lise Rosendal

    2015-01-01

    This article makes a contribution to the debate about health service utilisation and the role of trust in fostering demand for health services in sub-Saharan Africa. It is framed as a narrative literature review based on a thematic analysis of nine empirical, qualitative studies. For the purposes...... of this article trust is defined as a voluntary course of action, which involves the optimistic expectation that the trustee will do no harm to the trustor and is increasingly perceived as an important influence on health system functioning. The article looks at trust issues in interpersonal, intergroup...... and institutional situations. The findings of the review point to four elements that are important for trust to develop in health sector relationships: the sensitive use of discretionary power by health workers, perceived empathy by patients of the health workers, the quality of medical care and workplace...

  19. Can we trust robots?

    NARCIS (Netherlands)

    Coeckelbergh, Mark

    2011-01-01

    Can we trust robots? Responding to the literature on trust and e-trust, this paper asks if the question of trust is applicable to robots, discusses different approaches to trust, and analyses some preconditions for trust. In the course of the paper a phenomenological-social approach to trust is

  20. Self Derogation and Childhood Broken Home

    Science.gov (United States)

    Kaplan, Howard B; Pokorny, Alex D.

    1971-01-01

    The data from this study makes clear that it is not the fact of broken homes per se that is related to self derogation but rather the particular characteristics of the broken home situation. Prediction of self derogation is also contingent upon such subject characteristics as race, sex and social class. (Author/CG)

  1. "Broken Expectations" from a Global Business Perspective

    NARCIS (Netherlands)

    Koca, A.; Karapanos, E.; Brombacher, A.C.

    2009-01-01

    Especially in the past few years, there has been an increase in the rejection rate of interactive consumer electronics products in the field, not due to broken hardware or software, but due to ‘broken expectations’ of users. However, operational methods to capture triggering contextual reasons are

  2. Perilaku Agresif Siswa dari Keluarga Broken Home

    Directory of Open Access Journals (Sweden)

    Randi Pratama

    2016-12-01

    Full Text Available This research is based because of the aggressive behavior shown by the students, especially students who come from a broken home. The purpose of this study is to describe the aggressive behavior that is owned by a student who comes from a broken home in terms of attacking people physically, verbally, and damaging and destroying property and wealth of others. The results of this research shows that in general student’s aggressivebehavior are on average level. Implications of research in guidance and counseling is as the basis for programs to prevent and cope with aggressive behavior that is owned by the students, especially students who come from a broken home. Cooperation with the homeroom teacher mentors, teachers and other school personnel will also help identify students who have an aggressive behavior, especially students who come from a broken home to immediately provided services.

  3. Open-string models with broken supersymmetry

    International Nuclear Information System (INIS)

    Sagnotti, A.

    2002-01-01

    I review the salient features of three classes of open-string models with broken supersymmetry. These suffice to exhibit, in relatively simple settings, the two phenomena of 'brane supersymmetry' and 'brane supersymmetry breaking'. In the first class of models, to lowest order supersymmetry is broken both in the closed and in the open sectors. In the second class of models, to lowest order supersymmetry is broken in the closed sector, but is exact in the open sector, at least for the low-lying modes, and often for entire towers of string excitations. Finally, in the third class of models, to lowest order supersymmetry is exact in the closed (bulk) sector, but is broken in the open sector. Brane supersymmetry breaking provides a natural solution to some old difficulties met in the construction of open-string vacua. (author)

  4. Open-string models with broken supersymmetry

    International Nuclear Information System (INIS)

    Sagnotti, Augusto

    2000-01-01

    We review the salient features of three classes of open-string models with broken supersymmetry. These suffice to exhibit, in relatively simple settings, the two phenomena of 'brane supersymmetry' and 'brane supersymmetry breaking'. In the first class of models, to lowest order supersymmetry is broken both in the closed and in the open sectors. In the second class of models, to lowest order supersymmetry is broken in the closed sector, but is exact in the open sector, at least for the low-lying modes, and often for entire towers of string excitations. Finally, in the third class of models, to lowest order supersymmetry is exact in the closed (bulk) sector, but is broken in the open sector. Brane supersymmetry breaking provides a natural solution to some old difficulties met in the construction of open-string vacua

  5. Nobel Prize for work on broken symmetries

    CERN Multimedia

    2008-01-01

    The 2008 Nobel Prize for Physics goes to three physicists who have worked on broken symmetries in particle physics. The announcement of the 2008 Nobel Prize for physics was transmitted to the Globe of Science and Innovation via webcast on the occasion of the preview of the Nobel Accelerator exhibition.On 7 October it was announced that the Royal Swedish Academy of Sciences had awarded the 2008 Nobel Prize for physics to three particle physicists for their fundamental work on the mechanisms of broken symmetries. Half the prize was awarded to Yoichiro Nambu of Fermilab for "the discovery of the mechanism of spontaneous broken symmetry in subatomic physics". The other half is shared by Makato Kobayashi of Japan’s KEK Institute and Toshihide Maskawa of the Yukawa Institute at the University of Kyoto "for the discovery of the origin of the broken symmetry which predicts the existence of at least three families of quarks in Nature". At th...

  6. Subconjunctival Hemorrhage (Broken Blood Vessel in Eye)

    Science.gov (United States)

    Subconjunctival hemorrhage (broken blood vessel in eye) Overview A subconjunctival hemorrhage (sub-kun-JUNK-tih-vul HEM-uh-ruj) ... may not even realize you have a subconjunctival hemorrhage until you look in the mirror and notice ...

  7. Trusted Domain

    DEFF Research Database (Denmark)

    Hjorth, Theis Solberg; Torbensen, Rune

    2012-01-01

    remote access via IP-based devices such as smartphones. The Trusted Domain platform fits existing legacy technologies by managing their interoperability and access controls, and it seeks to avoid the security issues of relying on third-party servers outside the home. It is a distributed system...... of wireless standards, limited resources of embedded systems, etc. Taking these challenges into account, we present a Trusted Domain home automation platform, which dynamically and securely connects heterogeneous networks of Short-Range Wireless devices via simple non-expert user. interactions, and allows......In the digital age of home automation and with the proliferation of mobile Internet access, the intelligent home and its devices should be accessible at any time from anywhere. There are many challenges such as security, privacy, ease of configuration, incompatible legacy devices, a wealth...

  8. Symmetry restoration in spontaneously broken induced gravity

    International Nuclear Information System (INIS)

    Amati, D.; Russo, J.

    1990-01-01

    We investigate the recuperation of expected invariant behaviours in a non-metric gravity theory in which the full general relativistic invariance is broken spontaneously. We show how dangerous increasing energy behaviours of physical amplitudes cancel in a highly non-trivial way. This evidences the expected loss of the vacuum generated scale in the UV regime and gives support for the consistency of spontaneously broken gravity theories. (orig.)

  9. Bag model with broken chiral symmetry

    International Nuclear Information System (INIS)

    Efrosinin, V.P.; Zaikin, D.A.

    1986-01-01

    A variant of the bag model in which chiral symmetry is broken and which provides a description of all the experimental data on the light hadrons, including the pion, is discussed. The pion and kaon decay constants are calculated in this model. The problem of taking into account the center-of-mass motion in bag models and the boundary conditions in the bag model with broken chiral symmetry are also discussed

  10. Broken SU(4) symmetry and new resonance

    International Nuclear Information System (INIS)

    Ueda, Y.

    1975-11-01

    Weinberg's spectral function sum rules are modified to accommodate broken symmetry effects of SU(4). With a simple choice of the symmetry-breaking term, the spectral function sum rules yield the observed vector meson mass spectrum as well as sum rules for the e - e + decay rates of vector mesons. In particular, a new mass formula, which can be interpreted as the broken symmetry version of the Schwinger formula, is derived, the agreement with experiments is excellent. (Ueda, Y.)

  11. Trusted Objects

    International Nuclear Information System (INIS)

    CAMPBELL, PHILIP L.; PIERSON, LYNDON G.; WITZKE, EDWARD L.

    1999-01-01

    In the world of computers a trusted object is a collection of possibly-sensitive data and programs that can be allowed to reside and execute on a computer, even on an adversary's machine. Beyond the scope of one computer we believe that network-based agents in high-consequence and highly reliable applications will depend on this approach, and that the basis for such objects is what we call ''faithful execution.''

  12. Trust in health research relationships: accounts of human subjects.

    Science.gov (United States)

    McDonald, Michael; Townsend, Anne; Cox, Susan M; Paterson, Natasha Damiano; Lafrenière, Darquise

    2008-12-01

    TRUST IS FUNDAMENTAL in health research, yet there is little empirical evidence that explores the meaning of trust from the perspective of human subjects. The analysis presented here focuses on how human subjects talked about trust in the in-depth interviews. It emerged from the accounts that trust could not be assumed in the research setting, rather it was portrayed as a dynamic concept, built and easily broken, characterized by reciprocity and negotiation. Human subjects were ambivalent about who, when, what, and how much to trust in the research endeavor. This paper adds a fresh perspective to the literature on trust, and so offers a currently neglected, and little understood dimension to the discourse around health research ethics.

  13. Equilibrium Trust

    OpenAIRE

    Luca Anderlini; Daniele Terlizzese

    2009-01-01

    We build a simple model of trust as an equilibrium phenomenon, departing from standard "selfish" preferences in a minimal way. Agents who are on the receiving end of an other to transact can choose whether to cheat and take away the entire surplus, taking into account a "cost of cheating." The latter has an idiosyncratic component (an agent's type), and a socially determined one. The smaller the mass of agents who cheat, the larger the cost of cheating suffered by those who cheat. Depending o...

  14. Enacting Trust

    OpenAIRE

    Campbell, Brian

    2012-01-01

    Small and removed from the Spanish mainland, the Enclave of Ceuta has always depended\\ud on flows of goods and labour out of the Moroccan hinterland, with individuals from\\ud different ethnic and religious groups forming informal, flexible and personal economic\\ud bonds based on mutual ‘confianza’ (trust). Since its entry into the European Union in 1986,\\ud the Spanish government has erected a border-wall around the enclave, and introduced new\\ud migration policies branding many informal work...

  15. Trusting the state, trusting each other?

    DEFF Research Database (Denmark)

    Sønderskov, Kim Mannemar; Dinesen, Peter Thisted

    2016-01-01

    Trust in state institutions is a prominent explanation of social trust. However, previous—mainly cross-sectional—analyses provide limited causal evidence regarding the relationship between institutional trust and social trust and it is thus essentially unknown whether an observed relationship...... reflects reverse causality (social trust forming institutional trust), or both forms of trust reflecting deep-seated dispositions (common confounding). Against the backdrop of the shortcomings of previous cross-sectional analyses, this paper utilizes two Danish panel surveys containing measures of both...... types of trust for the same individuals surveyed at multiple points in time over a long time-span (up to 18 years) to address the potentially reverse and/or spurious relationship. Using individual fixed effects and cross-lagged panel models, the results provide strong evidence of trust in state...

  16. Learning to Trust

    NARCIS (Netherlands)

    Nooteboom, B.

    2005-01-01

    Trust is full of puzzle and paradox.Trust is both rational and emotional. Trust can go beyond calculative self-interest, but has its limits.People may want to trust, while they may also feel threatened by it.If trust is not in place prior to a relationship, on the basis of institutions, prior

  17. Trust makers, breakers and brokers: building trust in the Australian food system.

    Science.gov (United States)

    Wilson, Annabelle; Coveney, John; Henderson, Julie; Meyer, Samantha; Calnan, Michael; Caraher, Martin; Webb, Trevor; Elliott, Anthony; Ward, Paul

    2013-03-15

    The importance of consumer trust in the food supply has previously been identified, and dimensions of consumer trust in food-who they trust and the type of trust that they exhibit-has been explored. However, there is a lack of research about the mechanisms through which consumer trust in the food supply is developed, maintained, broken and repaired. This study seeks to address this gap by exploring if, and how, consumer trust in the food supply is considered by the media, food industry and governments when responding to food scares. The aim of the research is to develop models of trust building that can be implemented following food scares. Semi-structured interviews will be undertaken with media, public relations officials and policy makers in Australia, New Zealand and the United Kingdom. Participants will be recruited through purposive sampling and will be asked to discuss a hypothetical case study outlining a food incident, and any experiences of specific food scares. Models of trust development, maintenance and repair will be developed from interview data. Comment on these models will be sought from experts in food-related organizations through a Delphi study, where participants will be asked to consider the usefulness of the models. Participants' comments will be used to revise the models until consensus is reached on the suitability and usability of the models. This study will contribute to the literature about systems-based trust, and explore trust as a social and regulatory process. The protocol and results will be of interest and use to the food industry, food regulators, consumer advocate groups, media seeking to report food-related issues and policy makers concerned with public health and consumer health and well-being. This research represents an important contribution to the translation of the theoretical conceptualizations of trust into practical use in the context of food.

  18. Trust us Trust Thorp Campaign

    International Nuclear Information System (INIS)

    Kane, John

    1995-01-01

    The history of the nuclear industry in the UK has been dominated by Sellafield reprocessing site in west Cumbria. The site, formerly owned by the United Kingdom Atomic Energy Authority was transferred to the newly-formed British Nuclear Fuels plc in 1971. Although trade union representation existed at Sellafield before the emergence of BNFL, it is only after this date that collective trade union activity began to emerge. In 1977, after a long running dispute with management about the issue of radiation dose uptake, the workforce went on strike, forcing the management to question their previous 'need to know' attitude and to improve industrial relations. In 1984, it was recognised that the lobbying influence of trade unions within politics, and especially the Labour party could be used to greater effect to challenge potentially -damaging influence of anti-nuclear campaigners. The National Campaign for the Nuclear Industry (NCNI) was born, combining nine industrial and non-industrial trade unions within the nuclear industry. Its task during the last ten years has been to put forward the interests of its members collectively and to secure the, role of nuclear power. within a balanced energy policy in the political arena. In dome so, it has gained a credible voice within both the trade union movement and the Labour party. The new Thermal Oxide Reprocessing Plant (THORP) received strong support from the NCNI during its construction and commissioning phases. When it became clear that the anti-nuclear lobby had gained the upper hand and were beginning to seriously delay the necessary legal instruments required to start the plant, the power of collective action was once again recognised, and the TRUST US campaign was born. The campaign was run and organised by a clerks committee and fronted by the Trade Unions at Sellafield., and turned out to be one of the most successful] trade union campaigns in recent history. The first task involved getting, the entire workforce on

  19. Spontaneously broken abelian gauge invariant supersymmetric model

    International Nuclear Information System (INIS)

    Mainland, G.B.; Tanaka, K.

    A model is presented that is invariant under an Abelian gauge transformation and a modified supersymmetry transformation. This model is broken spontaneously, and the interplay between symmetry breaking, Goldstone particles, and mass breaking is studied. In the present model, spontaneously breaking the Abelian symmetry of the vacuum restores the invariance of the vacuum under a modified supersymmetry transformation. (U.S.)

  20. Multiquark baryons with broken flavour symmetry 1

    International Nuclear Information System (INIS)

    Wroldsen, J.

    The calculation of the spectrum of 4qq multiquark baryons is carried out, taking into account that SU(3) flavour is broken. To handle this problem, which includes manipulation of giant expressions for the wavefunctions, methods suitable for programming in SCHOONSCHIP are developed and employed. (Auth)

  1. Spontaneously broken version of N=4 supersymmetry

    International Nuclear Information System (INIS)

    Terent'ev, M.V.

    1989-01-01

    The special scenario of reduction from the space of D=10 dimensions is used to construct the theory with describes interaction of supergravity with only one multiplet of matter in the framework of spontaneously broken N=4 supersymmetry. 6 refs.; 1 fig

  2. Broken Scale Invariance and Anomalous Dimensions

    Science.gov (United States)

    Wilson, K. G.

    1970-05-01

    Mack and Kastrup have proposed that broken scale invariance is a symmetry of strong interactions. There is evidence from the Thirring model and perturbation theory that the dimensions of fields defined by scale transformations will be changed by the interaction from their canonical values. We review these ideas and their consequences for strong interactions.

  3. Of Slot Machines and Broken Test Tubes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 19; Issue 5. Of Slot Machines and Broken Test Tubes. S Mahadevan. General Article Volume 19 Issue 5 May 2014 pp 395-405. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/019/05/0395-0405. Keywords.

  4. Holography with broken Poincaré symmetry

    NARCIS (Netherlands)

    Korovins, J.

    2014-01-01

    This thesis deals with the extensions of the holographic dualities to the situations where part of the Poincaré group has been broken. Such theories are particularly relevant for applications of gauge/gravity dualities to condensed matter systems, which usually exhibit non-relativistic symmetry.

  5. Trust in Scientific Publishing

    NARCIS (Netherlands)

    Hummels, Harry; Roosendaal, Hans E.

    2001-01-01

    Trust is an important phenomenon to reduce organisational complexity and uncertainty. In the literature many types of trust are distinguished. An important framework to understand the variety and development of trust in organisations is provided by Zucker. She distinguishes three types of trust:

  6. Trust and Leadership

    DEFF Research Database (Denmark)

    Bordum, Anders

    2005-01-01

    The concept and phenomenon of trust and its relation to leadership has recently come into focus. What role does trust play? Can trust be created strategically? Questions like these are often raised. How we conceive of and conceptualize trust is not as often discussed. Among those conceptualizations...... flexibility of form for example, the idea that one with leadership tools can consciously bring forth trust. In the conclusion, the question about trust communication is addressed. In this section I argue that trust is positively value-laden, becausesincerity is a functional and pragmatic condition...

  7. Balancing Trust and Control

    DEFF Research Database (Denmark)

    Jagd, Søren

    This paper focuses on the leadership challenge of balancing trust and control. The relation between trust and control has for a long time been a puzzling issue for management researchers. In the paper I first show that there has been a dramatic change in the way the relation between trust...... and control has been conceptualized in trust research. While the relation between trust and control earlier was conceptualized as a more or less stable balance between trust and control, more recent research conceptualizes the relation between trust and control more as a dynamical process that involves...... an ongoing process of balancing the relation between trust and control. Second, taking the departure in the recent conceptualization of the balance between trust and control as an interactive process I discuss the challenges for management in handling this more subtle balancing of trust and control...

  8. Trust in vehicle technology

    OpenAIRE

    Walker, Guy, H.; Stanton, Neville, A.; Salmon, Paul

    2016-01-01

    Driver trust has potentially important implications for how vehicle technology is used and interacted with. In this paper it will be seen how driver trust functions and how it can be understood and manipulated by insightful vehicle design. It will review the theoretical literature to define steps that can be taken establish trust in vehicle technology in the first place, maintain trust in the long term, and even re-establish trust that has been lost along the way. The implication throughout i...

  9. Building trust

    International Nuclear Information System (INIS)

    Lewis, Meriel

    1995-01-01

    'Activate' is the energy magazine for secondary schools and is part of the Education Programme which is managed on behalf of the British Nuclear Industry Forum by AEA Technology. activate is the flagship communication device between the British Nuclear Industry Forum's Education Programme and secondary schools in the UK. It was developed from a previous publication, Nuclear Bulletin. There is a need for the nuclear industry to build trust with teachers and students in the UK, where for a long time, everything that the industry has said, written or printed has been disregarded by school teachers as propaganda. Over the last few years the industry has put in a great deal of effort to position itself as a provider of educationally sound and socially acceptable information. 'Activate' was an evolution of this idea and there was a hole in the market for a lively, activity and article based magazine that could be used in the classroom. The target audience is principally teachers of science, mathematics and geography, but also includes teachers of art,, English and history with students of between 11 and 18. The results were very positive in that teachers appreciated the colourful and lively nature of activate and they felt that it provided information and opinions in an un biased and non-propagandist way. Their comments about layout, number of activities style of presentation were taken into account and during the summer of 1994 activate was remodelled ready for re launch in September. The feedback so far is good with more teachers signing up every week to receive their own free copy

  10. Ratchet device with broken friction symmetry

    DEFF Research Database (Denmark)

    Norden, Bengt; Zolotaryuk, Yaroslav; Christiansen, Peter Leth

    2002-01-01

    An experimental setup (gadget) has been made for demonstration of a ratchet mechanism induced by broken symmetry of a dependence of dry friction on external forcing. This gadget converts longitudinal oscillating or fluctuating motion into a unidirectional rotation, the direction of which is in ac......An experimental setup (gadget) has been made for demonstration of a ratchet mechanism induced by broken symmetry of a dependence of dry friction on external forcing. This gadget converts longitudinal oscillating or fluctuating motion into a unidirectional rotation, the direction of which...... is in accordance with given theoretical arguments. Despite the setup being three dimensional, the ratchet rotary motion is proved to be described by one simple dynamic equation. This kind of motion is a result of the interplay of friction and inertia....

  11. Random-phase approximation and broken symmetry

    International Nuclear Information System (INIS)

    Davis, E.D.; Heiss, W.D.

    1986-01-01

    The validity of the random-phase approximation (RPA) in broken-symmetry bases is tested in an appropriate many-body system for which exact solutions are available. Initially the regions of stability of the self-consistent quasiparticle bases in this system are established and depicted in a 'phase' diagram. It is found that only stable bases can be used in an RPA calculation. This is particularly true for those RPA modes which are not associated with the onset of instability of the basis; it is seen that these modes do not describe any excited state when the basis is unstable, although from a formal point of view they remain acceptable. The RPA does well in a stable broken-symmetry basis provided one is not too close to a point where a phase transition occurs. This is true for both energies and matrix elements. (author)

  12. Simple Technique for Removing Broken Pedicular Screws

    Directory of Open Access Journals (Sweden)

    A Agrawal

    2014-03-01

    Full Text Available The procedure for removing a broken pedicle screw should ideally be technically easy and minimally invasive, as any damage to the pedicle, during removal of the broken screw, may weaken the pedicle, thus compromising on the success of re-instrumentation. We describe the case of a 32-year old man who had undergone surgery for traumatic third lumbar vertebral body fracture three years prior to current admission and had developed the complication of pedicle screw breakage within the vertebral body. The patient underwent re-exploration and removal of the distal screws. Through a paravertebral incision and muscle separation, the screws and rods were exposed and the implants were removed.

  13. N=1 superstrings with spontaneously broken symmetries

    International Nuclear Information System (INIS)

    Ferrara, S.

    1988-01-01

    We construct N=1 chiral superstrings with spontaneously broken gauge symmetry in four space-time dimensions. These new string solutions are obtained by a generalized coordinate-dependent Z 2 orbifold compactification of some non-chiral five-dimensional N=1 and N=2 superstrings. The scale of symmetry breaking is arbitrary (at least classically) and it can be chosen hierarchically smaller than the string scale (α') -1/2 . (orig.)

  14. Spontaneously broken global symmetries and cosmology

    International Nuclear Information System (INIS)

    Shafi, Q.; Vilenkin, A.

    1984-01-01

    Phase transitions associated with spontaneously broken global symmetries, in case these occur in nature, can have important cosmological implications. This is illustrated through two examples. The first one shows how the spontaneous breaking of a global U(1) symmetry, present, for instance, in the minimal SU(5) model, can lead to an inflationary phase. The second example illustrates how topologically stable strings associated with the breaking of U(1) symmetry make an appearance at (or near) the end of the inflationary era

  15. Broken colour symmetry and liberated quarks

    International Nuclear Information System (INIS)

    Ma, E.

    1976-01-01

    A quark model of hadrons is presented and discussed, in which local SU(3) gauge symmetry is completely broken and yet asymptotic freedom is preserved. There is no infrared slavery in this model, and isolated quarks are free to exist. Colour becomes a global symmetry which is only approximate under SU(3) but nearly exact under SU(2) x U(1), as far as the usual hadron spectroscopy is concerned. (Auth.)

  16. Spontaneously broken realization of supersymmetry in supergravity

    International Nuclear Information System (INIS)

    Ferrara, S.; Trieste Univ.

    1979-01-01

    It is shown that if supersymmetry is relevant for the physical world it must be broken either spontaneously or explicitly. Renormalizability and simplicity are in favor of a spontaneous realization of the symmetry breaking. When supersymmetry is spontaneously broken the spinorial analogue of the Goldstone phenomenon occurs, namely massless particles arise in the spectrum of the theory which carry the same quantum numbers of the broken generators Qsup(i) they are N spin 1/2 Goldstone fermions (goldstinos). These particles may be eaten by spin 3/2 gauge particles (gravitinos) when supersymmetry is gauged. It is shown that both the Higgs effect and super Higgs effect have taken place. 8 of the spin 1/2 particles have been eaten by the spin 3/2 particles and 24 of 70 scalars have been eaten by the spin 3/2 particles and 24 of 70 scalars have been eaten by 24 of the 28 vector particles to provide them with mass. The conclusion is that the number of mass relations is, in general, equal to r-1, where r is the rank of the algebra which generates the spectrum

  17. Calculativeness and trust

    DEFF Research Database (Denmark)

    Frederiksen, Morten

    2014-01-01

    Williamson’s characterisation of calculativeness as inimical to trust contradicts most sociological trust research. However, a similar argument is found within trust phenomenology. This paper re-investigates Williamson’s argument from the perspective of Løgstrup’s phenomenological theory of trust....... Contrary to Williamson, however, Løgstrup’s contention is that trust, not calculativeness, is the default attitude and only when suspicion is awoken does trust falter. The paper argues that while Williamson’s distinction between calculativeness and trust is supported by phenomenology, the analysis needs...... to take actual subjective experience into consideration. It points out that, first, Løgstrup places trust alongside calculativeness as a different mode of engaging in social interaction, rather conceiving of trust as a state or the outcome of a decision-making process. Secondly, the analysis must take...

  18. Dimensions of trust

    DEFF Research Database (Denmark)

    Frederiksen, Morten

    2012-01-01

    Georg Simmel is the seminal author on trust within sociology, but though inspired by Simmel, subsequent studies of intersubjective trust have failed to address Simmel’s suggestion that trust is as differentiated as the social relations of which it is part. Rather, trust has been studied within...... limited sets of exchange or work relations. This article revisits Simmel’s concept of trust as social form in order to investigate this differentiation. From an interview study, the differentiation and limits of trust are analysed within different types of social relations. Trust is found to vary greatly...... in scope and mode influenced by the intersecting dimensions of relations, objects and situations. Furthermore, trust exists between an outer threshold of expected deceit and an inner threshold of confident reliance. The findings from the qualitative study contribute new knowledge on the diversity of trust...

  19. Broken Homes: Stable Risk, Changing Reasons, Changing Forms.

    Science.gov (United States)

    Sweetser, Dorrian Apple

    1985-01-01

    Cohort membership and two measures of social disadvantage were used as explanatory variables in analysis of the risk of growing up in a broken home and of the living arrangements of children with broken homes. The risk of a broken home by age 16 proved to be stable across cohorts and greater for those from disadvantaged homes. (Author/BL)

  20. Quantum restoration of broken symmetry in onedimensional loop ...

    Indian Academy of Sciences (India)

    Home; Journals; Pramana – Journal of Physics; Volume 82; Issue 6. Quantum restoration of broken symmetry in ... Keywords. Non-local transformation; broken symmetry; sine-Gordon; sech interaction. ... A specific type of classically broken symmetry is restored in quantum theory. One-dimensional sine-Gordon system and ...

  1. Strength Assessment of Broken Rock Postgrouting Reinforcement Based on Initial Broken Rock Quality and Grouting Quality

    Directory of Open Access Journals (Sweden)

    Hongfa Xu

    2017-01-01

    Full Text Available To estimate postgrouting rock mass strength growth is important for engineering design. In this paper, using self-developed indoor pressure-grouting devices, 19 groups of test cubic blocks were made of the different water cement ratio grouting into the broken rock of three kinds of particle sizes. The shear strength parameters of each group under different conditions were tested. Then this paper presents a quantitative calculation method for predicting the strength growth of grouted broken rock. Relational equations were developed to investigate the relationship between the growth rates of uniaxial compressive strength (UCS, absolute value of uniaxial tensile strength (AUTS, internal friction angle, and cohesion for post- to pregrouting broken rock based on Mohr-Coulomb strength criterion. From previous test data, the empirical equation between the growth rate of UCS and the ratio of the initial rock mass UCS to the grout concretion UCS has been determined. The equations of the growth rates of the internal friction coefficient and UCS for grouting broken rock with rock mass rating (RMR and its increment have been established. The calculated results are consistent with the experimental results. These observations are important for engineered design of grouting reinforcement for broken rock mass.

  2. Overview of royalty trusts

    International Nuclear Information System (INIS)

    Panarites, P.

    1996-01-01

    The nature of royalty trusts as a means of financing exploration, development, production, and refining of oil sand and heavy oil to produce competitively marketable petroleum products, was reviewed. Attributes of the two distinct classes of royalty trusts - reflexive class and the fundamental class royalty trusts - and the considerations underlying each one, were summarized. The overall conclusion was that the future performance of conventional oil and gas royalty trusts (reflexive class) will depend heavily on interest rate levels and management's ability to complete acquisitions financed with new trust unit issues. Fundamental class royalty trusts also offer long term pure exposure to the underlying business, in addition to yield

  3. Looking for Trust

    DEFF Research Database (Denmark)

    Bøge, Ask Risom; Lauritsen, Peter

    Trust and surveillance are often seen as opposites. Trust is regularly characterized as the glue that holds society together, while surveillance is seen as corrosive. However, in Scandinavia high levels of trust and surveillance coexist. It is therefore interesting to investigate...... if there is a connection between these phenomena and ask what is the role of trust in the spread of surveillance in Scandinavia? The aim of this paper is: 1) to investigate the role of trust in the history of the Danish DNA database and 2) to experiment with Actor-Network-Theory (ANT) as an ap-proach in studies of trust....

  4. Trust arguments

    International Nuclear Information System (INIS)

    Gelman, S.M.

    1995-01-01

    cycle has a complex of general machine building technologies which permit, if necessary, to organize in a very short period, production of non-traditional articles and avoid limitation of working places. This is well proved by the experience of 'Elemash', where in connection with the decrease of demand for nuclear fuel after the accident in Chernobyl, different products are now produced, equipment for dairy industry, tubular, heating elements, hard-alloy tooling for metal cutting and mining industries, a variety of domestic appliances. This peculiar 'conversion' permitted not only preserve the staff but provide employment of youth. We concentrate our attention on one more social side of activity of our enterprise, more of a few in the town having stable interior and exterior market for its products; this is very important in the period of newly-born market economy in Russia. Annual turnover of 'Elemash', only for export of nuclear fuel, is more tan 200 million dollars. It is natural that the majority of this sum comes as taxes to the municipal budget, where it is used for developing social infrastructure of the town (culture, port, health protection education, i.e. for the welfare of the population). Evaluating te general reaction of the population and public, which was discovered as a result of communicating in the Centre with thousands of inhabitants of the town we can state that it is quite favourable and our task is to strengthen the trust to the enterprise in the future. (author)

  5. Effective theories with broken flavour symmetry

    International Nuclear Information System (INIS)

    Miller, R.D.C.; McKellar, B.H.J.

    1981-07-01

    The work of Ovrut and Schnitzer on effective theories derived from a non Abelian Gauge Theory is generalised to include the physically interesting case of broken flavour symmetry. The calculations are performed at the 1-loop level. It is shown that at an intermediate stage in the calculations two distinct renormalised gauge coupling constants appear, one describing gauge field coupling to heavy particles and the other describing coupling to light particles. Appropriately modified Slavnov-Taylor identities are shown to hold. A simple alternative to the Ovrut-Schnitzer rules for calculating with effective theories is also considered

  6. Neutrino masses and spontaneously broken flavor symmetries

    International Nuclear Information System (INIS)

    Staudt, Christian

    2014-01-01

    We study the phenomenology of supersymmetric flavor models. We show how the predictions of models based on spontaneously broken non-Abelian discrete flavor symmetries are altered when we include so-called Kaehler corrections. Furthermore, we discuss anomaly-free discrete R symmetries which are compatible with SU(5) unification. We find a set of symmetries compatible with suppressed Dirac neutrino masses and a unique symmetry consistent with the Weinberg operator. We also study a pseudo-anomalous U(1) R symmetry which explains the fermion mass hierarchies and, when amended with additional singlet fields, ameliorates the fine-tuning problem.

  7. Investigation of spontaneously broken gauge theories

    International Nuclear Information System (INIS)

    Nagy, T.

    1978-01-01

    Spontaneously broken gauge theories (SBGT) with effects treated perturbatively are investigated. The general structure of SBGT is exhibited and gauge invariant renormalization program for practical calculations is set up. The proof of renormalizability of Lee and Zinn-Justin are extended to the problems of SBGT. A general semisimple compact gauge group is used. Arbitrary fermion and scalar multiplets are considered. The structure of the Lagrangian is discussed. The problem of quantization is described and the definition of the generating functionals of the Green functions and the Green functions themselves is given

  8. Structure of pheomenological lagrangians for broken supersymmetry

    International Nuclear Information System (INIS)

    Uematsu, T.; Zachos, C.K.

    1982-01-01

    We consider the explicit connection between linear representations of supersymetry and the non-linear realizations associated with the generic effective lagrangians of the Volkov-Akulov type. We specify and illustrate a systematic approach for deriving the appropriate phenomenological lagrangian by transforming a pedagogical linear model, in which supersymmetry is broken at the tree level, into its corresponding non-linear lagrangian, in close analogy to the linear sigma model of pion dynamics. We discuss the significance and some properties of such phenomenological lagrangians. (orig.)

  9. Balancing Trust and Control

    DEFF Research Database (Denmark)

    Jagd, Søren

    2010-01-01

    of balancing trust and control becomes an issue that deserve ongoing attention. This paper adds to the discussion on the relation between trust and control by showing that the process perspective reframes the problem of balancing trust and control. More generally, by demonstrating the importance of the process......The purpose of this paper is to show that conceptualizing trust and control as interactively related processes, as opposed to more static conceptualizations of the two concepts and the relations between them, adds importantly towards understanding the challenges involved in balancing of trust...... on trust and control made the problem of finding a balance between trust and control a once and for all decision the process perspective introduced here implies that balancing trust and control is an ongoing process of balancing and rebalancing. The implication for management is that the problem...

  10. Reliable Design Versus Trust

    Science.gov (United States)

    Berg, Melanie; LaBel, Kenneth A.

    2016-01-01

    This presentation focuses on reliability and trust for the users portion of the FPGA design flow. It is assumed that the manufacturer prior to hand-off to the user tests FPGA internal components. The objective is to present the challenges of creating reliable and trusted designs. The following will be addressed: What makes a design vulnerable to functional flaws (reliability) or attackers (trust)? What are the challenges for verifying a reliable design versus a trusted design?

  11. Fording Canadian Coal Trust

    Energy Technology Data Exchange (ETDEWEB)

    Popowich, J.; Millos, R. [Elk Valley Coal Corporation, Calgary, AB (Canada)

    2004-07-01

    This is the first of five slide/overhead presentations presented at the Fording Canadian Coal Trust and Tech Cominco Ltd. investor day and mine tour. The Fording Canadian Coal Trust is described. The Trust's assets comprise six Elk Valley metallurgical coal mines and six wollastonite operations (in the NYCO Group). Trust structure, corporate responsibility, organizational structure, reserves and resources, management philosophy, operating strategies, steel market dynamics, coal market, production expansion, sales and distribution are outlined. 15 figs., 5 tabs.

  12. Trust and controlling

    OpenAIRE

    Bieńkowska Agnieszka; Zabłocka-Kluczka Anna

    2016-01-01

    The purpose of this study is to discuss the trust within and towards an organisation in the context of implementation of controlling therein. In this context the essence of trust and its importance in organisation management was presented, as well as trust in the contemporary management methods and concepts. Controlling as a trust-building factor inside an organisation was pointed out. Especially controlling and control were described. Moreover management by considering deviations in controll...

  13. Recovering from trust breakdowns in large system implementations

    DEFF Research Database (Denmark)

    Rerup Schlichter, Bjarne Rerup; Andersen, Povl Erik Rostgård

    2011-01-01

    On the basis of experiences from the Faroese large-scale implementation of integrated healthcare information systems and insights into dynamic aspects of trust, we offer the following lessons learned for the successful management and recovery of trust (breakdowns) in large system implementations......: restore relations by turning towards face-to-face events and procedures, assure a well-functioning and available support organization, demonstrate trust in actors to enhance their own self-confidence and celebrate successes, even the smallest or ones injected by yourself. The propositions are based on a 6...

  14. Trust Drives Internet Use

    DEFF Research Database (Denmark)

    Ljunge, Jan Martin

    This paper estimates the effect of trust on internet use by studying the general population as well as second generation immigrants in 29 European countries with ancestry in 87 nations. There is a significant positive effect of trust on internet use. The positive trust effect is not universal...

  15. The productivity of trust

    DEFF Research Database (Denmark)

    Bjørnskov, Christian; Méon, Pierre-Guillaume

    This paper returns to one of the early questions of the literature on social trust, whether trust affects total factor productivity (TFP). Using both development and growth accounting, we find strong evidence of a causal effect of trust on the level and growth of TFP. Using a three-stage least...

  16. Trust Management V

    DEFF Research Database (Denmark)

    2011-01-01

    from 42 submissions. The papers feature both theoretical research and real-world case studies from academia, business and government focusing on areas such as: trust models, social and behavioral aspects of trust, trust in networks, mobile systems and cloud computation, privacy, reputation systems...

  17. Absorption of solar radiation in broken clouds

    Energy Technology Data Exchange (ETDEWEB)

    Zuev, V.E.; Titov, G.A.; Zhuravleva, T.B. [Institute of Atmospheric Optics, Tomsk (Russian Federation)

    1996-04-01

    It is recognized now that the plane-parallel model unsatisfactorily describes the transfer of radiation through broken clouds and that, consequently, the radiation codes of general circulation models (GCMs) must be refined. However, before any refinement in a GCM code is made, it is necessary to investigate the dependence of radiative characteristics on the effects caused by the random geometry of cloud fields. Such studies for mean fluxes of downwelling and upwelling solar radiation in the visible and near-infrared (IR) spectral range were performed by Zuev et al. In this work, we investigate the mean spectral and integrated absorption of solar radiation by broken clouds (in what follows, the term {open_quotes}mean{close_quotes} will be implied but not used, for convenience). To evaluate the potential effect of stochastic geometry, we will compare the absorption by cumulus (0.5 {le} {gamma} {le} 2) to that by equivalent stratus ({gamma} <<1) clouds; here {gamma} = H/D, H is the cloud layer thickness and D the characteristic horizontal cloud size. The equivalent stratus clouds differ from cumulus only in the aspect ratio {gamma}, all the other parameters coinciding.

  18. [Crises of trust].

    Science.gov (United States)

    Chen, Thai-Form; Tseng, Hsing-Chau

    2006-02-01

    Extensive media coverage is warning of a crisis of trust that has emerged as a serious issue in our society. This article explores the meaning of "crisis," concepts of crisis management, mechanisms for building trust, and the underlying significance of trust and distrust. Evidence is adduced to testify to the erosion of trust and factors in our society that reflect the potential for crises of trust. Organizational decision makers, including hospital managers, are urged to identify and reflect upon weaknesses in their organizations in order that remedial action can be taken to preempt such crises.

  19. Social Trust and Fractionalization:

    DEFF Research Database (Denmark)

    Bjørnskov, Christian

    2008-01-01

    This paper takes a closer look at the importance of fractionalization for the creation of social trust. It first argues that the determinants of trust can be divided into two categories: those affecting individuals' trust radii and those affecting social polarization. A series of estimates using...... a much larger country sample than in previous literature confirms that fractionalization in the form of income inequality and political diversity adversely affects social trust while ethnic diversity does not. However, these effects differ systematically across countries, questioning standard...... interpretations of the influence of fractionalization on trust....

  20. Ratchet due to broken friction symmetry

    DEFF Research Database (Denmark)

    Norden, Bengt; Zolotaryuk, Yaroslav; Christiansen, Peter Leth

    2002-01-01

    A ratchet mechanism that occurs due to asymmetric dependence of the friction of a moving system on its velocity or a driving force is reported. For this kind of ratchet, instead of a particle moving in a periodic potential, the dynamics of which have broken space-time symmetry, the system must...... be provided with sonic internal structure realizing such a velocity- or force-friction dependence. For demonstration of a ratchet mechanism of this type, an experimental setup (gadget) that converts longitudinal oscillating or fluctuating motion into a unidirectional rotation has been built and experiments...... with it have been carried out. In this device, an asymmetry of friction dependence on an applied force appears, resulting in rectification of rotary motion, In experiments, our setup is observed to rotate only in one direction, which is in accordance with given theoretical arguments, Despite the setup being...

