WorldWideScience

Sample records for broken trust lessons

  1. Betrayed trust: healing a broken hospital through servant leadership.

    Science.gov (United States)

    Yancer, Deborah A

    2012-01-01

    An investigative reporter with The Washington Post broke the news of a no-confidence vote by the medical staff of a hospital in the suburbs of Washington, District of Columbia. The chaos that followed created a perfect storm for needed change and offered the rare opportunity for unbridled deep and creative collaboration. Issues the hospital faced as a result of this crisis and subsequent events that tested the authenticity of change are summarized. This article focuses on the approach used by the registered nurse chief executive officer (RN-CEO) to humanize the hospital, viewing it as though it were a patient and leading a clinical approach to organizational recovery and health. The relationship that developed between the medical staff leaders and the RN-CEO was pivotal to the hospital's recovery and evolved as a hybrid of servant leadership. Outcomes achieved over a 7-year period and attributable to this relational model are summarized. Finally, the RN-CEO shares lessons learned through experience and reflection and advice for nurses interested in pursuing executive leadership roles. PMID:22157792

  2. Business relationships in China: Lessons about deep trust

    OpenAIRE

    Kriz, Anton; Keating, Byron W.

    2010-01-01

    Trust is acknowledged as a central tenet of business relationships. Yet for all the attention it receives, rarely has trust been investigated in the Chinese business setting. This paper uses an emic approach to unearth some within-culture ‘truths’ about Chinese notions of trust in business exchange. The findings of this research suggest that deep trust (xinren), which is driven by reciprocal help and emotional bonding, is critical for doing business in China. A conceptual framework is provide...

  3. Symanzik-Becchi-Rouet-Stora lessons on renormalizable models with broken symmetry: the case of Lorentz violation

    CERN Document Server

    Del Cima, Oswaldo M; Piguet, Olivier

    2016-01-01

    In this paper, we revisit the issue intensively studied in recent years on the generation of terms by radiative corrections in models with broken Lorentz symmetry. The algebraic perturbative method of handling the problem of renormalization of the theories with Lorentz symmetry breaking, is used. We hope to make clear the Symanzik's aphorism: "{\\it Whether you like it or not, you have to include in the lagrangian all counter terms consistent with locality and power-counting, unless otherwise constrained by Ward identities.}"

  4. Forms, Sources and Processes of Trust

    NARCIS (Netherlands)

    Nooteboom, B.

    2006-01-01

    This chapter reviews some key points in the analysis of trust, based on Nooteboom (2002)i.The following questions are addressed.What can we have trust in?What is the relation between trust and control?What are the sources of trust? And what are its limits?By what process is trust built up and broken

  5. Improving service quality in NHS Trust hospitals: lessons from the hotel sector.

    Science.gov (United States)

    Desombre, T; Eccles, G

    1998-01-01

    This article looks to review recent practice undertaken within the UK hotel sector to improve customer service, and suggests ideals that could be implemented within National Health (NHS) Trust hospitals. At a time of increasing competition, hotel firms are using service enhancement as a means to gain competitive advantage, and therefore developing a range of techniques to measure levels of service quality improvement. With continued change in the health service, where greater focus now lies with patient satisfaction, so there is a requirement for managers to adapt techniques presently being offered in other service industries to improve levels of customer service and ensure patients are targeted to define their levels of satisfaction. PMID:10177367

  6. Broken Arrows

    Directory of Open Access Journals (Sweden)

    Bas Patrick

    2008-01-01

    Full Text Available This paper makes an account of the design and investigations done for the still image watermarking technique used in the 2nd edition of the BOWS challenge. This technique is named “broken arrows� for some reasons given later on, and abbreviated “BA.� This zero-bit algorithm is an implementation of a recent theoretical result by Merhav and Sabbag (2008 with precautions taken with respect to robustness, security, and imperceptibility. A new robustness criterion, based on the nearest border point of a cone, is proposed. The security constraint is taken into account by increasing the diversity of the watermark, sculpturing and randomizing the shape of the detection regions. The imperceptibility and robustness are also provided by adopting proportional embedding in the wavelet domain. The algorithm has been benchmarked using a database of 2000 images. For a probability of false alarm below and a PSNR of 43 dB, the overall robustness regarding various classical image processing seems a promising and strong basis for the challenge.

  7. Facts about Broken Bones

    Science.gov (United States)

    ... White House Lunch Recipes The Facts About Broken Bones KidsHealth > For Kids > The Facts About Broken Bones ... through the skin . continue What Happens When a Bone Breaks? It hurts to break a bone! It's ...

  8. The trust formula: Trust = fairness + leadership

    Energy Technology Data Exchange (ETDEWEB)

    Lovenheim, R. [Regulatory and Legislative Consultants, Inc., Rochester, NY (United States)

    1995-11-01

    Many state and compact LLW siting processes have been characterized by slippage and failure. The paper focuses on two major {open_quotes}lessons learned{close_quotes} regarding public interaction and trust, and how these lessons are being applied to current siting efforts. The relationship of environmental idealism and trust will be explored further in this paper. Supreme Court Justice Stephen Breyer concludes his 1994 book, Breaking the Vicious Circle by stating: {open_quotes}Finally, this book also reflects a belief that trust in institutions arises not simply as a result of openness in government, responses to local interest groups, or priorities emphasized in the press -- though these attitudes and actions play an important role -- but also from those institutions doing a difficult job well.{close_quotes}

  9. Trust in agile teams

    DEFF Research Database (Denmark)

    Tjørnehøj, Gitte; Fransgård, Mette; Skalkam, Signe

    2012-01-01

    how management actions influenced this. We see two important lessons from the analysis. First the agile practices of daily Scrum and self organizing team can empower DSD teams to manage their own development of trust and thereby alleviate the obstacles of DSD. Second if management fails to support the...

  10. Broken or knocked out tooth

    Science.gov (United States)

    Teeth - broken; Tooth - knocked out ... dentist right away. If your tooth is badly broken, your nerve endings may be exposed. You will ... emergency visit for a simple chip or a broken tooth that is not causing you discomfort. You ...

  11. Rethinking trust.

    Science.gov (United States)

    Kramer, Roderick M

    2009-06-01

    Will we ever learn? We'd barely recovered from Enron and WorldCom before we faced the subprime mortgage meltdown and more scandals that shook our trust in businesspeople. Which raises the question: Do we trust too much? In this article, Stanford professor and social psychologist Kramer explores the reasons we trust so easily--and, often, so unwisely. He explains that genetics and childhood learning make us predisposed to trust and that it's been a good survival mechanism. That said, our willingness to trust makes us vulnerable. Our sense of trust kicks in on remarkably simple cues, such as when people look like us or are part of our social group. We also rely on third parties to verify the character of others, sometimes to our detriment (as the victims of Bernard Madoff learned). Add in our illusions of invulnerability and our tendencies to see what we want to see and to overestimate our own judgment, and the bottom line is that we're often easily fooled. We need to develop tempered trust. For those who trust too much, that means reading cues better; for the distrustful, it means developing more receptive behaviors. Everyone should start with small acts of trust that encourage reciprocity and build up. Having a hedge against potential abuses also helps. Hollywood scriptwriters, for instance, register their treatments with the Writers Guild of America to prevent their ideas from being stolen by the executives they pitch. To attract the right relationships, people must strongly signal their own honesty, proactively allay concerns, and, if their trust is abused, retaliate. Trusting individuals in certain roles, which essentially means trusting the system that selects and trains them, also works but isn't foolproof. And don't count on due diligence alone for protection; constant vigilance is needed to make sure the landscape hasn't changed. PMID:19496472

  12. Spontaneously broken mass

    CERN Document Server

    Endlich, Solomon; Penco, Riccardo

    2013-01-01

    The Galilei group involves mass as a central charge. We show that the associated superselection rule is incompatible with the observed phenomenology of superfluid helium 4: this is recovered only under the assumption that mass is spontaneously broken. This remark is somewhat immaterial for the real world, where the correct space-time symmetries are encoded by the Poincar\\'e group, which has no central charge. Yet it provides an explicit example of how superselection rules can be experimentally tested. We elaborate on what conditions must be met for our ideas to be generalizable to the relativistic case of the integer/half-integer angular momentum superselection rule.

  13. Weakly broken galileon symmetry

    Energy Technology Data Exchange (ETDEWEB)

    Pirtskhalava, David [Scuola Normale Superiore, Piazza dei Cavalieri 7, 56126 Pisa (Italy); Santoni, Luca; Trincherini, Enrico [Scuola Normale Superiore, Piazza dei Cavalieri 7, 56126 Pisa (Italy); INFN, Sezione di Pisa, Piazza dei Cavalieri 7, 56126 Pisa (Italy); Vernizzi, Filippo [Institut de Physique Théorique, Université Paris Saclay, CEA, CNRS, Gif-sur-Yvette cédex, F-91191 (France)

    2015-09-01

    Effective theories of a scalar ϕ invariant under the internal galileon symmetryϕ→ϕ+b{sub μ}x{sup μ} have been extensively studied due to their special theoretical and phenomenological properties. In this paper, we introduce the notion of weakly broken galileon invariance, which characterizes the unique class of couplings of such theories to gravity that maximally retain their defining symmetry. The curved-space remnant of the galileon’s quantum properties allows to construct (quasi) de Sitter backgrounds largely insensitive to loop corrections. We exploit this fact to build novel cosmological models with interesting phenomenology, relevant for both inflation and late-time acceleration of the universe.