  1. Effective action of softly broken supersymmetric theories

    International Nuclear Information System (INIS)

    Groot Nibbelink, S.; Nyawelo, T.S

    2006-12-01

    We study the renormalization of (softly) broken supersymmetric theories at the one loop level in detail. We perform this analysis in a superspace approach in which the supersymmetry breaking interactions are parameterized using spurion insertions. We comment on the uniqueness of this parameterization. We compute the one loop renormalization of such theories by calculating superspace vacuum graphs with multiple spurion insertions. To preform this computation efficiently we develop algebraic properties of spurion operators, that naturally arise because the spurions are often surrounded by superspace projection operators. Our results are general apart from the restrictions that higher super covariant derivative terms and some finite effects due to non-commutativity of superfield dependent mass matrices are ignored. One of the soft potentials induces renormalization of the Kaehler potential. (author)

  2. Spontaneously broken extended supersymmetry: Full superfield formulation

    International Nuclear Information System (INIS)

    Kandelakis, E.S.

    1984-01-01

    The superfield description, given by Samuel and Wess, of the non-linear Akulov-Volkov realization of (broken) supersymmetry, is generalized for the interesting cases of N=2 and 4 extended supersymmetry. The generalization, in terms of the full-superfield formulation, is straightforward. For the proof we first define the corresponding THETA-algebras; we then present explicitly many of the calculations. The schematic explanation makes the generalization manifest. We perform, for N=2, the coupling of the A-V field to standard-matter, in the way introduced by S-W, and schematically we make manifest the generalization for every N. The importance of our results consists in a complete, calculable description of the A-V fields (goldstinos) and of their interactions, easily applied to the tasks of today's phenomenology. (orig.) [de

  3. Broken superfluid in dense quark matter

    Energy Technology Data Exchange (ETDEWEB)

    Parganlija, Denis; Schmitt, Andreas [Institut fuer Theoretische Physik, Technische Universitaet Wien, 1040 Vienna (Austria); Alford, Mark [Department of Physics, Washington University St Louis, MO, 63130 (United States)

    2014-07-01

    Quark matter at high densities is a superfluid. Properties of the superfluid become highly non-trivial if the effects of strange-quark mass and the weak interactions are considered. These properties are relevant for a microscopic description of compact stars. We discuss the effect of a (small) explicitly symmetry-breaking term on the properties of a zero-temperature superfluid in a relativistic φ{sup 4} theory. If the U(1) symmetry is exact, chemical potential and superflow can be equivalently introduced either via (1) a background gauge field or (2) a topologically nontrivial mode. However, in the case of the explicitly broken symmetry, we demonstrate that the scenarios (1) and (2) lead to quantitatively different results for the mass of the pseudo-Goldstone mode and the critical velocity for superfluidity.

  4. Modified broken rice starch as fat substitute in sausages

    Directory of Open Access Journals (Sweden)

    Valéria Maria Limberger

    2011-09-01

    Full Text Available The demand for low-fat beef products has led the food industry to use fat substitutes such as modified starch. About 14% of broken rice is generated during processing. Nevertheless, this by-product contains high levels of starch; being therefore, great raw material for fat substitution. This study evaluated the applicability of chemically and physically modified broken rice starch as fat substitute in sausages. Extruded and phosphorylated broken rice was used in low-fat sausage formulation. All low-fat sausages presented about 55% reduction in the fat content and around 28% reduction in the total caloric value. Fat replacement with phosphorylated and extruded broken rice starch increased the texture acceptability of low-fat sausages, when compared to low-fat sausages with no modified broken rice. Results suggest that modified broken rice can be used as fat substitute in sausage formulations, yielding lower caloric value products with acceptable sensory characteristics.

  5. Logotherapy Counseling to Improve Acceptance of Broken Home Child

    OpenAIRE

    Erlangga, Erwin

    2017-01-01

    This study aims to increase the enrollment of children of a broken home that life has meaning. Subjects are 100 children in Demak whose families experiencing divorce. Research themes include three things: individual counseling, engineering logotherapy, reception, and a child of a broken home. Data obtained based on interviews, observation, and psychological scale showed that of the 100 children of a broken home has a low acceptance that individual counseling with logotherapy techniques were c...

  6. Logotherapy Counseling to Improve Acceptance of Broken Home Child

    Directory of Open Access Journals (Sweden)

    Erwin Erlangga

    2017-08-01

    Full Text Available This study aims to increase the enrollment of children of a broken home that life has meaning. Subjects are 100 children in Demak whose families experiencing divorce. Research themes include three things: individual counseling, engineering logotherapy, reception, and a child of a broken home. Data obtained based on interviews, observation, and psychological scale showed that of the 100 children of a broken home has a low acceptance that individual counseling with logotherapy techniques were considered appropriate to increase the enrollment of children of a broken home. Factors - factors that affect the acceptance of a child of a broken home is self-blame, anger and did not have a purpose in life again. In addition the environment is also a significant effect on the enrollment of children of a broken home. Environmental labeling of families experiencing divorce as a family that failed so that children are increasingly stressed with the stamp of the community. Based on the field test results, the level of acceptance of the child of a broken home increases after the individual is given counseling services with logotherapy techniques. Indicated by changes in the level of acceptance of children of a broken home before being given treatment (initial evaluation and after (final evaluation of 130 points. The results of effectiveness test statistic t test calculations also showed 0,010 <0.05.It was concluded that counseling individuals with logotherapy effective technique to increase the enrollment of children of a broken home

  7. Model for predicting the frequency of broken rails

    Directory of Open Access Journals (Sweden)

    S. Vesković

    2012-04-01

    Full Text Available Broken rails can cause train delays, trains cancelations and, unfortunately, they are common causes of accidents. This affects planning of a resources, budget and organization of railway track maintenance. Planning of railway track maintenance cannot be done without an estimation of number of rails that will be replaced due to the broken rail incidents. There are many factors that influence broken rails and the most common are: rail age, annual gross tonnage, degree of curve and temperature in the time of breakage. The fuzzy logic model uses acquired data as input variables to predict the frequency of broken rails for the certain rail types on some Sections.

  8. Terrorism, Trust and Tourism

    DEFF Research Database (Denmark)

    Jensen, Susanne; Svendsen, Gert Tinggaard

    2017-01-01

    How does terrorism affect social trust and tourism? The rising number of terrorist attacks in Western Europe has caused safety problems not only for local citizens but also for tourists. In fact, terrorists challenge the formal violence monopoly of the state thus creating a sense of anarchy...... and distrust. Social trust is about trusting strangers, so when less predictable behaviour occurs in, a given country, people become more careful as they tend to trust most other people less. An interesting case for future research is Scandinavia as the level of terrorism is still low and, at the same time......, Scandinavia can record most social trust in the world meaning a competitive advantage when attracting tourists. Arguably, a double dividend is created from fighting terrorism, namely more social trust accumulated and more tourists attracted. Future research should therefore try to further test our model...

  9. Trust in Strategic Alliances

    DEFF Research Database (Denmark)

    Nielsen, Bo

    2011-01-01

    This article examines the dynamic and multi-dimensional nature of trust in strategic alliances. Adopting a co-evolutionary approach, I developed a framework to show how trust, conceptualised in different forms, plays distinct roles at various evolutionary stages of the alliance relationship....... Emphasising the multi-dimensional and dynamic role of trust, the framework illustrates how initial levels of a particular type of trust may co-evolve with the alliance and influence subsequent phases of the relationship – either on its own or in combination with other types or dimensions of trust....... The theoretical distinction between trust as antecedent, moderator and outcome during the evolution of the alliance relationship leads to research questions that may guide future empirical research....

  10. Trust and Influence

    Science.gov (United States)

    2013-03-06

    the behavior or attitudes of others). LIST SUB-AREAS IN PORTFOLIO: Science of Reliance • Trust in Autonomous Systems/ Autonomy – identify the...error •Humans have trust biases (Lyons & Stokes, 2012) •Little is known about how human trust principles apply to autonomy /robotics...for the model in western context (Colquitt et al., 2007) • Some evidence that benevolence is favored by collectivist culture (Branzei et al., 2007

  11. Governance, Trust, and Taxes

    OpenAIRE

    Schrøter Joensen, Juanna; Weihe, Guðrið

    2013-01-01

    This paper examines the role of social capital (trust) vis-à-vis the propensity of a country to be a tax haven. The empirical analysis corroborates that better governed countries have a higher ceteris paribus probability to be tax havens. However, social capital counteracts the effect of governance quality. This effect is so strong that the partial effect of governance quality is reversed for countries with the trust index in the top quartile – making these high trust countries le...

  12. Trust and Social Commerce

    OpenAIRE

    Julia Y. Lee

    2016-01-01

    Internet commerce has transformed the marketing of goods and services. The separation between point of sale and seller, and the presence of geographically dispersed sellers who do not engage in repeated transactions with the same customers challenge traditional mechanisms for building the trust required for commercial exchanges. In this changing environment, legal rules and institutions play a diminished role in building trust. Instead, new systems and methods are emerging to foster trust in ...

  13. Suspicion, Trust, and Automation

    Science.gov (United States)

    2017-01-08

    Pool (IPIP; Goldberg et al., 2006; 87). A sample item is “I trust others.” Each propensity to trust item was assessed on a 7-point scale from 1...1754-6 Goldberg , L. R., Johnson, J. A., Eber, H. W., Hogan, R., Ashton, M. C., Cloninger, C. R., & Gough, H. C. (2006). The International...trust decision. When examining software inspections, Porter, et al. [6] identified one of the causes of variation in the outcome of the inspection

  14. A question of trust

    Science.gov (United States)

    2010-04-01

    Trust lies at the heart of modern science. As scientists, we trust that the papers we read are honest and correct as far as the data, results, techniques and theories in them are concerned. We trust that our colleagues and collaborators are acting properly and ethically - and not being devious, secretive or sloppy. But perhaps even more important is the public's trust in science. After all, much research is funded by taxpayers, who, quite rightly, want to know that the work will not harm them and, preferably, do them some good.

  15. Trust Discovery in Online Communities

    Science.gov (United States)

    Piorkowski, John

    2014-01-01

    This research aims to discover interpersonal trust in online communities. Two novel trust models are built to explain interpersonal trust in online communities drawing theories and models from multiple relevant areas, including organizational trust models, trust in virtual settings, speech act theory, identity theory, and common bond theory. In…

  16. Broken symmetries and the Cabibbo angle

    International Nuclear Information System (INIS)

    Lanik, J.

    1975-04-01

    Under the assumption that the SU(3) symmetry is broken down by the strong and electromagnetic interactions, a phenomenological theory of the Cabibbo angle theta is proposed. In this theory the angle theta is fixed, linking together the Cabibbo rotation in the SU(3) space and complete SU(3) breaking consisting of both the SU(3) Hamiltonian and vacuum non-invariances. Assuming that the value of theta is zero in the soft-pion limit and that, in this limit, the only forces responsible for the isotopic symmetry breaking are the usual photonic forces it is shown that the usual electromagnetic interactions can contribute for the value of theta only through the non-vanishing vacuum expectation value of a certain scalar field. Within the framework of the (3,average3)+(3,average3) chiral symmetry-breaking model and through the use of the experimental value of the ratio GAMMA (K→μν)/GAMMA(π→μν), the presented Cabibbo angle theory predicts the value sintheta=0.25 which is in good agreement with experiment. (Lanik, J.)

  17. Planck driven by vision, broken by war

    CERN Document Server

    Brown, Brandon R

    2015-01-01

    Planck's Law, an equation used by physicists to determine the radiation leaking from any object in the universe, was described by Albert Einstein as "the basis of all twentieth-century physics." Max Planck is credited with being the father of quantum theory, and his work laid the foundation for our modern understanding of matter and energetic processes. But Planck's story is not well known, especially in the United States. A German physicist working during the first half of the twentieth century, his library, personal journals, notebooks, and letters were all destroyed with his home in World War II. What remains, other than his contributions to science, are handwritten letters in German shorthand, and tributes from other scientists of the time, including his close friend Albert Einstein. In Planck: Driven by Vision, Broken by War, Brandon R. Brown interweaves the voices and writings of Planck, his family, and his contemporaries-with many passages appearing in English for the first time-to create a portrait of...

  18. A Matter of Trust

    Science.gov (United States)

    Berg, Jill Harrison; Connolly, Christine; Lee, Abda; Fairley, Emmanuel

    2018-01-01

    Educators at a turnaround school in Boston describe how they built a foundation for achievement gains by building and safeguarding relational trust among staff. The school, Henry Grew Elementary, focused in particular on fostering educators' readiness to trust, clarifying roles, and solidifying routines to support connection and risk-taking.

  19. Trust in regulatory regimes

    NARCIS (Netherlands)

    Six, Frédérique; Verhoest, Koen

    2017-01-01

    Within political and administrative sciences generally, trust as a concept is contested, especially in the field of regulatory governance. This groundbreaking book is the first to systematically explore the role and dynamics of trust within regulatory regimes. Conceptualizing, mapping and analyzing

  20. Being pragmatic about trust

    NARCIS (Netherlands)

    Nickel, P.J.; Faulkner, P.; Simpson, T.

    2017-01-01

    Trust remains an ambiguous and contested concept. A way to help settle some of the disagreements about it is to appeal to an Explanatory Constraint, according to which trust should (a) be explained as the outcome of central concerns or interests of the relevant actors, and (b) explain the emergence

  1. Towards trusted tradelanes

    NARCIS (Netherlands)

    Hulstijn, Joris; Hofman, W.; Zomer, G.; Tan, Yao-Hua; Scholl, H. J.; Glassey, O.; Janssen, M.

    Customs administrations are exploring system-based approaches to regulatory supervision, taking the entire set of controls in a process into account. In addition to Trusted Traders, which are recognized by a certification process, customs are considering to identify so called Trusted Trade Lanes:

  2. Neither Trust nor Distrust

    DEFF Research Database (Denmark)

    Jensen, Tina Gudrun

    2016-01-01

    This article deals with the politicised notions of trust and social cohesion in urban spaces through a focus on practices of everyday relations in a mixed neighbourhood. Quantitative studies maintain that ethnically diverse neighbourhoods lack in trust and solidarity. However, the very meaning an...

  3. Trust and controlling

    Directory of Open Access Journals (Sweden)

    Bieńkowska Agnieszka

    2016-12-01

    Full Text Available The purpose of this study is to discuss the trust within and towards an organisation in the context of implementation of controlling therein. In this context the essence of trust and its importance in organisation management was presented, as well as trust in the contemporary management methods and concepts. Controlling as a trust-building factor inside an organisation was pointed out. Especially controlling and control were described. Moreover management by considering deviations in controlling and the teamwork in controlling were described. The role of controlling in process of trust-building to an organisation was presented. Establishing relations with the environment and systems of measurement of organisation’s achievements were presented, too.

  4. Trust, trustworthiness and health.

    Science.gov (United States)

    Dawson, Angus

    2015-01-01

    Trust is an essential component of good healthcare. If patients trust their physicians, then the relationship between them can be a richer and more meaningful one. The patient is more likely to feel confident and able to disclose symptoms, helping diagnosis and future care. If public health and community workers are trusted, not only is it likely that their work will be easier, in that their actions will be respected and accepted, but their advice will also be sought spontaneously. Trust, can, therefore, be thought of as something that is of benefit to all: healthcare workers, individuals and communities. Trust is, generally, something to be prized and we need to do anything we can to strengthen it.

  5. The Determinants of Trust

    DEFF Research Database (Denmark)

    Bjørnskov, Christian

    , in particular emphasizing the role of social trust. This is in turn defined as the confidence people have that strangers, i.e. fellow citizens on whom they have no specific information, will not take advantage of them (Uslaner, 2002; Bjørnskov, 2006). Using the answers to the World Values Survey question “In...... general, do you think that most people can be trusted?”, the by now quite substantial literature has found that social trust is associated with a set of different macroeconomic outcomes: economic growth, the rule of law and overall quality of governance, corruption, education, the extent of violent crime...... and subjective well-being are all influenced by the propensity of people within any nation to trust each other. The questions are therefore where trust comes from and whether or not it can be affected by public policy. The answers to these questions seem to divide researchers into two camps: the optimists...

  6. Broken ergodicity in two-dimensional homogeneous magnetohydrodynamic turbulence

    International Nuclear Information System (INIS)

    Shebalin, John V.

    2010-01-01

    Two-dimensional (2D) homogeneous magnetohydrodynamic (MHD) turbulence has many of the same qualitative features as three-dimensional (3D) homogeneous MHD turbulence. These features include several ideal (i.e., nondissipative) invariants along with the phenomenon of broken ergodicity (defined as nonergodic behavior over a very long time). Broken ergodicity appears when certain modes act like random variables with mean values that are large compared to their standard deviations, indicating a coherent structure or dynamo. Recently, the origin of broken ergodicity in 3D MHD turbulence that is manifest in the lowest wavenumbers was found. Here, we study the origin of broken ergodicity in 2D MHD turbulence. It will be seen that broken ergodicity in ideal 2D MHD turbulence can be manifest in the lowest wavenumbers of a finite numerical model for certain initial conditions or in the highest wavenumbers for another set of initial conditions. The origins of broken ergodicity in an ideal 2D homogeneous MHD turbulence are found through an eigenanalysis of the covariance matrices of the probability density function and by an examination of the associated entropy functional. When the values of ideal invariants are kept fixed and grid size increases, it will be shown that the energy in a few large modes remains constant, while the energy in any other mode is inversely proportional to grid size. Also, as grid size increases, we find that broken ergodicity becomes manifest at more and more wavenumbers.

  7. Trust and Professional Skepticism in the Relationship between auditors and Clients

    DEFF Research Database (Denmark)

    Aschauer, Ewald; Fink, Matthias; Moro, Andrea

    2017-01-01

    This study empirically investigates the relationship between auditors' identification-based trust in client firm's managers and their perceptions of auditors' professional skepticism. We employ a multimethod approach broken Down into two studies. First, in study 1, we approached auditors...... collected from 233 real auditor-client dyads in Germany reveals that auditors' identification-based trust is positively Associated with their clients' perception of the auditors' professional skepticism. The identified coexistence of trust and professional skepticism in auditor-client dyads implies...... that regulatory measures that impede the evolution of trust between auditors and their clients will fail to enhance professional skepticism. instead, regulations should give auditors and their clients sufficient leeway to establish identification-based trust....

  8. Autonomy, Trust, and Respect.

    Science.gov (United States)

    Nys, Thomas

    2016-02-01

    This article seeks to explore and analyze the relationship between autonomy and trust, and to show how these findings could be relevant to medical ethics. First, I will argue that the way in which so-called "relational autonomy theories" tie the notions of autonomy and trust together is not entirely satisfying Then, I will introduce the so-called Encapsulated Interest Account as developed by Russell Hardin. This will bring out the importance of the reasons for trust. What good reasons do we have for trusting someone? I will criticize Hardin's business model as insufficiently robust, especially in the context of health care, and then turn to another source of trust, namely, love. It may seem that trust-through-love is much better suited for the vulnerability that is often involved in health care, but I will also show that it has its own deficiencies. Good health care should therefore pay attention to both models of trust, and I will offer some tentative remarks on how to do this. © The Author 2015. Published by Oxford University Press, on behalf of the Journal of Medicine and Philosophy Inc. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  9. Evaluation of the Legibility of Broken Lines for Partial Sight

    OpenAIRE

    小林, 秀之

    2000-01-01

    The present study was designed to investigate the legibility of broken lines for persons with partial sight. The subjects were 10 persons with simulated partial sight, and 4 persons with partial sight. The simulation was obtained using filters and convex lenses. The 30 kind of broken lines was evaluated by the original test that the subjects were read directions of the broken lines in distinction from solid lines. The thickness of lines varied from 0.1mm. to 0.7mm. in 4 steps. The results...

  10. Trust vs. Crisis

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    2014-01-01

    The three social phenomena -- norms, trust, and crisis -- are in this paper combined into one model that illustrates their function and relationship. Crisis is seen as a reaction to serious violations of expectations that leave people disoriented, insecure about situational norms, and unable...... to judge whom to trust. One logical solution to a crisis is to rebuild a shared understanding of the norms involved in any given context. Banking is used as a case. Central concepts are borrowed from Niklas Luhmann Trust (1968), Alf Ross Directives and Norms (1967), and Arthur G. Neal National Trauma...

  11. Trust vs. Crisis

    Directory of Open Access Journals (Sweden)

    Kirsten Mogensen

    2014-06-01

    Full Text Available The three social phenomena -- norms, trust, and crisis -- are in this paper combined into one model that illustrates their function and relationship. Crisis is seen as a reaction to serious violations of expectations that leave people disoriented, insecure about situational norms, and unable to judge whom to trust. One logical solution to a crisis is to rebuild a shared understanding of the norms involved in any given context. Banking is used as a case. Central concepts are borrowed from Niklas Luhmann Trust (1968, Alf Ross Directives and Norms (1967, and Arthur G. Neal National Trauma & Collective Memory (1998.

  12. Trust and Credit

    DEFF Research Database (Denmark)

    Harste, Gorm

    The present paper is an answer to the question, how did trust and credit emerge. The systems of trust and credit reduce the environmental and contextual complexities in which trust and credit are embedded. The paper analyses the forms of this reduction in a number of stages in the evolution...... of history from the present risk of modern systems back to early modernity, the Reformation and the high medieval Revolutions in law, organization and theology. It is not a history of economics, but a history of the conditions of some communication codes used in economic systems....

  13. Trust repertoires for collaboration

    DEFF Research Database (Denmark)

    Fuglsang, Lars

    This case study analyses the role of trust in a public private innovation network that involved a private consultancy company as a facilitator. We know that collaboration is a important for innovation, and that collaboration across organizational boundaries is not a trivial issue. But we know very...... little about how such processes develop and how trust, understood as “confident positive expectations” (Lewicki et al. 1998) to collaborative activities, arises out of collaboration. The paper contributes by showing how trust and collaboration are intertwined. The main finding is that a facilitator can...

  14. Competition Fosters Trust

    DEFF Research Database (Denmark)

    Huck, Steffen; Lünser, Gabriele; Tyran, Jean-Robert Karl

    2012-01-01

    We study the effects of reputation and competition in a trust game. If trustees are anonymous, outcomes are poor: trustees are not trustworthy, and trustors do not trust. If trustees are identifiable and can, hence, build a reputation, efficiency quadruples but is still at only a third of the first...... best. Adding more information by granting trustors access to all trustees' complete history has, somewhat surprisingly, no effect. On the other hand, we find that competition, coupled with some minimal information, eliminates the trust problem almost completely...

  15. Governance, Trust and Taxes

    DEFF Research Database (Denmark)

    Weihe, Guri; Joensen, E. Juanna Schröter

    This paper examines the role of social capital (trust) vis-à-vis the propensity of a country to be a tax haven. The empirical analysis corroborates that better governed countries have a higher ceteris paribus probability to be tax havens. However, social capital counteracts the effect of governance...... quality. This effect is so strong that the partial effect of governance quality is reversed for countries with the trust index in the top quartile – making these high trust countries less likely to be tax havens – even as governance quality is increased. Thus it is crucial to consider the interaction...

  16. Trust and Estate Planning

    DEFF Research Database (Denmark)

    Harrington, Brooke

    2012-01-01

    looks at the ways professionals participate in the creation of stratification regimes. Trust and estate planners do this by sheltering their clients' assets from taxation, thereby preserving private wealth for future generations. Using tools such as trusts, offshore banks, and shell corporations......, these professionals keep a significant portion of the world’s private wealth beyond the reach of the state. Trust and estate planning thus contributes to creating and maintaining socioeconomic inequality on a global scale. The significance of the profession has grown as wealth itself has become more fungible...

  17. Quantifying and Qualifying Trust: Spectral Decomposition of Trust Networks

    NARCIS (Netherlands)

    Pavlovic, Dusko; Degano, Pierpaolo; Etalle, Sandro; Guttman, Joshua

    In a previous FAST paper, I presented a quantitative model of the process of trust building, and showed that trust is accumulated like wealth: the rich get richer. This explained the pervasive phenomenon of adverse selection of trust certificates, as well as the fragility of trust networks in

  18. Self trust, a major challenge for nuclear regulators

    Energy Technology Data Exchange (ETDEWEB)

    Eibenschutz, J. [National Nuclear Safety and Safeguards Commission (CNSN), Mexico City (Mexico)

    2014-07-01

    Self trust. The nuclear community and particularly nuclear regulators overreact to accidents, this has been the case with the three NPP major accidents. Lowering admissible radiation levels, for example, conveys the wrong message to politicians and the general public, and contributes to enhance mistrust towards nuclear. Industry as well as regulators should mature and act with self respect, since the scientific bases of regulation are very solid and should be trusted. Lessons learned should be seriously pursued in spite of the 'uneven playing field'. Obviously safety continues as the main priority, but paranoid reactions from the nuclear professionals could destroy the future of nuclear power. (author)

  19. Self trust, a major challenge for nuclear regulators

    International Nuclear Information System (INIS)

    Eibenschutz, J.

    2014-01-01

    Self trust. The nuclear community and particularly nuclear regulators overreact to accidents, this has been the case with the three NPP major accidents. Lowering admissible radiation levels, for example, conveys the wrong message to politicians and the general public, and contributes to enhance mistrust towards nuclear. Industry as well as regulators should mature and act with self respect, since the scientific bases of regulation are very solid and should be trusted. Lessons learned should be seriously pursued in spite of the 'uneven playing field'. Obviously safety continues as the main priority, but paranoid reactions from the nuclear professionals could destroy the future of nuclear power. (author)

  20. Superconducting cosmic strings in models with spontaneously broken family symmetry

    International Nuclear Information System (INIS)

    Bibilashvili, T.M.; Dvali, G.R.

    1990-01-01

    It is shown that superconducting cosmic strings with some specific properties naturally exist in models of spontaneously broken family symmetry. Superconductivity may be of both types - bosonic and fermionic. There exists a possible mechanism of string conservation. (orig.)

  1. A Note on a Broken-Cycle Theorem for Hypergraphs

    Directory of Open Access Journals (Sweden)

    Trinks Martin

    2014-08-01

    Full Text Available Whitney’s Broken-cycle Theorem states the chromatic polynomial of a graph as a sum over special edge subsets. We give a definition of cycles in hypergraphs that preserves the statement of the theorem there

  2. Education and Social Trust

    DEFF Research Database (Denmark)

    Oskarsson, Sven; Dinesen, Peter Thisted; Dawes, Christopher

    2017-01-01

    One of the clearest results in previous studies on social trust is the robust positive relationship with educational attainment. The most common interpretation is that education has a causal effect on social trust. The theoretical argument and empirical results in this article suggest a different...... interpretation. We argue that common preadult factors such as cognitive abilities and personality traits rooted in genes and early-life family environment may confound the relationship between educational attainment and social trust. We provide new evidence on this question by utilizing the quasi......-experiment of twinning. By looking at the relationship between education and social trust within monozygotic (MZ) twin pairs, we are able to avoid potential confounders rooted in genetic factors and common environmental influences because the monozygotic twins share both. The results suggest that when controlling...

  3. Balancing trust and power

    DEFF Research Database (Denmark)

    Broholm-Jørgensen, Marie; Guassora, Ann Dorrit; Reventlow, Susanne

    2017-01-01

    Objective: Little is known about how strategies of retaining patients are acted out by general practitioners (GPs) in the clinical encounter. With this study, we apply Grimens’ (2009) analytical connection between trust and power to explore how trust and power appear in preventive health checks...... of clinical encounters. Results: From the empirical data, we identified three dimensions of respect: respect for the patient’s autonomy, respect for professional authority and respect as a mutual exchange. A balance of respect influenced trust in the relationship between GP and patients and the transfer...... of power in the encounter. The GPs articulated that a balance was needed in preventive health checks in order to establish trust and thus retain the patient in the clinic. One way this balance of respect was carried out was with the use of humour. Conclusions: To retain patients without formal education...

  4. A formalization of computational trust

    NARCIS (Netherlands)

    Güven - Ozcelebi, C.; Holenderski, M.J.; Ozcelebi, T.; Lukkien, J.J.

    2018-01-01

    Computational trust aims to quantify trust and is studied by many disciplines including computer science, social sciences and business science. We propose a formal computational trust model, including its parameters and operations on these parameters, as well as a step by step guide to compute trust

  5. Assess and enhance public trust

    Science.gov (United States)

    Patricia Winter; James Absher; Alan Watson

    2007-01-01

    Trust is a form of social capital, facilitating effective land management, communication and collaboration. Although trust in the Forest Service is at least moderately high for most publics, evidence of a lack of trust and outright distrust has been found in some communities. However, the amount, types, and conditions of trust necessary for effective management to...

  6. Broken homes, parental psychiatric illness, and female delinquency.

    Science.gov (United States)

    Offord, David R; Abrams, Nola; Allen, Nancy; Poushinsky, Mary

    1979-04-01

    Fifty-nine families with delinquent daughters were compared with 59 families, matched on socioeconomic class, with daughters of the same age who were not delinquent. The frequency of broken homes was found to be the strongest distinguishing factor between probands and controls. Parental disabilities appeared to play a part in the incidence of delinquency among girls, particularly when the disabilities result in a broken home.

  7. Characterization and Preparation of Broken Rice Proteins Modified by Proteases

    Directory of Open Access Journals (Sweden)

    Lixia Hou

    2010-01-01

    Full Text Available Broken rice is an underutilized by-product of milling. Proteins prepared from broken rice by treatments with alkaline protease and papain have been characterized with regard to nutritional and functional properties. The protein content and the protein recovery were 56.45 and 75.45 % for alkaline protease treatment, and 65.45 and 46.32 % for papain treatment, respectively. Protease treatment increased the lysine and valine content, leading to a more balanced amino acid profile. Broken rice proteins had high emulsifying capacity, 58.3–71.6 % at neutral pH, and adequate water holding capacity, ranging from 1.96 to 2.93 g/g of proteins. At pH=7.0, the broken rice protein had the highest water holding capacity and the best interfacial activities (emulsifying capacity, emulsifying stability, foaming capacity and foaming stability, which may be the result of the higher solubility at pH=7.0. The interfacial activities increased with the increase in the mass fraction of broken rice proteins. The proteins prepared by the papain treatment had higher water holding capacity (p>0.05, emulsifying capacity (p0.05 than alkaline protease treatment at the same pH or mass fraction. To test the fortification of food products with broken rice proteins, pork sausages containing the proteins were prepared. Higher yield of the sausages was obtained with the increased content of broken rice proteins, in the range of 2.0–9.0 %. The results indicate that broken rice proteins have potential to be used as the protein fortification ingredient for food products.

  8. Trust and virtual worlds

    DEFF Research Database (Denmark)

    Ess, Charles; Thorseth, May

    2011-01-01

    We collect diverse philosophical analyses of the issues and problems clustering around trust online with specific attention to establishing trust in virtual environments. The book moves forward important discussions of how virtual worlds and virtuality are to be defined and understood; the role o...... by virtuality, such as virtual child pornography. The introduction further develops a philosophical anthropology, rooted in Kantian ethics, phenomenology, virtue ethics, and feminist perspectives, that grounds a specific approach to ethical issues in virtual environments....

  9. Social relationships and trust

    OpenAIRE

    Binzel, Christine; Fehr, Dietmar

    2010-01-01

    While social relationships play an important role for individuals to cope with missing market institutions, they also limit individuals' range of trading partners. This paper aims at understanding the determinants of trust at various social distances when information asymmetries are present. Among participants from an informal housing area in Cairo we find that the increase in trust following a reduction in social distance comes from the fact that trustors are much more inclined to follow the...

  10. Trust is other people

    DEFF Research Database (Denmark)

    Luckner, Naemi; Werner, Katharina; Subasi, Özge

    concerning the interaction with strangers through the platform. Putting trust in an online sharing community seems to be the biggest obstacle that influences whether people draw away rather than move closer together and start collaborating in the sharing community. Here, we report on the main issues...... involving other participants in the hope to find appropriate ways to create trustful sharing environments that reassure potential participants rather than play into their fears....

  11. Trusted Computing Technologies, Intel Trusted Execution Technology.

    Energy Technology Data Exchange (ETDEWEB)

    Guise, Max Joseph; Wendt, Jeremy Daniel

    2011-01-01

    We describe the current state-of-the-art in Trusted Computing Technologies - focusing mainly on Intel's Trusted Execution Technology (TXT). This document is based on existing documentation and tests of two existing TXT-based systems: Intel's Trusted Boot and Invisible Things Lab's Qubes OS. We describe what features are lacking in current implementations, describe what a mature system could provide, and present a list of developments to watch. Critical systems perform operation-critical computations on high importance data. In such systems, the inputs, computation steps, and outputs may be highly sensitive. Sensitive components must be protected from both unauthorized release, and unauthorized alteration: Unauthorized users should not access the sensitive input and sensitive output data, nor be able to alter them; the computation contains intermediate data with the same requirements, and executes algorithms that the unauthorized should not be able to know or alter. Due to various system requirements, such critical systems are frequently built from commercial hardware, employ commercial software, and require network access. These hardware, software, and network system components increase the risk that sensitive input data, computation, and output data may be compromised.

  12. Offline detection of broken rotor bars in AC induction motors

    Science.gov (United States)

    Powers, Craig Stephen

    ABSTRACT. OFFLINE DETECTION OF BROKEN ROTOR BARS IN AC INDUCTION MOTORS. The detection of the broken rotor bar defect in medium- and large-sized AC induction machines is currently one of the most difficult tasks for the motor condition and monitoring industry. If a broken rotor bar defect goes undetected, it can cause a catastrophic failure of an expensive machine. If a broken rotor bar defect is falsely determined, it wastes time and money to physically tear down and inspect the machine only to find an incorrect diagnosis. Previous work in 2009 at Baker/SKF-USA in collaboration with the Korea University has developed a prototype instrument that has been highly successful in correctly detecting the broken rotor bar defect in ACIMs where other methods have failed. Dr. Sang Bin and his students at the Korea University have been using this prototype instrument to help the industry save money in the successful detection of the BRB defect. A review of the current state of motor conditioning and monitoring technology for detecting the broken rotor bar defect in ACIMs shows improved detection of this fault is still relevant. An analysis of previous work in the creation of this prototype instrument leads into the refactoring of the software and hardware into something more deployable, cost effective and commercially viable.

  13. Computationally Modeling Interpersonal Trust

    Directory of Open Access Journals (Sweden)

    Jin Joo eLee

    2013-12-01

    Full Text Available We present a computational model capable of predicting—above human accuracy—the degree of trust a person has toward their novel partner by observing the trust-related nonverbal cues expressed in their social interaction. We summarize our prior work, in which we identify nonverbal cues that signal untrustworthy behavior and also demonstrate the human mind’s readiness to interpret those cues to assess the trustworthiness of a social robot. We demonstrate that domain knowledge gained from our prior work using human-subjects experiments, when incorporated into the feature engineering process, permits a computational model to outperform both human predictions and a baseline model built in naivete' of this domain knowledge. We then present the construction of hidden Markov models to incorporate temporal relationships among the trust-related nonverbal cues. By interpreting the resulting learned structure, we observe that models built to emulate different levels of trust exhibit different sequences of nonverbal cues. From this observation, we derived sequence-based temporal features that further improve the accuracy of our computational model. Our multi-step research process presented in this paper combines the strength of experimental manipulation and machine learning to not only design a computational trust model but also to further our understanding of the dynamics of interpersonal trust.

  14. Trust, values and false consensus

    OpenAIRE

    Butler, Jeffrey V.; Giuliano, Paola; Guiso, Luigi

    2012-01-01

    Trust beliefs are heterogeneous across individuals and, at the same time, persistent across generations. We investigate one mechanism yielding these dual patterns: false consensus. In the context of a trust game experiment, we show that individuals extrapolate from their own type when forming trust beliefs about the same pool of potential partners – i.e., more (less) trustworthy individuals form more optimistic (pessimistic) trust beliefs - and that this tendency continues to color trust beli...

  15. A general definition of trust

    OpenAIRE

    O'Hara, Kieron

    2012-01-01

    In this paper a definition and conceptual analysis of trust is given in terms of trustworthiness. Its focus will be as wide as possible, and will not be restricted to any particular type of trust. The aim is to show the key parameters that enable us to investigate and understand trust, thereby facilitating the development of systems, institutions and technologies to support, model or mimic trust. The paper will also show the strong connection between trust and trustworthiness, showing how the...

  16. Do you trust? Whom do you trust? When do you trust?

    NARCIS (Netherlands)

    Snijders, C.C.P.; Keren, G.; Thye, S.R.; Lawler, E.J.; Macy, M.W.; Walker, H.A.

    2001-01-01

    We try to provide a broader view on the factors that infiuence the decision to trust and honor trust. Using the "Trust Game" as our experimental paradigm, we consider three classes offactors that may he related to trust issues. The first one considers individual differences with regard to the

  17. The Church as Christ’s broken body responding to the emerging global challenges in a divided world

    Directory of Open Access Journals (Sweden)

    Roderick R. Hewitt

    2017-10-01

    Full Text Available Public debate about the role of the church within society has gained momentum especially because the contemporary changing global political and economic landscape has resulted in deeply a divided world. People are asking questions about the missional identity and vocation of the church. If the church is the broken body of Christ in the world, what are the ways in which it is expressing that brokenness in practical ways? This vulnerable status necessitates modelling the politics of Jesus that risks putting up resistance against all threats that prevent people from experiencing fullness of life. The contemporary era of global governance is characterised by ‘moral lowlifes’ in political leadership that uses judicial and executive overreach to weaken democracy and empower the wealthy elites. Furthermore, the impact of technology and computation on shaping human relations has produced a consequential decline in human trust and relationships. Therefore, the missional agenda of the church as the broken body of Christ serving a divided world, calls for building life-affirming relationships that overcome dehumanising barriers.

  18. A Model of Trusted Measurement Model

    OpenAIRE

    Ma Zhili; Wang Zhihao; Dai Liang; Zhu Xiaoqin

    2017-01-01

    A model of Trusted Measurement supporting behavior measurement based on trusted connection architecture (TCA) with three entities and three levels is proposed, and a frame to illustrate the model is given. The model synthesizes three trusted measurement dimensions including trusted identity, trusted status and trusted behavior, satisfies the essential requirements of trusted measurement, and unified the TCA with three entities and three levels.

  19. Trust transitivity in social networks.

    Directory of Open Access Journals (Sweden)

    Oliver Richters

    Full Text Available Non-centralized recommendation-based decision making is a central feature of several social and technological processes, such as market dynamics, peer-to-peer file-sharing and the web of trust of digital certification. We investigate the properties of trust propagation on networks, based on a simple metric of trust transitivity. We investigate analytically the percolation properties of trust transitivity in random networks with arbitrary in/out-degree distributions, and compare with numerical realizations. We find that the existence of a non-zero fraction of absolute trust (i.e. entirely confident trust is a requirement for the viability of global trust propagation in large systems: The average pair-wise trust is marked by a discontinuous transition at a specific fraction of absolute trust, below which it vanishes. Furthermore, we perform an extensive analysis of the Pretty Good Privacy (PGP web of trust, in view of the concepts introduced. We compare different scenarios of trust distribution: community- and authority-centered. We find that these scenarios lead to sharply different patterns of trust propagation, due to the segregation of authority hubs and densely-connected communities. While the authority-centered scenario is more efficient, and leads to higher average trust values, it favours weakly-connected "fringe" nodes, which are directly trusted by authorities. The community-centered scheme, on the other hand, favours nodes with intermediate in/out-degrees, in detriment of the authorities and its "fringe" peers.

  20. Trust Transitivity in Social Networks

    Science.gov (United States)

    Richters, Oliver; Peixoto, Tiago P.

    2011-01-01

    Non-centralized recommendation-based decision making is a central feature of several social and technological processes, such as market dynamics, peer-to-peer file-sharing and the web of trust of digital certification. We investigate the properties of trust propagation on networks, based on a simple metric of trust transitivity. We investigate analytically the percolation properties of trust transitivity in random networks with arbitrary in/out-degree distributions, and compare with numerical realizations. We find that the existence of a non-zero fraction of absolute trust (i.e. entirely confident trust) is a requirement for the viability of global trust propagation in large systems: The average pair-wise trust is marked by a discontinuous transition at a specific fraction of absolute trust, below which it vanishes. Furthermore, we perform an extensive analysis of the Pretty Good Privacy (PGP) web of trust, in view of the concepts introduced. We compare different scenarios of trust distribution: community- and authority-centered. We find that these scenarios lead to sharply different patterns of trust propagation, due to the segregation of authority hubs and densely-connected communities. While the authority-centered scenario is more efficient, and leads to higher average trust values, it favours weakly-connected “fringe” nodes, which are directly trusted by authorities. The community-centered scheme, on the other hand, favours nodes with intermediate in/out-degrees, in detriment of the authorities and its “fringe” peers. PMID:21483683

  1. Proton-neutron correlations in a broken-pair model

    International Nuclear Information System (INIS)

    Akkermans, J.N.L.

    1981-01-01

    In this thesis nuclear-structure calculations are reported which were performed with the broken-pair model. The model which is developed, is an extension of existing broken-pair models in so far that it includes both proton and neutron valence pairs. The relevant formalisms are presented. In contrast to the number-non-conserving model, a proton-neutron broken-pair model is well suited to study the correlations which are produced by the proton-neutron interaction. It is shown that the proton-neutron force has large matrix elements which mix the proton- with neutron broken-pair configurations. This occurs especially for Jsup(PI)=2 + and 3 - pairs. This property of the proton-neutron force is used to improve the spectra of single-closed shell nuclei, where particle-hole excitations of the closed shell are a special case of broken-pair configurations. Using Kr and Te isotopes it is demonstrated that the proton-neutron force gives rise to correlated pair structures, which remain remarkably constant with varying nucleon numbers. (Auth.)

  2. Broken-Rotor-Bar Diagnosis for Induction Motors

    International Nuclear Information System (INIS)

    Wang Jinjiang; Gao, Robert X; Yan Ruqiang

    2011-01-01

    Broken rotor bar is one of the commonly encountered induction motor faults that may cause serious motor damage to the motor if not detected timely. Past efforts on broken rotor bar diagnosis have been focused on current signature analysis using spectral analysis and wavelet transform. These methods require accurate slip estimation to localize fault-related frequency. This paper presents a new approach to broken rotor bar diagnosis without slip estimation, based on the ensemble empirical mode decomposition (EEMD) and the Hilbert transform. Specifically, the Hilbert transform first extracts the envelope of the motor current signal, which contains broken rotor fault-related frequency information. Subsequently, the envelope signal is adaptively decomposed into a number of intrinsic mode functions (IMFs) by the EEMD algorithm. Two criteria based on the energy and correlation analyses have been investigated to automate the IMF selection. Numerical and experimental studies have confirmed that the proposed approach is effective in diagnosing broken rotor bar faults for improved induction motor condition monitoring and damage assessment.

  3. A Chinese sky trust?

    Energy Technology Data Exchange (ETDEWEB)

    Brenner, Mark [Political Economy Research Institute, University of Massachusetts, Amherst (United States)]. E-mail: brenner@econs.umass.edu; Riddle, Matthew [Department of Economics, University of Massachusetts, Amherst (United States)]. E-mail: mriddle@econs.umass.edu; Boyce, James K. [Political Economy Research Institute and Department of Economics, University of Massachusetts, Amherst (United States)]. E-mail: boyce@econs.umass.edu

    2007-03-15

    The introduction of carbon charges on the use of fossil fuels in China would have a progressive impact on income distribution. This outcome, which contrasts to the regressive distributional impact found in most studies of carbon charges in industrialized countries, is driven primarily by differences between urban and rural expenditure patterns. If carbon revenues were recycled on an equal per capita basis via a 'sky trust,' the progressive impact would be further enhanced: low-income (mainly rural) households would receive more in sky-trust dividends than they pay in carbon charges, and high-income (mainly urban) households would pay more than they receive in dividends. Thus a Chinese sky trust would contribute to both lower fossil fuel consumption and greater income equality.

  4. Impact Through Trust

    DEFF Research Database (Denmark)

    Mayoral, Juan A.

    of its rulings and legal mandates in national judiciaries and legal systems? This question is crucial if we understand that national courts are the key decentralised enforcers of the European Union (EU) law responsible for ensuring the effectiveness of EU law and the rulings and mandates imposed...... by the Court. EU scholars have already offered several legalist and institutionalist responses to why national courts participate in this process of legal integration in the EU and, most importantly, why the follow the mandates and rulings from the CJEU. This chapter innovates in this regard by introducing...... trust between judges as a new mechanism for enhancing the cooperation and compliance by national courts with the CJEU jurisprudence and EU legal mandates. The chapter describes the conditions under which national judges trust the CJEU to identify how the Court can promote trust in its role as a supreme...

  5. Trusts and Financialization

    DEFF Research Database (Denmark)

    Harrington, Brooke

    2017-01-01

    the global spread of financialization: by privileging the rentier–investor within the 15 world economy; by perpetuating a distinctively Anglo-American approach to finance internationally; and by increasing the autonomy of finance vis-a-vis the nation-state. This study shares the primarily descriptive......This article identifies trusts as a legal structure associated with the global spread of financialization. Although trusts originated in Medieval England, they have acquired a new significance in contemporary finance by virtue of their advantages in terms of 10 profit maximization and capital...... and conceptual intent of Krippner’s work on financialization, but extends it in two ways: by comparing trusts to the better- known corporate form of organizing financial activity, and by showing how private 20 capital is implicated in the financialized economy alongside corporate wealth....

  6. Trust in Diverse Teams

    DEFF Research Database (Denmark)

    Clausen, Lisbeth

    , maintaining team cohesiveness in multicultural teams to collaborate effectively presents a number of challenges. The present study employs the concept of trust to explore influences on team collaboration in high performing teams. The study is based on observation of teams in seven multinational corporations...... and interviews with managers from the US, Europe, China and Japan. The study presents a conceptual framework - a ‘trust buffer’ – which enables analysis and exemplification of the dynamics and challenges of teams as drivers of change. Each team has strategically important tasks, unique capacities and deal...... with change in particular ways: Each team is analyzed in relation to its global (HQ) mandate, local (national) stakeholders and organizational context. It is found that communication energy, resources and team mandate underscore the sense of trust in high performing teams. Diversity is understood...

  7. A Chinese sky trust?

    International Nuclear Information System (INIS)

    Brenner, Mark; Riddle, Matthew; Boyce, James K.

    2007-01-01

    The introduction of carbon charges on the use of fossil fuels in China would have a progressive impact on income distribution. This outcome, which contrasts to the regressive distributional impact found in most studies of carbon charges in industrialized countries, is driven primarily by differences between urban and rural expenditure patterns. If carbon revenues were recycled on an equal per capita basis via a 'sky trust,' the progressive impact would be further enhanced: low-income (mainly rural) households would receive more in sky-trust dividends than they pay in carbon charges, and high-income (mainly urban) households would pay more than they receive in dividends. Thus a Chinese sky trust would contribute to both lower fossil fuel consumption and greater income equality

  8. Trust Models in Ubiquitous Computing

    DEFF Research Database (Denmark)

    Nielsen, Mogens; Krukow, Karl; Sassone, Vladimiro

    2008-01-01

    We recapture some of the arguments for trust-based technologies in ubiquitous computing, followed by a brief survey of some of the models of trust that have been introduced in this respect. Based on this, we argue for the need of more formal and foundational trust models.......We recapture some of the arguments for trust-based technologies in ubiquitous computing, followed by a brief survey of some of the models of trust that have been introduced in this respect. Based on this, we argue for the need of more formal and foundational trust models....

  9. Neutrino mixing: from the broken μ-τ symmetry to the broken Friedberg–Lee symmetry

    International Nuclear Information System (INIS)

    Xing, Zhizhong

    2007-01-01

    I argue that the observed flavor structures of leptons and quarks might imply the existence of certain flavor symmetries. The latter should be a good starting point to build realistic models towards deeper understanding of the fermion mass spectra and flavor mixing patterns. The μ-τ permutation symmetry serves for such an example to interpret the almost maximal atmospheric neutrino mixing angle (θ 23 ~ 45°) and the strongly suppressed CHOOZ neutrino mixing angle (θ 13 < 10°). In this talk I like to highlight a new kind of flavor symmetry, the Friedberg–Lee symmetry, for the effective Majorana neutrino mass operator. Luo and I have shown that this symmetry can be broken in an oblique way, such that the lightest neutrino remains massless but an experimentally-favored neutrino mixing pattern is achievable. We get a novel prediction for θ 13 in the CP-conserving case: sinθ 13 = tanθ 12 |(1 - tanθ 23 )/(1 + tanθ 23 )|. Our scenario can simply be generalized to accommodate CP violation and be combined with the seesaw mechanism. Finally I stress the importance of probing possible effects of μ-τ symmetry breaking either in terrestrial neutrino oscillation experiments or with ultrahigh-energy cosmic neutrino telescopes. (author)

  10. Trusted cloud computing

    CERN Document Server

    Krcmar, Helmut; Rumpe, Bernhard

    2014-01-01

    This book documents the scientific results of the projects related to the Trusted Cloud Program, covering fundamental aspects of trust, security, and quality of service for cloud-based services and applications. These results aim to allow trustworthy IT applications in the cloud by providing a reliable and secure technical and legal framework. In this domain, business models, legislative circumstances, technical possibilities, and realizable security are closely interwoven and thus are addressed jointly. The book is organized in four parts on "Security and Privacy", "Software Engineering and

  11. Competition Fosters Trust

    DEFF Research Database (Denmark)

    Huck, Steffen; Ruchala, Gabriele K.; Tyran, Jean-Robert

    We study the effects of reputation and competition in a stylized market for experience goods. If interaction is anonymous, such markets perform poorly: sellers are not trustworthy, and buyers do not trust sellers. If sellers are identifiable and can, hence, build a reputation, efficiency quadruples...... but is still at only a third of the first best. Adding more information by granting buyers access to all sellers’ complete history has, somewhat surprisingly, no effect. On the other hand, we find that competition, coupled with some minimal information, eliminates the trust problem almost completely...

  12. Time and Trust

    DEFF Research Database (Denmark)

    Hansen, Annette Skovsted

    current Africa strategies as part of a long history of a variety of stakeholders on the African continent. I argue that trust and lack of trust based on long term relations influence choices on aid distribution made by African and partner countries. The analysis is based on a reading of OECD statistics...... on aid distribution in combination with select interviews with stakeholders in foreign aid, and archival findings on the historical presence of Japanese, Chinese, Indian, European, and North American people on the African continent. By looking at the impact of historical networks on ODA distribution...

  13. Trust in Anonymity Networks

    Science.gov (United States)

    Sassone, Vladimiro; Hamadou, Sardaouna; Yang, Mu

    Anonymity is a security property of paramount importance, as we move steadily towards a wired, online community. Its import touches upon subjects as different as eGovernance, eBusiness and eLeisure, as well as personal freedom of speech in authoritarian societies. Trust metrics are used in anonymity networks to support and enhance reliability in the absence of verifiable identities, and a variety of security attacks currently focus on degrading a user's trustworthiness in the eyes of the other users. In this paper, we analyse the privacy guarantees of the Crowds anonymity protocol, with and without onion forwarding, for standard and adaptive attacks against the trust level of honest users.

  14. A Longitudianl Study of the Link Between Broken Homes and Criminality.

    Science.gov (United States)

    McCord, Joan

    Possible explanatory theories of the relationship between broken homes and crime include the following: (1) broken homes lead to crimes if there are "catalytic agents"; (2) broken homes lead to crime if these homes fail to provide certain conditions which promote socialization; and (3) broken homes and crime have a common source, but not…

  15. Futility Disputes: A Review of the Literature and Proposed Model for Dispute Navigation Through Trust Building.

    Science.gov (United States)

    Leland, Brian D; Torke, Alexia M; Wocial, Lucia D; Helft, Paul R

    2017-10-01

    Futility disputes in the intensive care unit setting have received significant attention in the literature over the past several years. Although the idea of improving communication in an attempt to resolve these challenging situations has been regularly discussed, the concept and role of trust building as the means by which communication improves and disputes are best navigated is largely absent. We take this opportunity to review the current literature on futility disputes and argue the important role of broken trust in these encounters, highlighting current evidence establishing the necessity and utility of trust in both medical decision-making and effective communication. Finally, we propose a futility dispute navigation model built upon improved communication through trust building.

  16. Management of broken instrument by file bypass technique

    Directory of Open Access Journals (Sweden)

    Sultana Parveen

    2017-02-01

    Full Text Available Different devices and techniques have been developed to retrieve fractured instruments during the endodontic procedures. This case report describes the management of a broken instrument, which was accidentally broken during cleaning and shaping of the root canal in right 2nd molar tooth. A # 25 stainless steel K-file was separated in mesiobuccal canal of the treated tooth. At first, a radiograph was taken to confirm the level of separation of the instrument. The instrument was found to be separated at the apical 3rd of the mesial canal and then file bypass technique was performed. Calcium hydroxide dressing was given for 7 days followed by obturation with guttapercha cone and zinc oxide eugenol sealer in lateral condensation technique. It can be concluded that bypass technique can be considered as simple and effective technique for the management of broken instrument into the root canal.

  17. Banking system trust, bank trust, and bank loyalty

    NARCIS (Netherlands)

    van Esterik-Plasmeijer, P.; van Raaij, W.F.

    2017-01-01

    Purpose The purpose of this paper is to test a model of banking system trust as an antecedent of bank trust and bank loyalty. Six determinants of trust and loyalty are included: competence, stability, integrity, customer orientation, transparency, and value congruence. The study provides insights

  18. Elastoconductivity as a probe of broken mirror symmetries

    Energy Technology Data Exchange (ETDEWEB)

    Hlobil, Patrik; Maharaj, Akash V.; Hosur, Pavan; Shapiro, M. C.; Fisher, I. R.; Raghu, S.

    2015-07-27

    We propose the possible detection of broken mirror symmetries in correlated two-dimensional materials by elastotransport measurements. Using linear response theory we calculate the“shear conductivity” Γ x x , x y , defined as the linear change of the longitudinal conductivity σ x x due to a shear strain ε x y . This quantity can only be nonvanishing when in-plane mirror symmetries are broken and we discuss how candidate states in the cuprate pseudogap regime (e.g., various loop current or charge orders) may exhibit a finite shear conductivity. We also provide a realistic experimental protocol for detecting such a response.

  19. Broken Stone Marker Construction%碎石桩施工

    Institute of Scientific and Technical Information of China (English)

    高瑞娥

    2009-01-01

    随着我国高速公路建设的加快,在高速公路的路基设计和施工中引入并使用碎石桩处理软土地基. 文章就结合碎石桩处理软土地基,浅谈碎石桩的施工过程和检测方法.%This paper unifies the broken stone marker processing soft soil ground, discusses the broken stone marker shallowly the construction pro-cess and the examination method.

  20. Understanding Trust in Financial Services

    DEFF Research Database (Denmark)

    Hansen, Torben

    2012-01-01

    Although the financial crisis has elevated the interest for factors such as consumer financial healthiness, broad-scope trust, financial knowledge, and consumer relationship satisfaction, no existing model describes how these factors may influence consumer financial relationship trust...... healthiness, broad-scope trust, knowledge, and satisfaction positively affect narrow-scope trust in financial services. Furthermore, it is found that broad-scope trust negatively moderates the relationships between financial healthiness and narrow-scope trust and between satisfaction and narrow-scope trust....... This research extends prior research by developing a conceptual framework explaining how these constructs affect consumers' trust in their financial service provider. Based on two surveys comprising 764 pension consumers and 892 mortgage consumers, respectively, the results of this study indicate that financial...

  1. The Process of Trust Development

    DEFF Research Database (Denmark)

    Jagd, Søren; Højland, Jeppe

    in management among employees. Trust is found to be higher among employees interacting regularly with managers, as in the project coordination group. It is found that personal relations are very important for the development of trust. The success of the project may be explained by the involvement of an ‘elite...... and discuss with colleagues from other departments and develop personal knowledge of each other....... by high trust and co-operation? In this paper we explore the process of trust development during an organisational change project in a Danish SME by looking at two kinds of trust relations: employee trust in management and trust relations among employees. We find substantial differences in trust...

  2. Trust metrics in information fusion

    Science.gov (United States)

    Blasch, Erik

    2014-05-01

    Trust is an important concept for machine intelligence and is not consistent across many applications. In this paper, we seek to understand trust from a variety of factors: humans, sensors, communications, intelligence processing algorithms and human-machine displays of information. In modeling the various aspects of trust, we provide an example from machine intelligence that supports the various attributes of measuring trust such as sensor accuracy, communication timeliness, machine processing confidence, and display throughput to convey the various attributes that support user acceptance of machine intelligence results. The example used is fusing video and text whereby an analyst needs trust information in the identified imagery track. We use the proportional conflict redistribution rule as an information fusion technique that handles conflicting data from trusted and mistrusted sources. The discussion of the many forms of trust explored in the paper seeks to provide a systems-level design perspective for information fusion trust quantification.

  3. Trust and Critical Thinking

    Science.gov (United States)

    Kleinig, John

    2018-01-01

    This article discusses the tension between trust, as an expression of interpersonal commitment, and critical thinking, which includes a demand for reasons. It explores the importance of each for individual flourishing, and then seeks to establish some ways in which they intersect, drawing on ideas of authority and trustworthiness. It argues that…

  4. Researching trust in Wikipedia

    NARCIS (Netherlands)

    Lucassen, T.; Schraagen, Johannes Martinus Cornelis

    2011-01-01

    As the use of collaborative online encyclopedias such as Wikipedia grows, so does the need for research on how users evaluate its credibility. In this paper we compare three experimental approaches to study trust in Wikipedia, namely think aloud, eye-tracking, and online questionnaires. The

  5. Know what you trust

    NARCIS (Netherlands)

    Spiessens, F.; den Hartog, Jeremy; Etalle, Sandro; Degano, P.; Guttman, J. D.; Martinelli, F.

    2009-01-01

    In Decentralized Trust Management (DTM) authorization decisions are made by multiple principals who can also delegate decisions to each other. Therefore, a policy change of one principal will often affect who gets authorized by another principal. In such a system of influenceable authorization a

  6. Initial Formation of Trust

    DEFF Research Database (Denmark)

    Schärfe, Henrik; Dougerthery, Elizabeth Ann

    2011-01-01

    In this paper we present a study of how touch may be used as a way of inducing trust in the meeting with a teloperated android, the Geminoid-DK. The use of hapics with Gestalt-based 'Balance Theory' is used as a persuasive desing of the interaction between human and robot. Balance theory includes...

  7. Trust-distrust Balance

    DEFF Research Database (Denmark)

    Jukka, Minna; Blomqvist, Kirsimarja; Li, Peter Ping

    2017-01-01

    notion of "guanxi" as personal ties. In contrast, the Finnish managers' view of trustworthiness was more associated with depersonalized organizational attributes. They emphasized the dimension of integrity, especially promise-keeping. In addition, tentative signs of trust ambivalence, as a balance...... opposites constitute a duality to be managed from the perspective of yin-yang balancing....

  8. Trust Transitivity in Social Networks

    OpenAIRE

    Richters, Oliver; Peixoto, Tiago P.

    2011-01-01

    Non-centralized recommendation-based decision making is a central feature of several social and technological processes, such as market dynamics, peer-to-peer file-sharing and the web of trust of digital certification. We investigate the properties of trust propagation on networks, based on a simple metric of trust transitivity. We investigate analytically the percolation properties of trust transitivity in random networks with arbitrary in/out-degree distributions, and compare with numerical...

  9. Constitutional Verbosity and Social Trust

    DEFF Research Database (Denmark)

    Bjørnskov, Christian; Voigt, Stefan

    2014-01-01

    A common argument in the trust literature is that high-trust cultures allow efficient commercial contracts to be shorter, covering fewer contingencies. We take this idea to the topic of social contracts. Specifically, we ask whether social trust affects the length and detail of constitutions. Cross......-country estimates suggest that national trust levels are indeed robustly and negatively associated with the length of countries’ constitutions....

  10. Trust It or Trash It?

    Science.gov (United States)

    Trust It or Trash It? About | Contact | Español Tab 1 Tab 2 What is Trust It or Trash It? This is a tool ... be true, it may be. (See the second “Trust it” statement above). Click on each element below ...

  11. Creating trust through narrative strategy

    NARCIS (Netherlands)

    Gabbay, SM; Leenders, RTAJ

    In the rational model of trust, an actor's level of trust is a function of the expected gain and loss involved. As a consequence, if A can influence the gain and loss perceived by B, A can influence B's level of trust. In this article we study how A can do this through the strategic use of

  12. Incremental Trust in Grid Computing

    DEFF Research Database (Denmark)

    Brinkløv, Michael Hvalsøe; Sharp, Robin

    2007-01-01

    This paper describes a comparative simulation study of some incremental trust and reputation algorithms for handling behavioural trust in large distributed systems. Two types of reputation algorithm (based on discrete and Bayesian evaluation of ratings) and two ways of combining direct trust and ...... of Grid computing systems....

  13. Creating trust through narrative strategy

    NARCIS (Netherlands)

    Gabbay, SM; Leenders, RTAJ

    2003-01-01

    In the rational model of trust, an actor's level of trust is a function of the expected gain and loss involved. As a consequence, if A can influence the gain and loss perceived by B, A can influence B's level of trust. In this article we study how A can do this through the strategic use of

  14. Trusting Relationships in International Politics

    DEFF Research Database (Denmark)

    Keating, Vincent Charles; Ruzicka, Jan

    2014-01-01

    How can trusting relationships be identified in international politics? The recent wave of scholarship on trust in International Relations answers this question by looking for one or the combination of three indicators – the incidence of cooperation; discourses expressing trust; or the calculated...

  15. Social Capital, Institutions and Trust

    NARCIS (Netherlands)

    Nooteboom, B.

    2006-01-01

    This paper analyzes the relations between social capital, institutions and trust.These concepts are full of ambiguity and confusion.This paper attempts to dissolve some of the confusion, by distinguishing trust and control, and analyzing institutional and relational conditions of trust.It presents a

  16. Trust models in ubiquitous computing.

    Science.gov (United States)

    Krukow, Karl; Nielsen, Mogens; Sassone, Vladimiro

    2008-10-28

    We recapture some of the arguments for trust-based technologies in ubiquitous computing, followed by a brief survey of some of the models of trust that have been introduced in this respect. Based on this, we argue for the need of more formal and foundational trust models.

  17. Modelling biased human trust dynamics

    NARCIS (Netherlands)

    Hoogendoorn, M.; Jaffry, S.W.; Maanen, P.P. van; Treur, J.

    2013-01-01

    Abstract. Within human trust related behaviour, according to the literature from the domains of Psychology and Social Sciences often non-rational behaviour can be observed. Current trust models that have been developed typically do not incorporate non-rational elements in the trust formation

  18. Trust, Endangerment and Divine Vulnerability

    DEFF Research Database (Denmark)

    Christoffersen, Mikkel Gabriel

    2017-01-01

    Faith is trusting God in the midst of endangerment. Yet, human experience of excessive suffering has challenged any spontaneous trust in God. In this article, I reconsider the idea of faith as trust in God, adding an emphasis on the divine vulnerability in the incarnation, and I develop a more...

  19. Children and Broken Homes: Sources for the Teacher.

    Science.gov (United States)

    Bentley, Eloise

    The depreciating attitude toward family life in our society has intensified in the past few years. It is not unusual to find substantial numbers of children in a first grade classroom who live in broken homes. Divorce is the answer for more young couples than ever before, and as a result the children involved must face growing up with a parent…

  20. Unbroken versus broken mirror world: a tale of two vacua

    International Nuclear Information System (INIS)

    Foot, R.; Lew, H.; Volkas, R.R.

    2000-01-01

    If the Lagrangian of nature respects parity invariance then there are two distinct possibilities: either parity is unbroken by the vacuum or it is spontaneously broken. We examine the two simplest phenomenologically consistent gauge models which have unbroken and spontaneously broken parity symmetries, respectively. These two models have a Lagrangian of the same form, but a different parameter range is chosen in the Higgs potential. They both predict the existence of dark matter and can explain the MACHO events. However, the models predict quite different neutrino physics. Although both have light mirror (effectively sterile) neutrinos, the ordinary-mirror neutrino mixing angles are unobservably tiny in the broken parity case. The minimal broken parity model therefore cannot simultaneously explain the solar, atmospheric and LSND data. By contrast, the unbroken parity version can explain all of the neutrino anomalies. Furthermore, we argue that the unbroken case provides the most natural explanation of the neutrino physics anomalies (irrespective of whether evidence from the LSND experiment is included) because of its characteristic maximal mixing prediction. (author)

  1. Enticing arsonists with broken windows and social disorder

    Science.gov (United States)

    Douglas S. Thomas; David T. Butry; Jeffrey P. Prestemon

    2011-01-01

    In criminology, it is well understood that indicators of urban decay, such as abandoned buildings littered with broken windows, provide criminals with signals identifying neighborhoods with lower crime detection and apprehension rates than better maintained neighborhoods. Whether it is the resident population’s sense of apathy, lack of civic pride, or fear of...

  2. Review of "Spend Smart: Fix Our Broken School Funding System"

    Science.gov (United States)

    Baker, Bruce

    2011-01-01

    ConnCAN's Spend Smart: "Fix Our Broken School Funding System" was released concurrently with a bill introduced in the Connecticut legislature, based on the principles outlined in the report. However, the report is of negligible value to the policy debate over Connecticut school finance because it provides little or no support for any of…

  3. Light hadrons in the bag model with broken chiral symmetry

    International Nuclear Information System (INIS)

    Efrosinin, V.P.; Zaikin, D.A.

    1987-01-01

    A version of the bag model with broken chiral symmetry is proposed. A satisfactory description of the experimental data on light hadrons including the pion is obtained. The estimate of the pion-nucleon σ term is given in the framework of this model. The pion and kaon decay constants are calculated. The centre-of-mass motion problem in bag models is discussed

  4. INFLUENCE OF BROKEN ROTOR BARS LOCATION IN THE ...

    African Journals Online (AJOL)

    2013-06-30

    Jun 30, 2013 ... single-phase induction motor by general method coupling field and circuit equations. IEEE. Trans Magnetics 31(3): 1908-1911. [6] Zouzou S. E., Khelif S., Halem N., Sahraoui M, 2011. Analysis of induction motor with broken rotor bars using circuit-field coupled method. International conference on electric.

  5. Mass splittings within composite Goldstone supermultiplets from broken supersymmetry

    International Nuclear Information System (INIS)

    Clark, T.E.; Love, S.T.

    1985-01-01

    The supersymmetric (SUSY) Dashen formulas are modified to include effects of softly broken supersymmetry and are used to compute the mass splittings and differences in decay constants among the various components of a Goldstone supermultiplet. The general results are applied to chiral-symmetry breaking in two-flavor SUSY QCD

  6. Broken Heart Syndrome – An intra operative complication

    Directory of Open Access Journals (Sweden)

    Zara Wani

    2018-03-01

    Full Text Available We report a case of Broken Heart Syndrome in a 56 year old Postmenopausal woman suffered while undergoing simple biopsy procedure for vocal cord polyp that lead to physical, mental and financial burden both for the patient as well as the doctors. A team of cardiologists based on clinical and echocardiographic findings made the diagnosis of this case.

  7. The Condition for Generous Trust.

    Directory of Open Access Journals (Sweden)

    Obayashi Shinya

    Full Text Available Trust has been considered the "cement" of a society and is much studied in sociology and other social sciences. Most studies, however, have neglected one important aspect of trust: it involves an act of forgiving and showing tolerance toward another's failure. In this study, we refer to this concept as "generous trust" and examine the conditions under which generous trust becomes a more viable option when compared to other types of trust. We investigate two settings. First, we introduce two types of uncertainties: uncertainty as to whether trustees have the intention to cooperate, and uncertainty as to whether trustees have enough competence to accomplish the entrusted tasks. Second, we examine the manner in which trust functions in a broader social context, one that involves matching and commitment processes. Since we expect generosity or forgiveness to work differently in the matching and commitment processes, we must differentiate trust strategies into generous trust in the matching process and that in the commitment process. Our analytical strategy is two-fold. First, we analyze the "modified" trust game that incorporates the two types of uncertainties without the matching process. This simplified setting enables us to derive mathematical results using game theory, thereby giving basic insight into the trust mechanism. Second, we investigate socially embedded trust relationships in contexts involving the matching and commitment processes, using agent-based simulation. Results show that uncertainty about partner's intention and competence makes generous trust a viable option. In contrast, too much uncertainty undermines the possibility of generous trust. Furthermore, a strategy that is too generous cannot stand alone. Generosity should be accompanied with moderate punishment. As for socially embedded trust relationships, generosity functions differently in the matching process versus the commitment process. Indeed, these two types of generous

  8. Four Essential Practices for Building Trust

    Science.gov (United States)

    Combs, Julie Peterson; Harris, Sandra; Edmonson, Stacey

    2015-01-01

    The presence of trust can enhance an organization's efforts to fulfill its mission, and the lack of trust can constrict those efforts. The authors offer four essential guidelines to help school leaders communicate in a way that builds trust. Build trust by understanding trust. Trusted leaders demonstrate care, character, and competence in their…

  9. Homo economicus belief inhibits trust.

    Directory of Open Access Journals (Sweden)

    Ziqiang Xin

    Full Text Available As a foundational concept in economics, the homo economicus assumption regards humans as rational and self-interested actors. In contrast, trust requires individuals to believe partners' benevolence and unselfishness. Thus, the homo economicus belief may inhibit trust. The present three experiments demonstrated that the direct exposure to homo economicus belief can weaken trust. And economic situations like profit calculation can also activate individuals' homo economicus belief and inhibit their trust. It seems that people's increasing homo economicus belief may serve as one cause of the worldwide decline of trust.

  10. Trust and Sensemaking in Organizations

    DEFF Research Database (Denmark)

    Fuglsang, Lars; Jagd, Søren; Olsen, Poul Bitsch

    The literature on trust and the literature on sensemaking constitute two separate streams of literature that are both seen as highly relevant to understanding organisational processes in modern complex high-trust organisations. However, though a few studies have argued for the relevance of linkin...... help furthering the understanding of trust processes in organizations. The variety of links between sensemaking and trust processes is illustrated by the intertwining of trust and four processes of sensemaking: arguing, expecting, committing and manipulation identified by Karl Weick....

  11. Modeling trust context in networks

    CERN Document Server

    Adali, Sibel

    2013-01-01

    We make complex decisions every day, requiring trust in many different entities for different reasons. These decisions are not made by combining many isolated trust evaluations. Many interlocking factors play a role, each dynamically impacting the others.? In this brief, 'trust context' is defined as the system level description of how the trust evaluation process unfolds.Networks today are part of almost all human activity, supporting and shaping it. Applications increasingly incorporate new interdependencies and new trust contexts. Social networks connect people and organizations throughout

  12. Homo Economicus Belief Inhibits Trust

    Science.gov (United States)

    Xin, Ziqiang; Liu, Guofang

    2013-01-01

    As a foundational concept in economics, the homo economicus assumption regards humans as rational and self-interested actors. In contrast, trust requires individuals to believe partners’ benevolence and unselfishness. Thus, the homo economicus belief may inhibit trust. The present three experiments demonstrated that the direct exposure to homo economicus belief can weaken trust. And economic situations like profit calculation can also activate individuals’ homo economicus belief and inhibit their trust. It seems that people’s increasing homo economicus belief may serve as one cause of the worldwide decline of trust. PMID:24146907

  13. HMM-based Trust Model

    DEFF Research Database (Denmark)

    ElSalamouny, Ehab; Nielsen, Mogens; Sassone, Vladimiro

    2010-01-01

    Probabilistic trust has been adopted as an approach to taking security sensitive decisions in modern global computing environments. Existing probabilistic trust frameworks either assume fixed behaviour for the principals or incorporate the notion of ‘decay' as an ad hoc approach to cope...... with their dynamic behaviour. Using Hidden Markov Models (HMMs) for both modelling and approximating the behaviours of principals, we introduce the HMM-based trust model as a new approach to evaluating trust in systems exhibiting dynamic behaviour. This model avoids the fixed behaviour assumption which is considered...... the major limitation of existing Beta trust model. We show the consistency of the HMM-based trust model and contrast it against the well known Beta trust model with the decay principle in terms of the estimation precision....

  14. Problems of judiciary trust

    Directory of Open Access Journals (Sweden)

    Vuković Slobodan

    2007-01-01

    Full Text Available Topic of the article is problem of trust in judiciary as a most important part of legal system. For all empirical researches so far have shown very law degree of this trust many authors were searching for the causes of this phenomenon. Among multifold causes some are special worth while to be mentioned here: historical inheritance, political pressures, delaying of judiciary decisions, respect of the laws, transferring of responsibility from political power to the judiciary, public comments of judiciary decisions, media pressures, efficiency of judiciary and police. Among inner factors author pays attention to competency of judges, modes of penal policy, modes of judges’ entitlement, problems of communication, involvement into criminal and corruptional affairs, etc.

  15. Trust and Corruption

    DEFF Research Database (Denmark)

    Graeff, Peter; Svendsen, Gert Tinggaard

    2013-01-01

    Why are the Scandinavian countries in the European Union significantly richer than South-ern/Eastern European countries? We try to answer this question from an empirical social capital perspective. In particular, we are interested in the interplay of social trust as a positive and corruption...... capital by applying a path model that accounts for Granger-like causal effects. Our empirical results, referring to a sample of up to 25 EU countries, show that corruption might harm poor European countries but is not able to affect social trust. However, corruption in itself means that resources end up...... in the wrong places and not in socioeconomically optimal investments. There is, therefore, a direct damaging effect of corruption on wealth. This implies that economic actors have to invest higher transaction and control costs which will bind resources to non-productive purposes and thus destroy economic...

  16. Trust in Internet Election

    DEFF Research Database (Denmark)

    Markussen, Randi; Ronquillo, Lorena; Schürmann, Carsten

    2014-01-01

    This paper discusses the Decryption and Counting Ceremony held in conjunction with the internet voting trial on election day in the Ministry of Local Government and Regional Development of Norway in 2013. We examine the organizers' ambition of making the decryption and counting of electronic votes...... public in order to sustain trust in internet voting. We introduce a pragmatic approach to trust that emphasises the inseparability of truth from witnessing it. Based on this and on a description of how the event was made observable and how the complexities in the counting process were disclosed, we...... discuss what we term economy of truth from the perspective of the IT community involved in the ceremony. We claim that broadening the economy of truth by including more explicitly social and political perspectives in the ceremony, and in internet elections in general, and how witnessing is brought about...

  17. Free Riding or Trust?

    DEFF Research Database (Denmark)

    Svendsen, Gert Tinggaard; Nilsson, Jerker

    2011-01-01

    It is often observed that members have little interest in monitoring their cooperatives. One explanation is that the members are free-riders, hoping that others will perform the task. Another explanation is that the weak member interest is a consequence of members having trust in the leadership....... These competing explanations refer to the theory of collective action and the social capital paradigm, respectively, and may be linked to the classical Gesellschaft and Gemeinschaft concepts. Hence, one may expect free-rider behavior when conditions of Gesellschaft exist and trustful behavior when Gemeinschaft...... conditions rule. These propositions get support from five studies of members’ readership of their cooperatives’ annual reports. In large and heterogeneous memberships there is free-riding behavior, which explains the members’ low interest in governing their cooperatives. To a limited extent a membership may...

  18. Trust in Digital Repositories

    Directory of Open Access Journals (Sweden)

    Elizabeth Yakel

    2013-06-01

    Full Text Available ISO 16363:2012, Space Data and Information Transfer Systems - Audit and Certification of Trustworthy Digital Repositories (ISO TRAC, outlines actions a repository can take to be considered trustworthy, but research examining whether the repository’s designated community of users associates such actions with trustworthiness has been limited. Drawing from this ISO document and the management and information systems literatures, this paper discusses findings from interviews with 66 archaeologists and quantitative social scientists. We found similarities and differences across the disciplines and among the social scientists. Both disciplinary communities associated trust with a repository’s transparency. However, archaeologists mentioned guarantees of preservation and sustainability more frequently than the social scientists, who talked about institutional reputation. Repository processes were also linked to trust, with archaeologists more frequently citing metadata issues and social scientists discussing data selection and cleaning processes. Among the social scientists, novices mentioned the influence of colleagues on their trust in repositories almost twice as much as the experts. We discuss the implications our findings have for identifying trustworthy repositories and how they extend the models presented in the management and information systems literatures.

  19. Lessons learned

    International Development Research Centre (IDRC) Digital Library (Canada)

    In addition, it provided an opportunity to share knowledge from ongoing research activities and give policymakers more background on adaptation to climate change. Participants identified lack of trust as a key barrier to effective communication among scientists, jour- nalists, and policymakers. Policymakers see scientists.

  20. Lessons learned

    International Development Research Centre (IDRC) Digital Library (Canada)

    ing methods suggests that working with traditional knowledge providers can extend the reach of climate information to ... be accompanied by decision aids and complementary information, updated over the season. Farmers need ... decision-making tools. Making high quality, reliable data accessible builds trust in users and ...

  1. Duality transformation of a spontaneously broken gauge theory

    International Nuclear Information System (INIS)

    Mizrachi, L.

    1981-04-01

    Duality transformation for a spontaneously broken gauge theory is constructed in the CDS gauge (xsub(μ)Asub(μ)sup(a)=0). The dual theory is expressed in terms of dual potentials which satisfy the same gauge condition, but with g→ 1 /g. Generally the theory is not self dual but in the weak coupling region (small g), self duality is found for the subgroup which is not spontaneously broken or in regions where monopoles and vortices are concentrated (in agreement with t'Hooft's ideas that monopoles and vortices in the Georgi-Glashow model make it self dual). In the strong coupling regime a systematic strong coupling expansion can be written. For this region the dual theory is generally not local gauge invariant, but it is invariant under global gauge transformations. (author)

  2. Theoretical studies of radiative properties of broken clouds

    International Nuclear Information System (INIS)

    Titov, G.A.

    1994-01-01

    One of the three goals of the Atmospheric Radiation Measurement (ARM) Program is to improve the quality of radiation models under clear sky, homogeneous cloud, and broken cloud conditions. This report is concerned with the development of the theory of radiation transfer in the broken clouds. Our approach is based on a stochastic description of the interaction between the radiation and cloud field with stochastic geometry; In the following, we discuss (1) the mean radiation fluxes in the near IR spectral range 2.7 to 3.2 μm; (2) the influence of random geometry of individual cumulus clouds on the mean fluxes of visible solar radiation; (3) the equations of the mean radiance in the statistically inhomogeneous cloud fields

  3. Broken Esophageal Stent Successfully Treated by Interventional Radiology Technique

    International Nuclear Information System (INIS)

    Zelenak, Kamil; Mistuna, Dusan; Lucan, Jaroslav; Polacek, Hubert

    2010-01-01

    Esophageal stent fractures occur quite rarely. A 61-year-old male patient was previously treated for rupture of benign stenosis, occurring after dilatation, by implanting an esophageal stent. However, a year after implantation, the patient suffered from dysphagia caused by the broken esophageal stent. He was treated with the interventional radiology technique, whereby a second implantation of the esophageal stent was carried out quite successfully.

  4. Octonionic gauge theory from spontaneously broken SO(8)

    International Nuclear Information System (INIS)

    Lassig, C.C.; Joshi, G.C.

    1995-01-01

    An attempt is made to construct a gauge theory based on a bimodular representation of the octonion algebra, the non associativity of which is manifested as a non-closure of the bimodule algebra. It is found that this fact leads to gauge-noninvariance of the theory. However, the bimodule algebra can be embedded in SO(8), the gauge theory of which can be broken down to give a massless SO(7) theory together with a massive octonionic gauge theory. 7 refs

  5. Weak interaction models with spontaneously broken left-right symmetry

    International Nuclear Information System (INIS)

    Mohapatra, R.H.

    1978-01-01

    The present status of weak interaction models with spontaneously broken left-right symmetry is reviewed. The theoretical basis for asymptotic parity conservation, manifest left-right symmetry in charged current weak interactions, natural parity conservation in neutral currents and CP-violation in the context of SU(2)/sub L/ circled x SU (2)/sub R/ circled x U(1) models are outlined in detail. Various directions for further research in the theoretical and experimental side are indicated

  6. Mass Formulae for Broken Supersymmetry in Curved Space-Time

    CERN Document Server

    Ferrara, Sergio

    2016-01-01

    We derive the mass formulae for ${\\cal N}=1$, $D=4$ matter-coupled Supergravity for broken (and unbroken) Supersymmetry in curved space-time. These formulae are applicable to de Sitter configurations as is the case for inflation. For unbroken Supersymmetry in anti-de Sitter (AdS) one gets the mass relations modified by the AdS curvature. We compute the mass relations both for the potential and its derivative non-vanishing.