  14. After trust

    OpenAIRE

    Corsín Jiménez, Alberto

    2005-01-01

    Everybody talks about trust these days. Or rather, everybody talks about a crisis in public trust and its fatal consequences for the institutional organisation of society (e.g. O'Hara 2004; O'Neill 2002). Trust, so the argument goes, is one of our most precious social virtues and its disappearance or misuse threatens not only our moral order but the very foundations of our polity. The crisis in trust is indicative of the general crisis-society in which we live today (Strathern ...

  15. A broken symmetry ontology: Quantum mechanics as a broken symmetry

    International Nuclear Information System (INIS)

    The author proposes a new broken symmetry ontology to be used to analyze the quantum domain. This ontology is motivated and grounded in a critical epistemological analysis, and an analysis of the basic role of symmetry in physics. Concurrently, he is led to consider nonheterogeneous systems, whose logical state space contains equivalence relations not associated with the causal relation. This allows him to find a generalized principle of symmetry and a generalized symmetry-conservation formalisms. In particular, he clarifies the role of Noether's theorem in field theory. He shows how a broken symmetry ontology already operates in a description of the weak interactions. Finally, by showing how a broken symmetry ontology operates in the quantum domain, he accounts for the interpretational problem and the essential incompleteness of quantum mechanics. He proposes that the broken symmetry underlying this ontological domain is broken dilation invariance

  16. Broken Bones, Sprains, and Strains (For Parents)

    Science.gov (United States)

    ... 5 Things to Know About Zika & Pregnancy Broken Bones, Sprains, and Strains KidsHealth > For Parents > Broken Bones, ... home. What to Do: For a Suspected Broken Bone: Do not move a child whose injury involves ...

  17. Job loss and broken partnerships

    DEFF Research Database (Denmark)

    Kriegbaum, Margit; Christensen, Ulla; Lund, Rikke;

    2008-01-01

    The aim of this study was to investigate the effects of the accumulated number of job losses and broken partnerships (defined as the end of cohabitation) on the risk of fatal and nonfatal events of ischemic heart disease (IHD).......The aim of this study was to investigate the effects of the accumulated number of job losses and broken partnerships (defined as the end of cohabitation) on the risk of fatal and nonfatal events of ischemic heart disease (IHD)....

  18. Trust matters

    DEFF Research Database (Denmark)

    Østergaard, Lise Rosendal

    2015-01-01

    This article makes a contribution to the debate about health service utilisation and the role of trust in fostering demand for health services in sub-Saharan Africa. It is framed as a narrative literature review based on a thematic analysis of nine empirical, qualitative studies. For the purposes...

  19. 7 CFR 51.2717 - Broken.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Broken. 51.2717 Section 51.2717 Agriculture... Standards for Shelled Runner Type Peanuts Definitions § 51.2717 Broken. Broken means that more than one-fourth of the peanut kernel is broken off....

  20. 49 CFR 230.39 - Broken staybolts.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Broken staybolts. 230.39 Section 230.39... Staybolts § 230.39 Broken staybolts. (a) Maximum allowable number of broken staybolts. No boiler shall be allowed to remain in service with two broken staybolts located within 24 inches of each other, as...

  1. 7 CFR 51.2759 - Broken.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Broken. 51.2759 Section 51.2759 Agriculture... Standards for Shelled Virginia Type Peanuts Definitions § 51.2759 Broken. Broken means that more than one-fourth of the peanut kernel is broken off....

  2. 46 CFR 9.8 - Broken periods.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Broken periods. 9.8 Section 9.8 Shipping COAST GUARD... § 9.8 Broken periods. In computing extra compensation where the services rendered are in broken periods and less than 2 hours intervene between such broken periods the time served should be...

  3. 7 CFR 51.2737 - Broken.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Broken. 51.2737 Section 51.2737 Agriculture... Standards for Grades of Shelled Spanish Type Peanuts Definitions § 51.2737 Broken. Broken means that more than one-fourth of the peanut kernel is broken off....

  4. Trust and Leadership

    OpenAIRE

    Bordum, Anders

    2005-01-01

    The concept and phenomenon of trust and its relation to leadership has recently come into focus. What role does trust play? Can trust be created strategically? Questions like these are often raised. How we conceive of and conceptualize trust is not as often discussed. Among those conceptualizations of trust available are those understanding trust as normatively value laden and those attempting to understand trust as normatively neutral. In this article I will attempt to challenge the idea tha...

  5. Trusted Objects

    Energy Technology Data Exchange (ETDEWEB)

    CAMPBELL,PHILIP L.; PIERSON,LYNDON G.; WITZKE,EDWARD L.

    1999-10-27

    In the world of computers a trusted object is a collection of possibly-sensitive data and programs that can be allowed to reside and execute on a computer, even on an adversary's machine. Beyond the scope of one computer we believe that network-based agents in high-consequence and highly reliable applications will depend on this approach, and that the basis for such objects is what we call ''faithful execution.''

  6. The affordances of broken affordances

    DEFF Research Database (Denmark)

    Grünbaum, Martin Gielsgaard; Simonsen, Jakob Grue

    2015-01-01

    We consider the use of physical and virtual objects having one or more affordances associated to simple interactions with them. Based on Kaptelinin and Nardi’s notion of instrumental affordance, we investigate what it means to break an affordance, and the two ensuing questions we deem most...... important: how users may (i) achieve their goals in the presence of such broken affordances, and may (ii) repurpose or otherwise interact with artefacts with broken affordances. We argue that (A) thorough analyses of breakdowns of affordances and their associated signifiers and feedbacks have implication...

  7. Trust in nurse-patient relationships: a literature review.

    Science.gov (United States)

    Dinç, Leyla; Gastmans, Chris

    2013-08-01

    The aim of this study was to report the results of a literature review of empirical studies on trust within the nurse-patient relationship. A search of electronic databases yielded 34 articles published between 1980 and 2011. Twenty-two studies used a qualitative design, and 12 studies used quantitative research methods. The context of most quantitative studies was nurse caring behaviours, whereas most qualitative studies focused on trust in the nurse-patient relationship. Most of the quantitative studies used a descriptive design, while qualitative methods included the phenomenological approach, grounded theory, ethnography and interpretive interactionism. Data collection was mainly by questionnaires or interviews. Evidence from this review suggests that the development of trust is a relational phenomenon, and a process, during which trust could be broken and re-established. Nurses' professional competencies and interpersonal caring attributes were important in developing trust; however, various factors may hinder the trusting relationship. PMID:23426234

  8. Dimensions of trust

    DEFF Research Database (Denmark)

    Frederiksen, Morten

    2012-01-01

    Georg Simmel is the seminal author on trust within sociology, but though inspired by Simmel, subsequent studies of intersubjective trust have failed to address Simmel’s suggestion that trust is as differentiated as the social relations of which it is part. Rather, trust has been studied within...... limited sets of exchange or work relations. This article revisits Simmel’s concept of trust as social form in order to investigate this differentiation. From an interview study, the differentiation and limits of trust are analysed within different types of social relations. Trust is found to vary greatly...... trust, opening new avenues of sociological investigation of trust outside exchange and work relations....

  9. Supercurrent and spontaneously broken supersymmetry

    International Nuclear Information System (INIS)

    The conserved Noether R current, supersymmetry current, and the energy-momentum tensor are constructed in the Akulov-Volkov model of spontaneously broken supersymmetry. An improved supersymmetry current and energy-momentum tensor are defined, which, along with the chiral R current, form components of the supercurrent. The supersymmetry Wess-Zumino consistency conditions for these component currents are verified

  10. Trusted Domain

    DEFF Research Database (Denmark)

    Hjorth, Theis Solberg; Torbensen, Rune

    2012-01-01

    remote access via IP-based devices such as smartphones. The Trusted Domain platform fits existing legacy technologies by managing their interoperability and access controls, and it seeks to avoid the security issues of relying on third-party servers outside the home. It is a distributed system that......In the digital age of home automation and with the proliferation of mobile Internet access, the intelligent home and its devices should be accessible at any time from anywhere. There are many challenges such as security, privacy, ease of configuration, incompatible legacy devices, a wealth of...

  11. Trust and Leadership

    DEFF Research Database (Denmark)

    Bordum, Anders

    2005-01-01

    conditions which lay at the foundation for declaring trust or mistrust. My argument against the understanding of trust as value neutral is divided into five sections wherein I address different aspects of trust as a concept and phenomenon. In the first section, I address the trust concept's connection with...... the question in relation to the trust phenomena's strategic flexibility of form for example, the idea that one with leadership tools can consciously bring forth trust. In the conclusion, the question about trust communication is addressed. In this section I argue that trust is positively value......-laden, becausesincerity is a functional and pragmatic condition for successful communication which is oriented towards understanding....