  7. Determining reactor fuel elements broken by Cerenkov counting

    International Nuclear Information System (INIS)

    Guo Juhao; Dong Shiyuan; Feng Yuying

    1996-01-01

    The basis and method of determining fuel elements broken in a reactor by Cerenkov counting measured with liquid scintillation spectrometer are introduced. The radioactive characteristic of the radiation nuclides generating Cherenkov radiation in the primary water of 200 MW nuclear district heating reactor is analyzed. The activity of the activation products in the primary water and the fission products in the fuel elements are calculated. A feasibility of Cerenkov counting measure was analyzed. This method is simple and quick

  8. Mental Suffering in Protracted Political Conflict: Feeling Broken or Destroyed.

    Science.gov (United States)

    Barber, Brian K; McNeely, Clea A; El Sarraj, Eyad; Daher, Mahmoud; Giacaman, Rita; Arafat, Cairo; Barnes, William; Abu Mallouh, Mohammed

    2016-01-01

    This mixed-methods exploratory study identified and then developed and validated a quantitative measure of a new construct of mental suffering in the occupied Palestinian territory: feeling broken or destroyed. Group interviews were conducted in 2011 with 68 Palestinians, most aged 30-40, in the West Bank, East Jerusalem, and the Gaza Strip to discern local definitions of functioning. Interview participants articulated of a type of suffering not captured in existing mental health instruments used in regions of political conflict. In contrast to the specific difficulties measured by depression and PTSD (sleep, appetite, energy, flashbacks, avoidance, etc.), participants elaborated a more existential form of mental suffering: feeling that one's spirit, morale and/or future was broken or destroyed, and emotional and psychological exhaustion. Participants articulated these feelings when describing the rigors of the political and economic contexts in which they live. We wrote survey items to capture these sentiments and administered these items-along with standard survey measures of mental health-to a representative sample of 1,778 32-43 year olds in the occupied Palestinian territory. The same survey questions also were administered to a representative subsample (n = 508) six months earlier, providing repeated measures of the construct. Across samples and time, the feeling broken or destroyed scale: 1) comprised a separate factor in exploratory factor analyses, 2) had high inter-item consistency, 3) was reported by both genders and in all regions, 4) showed discriminate validity via moderate correlations with measures of feelings of depression and trauma-related stress, and 5) was more commonly experienced than either feelings of depression or trauma-related stress. Feeling broken or destroyed can be reliably measured and distinguished from conventional measures of mental health. Such locally grounded and contextualized measures should be identified and included in

  9. Deep inelastic scattering in spontaneously broken gauge models

    International Nuclear Information System (INIS)

    Goloskokov, S.V.; Mikhov, S.G.; Morozov, P.T.; Stamenov, D.B.

    1975-01-01

    Deep inelastic lepton hadron scattering in the simplest spontaneously broken symmetry (the Kibble model) is analyzed. A hypothesis that the invariant coupling constant of the quartic selfinteraction for large spacelike momenta tends to a finite asymptotic value without spoiling the asymptotic freedom for the invariant coupling constant of the Yang-Mills field is used. It is shown that Biorken scaling for the moments of the structure functions of the deep inelastic lepton hadron scattering is violated by powers of logarithms

  10. Perilaku Komunikasi antara Guru dengan Siswa Broken Home

    Directory of Open Access Journals (Sweden)

    Emilsyah Nur

    2017-12-01

    Full Text Available Penelitian yang dilakukan merupakan penelitian kualitatif yang menggunakan beberapa informan sebagai narasumber untuk menjawab permasalahan tentang opini publik terhadap komunikasi interpersonal dalam mengatasi orang tua broken home. Hasil penelitian menunjukkan bahwa perilaku komunikasi siswa broken home di sekolah belum sepenuhnya efektif. Hal ini disebabkan oleh: intensitas komunikasi antara orang tua dan anak yang masih kurang sehingga anak enggan untuk terbuka kepada orang tuanya mengenai prestasi belajar. Kurangnya dukungan, rasa empati serta sikap positif yang diberikan orang tua kepada anak juga mempengaruhi hubungan interpersonal diantara orang tua dan anak yang menyebabkan anak lebih terbuka kepada teman atau kerabatnya daripada orang tuanya sendiri.Kesetaraan antara orang tua dan anak masih kurang. Perilaku komunikasi yang demikian sangat berpengaruh terhadap perilaku anak di sekolah. Beberapa faktor yang menghambat prilaku komunikasi siswa broken home  diantaranya yaitu  orang tua yang kurang bisa membagi waktu antara pekerjaan dan memberikan perhatian kepada anak di rumah sehingga komunikasi dengan anak tidak berjalan dengan lancar, sikap acuh tak acuh yang ditunjukkan orang tua membuat anak menjauhkan diri dan tidak terbuka kepada orang tua dan ketidakterbukaan siswa terhadap Guru.

  11. Broken instrument retrieval with indirect ultrasonics in a primary molar.

    Science.gov (United States)

    Pk, Musale; Sc, Kataria; As, Soni

    2016-02-01

    The separation of a file during pulpectomy is a rare incident in primary teeth due to inherently wider and relatively straighter root canals. A broken instrument hinders the clinician from optimal preparation and obturation of the root canal system invariably leading to failure, although in such teeth, an extraction followed by suitable space maintenance is considered as the treatment of choice. This case report demonstrates successful nonsurgical retrieval of a separated H file fragment in 84. A 7-year-old girl was referred to the Department of Paedodontics and Preventive Dentistry for endodontic management of a primary tooth 84 with a dento-alveolar abscess. Her medical history was noncontributory. After diagnosing a broken H file in the mesio-lingual canal, the tooth was endodontically treated in two appointments. At the first session, a broken file was successfully retrieved after using low intensity ultrasonic vibrations through a DG 16 endodontic explorer viewed under an operating microscope. After abscess resolution, Vitapex root canal obturation with a preformed metal crown cementation was completed at a second session. The patient was recalled at 3, 6, 12 and 15 month interval and reported to be clinically asymptomatic and radiographically with complete furcal healing. Integration of microscopes and ultrasonics in paediatric dental practice has made it possible to save such teeth with a successful outcome. Favourable location of the separated file, relatively straighter root canal system and patient cooperation resulted in successful nonsurgical management in this case.

  12. Developing Trusting Relationships Through Communication

    OpenAIRE

    YOKOYAMA, Izumi; OBARA, Takuya

    2015-01-01

    In this paper, we analyze the formation of trusting relationships between people through communication. To foster trusting relationships, individuals should disclose private and personal information. However, disclosing such information has both costs and benefits; therefore, both parties must decide on the optimal level of self-disclosure based on a variety of factors, such as the existing level of relationship and the benefits of deepening the trust level. We construct an economics model th...

  13. Trust for intelligent recommendation

    CERN Document Server

    Bhuiyan, Touhid

    2013-01-01

    Recommender systems are one of the recent inventions to deal with the ever-growing information overload in relation to the selection of goods and services in a global economy. Collaborative Filtering (CF) is one of the most popular techniques in recommender systems. The CF recommends items to a target user based on the preferences of a set of similar users known as the neighbors, generated from a database made up of the preferences of past users. In the absence of these ratings, trust between the users could be used to choose the neighbor for recommendation making. Better recommendations can b

  14. Pricing and Trust

    DEFF Research Database (Denmark)

    Huck, Steffen; Ruchala, Gabriele K.; Tyran, Jean-Robert

    -competitive (monopolistic) markets. We then introduce a regulated intermediate price above the oligopoly price and below the monopoly price. The effect in monopolies is more or less in line with standard intuition. As price falls volume increases and so does quality, such that overall efficiency is raised by 50%. However......We experimentally examine the effects of flexible and fixed prices in markets for experience goods in which demand is driven by trust. With flexible prices, we observe low prices and high quality in competitive (oligopolistic) markets, and high prices coupled with low quality in non...

  15. Trust and Social Intelligence

    OpenAIRE

    Yamagishi , Toshio

    2011-01-01

    Part 1: Extended Abstracts for Keynote Speakers; International audience; One of the strongest expression of generalized distrust – i.e., distrust of human nature in general – can be found in a Japanese proverb, “Its best to regard everyone as a thief” (hito wo mitara dorobo to omoe). An expression of the other extreme, generalized trust, can also be found in another Japanese proverb, “you will never meet a devil as you walk through the social world” (wataru seken ni oni ha nai). I asked about...

  16. Designing High-Trust Organizations

    DEFF Research Database (Denmark)

    Jagd, Søren

    The specific problem considered in this paper is what are the key issues to consider for managers involved in designing high-trust organizations, a design problem still not properly explored. This paper intends to take the first step in filling this lacuna. In the paper, I first present...... the existing management and research literature on building high-trust organizations. Then I explore Alan Fox’s (1974) analysis of low-trust vs. high-trust dynamics which, I argue, may serve as a theoretically stronger basis for understanding the issues management have to consider when designing hightrust...... organizations...

  17. Mediating Trust in Terrorism Coverage

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    crisis. While the framework is presented in the context of television coverage of a terror-related crisis situation, it can equally be used in connection with all other forms of mediated trust. Key words: National crisis, risk communication, crisis management, television coverage, mediated trust.......Mass mediated risk communication can contribute to perceptions of threats and fear of “others” and/or to perceptions of trust in fellow citizens and society to overcome problems. This paper outlines a cross-disciplinary holistic framework for research in mediated trust building during an acute...

  18. Attack-Resistant Trust Metrics

    Science.gov (United States)

    Levien, Raph

    The Internet is an amazingly powerful tool for connecting people together, unmatched in human history. Yet, with that power comes great potential for spam and abuse. Trust metrics are an attempt to compute the set of which people are trustworthy and which are likely attackers. This chapter presents two specific trust metrics developed and deployed on the Advogato Website, which is a community blog for free software developers. This real-world experience demonstrates that the trust metrics fulfilled their goals, but that for good results, it is important to match the assumptions of the abstract trust metric computation to the real-world implementation.

  19. Trust as a Critical Concept

    DEFF Research Database (Denmark)

    Bordum, Anders

    2004-01-01

    In this articlei I will argue that trust is a fundamental and critical concept because trust is the direct or transcendental constitutive ground of most social phenomena, as well as applicable as an operational method in critical theory. There are two different but overlapping positions on trust I...... address in this article. One is the standpoint we find in business strategy, that trust is naïve to show, and control or contracts are presumed better. In the strategy game the idealistic good guys seems to lose (Arrow 1974), (Williamson 1975). The other position is the position taken by systems theory...

  20. Consumer Trust in Information Sources

    Directory of Open Access Journals (Sweden)

    Brad Love

    2013-06-01

    Full Text Available Trust is essential to understanding public reaction to innovative issues. This research focuses on trust in information sources by explicating the construct of trust and testing a comprehensive model on several information sources about genetically modified foods. Results from a survey of 369 participants reveal the significance of projecting competence and the role of the environment in which a target public receives information. Perceptions of regulatory, social, business, and technical environments affect how likely individuals are to follow advice from institutions like the Food and Drug Administration and the news media. Future research should incorporate knowledge levels and personal relevance as variables likely to influence trusting relationships.

  1. Broken rice kernels and the kinetics of rice hydration and texture during cooking.

    Science.gov (United States)

    Saleh, Mohammed; Meullenet, Jean-Francois

    2013-05-01

    During rice milling and processing, broken kernels are inevitably present, although to date it has been unclear as to how the presence of broken kernels affects rice hydration and cooked rice texture. Therefore, this work intended to study the effect of broken kernels in a rice sample on rice hydration and texture during cooking. Two medium-grain and two long-grain rice cultivars were harvested, dried and milled, and the broken kernels were separated from unbroken kernels. Broken rice kernels were subsequently combined with unbroken rice kernels forming treatments of 0, 40, 150, 350 or 1000 g kg(-1) broken kernels ratio. Rice samples were then cooked and the moisture content of the cooked rice, the moisture uptake rate, and rice hardness and stickiness were measured. As the amount of broken rice kernels increased, rice sample texture became increasingly softer (P hardness was negatively correlated to the percentage of broken kernels in rice samples. Differences in the proportions of broken rice in a milled rice sample play a major role in determining the texture properties of cooked rice. Variations in the moisture migration kinetics between broken and unbroken kernels caused faster hydration of the cores of broken rice kernels, with greater starch leach-out during cooking affecting the texture of the cooked rice. The texture of cooked rice can be controlled, to some extent, by varying the proportion of broken kernels in milled rice. © 2012 Society of Chemical Industry.

  2. Generalized Trust and Trust in Institutions in Confucian Asia

    Science.gov (United States)

    Tan, Soo Jiuan; Tambyah, Siok Kuan

    2011-01-01

    This study examines generalized trust and trust in institutions in Confucian Asia, covering six countries namely, China, Japan, Singapore, South Korea, Taiwan and Vietnam, and one dependent region, Hong Kong. Using data from the 2006 AsiaBarometer Survey, our study affirms the reliability and validity of using a two-item scale to measure…

  3. TrustBuilder2: A Reconfigurable Framework for Trust Negotiation

    Science.gov (United States)

    Lee, Adam J.; Winslett, Marianne; Perano, Kenneth J.

    To date, research in trust negotiation has focused mainly on the theoretical aspects of the trust negotiation process, and the development of proof of concept implementations. These theoretical works and proofs of concept have been quite successful from a research perspective, and thus researchers must now begin to address the systems constraints that act as barriers to the deployment of these systems. To this end, we present TrustBuilder2, a fully-configurable and extensible framework for prototyping and evaluating trust negotiation systems. TrustBuilder2 leverages a plug-in based architecture, extensible data type hierarchy, and flexible communication protocol to provide a framework within which numerous trust negotiation protocols and system configurations can be quantitatively analyzed. In this paper, we discuss the design and implementation of TrustBuilder2, study its performance, examine the costs associated with flexible authorization systems, and leverage this knowledge to identify potential topics for future research, as well as a novel method for attacking trust negotiation systems.

  4. 'Trust my doctor, trust my pancreas': trust as an emergent quality of social practice.

    Science.gov (United States)

    Cohn, Simon

    2015-06-11

    Growing attention is being paid to the importance of trust, and its corollaries such as mistrust and distrust, in health service and the central place they have in assessments of quality of care. Although initially focussing on doctor-patient relationships, more recent literature has broadened its remit to include trust held in more abstract entities, such as organisations and institutions. There has consequently been growing interest to develop rigorous and universal measures of trust. Drawing on illustrative ethnographic material from observational research in a UK diabetes clinic, this paper supports an approach that foregrounds social practice and resists conceiving trust as solely a psychological state that can be divorced from its context. Beyond exploring the less-than-conscious nature of trust, the interpretations attend to the extent to which trust practices are distributed across a range of actors. Data from clinical encounters reveal the extent to which matters of trust can emerge from the relationships between people, and sometimes people and things, as a result of a wide range of pragmatic concerns, and hence can usefully be conceived of as an extended property of a situation rather than a person. Trust is rarely explicitly articulated, but remains a subtle feature of experience that is frequently ineffable. A practice approach highlights some of the problems with adopting a general psychological or intellectualist conception of trust. In particular, assuming it is a sufficiently stable internal state that can be stored or measured not only transforms a diffuse and often ephemeral quality into a durable thing, but ultimately presents it as a generic state that has meaning independent of the specific relationships and context that achieve it. Emphasising the context-specific nature of trust practices does not dismiss the potential of matters of trust, when they emerge, to be transposed to other contexts. But it does highlight how, on each occasion

  5. The Need to Trust and to Trust More Wisely in Academe

    Science.gov (United States)

    Bowman, Richard F.

    2012-01-01

    Where trust is an issue, there is no trust. Trust in diverse organizations has never been lower. A shadow of doubt stalks one's every decision to trust collegially and institutionally. Still, colleagues sense intuitively that institutions cannot function optimally without a bedrock level of trust. In academic life, trust is a form of social…

  6. 26 CFR 26.2654-1 - Certain trusts treated as separate trusts.

    Science.gov (United States)

    2010-04-01

    ... trusts under local law, treatment of a single trust as separate trusts under this paragraph (a)(1) does... applicable state law, then each resulting trust is treated as a separate trust for purposes of Chapter 13... Internal Revenue Code, if those portions are not treated as separate trusts under local law. Also...

  7. International trust and public diplomacy

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    2015-01-01

    National leaders struggle to communicate in ways that are perceived as trustworthy by citizens of other nations because trust is linked to efficiency, business opportunities, and political influence. In this article, four recent public diplomacy activities are analyzed from a trust...

  8. Towards trusted trade-lanes

    NARCIS (Netherlands)

    Hulstijn, J.; Hofman, W.; Zomer, G.; Tan, Y.H.

    2016-01-01

    Customs administrations are exploring system-based approaches to regulatory supervision, taking the entire set of controls in a process into account. In addition to Trusted Traders, which are recognized by a certification process, customs are considering to identify so called Trusted Trade Lanes:

  9. Research of Trust Chain of Operating System

    Science.gov (United States)

    Li, Hongjiao; Tian, Xiuxia

    Trust chain is one of the key technologies in designing secure operating system based on TC technology. Constructions of trust chain and trust models are analyzed. Future works in these directions are discussed.

  10. Trusted computing strengthens cloud authentication.

    Science.gov (United States)

    Ghazizadeh, Eghbal; Zamani, Mazdak; Ab Manan, Jamalul-lail; Alizadeh, Mojtaba

    2014-01-01

    Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM). Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM) are great technologies for solving the trust and security concerns in the cloud identity environment. Single sign-on (SSO) and OpenID have been released to solve security and privacy problems for cloud identity. This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in .Net environment. Security analyzing, simulation, and BLP confidential model are three ways to evaluate and analyze our proposed model.

  11. Trusted Computing Strengthens Cloud Authentication

    Directory of Open Access Journals (Sweden)

    Eghbal Ghazizadeh

    2014-01-01

    Full Text Available Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM. Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM are great technologies for solving the trust and security concerns in the cloud identity environment. Single sign-on (SSO and OpenID have been released to solve security and privacy problems for cloud identity. This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in .Net environment. Security analyzing, simulation, and BLP confidential model are three ways to evaluate and analyze our proposed model.

  12. Trusted Computing Strengthens Cloud Authentication

    Science.gov (United States)

    2014-01-01

    Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM). Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM) are great technologies for solving the trust and security concerns in the cloud identity environment. Single sign-on (SSO) and OpenID have been released to solve security and privacy problems for cloud identity. This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in .Net environment. Security analyzing, simulation, and BLP confidential model are three ways to evaluate and analyze our proposed model. PMID:24701149

  13. The proterozoic Georgetown Province - a Broken Hill analogue

    International Nuclear Information System (INIS)

    Carr, G.R.

    2000-01-01

    Collaborative work between CSIRO and AGSO has resulted in the development of a Pb isotope model that attempts to place relatively precise (∼5 Ma) age constraints on Proterozoic mineralisation in the Mount Isa and McArthur River terrains (Sun et al., 1994). Although this model was developed for sediment hosted mineralisation in low grade metamorphic terrains, the CSIRO-AGSO model ages for other mineralisation in high-grade terrains such as Broken Hill appear to be consistent with the U-Pb zircon ages obtained for the high-grade host sequences. Without independent evidence that the model is applicable to such terrains, the observations cannot be used to indicate the age of the mineralisation. Lead isotope data obtained on potassium feldspar separates from five felsic intrusive samples in the Georgetown terrain show a wide range of Pb isotope ratios. The lowest 206 Pb/ 204 Pb analyses are considered to approximate to the Proterozoic initial ratio and indicate a model age of ∼1510 Ma based on the CSIRO-AGSO model. This age is 45 Ma younger than the crystallisation age of the granite, but must be considered a minimum as the initial 206 Pb/ 204 Pb ratio may well prove to be lower after more comprehensive analysis. Sulfide mineralisation within the Einasleigh Metamorphics has a wide range of 206 Pb/ 204 Pb ratios that lie between this granite value and the relatively homogeneous population from Railway Flat. The Railway Flat data are very similar to values for Broken Hill and also the Broken Hill-type Pegmont mineralisation in the Mount Isa Eastern Succession. These data all have significantly lower 207 Pb/ 204 Pb ratios than the CSIRO-AGSO model, suggesting a significantly different source rock environment for this style of mineralisation from that for the sediment hosted deposits

  14. Massive Kaluza-Klein theories and their spontaneously broken symmetries

    International Nuclear Information System (INIS)

    Hohm, O.

    2006-07-01

    In this thesis we investigate the effective actions for massive Kaluza-Klein states, focusing on the massive modes of spin-3/2 and spin-2 fields. To this end we determine the spontaneously broken gauge symmetries associated to these 'higher-spin' states and construct the unbroken phase of the Kaluza-Klein theory. We show that for the particular background AdS 3 x S 3 x S 3 a consistent coupling of the first massive spin-3/2 multiplet requires an enhancement of local supersymmetry, which in turn will be partially broken in the Kaluza-Klein vacuum. The corresponding action is constructed as a gauged maximal supergravity in D=3. Subsequently, the symmetries underlying an infinite tower of massive spin-2 states are analyzed in case of a Kaluza-Klein compactification of four-dimensional gravity to D=3. It is shown that the resulting gravity-spin-2 theory is given by a Chern-Simons action of an affine algebra and also allows a geometrical interpretation in terms of 'algebra-valued' differential geometry. The global symmetry group is determined, which contains an affine extension of the Ehlers group. We show that the broken phase can in turn be constructed via gauging a certain subgroup of the global symmetry group. Finally, deformations of the Kaluza-Klein theory on AdS 3 x S 3 x S 3 and the corresponding symmetry breakings are analyzed as possible applications for the AdS/CFT correspondence. (Orig.)

  15. Experimental study for sensorless broken bar detection in induction motors

    International Nuclear Information System (INIS)

    Calis, Hakan; Cakir, Abduelkadir

    2008-01-01

    This study presents experimental results of sensorless broken bar detection in induction motors based on fluctuations of the stator current zero crossing instants before actual breakdown occurs. These fluctuations are sensed by a microcontroller (μC), and transferred to a computer for monitoring the amplitude changes on specific frequency components using fast Fourier transformation algorithms. The motor current signal is also monitored for verification purposes. The main reasons of rotor faults are broken bars, end ring faults and bearing faults. Most recent efforts are focusing on current spectrum analysis, as the current signal is easily accessible for all induction motors. Instead of sampling motor current with a high resolution analog to digital converter, zero crossing instants are recorded as the waveforms cross zero. Fluctuations in the intervals between successive zero crossings of the three phase current waveforms are analyzed in the frequency domain. Broken bars and end ring breakages, supply unbalances, rotor eccentricities and shaft misalignment faults are distinguished by monitoring amplitude changes of the 2sf, f r , and 2f spectral components, where s is the motor slip, f is supply frequency and f r is rotor speed. Appearance of only the 2sf component in zero crossing times (ZCT) of the signal spectrum implies rotor faults. The 2f component occurs only when supply is unbalanced or in the case of stator winding faults. Separation of these two faults is implemented by monitoring both components. In addition, when there is additional rotor eccentricity due to bearing deterioration or shaft misalignment, it is also necessary to monitor the f r fault signature component to distinguish mixed faults. It may be necessary to include additional signals such as motor vibration or temperature to extend the reliability of the fault detection system for critical machines

  16. Massive Kaluza-Klein theories and their spontaneously broken symmetries

    Energy Technology Data Exchange (ETDEWEB)

    Hohm, O.

    2006-07-15

    In this thesis we investigate the effective actions for massive Kaluza-Klein states, focusing on the massive modes of spin-3/2 and spin-2 fields. To this end we determine the spontaneously broken gauge symmetries associated to these 'higher-spin' states and construct the unbroken phase of the Kaluza-Klein theory. We show that for the particular background AdS{sub 3} x S{sup 3} x S{sup 3} a consistent coupling of the first massive spin-3/2 multiplet requires an enhancement of local supersymmetry, which in turn will be partially broken in the Kaluza-Klein vacuum. The corresponding action is constructed as a gauged maximal supergravity in D=3. Subsequently, the symmetries underlying an infinite tower of massive spin-2 states are analyzed in case of a Kaluza-Klein compactification of four-dimensional gravity to D=3. It is shown that the resulting gravity-spin-2 theory is given by a Chern-Simons action of an affine algebra and also allows a geometrical interpretation in terms of 'algebra-valued' differential geometry. The global symmetry group is determined, which contains an affine extension of the Ehlers group. We show that the broken phase can in turn be constructed via gauging a certain subgroup of the global symmetry group. Finally, deformations of the Kaluza-Klein theory on AdS{sub 3} x S{sup 3} x S{sup 3} and the corresponding symmetry breakings are analyzed as possible applications for the AdS/CFT correspondence. (Orig.)

  17. Trust and the sociology of the professions.

    OpenAIRE

    Groenewegen, P.P.

    2006-01-01

    There is a fast-growing literature on trust in health care, especially interpersonal trust, reflecting the growing awareness in both the research and policy communities of the importance of trust. At a general level, trust as part of the broader concept of social capital is related to people's health and well-being. Trust within provider-patient relations is important for its non-specific treatment effects. Finally, trust is also important for the snooth functioning of societal institutions.(...

  18. Obtaining corporate information from NHS foundation trusts.

    Science.gov (United States)

    Woodward, Valerie; Endacott, Ruth; Sheaff, Rod; Jones, Ray

    Foundation trusts have boards of directors that are responsible for the day-to-day running of the organisation, planning services and developing strategy. Unlike non-foundation trusts and primary care trusts (PCTs), foundation trusts are not obliged to hold directors' board meetings in public. This article describes the online availability and accessibility of the minutes of such meetings in a number of foundation trusts, non-foundation trusts and PCTs. The implications for transparency in the NHS are also discussed.

  19. Cancer patients’ trust in their oncologist

    OpenAIRE

    Hillen, M.A.

    2013-01-01

    In this thesis we aimed to unravel cancer patients’ trust in their oncologist. We investigated patients’ explanations of trust in-depth, and developed an oncology-specific questionnaire to assess trust. Using the resulting Trust in Oncologist Scale, we experimentally established the influence of oncologist communication on trust. Specifically, patients report stronger trust if the oncologist expresses medical competence, communicates in an open and honest manner, and conveys involvement and c...

  20. Broken SU(8) symmetry and the new particles

    International Nuclear Information System (INIS)

    Kramer, G.; Schiller, D.H.

    1976-05-01

    We study the mass spectra and wave functions for vector and pseudoscalar mesons in broken SU(8) (SU(8) is contained in SU(4)F * SU(2)J), where F stands for flavour and J for usual spin. The connection with the standard mass breaking in SU(4)F is worked out. We find that even in the presence of strong SU(8) breaking the ideal mixing scheme for the vector mesons can be approximately retained. For the pseudoscalar mesons the mixing of the singlet with the 63-plet representation of SU(8) turns out to be essential and stongly nonideal. (orig.) [de

  1. [Alberic Pont, the great war and the "broken faces"].

    Science.gov (United States)

    Sigaux, N; Amiel, M; Piotrovitch d'Orlik, S; Breton, P

    2017-12-01

    The First World War and the number of facial injuries made specialized trauma centers necessary. Alberic Pont was trained both in medicine and dentistry. He founded in Lyon one of the first French specialized wards, which received more than 7000 soldiers overall. Through his charisma, his skills, his creativity and his generosity, he must be considered as a symbol among the pioneers of maxillo-facial surgery, which was then at its early stage. The centenary of World War I is the occasion to shed light on this man who dedicated his career to those who were renamed "broken faces". Copyright © 2017 Elsevier Masson SAS. All rights reserved.

  2. Mass formulae for broken supersymmetry in curved space-time

    Energy Technology Data Exchange (ETDEWEB)

    Ferrara, Sergio [Theoretical Physics Department, CERN, Geneva (Switzerland); INFN - Laboratori Nazionali di Frascati, Frascati (Italy); Department of Physics and Astronomy, U.C.L.A, Los Angeles, CA (United States); Proeyen, Antoine van [KU Leuven, Institute for Theoretical Physics, Leuven (Belgium)

    2016-11-15

    We derive the mass formulae for N = 1, D = 4 matter-coupled Supergravity for broken (and unbroken) Supersymmetry in curved space-time. These formulae are applicable to De Sitter configurations as is the case for inflation. For unbroken Supersymmetry in anti-de Sitter (AdS) one gets the mass relations modified by the AdS curvature. We compute the mass relations both for the potential and its derivative non-vanishing. (copyright 2016 WILEY-VCH Verlag GmbH and Co. KGaA, Weinheim)

  3. Spontaneous Broken Local Conformal Symmetry and Dark Energy Candidate

    International Nuclear Information System (INIS)

    Liu, Lu-Xin

    2013-01-01

    The local conformal symmetry is spontaneously broken down to the Local Lorentz invariance symmetry through the approach of nonlinear realization. The resulting effective Lagrangian, in the unitary gauge, describes a cosmological vector field non-minimally coupling to the gravitational field. As a result of the Higgs mechanism, the vector field absorbs the dilaton and becomes massive, but with an independent energy scale. The Proca type vector field can be modelled as dark energy candidate. The possibility that it further triggers Lorentz symmetry violation is also pointed out

  4. Heavy axions from strong broken horizontal gauge symmetry

    International Nuclear Information System (INIS)

    Elliott, T.; King, S.F.

    1993-01-01

    We study the consequences of the existence and breaking of a Peccei-Quinn symmetry within the context of a dynamical model of electroweak symmetry breaking based on broken gauged flavour symmetries. We perform an estimate of the axion mass by including flavour instanton effects and show that, for low cut-offs, the axion is sufficiently massive to prevent it from being phenomenologically unacceptable. We conclude with an examination of the strong CP problem and show that our axion cannot solve the problem, though we indicate ways in which the model can be extended so that the strong CP problem is solved. (orig.)

  5. Conformal bootstrap with slightly broken higher spin symmetry

    Energy Technology Data Exchange (ETDEWEB)

    Alday, Luis F. [Mathematical Institute, University of Oxford,Andrew Wiles Building, Radcliffe Observatory Quarter,Woodstock Road, Oxford, OX2 6GG (United Kingdom); Zhiboedov, Alexander [Center for the Fundamental Laws of Nature,Harvard University, Cambridge, MA 02138 (United States)

    2016-06-16

    We consider conformal field theories with slightly broken higher spin symmetry in arbitrary spacetime dimensions. We analyze the crossing equation in the double light-cone limit and solve for the anomalous dimensions of higher spin currents γ{sub s} with large spin s. The result depends on the symmetries and the spectrum of the unperturbed conformal field theory. We reproduce all known results and make further predictions. In particular we make a prediction for the anomalous dimensions of higher spin currents in the 3d Ising model.

  6. Never trust a croup…

    Science.gov (United States)

    Nickinson, Andrew; Minhas, Jatinder Singh; Bhalla, Minak; Anwuzia-Iwegbu, Charles; Chapman, John

    2011-01-01

    A 2-year-old girl presented to the James Paget University Hospitals Trust with croup-like symptoms and was later discharged with dexamethasone syrup. The patient re-presented 6 h later following maternal concern with signs of acute respiratory distress. After a period of clinical stability, she acutely decompensated without any prior signs of a life-threatening deterioration. She was managed using nebulised epinephrine and showed signs of clinical improvement. Although improvement persisted, the child showed signs of exhaustion following the preceding events and was later intubed with an endotracheal tube and transferred to the paediatric intensive care unit at Addenbrooke’s University Hospital, Cambridge. Endotracheal aspiration later grew parainfluenza virus, rhinovirus and Staphylococcus aureus and the patient was diagnosed with the exceptionally rare life threatening complications of croup, bacterial tracheitis. The patient was discharged from intensive care 7 days later and has since made a full recovery. PMID:22689599

  7. A matter of trust

    DEFF Research Database (Denmark)

    Smed, Sinne; Andersen, Laura Mørch; Kærgård, Niels

    2013-01-01

    production are found not to have no significant causual effect on actual behaviour, whereas concern for artificial additives and low price sensitivity have. Even when differences in time varying attitudes have been controlled for there is still a rather large heterogeneity in the organic purchasing behaviour...... in 2002 and again in 2007. The results point towards that the most efficient way of increasing organic consumption seems to be to continuously increasing the trust in the organic label and/or to document the positive health effects of organic food by e.g. focussing on measurable things such as a lower...... frequency of findings of pesticide residues in organic foods compared to conventional foods....

  8. A Matter of Trust

    DEFF Research Database (Denmark)

    Blach-Ørsten, Mark; Hartley, Jannie Møller; Wittchen, Maria Bendix

    ; Hindman, 2005), we find that the Danish news media tried to distance themselves from the journalists involved in the scandals and describe them as ‘bad apples’ (Cecil, 2002). But, in both scandals, we also find that the Danish news media went to great lengths to investigate the accusations, document......In 2015 two major journalistic scandals hit the Danish news media. One was a plagiarism scandal in which a freelance foreign correspondent was found to have plagiarized parts of the stories she had filed from other international news media. The other scandal involved a sports journalist who...... was found to have invented a large number of the sources that were quoted in his stories and had made up false co-bylines. In a time of diminishing trust in the news media (Blach-Ørsten & Burkal, 2013; Reuters, 2016) these scandals represented a significant and acute credibility problem for the news media...

  9. Towards Trust Engineering for Opportunistic Cloud Services

    DEFF Research Database (Denmark)

    Kuada, Eric

    2014-01-01

    The systematic review methodology has been employed to review trust related studies in cloud computing. It was observed that trusted computing technologies and reputation based approaches are the main approaches to trust engineering in cloud computing. Also, trusted third party approaches...... and the deployment model play a significant role in enhancing trust between service providers and consumers. It was observed that the concept of trust is used loosely without any formal specification in cloud computing discussions and trust engineering in general. As a first step towards addressing this problem, we...... have contextualized the formal trust specification in multi-agent environments for cloud computing....

  10. String Threshold corrections in models with spondaneously broken supersymmetry

    CERN Document Server

    Kiritsis, Elias B; Petropoulos, P M; Rizos, J

    1999-01-01

    We analyse a class of four-dimensional heterotic ground states with N=2 space-time supersymmetry. From the ten-dimensional perspective, such models can be viewed as compactifications on a six-dimensional manifold with SU(2) holonomy, which is locally but not globally K3 x T^2. The maximal N=4 supersymmetry is spontaneously broken to N=2. The masses of the two massive gravitinos depend on the (T,U) moduli of T^2. We evaluate the one-loop threshold corrections of gauge and R^2 couplings and we show that they fall in several universality classes, in contrast to what happens in usual K3 x T^2 compactifications, where the N=4 supersymmetry is explicitly broken to N=2, and where a single universality class appears. These universality properties follow from the structure of the elliptic genus. The behaviour of the threshold corrections as functions of the moduli is analysed in detail: it is singular across several rational lines of the T^2 moduli because of the appearance of extra massless states, and suffers only f...

  11. Large scale implementation of guided wave based broken rail monitoring

    Science.gov (United States)

    Burger, Francois A.; Loveday, Philip W.; Long, Craig S.

    2015-03-01

    A guided wave ultrasound system has been developed over the past 17 years to detect breaks in continuously welded rail track. Installation of the version 4 system on an 840 km long heavy duty freight line was conducted between January 2013 and June 2014. The system operates in pitch - catch mode with alternate transmit and receive transducers spaced approximately 1km apart. If the acoustic signal is not received at the receive station an alarm is triggered to indicate a break in the rail between the transmit station and the receive station. The system is permanently installed, powered by solar panels and issues broken rail alarms using the GSM network where available, and digital radio technology in other areas. A total of 931 stations were installed and the entire length of rail is interrogated every fifteen minutes. The system operates reliably although some problems involving unreliable GSM communication and theft of solar panels have been experienced. In the first two months of operation four broken rails were detected and train operation was halted temporarily for repairs.

  12. Soflty broken supersymmetry and the fine-tuning problem

    Energy Technology Data Exchange (ETDEWEB)

    Foda, O.E.

    1984-02-20

    The supersymmetry of the simple Wess-Zumino model is broken, in the tree-approximation, by adding all possible parity-even(mass)-dimension 2 and 3 terms. The model is then renormalized using BPHZ and the normal product algorithm, such that supersymmetry is only softly broken (in the original sense of Schroer and Symanzik). We show that, within the above renormalization scheme, none of the added breaking terms give rise to technical fine-tuning problems (defined in the sense of Gildener) in larger models, with scalar multiplets and hierarchy of mass scales, which is in contrast to what we obtain via analytic schemes such as dimensional renormalization, or supersymmetry extension of which. The discrepancy (which can be shown to persist in more general models) originates in the inherent local ambiguity in the finite parts of subtracted Feynman integrals. Emphasizing that the issue is purely technical (as opposed to physical) in origin, and that all physical properties are scheme-independent (as they should be), we conclude that the technical fine-tuning problem, in the specific sense used in this paper, being scheme dependent, is not a well-defined issue within the context of renormalized perturbation theory. 30 references.

  13. Soflty broken supersymmetry and the fine-tuning problem

    International Nuclear Information System (INIS)

    Foda, O.E.

    1984-01-01

    The supersymmetry of the simple Wess-Zumino model is broken, in the tree-approximation, by adding all possible parity-even[mass]-dimension 2 and 3 terms. The model is then renormalized using BPHZ and the normal product algorithm, such that supersymmetry is only softly broken (in the original sense of Schroer and Symanzik). We show that, within the above renormalization scheme, none of the added breaking terms give rise to technical fine-tuning problems (defined in the sense of Gildener) in larger models, with scalar multiplets and hierarchy of mass scales, which is in contrast to what we obtain via analytic schemes such as dimensional renormalization, or supersymmetry extension of which. The discrepancy (which can be shown to persist in more general models) originates in the inherent local ambiguity in the finite parts of subtracted Feynman integrals. Emphasizing that the issue is purely technical (as opposed to physical) in origin, and that all physical properties are scheme-independent (as they should be), we conclude that the technical fine-tuning problem, in the specific sense used in this paper, being scheme dependent, is not a well-defined issue within the context of renormalized perturbation theory. (orig.)

  14. Effective potential for spontaneously broken gauge theories and gauge hierarchies

    International Nuclear Information System (INIS)

    Hagiwara, T.; Ovrut, B.

    1979-01-01

    The Appelquist-Carazzone effective-field-theory method, where one uses effective light-field coupling constants dependent on the heavy-field sector, is explicitly shown to be valid for the discussion of the gauge-hierarchy problem in grand unified gauge models. Using the method of functionals we derive an expression for the one-loop approximation to the scalar-field effective potential for spontaneously broken theories in an arbitrary R/sub xi/ gauge. We argue that this potential generates, through its derivatives, valid zero-momentum, one-particle-irreducible vertices for any value of xi (not just the xi→infinity Landau gauge). The equation that the one-loop vacuum correction must satisfy is presented, and we solve this equation for a number of spontaneously broken theories including gauge theories with gauge groups U(1) and SO(3). We find that a one-loop vacuum shift in a massless, non-Goldstone direction occurs via the Coleman-Weinberg mechanism with an effective coupling constant dependent on the heavy-field sector

  15. Classification of Broken Rice Kernels using 12D Features

    Directory of Open Access Journals (Sweden)

    SUNDER ALI KHOWAJA

    2016-07-01

    Full Text Available Integrating the technological aspect for assessment of rice quality is very much needed for the Asian markets where rice is one of the major exports. Methods based on image analysis has been proposed for automated quality assessment by taking into account some of the textural features. These features are good at classifying when rice grains are scanned in controlled environment but it is not suitable for practical implementation. Rice grains are placed randomly on the scanner which neither maintains the uniformity in intensity regions nor the placement strategy is kept ideal thus resulting in false classification of grains. The aim of this research is to propose a method for extracting set of features which can overcome the said issues. This paper uses morphological features along-with gray level and Hough transform based features to overcome the false classification in the existing methods. RBF (Radial Basis function is used as a classification mechanism to classify between complete grains and broken grains. Furthermore the broken grains are classified into two classes? i.e. acceptable grains and non-acceptable grains. This research also uses image enhancement technique prior to the feature extraction and classification process based on top-hat transformation. The proposed method has been simulated in MATLAB to visually analyze and validate the results.

  16. Phenomenology of muon number violation in spontaneously broken gauge theories

    International Nuclear Information System (INIS)

    Shanker, O.U.

    1980-01-01

    The phenomenology of muon number violation in gauge theories of weak and electromagnetic interactions is studied. In the first chapter a brief introduction to the concept of muon number and to spontaneously broken gauge theories is given. A review of the phenomenology and experimental situation regarding different muon number violating processes is made in the second chapter. A detailed phenomenological study of the μe conversion process μ - + (A,Z) → e - + (A,Z) is given in the third chapter. In the fourth chapter some specific gauge theories incorporating spontaneously broken horizontal gauge symmetries between different fermion generations are discussed with special reference to muon number violation in the theories. The μe conversion process seems to be a good process to search for muon number violation if it occurs. The K/sub L/-K/sub S/ mass difference is likely to constrain muon number violating rates to lie far below present experimental limits unless strangeness changing neutral currents changing strangeness by two units are suppressed

  17. Keeping Faith with our War-Torn: Rebuilding Broken Spirits

    Science.gov (United States)

    2012-03-22

    classic literature to describe the sprit and the soul and how it is damaged by combat trauma. He quotes Aristotle, Shakespeare , and Heraclites. The...seem to be particularly good at helping rebuild trust and reduce the stress related to serving in combat. Several companion dog organizations...including Canine Companions International, have paired dogs with the wounded including PTSD diagnosed warriors. This has resulted in a warrior having a

  18. Trust management in cloud services

    CERN Document Server

    Noor, Talal H; Bouguettaya, Athman

    2014-01-01

    This book describes the design and implementation of Cloud Armor, a novel approach for credibility-based trust management and automatic discovery of cloud services in distributed and highly dynamic environments. This book also helps cloud users to understand the difficulties of establishing trust in cloud computing and the best criteria for selecting a service cloud. The techniques have been validated by a prototype system implementation and experimental studies using a collection of real world trust feedbacks on cloud services.The authors present the design and implementation of a novel pro

  19. Trust and New Communication Technologies

    DEFF Research Database (Denmark)

    Ess, Charles

    2010-01-01

    I approach philosophical analyses of the phenomenon of trust vis-à-vis online communication, beginning with an overview from within the framework of computer-mediated communication (CMC) of concerns and paradigmatic failures of trust in the history of online communication. I turn to more directly...... the perspective of virtue ethics and phenomenological approaches to how we know and navigate the world as embodied beings - I then take up three major arguments in recent work in favor of the possibilities of trust online, followed by three vicious circles that run counter to more optimistic views. I close...

  20. In the CJEU Judges Trust

    DEFF Research Database (Denmark)

    Mayoral, Juan A.

    2016-01-01

    . A theory is offered in the article, which links national judges' trust in the CJEU to their corporatist identification and profile, to their attitudes towards the EU, and to their beliefs about the CJEU's ability to provide decisions that: 1) offer a clear guidance on European Union law, and 2......This article aims to highlight the relevance of judicial trust in international courts, focusing on national judges' trust in the Court of Justice of the European Union (CJEU). EU scholars have put a great deal of effort into explaining how legal and political factors affect the use of preliminary...

  1. Lesson Learning at JPL

    Science.gov (United States)

    Oberhettinger, David

    2011-01-01

    A lessons learned system is a hallmark of a mature engineering organization A formal lessons learned process can help assure that valuable lessons get written and published, that they are well-written, and that the essential information is "infused" into institutional practice. Requires high-level institutional commitment, and everyone's participation in gathering, disseminating, and using the lessons

  2. Trusted counsellor retires

    CERN Multimedia

    2006-01-01

    His astute counsel, knowing smile and distinguished eloquence will be missed by many. With a pang of regret, the man himself admits that 'CERN was like a drug for me'. Last week, Jean-Daniel Mandica retired, after 40 years of loyal service. He was the trusted counsellor of every Director of the Administration and Director-General for eighteen years, from 1986 to 2003. Head of the planning unit for the Directorate and the Administration from 1986 to 1996, he was then named Head of the Directorate Services Unit in 1996, a position he held until the end of 2003. Throughout that time, he conducted key tasks for the Organization, such as restructuring the Administration and carrying out audits. His role in the creation of Microcosm and his commitment to CERN's participation in the Universal Exposition at Seville in 1992 contributed in no small part to the spread of the Laboratory's fame. Jean-Daniel Mandica's incomparable knowledge of the Administration, sense of diplomacy and great ability to listen made him a v...

  3. TEE-Based Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe

    Today, it is safe to assume that any program or data can be compromised, if they are not protected by hardware within a secure area. Systems based on crypto-processors (e.g., a trusted platform module, a smart card or a hardware security module) rely on the properties of tamper resistant hardware...... to establish a tight security parameter around a reduced set of predefined functionalities. Such systems are very secure, but they impose strong constraints on the functionalities, the connectivity or the resources available within the secure area. They have not proven versatile enough to provide mainstream...... trusted storage for personal data. We believe that this role can be taken over by systems equipped with Trusted Execution Environments (TEE), such as ARM’s TrustZone. Indeed, even if TEEs provide weaker security guarantees than crypto-processors, they already provide a secure area on many personal devices...

  4. Ethnic Diversity and Social Trust

    DEFF Research Database (Denmark)

    Dinesen, Peter Thisted; Sønderskov, Kim Mannemar

    2015-01-01

    We argue that residential exposure to ethnic diversity reduces social trust. Previous within-country analyses of the relationship between contextual ethnic diversity and trust have been conducted at higher levels of aggregation, thus ignoring substantial variation in actual exposure to ethnic......, whereas the effect vanishes in larger contextual units. This supports the conjecture that interethnic exposure underlies the negative relationship between ethnic diversity in residential contexts and social trust....... diversity. In contrast, we analyze how ethnic diversity of the immediate micro-context—where interethnic exposure is inevitable—affects trust. We do this using Danish survey data linked with register-based data, which enables us to obtain precise measures of the ethnic diversity of each individual...

  5. Ethnic Diversity and Social Trust

    DEFF Research Database (Denmark)

    Dinesen, Peter Thisted; Sønderskov, Kim Mannemar

    2018-01-01

    Due to its wide-ranging implications for social cohesion in diversifying Western countries, the question of the potential negative consequences of ethnic diversity for social trust is arguably the most contentious question in the literature on social trust. In this chapter we critically review...... the empirical evidence for a negative relationship between contextual ethnic diversity (measured locally within countries) and social trust. We cautiously conclude that there are indications of a negative relationship, although with important variations across study characteristics including national setting......, context unit analyzed, and conditioning on moderating influences. Building on the review, we highlight a number of paths for theoretical and methodological advances, which we argue would advance the literature on the relationship between ethnic diversity and social trust....

  6. To Trust or Not to Trust? What Drives Public Trust in Science in Social Media Engagement

    Science.gov (United States)

    Hwong, Y. L.; Oliver, C.; Van Kranendonk, M. J.

    2017-12-01

    The erosion of public trust in science is a serious concern today. This climate of distrust has real consequences, from the anti-vaccination movement to climate change denials. The age of social media promises opportunities for improved interactivity between scientists and the public, which experts hope will help improve public confidence in science. However, evidence linking social media engagement and public attitude towards science is scarce. Our study aimed to help fill this gap. We examined Twitter engagement and its impact on public trust in science, focusing on two related science issues: space science and climate change. Our datasets comprised of 10,000 randomly sampled tweets over a month's period in 2016. We used human annotation and machine learning to analyse the tweets. Results revealed the level of distrust was significantly higher in the climate change tweets. However, in the climate change network, people who engaged with science personalities trust science more than those who did not. This difference in trust levels was not present in the space science network. There the two clusters of people displayed similar levels of trust in science. Additionally, we used machine learning to predict the trust labels of tweets and conducted feature analysis to find the properties of trust-inspiring tweets. Our supervised learning algorithm was able to predict trust in science in our sample tweets with 84% accuracy. The strongest predictors of trust in science (as conveyed by tweets) were similarity, presence of URL and authenticity. Contrast this with the findings of our previous study investigating the features of highly engaging space science related social media messages, authenticity is the only feature that also inspires trust. This indicates that what works to promote engagement (e.g. `retweets', `Likes') does not necessarily build trust in science. Social media science communication is not as simple as `we engage, therefore they trust'. We suggest that

  7. Trust, Behavior, and High School Outcomes

    Science.gov (United States)

    Romero, Lisa S.

    2015-01-01

    Purpose: The purpose of this paper is to contribute to the literature on student trust and to examine the relationship between student trust, behavior, and academic outcomes in high school. It asks, first, does trust have a positive effect on high school outcomes? Second, does trust influence student behavior, exerting an indirect effect on…

  8. Trust and the sociology of the professions.

    NARCIS (Netherlands)

    Groenewegen, P.P.

    2006-01-01

    There is a fast-growing literature on trust in health care, especially interpersonal trust, reflecting the growing awareness in both the research and policy communities of the importance of trust. At a general level, trust as part of the broader concept of social capital is related to people's

  9. The Complex Relationship between Cyberbullying and Trust

    Science.gov (United States)

    Pieschl, Stephanie; Porsch, Torsten

    2017-01-01

    Theoretically, there are strong arguments for a relationship between cyberbullying and trust. On the one hand, trust is built on experiences; thus, experiences of malevolence such as cyberbullying might contribute to low trust. On the other hand, high trust may lead to risky online behavior such as self-disclosures that could increase the risk of…

  10. 26 CFR 301.7701-4 - Trusts.

    Science.gov (United States)

    2010-04-01

    ... remediation trust if the organization is organized under state law as a trust; the primary purpose of the... federal, state, or local environmental laws; all contributors to the trust have (at the time of... federal, state, or local environmental laws for environmental remediation of the waste site; and the trust...

  11. 12 CFR 7.2022 - Voting trusts.

    Science.gov (United States)

    2010-01-01

    ... Practices § 7.2022 Voting trusts. The shareholders of a national bank may establish a voting trust under the applicable law of a state selected by the participants and designated in the trust agreement, provided the... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Voting trusts. 7.2022 Section 7.2022 Banks and...

  12. Metadata trust in a personal video recorder

    NARCIS (Netherlands)

    Boertjes, E.M.

    2004-01-01

    Trust is the belief or confidence in someone that their recommendations will work for you, i.e. that you will like the TV-programs (or other content) that they recommend. Many systems incorporate some notion of trust. Trust is more than similarity in taste, which makes trust a broader concept than

  13. Cancer patients’ trust in their oncologist

    NARCIS (Netherlands)

    Hillen, M.A.

    2013-01-01

    In this thesis we aimed to unravel cancer patients’ trust in their oncologist. We investigated patients’ explanations of trust in-depth, and developed an oncology-specific questionnaire to assess trust. Using the resulting Trust in Oncologist Scale, we experimentally established the influence of

  14. [Trust in the care relationship].

    Science.gov (United States)

    Sureau, Patrick

    2018-04-01

    A relationship of trust is an expression often used by caregivers, to such an extent that it almost seems self-evident. It is nevertheless important to give some thought to this aspect in order to construct a reliable, authentic and ethical care relationship. Indeed, trust is not automatic. It requires reciprocity, a deliberate choice on the part of the caregiver and the patient. Copyright © 2018 Elsevier Masson SAS. All rights reserved.

  15. Trust and Privacy in Healthcare

    Science.gov (United States)

    Singleton, Peter; Kalra, Dipak

    This paper considers issues of trust and privacy in healthcare around increased data-sharing through Electronic Health Records (EHRs). It uses a model structured around different aspects of trust in the healthcare organisation’s reasons for greater data-sharing and their ability to execute EHR projects, particularly any associated confidentiality controls. It reflects the individual’s personal circumstances and attitude to use of health records.

  16. Trust Revision for Conflicting Sources

    Science.gov (United States)

    2017-02-01

    strategy is to first revise a priori trust assignments as a function of the degree of conflict, before the evidence is fused. This paper focuses on the...practical trust transitivity seems to be idiosyncratic for humans and animals, with no true analogue among non- living forms (and in the physical world ...visiting a foreign country Alice is looking for a restaurant where the locals go, because she would like to avoid places overrun by tourists. She meets a

  17. Online Consumer Trust: Trends in Research

    Directory of Open Access Journals (Sweden)

    Antonina Bauman

    2017-07-01

    Full Text Available This paper presents the literature review of studies published in 2004-2014 (Web 2.0 period in the area of consumer online trust. Based on the content analysis of 138 papers, this study highlights three major research themes: (1 trust models, (2 technological, and (3 social factors impacting online trust. It also explores topics in each major theme found in direct studies of online consumer trust. Since this literature review uses the concept-centric approach, it points out not only the major trends in research but also three understudied areas: (1 green trust, (2 trust recovery, and (3 the role of ethics in developing online trust.

  18. The Relationship between Teamwork and Organizational Trust

    Directory of Open Access Journals (Sweden)

    Musab Işık

    2015-04-01

    Full Text Available The aim of this study is to investigate the relationship between teamwork and organizational trust. In the implementation section the data from the survey of 250 workers is employed in call centers in Erzurum by using relevant statistical methods. Consequently, it is found that there is a positive and significant relationship between teamwork and organizational trust. Thus, the hypothesis of the study is supported as it was expected. Besides, it is found that there are positive and significant relationships between communication, openness to innovation, participation-trust in teamwork and organizational trust, trust in management, trust in co-workers, and trust in workplace.

  19. Gauge-Higgs unification with broken flavour symmetry

    Energy Technology Data Exchange (ETDEWEB)

    Olschewsky, M.

    2007-05-15

    We study a five-dimensional Gauge-Higgs unification model on the orbifold S{sup 1}/Z{sub 2} based on the extended standard model (SM) gauge group SU(2){sub L} x U(1){sub Y} x SO(3){sub F}. The group SO(3){sub F} is treated as a chiral gauged flavour symmetry. Electroweak-, flavour- and Higgs interactions are unified in one single gauge group SU(7). The unified gauge group SU(7) is broken down to SU(2){sub L} x U(1){sub Y} x SO(3){sub F} by orbifolding and imposing Dirichlet and Neumann boundary conditions. The compactification scale of the theory is O(1) TeV. Furthermore, the orbifold S{sup 1}/Z{sub 2} is put on a lattice. This setting gives a well-defined staring point for renormalisation group (RG) transformations. As a result of the RG-flow, the bulk is integrated out and the extra dimension will consist of only two points: the orbifold fixed points. The model obtained this way is called an effective bilayered transverse lattice model. Parallel transporters (PT) in the extra dimension become nonunitary as a result of the blockspin transformations. In addition, a Higgs potential V({phi}) emerges naturally. The PTs can be written as a product e{sup A{sub y}}e{sup {eta}}e{sup A{sub y}} of unitary factors e{sup A{sub y}} and a selfadjoint factor e{sup {eta}}. The reduction 48 {yields} 35 + 6 + anti 6 + 1 of the adjoint representation of SU(7) with respect to SU(6) contains SU(2){sub L} x U(1){sub Y} x SO(3){sub F} leads to three SU(2){sub L} Higgs doublets: one for the first, one for the second and one for the third generation. Their zero modes serve as a substitute for the SM Higgs. When the extended SM gauge group SU(2){sub L} x U(1){sub Y} x SO(3){sub F} is spontaneously broken down to U(1){sub em}, an exponential gauge boson mass splitting occurs naturally. At a first step SU(2){sub L} x U(1){sub Y} x SO(3){sub F} is broken to SU(2){sub L} x U(1){sub Y} by VEVs for the selfadjoint factor e{sup {eta}}. This breaking leads to masses of flavour changing SO(3){sub F

  20. Inflation via Gravitino Condensation in Dynamically Broken Supergravity

    CERN Document Server

    Alexandre, Jean; Mavromatos, Nick E

    2015-01-01

    Gravitino-condensate-induced inflation via the super-Higgs effect is a UV-motivated scenario for both inflating the early universe and breaking local supersymmetry dynamically, entirely independent of any coupling to external matter. As an added benefit, this also removes the (as of yet unobserved) massless Goldstino associated to global supersymmetry breaking from the particle spectrum. In this review we detail the pertinent properties and outline previously hidden details of the various steps required in this context in order to make contact with current inflationary phenomenology. The class of models of SUGRA we use to exemplify our approach are minimal four-dimensional N=1 supergravity and conformal extensions thereof (with broken conformal symmetry). Therein, the gravitino condensate itself can play the role of the inflaton, however the requirement of slow-roll necessitates unnaturally large values of the wave-function renormalisation. Nevertheless, there is an alternative scenario that may provide Staro...

  1. Numerical and physical modelling of oil spreading in broken ice

    International Nuclear Information System (INIS)

    Gjoesteen, Janne K. Oekland

    2002-01-01

    The present work focuses on oil spreading in broken ice and the content of this thesis falls into three categories: 1) The physical and numerical modelling of oil spreading in ice. 2) Ice models and parameters describing the ice cover. 3) Experiments on oil spreading in broken ice. A background study was carried out to investigate existing models for simulating oil in broken ice. Most of them describe motion of oil simply as a function of the ice motion and do not take advantage of the possibilities that recent ice models provide. We decided to choose another direction, starting from scratch with equations describing the flow of oil on top of a water surface. The equations were implemented numerically, including proper boundary conditions to account for the presence of physical restrictions in the form of ice floes in the simulation area. The implementation was designed to be able to apply data on ice motion calculated by an existing dynamic ice model. A first validation of the model was carried out using existing experimental data. As those data were obtained in a different setting, the recorded parameters and set-up of the experiment were not ideal for our purpose. However, we were able to conclude that our model behaviour was reasonable. We have carried out statistical analysis on meteorological data of wind speeds, temperatures, flow sizes and ice thickness to obtain probability distributions describing the parameters. Those data has been collected in the Pechora Sea. Wind and temperature had been recorded for a period of 30-40 years. For this region we also had available Argos satellite data from four buoys drifting in the ice in April-June 1998. The Argos data were carefully analysed to suggest probability distributions and return periods for certain speeds. (Indoor basin tests were carried out to obtain data on spreading of oil in broken ice. A set of 20 tests was conducted, each with different type of oil, ice concentration, slush concentration or ice

  2. Quantum Space-Time Deformed Symmetries Versus Broken Symmetries

    CERN Document Server

    Amelino-Camelia, G

    2002-01-01

    Several recent studies have concerned the faith of classical symmetries in quantum space-time. In particular, it appears likely that quantum (discretized, noncommutative,...) versions of Minkowski space-time would not enjoy the classical Lorentz symmetries. I compare two interesting cases: the case in which the classical symmetries are "broken", i.e. at the quantum level some classical symmetries are lost, and the case in which the classical symmetries are "deformed", i.e. the quantum space-time has as many symmetries as its classical counterpart but the nature of these symmetries is affected by the space-time quantization procedure. While some general features, such as the emergence of deformed dispersion relations, characterize both the symmetry-breaking case and the symmetry-deformation case, the two scenarios are also characterized by sharp differences, even concerning the nature of the new effects predicted. I illustrate this point within an illustrative calculation concerning the role of space-time symm...

  3. Gauge-Higgs unification with broken flavour symmetry

    International Nuclear Information System (INIS)

    Olschewsky, M.

    2007-05-01

    We study a five-dimensional Gauge-Higgs unification model on the orbifold S 1 /Z 2 based on the extended standard model (SM) gauge group SU(2) L x U(1) Y x SO(3) F . The group SO(3) F is treated as a chiral gauged flavour symmetry. Electroweak-, flavour- and Higgs interactions are unified in one single gauge group SU(7). The unified gauge group SU(7) is broken down to SU(2) L x U(1) Y x SO(3) F by orbifolding and imposing Dirichlet and Neumann boundary conditions. The compactification scale of the theory is O(1) TeV. Furthermore, the orbifold S 1 /Z 2 is put on a lattice. This setting gives a well-defined staring point for renormalisation group (RG) transformations. As a result of the RG-flow, the bulk is integrated out and the extra dimension will consist of only two points: the orbifold fixed points. The model obtained this way is called an effective bilayered transverse lattice model. Parallel transporters (PT) in the extra dimension become nonunitary as a result of the blockspin transformations. In addition, a Higgs potential V(Φ) emerges naturally. The PTs can be written as a product e A y e η e A y of unitary factors e A y and a selfadjoint factor e η . The reduction 48 → 35 + 6 + anti 6 + 1 of the adjoint representation of SU(7) with respect to SU(6) contains SU(2) L x U(1) Y x SO(3) F leads to three SU(2) L Higgs doublets: one for the first, one for the second and one for the third generation. Their zero modes serve as a substitute for the SM Higgs. When the extended SM gauge group SU(2) L x U(1) Y x SO(3) F is spontaneously broken down to U(1) em , an exponential gauge boson mass splitting occurs naturally. At a first step SU(2) L x U(1) Y x SO(3) F is broken to SU(2) L x U(1) Y by VEVs for the selfadjoint factor e η . This breaking leads to masses of flavour changing SO(3) F gauge bosons much above the compactification scale. Such a behaviour has no counterpart within the customary approximation scheme of an ordinary orbifold theory. This way tree

  4. Numerical and physical modelling of oil spreading in broken ice

    Energy Technology Data Exchange (ETDEWEB)

    Gjoesteen, Janne K. Oekland

    2002-07-01

    The present work focuses on oil spreading in broken ice and the content of this thesis falls into three categories: 1) The physical and numerical modelling of oil spreading in ice. 2) Ice models and parameters describing the ice cover. 3) Experiments on oil spreading in broken ice. A background study was carried out to investigate existing models for simulating oil in broken ice. Most of them describe motion of oil simply as a function of the ice motion and do not take advantage of the possibilities that recent ice models provide. We decided to choose another direction, starting from scratch with equations describing the flow of oil on top of a water surface. The equations were implemented numerically, including proper boundary conditions to account for the presence of physical restrictions in the form of ice floes in the simulation area. The implementation was designed to be able to apply data on ice motion calculated by an existing dynamic ice model. A first validation of the model was carried out using existing experimental data. As those data were obtained in a different setting, the recorded parameters and set-up of the experiment were not ideal for our purpose. However, we were able to conclude that our model behaviour was reasonable. We have carried out statistical analysis on meteorological data of wind speeds, temperatures, flow sizes and ice thickness to obtain probability distributions describing the parameters. Those data has been collected in the Pechora Sea. Wind and temperature had been recorded for a period of 30-40 years. For this region we also had available Argos satellite data from four buoys drifting in the ice in April-June 1998. The Argos data were carefully analysed to suggest probability distributions and return periods for certain speeds. (Indoor basin tests were carried out to obtain data on spreading of oil in broken ice. A set of 20 tests was conducted, each with different type of oil, ice concentration, slush concentration or ice

  5. Trust and Online Reputation Systems

    Science.gov (United States)

    Kwan, Ming; Ramachandran, Deepak

    Web 2.0 technologies provide organizations with unprecedented opportunities to expand and solidify relationships with their customers, partners, and employees—while empowering firms to define entirely new business models focused on sharing information in online collaborative environments. Yet, in and of themselves, these technologies cannot ensure productive online interactions. Leading enterprises that are experimenting with social networks and online communities are already discovering this fact and along with it, the importance of establishing trust as the foundation for online collaboration and transactions. Just as today's consumers must feel secure to bank, exchange personal information and purchase products and services online; participants in Web 2.0 initiatives will only accept the higher levels of risk and exposure inherent in e-commerce and Web collaboration in an environment of trust. Indeed, only by attending to the need to cultivate online trust with customers, partners and employees will enterprises ever fully exploit the expanded business potential posed by Web 2.0. But developing online trust is no easy feat. While various preliminary attempts have occurred, no definitive model for establishing or measuring it has yet been established. To that end, nGenera has identified three, distinct dimensions of online trust: reputation (quantitative-based); relationship (qualitative-based) and process (system-based). When considered together, they form a valuable model for understanding online trust and a toolbox for cultivating it to support Web 2.0 initiatives.

  6. Trust is a must: What is involved in trusting those who manage forest fires?

    Science.gov (United States)

    Adam Liljeblad; Bill Borrie; Alan Watson

    2010-01-01

    Trust is a complicated emotion. In the past, many social scientists have studied trust. They discovered that trust involves a number of beliefs and emotions. The scientists in this study were interested in learning more about trust. They believed that forest managers can do a better job if people trust them to do what is best for citizens and the environment (figure 1...

  7. An Operational Semantics for Trust Policies

    DEFF Research Database (Denmark)

    Krukow, Karl Kristian

    2005-01-01

    In the trust-structure model of trust management, principals specify their trusting relationships with other principals in terms of trust policies. In their paper on trust structures, Carbone et al. present a language for trust policies, and provide a suitable denotational semantics. The semantics...... ensures that for any collection of trust policies, there is always a unique global trust-state, compatible with all the policies, specifying everyone's degree of trust in everyone else. However, as the authors themselves point out, the language lacks an operational model: the global trust-state is a well......-defined mathematical object, but it is not clear how principals can actually compute it. This becomes even more apparent when one considers the intended application environment: vast numbers of autonomous principals, distributed and possibly mobile. We provide a compositional operational semantics for a language...

  8. UTILIZATION OF AMINO ACIDS OF BROKEN RICE IN GROWING PIGS

    Directory of Open Access Journals (Sweden)

    Matej Brestenský

    2014-02-01

    Full Text Available The six cannulated gilts (initial body weight 35.8 ± 0.5 kg fitted with a T-cannula in terminal ileum, were used to determine the apparent (AID and standardized (SID ileal digestibility of nitrogen (N and amino acids (AA in broken rice. Animals were fed twice daily in a two equal doses at a daily rate of 80 g.kg - 0.75. Water was offered ad libitum. The tested feed was the sole source of protein in the diet. The N-free diet was used to determine the ileal endogenous flow of AA and N. Chromium oxide (Cr2O3 was added to the diets as an indigestible marker in an amount of 0.3 % per kg of diet. After a 14 d postoperative period a 6 d adaptation period followed during which the animals were fed with an experimental diet. On d 7 ileal digesta was collected continuously for 24 h. The AID and SID of AA and N were calculated using analytically determined values of N, Cr2O3 and AA. The SID of AA was in a range from 81.6 % (tyrosine to 112.6 % (proline (P 0.05, respectively. There were no differences between standardized ileal digestibility of essential amino acids (94.3 % and nonessential amino acids (95.3 %. Regarding the ileal digestibility of AA, broken rice, a by-product from the food industry, is an appropriate source of digestible AA for growing pigs.

  9. INFLUENCE OF BROKEN ROTOR BARS LOCATION IN THE SQUIRREL CAGE INDUCTION MOTOR USING FINITE ELEMENT METHOD

    Directory of Open Access Journals (Sweden)

    N. Halem

    2013-06-01

    Full Text Available It is well known that the number of broken bars and varying load affect on the amplitudes of specific harmonic components in the process analysis of induction motors under broken rotor bars. The location of broken bars is an important factor which affects the diagnosis of the broken bars defect. In this paper the simulation is determinate for different cases for distribution of broken bars under induction motor pole in order to show the impact of broken bars location upon the amplitude of harmonic fault. The simulation results are obtained by using time stepping finite elements (TSFE method. The geometrical characteristics of motor, the effects of slotting and the magnetic saturation of lamination core are included in induction motor model.

  10. INFLUENCE OF BROKEN ROTOR BARS LOCATION IN THE SQUIRREL CAGE INDUCTION MOTOR USING FINITE ELEMENT METHOD

    Directory of Open Access Journals (Sweden)

    N. Halem

    2015-07-01

    Full Text Available It is well known that the number of broken bars and varying load affect on the amplitudes of specific harmonic components  in the process analysis of induction motors under broken rotor bars. The location of broken bars is an important factor which affects the diagnosis of the broken bars defect. In this paper the simulation is determinate for different cases for distribution of broken bars under induction motor pole in order to show the impact of broken bars location upon the amplitude of harmonic fault. The simulation results are obtained by using time stepping finite elements (TSFE method. The geometrical characteristics of motor, the effects of slotting and the magnetic saturation of lamination core are included in induction motor model.

  11. Building effective partnerships: the role of trust in the Virus Resistant Cassava for Africa project

    Directory of Open Access Journals (Sweden)

    Ezezika Obidimma C

    2012-11-01

    Full Text Available Abstract Background Virus Resistant Cassava for Africa (VIRCA is an agricultural biotechnology public-private partnership (PPP comprising the Donald Danforth Plant Sciences Center (DDPSC, National Agricultural Research Organization (NARO of Uganda and Kenya Agricultural Research Institute (KARI. The project seeks to develop virus-resistant cassava for farmers in Kenya and Uganda. Yet, there is much public skepticism about the use of genetically modified (GM crops and private sector involvement in Africa. This case study sought to understand the role of trust in the VIRCA partnership. Methods We conducted semi-structured, face-to-face interviews to obtain stakeholders’ views on the challenges to, and practices for, building trust in the VIRCA partnership. Interviewee responses, together with relevant documents and articles, were analyzed to generate descriptions of how trust is operationalized in this evolving agbiotech PPP. Data were analyzed based on recurring and emergent themes from the interviewee responses. Results Various factors undermine and build trust in agbiotech PPPs. Individual and institutional enthusiasm and detailed collaborative agreements stipulating partner roles and responsibilities are likely to enhance trust among partners. On the other hand, negative perceptions propagated by international partners about the capacities of African institutions and scientists, coupled with slow regulatory processes in Africa, are likely to be impediments to trust building. Conclusions Based on the findings of this study, we have derived four key lessons. First, differences in the capacity of the partner institutions and individuals should be respected. Second, technical and infrastructural capacity support for regulatory processes in Africa must be built. Third, detailed agreements and open and transparent partner practices during project implementation are necessary to dispel perceptions of inequality among partners. Fourth, institutional

  12. PERILAKU KOMUNIKASI SISWA BROKEN HOME DI SMK NEGERI 3 PARE PARE (STUDI KASUS KOMUNIKASI ANTARPRIBADI)

    OpenAIRE

    RIADHEFI, DASTI

    2012-01-01

    DASTI RIADHEFI. Perilaku Komunikasi Siswa Broken Home Di SMK Negeri 3 Parepare (Dibimbing oleh Abdul Gaffar dan Sudirman Karnay ). Tujuan penelitian ini adalah :1) Untuk mengetahui perilaku komunikasi siswa Broken Home Di SMK Negeri 3 Parepare. 2) Untuk mengetahui faktor-faktor yang menghambat perilaku komunikasi siswa Broken Home Di SMK Negeri 3 Parepare. Penelitian ini dilaksanakan di SMK Negeri 3 Parepare dan berlangsung selama dua bulan yaitu pada bulan September 2012 sampai Nov...

  13. "Push back" technique: A simple method to remove broken drill bit from the proximal femur.

    Science.gov (United States)

    Chouhan, Devendra K; Sharma, Siddhartha

    2015-11-18

    Broken drill bits can be difficult to remove from the proximal femur and may necessitate additional surgical exploration or special instrumentation. We present a simple technique to remove a broken drill bit that does not require any special instrumentation and can be accomplished through the existing incision. This technique is useful for those cases where the length of the broken drill bit is greater than the diameter of the bone.

  14. Hijacking Subaltern’s history (broken bodies, broken voices: Decolonial critique of ‘Subaltern whiteness’ in South Africa

    Directory of Open Access Journals (Sweden)

    Chammah J. Kaunda

    2017-11-01

    Full Text Available This article uses decolonial to critique the discourse of ‘subaltern whiteness’ by questioning some Afrikaner scholars’ morality of regarding ‘white Afrikaners as subaltern’. Subaltern designates submerged, subordinated, exploited or suppressed – those whose voices have been historically muted, their humanity stripped by those with sociopolitical and economic power. Within South Africa, this raises the question: to what extent can white Afrikaners be regarded as subaltern? The article proposes indivisibility of epistemic vulnerability and regenerative theological praxis both emerging within Afrikaner theological discussion as viable response to broken bodies of those who still bear the marks or scars of apartheid and rather not to seek to hijack their voice.

  15. 25 CFR 1000.354 - What is a trust evaluation?

    Science.gov (United States)

    2010-04-01

    ... that the functions are performed in accordance with trust standards as defined by Federal law. Trust... 25 Indians 2 2010-04-01 2010-04-01 false What is a trust evaluation? 1000.354 Section 1000.354... Trust Evaluation Review Annual Trust Evaluations § 1000.354 What is a trust evaluation? A trust...

  16. Lessons learnt from the organ retention controversy

    International Nuclear Information System (INIS)

    Madden, D.

    2009-01-01

    This paper examines the lessons to be learnt from the organ retention controversy in the Republic of Ireland. The paper emphasises the importance of good communication between clinicians and families of deceased persons and a move away from a medical culture based on paternalism to a partnership approach between clinicians and patients based on mutual trust and understanding. A model of authorisation rather than consent is proposed as the way forward for dealing with the difficult and traumatic experience of asking families for permission to carry out a post mortem examination on their deceased child. (authors)

  17. Social trust and ionizing radiation

    Energy Technology Data Exchange (ETDEWEB)

    Meadd, E. [Faculty of Environmental Studies, York University, Toronto, Ontario (Canada)

    2002-07-01

    The linkages that exist between the environmental risks associated with nuclear energy production (both perceived and real) and the myriad of social and political issues and processes that influence social trust are a current issue in literature, but are not well explored, particularly for the Canadian context. This paper will examine one particular issue and its relationship with social trust: ionizing radiation and public health. Social trust is defined for this paper as including interpersonal trust, but having a much broader focus, extending to public trust in governments, institutions, corporations, and the power elite, and across whole societies. Of particular interest for the nuclear energy issue is how waning social trust may impact the functioning of democratic decision-making processes, particularly those associated with the siting of waste facilities. Social trust is a central issue in the management of environmental risks, particularly those related to high technology; its absence is seen as a major cause of intractable conflict in decisions related to nuclear power generation and waste disposal. Understanding the dynamics of social trust is important if a resolution is to be found to the nuclear waste management debate in Canada, that is, one that involves broad public, or social, support. For instance, what factors cause distrust to emerge, and when distrust emerges, what authorities do members of affected communities seek out for information and support? This paper begins to examine social trust in relation to human health and ionizing radiation, particularly low dose radiation from radioactive wastes resulting from uranium and radium processing activities in Port Hope, Ontario. These activities date back to the 1930s and are of great concern to community members. This paper looks at some of the roots of public concern, for example, scientific uncertainty around whether or not human health is compromised by exposure to low dose ionizing radiation

  18. Social trust and ionizing radiation

    International Nuclear Information System (INIS)

    Meadd, E.

    2002-01-01

    The linkages that exist between the environmental risks associated with nuclear energy production (both perceived and real) and the myriad of social and political issues and processes that influence social trust are a current issue in literature, but are not well explored, particularly for the Canadian context. This paper will examine one particular issue and its relationship with social trust: ionizing radiation and public health. Social trust is defined for this paper as including interpersonal trust, but having a much broader focus, extending to public trust in governments, institutions, corporations, and the power elite, and across whole societies. Of particular interest for the nuclear energy issue is how waning social trust may impact the functioning of democratic decision-making processes, particularly those associated with the siting of waste facilities. Social trust is a central issue in the management of environmental risks, particularly those related to high technology; its absence is seen as a major cause of intractable conflict in decisions related to nuclear power generation and waste disposal. Understanding the dynamics of social trust is important if a resolution is to be found to the nuclear waste management debate in Canada, that is, one that involves broad public, or social, support. For instance, what factors cause distrust to emerge, and when distrust emerges, what authorities do members of affected communities seek out for information and support? This paper begins to examine social trust in relation to human health and ionizing radiation, particularly low dose radiation from radioactive wastes resulting from uranium and radium processing activities in Port Hope, Ontario. These activities date back to the 1930s and are of great concern to community members. This paper looks at some of the roots of public concern, for example, scientific uncertainty around whether or not human health is compromised by exposure to low dose ionizing radiation

  19. Geodynamic modelling of the Broken Hill mineralising system

    International Nuclear Information System (INIS)

    Hobbs, B.; Walshe, J.; Ord, A.; Zhang, Y.; Zhao, C.

    1999-01-01

    Full text: The origin of the Broken Hill ore body is the topic of considerable controversy and there are at least seven ore genesis models in vogue (Parr and Plimer, 1993). Unfortunately none of the data are definitive with respect to one model or another and progress in the area is hindered by protagonists adhering to their pet model by inventing processes that enable a problematic data set to fit their particular model. We attempt here to overcome some of these difficulties by adopting a very simplistic approach and assume that each data set is to be interpreted at face value with no attempt to distort the data so that it fits some predetermined philosophy. The data sets to be taken at face value are: (i) The carbon isotopic data which are ambiguous and can be taken to indicate either a source of carbon from organic sources and/or from deep crustal/mantle sources. (ii) The sulphur isotopic data which indicate a plutonic/hydrothermal source for the sulphur. (iii) The lead isotopic data which indicate a crustal source for the lead but perhaps with some mixing with a mantle source. (iv) The lead model age which indicates an age for the mineralisation ( 1675 Ma), 15 million years younger than the SHRIMP U-Pb ages for the host sediments (1690 Ma). However the errors are such that an origin synchronous with sedimentation is still possible. In the form of model constraints, we also assume that Broken Hill Type mineralisation is a true type, namely, Pb/Zn mineralisation that occurs in what are now amphibolite to granulite grades of metamorphism. This observation implies that the mineralisation is spatially and temporally associated with high grade metamorphism or that the site of mineralisation is associated with diagenesis or low grade metamorphism but is such that late in the geotectonic history that site is predestined to undergo high grade metamorphism. Since the only experimental data available on Pb/Zn solubilities involves oxidised fluids we are forced to develop

  20. International Trust and Public Diplomacy

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    as described by Brewer, Gross, Aday and Willnat (2004). The paper is based on case studies of five Public Diplomacy activities: Iranian President Hassan Rouhani’s letter in The Washington Post (2013); Denmark’s trust-building effort in Pakistan following the so-called “Muhammad crisis” (from 2010); The British......-level (Iran) or has created a framework for people-to-people relations (Denmark, UK and USA). A backlash was experienced in the case where a foreign state leader patronized the national leader (Russia). In all cases, respect for people in other countries despite differences in culture seems fundamental...... Council’s strategy for trust-building in China (2012); Russian President Vladimir Putin’s letter in The New York Times (2013), and the USA’s trust-building effort in Turkey (from 2006). The best results have been obtained where Public Diplomacy has been linked to successful traditional diplomacy at state...

  1. Trust Management System for Opportunistic Cloud Services

    DEFF Research Database (Denmark)

    Kuada, Eric

    2013-01-01

    We have over the past three years been working on the feasibility of Opportunistic Cloud Services (OCS) for enterprises. OCS is about enterprises strategically contributing and utilizing spare IT resources as cloud services. One of the major challenges that such a platform faces is data security...... and trust management issues. This paper presents a trust management system for OCS platforms. It models the concept of trust and applies it to OCS platforms. The trust model and the trust management system are verified through the simulation of the computation of the trust values with Infrastructure...

  2. Love Thy Neighbor: Bonding versus Bridging Trust

    OpenAIRE

    Poulsen, Odile; Svendsen, Gert Tinggaard

    2005-01-01

    We study how trust is generated in society. In a two-sector model, we analyze two communities. In the bonding community people do not trust people outside their regular networks. In the bridging community people choose to trust strangers when they meet them. The hypothesis is that when trust is only bonding, it cannot accumulate. Our theoretical contribution is to show that when trust is only bonding then the economy’s level of trust moves to an unstable equilibrium that may under certain con...

  3. The fair factor in matters of trust.

    Science.gov (United States)

    Williams, Lauren L

    2006-01-01

    Communities are bound together by trust among their members. Trust thrives when a pervasive sense of fairness exists. Evidence suggests that trust has social, professional, and economic value for today's organizations, making it worthy of attention. Matters of trust and justice are important and timely for nurse leaders to consider given the challenge to improve practice settings in a manner that enhances nurse satisfaction. The aim of this article is to make explicit the value in building organizational justice and trust within an organization's nursing community. Nursing leadership strategies are integrated, thus offering practical guidance in creating a culture of justice, making trust explicit, and establishing trustworthiness.

  4. Schrödinger operators on a periodically broken zigzag carbon ...

    Indian Academy of Sciences (India)

    In this paper, we study the spectra of Schrödinger operators on zigzag carbon nanotubes, which are broken by abrasion or during refining process. Throughout this paper, we assume that the carbon nanotubes are broken periodically and we deal with one of those models. Making use of the Floquet–Bloch theory, we ...

  5. suitability of broken bottles as fine aggregate for production of concrete

    African Journals Online (AJOL)

    user

    The maximum mean compressive strength of 19.0N/mm2 was obtained at 28days when sand and broken bottles were used in equal proportions. Density did not appear to have a discernible trend. For structural concrete, the proportion of broken bottles should be limited to 30% for early strength concrete and 40% when ...

  6. Listening to What Cannot Be Said: Broken Narratives and the Lived Body

    Science.gov (United States)

    Kokanovic, Renata; Stone, Meredith

    2018-01-01

    The core of this special issue of "Arts and Humanities in Higher Education" emerged from the "Broken Narratives and the Lived Body" conference held in 2016. The "Broken Narrative" essays included in this issue open up a critical space for understanding and theorising illness narratives that defy a conventional…

  7. Do professional boundaries limit trust?

    Science.gov (United States)

    Smythe, Elizabeth; Hennessy, Julia; Abbott, Max; Hughes, Frances

    2018-02-01

    The present study uses stories of mental health support workers talking about their relationship with clients to wonder about how trust might be limited by the professional boundaries of nursing. The writing arose out of an appreciative inquiry study looking at the role of mental health support workers. Participants talked about how they worked with their clients. As researchers, we were struck by the depth of trust that was built between worker and client. We have brought a phenomenological lens to wonder about the nature of trust, as shown in the data. The original research sought to identify what was working well for mental health support workers. The present study brings a phenomenological interpretive approach to four stories from the discovery phase of the study, with our thinking informed by Heidegger and van Manen. Interviews were conducted with 26 mental health support workers and six stakeholders in 2012-2103. For this paper, we drew from those transcripts stories of three mental health support workers and one stakeholder. Through a process of talking together, writing, and rewriting, we wondered about the meaning within these stories, with a strong focus on how trust was enacted. We saw that mental health support workers in this study, by not carrying the boundaries of being 'professional', seemed free to grow a stronger relationship of trust which was therapeutic. We ask: Is it time to rethink how professional boundaries limit the level of trust achieved with clients to the detriment of impactful care? © 2017 Australian College of Mental Health Nurses Inc.

  8. Two phases of the anyon gas and broken T symmetry

    International Nuclear Information System (INIS)

    Canright, G.S.; Rojo, A.G.