  12. Trust us Trust Thorp Campaign

    International Nuclear Information System (INIS)

    The history of the nuclear industry in the UK has been dominated by Sellafield reprocessing site in west Cumbria. The site, formerly owned by the United Kingdom Atomic Energy Authority was transferred to the newly-formed British Nuclear Fuels plc in 1971. Although trade union representation existed at Sellafield before the emergence of BNFL, it is only after this date that collective trade union activity began to emerge. In 1977, after a long running dispute with management about the issue of radiation dose uptake, the workforce went on strike, forcing the management to question their previous 'need to know' attitude and to improve industrial relations. In 1984, it was recognised that the lobbying influence of trade unions within politics, and especially the Labour party could be used to greater effect to challenge potentially -damaging influence of anti-nuclear campaigners. The National Campaign for the Nuclear Industry (NCNI) was born, combining nine industrial and non-industrial trade unions within the nuclear industry. Its task during the last ten years has been to put forward the interests of its members collectively and to secure the, role of nuclear power. within a balanced energy policy in the political arena. In dome so, it has gained a credible voice within both the trade union movement and the Labour party. The new Thermal Oxide Reprocessing Plant (THORP) received strong support from the NCNI during its construction and commissioning phases. When it became clear that the anti-nuclear lobby had gained the upper hand and were beginning to seriously delay the necessary legal instruments required to start the plant, the power of collective action was once again recognised, and the TRUST US campaign was born. The campaign was run and organised by a clerks committee and fronted by the Trade Unions at Sellafield., and turned out to be one of the most successful] trade union campaigns in recent history. The first task involved getting, the entire workforce on

  13. Broken Ergodicity in MHD Turbulence

    Science.gov (United States)

    Shebalin, John V.

    2010-01-01

    Ideal magnetohydrodynamic (MHD) turbulence may be represented by finite Fourier series, where the inherent periodic box serves as a surrogate for a bounded astrophysical plasma. Independent Fourier coefficients form a canonical ensemble described by a Gaussian probability density function containing a Hermitian covariance matrix with positive eigenvalues. The eigenvalues at lowest wave number can be very small, resulting in a large-scale coherent structure: a turbulent dynamo. This is seen in computations and a theoretical explanation in terms of 'broken ergodicity' contains Taylor s theory of force-free states. An important problem for future work is the case of real, i.e., dissipative flows. In real flows, broken ergodicity and coherent structure are still expected to occur in MHD turbulence at the largest scale, as suggested by low resolution simulations. One challenge is to incorporate coherent structure at the largest scale into the theory of turbulent fluctuations at smaller scales.

  14. Balancing Trust and Control

    DEFF Research Database (Denmark)

    Jagd, Søren

    This paper focuses on the leadership challenge of balancing trust and control. The relation between trust and control has for a long time been a puzzling issue for management researchers. In the paper I first show that there has been a dramatic change in the way the relation between trust and...... control has been conceptualized in trust research. While the relation between trust and control earlier was conceptualized as a more or less stable balance between trust and control, more recent research conceptualizes the relation between trust and control more as a dynamical process that involves an...... ongoing process of balancing the relation between trust and control. Second, taking the departure in the recent conceptualization of the balance between trust and control as an interactive process I discuss the challenges for management in handling this more subtle balancing of trust and control. The...

  15. Trust Responsiveness and Beliefs.

    OpenAIRE

    Gerardo A. Guerra; Zizzo, Daniel John

    2002-01-01

    Trust responsiveness is the tendency to fulfill trust because you believe that it has been placed on you. The experiment presented in this paper uses two simple trust games to measure directly or indirectly the robustness of trust responsiveness in three conditions: when beliefs are elicited and a summary of these beliefs is transmitted; when beliefs are elicited but not transmitted, when beliefs are not elicited. Insofar as we can tell, trust responsiveness is robust to our belief manipulati...

  16. Calculativeness and trust

    DEFF Research Database (Denmark)

    Frederiksen, Morten

    2014-01-01

    Williamson’s characterisation of calculativeness as inimical to trust contradicts most sociological trust research. However, a similar argument is found within trust phenomenology. This paper re-investigates Williamson’s argument from the perspective of Løgstrup’s phenomenological theory of trust....... Contrary to Williamson, however, Løgstrup’s contention is that trust, not calculativeness, is the default attitude and only when suspicion is awoken does trust falter. The paper argues that while Williamson’s distinction between calculativeness and trust is supported by phenomenology, the analysis needs to...... take actual subjective experience into consideration. It points out that, first, Løgstrup places trust alongside calculativeness as a different mode of engaging in social interaction, rather conceiving of trust as a state or the outcome of a decision-making process. Secondly, the analysis must take...

  17. Building trust

    International Nuclear Information System (INIS)

    'Activate' is the energy magazine for secondary schools and is part of the Education Programme which is managed on behalf of the British Nuclear Industry Forum by AEA Technology. activate is the flagship communication device between the British Nuclear Industry Forum's Education Programme and secondary schools in the UK. It was developed from a previous publication, Nuclear Bulletin. There is a need for the nuclear industry to build trust with teachers and students in the UK, where for a long time, everything that the industry has said, written or printed has been disregarded by school teachers as propaganda. Over the last few years the industry has put in a great deal of effort to position itself as a provider of educationally sound and socially acceptable information. 'Activate' was an evolution of this idea and there was a hole in the market for a lively, activity and article based magazine that could be used in the classroom. The target audience is principally teachers of science, mathematics and geography, but also includes teachers of art,, English and history with students of between 11 and 18. The results were very positive in that teachers appreciated the colourful and lively nature of activate and they felt that it provided information and opinions in an un biased and non-propagandist way. Their comments about layout, number of activities style of presentation were taken into account and during the summer of 1994 activate was remodelled ready for re launch in September. The feedback so far is good with more teachers signing up every week to receive their own free copy

  18. Modeling Trusted Computing

    Institute of Scientific and Technical Information of China (English)

    CHEN Shuyi; WEN Yingyou; ZHAO Hong

    2006-01-01

    In this paper, a formal approach based on predicate logic is proposed for representing and reasoning of trusted computing models. Predicates are defined to represent the characteristics of the objects and the relationship among these objects in a trusted system according to trusted computing specifications. Inference rules of trusted relation are given too. With the semantics proposed, some trusted computing models are formalized and verified, which shows that Predicate calculus logic provides a general and effective method for modeling and reasoning trusted computing systems.

  19. Taking, Punishment and Trust

    OpenAIRE

    Simon Halliday

    2012-01-01

    Is a trusting person more or less likely to steal? Is a trusting person more or less likely to punish someone who steals? A great deal of research has examined how trust and social capital correlate with altruistic, reciprocal and punishing behaviours, but less research has been dedicated to understanding the roles of trust and social capital in peoples' choices between a strictly antisocial behaviour - like stealing - and generosity, or in a third party's choice to punish taking behaviour. U...

  20. Trust arguments

    International Nuclear Information System (INIS)

    cycle has a complex of general machine building technologies which permit, if necessary, to organize in a very short period, production of non-traditional articles and avoid limitation of working places. This is well proved by the experience of 'Elemash', where in connection with the decrease of demand for nuclear fuel after the accident in Chernobyl, different products are now produced, equipment for dairy industry, tubular, heating elements, hard-alloy tooling for metal cutting and mining industries, a variety of domestic appliances. This peculiar 'conversion' permitted not only preserve the staff but provide employment of youth. We concentrate our attention on one more social side of activity of our enterprise, more of a few in the town having stable interior and exterior market for its products; this is very important in the period of newly-born market economy in Russia. Annual turnover of 'Elemash', only for export of nuclear fuel, is more tan 200 million dollars. It is natural that the majority of this sum comes as taxes to the municipal budget, where it is used for developing social infrastructure of the town (culture, port, health protection education, i.e. for the welfare of the population). Evaluating te general reaction of the population and public, which was discovered as a result of communicating in the Centre with thousands of inhabitants of the town we can state that it is quite favourable and our task is to strengthen the trust to the enterprise in the future. (author)

  1. The productivity of trust

    DEFF Research Database (Denmark)

    Bjørnskov, Christian; Méon, Pierre-Guillaume

    This paper returns to one of the early questions of the literature on social trust, whether trust affects total factor productivity (TFP). Using both development and growth accounting, we find strong evidence of a causal effect of trust on the level and growth of TFP. Using a three-stage least...

  2. Trust Drives Internet Use

    DEFF Research Database (Denmark)

    Ljunge, Jan Martin

    This paper estimates the effect of trust on internet use by studying the general population as well as second generation immigrants in 29 European countries with ancestry in 87 nations. There is a significant positive effect of trust on internet use. The positive trust effect is not universal...