    1991-01-01

    This paper reports the first exact finite-temperature study of anyons. The authors' method is an extension to finite T of earlier numerical work with small numbers of anyons on a lattice. We study the spontaneous magnetization M 0 (T), since the signature has been identified as a key signature of broken T symmetry for anyon models. Our results confirm the two-phase picture suggested by earlier work: The authors find a low-temperature regime where M 0 is very small or zero, and a high-temperature regime where M 0 is of O(0.1 μ B ) per particle. In the high-temperature regime the authors can obtain an excellent estimate of M 0 (T) in the thermodynamic limit (which we call M 0 ∞ ). since our finite-size results extrapolate smoothly with little scatter. The authors' values for M 0 ∞ can then be compared with the results of μSR experiments on high-temperature superconductors, which set an upper experimental bound on the internal fields from such moments. The authors find that M 0 ∞ in a bulk material of many planes will almost certainly give a signal well above this threshold if (and only if) the planes are ordered ferromagnetically. In the antiferromagnetic case (which is strongly favored energetically) the signal from M 0 ∞ is probably undetectable. Finally, we estimate the transition temperature T c from our finite-size studies, obtaining a value on the order of a few hundred Kelvins

  9. Dynamically broken gauge model without fundamental scalar fields

    International Nuclear Information System (INIS)

    Snyderman, N.J.; Guralnik, G.S.

    1976-01-01

    It is shown that the structure that must be generated by dynamical symmetry breaking solutions to gauge theories can be explicitly implemented with a 4-fermion interaction. This structure arises in order to obtain consistency with the constraints imposed by a Goldstone commutator proportional to [anti psi psi]. One demonstrates these ideas within the context of axial electrodynamics, dynamically breaking chiral symmetry. As a pre-requisite it is shown how the Nambu-Jona-Lasinio model becomes renormalizable with respect to a systematic approximation scheme that respects the Goldstone commutator of dynamically broken chiral symmetry to each order of approximation. (This approximation scheme is equivalent to a l/N expansion, where N is set to unity at the end of the calculations). This solution generates new interactions not explicitly present in the original Lagrangian and does not have a 4-fermion contact interaction. The renormalized Green's functions are shown to correspond to those of the sigma-model, summed as though the fermions had N components, and for which lambda 0 = 2g 0 2 . This correspondence is exact except for the possibility that the renormalized coupling of the Nambu-Jona-Lasinio model may be a determined number

  10. Spontaneously broken spacetime symmetries and the role of inessential Goldstones

    Science.gov (United States)

    Klein, Remko; Roest, Diederik; Stefanyszyn, David

    2017-10-01

    In contrast to internal symmetries, there is no general proof that the coset construction for spontaneously broken spacetime symmetries leads to universal dynamics. One key difference lies in the role of Goldstone bosons, which for spacetime symmetries includes a subset which are inessential for the non-linear realisation and hence can be eliminated. In this paper we address two important issues that arise when eliminating inessential Goldstones. The first concerns the elimination itself, which is often performed by imposing so-called inverse Higgs constraints. Contrary to claims in the literature, there are a series of conditions on the structure constants which must be satisfied to employ the inverse Higgs phenomenon, and we discuss which parametrisation of the coset element is the most effective in this regard. We also consider generalisations of the standard inverse Higgs constraints, which can include integrating out inessential Goldstones at low energies, and prove that under certain assumptions these give rise to identical effective field theories for the essential Goldstones. Secondly, we consider mappings between non-linear realisations that differ both in the coset element and the algebra basis. While these can always be related to each other by a point transformation, remarkably, the inverse Higgs constraints are not necessarily mapped onto each other under this transformation. We discuss the physical implications of this non-mapping, with a particular emphasis on the coset space corresponding to the spontaneous breaking of the Anti-De Sitter isometries by a Minkowski probe brane.

  11. Floe-size distributions in laboratory ice broken by waves

    Science.gov (United States)

    Herman, Agnieszka; Evers, Karl-Ulrich; Reimer, Nils

    2018-02-01

    This paper presents the analysis of floe-size distribution (FSD) data obtained in laboratory experiments of ice breaking by waves. The experiments, performed at the Large Ice Model Basin (LIMB) of the Hamburg Ship Model Basin (Hamburgische Schiffbau-Versuchsanstalt, HSVA), consisted of a number of tests in which an initially continuous, uniform ice sheet was broken by regular waves with prescribed characteristics. The floes' characteristics (surface area; minor and major axis, and orientation of equivalent ellipse) were obtained from digital images of the ice sheets after five tests. The analysis shows that although the floe sizes cover a wide range of values (up to 5 orders of magnitude in the case of floe surface area), their probability density functions (PDFs) do not have heavy tails, but exhibit a clear cut-off at large floe sizes. Moreover, the PDFs have a maximum that can be attributed to wave-induced flexural strain, producing preferred floe sizes. It is demonstrated that the observed FSD data can be described by theoretical PDFs expressed as a weighted sum of two components, a tapered power law and a Gaussian, reflecting multiple fracture mechanisms contributing to the FSD as it evolves in time. The results are discussed in the context of theoretical and numerical research on fragmentation of sea ice and other brittle materials.

  12. Dynamically broken gauge model without fundamental scalar fields

    Energy Technology Data Exchange (ETDEWEB)

    Snyderman, N. J.; Guralnik, G. S.

    1976-01-01

    It is shown that the structure that must be generated by dynamical symmetry breaking solutions to gauge theories can be explicitly implemented with a 4-fermion interaction. This structure arises in order to obtain consistency with the constraints imposed by a Goldstone commutator proportional to (anti psi psi). One demonstrates these ideas within the context of axial electrodynamics, dynamically breaking chiral symmetry. As a pre-requisite it is shown how the Nambu-Jona-Lasinio model becomes renormalizable with respect to a systematic approximation scheme that respects the Goldstone commutator of dynamically broken chiral symmetry to each order of approximation. (This approximation scheme is equivalent to a l/N expansion, where N is set to unity at the end of the calculations). This solution generates new interactions not explicitly present in the original Lagrangian and does not have a 4-fermion contact interaction. The renormalized Green's functions are shown to correspond to those of the sigma-model, summed as though the fermions had N components, and for which lambda/sub 0/ = 2g/sub 0//sup 2/. This correspondence is exact except for the possibility that the renormalized coupling of the Nambu-Jona-Lasinio model may be a determined number.

  13. Entanglement entropy in quantum spin chains with broken reflection symmetry

    International Nuclear Information System (INIS)

    Kadar, Zoltan; Zimboras, Zoltan

    2010-01-01

    We investigate the entanglement entropy of a block of L sites in quasifree translation-invariant spin chains concentrating on the effect of reflection-symmetry breaking. The Majorana two-point functions corresponding to the Jordan-Wigner transformed fermionic modes are determined in the most general case; from these, it follows that reflection symmetry in the ground state can only be broken if the model is quantum critical. The large L asymptotics of the entropy are calculated analytically for general gauge-invariant models, which have, until now, been done only for the reflection-symmetric sector. Analytical results are also derived for certain nongauge-invariant models (e.g., for the Ising model with Dzyaloshinskii-Moriya interaction). We also study numerically finite chains of length N with a nonreflection-symmetric Hamiltonian and report that the reflection symmetry of the entropy of the first L spins is violated but the reflection-symmetric Calabrese-Cardy formula is recovered asymptotically. Furthermore, for noncritical reflection-symmetry-breaking Hamiltonians, we find an anomaly in the behavior of the saturation entropy as we approach the critical line. The paper also provides a concise but extensive review of the block-entropy asymptotics in translation-invariant quasifree spin chains with an analysis of the nearest-neighbor case and the enumeration of the yet unsolved parts of the quasifree landscape.

  14. Softly Broken Lepton Numbers: an Approach to Maximal Neutrino Mixing

    International Nuclear Information System (INIS)

    Grimus, W.; Lavoura, L.

    2001-01-01

    We discuss models where the U(1) symmetries of lepton numbers are responsible for maximal neutrino mixing. We pay particular attention to an extension of the Standard Model (SM) with three right-handed neutrino singlets in which we require that the three lepton numbers L e , L μ , and L τ be separately conserved in the Yukawa couplings, but assume that they are softly broken by the Majorana mass matrix M R of the neutrino singlets. In this framework, where lepton-number breaking occurs at a scale much higher than the electroweak scale, deviations from family lepton number conservation are calculable, i.e., finite, and lepton mixing stems exclusively from M R . We show that in this framework either maximal atmospheric neutrino mixing or maximal solar neutrino mixing or both can be imposed by invoking symmetries. In this way those maximal mixings are stable against radiative corrections. The model which achieves maximal (or nearly maximal) solar neutrino mixing assumes that there are two different scales in M R and that the lepton number (dash)L=L e -L μ -L τ 1 is conserved in between them. We work out the difference between this model and the conventional scenario where (approximate) (dash)L invariance is imposed directly on the mass matrix of the light neutrinos. (author)

  15. A Trusted Portable Computing Device

    Science.gov (United States)

    Ming-wei, Fang; Jun-jun, Wu; Peng-fei, Yu; Xin-fang, Zhang

    A trusted portable computing device and its security mechanism were presented to solve the security issues, such as the attack of virus and Trojan horse, the lost and stolen of storage device, in mobile office. It used smart card to build a trusted portable security base, virtualization to create a secure virtual execution environment, two-factor authentication mechanism to identify legitimate users, and dynamic encryption to protect data privacy. The security environment described in this paper is characteristic of portability, security and reliability. It can meet the security requirement of mobile office.

  16. Trust me, I am Robot!

    DEFF Research Database (Denmark)

    Stoyanova, Angelina; Drefeld, Jonas; Tanev, Stoyan

    of the emerging trust relationship is a key component of the use value of the robotic system and of the value proposition of the robotic system producers. The study is based on a qualitative research approach combining the phenomenological research paradigm with a grounded theory building approach based......The aim of this paper is to discuss some of the issues regarding the emergence of trust within the context of the interaction between human patients and medical rehabilitation technology based on robot system solutions. The starting assumption of the analysis is that the articulation...

  17. Maintaining control while delegating trust: Integrity constraints in trust management

    NARCIS (Netherlands)

    Etalle, S.; Winsborough, W.H.

    2009-01-01

    We introduce the use, monitoring, and enforcement of integrity constraints in trust management-style authorization systems. We consider what portions of the policy state must be monitored to detect violations of integrity constraints. Then, we address the fact that not all participants in a

  18. Understandig trust : longitudinal studies on trust dynamics in governance interactions

    NARCIS (Netherlands)

    Vries, de J.R.

    2014-01-01

    Trust is generally perceived as an important concept in governance processes where people cooperate, as it enables people to take risks and deal with uncertainties, and it facilitates cooperation. These characteristics are seen as important in new and alternative ways of implementing public

  19. Learning to trust: trust and attachment in early psychosis

    NARCIS (Netherlands)

    Fett, A.J.; Shergill, S.; Korver-Nieberg, N.; Yakub, F.; Gromann, P.; Krabbendam, L.

    2016-01-01

    Background Distrust and social dysfunction are characteristic in psychosis and may arise from attachment insecurity, which is elevated in the disorder. The relationship between trust and attachment in the early stages of psychosis is unknown, yet could help to understand interpersonal difficulties

  20. Validity of the broken-pair approximation for N = 50, even-A nuclei

    International Nuclear Information System (INIS)

    Haq, S.; Gambhir, Y.K.

    1977-01-01

    The validity of the broken-pair approximation as an approximation to the seniority shell model is investigated. The results of the broken-pair approximation and the seniority shell model, obtained by employing identical input information (single-particle levels and their energies, effective two-body matrix elements, 88 Sr inert core) for N = 50, even-A nuclei are compared. A close agreement obtained between the calculated broken-pair approximation and the seniority shell model energies for 90 Zr, 92 Mo, 94 Ru, and 96 Pd nuclei and large (95--100 %) overlaps between the broken-pair approximation and the senority shell model wave functions for 92 Mo, demonstrates the validity of the broken-pair approximation in this region and in general its usefulness as a good approximation to the seniority shell model

  1. Trust and Distrust in E-Commerce

    Directory of Open Access Journals (Sweden)

    Suk-Joo Lee

    2018-03-01

    Full Text Available Trust is the key ingredient for sustainable transactions. In the concept of trust, the trustor trusts the trustees. In e-commerce, the trustor is the buyer and the trustees are the intermediaries and the seller. Intermediaries provide the web-based infrastructure that enables buyers and sellers to make transactions. Trust is the buyer’s judgment and comprises two distinct concepts; both trust and distrust reside in the trustor. The purpose of this study was to examine the complicated effects of trust and distrust on a buyer’s purchase intentions. Previous studies have provided theoretical frameworks illustrating co-existent trust and distrust, trust transfers from one to another, and trust in buyer-intermediary-seller relationships. Based on these frameworks, this study (i presented a holistic model that contained the judgment of buyers resulting in trust or distrust in the intermediary and the seller; (ii investigated trust and distrust transfer from the intermediary to the seller, and (iii explored the effects of various antecedents that affect trust and distrust. To validate the proposed model, we employed Partial Least Squares (PLS. A summary of key findings are as follows. First, buyer’s trust in an intermediary positively affected his or her trust in the seller, positively influencing purchase intention. In other words, we found the trust transfer from an intermediary to its seller. Second, distrust in an intermediary directly impacted on the buyer’s perceived risk, negatively influencing his or her purchase intentions. Third, structural assurance and perceived website quality of an intermediary gave a positive impact on buyer’s trust in the intermediary. The results of this study shed light on the necessity of managing both trust and distrust to facilitate sales in e-commerce.

  2. An Operational Semantics for Trust Policies

    DEFF Research Database (Denmark)

    Krukow, Karl

    2006-01-01

    In the trust-structure framework for trust management, principals specify their trusting relationships in terms of trust policies. In their paper on trust structures, Carbone et al. present a language for such policies, and provide a suitable denotational semantics. The semantics ensures that for......In the trust-structure framework for trust management, principals specify their trusting relationships in terms of trust policies. In their paper on trust structures, Carbone et al. present a language for such policies, and provide a suitable denotational semantics. The semantics ensures...... that for any collection of policies, there is always a unique global trust-state, compatible with all the policies, specifying everyone's degree of trust in everyone else. However, as the authors themselves point out, the language lacks an operational model: the global trust-state is a well......-defined mathematical object, but it is not clear how principals can actually compute it. This becomes even more apparent when one considers the intended application environment: vast numbers of autonomous principals, distributed and possibly mobile. We provide a compositional operational semantics for a language...

  3. Lessons Learned

    Directory of Open Access Journals (Sweden)

    Amanda Phelan BNS, MSc, PhD

    2015-03-01

    Full Text Available The public health nurses’ scope of practice explicitly includes child protection within their role, which places them in a prime position to identify child protection concerns. This role compliments that of other professions and voluntary agenices who work with children. Public health nurses are in a privileged position as they form a relationship with the child’s parent(s/guardian(s and are able to see the child in its own environment, which many professionals cannot. Child protection in Ireland, while influenced by other countries, has progressed through a distinct pathway that streamlined protocols and procedures. However, despite the above serious failures have occurred in the Irish system, and inquiries over the past 20 years persistently present similar contributing factors, namely, the lack of standardized and comprehensive service responses. Moreover, poor practice is compounded by the lack of recognition of the various interactional processes taking place within and between the different agencies of child protection, leading to psychological barriers in communication. This article will explore the lessons learned for public health nurses practice in safeguarding children in the Republic of Ireland.

  4. Adequate trust avails, mistaken trust matters: on the moral responsibility of doctors as proxies for patients' trust in biobank research.

    Science.gov (United States)

    Johnsson, Linus; Helgesson, Gert; Hansson, Mats G; Eriksson, Stefan

    2013-11-01

    In Sweden, most patients are recruited into biobank research by non-researcher doctors. Patients' trust in doctors may therefore be important to their willingness to participate. We suggest a model of trust that makes sense of such transitions of trust between domains and distinguishes adequate trust from mistaken trust. The unique position of doctors implies, we argue, a Kantian imperfect duty to compensate for patients' mistaken trust. There are at least three kinds of mistaken trust, each of which requires a different set of countermeasures. First, trust is mistaken when necessary competence is lacking; the competence must be developed or the illusion dispelled. Second, trust is irrational whenever the patient is mistaken about his actual reasons for trusting. Care must therefore be taken to support the patient's reasoning and moral agency. Third, some patients inappropriately trust doctors to recommend only research that will benefit them directly. Such trust should be counteracted by nurturing a culture where patients expect to be asked occasionally to contribute to the common good. © 2012 John Wiley & Sons Ltd.

  5. The Knitting Lesson.

    Science.gov (United States)

    Smith, Pamela

    1987-01-01

    Based on Jean-Francois Millet's 1869 painting, "The Knitting Lesson," this lesson's goal is to introduce students in grades seven through nine to genre (everyday life) painting the nineteenth century. The lesson is also designed to show that some aspects of genre may be timeless. (BSR)

  6. Online health information - what can you trust?

    Science.gov (United States)

    ... 000869.htm Online health information - what can you trust? To use the sharing features on this page, ... the difference? To find health information you can trust, you have to know where and how to ...

  7. Trust Mines: Legal Documents and Settlements

    Science.gov (United States)

    Legal Documents and Settlements related to the Northern Abandoned Uranium Mines Region including the Phase 1 Settlement Agreement and Environmental Response Trust Agreement, Phase 2 Settlement Agreement Removal Site Evaluation (RSE) Trust Agreement.

  8. Trust and Dialogue in the Army Profession

    National Research Council Canada - National Science Library

    Lewis, III, James M

    2008-01-01

    .... Trust involves the expectation that the object of trust will behave in a favorable manner, and includes the willingness of a person to be vulnerable to the actions of another based on this expectation...

  9. An Outline of Interpersonal Trust and Distrust

    DEFF Research Database (Denmark)

    Pedersen, Esther Oluffa

    2015-01-01

    The article is part of the dialogue "Intentional Trust in Uganda" with anthropologist Lotte Meinert......The article is part of the dialogue "Intentional Trust in Uganda" with anthropologist Lotte Meinert...

  10. Trust Networks on the Semantic Web

    National Research Council Canada - National Science Library

    Golbeck, Jennifer; Parisa, Bijan; Hendler, James

    2006-01-01

    The so-called "Web of Trust" is one of the ultimate goals of the Semantic Web. Research on the topic of trust in this domain has focused largely on digital signatures, certificates, and authentication...

  11. A Calculus for Trust Management

    DEFF Research Database (Denmark)

    Carbone, Marco; Nielsen, Mogens; Sassone, Vladimiro

    2004-01-01

    principals to policies. We elect to formalise policies using a Datalog-like logic, and to express protocols in the process algebra style. This yields an expressive calculus very suitable for the global computing scenarios, and provides a formalisation of notions such as trust evolution. For ctm we define...

  12. Afgivelse af formue til trusts

    DEFF Research Database (Denmark)

    Feldthusen, Rasmus Kristian

    2009-01-01

    Kravet om at en stifter skal have foretaget en "uigenkaldelig og effektiv udskillelse" for at dansk skatteret vil anerkende at der foreligger en trust vurderes. Kravet er senest lagt til grund i SKM 2009.249 SR. Forfatteren opfordrer til, at SKAT i stedet foretager en konkret vurdering af selve...

  13. Description of the Wellcome Trust

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    @@ Introduction The Wellcome Trust supports research of the highest quality with the aim of improving human and animal health, and our Strategic Plan provides the framework for how we intend to evolve our support to be even more effective in achieving this aim.

  14. INNOVATION - THE ROLE OF TRUST

    Directory of Open Access Journals (Sweden)

    Kornélia Lazányi

    2017-11-01

    Full Text Available Innovations and constant change are inevitable parts of our everyday lives. It is not only because advanced technologies are more effective, but mostly because in the 21st century more and more realise that scarce resources – among them the safe and clean environment as such - necessitate a paradigm change and intense innovation. This revolution is easily trackable in the organisational and (supranational policies. However, innovation, and its necessary prerequisites are seldom investigated from the individuals’ point of view. It is easy to understand that inter-organisational trust is inevitable on both the consumers’ and the providers’ (innovators’ side, however, it has to be made clear that an innovative organisation has to create a trusting environment within the company, in order to foster collaboration, the generation of new ideas, creativity and finally innovation. The present paper endeavours to call attention to the notion of trust and its antecedents and consequences in relation to innovations. The aim is to provide assistance in understanding how to develop trust in each other and hence foster further innovations and development.

  15. Social Capital. Trust and Ideology

    Directory of Open Access Journals (Sweden)

    Jacek TITTENBRUN

    2013-06-01

    Full Text Available The paper offers a critical analysis of the central concept around which the popular construct of social capital is organised, i.e. trust. To this end the views of Fukuyama, the leading exponent of the said concept are considered. As a result, the concept in question is found to be ideologically charged and substantively weak in many respects.

  16. Social Capital. Trust and Ideology

    OpenAIRE

    TITTENBRUN Jacek

    2013-01-01

    The paper offers a critical analysis of the central concept around which the popular construct of social capital is organised, i.e. trust. To this end the views of Fukuyama, the leading exponent of the said concept are considered. As a result, the concept in question is found to be ideologically charged and substantively weak in many respects.

  17. Ombud's Corner: tried and trusted

    CERN Multimedia

    Sudeshna Datta-Cockerill

    2014-01-01

    Trust is an essential ingredient in all working relationships. When trust breaks down, conflicts may arise and teams may stop working in harmony. The Ombud is there to help you to find your way out before the point of no return is reached.   Reliability, integrity, expertise and good will: these are the four pillars on which trust is built. Trust between colleagues may break down for many different reasons, including misunderstandings, and the way to restoring the relationship is through working on these four pillars. For instance, if we assume that we do indeed have the expertise to deal with a particular task assigned to us, we may need to improve our reliability by making sure that we meet deadlines and expectations or demonstrate our integrity by acknowledging and accepting accountability for this, all the while showing that we are doing our best to do whatever it takes to achieve the common goals and restore our colleagues’ faith in us. All four of these pillars need to be in...

  18. Income trusts and limited partnerships

    International Nuclear Information System (INIS)

    Toews, E.L.

    1999-01-01

    This author provided a conceptual overview of income trusts and limited partnerships that are designed to pass operating cash flow directly to investors without the imposition of corporate taxes, discussed the evolution of the market, the mechanism used to price income funds, past and present performance of the sector, and made some predictions concerning the sector's future performance. 13 figs

  19. Consumer Trust in E-commerce

    OpenAIRE

    Gustavsson, Malin; Johansson, Anne-Marie

    2006-01-01

    An often mentioned reason for consumers not purchasing from Internet vendors, is the lack of trust. The lack of physical clues and physical interaction in the online environment make it more difficult to establish trust with the consumers. So, it is important for companies to learn how to manage consumers’ trust in e-commerce. Although, building consumer trust on the Internet is a challenge for online vendors. The purpose with this dissertation was to get a better understanding of consumer t...

  20. Radioactive contamination of oil produced from nuclear-broken shale

    International Nuclear Information System (INIS)

    Arnold, W.D.; Crouse, D.J.

    1970-01-01

    The results of small-scale exposure and retorting tests indicate that oil recovered from shale that has been broken with nuclear explosives will be contaminated with tritium. When oil shale was heated in sealed flasks with tritiated water vapor or with tritiated hydrogen, both the shale and the oil subsequently retorted from the shale contained tritium. There was much less contamination of the shale or oil, however, when the shale was exposed to tritiated methane and ethane. Contamination of shale and oil with tritium, as the result, of exposure to tritiated water, increased as the exposure temperature, exposure pressure, and the tritium concentration in the water were increased. This contamination also increased as the exposure time was increased up to 25 days, but not significantly thereafter. More than 90% of the tritium was removed from contaminated shale by treating the shale with moist air at elevated temperatures. Only small amounts of the tritium were removed from crude oil by contacting it with solid drying agents or with water. When tritium-contaminated shale oil was distilled, the tritium contents of the recovered fractions were found to be approximately equal. After being heated with a sample of underground test-shot debris, liquid shale oil became contaminated with radioactive fission products. Most of the radioactivity of the oil was due to finely dispersed solids rather than to dissolved radionuclides. Filtration of the oil removed a major fraction of the radioactive material. When the contaminated oil was distilled, more than 99% of the radionuclides remained in the pot residue. (author)

  1. Radioactive contamination of oil produced from nuclear-broken shale

    Energy Technology Data Exchange (ETDEWEB)

    Arnold, W D; Crouse, D J

    1970-05-15

    The results of small-scale exposure and retorting tests indicate that oil recovered from shale that has been broken with nuclear explosives will be contaminated with tritium. When oil shale was heated in sealed flasks with tritiated water vapor or with tritiated hydrogen, both the shale and the oil subsequently retorted from the shale contained tritium. There was much less contamination of the shale or oil, however, when the shale was exposed to tritiated methane and ethane. Contamination of shale and oil with tritium, as the result, of exposure to tritiated water, increased as the exposure temperature, exposure pressure, and the tritium concentration in the water were increased. This contamination also increased as the exposure time was increased up to 25 days, but not significantly thereafter. More than 90% of the tritium was removed from contaminated shale by treating the shale with moist air at elevated temperatures. Only small amounts of the tritium were removed from crude oil by contacting it with solid drying agents or with water. When tritium-contaminated shale oil was distilled, the tritium contents of the recovered fractions were found to be approximately equal. After being heated with a sample of underground test-shot debris, liquid shale oil became contaminated with radioactive fission products. Most of the radioactivity of the oil was due to finely dispersed solids rather than to dissolved radionuclides. Filtration of the oil removed a major fraction of the radioactive material. When the contaminated oil was distilled, more than 99% of the radionuclides remained in the pot residue. (author)

  2. Trust and School Life: The Role of Trust for Learning, Teaching, Leading, and Bridging

    Science.gov (United States)

    Van Maele, Dimitri, Ed.; Forsyth, Patrick B., Ed.; Van Houtte, Miek, Ed.

    2014-01-01

    This book samples recent and emerging trust research in education including an array of conceptual approaches, measurement innovations, and explored determinants and outcomes of trust. The collection of pathways explores the phenomenon of trust and establishes the significance of trust relationships in school life. It emboldens the claim that…

  3. Racial and Religious Discrimination in Charitable Trusts: A Current Analysis of Constitutional and Trust Law Solutions

    Science.gov (United States)

    Adams, Roy M.

    1976-01-01

    The process by which constitutional and trust law have blended together in the charitable trust field is examined. Focus is on whether a settlor can expect racial and religious restrictions in a charitable trust to be allowed, how to deal with them if they are, and what happens to the trust property if they are not. (LBH)

  4. The Trust Project - Symbiotic Human Machine Teams: Social Cueing for Trust and Reliance

    Science.gov (United States)

    2016-06-30

    AFRL-RH-WP-TR-2016-0096 THE TRUST PROJECT - SYMBIOTIC HUMAN-MACHINE TEAMS: SOCIAL CUEING FOR TRUST & RELIANCE Susan Rivers, Monika Lohani, Marissa...30 JUN 2012 – 30 JUN 2016 4. TITLE AND SUBTITLE THE TRUST PROJECT - SYMBIOTIC HUMAN-MACHINE TEAMS: SOCIAL CUEING FOR TRUST & RELIANCE 5a. CONTRACT

  5. Trust, accreditation and Philanthropy in the Netherlands

    NARCIS (Netherlands)

    Bekkers, R.H.F.P.

    2003-01-01

    Given the increasing numbers of scandals, the awareness among fund-raisers that the public's trust is crucial for the nonprofit sector is growing. This study investigates the relationship between trust and charitable giving. Charitable organizations can increase the public's trust by signaling their

  6. Trust, accreditation, and philanthropy in the Netherlands.

    NARCIS (Netherlands)

    Bekkers, Rene H.F.P.

    2003-01-01

    Given the increasing numbers of scandals, the awareness among fund-raisers that the public’s trust is crucial for the nonprofit sector is growing. This study investigates the relationship between trust and charitable giving. Charitable organizations can increase the public’s trust by signaling their

  7. The Role of Trust in Computer Security

    DEFF Research Database (Denmark)

    Jensen, Christian D.

    2012-01-01

    technologies and show how many of them concern the placement of trust on human or system agents. We argue that making such assumptions about trust explicit is an essential requirement for the future of system security and argue why the formalisation of computational trust is necessary when we wish to reason...

  8. Public trust: expectancies, beliefs, and behavior

    NARCIS (Netherlands)

    Alink, D.

    2014-01-01

    Most people think of trust as the bonding force between people in romantic, professional, and family relationships. Of growing importance however is public trust: trust in organizations that are not represented by a single person, such as companies, non-profit organizations and governmental

  9. The edge of trust : An introduction

    NARCIS (Netherlands)

    Evans, A.M.; Krueger, J.I.

    2015-01-01

    The dynamics of interpersonal trust are an essential part of understanding how people think and act in social interactions. Trust enables human beings to form meaningful personal relationships (Simpson, 2007) and engage in mutually profitable social and economic exchanges (Kohn, 2008). Yet, trust is

  10. Does transparent government agencies strengthen trust?

    NARCIS (Netherlands)

    Grimmelikhuijsen, S.G.

    2009-01-01

    Trust in government has been shown to be volatile in recent years and Internet transparency is seen as a solution to strengthen trust. However, critics argue that transparency will only lead to less trust, and sceptics say that it has no effect at all. This debate on transparency is lacking

  11. Trust and Relationship Building in Electronic Commerce.

    Science.gov (United States)

    Papadopoulou, Panagiota; Andreou, Andreas; Kanellis, Panagiotis; Martakos, Drakoulis

    2001-01-01

    Discussion of the need for trust in electronic commerce to build customer relationships focuses on a model drawn from established theoretical work on trust and relationship marketing that highlights differences between traditional and electronic commerce. Considers how trust can be built into virtual environments. (Contains 50 references.)…

  12. Temperament Constructs Related to Betrayal of Trust

    Science.gov (United States)

    1991-12-01

    disintegrate. The interrelatedness between system trust and interpersonal trust has been noted by Durkheim (1933), who predicted a loss of trust in others...and suspicion. Journal of Conflict Resolution, 2, 265-279. Durkheim , E. (1933). The division of labor in societ’. New York: Free Press of Glencoe

  13. Trusted Truck(R) II (phase A).

    Science.gov (United States)

    2009-01-01

    The Trusted Truck Program was initiated in 2003 as a joint effort by NTRCI, Volvo and UT. The vision of the Trusted Truck program is to develop a secure and "trusted" transport solution from pickup to delivery. The program's objective is to incre...

  14. Trust in initial encounters : a motivational, cognitive theory

    OpenAIRE

    Johansen, Svein Tvedt

    2007-01-01

    In this dissertation I develop a theoretical model on the effects of risk on the formation of trust in the initial stages of a relationship. Risk is proposed to influence trust in two ways: First, risk exerts a direct influence on trust. Risk may decrease trust, increase trust, or increase trust under specific conditions. Second, risk may affect the level of trust indirectly by influencing the effect of social stimuli on the formation of trust. In this second indirect effect of risk, ri...

  15. The Effects of Trust Transference, Mobile Attributes and Enjoyment on Mobile Trust

    Directory of Open Access Journals (Sweden)

    Cristiane Junqueira Giovannini

    2015-01-01

    Full Text Available Trust is essential in building relationships. In mobile commerce, as in electronic commerce, trust is even more valuable given the absence of human contact and direct observation of the service provider. Despite the importance of trust for mobile commerce, there has been little academic effort to study the relationships between mobile devices unique components of interactivity and customer trust, or the relationship between offline, online and mobile trust. This study proposes a trust-mediated model for customer attitude and transaction intentions in mobile commerce contexts that incorporates trust transference and unique factors present in mobile commerce. Data were collected in an online survey and analyzed via structural equations modeling. Results suggest that trust transferred from online contexts and ease of use have significant effects on mobile trust formation, while also indicating that mobile trust influences consumers’ attitudes and intentions to purchase using mobile devices.

  16. Simple New Screw Insertion Technique without Extraction for Broken Pedicle Screws.

    Science.gov (United States)

    Kil, Jin-Sang; Park, Jong-Tae

    2018-05-01

    Spinal transpedicular screw fixation is widely performed. Broken pedicle screw rates range from 3%-7.1%. Several techniques have been described for extraction of broken pedicle screws. However, most of these techniques require special instruments. We describe a simple, modified technique for management of broken pedicle screws without extraction. No special instruments or drilling in an adjacent pedicle are required. We used a high-speed air drill with a round burr. With C-arm fluoroscopy guidance, the distal fragment of a broken pedicle screw was palpated using free-hand technique through the screw entry hole. A high-speed air drill with a round burr (not a diamond burr) was inserted through the hole. Drilling began slowly and continued until enough space was obtained for new screw insertion. Using this space, we performed new pedicle screw fixation medially alongside the distal fragment of the broken pedicle screw. We performed the insertion with a previously used entry hole and pathway in the pedicle. The same size pedicle screw was used. Three patients were treated with this modified technique. New screw insertion was successful in all cases after partial drilling of the distal broken pedicle screw fragment. There were no complications, such as screw loosening, dural tears, or root injury. We describe a simple, modified technique for management of broken pedicle screws without extraction. This technique is recommended in patients who require insertion of a new screw. Copyright © 2017. Published by Elsevier Inc.

  17. Mixed-fault diagnosis in induction motors considering varying load and broken bars location

    International Nuclear Information System (INIS)

    Faiz, Jawad; Ebrahimi, Bashir Mahdi; Toliyat, H.A.; Abu-Elhaija, W.S.

    2010-01-01

    Simultaneous static eccentricity and broken rotor bars faults, called mixed-fault, in a three-phase squirrel-cage induction motor is analyzed by time stepping finite element method using fast Fourier transform. Generally, there is an inherent static eccentricity (below 10%) in a broken rotor bar induction motor and therefore study of the mixed-fault case could be considered as a real case. Stator current frequency spectrum over low frequencies, medium frequencies and high frequencies are analyzed; static eccentricity diagnosis and its distinguishing from the rotor bars breakage in the mixed-fault case are described. The contribution of the static eccentricity and broken rotor bars faults are precisely determined. Influence of the broken bars location upon the amplitudes of the harmonics due to the mixed-fault is also investigated. It is shown that the amplitudes of harmonics due to broken bars placed on one pole are larger than the case in which the broken bars are distributed on different poles. In addition, influence of varying load on the amplitudes of the harmonics due to the mixed-fault is studied and indicated that the higher load increases the harmonics components amplitudes due to the broken bars while the static eccentricity degree decreases. Simulation results are confirmed by the experimental results.

  18. Lessons learned bulletin

    International Nuclear Information System (INIS)

    1994-05-01

    During the past four years, the Department of Energy -- Savannah River Operations Office and the Westinghouse Savannah River Company (WSRC) Environmental Restoration (ER) Program completed various activities ranging from waste site investigations to closure and post closure projects. Critiques for lessons learned regarding project activities are performed at the completion of each project milestone, and this critique interval allows for frequent recognition of lessons learned. In addition to project related lessons learned, ER also performs lessons learned critiques. T'he Savannah River Site (SRS) also obtains lessons learned information from general industry, commercial nuclear industry, naval nuclear programs, and other DOE sites within the complex. Procedures are approved to administer the lessons learned program, and a database is available to catalog applicable lessons learned regarding environmental remediation, restoration, and administrative activities. ER will continue to use this database as a source of information available to SRS personnel

  19. Toward a generic model of trust for electronic commerce

    NARCIS (Netherlands)

    Tan, YH; Thoen, W

    2000-01-01

    The authors present a generic model of trust for electronic commerce consisting of two basic components, party trust and control trust, based on the concept that trust in a transaction with another party combines trust in the other parry and trust in the control mechanisms that ensure the successful

  20. Predators and the public trust.

    Science.gov (United States)

    Treves, Adrian; Chapron, Guillaume; López-Bao, Jose V; Shoemaker, Chase; Goeckner, Apollonia R; Bruskotter, Jeremy T

    2017-02-01

    Many democratic governments recognize a duty to conserve environmental resources, including wild animals, as a public trust for current and future citizens. These public trust principles have informed two centuries of U.S.A. Supreme Court decisions and environmental laws worldwide. Nevertheless numerous populations of large-bodied, mammalian carnivores (predators) were eradicated in the 20th century. Environmental movements and strict legal protections have fostered predator recoveries across the U.S.A. and Europe since the 1970s. Now subnational jurisdictions are regaining management authority from central governments for their predator subpopulations. Will the history of local eradication repeat or will these jurisdictions adopt public trust thinking and their obligation to broad public interests over narrower ones? We review the role of public trust principles in the restoration and preservation of controversial species. In so doing we argue for the essential roles of scientists from many disciplines concerned with biological diversity and its conservation. We look beyond species endangerment to future generations' interests in sustainability, particularly non-consumptive uses. Although our conclusions apply to all wild organisms, we focus on predators because of the particular challenges they pose for government trustees, trust managers, and society. Gray wolves Canis lupus L. deserve particular attention, because detailed information and abundant policy debates across regions have exposed four important challenges for preserving predators in the face of interest group hostility. One challenge is uncertainty and varied interpretations about public trustees' responsibilities for wildlife, which have created a mosaic of policies across jurisdictions. We explore how such mosaics have merits and drawbacks for biodiversity. The other three challenges to conserving wildlife as public trust assets are illuminated by the biology of predators and the interacting

  1. "It Reminded Me of What Really Matters": Teacher Responses to the Lessons from Auschwitz Project

    Science.gov (United States)

    Maitles, Henry; Cowan, Paula

    2012-01-01

    Since 2007, the Lessons from Auschwitz Project organised by the Holocaust Education Trust, has taken groups of Scottish senior school students (between 16 and 18 years) and where possible an accompanying teacher from their school, to Auschwitz-Birkenau Memorial and Museum as part of a process of increasing young people's knowledge and…

  2. The Process Perspective on Trust in Organizations

    DEFF Research Database (Denmark)

    Jagd, Søren

    Several trust researchers have pointed to the relevance of the process perspective for understanding trust in organizations. In this paper I review the attempts to apply the process perspective in trust research distinguishing between a soft and a strong process perspective. It appears that nearly......’s history? A few examples of studies applying a strong process perspective to trust in organizations is discussed.  Summarising, I argue that the process perspective, in general, may contribute furthering the understanding of the complexities of the development of trust over time and that the strong process...

  3. Analyzing Trust Perceptions in System Implementations

    DEFF Research Database (Denmark)

    Schlichter, Bjarne Rerup; Rose, Jeremy

    2009-01-01

    ' perceptions of trust relations influence future actions, and in this way have both negative and positive consequences. We also conclude that Giddens' theories of trust provide a promising insight into the dynamic aspects of trust relations in implementation projects, which go further than trust theories...... a framework based on Giddens´ theory of modernity. The framework theorizes dynamic elements of the evolution of trust, not previously investigated in this context. The data collection involves 4 actors interviewed twice in 2006 and 2007; and the data analysis strategy is content analysis using Nvivo software...

  4. Trust, Welfare States and Income Equality

    DEFF Research Database (Denmark)

    Bergh, Andreas; Bjørnskov, Christian

    2014-01-01

    The cross-country correlation between social trust and income equality is well documented, but few studies examine the direction of causality. We show theoretically that by facilitating cooperation, trust may lead to more equal outcomes, while the feedback from inequality to trust is ambiguous....... Using a structural equation model estimated on a large country sample, we find that trust has a positive effect on both market and net income equality. Larger welfare states lead to higher net equality but neither net income equality nor welfare state size seems to have a causal effect on trust. We...

  5. Economic and Other Determinants of Political Trust

    Directory of Open Access Journals (Sweden)

    William R. DiPietro

    2016-01-01

    Full Text Available Political trust is important for the effective functioning of government. This paper uses cross country regression analysis to see whether three different measures of economic performance matter for political trust. The results lend support to the hypothesis that political trust is influenced by economic growth, the standard of living, and the appropriate use of government spending. In addition, the paper considers two institutional variables, perceived independence of the judiciary and the degree of democracy to assess their effect on political trust. It finds that perceived judicial independence has a positive effect on political trust, but democracy has a negative effect.

  6. Water, oil, climate: a dried-up broken down world

    International Nuclear Information System (INIS)

    Gautier, C.; Fellous, J.L.

    2008-01-01

    Climate crisis, oil crisis, water crisis, food crisis: the 21. century has started badly. Climate is deteriorating under man's action and natural resources are drying up while demand is still on the rise under the double effect of demographic and economic growth. Even worse, tensions are working together and worsen each other in a climate of financial crisis. All warning lights are on the red and a huge challenge has been launched which involves all countries, developed and developing. Solutions are urgently needed, otherwise our civilization would be threatened. The reasoned use of technologies, but also the abatement of poverty and inequalities and the education of people are essential points to take up the challenge. The authors examine the interconnections between energy, water, food at the time of climate change and explore the possible alternative solutions. The lesson that should be learnt from their analysis is that everyone should contribute to the complex decisions that will have an impact on the future of humanity. (J.S.)

  7. The social context of trust relations

    Directory of Open Access Journals (Sweden)

    Kojić Milena

    2017-01-01

    Full Text Available In the widest sense, this paper focuses on the problematization (and operationalization of the concept of trust and its social context, with a special emphasis on its multiple meanings, the ways of establishing trust, as well as its functions. After pointing to the various definitions of trust that highlight its cognitive, behavioral, and relational groundings, we proceed to examine the aspects of 'social embeddedness' of trust. In this context, we highlight the structural aspect of trust relations, their institutional embeddedness, mediation through cultural meanings, as well as the wider context of social circumstances and limitations. We place a special emphasis on the concept of 'trust culture', its morphogenesis and functions, as well as the significance of trust culture in the context of diminishing the social uncertainty that arises in the situations when trust is demonstrated. Finally, we point to the social functions of trust on the macro level, the functional substitutes for trust, as well as the relationship between trust and social capital.