  3. Trust and Credit

    DEFF Research Database (Denmark)

    Harste, Gorm

    The present paper is an answer to the question, how did trust and credit emerge. The systems of trust and credit reduce the environmental and contextual complexities in which trust and credit are embedded. The paper analyses the forms of this reduction in a number of stages in the evolution of...

  4. Looking for Trust

    DEFF Research Database (Denmark)

    Bøge, Ask Risom; Lauritsen, Peter

    connection between these phenomena and ask what is the role of trust in the spread of surveillance in Scandinavia? The aim of this paper is: 1) to investigate the role of trust in the history of the Danish DNA database and 2) to experiment with Actor-Network-Theory (ANT) as an ap-proach in studies of trust....

  5. A road to trust

    OpenAIRE

    Labonne, Julien; Chase, Robert S.

    2008-01-01

    The authors explore the relationship between transaction costs and generalized trust. Using panel data from 2,100 households in 135 rural communities of the Philippines, the paper shows that where transaction costs are reduced (proxied by road construction), there is an increase in generalized trust. Consistent with the argument that generalized trust is built through repeated interactions...

  6. Education and Trust

    DEFF Research Database (Denmark)

    Frederiksen, Morten; Larsen, Christian Albrekt; Lolle, Henrik

    2014-01-01

    The literature on trust has come to assume that education has a rather universal positive effect. Using the survey item that has dominated the trust literature – “whether one believes most people can be trusted or one never can be too careful” – education is often found to be one of the strongest...

  7. Recovering from trust breakdowns in large system Implementations

    DEFF Research Database (Denmark)

    Schlichter, Bjarne Rerup; Andersen, Povl Erik Rostgård

    On the basis of experiences from the Faroese large-scale implementation of integrated healthcare information systems and insights into dynamic aspects of trust, we offer the following lessons learned for the successful management and recovery of trust (breakdowns) in large system implementations......: restore relations by turning towards face-to-face events and procedures, assure a well-functioning and available support organisation, demonstrate trust in actors to enhance their own self-confidence and celebrate successes, even the smallest or ones injected by yourself. The propositions are based on a 6...

  8. Social Trust and Fractionalization:

    DEFF Research Database (Denmark)

    Bjørnskov, Christian

    2008-01-01

    This paper takes a closer look at the importance of fractionalization for the creation of social trust. It first argues that the determinants of trust can be divided into two categories: those affecting individuals' trust radii and those affecting social polarization. A series of estimates using a...... much larger country sample than in previous literature confirms that fractionalization in the form of income inequality and political diversity adversely affects social trust while ethnic diversity does not. However, these effects differ systematically across countries, questioning standard...... interpretations of the influence of fractionalization on trust....

  9. Trust Management: Literature Review

    Directory of Open Access Journals (Sweden)

    Joanna Olga Paliszkiewicz

    2011-12-01

    Full Text Available The concept of trust has become popular in public debate andacademic analysis. In high income countries this interest is associatedwith concern for the decline of trust in governments andprofessionals, and in developing countries has been promptedby debates around the motion of social capital. Trust has beenidentified as a major factor influencing such things as capital investment,relationship marketing, cross-cultural communication,learning and various types of cooperation. Trust management isbecoming also very important inside the organization. The studywill review empirical research on organizational trust. The purposeof the study will be also evaluation of the advancements andsetbacks in current empirical research in terms of managementorganizational trust. This paper will analyze the theoretical approach,the conceptualization and the measurement issues coveredin studies on management organizational trust. Althoughtrust has emerged as an important factor in organizational relationships,there are still major conceptual and methodologicalchallenges to be met when studying this complex concept.

  10. Planning Lessons

    Institute of Scientific and Technical Information of China (English)

    Linda Jensen

    2007-01-01

    @@ Jensen's "Lesson Planning"article serves aS a guide fOr novice teachers who need to create formalized lesson plans.The article covers why,when,and how teachers plan lessons,as well aS basic lesson plan principles and a lesson plan template.

  11. Balancing Trust and Control

    DEFF Research Database (Denmark)

    Jagd, Søren

    2010-01-01

    The purpose of this paper is to show that conceptualizing trust and control as interactively related processes, as opposed to more static conceptualizations of the two concepts and the relations between them, adds importantly towards understanding the challenges involved in balancing of trust and...... control in organizations. The paper examines recent literature on the conceptualization of the relation between trust and control in and between organizations. The literature review shows that trust and control has been conceptualized as either substituting or complementing each other. Further, it is...... found that the complementary/substitution debate calls for an explicit conceptualization of the relation between trust and control as an interactive process, in contrast to earlier conceptualizations of trust and control as two relatively static and isolated concepts. While the static perspective on...

  12. Trust, Innovation and Prosperity

    OpenAIRE

    Stanislav Szabo; Vojtech Ferencz; Andreja Pucihar

    2013-01-01

    Economic development and its determinants, esp. trust or innovation are subjects of several scientific studies. Several authors claim the importance of innovation for economic development. Some studies identified that one of the most crucial factor for economic growth and prosperity is the trust between people. Within the research in this paper we have tried to identify the role of interpersonal trust within the innovation vs. prosperity relation. For this purpose and for causality analysis, ...

  13. Nobel Prize for work on broken symmetries

    CERN Multimedia

    2008-01-01

    The 2008 Nobel Prize for Physics goes to three physicists who have worked on broken symmetries in particle physics. The announcement of the 2008 Nobel Prize for physics was transmitted to the Globe of Science and Innovation via webcast on the occasion of the preview of the Nobel Accelerator exhibition.On 7 October it was announced that the Royal Swedish Academy of Sciences had awarded the 2008 Nobel Prize for physics to three particle physicists for their fundamental work on the mechanisms of broken symmetries. Half the prize was awarded to Yoichiro Nambu of Fermilab for "the discovery of the mechanism of spontaneous broken symmetry in subatomic physics". The other half is shared by Makato Kobayashi of Japan’s KEK Institute and Toshihide Maskawa of the Yukawa Institute at the University of Kyoto "for the discovery of the origin of the broken symmetry which predicts the existence of at least three families of quarks in Nature". At th...

  14. Trust in interprofessional collaboration

    Science.gov (United States)

    Gregory, Paul A. M.; Austin, Zubin

    2016-01-01

    Background: Trust is integral to effective interprofessional collaboration. There has been scant literature characterizing how trust between practitioners is formed, maintained or lost. The objective of this study was to characterize the cognitive model of trust that exists between pharmacists and family physicians working in collaborative primary care settings. Methods: Pharmacists and family physicians who work collaboratively in primary care were participants in this study. Family health teams were excluded from this study because of the distinct nature of these settings. Through a snowball convenience sampling method, a total of 11 pharmacists and 8 family physicians were recruited. A semistructured interview guide was used to guide discussion around trust, relationships and collaboration. Constant-comparative coding was used to identify themes emerging from these data. Results: Pharmacists and family physicians demonstrate different cognitive models of trust in primary care collaboration. For pharmacists, trust appears to be conferred on physicians based on title, degree, status and positional authority. For family physicians, trust appears to be earned based on competency and performance. These differences may lead to interprofessional tension when expectations of reciprocal trust are not met. Conclusions: Further work in characterizing how trust is developed in interprofessional relationships is needed to support effective team formation and functioning.

  15. The Duty to Trust and the Duty to be Trustful

    OpenAIRE

    Origgi, Gloria

    2009-01-01

    Trust is a complex attitude that has emotional, cognitive and moral dimensions. A difficulty to reduce trust to a simple emotional attitude is that trust raises normative pressures: if someone asks you to be trusted you feel the normative pressure of not letting him or her down, and if someone trusts you, you feel the normative pressure of honoring his or her trust. These normative pressures seem to have an irreducibly social character: pressures are effective insofar as they may raise emotio...

  16. Trust and virtual worlds

    DEFF Research Database (Denmark)

    Ess, Charles; Thorseth, May

    2011-01-01

    We collect diverse philosophical analyses of the issues and problems clustering around trust online with specific attention to establishing trust in virtual environments. The book moves forward important discussions of how virtual worlds and virtuality are to be defined and understood; the role o...

  17. National Education Trust Fund

    Science.gov (United States)

    Shapp, Milton J.

    1975-01-01

    A proposal from the governor of Pennsylvania for financing all levels of education through a National Education Trust Fund (NETF) that would operate as the present Federal Highway Trust Fund does on a revolving, self-liquidating basis with the cost of an individual's education repaid through a progressive education tax on income. (JT)

  18. Trust in Strategic Alliances

    DEFF Research Database (Denmark)

    Nielsen, Bo

    2011-01-01

    This article examines the dynamic and multi-dimensional nature of trust in strategic alliances. Adopting a co-evolutionary approach, I developed a framework to show how trust, conceptualised in different forms, plays distinct roles at various evolutionary stages of the alliance relationship...

  19. The Determinants of Trust

    DEFF Research Database (Denmark)

    Bjørnskov, Christian

    policy as they argue that the empirical associations between social trust and e.g. education or rule of law reflect the reverse causal direction, i.e. that trust has caused part of the cross-country differences in these factors. The aim of this paper is to assess the impact of a number of the central...