  8. Trusting the other or taking a chance?

    DEFF Research Database (Denmark)

    Frederiksen, Morten; Heinskou, Marie Bruvik

    2016-01-01

    Theories of modernity and risk society argue that increasing levels of risk fundamentally alter or lower the level of trust in society. In this article we argue that this assumption is based in a fallacious theoretical link between trust and risk. Rather than calculative assessment of risk...... and specific events, trust directs anticipation towards process. First, we outline dominant approaches to trust as a question of actions and uncertainty of outcomes, arguing that these approaches treat trust and chance as interchangeable, conflating the different socio-temporalities within which risk and trust......, respectively, reside. Secondly, the issue of temporality is traced in Luhmann’s work on trust and it is demonstrated how his dichotomous treatment of social time conflates markedly different temporal experiences. As a solution to this, the article presents the notion of a third temporal mode of the process...

  9. Trust-Based Leadership in the Making

    DEFF Research Database (Denmark)

    Bentzen, Tina Øllgaard; Jagd, Søren

    I spite of the popularity of trust-based leadership in consultancy and popular management writings empirical research on the transformation from traditional top-down to trust-based leadership is still limited. In this paper we study the implementation of a trust-based leadership reform in the City...... of Copenhagen taking place since 2012. We focus on understanding the trust dynamics in this major transformation. We show that the implementation of trust-based leadership should be seen as an emergent process involving a variety of actors within the organization. The case study reveals that the Trust Reform...... indicates that the implementation of a radical management reform involves a complex interplay of trust relations between actors at multiple levels of the organization....

  10. Trust dynamics in a large system implementation

    DEFF Research Database (Denmark)

    Schlichter, Bjarne Rerup; Rose, Jeremy

    2013-01-01

    outcomes, but largely ignored the dynamics of trust relations. Giddens, as part of his study of modernity, theorises trust dynamics in relation to abstract social systems, though without focusing on information systems. We use Giddens’ concepts to investigate evolving trust relationships in a longitudinal......A large information systems implementation (such as Enterprise Resource Planning systems) relies on the trust of its stakeholders to succeed. Such projects impact diverse groups of stakeholders, each with their legitimate interests and expectations. Levels of stakeholder trust can be expected...... case analysis of a large Integrated Hospital System implementation for the Faroe Islands. Trust relationships suffered a serious breakdown, but the project was able to recover and meet its goals. We develop six theoretical propositions theorising the relationship between trust and project outcomes...

  11. The Relationship between Teamwork and Organizational Trust

    Directory of Open Access Journals (Sweden)

    Musab Isik

    2016-01-01

    Full Text Available The aim of this study is to investigate the relationship between teamwork and organizational trust. In the implementation section the data from the survey of 250 workers is employed in call centers in Erzurum by using relevant statistical  methods. Consequently, it is found that there is a positive and significant relationship between teamwork and organizational trust. Thus, the hypothesis of the study is supported as it was expected. Besides, it is found that there are positive and significant relationships between communication, openness to innovation, participation-trust in teamwork and organizational trust, trust in management, trust in co-workers, and trust in workplace.

  12. Robot transparency, trust and utility

    Science.gov (United States)

    Wortham, Robert H.; Theodorou, Andreas

    2017-07-01

    As robot reasoning becomes more complex, debugging becomes increasingly hard based solely on observable behaviour, even for robot designers and technical specialists. Similarly, non-specialist users have difficulty creating useful mental models of robot reasoning from observations of robot behaviour. The EPSRC Principles of Robotics mandate that our artefacts should be transparent, but what does this mean in practice, and how does transparency affect both trust and utility? We investigate this relationship in the literature and find it to be complex, particularly in nonindustrial environments where, depending on the application and purpose of the robot, transparency may have a wider range of effects on trust and utility. We outline our programme of research to support our assertion that it is nevertheless possible to create transparent agents that are emotionally engaging despite having a transparent machine nature.

  13. Trust and Traditions in Transitions

    DEFF Research Database (Denmark)

    McQuaid, Sara Dybris

    On New Year’s Eve 2013, months of talks on ‘Dealing with the past’, ‘Flags’ and ‘Parades’ ended without agreement on how to move towards a reconciliation of positions in Northern Ireland. The failure of the talks illustrates the importance of culture and (mis)trust in divided societies, where...... politics often pivot around whose culture shall be official and whose subordinated, whose history shall be remembered and whose forgotten (Jordan and Weedon 1995). These struggles are particularly intense in times of transition where traditions, power relations and frames of relevant remembrance...... are reconfigured. Historically, parading traditions have been important cultural carriers of identity in Northern Ireland. (Jarman 1997). Correspondingly, the marching season has been an arena for politico-cultural struggles and resistance, indexing relations of trust between communities, between society...

  14. Online networks destroy social trust

    OpenAIRE

    Sabatini, Fabio; Sarracino, Francesco

    2014-01-01

    Studies in the social capital literature have documented two stylised facts: first, a decline in measures of social participation has occurred in many OECD countries. Second, and more recently, the success of social networking sites (SNSs) has resulted in a steep rise in online social participation. Our study adds to this body of research by conducting the first empirical assessment of how online networking affects two economically relevant aspects of social capital, i.e. trust and sociabilit...

  15. Parental Divorce and Generalized Trust

    OpenAIRE

    Viitanen, Tarja

    2011-01-01

    This paper examines the effect of parental divorce during childhood on generalized trust later on in life using Australian HILDA panel data. The dependent variable is composed of answers to the statement: “Generally speaking, most people can be trusted”. The main explanatory variables include the occurrence of parental divorce for the whole sample and the age at which parents divorced for the sub-sample. The analysis is conducted using random effects ordered probit, correlated random effects ...

  16. BRI: Cyber Trust and Suspicion

    Science.gov (United States)

    2017-06-06

    character modulate the neural systems of reward during the trust game.,” Nat. Neurosci., vol. 8, no. 11, pp. 1611–1618, 2005. [48] T. Baumgartner, M...experiments. The first experiment focused on collecting mouse data while subjects used an unmanned system simulator, and the second experiment allowed...insider, like any individual, possesses influences, motivations , abilities, beliefs, strengths, and weaknesses. Understanding what drives and

  17. Finite-temperature effective potential of a system with spontaneously broken symmetry

    Energy Technology Data Exchange (ETDEWEB)

    Zemskov, E.P. [Yaroslavl State Technical Univ. (Russian Federation)

    1995-12-01

    A quantum-mechanical system with spontaneously broken symmetry is considered the effective potential is determined, and it is shown that with reduction of temperature the system undergoes a phase transition of the first kind.

  18. Classic theory for chromosome rearrangements with spatially restricted volume for broken ends interaction

    International Nuclear Information System (INIS)

    Omel'yanchuk, L.V.

    1997-01-01

    D. Lea classic theory for chromosomal rearrangements formation was modified to account for local interaction of broken chromosome ends. This assumption makes it possible to drastically improve coincidence of the theory and experiment in the case of complex rearrangements

  19. Social Collaborative Filtering by Trust.

    Science.gov (United States)

    Yang, Bo; Lei, Yu; Liu, Jiming; Li, Wenjie

    2017-08-01

    Recommender systems are used to accurately and actively provide users with potentially interesting information or services. Collaborative filtering is a widely adopted approach to recommendation, but sparse data and cold-start users are often barriers to providing high quality recommendations. To address such issues, we propose a novel method that works to improve the performance of collaborative filtering recommendations by integrating sparse rating data given by users and sparse social trust network among these same users. This is a model-based method that adopts matrix factorization technique that maps users into low-dimensional latent feature spaces in terms of their trust relationship, and aims to more accurately reflect the users reciprocal influence on the formation of their own opinions and to learn better preferential patterns of users for high-quality recommendations. We use four large-scale datasets to show that the proposed method performs much better, especially for cold start users, than state-of-the-art recommendation algorithms for social collaborative filtering based on trust.

  20. Social Trust and Value Similarity: the Relationship between Social Trust and Human Values in Europe

    Directory of Open Access Journals (Sweden)

    Mai Beilmann

    2015-12-01

    Full Text Available The purpose of the current paper is to test whether value similarity may foster social trust in society and whether people have higher levels of social trust when they emphasise the same values that prevail in their country. The relationship between social trust and human values was examined in a sample of 51,308 people across 29 European countries using data from the European Social Survey round 6. Results suggest that value similarity is more important in generating individual level social trust in countries where the overall levels of social trust are higher. There is a stronger positive relationship between value similarity and social trust in Scandinavian countries, which have high social trust levels, while in countries with a low level of social trust, congruity of the personal value structure with the country level value structure tends to decrease the individuals trustfulness

  1. Seminari Internacional: e-Learning around the World: Achievements, Challenges and Broken Promises

    OpenAIRE

    Planell Estany, Josep A.

    2013-01-01

    Discurs del rector de la Universitat Oberta de Catalunya, Josep A. Planell Estany, amb motiu del Seminari Internacional: e-­Learning around the World: Achievements, Challenges and Broken Promises. Discurso del rector de la Universitat Oberta de Catalunya, Josep A. Planell Estany, con motivo del Seminario Internacional: ¿e­-Learning around the World: Achievements, Challenges and Broken Promises. Speech by the president of the Universitat Oberta de Catalunya, Josep A. Planell Estany, on t...

  2. [Suicidal behavior and the broken home. Critical evaluation of a "causal hypothesis"].

    Science.gov (United States)

    Schaller, S; Schmidtke, A

    1988-06-01

    It has often been hypothesized that a broken home results in a "predisposition" towards suicidal behaviour. Previous findings concerning the incidence of broken homes among suicides have revealed rates that are considerably higher than might have been expected from the base rate of the incidence of broken homes among the population as a whole. However, when considering these results, it is necessary to take into account a number of general methodological problems as well as specific problems inherent in the study of the causes of suicidal behaviour. Therefore, due to methodological objections, it can be assumed that the covariation between the variable, broken home, and suicidal behaviour, as compared with other psychiatric disturbances, has been overestimated. It seems more likely that a broken home, in combination with the simultaneous and subsequent emergence of adverse circumstances, increases the probability of the appearance of deviant behaviour in general. Therefore, it would appear that the most useful approach for understanding suicidal behaviour is to analyse the learning history and background of patients who have exhibited such behaviour, while the variable, broken home, should be regarded as being only one of several factors conditioning the failure to develop or apply adequate coping strategies.

  3. Distinction of broken cellular wall Ganoderma lucidum spores and G. lucidum spores using FTIR microspectroscopy

    Science.gov (United States)

    Chen, Xianliang; Liu, Xingcun; Sheng, Daping; Huang, Dake; Li, Weizu; Wang, Xin

    2012-11-01

    In this paper, FTIR microspectroscopy was used to identify broken cellular wall Ganoderma lucidum spores and G. lucidum spores. For IR spectra, broken cellular wall G. lucidum spores and G. lucidum spores were mainly different in the regions of 3000-2800, 1660-1600, 1400-1200 and 1100-1000 cm-1. For curve fitting, the results showed the differences in the protein secondary structures and the polysaccharide structures/content between broken cellular wall G. lucidum spores and G. lucidum spores. Moreover, the value of A1078/A1741 might be a potentially useful factor to distinguish broken cellular wall G. lucidum spores from G. lucidum spores. Additionally, FTIR microspectroscopy could identify broken cellular wall G. lucidum spores and G. lucidum spores accurately when it was combined with hierarchical cluster analysis. The result suggests FTIR microspectroscopy is very simple and efficient for distinction of broken cellular wall G. lucidum spores and G. lucidum spores. The result also indicates FTIR microspectroscopy may be useful for TCM identification.

  4. Distinction of broken cellular wall Ganoderma lucidum spores and G. lucidum spores using FTIR microspectroscopy.

    Science.gov (United States)

    Chen, Xianliang; Liu, Xingcun; Sheng, Daping; Huang, Dake; Li, Weizu; Wang, Xin

    2012-11-01

    In this paper, FTIR microspectroscopy was used to identify broken cellular wall Ganoderma lucidum spores and G. lucidum spores. For IR spectra, broken cellular wall G. lucidum spores and G. lucidum spores were mainly different in the regions of 3000-2800, 1660-1600, 1400-1200 and 1100-1000 cm(-1). For curve fitting, the results showed the differences in the protein secondary structures and the polysaccharide structures/content between broken cellular wall G. lucidum spores and G. lucidum spores. Moreover, the value of A1078/A1741 might be a potentially useful factor to distinguish broken cellular wall G. lucidum spores from G. lucidum spores. Additionally, FTIR microspectroscopy could identify broken cellular wall G. lucidum spores and G. lucidum spores accurately when it was combined with hierarchical cluster analysis. The result suggests FTIR microspectroscopy is very simple and efficient for distinction of broken cellular wall G. lucidum spores and G. lucidum spores. The result also indicates FTIR microspectroscopy may be useful for TCM identification. Copyright © 2012 Elsevier B.V. All rights reserved.

  5. Exploring trust relationships during times of change

    Directory of Open Access Journals (Sweden)

    Hartmut Von der Ohe

    2010-10-01

    Research purpose: The objective of this study was to explore the impact of different variables such as demographics on trust relationships in South African organisations. Motivation for the study: Anecdotal evidence and preliminary data collected for a national trust indicator seemed to suggest a shift in trust levels in organisations. Research design: A trust questionnaire was administered to a convenience sample of 307 respondents in all economic sectors. Parametric and nonparametric analyses were used to determine significant differences among economic sectors, job levels and sample periods. Main findings: No significant differences were found for job levels or the different sample periods. However, significant differences were found for the economic sectors and, specifically, between government participants and other sectors for the dimensions of change, team management, organisational trust, information sharing and credibility. Practical implications: In times of change, leadership in organisations need to be aware of the impact on trust levels. It is therefore important that leaders in government focus more on trust-enhancing behaviours needed to repair mistrust in organisations. Contribution: Although the effect of time on trust levels is inconclusive, the clearly differing levels of trust in various economic sectors point to the importance of appropriate and fitting approaches to building trust and not a ‘one-size-fits-all’ attitude.

  6. Strategies for building trust with farmers: the case of Bt maize in South Africa

    Directory of Open Access Journals (Sweden)

    Ezezika Obidimma C

    2012-11-01

    Full Text Available Abstract Background In 1999, South Africa became the first African country to approve commercial production of subsistence genetically modified (GM maize. The introduction of GM crop technology is often met with skepticism by stakeholders including farmers. The involvement of the private sector in this process can further breed mistrust or misperceptions. To examine these issues more closely, the objective of this case study was to understand the role of trust in the public-private partnership (PPP arrangement involved in the development of Bacillus thuringiensis (Bt maize in South Africa. Methods We conducted semi-structured, face-to-face interviews to obtain stakeholders’ understanding of trust in general as well as in the context of agricultural biotechnology (agbiotech PPPs. A thematic analysis of the interview transcripts, documents, reports and research articles was conducted to generate insights into the challenges to, and practices for, building trust among the partners and with the public. Results The findings of this study are organized into four main lessons on trust building. First, as the end users of GM technology, farmers must be engaged from the start of the project through field demonstrations and educational activities. Second, an effective technology (i.e., the seed is key to the success of an agbiotech PPP. Third, open communication and full disclosure between private sector companies and government regulatory bodies will build trust and facilitate the regulatory processes. Fourth, enforcing good agronomic practices, including appropriate management of the refuge areas, will serve the interests of both the farmers and the seed companies. Conclusions Trust has proven to be a critical factor determining the success of the Bt maize project in South Africa. Distrust of the private sector and of GM technology were cited as major barriers to building trust. The trust-building practices described in this case study have often

  7. Trust and Society: Suggestions for Further Development of Niklas Luhmann's Theory of Trust.

    Science.gov (United States)

    Morgner, Christian

    2018-05-01

    This paper addresses an apparent gap in the work of Niklas Luhmann. While the issue of trust continues to receive widespread attention in the social sciences, Luhmann's interest in this topic declined following the development of his systems theory. It is argued that this decline does not reflect any diminished relevance of trust for systems theory, but rather that the architectural remodeling of theory cannot easily be applied to the issue of trust. Here, the issue of trust is reconceptualized as a connection medium. This entails a reconstruction of Luhmann's early theory of trust, especially with regard to function and social positioning. In this context, trust can in turn be linked to the concept of medium in Luhmann's late work. As a connection medium, trust mediates between the different levels of sociality-interaction, organization, and society. These theoretical considerations are employed to develop a more applied framework for empirical research, with a brief case study from southern Italy. From this perspective, the idea of trust as society's glue is seen to be overly simplistic. The common ethical understanding that more trust leads to a better society is also questioned on the grounds that social cooperation can also lead to social sclerosis. Finally, risk and trust are shown to accommodate the formation of different cultures of trust. The paper shows how Luhmann's updated version of trust can inspire current research and enhance our understanding of how trust operates in contemporary society. © 2018 Canadian Sociological Association/La Société canadienne de sociologie.

  8. From the general to the specific: How social trust motivates relational trust.

    Science.gov (United States)

    Robbins, Blaine G

    2016-01-01

    When people form beliefs about the trustworthiness of others with respect to particular matters (i.e., when individuals trust), theory suggests that they rely on preexistent cognitive schemas regarding the general cooperativeness of individuals and organizations (i.e., social trust). In spite of prior work, the impact of social trust on relational trust-or what Russell Hardin (2002) calls trust as a three-part relation where actor A trusts actor B with reference to matter Y-is not well established. Four vignette experiments were administered to Amazon.com Mechanical Turk workers (N = 1388 and N = 1419) and to public university undergraduate students (N = 995 and N = 956) in order to investigate the relationship between social trust and relational trust. Measures of general social trust and particular social trust produced statistically equivalent effects that were positively associated with relational trust. Political trust, however, was statistically unrelated to relational trust. These results support the idea that people rely on schemas and stereotypes concerned with the general cooperativeness and helpfulness of others when forming beliefs about another person's trustworthiness with respect to a particular matter at hand. Copyright © 2015 Elsevier Inc. All rights reserved.

  9. Emergent Trust and Work Life Relationships: How to Approach the Relational Moment of Trust

    Directory of Open Access Journals (Sweden)

    Tone Bergljot Eikeland

    2015-10-01

    Full Text Available How do we trust? What does the basic mechanism of trust look like? These questions define the starting point for a comparison of the classic ideas of how trust works by Mayer et al. (1995, Möllering’s (2006 re-adaption of Giddens’, Simmel’s, and James’ classic ideas of trust, and a phenomenological approach focusing on “emergent trust.” Introducing the concept of emergent trust, the idea is to suggest a phenomenological approach to studies of trust in work-life relationships in professional organizations, as an alternative to trust as a cognitive attitude, where trust becomes a stable, individual possession. The term “emergent” demonstrates a trust that emerges in meetings between persons, it has an immediate, unconditional quality, and shows itself in situations of life where there is a potential for trust to appear. Trust’s basic relationality makes the person morally responsible for the other. Trust appears between persons, as an event, constituting risk and uncertainty as a natural and positive part of our lives. Still, in larger social settings, the responsibility of trust also disperses on to the work itself, and our wider social networks.

  10. Social trust, interpersonal trust and self-rated health in China: a multi-level study.

    Science.gov (United States)

    Feng, Zhixin; Vlachantoni, Athina; Liu, Xiaoting; Jones, Kelvyn

    2016-11-08

    Trust is important for health at both the individual and societal level. Previous research using Western concepts of trust has shown that a high level of trust in society can positively affect individuals' health; however, it has been found that the concepts and culture of trust in China are different from those in Western countries and research on the relationship between trust and health in China is scarce. The analyses use data from the national scale China General Social Survey (CGSS) on adults aged above 18 in 2005 and 2010. Two concepts of trust ("out-group" and "in-group" trust) are used to examine the relationship between trust and self-rated health in China. Multilevel logistical models are applied, examining the trust at the individual and societal level on individuals' self-rated health. In terms of interpersonal trust, both "out-group" and "in-group" trust are positively associated with good health in 2005 and 2010. At the societal level, the relationships between the two concepts of trust and health are different. In 2005, higher "out-group" social trust (derived from trust in strangers) is positively associated with better health; however, higher "in-group" social trust (derived from trust in most people) is negatively associated with good health in 2010. The cross-level interactions show that lower educated individuals (no education or only primary level), rural residents and those on lower incomes are the most affected groups in societies with higher "out-group" social trust; whereas people with lower levels of educational attainment, a lower income, and those who think that most people can be trusted are the most affected groups in societies with higher "in-group" social trust. High levels of interpersonal trust are of benefit to health. Higher "out-group" social trust is positively associated with better health; while higher "in-group" social trust is negatively associated with good health. Individuals with different levels of educational

  11. The multileveled division of trust labour

    DEFF Research Database (Denmark)

    Frederiksen, Morten

    at the intersubjective and institutional levels. I argue that confidence in institutions define the playing field of uncertainty in intersubjective relations, thus underpinning both the possibility and scope of intersubjective trust. However, once confidence in the institutional setting is brought into question......The trust concept is inherently linked to institutional issues. Trust, according to contemporary research, may be directed at both people and institutions and the influence of institutions may affect both trust in other people and trust in other institutions. This conceptual stretching takes place...... at the expense of accuracy and may block our understanding of the intricacies of the multiple levels involved in trusting. This paper suggests a conceptual clarification of this issue by employing a phenomenological approach to the perspective of the trustor, differentiating the types of uncertainty involved...

  12. Increasing interpersonal trust through divergent thinking

    Directory of Open Access Journals (Sweden)

    Roberta eSellaro

    2014-06-01

    Full Text Available Interpersonal trust is an essential ingredient of many social relationships but how stable is it actually, and how is it controlled? There is evidence that the degree of trust into others might be rather volatile and can be affected by manipulations like drawing attention to personal interdependence or independence. Here we investigated whether the degree of interpersonal trust can be biased by inducing either a more integrative or a more cognitive-control mode by means of a creativity task requiring divergent or convergent thinking, respectively. Participants then performed the Trust Game, which provides an index of interpersonal trust by assessing the money units one participant (the trustor transfers to another participant (the trustee. As expected, participants transferred significantly more money to the trustee after engaging in divergent thinking as compared to convergent thinking. This observation provides support for the idea that interpersonal trust is controlled by domain-general (i.e., not socially dedicated cognitive states.

  13. The Value of Trust to Nursing.

    Science.gov (United States)

    Rutherford, Marcella M

    2014-01-01

    Trust, one of nursing's intangible assets, impacts nurses' ability to form meaningful relationships with patients and this connection positively impacts health outcomes. Linking trust to the fabric of nursing and investing in its measurement will become essential to nursing's valuation and the resulting investment in nursing. Trust, as nursing's core value, should be fostered by nurse educators as they prepare the next generation of nurses. Nurse administrators should connect the trust a patient has for his or her nurse and patient cooperation and honest transparent communication between providers and the patient. Banking trust as a valuable nursing asset will substantiate nursing's marketing and support its worth. Nursing's trustworthiness is an intangible asset that warrants protection, as trust once lost is hard to recapture.

  14. Principals, Trust, and Cultivating Vibrant Schools

    Directory of Open Access Journals (Sweden)

    Megan Tschannen-Moran

    2015-03-01

    Full Text Available Although principals are ultimately held accountable to student learning in their buildings, the most consistent research results have suggested that their impact on student achievement is largely indirect. Leithwood, Patten, and Jantzi proposed four paths through which this indirect influence would flow, and the purpose of this special issue is to examine in greater depth these mediating variables. Among mediating variables, we assert that trust is key. In this paper, we explore the evidence that points to the role that faculty trust in the principal plays in student learning and how principals can cultivate trust by attending to the five facets of trust, as well as the correlates of trust that mediate student learning, including academic press, collective teacher efficacy, and teacher professionalism. We argue that trust plays a role in each of the four paths identified by Leithwood, Patten, and Jantzi. Finally, we explore possible new directions for future research.

  15. Explaining the emergence of social trust

    DEFF Research Database (Denmark)

    Svendsen, Gunnar Lind Haase; Tinggaard Svendsen, Gert; Graeff, Peter

    2012-01-01

    How does social trust emerge in a country? By comparing the cases of Denmark and Germany through six historical phases, we suggest that a plausible explanation is long run political stability. In Denmark, social trust was arguably allowed to accumulate slowly over time and was probably not destro......How does social trust emerge in a country? By comparing the cases of Denmark and Germany through six historical phases, we suggest that a plausible explanation is long run political stability. In Denmark, social trust was arguably allowed to accumulate slowly over time and was probably...... not destroyed up till the universal welfare state of the 20th century. In Germany, however, political instability since the first German state building hampered the emergence and maintenance of social trust, which is why social trust was never allowed to grow in this country....

  16. Trust, accreditation and Philanthropy in the Netherlands

    OpenAIRE

    Bekkers, R.H.F.P.

    2003-01-01

    Given the increasing numbers of scandals, the awareness among fund-raisers that the public’s trust is crucial for the nonprofit sector is growing. This study investigates the relationship between trust and charitable giving. Charitable organizations can increase the public’s trust by signaling their trustworthiness. The example of the Netherlands shows how a system of accreditation can be an instrument for signaling trustworthiness to the public. Donors aware of the accreditation system have ...

  17. Trust Factors Affecting Cooperation in Construction

    DEFF Research Database (Denmark)

    Bohnstedt, Kristian Ditlev; Haugbølle, Kim; Bejder, Erik

    2013-01-01

    advisor was carried out. The analysis showed that the ability to be trustful can be developed through the experience of different factors (e.g. control mechanisms, mutual respect, repeated cooperation, shared understanding and communication). Furthermore, the ability to trust other parties depends...... on knowledge of others' skillsets. Interdisciplinary collaboration through education would limit the formation of negative stereotypes and the overall trust level increases, due to more and better knowledge of other disciplines....

  18. Increasing interpersonal trust through divergent thinking

    OpenAIRE

    Sellaro, Roberta; Hommel, Bernhard; de Kwaadsteniet, Erik W.; van de Groep, Suzanne; Colzato, Lorenza S.

    2014-01-01

    Interpersonal trust is an essential ingredient of many social relationships but how stable is it actually, and how is it controlled? There is evidence that the degree of trust into others might be rather volatile and can be affected by manipulations like drawing attention to personal interdependence or independence. Here we investigated whether the degree of interpersonal trust can be biased by inducing either a more integrative or a more focused/exclusive cognitive control mode by means of a...

  19. Human Nature in the Adaptation of Trust

    OpenAIRE

    Nooteboom, B.

    2006-01-01

    This chapter pleads for more inspiration from human nature, in agent-based modeling.As an illustration of an effort in that direction, it summarizes and discusses an agentbased model of the build-up and adaptation of trust between multiple producers and suppliers.The central question is whether, and under what conditions, trust and loyalty are viable in markets.While the model incorporates some well known behavioural phenomena from the trust literature, more extended modeling of human nature ...

  20. Trust conceptualized as a corporate knowledge asset

    OpenAIRE

    Rodgers, Waymond; Gago Rodríguez, Susana

    2006-01-01

    To most individuals, "trust" can be viewed as a knowledge corporate asset that may add, or rest, value to the company. The role of knowledge in achieving a competitive advantage is becoming and increasingly important management issue in all business and non-business sectors. As such, our Throughput Modeling approach indicates how six different trust behaviors can be guided, how trust decision making can be improved and made defensible, and how special problems facing individuals can be dealt ...

  1. Defining Trust Using Expected Utility Theory

    OpenAIRE

    Arai, Kazuhiro

    2009-01-01

    Trust has been discussed in many social sciences including economics, psychology, and sociology. However, there is no widely accepted definition of trust. Inparticular, there is no definition that can be used for economic analysis. This paper regards trust as expectation and defines it using expected utility theory together with concepts such as betrayal premium. In doing so, it rejects the widely accepted black-and-white view that (un) trustworthy people are always (un)trustworthy. This pape...

  2. Sensory Metrics of Neuromechanical Trust.

    Science.gov (United States)

    Softky, William; Benford, Criscillia

    2017-09-01

    Today digital sources supply a historically unprecedented component of human sensorimotor data, the consumption of which is correlated with poorly understood maladies such as Internet addiction disorder and Internet gaming disorder. Because both natural and digital sensorimotor data share common mathematical descriptions, one can quantify our informational sensorimotor needs using the signal processing metrics of entropy, noise, dimensionality, continuity, latency, and bandwidth. Such metrics describe in neutral terms the informational diet human brains require to self-calibrate, allowing individuals to maintain trusting relationships. With these metrics, we define the trust humans experience using the mathematical language of computational models, that is, as a primitive statistical algorithm processing finely grained sensorimotor data from neuromechanical interaction. This definition of neuromechanical trust implies that artificial sensorimotor inputs and interactions that attract low-level attention through frequent discontinuities and enhanced coherence will decalibrate a brain's representation of its world over the long term by violating the implicit statistical contract for which self-calibration evolved. Our hypersimplified mathematical understanding of human sensorimotor processing as multiscale, continuous-time vibratory interaction allows equally broad-brush descriptions of failure modes and solutions. For example, we model addiction in general as the result of homeostatic regulation gone awry in novel environments (sign reversal) and digital dependency as a sub-case in which the decalibration caused by digital sensorimotor data spurs yet more consumption of them. We predict that institutions can use these sensorimotor metrics to quantify media richness to improve employee well-being; that dyads and family-size groups will bond and heal best through low-latency, high-resolution multisensory interaction such as shared meals and reciprocated touch; and

  3. Trust-Building in Electronic Markets: Relative Importance and Interaction Effects of Trust-Building Mechanisms

    Science.gov (United States)

    Tams, Stefan

    We examine the relative and complementary effectiveness of trust-building strategies in online environments. While prior research has examined various antecedents to trust, we investigated two trust-building mechanisms more in depth: Web site trust and vendor reputation. We tried to understand the relative effectiveness of these two important mechanisms to provide online businesses with a clear recommendation of how to establish trust in an effective and efficient manner. Drawing from the literature on trust, we proposed vendor reputation to be more effective than Web site trust. Moreover, we examined a potential complementary effect of these mechanisms so as to provide online businesses with a deeper understanding of how to derive superior trust. We hypothesize a small such effect. The study proposes a laboratory experiment to test the model.

  4. Exploring the Change from Low-Trust to High-Trust Organizations

    DEFF Research Database (Denmark)

    Jagd, Søren

    what the notion of high-trust organization actually means, and that the change process in the direction of high trust organizations involves not only a quantitative growth in trust, but may involve important qualitative changes in the organization, especially concerning the relations between management......A growing body of literature point to the increasing importance of trust for organizations and for the explicit use of trust as a management tool. The explicit or implicit message in both management literature and research literature on trust as a management tool is that managers should pursue...... projects of personal and organizational change leading to high-trust organizations. In this paper I explore how we may understand this change towards high-trust organizations: What does it mean, what is the content of such a change, and what may be the consequences. I show that it is still rather unclear...

  5. Trust matters: Patients' and providers' accounts of the role of trust in ...

    African Journals Online (AJOL)

    Kahabi Isangula

    Conclusion: The findings suggest that trust in patient-doctor relationship ... Improving trust in the patient - doctor relationship may be one of the important lenses ...... World Bank. (2015) Country and Lending Groups. (Internet). Available at.

  6. Review of Interorganizational Trust Models

    Science.gov (United States)

    2010-09-01

    mais les résultats de la recherche se sont avérés relativement maigres. Bien que nous ayons trouvé de nombreux modèles de confiance...rooted in common values, including a common concept of moral obligation. This type of trust typically takes a long time to develop, and is the type of...Perspectives on relationship repair and implications (Dirks et al., 2009, p. 72) Attributional theories propose that one party uses information about a

  7. Trust in Client-Vendor Relations

    DEFF Research Database (Denmark)

    Tøth, Thomas

    2014-01-01

    In an ever more globalized world we are faced with the challenges of collaborating across geographical distance. This article examines how trust is established in an offshore outsourcing engagement of IT operations between a leading Danish media company and an Indian IT-service provider. The find......, by imitating the way they communicate face-to-face, when collaborating virtually....... and organizational boundaries within the field of IT offshore outsourcing. The article concludes that trust is primarily established when the teams are meeting face-to-face and in order to establish trust at a distance they are dependent on technology being readily available and on engaging in active trust building...

  8. NGOs, Trust, and the Accountability Agenda

    DEFF Research Database (Denmark)

    Keating, Vincent Charles; Thrandardottir, Erla

    2017-01-01

    NGOs are undergoing an alleged crisis of trustworthiness. The past decades have seen an increase in both academic and practitioner skepticism, particularly given the transformations many NGOs have undergone in size, professionalism, and political importance. The accountability agenda, which...... on theoretical innovations in trust research to put forward three arguments. First, the proponents of the accountability agenda are implicitly working with a rational model of trust. Second, this model does not reflect important social characteristics of trust between donors and NGOs. Third, this mismatch means...... that the accountability agenda might do more to harm trust in NGOs than to help it....

  9. Playing Attack and Defense with Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe; Bouganim, Luc

    2014-01-01

    It is often convenient to assume in a data management platform that one or several computing devices are trusted, specially when the goal is to provide privacy guarantees over personal data. But what does it take for a computing device to be trusted? More specifically, how can a personal device...... provide trusted storage? This is the question we tackle in this demonstration. We describe how secure devices, equipped with a trusted execution environment, differ from general purpose devices. We illustrate with our demonstration scenario, that it is much more difficult to attack a storage service...... running on a secure device, than to attack the same service running on a general purpose device....

  10. On Propagating Interpersonal Trust in Social Networks

    Science.gov (United States)

    Ziegler, Cai-Nicolas

    The age of information glut has fostered the proliferation of data and documents on the Web, created by man and machine alike. Hence, there is an enormous wealth of minable knowledge that is yet to be extracted, in particular, on the Semantic Web. However, besides understanding information stated by subjects, knowing about their credibility becomes equally crucial. Hence, trust and trust metrics, conceived as computational means to evaluate trust relationships between individuals, come into play. Our major contribution to Semantic Web trust management through this work is twofold. First, we introduce a classification scheme for trust metrics along various axes and discuss advantages and drawbacks of existing approaches for Semantic Web scenarios. Hereby, we devise an advocacy for local group trust metrics, guiding us to the second part, which presents Appleseed, our novel proposal for local group trust computation. Compelling in its simplicity, Appleseed borrows many ideas from spreading activation models in psychology and relates their concepts to trust evaluation in an intuitive fashion. Moreover, we provide extensions for the Appleseed nucleus that make our trust metric handle distrust statements.

  11. How Does Social Trust Affect Economic Growth?

    DEFF Research Database (Denmark)

    Bjørnskov, Christian

    Social capital in the form of generalized trust has been shown to be a determinant of economic growth in a number of studies. Other studies have explored other consequences of trust, such as its effects on governance, corruption, education and investment. This paper connects the two strands...... of literature by estimating the effects of trust on growth through a set of potential transmission mechanisms directly. It does so by modelling the process using a three-stage least squares estimator on a sample of countries for which a full data set is available. The results indicate that trust affects...

  12. Heuritic Trust in IoT

    DEFF Research Database (Denmark)

    Kaur, Bipjeet; Tange, Henrik

    2015-01-01

    Increasing use of Internet of things in diverse fields has demanding association in security and trust of such services. The trust on the services cannot exist independent. It is greatly depended on the security of system at each layer. In this paper we analyze different existing trust algorithms...... to develop a combined reputation and trust algorithm. This algorithm is developed in view of developing trustworthy services in the agriculture field where the end users are cautious about their sensitive data but keen in trustworthy services to improve the efficiency of the product....

  13. A mobile and portable trusted computing platform

    Directory of Open Access Journals (Sweden)

    Nepal Surya

    2011-01-01

    Full Text Available Abstract The mechanism of establishing trust in a computing platform is tightly coupled with the characteristics of a specific machine. This limits the portability and mobility of trust as demanded by many emerging applications that go beyond the organizational boundaries. In order to address this problem, we propose a mobile and portable trusted computing platform in a form of a USB device. First, we describe the design and implementation of the hardware and software architectures of the device. We then demonstrate the capabilities of the proposed device by developing a trusted application.

  14. Explaining the emergence of social trust

    DEFF Research Database (Denmark)

    Svendsen, Gunnar Lind Haase; Svendsen, Gert Tinggaard; Graeff, Peter

    2012-01-01

    How does social trust emerge in a country? By comparing the cases of Denmark and Germany through six historical phases, we suggest that a plausible explanation is long run political stability. In Denmark, social trust was arguably allowed to accumulate slowly over time and was probably...... not destroyed up till the universal welfare state of the 20th century. In Germany, however, political instability since the first German state building hampered the emergence and maintenance of social trust, which is why social trust was never allowed to grow in this country....

  15. Application of Fuzzy Comprehensive Evaluation Method in Trust Quantification

    Directory of Open Access Journals (Sweden)

    Shunan Ma

    2011-10-01

    Full Text Available Trust can play an important role for the sharing of resources and information in open network environments. Trust quantification is thus an important issue in dynamic trust management. By considering the fuzziness and uncertainty of trust, in this paper, we propose a fuzzy comprehensive evaluation method to quantify trust along with a trust quantification algorithm. Simulation results show that the trust quantification algorithm that we propose can effectively quantify trust and the quantified value of an entity's trust is consistent with the behavior of the entity.

  16. Trust in automation: integrating empirical evidence on factors that influence trust.

    Science.gov (United States)

    Hoff, Kevin Anthony; Bashir, Masooda

    2015-05-01

    We systematically review recent empirical research on factors that influence trust in automation to present a three-layered trust model that synthesizes existing knowledge. Much of the existing research on factors that guide human-automation interaction is centered around trust, a variable that often determines the willingness of human operators to rely on automation. Studies have utilized a variety of different automated systems in diverse experimental paradigms to identify factors that impact operators' trust. We performed a systematic review of empirical research on trust in automation from January 2002 to June 2013. Papers were deemed eligible only if they reported the results of a human-subjects experiment in which humans interacted with an automated system in order to achieve a goal. Additionally, a relationship between trust (or a trust-related behavior) and another variable had to be measured. All together, 101 total papers, containing 127 eligible studies, were included in the review. Our analysis revealed three layers of variability in human-automation trust (dispositional trust, situational trust, and learned trust), which we organize into a model. We propose design recommendations for creating trustworthy automation and identify environmental conditions that can affect the strength of the relationship between trust and reliance. Future research directions are also discussed for each layer of trust. Our three-layered trust model provides a new lens for conceptualizing the variability of trust in automation. Its structure can be applied to help guide future research and develop training interventions and design procedures that encourage appropriate trust. © 2014, Human Factors and Ergonomics Society.

  17. Dimensionality of trust: An analysis of the relations between propensity, trustworthiness and trust

    Directory of Open Access Journals (Sweden)

    Marita Heyns

    2015-05-01

    Research purpose: This study examined the dynamic interplay between trust propensity, trustworthiness beliefs and the decision to trust, as perceived within dyadic workplace relationships. Motivation for the study: No studies, as far as the authors are aware, have ever attempted to use a combination of Mayer and Davis’s well-known assessment of trustworthiness and Gillespie’s measure of behavioural trust within the same study. By including measures of main antecedents and the actual decision to trust in the same study, the multidimensionality of trust can be established more concretely. Research approach, design and method: A cross-sectional survey design with a convenience sample (N = 539 was used. The Behavioural Trust Inventory and the Organisational Trust Instrument were administered. Main findings: Results confirmed the distinctness of propensity, trustworthiness and trust as separate main constructs. Trust was strongly associated with trustworthiness beliefs. Trustworthiness beliefs fully mediated the relationship between propensity and trust. The observed relations between propensity and trustworthiness suggest that individuals with a natural predisposition to trust others will be more inclined to perceive a specific trust referent as trustworthy. Practical/managerial implications: Leaders should realise that their attitudes and behaviour have a decisive impact on trust formation processes: if they are being perceived as trustworthy, followers will be likely to respond by engaging in trusting behaviours towards them. Tools to assess followers’ perceptions of the trustworthiness of the leader may provide useful feedback that can guide leaders. Contribution/value-add: This study contributes to scientific knowledge regarding the influence of propensity to trust and trustworthiness on trust of leaders.

  18. Towards Trust-based Cognitive Networks: A Survey of Trust Management for Mobile Ad Hoc Networks

    Science.gov (United States)

    2009-06-01

    of trust. First, social trust refers to properties derived from social relationships . Examples of social networks are strong social ... relationships such as colleagues or relatives or loose social relationships such as school alumni or friends with common interests [44]. Social trust may...also use social relationships in evaluating the trust metric among group members by employing the concept of social networks. Yu et al. [44] define

  19. Viewpoint : Trust and the sociology of the professions

    NARCIS (Netherlands)

    Groenewegen, Peter P.