  20. Trust, Innovation and Prosperity

    Directory of Open Access Journals (Sweden)

    Stanislav Szabo

    2013-12-01

    Full Text Available Economic development and its determinants, esp. trust or innovation are subjects of several scientific studies. Several authors claim the importance of innovation for economic development. Some studies identified that one of the most crucial factor for economic growth and prosperity is the trust between people. Within the research in this paper we have tried to identify the role of interpersonal trust within the innovation vs. prosperity relation. For this purpose and for causality analysis, we have applied decision tree models. Through our analysis of country based data (involved in trust related WVS surveys in opposition to current studies, we have identified, that interpersonal trust is more significant determinant of innovation development as prosperity.

  1. Trust transitivity in social networks

    CERN Document Server

    Richters, Oliver

    2010-01-01

    Non-centralized recommendation-based decision making is a central feature of several social and technological processes, such as market dynamics, peer-to-peer file-sharing and the web of trust of digital certification. We investigate the properties of trust propagation on networks, based on a simple metric of trust transitivity. We investigate analytically the percolation properties of trust transitivity in random networks with arbitrary degree distribution, and compare with numerical realizations. We find that the existence of a non-zero fraction of absolute trust (i.e. entirely confident trust) is a requirement for the viability of global trust propagation in large systems: The average pair-wise trust is marked by a discontinuous transition at a specific fraction of absolute trust, below which it vanishes. Furthermore, we perform an extensive analysis of the Pretty Good Privacy (PGP) web of trust, in view of the concepts introduced. We compare different scenarios of trust distribution: community- and author...

  2. Trust and Wellbeing

    Directory of Open Access Journals (Sweden)

    John F. Helliwell

    2011-01-01

    Full Text Available

    This paper presents new evidence linking trust and subjective wellbeing, based primarily on data from the Gallup World Poll and cycle 17 of the Canadian General Social Survey (GSS17. Because several of the general explanations for subjective wellbeing examined here show large and significant linkages to both household income and various measures of trust, it is possible to estimate income-equivalent compensating differentials for different types of trust. Measures of trust studied include general social trust, trust in management, trust in co-workers, trust in neighbours, and trust in police. In addition, some Canadian surveys and the Gallup World Poll ask respondents to estimate the chances that a lost wallet would be returned to them if found by different individuals, including neighbours, police and strangers.

    Our results reveal strong linkages between several trust measures and subjective well-being, as well as strong linkages between social trust and two major global causes of death—suicides and traffic fatalities. This suggests the value of learning more about how trust can be built and maintained, or repaired where it has been damaged. We therefore use data from the Canadian GSS17 to analyze personal and neighbourhood characteristics, including education, migration history, and mobility, that help explain differences in trust

  3. Autonomy, Trust, and Respect.

    Science.gov (United States)

    Nys, Thomas

    2016-02-01

    This article seeks to explore and analyze the relationship between autonomy and trust, and to show how these findings could be relevant to medical ethics. First, I will argue that the way in which so-called "relational autonomy theories" tie the notions of autonomy and trust together is not entirely satisfying Then, I will introduce the so-called Encapsulated Interest Account as developed by Russell Hardin. This will bring out the importance of the reasons for trust. What good reasons do we have for trusting someone? I will criticize Hardin's business model as insufficiently robust, especially in the context of health care, and then turn to another source of trust, namely, love. It may seem that trust-through-love is much better suited for the vulnerability that is often involved in health care, but I will also show that it has its own deficiencies. Good health care should therefore pay attention to both models of trust, and I will offer some tentative remarks on how to do this. PMID:26668168

  4. Trust in Mobile Commerce

    OpenAIRE

    Kounelis, Ioannis; Loeschner, Jan

    2012-01-01

    This paper describes how a citizen, in our case a user of a mobile phone, is confronted with several aspects of trust when he/she uses different mobile commercial objects in a digital world. In particular, the topic of m-commerce and how a client mitigates trust all the way from his/her mobile device to the merchant is dealt with. To assess the trust chain, especially in respect to privacy and data protection, objects (for example a voucher) are used to model the mobile commerce domain.

  5. The Trust Imperative

    OpenAIRE

    Urban, Glen L

    2003-01-01

    Nearly 70% of Americans agree with the statement, "I don't know whom to trust anymore," according to a February 2002 Golin/Harris Poll1. Although trust in society and corporations seems to be at an all time low, now is a good time for businesses to embark on a trust-based marketing strategy. Increasing customer power will drive a new paradigm for marketing, a paradigm based on advocating for the customer by providing open, honest information and advice. At the same time, this customer power i...

  6. Trust vs. Crisis

    Directory of Open Access Journals (Sweden)

    Kirsten Mogensen

    2014-06-01

    Full Text Available The three social phenomena -- norms, trust, and crisis -- are in this paper combined into one model that illustrates their function and relationship. Crisis is seen as a reaction to serious violations of expectations that leave people disoriented, insecure about situational norms, and unable to judge whom to trust. One logical solution to a crisis is to rebuild a shared understanding of the norms involved in any given context. Banking is used as a case. Central concepts are borrowed from Niklas Luhmann Trust (1968, Alf Ross Directives and Norms (1967, and Arthur G. Neal National Trauma & Collective Memory (1998.

  7. Trust vs. Crisis

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    2014-01-01

    The three social phenomena -- norms, trust, and crisis -- are in this paper combined into one model that illustrates their function and relationship. Crisis is seen as a reaction to serious violations of expectations that leave people disoriented, insecure about situational norms, and unable to...... judge whom to trust. One logical solution to a crisis is to rebuild a shared understanding of the norms involved in any given context. Banking is used as a case. Central concepts are borrowed from Niklas Luhmann Trust (1968), Alf Ross Directives and Norms (1967), and Arthur G. Neal National Trauma...

  8. Trust repertoires for collaboration

    DEFF Research Database (Denmark)

    Fuglsang, Lars

    This case study analyses the role of trust in a public private innovation network that involved a private consultancy company as a facilitator. We know that collaboration is a important for innovation, and that collaboration across organizational boundaries is not a trivial issue. But we know very...... little about how such processes develop and how trust, understood as “confident positive expectations” (Lewicki et al. 1998) to collaborative activities, arises out of collaboration. The paper contributes by showing how trust and collaboration are intertwined. The main finding is that a facilitator can...

  9. 75 FR 40820 - City of Broken Bow, Oklahoma; Project No. 12470-001-Oklahoma Broken Bow Re-Regulation Dam...

    Science.gov (United States)

    2010-07-14

    ... Energy Regulatory Commission City of Broken Bow, Oklahoma; Project No. 12470-001--Oklahoma Broken Bow Re... included in, or eligible for inclusion in, the National Register of Historic Places at the Broken Bow Re..., 2010, for the Broken Bow Re-Regulation Dam Hydroelectric Project No. 12470 is revised to add...

  10. 75 FR 33802 - City of Broken Bow, OK; Broken Bow Re-Regulation Dam; Hydropower Project; Notice of Proposed...

    Science.gov (United States)

    2010-06-15

    ... Energy Regulatory Commission City of Broken Bow, OK; Broken Bow Re-Regulation Dam; Hydropower Project... eligible for inclusion in, the National Register of Historic Places at the Broken Bow Re-Regulation Dam... the Broken Bow Re-Regulation Dam Hydropower Project would be fulfilled through the...

  11. Building a Culture of Trust.

    Science.gov (United States)

    Hoffman, James; And Others

    1994-01-01

    Identifies important aspects of faculty trust and school climate. Trust in the principal and trust in colleagues were aspects of faculty trust that were affected in this study of middle schools. The organizational climate factors of supportive, directive, and restrictive principal behavior and collegial, committed, and disengaged teacher behavior…

  12. Development of Trusted Computing Research

    Institute of Scientific and Technical Information of China (English)

    ZHANG Huanguo; LUO Jie; JIN Gang; ZHU Zhiqiang; YU Fajiang; YAN Fei

    2006-01-01

    Trusted computing is the new trend of information security today. This paper surveys the theory and technology of trusted computing. The development history of trusted computing, and the development of trusted computing in China are introduced in this paper,and then it analyzes some problems of trusted computing at present which are delay in theory research, some key technologies to be developed and lack of trusted software system. Some fields are worthy to be explored on are pointed out including key technology, basic theory and application in trusted computing.

  13. Trusting Crowdsourced Geospatial Semantics

    Science.gov (United States)

    Goodhue, P.; McNair, H.; Reitsma, F.

    2015-08-01

    The degree of trust one can place in information is one of the foremost limitations of crowdsourced geospatial information. As with the development of web technologies, the increased prevalence of semantics associated with geospatial information has increased accessibility and functionality. Semantics also provides an opportunity to extend indicators of trust for crowdsourced geospatial information that have largely focused on spatio-temporal and social aspects of that information. Comparing a feature's intrinsic and extrinsic properties to associated ontologies provides a means of semantically assessing the trustworthiness of crowdsourced geospatial information. The application of this approach to unconstrained semantic submissions then allows for a detailed assessment of the trust of these features whilst maintaining the descriptive thoroughness this mode of information submission affords. The resulting trust rating then becomes an attribute of the feature, providing not only an indication as to the trustworthiness of a specific feature but is able to be aggregated across multiple features to illustrate the overall trustworthiness of a dataset.

  14. Monopoles and strings in broken symmetry

    International Nuclear Information System (INIS)

    When a U(1) gauge theory is spontaneously broken, work has shown that a monopole cannot exist isolated but must be attached to a string carrying both energy and a quantized magnetic flux. The authors wish to consider whether and how this result can be generalized to non-abelian theories. (author)

  15. Ratchet device with broken friction symmetry

    DEFF Research Database (Denmark)

    Norden, Bengt; Zolotaryuk, Yaroslav; Christiansen, Peter Leth;

    2002-01-01

    An experimental setup (gadget) has been made for demonstration of a ratchet mechanism induced by broken symmetry of a dependence of dry friction on external forcing. This gadget converts longitudinal oscillating or fluctuating motion into a unidirectional rotation, the direction of which is in...

  16. Ratchet due to broken friction symmetry

    DEFF Research Database (Denmark)

    Norden, Bengt; Zolotaryuk, Yaroslav; Christiansen, Peter Leth;

    2002-01-01

    A ratchet mechanism that occurs due to asymmetric dependence of the friction of a moving system on its velocity or a driving force is reported. For this kind of ratchet, instead of a particle moving in a periodic potential, the dynamics of which have broken space-time symmetry, the system must be...

  17. Responses to Broken Promises: Does Personality Matter?

    Science.gov (United States)

    Ho, Violet T.; Weingart, Laurie R.; Rousseau, Denise M.

    2004-01-01

    This paper examined the effects of personality traits on individuals' reactions to broken promises. We studied the effects of Neuroticism and Agreeableness on emotive and cognitive responses to breach and investigated whether these effects varied across different types (economic vs. social) and severity (high vs. low) of breach. We collected data…

  18. Broken Scale Invariance and Anomalous Dimensions

    Science.gov (United States)

    Wilson, K. G.

    1970-05-01

    Mack and Kastrup have proposed that broken scale invariance is a symmetry of strong interactions. There is evidence from the Thirring model and perturbation theory that the dimensions of fields defined by scale transformations will be changed by the interaction from their canonical values. We review these ideas and their consequences for strong interactions.

  19. Organizational Identity and Trust

    OpenAIRE

    Puusa, Anu; Tolvanen, Ulla

    2006-01-01

    This paper focuses on organizational identity and trust. The paper is being created from a theoretical point of view. Exploring concept and their interrelation is important and valuable scientific work with the purpose of better understanding their meaning and interrelation. This kind of conceptual and theoretical examination has an important task as a basis for theorizing and theory creation. Both identity and trust are multilevel notions. Both concepts describe an abstract phenomenon ...

  20. Military Leaders and Trust

    OpenAIRE

    Fors Brandebo, Maria

    2015-01-01

    The aim of this thesis is to study trust in military leaders. Empirical data was gathered through interviews and questionnaires with military personnel mostly from Sweden, but also from four other European countries. Paper I illustrates that trust in military leaders can be theoretically understood in terms of a hierarchical system of categories, higher-level categories and two superior categories labelled Individual-related and Communication- and relationship-related characteristics. Paper I...

  1. Trust and Estate Planning

    DEFF Research Database (Denmark)

    Harrington, Brooke

    2012-01-01

    looks at the ways professionals participate in the creation of stratification regimes. Trust and estate planners do this by sheltering their clients' assets from taxation, thereby preserving private wealth for future generations. Using tools such as trusts, offshore banks, and shell corporations......, spurring innovation in legal, organizational, and financial strategies, and thwarting a myriad of laws and policies designed to limit enduring inequality in modern, democratic societies....

  2. Trust in Virtual Universities

    Directory of Open Access Journals (Sweden)

    Asghar A. Hastiani

    2008-01-01

    Full Text Available The number of students enrolled at Iranian virtual Universities during 2004-2007 years, annually accounted for less than 0.5% of traditional Iranian universities enrolment. The low rate of virtual Universities enrolment might be due to a low level of student's trust in this type of educational institution. Students with low trust in virtual universities may be less likely to enroll in distant learning courses. Many factors contribute to student's trust level, including perceptions of the virtual university's quality of education, teacher's skills, academic reputation, etc...We examined five factors (academic reputation, administrative efficacy, size of institution, fairly tuition and Suitable environmental Conditions as antecedents and three factors (student's attitude, willingness and risk taking as consequences of student's trust. The relationships among factors were determined using a structural equations model and path analysis. Our analysis suggests that the academic reputation and the Suitable environmental Conditions for activity a virtual university is the most important determinants of student's trust. Furthermore, the student's trust level significantly affects student's willingness to study in virtual universities. Our results have implications for the development of theories as well as policies for the virtual universities.

  3. Trusted Computing Technologies, Intel Trusted Execution Technology.

    Energy Technology Data Exchange (ETDEWEB)

    Guise, Max Joseph; Wendt, Jeremy Daniel

    2011-01-01

    We describe the current state-of-the-art in Trusted Computing Technologies - focusing mainly on Intel's Trusted Execution Technology (TXT). This document is based on existing documentation and tests of two existing TXT-based systems: Intel's Trusted Boot and Invisible Things Lab's Qubes OS. We describe what features are lacking in current implementations, describe what a mature system could provide, and present a list of developments to watch. Critical systems perform operation-critical computations on high importance data. In such systems, the inputs, computation steps, and outputs may be highly sensitive. Sensitive components must be protected from both unauthorized release, and unauthorized alteration: Unauthorized users should not access the sensitive input and sensitive output data, nor be able to alter them; the computation contains intermediate data with the same requirements, and executes algorithms that the unauthorized should not be able to know or alter. Due to various system requirements, such critical systems are frequently built from commercial hardware, employ commercial software, and require network access. These hardware, software, and network system components increase the risk that sensitive input data, computation, and output data may be compromised.

  4. Intergroup trust in Northern Ireland.

    Science.gov (United States)

    Tam, Tania; Hewstone, Miles; Kenworthy, Jared; Cairns, Ed

    2009-01-01

    Although prominent political agendas have placed a great deal of importance on building trust in postconflict areas, there has been a lack of empirical research on its role in areas of intergroup conflict. The authors conducted two studies to examine the relationship between trust and intergroup behavioral tendencies-and the potential for intergroup contact to build trust in Northern Ireland. Study 1 showed that outgroup trust mediates the impact of intergroup contact on behavioral tendencies toward the outgroup. Study 2 revealed the importance of trusting the outgroup over simply liking the outgroup; establishing outgroup trust is crucial, as trust is a stronger predictor of behavioral tendencies toward the outgroup than positive attitudes are. Results also demonstrated two mechanisms for increasing outgroup trust-through both direct and extended intergroup contact. These studies further our understanding of the psychological mechanisms underlying the formation of intergroup trust and behavior in areas of conflict. PMID:19106077

  5. Trust transitivity in social networks.

    Science.gov (United States)

    Richters, Oliver; Peixoto, Tiago P

    2011-01-01

    Non-centralized recommendation-based decision making is a central feature of several social and technological processes, such as market dynamics, peer-to-peer file-sharing and the web of trust of digital certification. We investigate the properties of trust propagation on networks, based on a simple metric of trust transitivity. We investigate analytically the percolation properties of trust transitivity in random networks with arbitrary in/out-degree distributions, and compare with numerical realizations. We find that the existence of a non-zero fraction of absolute trust (i.e. entirely confident trust) is a requirement for the viability of global trust propagation in large systems: The average pair-wise trust is marked by a discontinuous transition at a specific fraction of absolute trust, below which it vanishes. Furthermore, we perform an extensive analysis of the Pretty Good Privacy (PGP) web of trust, in view of the concepts introduced. We compare different scenarios of trust distribution: community- and authority-centered. We find that these scenarios lead to sharply different patterns of trust propagation, due to the segregation of authority hubs and densely-connected communities. While the authority-centered scenario is more efficient, and leads to higher average trust values, it favours weakly-connected "fringe" nodes, which are directly trusted by authorities. The community-centered scheme, on the other hand, favours nodes with intermediate in/out-degrees, in detriment of the authorities and its "fringe" peers. PMID:21483683

  6. Trust transitivity in social networks.

    Directory of Open Access Journals (Sweden)

    Oliver Richters

    Full Text Available Non-centralized recommendation-based decision making is a central feature of several social and technological processes, such as market dynamics, peer-to-peer file-sharing and the web of trust of digital certification. We investigate the properties of trust propagation on networks, based on a simple metric of trust transitivity. We investigate analytically the percolation properties of trust transitivity in random networks with arbitrary in/out-degree distributions, and compare with numerical realizations. We find that the existence of a non-zero fraction of absolute trust (i.e. entirely confident trust is a requirement for the viability of global trust propagation in large systems: The average pair-wise trust is marked by a discontinuous transition at a specific fraction of absolute trust, below which it vanishes. Furthermore, we perform an extensive analysis of the Pretty Good Privacy (PGP web of trust, in view of the concepts introduced. We compare different scenarios of trust distribution: community- and authority-centered. We find that these scenarios lead to sharply different patterns of trust propagation, due to the segregation of authority hubs and densely-connected communities. While the authority-centered scenario is more efficient, and leads to higher average trust values, it favours weakly-connected "fringe" nodes, which are directly trusted by authorities. The community-centered scheme, on the other hand, favours nodes with intermediate in/out-degrees, in detriment of the authorities and its "fringe" peers.