    2006-01-01

    There is a fast-growing literature on trust in health care, especially interpersonal trust, but also public or institutional trust, reflecting the growing awareness in both the research and policy communities of the importance of trust. At a general level, trust as part of the broader concept of

  20. Trust matters: Patients' and providers' accounts of the role of trust in ...

    African Journals Online (AJOL)

    Also, trust was considered as potentially contributing to trusted doctors' behaviour changes such as excessive self-pride, faking being busy and sluggishness in care provision as well as increasing their work load. Conclusion: The findings suggest that trust in patient-doctor relationship matters for hypertension care in rural ...

  1. A healthy dose of trust: the relationship between interpersonal trust and health

    NARCIS (Netherlands)

    Schneider, I.K.; Konijn, E.A.; Righetti, F.; Rusbult, C.E.

    2011-01-01

    The positive effects of trust are manifold. Recent research has shown that trust levels may even influence physical health. The current work explores this issue and aims to shed light on the mechanisms underlying the relationship between trust and health in a 5-wave longitudinal data set. Results

  2. Trust and automation: the influence of automation malfunctions and system feedback on operator trust

    International Nuclear Information System (INIS)

    Strand, Stine

    2001-10-01

    Level of operator trust in an automatic system, which is not in accordance with the reliability of the system, might impose serious threats concerning issues of safety, productivity and the well being of the operator. Operator trust is therefore regarded as an important variable in man-machine interaction. The focus of this study was the influence of automatic malfunctions and amount of feedback provided by the automatic system on level of operator trust. The study was conducted in conjunction with the Human Centred Automation 2000-experiment. Two questionnaires attempting to measure operator trust were developed, designed to reflect the dimensions of predictability, dependability and faith. Analysis of the questionnaires demonstrated that they were reliable tools for measurement of operator trust. Factor analysis did not completely confirm the theoretical dimensions of trust, but indicated partial support. Operator trust correlated negatively with workload across situations, and positively with performance in complex situations. The results of the hypotheses tests demonstrated that operator trust gradually decreased after introduction of malfunctions. The effect of different malfunctions was however the opposite of what was expected, with obvious malfunctions reducing trust more than more camouflaged and safety critical malfunctions. Trust in the automatic system in general was lower than trust in specific malfunctioning components. Different interfaces providing different amount of feedback to the operator did not significantly influence level of operator trust. (Author)

  3. Trust and control interrelatedness: New perspectives on the trust-control nexus in organizational relations

    NARCIS (Netherlands)

    Costa, A.C.; Bijlsma-Frankema, K.M.

    2007-01-01

    This article introduces the special issue on New Perspectives on the Trust-Control Nexus in Organizational Relations. Trust and control are interlinked processes commonly seen as key to reach effectiveness in inter- and intraorganizational relations. The relation between trust and control is,

  4. Lesson study i Danmark?

    DEFF Research Database (Denmark)

    Mogensen, Arne

    2009-01-01

    Der beskrives et japansk lesson study forløb, og det diskuteres i hvilket omfang, de gode japanske erfaringer kan overføres til dansk matematikundervisning.......Der beskrives et japansk lesson study forløb, og det diskuteres i hvilket omfang, de gode japanske erfaringer kan overføres til dansk matematikundervisning....

  5. "Frankenstein." [Lesson Plan].

    Science.gov (United States)

    Simon, Melanie

    Based on Mary Shelley's novel "Frankenstein," this lesson plan presents activities designed to help students understand that active readers interpret a novel (its characters, plot, setting, and theme) in different ways; and the great literature can be and has been adapted in many ways over time. The main activity of the lesson involves students…

  6. Public trust: Struggle and regain

    International Nuclear Information System (INIS)

    Aoki, Tadao

    1999-01-01

    The after-effect of Monju and Tokai accidents has been much larger than expected. It struck PNC a fierce blow and the damage did not stop there but extended to the nuclear community at large. As a result, PNC was reformed into a new corporate, Japan Nuclear Cycle Development Institute (JNC). JNC has been given a new body but its mind must be cultivated so as to be able to regain public trust. This presentation summarizes the struggle to regain public trust in case of Monju. After five and a half years of construction work, Monju began pre-operation tests in May 1991, achieved initial criticality in April 1994 and the first connection to the grid in August 1995, and the accident occurs in December 1995. Until then, there was confidence, perhaps overconfidence, and it was taken for granted that the public was always in favour of 'nuclear'. The struggle to regain the public confidence involved: (1) Improvement of safety measures and emergency management; (2) Cultivation of a new corporate culture; (3) Open information; (4) Public communication (i.e. 'Door-to-door visit', 'Public meeting', 'Come-and-see', Weekly press conference. The struggle may continue for some time

  7. Trusted computing for embedded systems

    CERN Document Server

    Soudris, Dimitrios; Anagnostopoulos, Iraklis

    2015-01-01

    This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. Case studies are used to present new techniques designed as industrial security solutions. Coverage includes development of tamper resistant hardware and firmware mechanisms for lightweight embedded devices, as well as those serving as security anchors for embedded platforms required by applications such as smart power grids, smart networked and home appliances, environmental and infrastructure sensor networks, etc. ·         Enables readers to address a variety of security threats to embedded hardware and software; ·         Describes design of secure wireless sensor networks, to address secure authen...

  8. Wechsler Adult Intelligence Scale-Revised Block Design broken configuration errors in nonpenetrating traumatic brain injury.

    Science.gov (United States)

    Wilde, M C; Boake, C; Sherer, M

    2000-01-01

    Final broken configuration errors on the Wechsler Adult Intelligence Scale-Revised (WAIS-R; Wechsler, 1981) Block Design subtest were examined in 50 moderate and severe nonpenetrating traumatically brain injured adults. Patients were divided into left (n = 15) and right hemisphere (n = 19) groups based on a history of unilateral craniotomy for treatment of an intracranial lesion and were compared to a group with diffuse or negative brain CT scan findings and no history of neurosurgery (n = 16). The percentage of final broken configuration errors was related to injury severity, Benton Visual Form Discrimination Test (VFD; Benton, Hamsher, Varney, & Spreen, 1983) total score and the number of VFD rotation and peripheral errors. The percentage of final broken configuration errors was higher in the patients with right craniotomies than in the left or no craniotomy groups, which did not differ. Broken configuration errors did not occur more frequently on designs without an embedded grid pattern. Right craniotomy patients did not show a greater percentage of broken configuration errors on nongrid designs as compared to grid designs.

  9. Fluctuation relations for equilibrium states with broken discrete or continuous symmetries

    International Nuclear Information System (INIS)

    Lacoste, D; Gaspard, P

    2015-01-01

    Isometric fluctuation relations are deduced for the fluctuations of the order parameter in equilibrium systems of condensed-matter physics with broken discrete or continuous symmetries. These relations are similar to their analogues obtained for non-equilibrium systems where the broken symmetry is time reversal. At equilibrium, these relations show that the ratio of the probabilities of opposite fluctuations goes exponentially with the symmetry-breaking external field and the magnitude of the fluctuations. These relations are applied to the Curie–Weiss, Heisenberg, and XY models of magnetism where the continuous rotational symmetry is broken, as well as to the q-state Potts model and the p-state clock model where discrete symmetries are broken. Broken symmetries are also considered in the anisotropic Curie–Weiss model. For infinite systems, the results are calculated using large-deviation theory. The relations are also applied to mean-field models of nematic liquid crystals where the order parameter is tensorial. Moreover, their extension to quantum systems is also deduced. (paper)

  10. Mining Trust Relationships from Online Social Networks

    Institute of Scientific and Technical Information of China (English)

    Yu Zhang; Tong Yu

    2012-01-01

    With the growing popularity of online social network,trust plays a more and more important role in connecting people to each other.We rely on our personal trust to accept recommendations,to make purchase decisions and to select transaction partners in the online community.Therefore,how to obtain trust relationships through mining online social networks becomes an important research topic.There are several shortcomings of existing trust mining methods.First,trust is category-dependent.However,most of the methods overlook the category attribute of trust relationships,which leads to low accuracy in trust calculation.Second,since the data in online social networks cannot be understood and processed by machines directly,traditional mining methods require much human effort and are not easily applied to other applications.To solve the above problems,we propose a semantic-based trust reasoning mechanism to mine trust relationships from online social networks automatically.We emphasize the category attribute of pairwise relationships and utilize Semantic Web technologies to build a domain ontology for data communication and knowledge sharing.We exploit role-based and behavior-based reasoning functions to infer implicit trust relationships and category-specific trust relationships.We make use of path expressions to extend reasoning rules so that the mining process can be done directly without much human effort.We perform experiments on real-life data extracted from Epinions.The experimental results verify the effectiveness and wide application use of our proposed method.

  11. An Efficient Dynamic Trust Evaluation Model for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Zhengwang Ye

    2017-01-01

    Full Text Available Trust evaluation is an effective method to detect malicious nodes and ensure security in wireless sensor networks (WSNs. In this paper, an efficient dynamic trust evaluation model (DTEM for WSNs is proposed, which implements accurate, efficient, and dynamic trust evaluation by dynamically adjusting the weights of direct trust and indirect trust and the parameters of the update mechanism. To achieve accurate trust evaluation, the direct trust is calculated considering multitrust including communication trust, data trust, and energy trust with the punishment factor and regulating function. The indirect trust is evaluated conditionally by the trusted recommendations from a third party. Moreover, the integrated trust is measured by assigning dynamic weights for direct trust and indirect trust and combining them. Finally, we propose an update mechanism by a sliding window based on induced ordered weighted averaging operator to enhance flexibility. We can dynamically adapt the parameters and the interactive history windows number according to the actual needs of the network to realize dynamic update of direct trust value. Simulation results indicate that the proposed dynamic trust model is an efficient dynamic and attack-resistant trust evaluation model. Compared with existing approaches, the proposed dynamic trust model performs better in defending multiple malicious attacks.

  12. Psikologis Komunikasi Remaja Broken Home Terhadap Konsep Diri Dan Keterbukaan Diri (Studi Deskriptif Kualitatif Psikologis Komunikasi Remaja Dari Keluarga Broken Home Terhadap Konsep Diri dan Keterbukaan Diri di Kecamatan Tanjung Beringin Kabupaten Serdang Bedagai)

    OpenAIRE

    Lubis, Riza Fadla

    2015-01-01

    The Research title is Adolescent Psychological Communication Broken Home to Self-Concept and Self Disclosure: a research qualitative descriptive about Adolescent Psychological Communication Broken Home to Self-Concept and Self-Disclosure in Tanjung Beringin district, Serdang Bedagai regency, want to examine how the effect of a broken home to psychological communication , self-concept and self-disclosure for adolescent. The paradigm used in this research is an interpretive paradigm by using de...

  13. Does Ideological Education in China Suppress Trust in Religion and Foster Trust in Government?

    Directory of Open Access Journals (Sweden)

    Ying Xie

    2017-05-01

    Full Text Available A major goal of ideological education in China is to promote loyalty to the party-state and to instill atheism among the people. How effective is this ideological education? This article examines the relationship between education and trust in government and trust in religion using data from the 2010 Chinese General Social Survey. We find that education is negatively associated with trust in government, while positively related to trust in religion. Our findings suggest that policies aimed at displacing religion in favor of the Communist ideology have largely failed to shape the public mindset; rather, the more educated, the more people tend to trust religion instead of the government.

  14. SERVANT LEADERSHIP AND ORGANIZATIONAL TRUST: THE MEDIATING EFFECT OF THE LEADER TRUST AND ORGANIZATIONAL COMMUNICATION

    Directory of Open Access Journals (Sweden)

    Morad Rezaei

    2012-01-01

    Full Text Available The purpose of this paper aims to clarify the relationship between servant leadership and organizational trust, and tries to demonstrate the mediator role of leader trust and organizational communication in this relationship. The study sample included 258 employees of Guilan province Tax Administration and for sampling we used cluster method. Previous studies have also focused on the positive impact of servant leadership in organizational trust and in this article the results show that there is a significant relationship between servant leadership, organizational trust, leader trust and organizational communication.

  15. Building trusted national identity management systems: Presenting the privacy concern-trust (PCT) model

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    This paper discusses the effect of trust and information privacy concerns on citizens’ attitude towards national identity management systems. We introduce the privacyconcerns- trust model, which shows the role of trust in mediating and moderating citizens’ attitude towards identity management...... systems. We adopted a qualitative research approach in our analysis of data that was gathered through a series of interviews and a stakeholder workshop in Ghana. Our findings indicate that, beyond the threshold level of trust, societal information privacy concern is low; hence, trust is high, thereby...

  16. The history of a lesson

    DEFF Research Database (Denmark)

    Rasmussen, Mikkel Vedby

    2003-01-01

    and emphasises the need to study the history of lessons rather than the lessons of history. This approach shows that Munich is the end point of a constitutive history that begins in the failure of the Versailles treaty to create a durable European order following the First World War. The Munich lesson is thus......The article investigates the concept of lessons in IR. By means of a constructivist critique of the 'lessons literature', the article analyses one of the most important of IR lessons: that of Munich. Examining how the Munich lesson came about, the article shows the praxeological nature of lessons...... one element of the lesson of Versailles, which is a praxeology that defines how the West is to make peace, and against whom peace must be defended. The lesson of Versailles has been, at least in part, constitutive of the outbreak of the Cold War, and it continues to define the Western conception...

  17. Trust and safety in the coalmining sector

    Energy Technology Data Exchange (ETDEWEB)

    Sinclair, D.

    2008-01-01

    There is growing evidence that a lack of trust is a serious impediment to OHS outcomes. This paper describes a project that investigated trust through an in-depth analysis at a number of mines and across a number of coal mining companies.

  18. The Neurobiology of Trust and Schooling

    Science.gov (United States)

    Sankey, Derek

    2018-01-01

    Are there neurobiological reasons why we are willing to trust other people and why "trust" and moral values such as "care" play a quite pivotal role in our social lives and the judgements we make, including our social interactions and judgements made in the context of schooling? In pursuing this question, this paper largely…

  19. 40 CFR 280.102 - Trust fund.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 26 2010-07-01 2010-07-01 false Trust fund. 280.102 Section 280.102 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SOLID WASTES (CONTINUED) TECHNICAL STANDARDS AND CORRECTIVE ACTION REQUIREMENTS FOR OWNERS AND OPERATORS OF UNDERGROUND STORAGE TANKS (UST) Financial Responsibility § 280.102 Trust...

  20. Facilitating a just and trusting culture.

    Science.gov (United States)

    Pattison, Jill; Kline, Theresa

    2015-01-01

    The purpose of this paper is to identify managerial and organizational characteristics and behaviors that facilitate the fostering of a just and trusting culture within the healthcare system. Two studies were conducted. The initial qualitative one was used to identify themes based on interviews with health care workers that facilitate a just and trusting culture. The quantitative one used a policy-capturing design to determine which factors were most likely to predict outcomes of manager and organizational trust. The factors of violation type (ability vs integrity), providing an explanation or not, blame vs no blame by manager, and blame vs no blame by organization were all significant predictors of perceptions of trust. Limitations to the generalizability of findings included both a small and non-representative sample from one health care region. The present findings can be useful in developing training systems for managers and organizational executive teams for managing medical error events in a manner that will help develop a just and trusting culture. A just and trusting culture should enhance the likelihood of reporting medical errors. Improved reporting, in turn, should enhance patient safety. This is the first field study experimentally manipulating aspects of organizational trust within the health care sector. The use of policy-capturing is a unique feature that sheds light into the decision-making of health care workers as to the efficaciousness of particular managerial and organizational characteristics that impact a just and trusting culture.

  1. Modelling security and trust with Secure Tropos

    NARCIS (Netherlands)

    Giorgini, P.; Mouratidis, H.; Zannone, N.; Mouratidis, H.; Giorgini, P.

    2006-01-01

    Although the concepts of security and trust play an important issue in the development of information systems, they have been mainly neglected by software engineering methodologies. In this chapter we present an approach that considers security and trust throughout the software development process.

  2. Physical trust-based persistent authentication

    DEFF Research Database (Denmark)

    Fujita, Masahiro; Jensen, Christian D.; Arimura, Shiori

    2015-01-01

    propose a new type of persistent authentication, called Persistent Authentication Based On physical Trust (PABOT). PABOT uses a context of “physical trust relationship” that is built by visual contact between users, and thus can offer a persistent authentication mechanism with better usability and higher...

  3. Money Can't Buy Me Trust

    DEFF Research Database (Denmark)

    Christoffersen, Jeppe; Robson, Matthew J.

    2017-01-01

    country partners’ government to support alliances with local, developing country partners. Applying motivation crowding theory to trust processes, we develop theoretical logic explaining how and under what conditions such third-party financial support negatively affects the local partner's trust. Our...

  4. The Winston Churchill Memorial Trust of Australia

    Science.gov (United States)

    Hilton, Nicolette

    2013-01-01

    The Churchill Trust was established in 1965 to honour the memory of Sir Winston Churchill by awarding overseas research Fellowships known as "Churchill Fellowships". Since its inception, The Churchill Trust has awarded Churchill Fellowships to more than 3,700 Australians who, like Churchill, are innovative, filled with a spirit of…

  5. The Importance of Trust in Electronic Commerce.

    Science.gov (United States)

    Ratnasingham, Pauline

    1998-01-01

    Introduces the new concept of trust and how it influences the process of managing the security of an organization operating in an electronic commerce environment. Theoretically, the study aims to develop a framework of trust and security to provide a set of guidelines for secure electronic commerce. (Author/LRW)

  6. Explaining Math Achievement: Personality, Motivation, and Trust

    Science.gov (United States)

    Kilic-Bebek, Ebru

    2009-01-01

    This study investigated the statistical significance of student trust next to the well-tested constructs of personality and motivation to determine whether trust is a significant predictor of course achievement in college math courses. Participants were 175 students who were taking undergraduate math courses in an urban public university. The…

  7. New Superintendents: Trust, Networking, and Social Capital

    Science.gov (United States)

    Ripley, Joan; Mitchell, Roxanne M.; Richman, John A.

    2013-01-01

    This instrumental case study explored how five newly appointed superintendents identified key stakeholders and built trust and social capital with stakeholders in their districts. Stakeholder, trust, and social capital theory were the lenses that guided this study. We utilized a pragmatic research design and thematic data analysis to interpret our…

  8. Restoring trust in the rule of law

    NARCIS (Netherlands)

    Hirsch Ballin, Ernst

    The law as an abstract system of rules establishes the conditions under which people in large societies can live together in peace. This is not because they all have personal trust in each other (which is obviously impossible to establish) but because they trust that living up to the rules is what

  9. Physical pain increases interpersonal trust in females.

    Science.gov (United States)

    Wang, C; Gao, J; Ma, Y; Zhu, C; Dong, X-W

    2018-01-01

    People behave and interact with others differently when experiencing physical pain. Pain has dramatic effects on one's emotional responses, cognitive functions and social interaction. However, little has been known about whether and how physical pain influences interpersonal trust in social interaction. In the present study, we examined the influence of physical pain on trusting behaviour. A total of 112 healthy participants were recruited and assigned to physical pain condition (induced by Capsaicin) and control condition (with hand cream), respectively. Thirty minutes after pain induction, three decision-making tasks were conducted to measure behaviours in social interaction, including trust and trustworthiness (trust game), non-social risk-taking (risk game) and altruism (dictator game). Results showed that physical pain increased interpersonal trust among females, but not among males. Pain did not influence non-social risk-taking, altruism or trustworthiness, as evaluated by monetary transfers in those tasks. Moreover, the effect of physical pain on interpersonal trust was fully mediated by expectation of monetary profit. These findings demonstrate an effect of pain on interpersonal trust and suggest a reciprocity mechanism that the effect may be driven by self-interest rather than altruistic motivation. The pain effect on trust was evident only in females, implying distinct pain coping strategies used by both genders. The present work highlights the social component of pain and extends our understanding of mutual interactions between pain and social cognition. © 2017 European Pain Federation - EFIC®.

  10. Trust in a Time of Increasing Diversity

    DEFF Research Database (Denmark)

    Dinesen, Peter Thisted; Sønderskov, Kim Mannemar

    2012-01-01

    . Existing evidence from the Anglo-Saxon countries would suggest that this is the case, whereas evidence from the European continent mainly suggests that no link exists between ethnic diversity and social trust. The empirical analysis uses individual-level data on social trust from several surveys in Denmark...

  11. Going global: Trust research and international relations

    DEFF Research Database (Denmark)

    Ruzicka, Jan; Keating, Vincent Charles

    2015-01-01

    In this review article we explore the growing body of literature on the subject of trust in the field of international relations. We argue that the international level represents a unique challenge for trust research. This is so because some of the most pressing problems facing the world today...

  12. Trust as networking knowledge: precedents from Australia

    NARCIS (Netherlands)

    Clegg, S.R.; Porras, S.; Crawford, J.

    2004-01-01

    Trust, rather than being simply a resource for establishing collaborative relationships between organizations, is an essential component of their constitution. At base, trust involves interpersonal relations of a specific type. These are relations where there is sufficient probability that a person

  13. Social Trust and the Growth of Schooling

    DEFF Research Database (Denmark)

    Bjørnskov, Christian

    2009-01-01

    The paper develops a simple model to examine how social trust might affect the growth of schooling through lowering transaction costs associated with employing educated individuals. In a sample of 52 countries, the paper thereafter provides empirical evidence that trust has led to faster growth...

  14. Social Trust: Croatia 1995-2003.

    Directory of Open Access Journals (Sweden)

    Berto Šalaj

    2005-01-01

    Full Text Available In this paper the author deals with the concept of social trust. It is the author’s view that this concept has been neglected in past political science research in Croatia; consequently, he wishes to present it to the academic and professional political science public, thus creating a basis for its future use. Moreover, through application of a secondary dana analysis the author describes the state of social trust in Croatia. First, he contextualises the concept of social trust with regard to the dominant research approaches in political science; then he points to the distinctiveness of social trust in relation to other types of trust; fi nally, he provides an overview of the most relevant works on the importance and functions of social trust. In the concluding part of the paper, an analysis of the levels of social trust is conducted, revealing that Croatia is a society with markedly low levels of social trust. In the author’s opinion, this could present an obstacle to further political and economic development.

  15. Social Trust and the Growth of Schooling

    DEFF Research Database (Denmark)

    Bjørnskov, Christian

    The paper develops a simple model to exemplify how social trust might affect the growth of schooling through lowering transaction costs. In a sample of 52 countries, the paper thereafter provides empirical evidence that trust has indeed led to faster growth of schooling in the period 1960...

  16. Trust in regulatory regimes: scoping the field

    NARCIS (Netherlands)

    Six, F.E.; Verhoest, Koen

    2017-01-01

    This edited volume is the first endeavour to systematically investigate the role of trust in the different relations within regulatory regimes. Trust as a multifaceted concept is contested within public administration and political science in general and especially within the relation between

  17. When can we trust a third party?

    NARCIS (Netherlands)

    Hee, van K.M.; Sidorova, N.; Werf, van der J.M.E.M.; Koutny, M.; Aalst, van der W.M.P.; Yakovlev, A.

    2013-01-01

    Organizations often do not want to reveal the way a product is created or a service is delivered. As a consequence, if two organizations want to cooperate, they contact a trusted third party. Each specifies how it wants to communicate with the other party. The trusted third party then needs to

  18. Building Trust in High-Performing Teams

    Directory of Open Access Journals (Sweden)

    Aki Soudunsaari

    2012-06-01

    Full Text Available Facilitation of growth is more about good, trustworthy contacts than capital. Trust is a driving force for business creation, and to create a global business you need to build a team that is capable of meeting the challenge. Trust is a key factor in team building and a needed enabler for cooperation. In general, trust building is a slow process, but it can be accelerated with open interaction and good communication skills. The fast-growing and ever-changing nature of global business sets demands for cooperation and team building, especially for startup companies. Trust building needs personal knowledge and regular face-to-face interaction, but it also requires empathy, respect, and genuine listening. Trust increases communication, and rich and open communication is essential for the building of high-performing teams. Other building materials are a shared vision, clear roles and responsibilities, willingness for cooperation, and supporting and encouraging leadership. This study focuses on trust in high-performing teams. It asks whether it is possible to manage trust and which tools and operation models should be used to speed up the building of trust. In this article, preliminary results from the authors’ research are presented to highlight the importance of sharing critical information and having a high level of communication through constant interaction.

  19. Does Education Lead to Higher Generalized Trust?

    DEFF Research Database (Denmark)

    Charron, Nicholas; Rothstein, Bo

    2016-01-01

    to ‘trust others'. We hypothesize that higher levels of education will lead to higher social trust in individuals, given that the context (country or regions within countries) in which they reside has a sufficiently impartial and non-corrupt institutional setting. However, the positive effect of education...

  20. Expectations as a key element in trusting

    DEFF Research Database (Denmark)

    Rasmussen, Mette Apollo; Hansen, Uffe Kjærgaard; Conradsen, Maria Bosse

    Considering the need for a tangible focus for qualitative research on trusting, we propose that expectations to the behavior of others can provide that. By focusing on expectations, researchers can produce narrative descriptions that explains how trusting develops and changes. Then the key theore...

  1. Development of Trust and Reciprocity in Adolescence

    Science.gov (United States)

    van den Bos, Wouter; Westenberg, Michiel; van Dijk, Eric; Crone, Eveline A.

    2010-01-01

    We investigate the development of two types of prosocial behavior, trust and reciprocity, as defined using a game-theoretical task that allows investigation of real-time social interaction, among 4 age groups from 9 to 25 years. By manipulating the possible outcome alternatives, we could distinguish among important determinants of trust and…

  2. Algorithm for detection of the broken phase conductor in the radial networks

    Directory of Open Access Journals (Sweden)

    Ostojić Mladen M.

    2016-01-01

    Full Text Available The paper presents an algorithm for a directional relay to be used for a detection of the broken phase conductor in the radial networks. The algorithm would use synchronized voltages, measured at the beginning and at the end of the line, as input signals. During the process, the measured voltages would be phase-compared. On the basis of the normalized energy, the direction of the phase conductor, with a broken point, would be detected. Software tool Matlab/Simulink package has developed a radial network model which simulates the broken phase conductor. The simulations generated required input signals by which the algorithm was tested. Development of the algorithm along with the formation of the simulation model and the test results of the proposed algorithm are presented in this paper.

  3. Large leptonic Dirac CP phase from broken democracy with random perturbations

    Science.gov (United States)

    Ge, Shao-Feng; Kusenko, Alexander; Yanagida, Tsutomu T.

    2018-06-01

    A large value of the leptonic Dirac CP phase can arise from broken democracy, where the mass matrices are democratic up to small random perturbations. Such perturbations are a natural consequence of broken residual S3 symmetries that dictate the democratic mass matrices at leading order. With random perturbations, the leptonic Dirac CP phase has a higher probability to attain a value around ± π / 2. Comparing with the anarchy model, broken democracy can benefit from residual S3 symmetries, and it can produce much better, realistic predictions for the mass hierarchy, mixing angles, and Dirac CP phase in both quark and lepton sectors. Our approach provides a general framework for a class of models in which a residual symmetry determines the general features at leading order, and where, in the absence of other fundamental principles, the symmetry breaking appears in the form of random perturbations.

  4. Stuffing the nail: A simple technique for the extraction of a broken femoral nail.

    Science.gov (United States)

    Lovell, Jane; Krishna, Damodaran; Gehr, Eugene

    2017-06-01

    The extraction of broken femoral nails can be a challenging procedure and surgeons should be familiar with many different techniques. This paper demonstrates a case study and new, simple and cost effective technique for the removal of broken cannulated femoral nails. Our technique uses two guide wires of variable diameter and had several key points of differentiation from previous methods. Firstly, stuffing the nail with guide wires of greater total diameter than the cannula; secondly, reversing the second guide wire and finally, bending the tips of the wires. These innovations allow the technique to be used for narrow cannulated nails, superior purchase along the length of the nail, easy wire insertion and limited soft tissue damage. Our technique for the removal of broken femoral nails is quick, effective, cheap and easy to replicate and can be used by any generalist orthopaedic surgeon with basic equipment.

  5. Broken Bar Fault Detection in IM Operating Under No-Load Condition

    Directory of Open Access Journals (Sweden)

    RELJIC, D.

    2016-11-01

    Full Text Available This paper presents a novel method for broken rotor bar detection in a squirrel-cage induction motor (IM. The proposed method applies a single-phase AC voltage as a test signal on motor terminals, resulting in a stator backward-rotating magnetic field. The field ultimately causes additional current components in the stator windings whose magnitudes depend on the broken bar fault severity, even if the motor is unloaded. This allows robust broken bar fault detection based only on standard motor current signature analysis (MCSA technique. The proposed fault detection method is at first verified via simulations, using an IM model based on finite element analysis (FEA and multiple coupled circuit approach (MCCA. The subsequent experimental investigations have shown good agreement with both theoretical predictions and simulation results.

  6. Study on intelligent prediction of broken rock zone thickness of coal mine roadways

    Energy Technology Data Exchange (ETDEWEB)

    Xu, G.; Jing, H. [China University of Mining and Technology, Xuzhou (China). School of Architecture and Civil Engineering

    2005-03-01

    Considering the problem of obtaining the thickness of broken rock zone, a booming intelligent prediction method with ANFIS (adaptive neuro-fuzzy inference system) was introduced into the thickness prediction. A stand-alone program with functions of creating and applying prediction systems was designed on the platform of MATLAB6.5. Then the program was used to predict the broken rock zone thickness of dips in the 12th coal mine, Pingdingshan Group Company of Coal Industry. The results show that the predicted values correlate well with the in-situ measured ones. Thereby the validity of the program is validated and it can provide a new approach to obtaining the broken zone thickness. 10 refs., 4 figs., 1 tab.

  7. Phenomenology of the standard model under conditions of spontaneously broken mirror symmetry

    Energy Technology Data Exchange (ETDEWEB)

    Dyatlov, I. T., E-mail: dyatlov@thd.pnpi.spb.ru [National Research Center Kurchatov Institute, Petersburg Nuclear Physics Institute (Russian Federation)

    2017-03-15

    Spontaneously broken mirror symmetry is able to reproduce observed qualitative properties of weak mixing for quark and leptons. Under conditions of broken mirror symmetry, the phenomenology of leptons—that is, small neutrino masses and a mixing character other than that in the case of quarks—requires the Dirac character of the neutrinos and the existence of processes violating the total lepton number. Such processes involve heavy mirror neutrinos; that is, they proceed at very high energies. Here, CP violation implies that a P-even mirror-symmetric Lagrangian must simultaneously be T-odd and, according to the CPT theorem, C-odd. All these properties create preconditions for the occurrence of leptogenesis, which is a mechanism of the emergence of the baryon–lepton asymmetry of the universe in models featuring broken mirror symmetry.

  8. Domain walls and the C P anomaly in softly broken supersymmetric QCD

    Science.gov (United States)

    Draper, Patrick

    2018-04-01

    In ordinary QCD with light, degenerate, fundamental flavors, C P symmetry is spontaneously broken at θ =π , and domain wall solutions connecting the vacua can be constructed in chiral perturbation theory. In some cases the breaking of C P saturates a 't Hooft anomaly, and anomaly inflow requires nontrivial massless excitations on the domain walls. Analogously, C P can be spontaneously broken in supersymmetric QCD (SQCD) with light flavors and small soft breaking parameters. We study C P breaking and domain walls in softly broken SQCD with Nfcomputed at leading order in the soft breaking parameters, producing a phase diagram for the stable wall trajectory. We also comment on domain walls in the similar case of QCD with an adjoint and fundamental flavors, and on the impact of adding an axion in this theory.

  9. Detection of broken rotor bar faults in induction motor at low load using neural network.

    Science.gov (United States)

    Bessam, B; Menacer, A; Boumehraz, M; Cherif, H

    2016-09-01

    The knowledge of the broken rotor bars characteristic frequencies and amplitudes has a great importance for all related diagnostic methods. The monitoring of motor faults requires a high resolution spectrum to separate different frequency components. The Discrete Fourier Transform (DFT) has been widely used to achieve these requirements. However, at low slip this technique cannot give good results. As a solution for these problems, this paper proposes an efficient technique based on a neural network approach and Hilbert transform (HT) for broken rotor bar diagnosis in induction machines at low load. The Hilbert transform is used to extract the stator current envelope (SCE). Two features are selected from the (SCE) spectrum (the amplitude and frequency of the harmonic). These features will be used as input for neural network. The results obtained are astonishing and it is capable to detect the correct number of broken rotor bars under different load conditions. Copyright © 2016 ISA. Published by Elsevier Ltd. All rights reserved.

  10. Institutional and social trust: Is there a causal relationship?

    DEFF Research Database (Denmark)

    Dinesen, Peter Thisted; Sønderskov, Kim Mannemar

    In the literature on social trust, institutional trust is prominent explanations of why people trust the generalized other. However, while institutional trust is a plausible cause of social trust, it is also likely to be consequences of trust or a consequence of deep-rooted personality traits...... affecting both types of trust. Therefore, conventional analyses using cross-sectional data are ill-suited to determine whether institutional trust actually cause social trust. In contrast to previous analyses, this paper utilizes two Danish panel surveys containing measures of the two types of trust...... as regressors), the results provide strong evidence of trust in state institutions exercising an impact on social trust whereas the evidence for a reverse relationship is mixed....

  11. Trust: the sublime duty in health care leadership.

    Science.gov (United States)

    Piper, Llewellyn E

    2010-01-01

    Trust is the essence of human social existence. From the moment of birth, trust is the basic component in any human relationship and interaction. Trust is the Holy Grail for human confidence in others. From human survival to organizational survival, trust is the primordial bond. No organization is more dependent on trust than health care. This article views trust as the most basic fundamental quality for leadership. Trust is a sublime duty of a leader and the leadership of an organization. Leadership sets the culture of trust. Trust is the one quality that is essential for guiding an organization toward serving others. This article addresses trust from many perspectives. Trust is viewed from our subordinates, our peers, our superiors, and the public we serve. This article postulates how trust in an organization is the sublime duty of leadership that unites all human understanding and without it destroys all human relationships.

  12. Important lessons to be learnt from 'Daimler'

    DEFF Research Database (Denmark)

    Werlauff, Erik

    2014-01-01

    ” (hinreichende Wahrscheinlichkeit). Disclosure should take place when there is a “realistic prospect” (tatsächlich erwartet werden kann) that the future event will occur. Intermediate steps (Zwischenschritte) can in themselves be stock relevant. Third, under German law, as well as under US law, it is natural...... to be able to sue the quoted company itself on grounds of misleading or delayed stock announcements. Other countries, including Denmark, are gradually coming to a similar state of law, however without statutory law to guide investors. The lesson for the EU should be that common rules are needed in this field...... implemented the market abuse directive, it must have trusted the German version of it (like countries often do). However, this version demanded too high a probability that a stock relevant event would occur, and German legislation was based on the German version of the directive. The Court compared...

  13. Trust and Control in Public Sector Reform

    DEFF Research Database (Denmark)

    Vallentin, Steen; Thygesen, Niels Thyge

    2017-01-01

    to a substitution view when it comes to accounting for public sector reform as structure and process. Also, we propose a widening of the theoretical lens in the form of an emergent view of how trust and control, instead of being beforehand determinable and more or less stable identities, emerge in multiple......This paper provides an analysis of trust-based management reform in the Danish public sector from the point of view of the trust–control nexus. Based on a qualitative case study of home care in the municipality of Copenhagen we argue that a complementary view of trust and control is superior...... and singular ways from multiple events in the organisation. Noticing a dearth of research that explicitly addresses trust issues with regard to public sector management and organisation, the paper is a response to the call for more studies of trust as an institutionally embedded phenomenon....

  14. Does Religiosity Promote or Discourage Social Trust?

    DEFF Research Database (Denmark)

    Berggren, Niclas; Bjørnskov, Christian

    We look at the effect of religiosity on social trust, defined as the share of a population that thinks that people in general can be trusted. This is important since social trust is related to many desired outcomes, such as growth, education, democratic stability and subjective well...... countries and the U.S. states, measuring religiosity by the share of the population that answers yes to the question "Is religion an important part of your daily life?". Our empirical results, making use of regression analysis whereby we control for other possible determinants of social trust and, by using......-being. The effect of religiosity is theoretically unclear: while all major religions call for behaving well to others, religious groups may primarily trust people in their own groups and distrust others, as well as cause division in the broader population. We make use of new data from the Gallup World Poll for 105...

  15. Beyond Rule; Trust and Power as Capacities

    DEFF Research Database (Denmark)

    Raffnsøe, Sverre

    2013-01-01

    Taking an approach that avoids comprehending power and trust as entities to be studied apart, the article insists on elucidating trust and power as they are enacted in their intimate and delicate relationship to each other and to other human and social phenomena of similar importance......, such as knowledge and experience, gift-giving, hope, freedom and agency. To permit us to understand power and trust as interdependent dimensions, the article confronts the notions of power as command, coercion, control and calculation and develops a conception of power as a capacity. This permits us to consider...... trusting as an exercise of power and an anticipatory affect. Trust is a resolve to bear an experienced risk by confiding in the new and unknown....

  16. Making sense of institutional trust in organizations

    DEFF Research Database (Denmark)

    Fuglsang, Lars; Jagd, Søren

    2015-01-01

    and inter-organizational level. We suggest, however, that the actor-dimension of institutional-based trust is an underexplored issue in the literature. Quoting Fligstein, institutional theory needs to explain how ‘some social actors are better at producing desired social outcomes than are others’ (Fligstein......Institutional-based approaches to trust can explain how trust logics can exist in a societal context as compared to logics of distrust. Strong institutions in the form of regulative, normative and cognitive structures can enable and inspire trust-relations among people at the interpersonal......, 1997: 398). While Fligstein refers to actors who engage in ‘robust or local action’ we argue that actors who engage in (robust, local) sensemaking activities are better at (re)producing institutional-based trust. Particularly in situations when institutions are relatively unstable, unfamiliar...

  17. Partnering for bioregionalism in England: a case study of the Westcountry Rivers Trust

    Directory of Open Access Journals (Sweden)

    Hadrian Cook

    2016-06-01

    Full Text Available The adoption of bioregionalism by institutions that are instrumental in river basin management has significant potential to resolve complex water resource management problems. The Westcountry Rivers Trust (WRT in England provides an example of how localized bioregional institutionalization of adaptive comanagement, consensus decision making, local participation, indigenous technical and social knowledge, and "win-win" outcomes can potentially lead to resilient partnership working. Our analysis of the WRT's effectiveness in confronting nonpoint source water pollution, previously impervious to centralized agency responses, provides scope for lesson-drawing on institutional design, public engagement, and effective operation, although some evident issues remain.

  18. TRUST AND DISTRUST: TWO NECESSARY FACTORS FOR THE DEVELOPMENT OF THE SOCIAL TRUST

    Directory of Open Access Journals (Sweden)

    RODRIGO YÁÑEZ GALLARDO

    2006-01-01

    Full Text Available Recent investigations argue that distrust is the absence of trust and it would be assumed that bothattitudes are independent; that would allow to distinguish between the naïve attitude and the wise attitudein the trust. It has been built a scale to measure the disposition to trust and the relationship has beenexamined among naïve and wise attitude when trusting. The sample was constituted by 575 universitystudents of both sexes, of four faculties and of different years of study. Through a factorial analysis itwas found that trust and distrust correspond to different factors. It was discussed the importance ofincrease an optimal trust in order to develop social abilities and to stimulate the social participation. Itwas questioned the validity of traditional surveys that measure the social trust.

  19. Trust in prescription drug brand websites: website trust cues, attitude toward the website, and behavioral intentions.

    Science.gov (United States)

    Huh, Jisu; Shin, Wonsun

    2014-01-01

    Direct-to-consumer (DTC) prescription drug brand websites, as a form of DTC advertising, are receiving increasing attention due to the growing number and importance as an ad and a consumer information source. This study examined consumer trust in a DTC website as an important factor influencing consumers' attitude toward the website and behavioral intention. Applying the conceptual framework of website trust, the particular focus of investigation was the effect of the website trust cue factor on consumers' perceived DTC website trust and subsequent attitudinal and behavioral responses. Results show a significant relation between the website trust cue factor and consumers' perceived DTC website trust. Perceived DTC website trust, in turn, was found to be significantly associated with consumers' attitude toward the DTC website and behavioral intention.

  20. Technology Trust in Internet-Based Interorganizational Electronic Commerce

    OpenAIRE

    Pauline Ratnasingam; Paul A. Pavlou

    2003-01-01

    Trust in Internet-based Business-to-Business (B2B) e-commerce is an important issue for both practicioners and academicians. Whereas the traditional notion of dyadic interfirm trust primarily focuses on trust in a trading partner firm, trust in e-commerce also implicitly incorporates the notion of trust in the transaction infrastructure and underlying control mechanisms (technology trust), which deals with transaction integrity, authentication, confidentliality, non-repudiation, and best busi...