  7. Trusted Translation Services

    Science.gov (United States)

    Atif, Yacine; Serhani, Mohamed Adel; Campbell, Piers; Mathew, Sujith Samuel

    Administering multilingual Web sites and applications reliably, involves interconnected and multipart tasks, where trust in the involved parties and content translation sources is paramount. Published Web sites may reflect content from databases, content management systems and other repositories to manage related Web content. But a Web site mirrored wholly or selectively onto a target language version requires streamlined trusted processes. Traditionally, files are translated and transferred via FTP, e-mail, or other communication means. Similarly, translation instructions are communicated between involved parties through verbal instruction, e-mail, and instruction files lead to a variety of inconsistencies and lack of trust in the translation process. This paper proposes a Web service approach to streamline the translation processes and an integration of trust properties in the proposed translation Web services. Web Services have been instrumental in handling problems inherent to systems integration, allowing web-based systems to converse and communicate data automatically. The OASIS Translation Web Services Technical Committee has released a standard way for Web Services to serve the translation and localization business. This article proposes a framework to centralize translation services at a reputable source providing a workflow and a mechanism to quantify service trust. An implementation of the framework is also described in the context of a localization case study.

  8. Broken Ergodicity in Ideal, Homogeneous, Incompressible Turbulence

    Science.gov (United States)

    Morin, Lee; Shebalin, John; Fu, Terry; Nguyen, Phu; Shum, Victor

    2010-01-01

    We discuss the statistical mechanics of numerical models of ideal homogeneous, incompressible turbulence and their relevance for dissipative fluids and magnetofluids. These numerical models are based on Fourier series and the relevant statistical theory predicts that Fourier coefficients of fluid velocity and magnetic fields (if present) are zero-mean random variables. However, numerical simulations clearly show that certain coefficients have a non-zero mean value that can be very large compared to the associated standard deviation. We explain this phenomena in terms of broken ergodicity', which is defined to occur when dynamical behavior does not match ensemble predictions on very long time-scales. We review the theoretical basis of broken ergodicity, apply it to 2-D and 3-D fluid and magnetohydrodynamic simulations of homogeneous turbulence, and show new results from simulations using GPU (graphical processing unit) computers.

  9. Theory of broken gauge symmetry of families

    International Nuclear Information System (INIS)

    A theoretical scheme is considered, based on the gauge spontaneously-broken SU(3)H symmetry of families. The generation of quark and lepton masses is induced by their mixing with hypothetical superheavy fermions, providing a relationship of the observed mass hierarchy and mixing of quarks and leptons with the structure of horizontal symmetry breaking. The model predicts the existance of invisible axion, being simultaneously familon and Majoron, as well as the existence of neutrino Majorana mass hierarchy

  10. Broken Heart Syndrome: A Typical Case.

    Science.gov (United States)

    Therkleson, Tessa; Stronach, Shona

    2015-12-01

    This case describes a combination external treatment for "Broken Heart Syndrome" that includes a lavender footbath, massage using moor extract, and oxalis ointment to the abdomen applied by an Anthroposophic nurse for a specific personality type. Lavender footbaths have been used since ancient times for relaxation and calming, while moor extract has been used medicinally in Europe since the middle ages for warmth and environmental protection. Rhythmical massage using moor extract and oxalis ointment poultice to the abdomen are part of the tradition of Anthroposophic nursing when managing stress induced by emotional and physical trauma. An elderly lady with specific characteristics diagnosed as Broken Heart Syndrome received one treatment a week for 4 weeks given by an Anthroposophic nurse at an integrative medical center. Between treatments, education was given to enable self-treatment in the home. The nursing treatments, each using lavender footbaths, moor extract massage, and oxalis ointment poultice to the abdomen, proved very effect, and no negative effects were reported. External applications need to be considered by nurses caring for specific personality types with Broken Heart Syndrome. PMID:25673580

  11. Managing healthcare information: analyzing trust.

    Science.gov (United States)

    Söderström, Eva; Eriksson, Nomie; Åhlfeldt, Rose-Mharie

    2016-08-01

    Purpose - The purpose of this paper is to analyze two case studies with a trust matrix tool, to identify trust issues related to electronic health records. Design/methodology/approach - A qualitative research approach is applied using two case studies. The data analysis of these studies generated a problem list, which was mapped to a trust matrix. Findings - Results demonstrate flaws in current practices and point to achieving balance between organizational, person and technology trust perspectives. The analysis revealed three challenge areas, to: achieve higher trust in patient-focussed healthcare; improve communication between patients and healthcare professionals; and establish clear terminology. By taking trust into account, a more holistic perspective on healthcare can be achieved, where trust can be obtained and optimized. Research limitations/implications - A trust matrix is tested and shown to identify trust problems on different levels and relating to trusting beliefs. Future research should elaborate and more fully address issues within three identified challenge areas. Practical implications - The trust matrix's usefulness as a tool for organizations to analyze trust problems and issues is demonstrated. Originality/value - Healthcare trust issues are captured to a greater extent and from previously unchartered perspectives. PMID:27477934

  12. Trusts and Financialization

    DEFF Research Database (Denmark)

    Harrington, Brooke

    2016-01-01

    This article identifies trusts as a legal structure associated with the global spread of financialization. Although trusts originated in Medieval England, they have acquired a new significance in contemporary finance by virtue of their advantages in terms of 10 profit maximization and capital...... the global spread of financialization: by privileging the rentier–investor within the 15 world economy; by perpetuating a distinctively Anglo-American approach to finance internationally; and by increasing the autonomy of finance vis-a-vis the nation-state. This study shares the primarily descriptive...... and conceptual intent of Krippner’s work on financialization, but extends it in two ways: by comparing trusts to the better- known corporate form of organizing financial activity, and by showing how private 20 capital is implicated in the financialized economy alongside corporate wealth....

  13. Governance, Trust and Taxes

    DEFF Research Database (Denmark)

    Weihe, Guri; Joensen, E. Juanna Schröter

    This paper examines the role of social capital (trust) vis-à-vis the propensity of a country to be a tax haven. The empirical analysis corroborates that better governed countries have a higher ceteris paribus probability to be tax havens. However, social capital counteracts the effect of governance...... quality. This effect is so strong that the partial effect of governance quality is reversed for countries with the trust index in the top quartile – making these high trust countries less likely to be tax havens – even as governance quality is increased. Thus it is crucial to consider the interaction...... between institutions and social capital, since the same governance institutions have a different impact on the tax haven propensity for countries with different social capital....

  14. Competition Fosters Trust

    DEFF Research Database (Denmark)

    Huck, Steffen; Ruchala, Gabriele K.; Tyran, Jean-Robert

    We study the effects of reputation and competition in a stylized market for experience goods. If interaction is anonymous, such markets perform poorly: sellers are not trustworthy, and buyers do not trust sellers. If sellers are identifiable and can, hence, build a reputation, efficiency quadruples...... but is still at only a third of the first best. Adding more information by granting buyers access to all sellers’ complete history has, somewhat surprisingly, no effect. On the other hand, we find that competition, coupled with some minimal information, eliminates the trust problem almost completely...

  15. Trusted cloud computing

    CERN Document Server

    Krcmar, Helmut; Rumpe, Bernhard

    2014-01-01

    This book documents the scientific results of the projects related to the Trusted Cloud Program, covering fundamental aspects of trust, security, and quality of service for cloud-based services and applications. These results aim to allow trustworthy IT applications in the cloud by providing a reliable and secure technical and legal framework. In this domain, business models, legislative circumstances, technical possibilities, and realizable security are closely interwoven and thus are addressed jointly. The book is organized in four parts on "Security and Privacy", "Software Engineering and

  16. Trust in Anonymity Networks

    Science.gov (United States)

    Sassone, Vladimiro; Hamadou, Sardaouna; Yang, Mu

    Anonymity is a security property of paramount importance, as we move steadily towards a wired, online community. Its import touches upon subjects as different as eGovernance, eBusiness and eLeisure, as well as personal freedom of speech in authoritarian societies. Trust metrics are used in anonymity networks to support and enhance reliability in the absence of verifiable identities, and a variety of security attacks currently focus on degrading a user's trustworthiness in the eyes of the other users. In this paper, we analyse the privacy guarantees of the Crowds anonymity protocol, with and without onion forwarding, for standard and adaptive attacks against the trust level of honest users.

  17. The Process of Trust Development

    DEFF Research Database (Denmark)

    Jagd, Søren; Højland, Jeppe

    Trust is critical for the quality of social interaction especially in organisations based on employee cooperation and empowerment. An important question is how organisations pass from a situation with low trust between management and employees and among employees to a situation characterised by...... high trust and co-operation? In this paper we explore the process of trust development during an organisational change project in a Danish SME by looking at two kinds of trust relations: employee trust in management and trust relations among employees. We find substantial differences in trust in...... group' of employees in the project coordination group, by a change of attitude towards employees by management during the project, by the specific actions taken by management as a response to employee complains and by the creation of occasions such as employee seminars where employees can meet and...

  18. Understanding Trust in Financial Services

    DEFF Research Database (Denmark)

    Hansen, Torben

    2012-01-01

    research extends prior research by developing a conceptual framework explaining how these constructs affect consumers' trust in their financial service provider. Based on two surveys comprising 764 pension consumers and 892 mortgage consumers, respectively, the results of this study indicate that financial...... healthiness, broad-scope trust, knowledge, and satisfaction positively affect narrow-scope trust in financial services. Furthermore, it is found that broad-scope trust negatively moderates the relationships between financial healthiness and narrow-scope trust and between satisfaction and narrow-scope trust......, respectively. In addition, the results marginally indicate that broad-scope trust negatively moderates the relationship between consumer financial knowledge and narrow-scope trust. This study encourages public policy makers, consumer organizations, and financial service providers to continue, improve, and...

  19. Easements - Maryland Environmental Trust Easements

    Data.gov (United States)

    NSGIC GIS Inventory (aka Ramona) — The Maryland Environmental Trust (MET) is a statewide local land trust governed by a citizen Board of Trustees. Since its creation by the General Assembly in 1967,...

  20. 7 CFR 868.254 - Broken kernels determination.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Broken kernels determination. 868.254 Section 868.254 Agriculture Regulations of the Department of Agriculture (Continued) GRAIN INSPECTION, PACKERS AND STOCKYARD... Governing Application of Standards § 868.254 Broken kernels determination. Broken kernels shall...

  1. 46 CFR 9.9 - Two hours between broken periods.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Two hours between broken periods. 9.9 Section 9.9... COMPENSATION FOR OVERTIME SERVICES § 9.9 Two hours between broken periods. Where 2 hours or more intervene between broken periods, one-half day's extra pay will be allowed for each distinct 2-hour period or...

  2. 7 CFR 868.304 - Broken kernels determination.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Broken kernels determination. 868.304 Section 868.304 Agriculture Regulations of the Department of Agriculture (Continued) GRAIN INSPECTION, PACKERS AND STOCKYARD... Application of Standards § 868.304 Broken kernels determination. Broken kernels shall be determined by the...

  3. 7 CFR 51.2125 - Split or broken kernels.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Split or broken kernels. 51.2125 Section 51.2125... STANDARDS) United States Standards for Grades of Shelled Almonds Definitions § 51.2125 Split or broken kernels. Split or broken kernels means seven-eighths or less of complete whole kernels but which will...

  4. Trust Transitivity in Social Networks

    OpenAIRE

    Richters, Oliver; Peixoto, Tiago P.

    2011-01-01

    Non-centralized recommendation-based decision making is a central feature of several social and technological processes, such as market dynamics, peer-to-peer file-sharing and the web of trust of digital certification. We investigate the properties of trust propagation on networks, based on a simple metric of trust transitivity. We investigate analytically the percolation properties of trust transitivity in random networks with arbitrary in/out-degree distributions, and compare with numerical...

  5. Incremental Trust in Grid Computing

    DEFF Research Database (Denmark)

    Brinkløv, Michael Hvalsøe; Sharp, Robin

    This paper describes a comparative simulation study of some incremental trust and reputation algorithms for handling behavioural trust in large distributed systems. Two types of reputation algorithm (based on discrete and Bayesian evaluation of ratings) and two ways of combining direct trust and ...... of Grid computing systems....

  6. Trust as a Critical Concept

    DEFF Research Database (Denmark)

    Bordum, Anders

    2004-01-01

    In this articlei I will argue that trust is a fundamental and critical concept because trust is the direct or transcendental constitutive ground of most social phenomena, as well as applicable as an operational method in critical theory. There are two different but overlapping positions on trust I...

  7. Constitutional Verbosity and Social Trust

    DEFF Research Database (Denmark)

    Bjørnskov, Christian; Voigt, Stefan

    2014-01-01

    A common argument in the trust literature is that high-trust cultures allow efficient commercial contracts to be shorter, covering fewer contingencies. We take this idea to the topic of social contracts. Specifically, we ask whether social trust affects the length and detail of constitutions. Cro...

  8. Trust Development in Outdoor Leadership

    Science.gov (United States)

    Shooter, Wynn; Paisley, Karen; Sibthorp, Jim

    2010-01-01

    Establishing trusting relationships between leaders and participants is one way that outdoor leaders can create an emotionally safe and productive milieu that supports the attainment of desirable outcomes. Multidisciplinary literature offers considerable insight into leader trust development and the outcomes that are linked to trust in a leader.…

  9. Why Teachers Trust School Leaders

    Science.gov (United States)

    Handford, Victoria; Leithwood, Kenneth

    2013-01-01

    Purpose: Trust among teachers in schools is significantly related to student achievement and trust in school leaders is an important influence on such trust. The purpose of this study is to identify leadership practices which teachers interpret as signs of trustworthiness on the part of their principals. Design/methodology/approach: Evidence for…

  10. Trust It or Trash It?

    Science.gov (United States)

    Trust It or Trash It? About | Contact | Español Tab 1 Tab 2 What is Trust It or Trash It? This is a tool to help you think ... here for the developer version. Home Who Said It? Who wrote it? Think about TRUSTING IT if: ...

  11. Trusting Relationships in International Politics

    DEFF Research Database (Denmark)

    Keating, Vincent; Ruzicka, Jan

    2014-01-01

    How can trusting relationships be identified in international politics? The recent wave of scholarship on trust in International Relations answers this question by looking for one or the combination of three indicators – the incidence of cooperation; discourses expressing trust; or the calculated...

  12. Four Essential Practices for Building Trust

    Science.gov (United States)

    Combs, Julie Peterson; Harris, Sandra; Edmonson, Stacey

    2015-01-01

    The presence of trust can enhance an organization's efforts to fulfill its mission, and the lack of trust can constrict those efforts. The authors offer four essential guidelines to help school leaders communicate in a way that builds trust. Build trust by understanding trust. Trusted leaders demonstrate care, character, and competence in their…

  13. Initial Formation of Trust

    DEFF Research Database (Denmark)

    Schärfe, Henrik; Dougerthery, Elizabeth Ann

    2011-01-01

    In this paper we present a study of how touch may be used as a way of inducing trust in the meeting with a teloperated android, the Geminoid-DK. The use of hapics with Gestalt-based 'Balance Theory' is used as a persuasive desing of the interaction between human and robot. Balance theory includes...

  14. After science: has the tradition been broken?

    Science.gov (United States)

    Charlton, Bruce G

    2010-04-01

    The majority of professional scientists make use of the artefacts of science but lack understanding of what these mean; raising the question: has the tradition of science been broken? Explicit knowledge is only a selective summary but practical capability derives from implicit, traditional or 'tacit' knowledge that is handed on between- and across-generations by slow, assimilative processes requiring extended human contact through a wide range of situations. This was achieved mainly by prolonged apprenticeship to a Master. Such methods recognize the gulf between being able to do something and knowing how you have done it; and the further gap between knowing how you have done something and being able to teach it by explicit instructions. Yet the 'Master-apprentice' model of education has been almost discarded from science over recent decades and replaced with bureaucratic regulation. The main reason is probably that scientific manpower has expanded so rapidly and over such a long period as to overwhelm the slow, sure and thorough traditional methods. In their innocence of scientific culture, the younger generation of scientists are like children who have been raised by wolves; they do not talk science but spout bureaucratic procedures. It has now become accepted among the mass of professional 'scientists' that the decisions which matter most in science are those imposed upon science by outside forces: for example by employers, funders, publishers, regulators, and the law courts. It is these bureaucratic mechanisms that now constitute the 'bottom line' for scientific practice. Most of modern science is therefore apparently in the post-holocaust situation described in A canticle for Liebowitz and After Virtue, but the catastrophe was bureaucratic, rather than violent. So, the tradition has indeed been broken. However, for as long as the fact is known that the tradition has been broken, and living representatives of the tradition are still alive and active, there still

  15. Broken Lifshitz invariance, spin waves and hydrodynamics

    CERN Document Server

    Roychowdhury, Dibakar

    2016-01-01

    In this paper, based on the basic principles of thermodynamics, we explore the hydrodynamic regime of interacting Lifshitz field theories in the presence of broken rotational invariance. We compute the entropy current and discover new dissipative effects those are consistent with the principle of local entropy production in the fluid. In our analysis, we consider both the parity even as well as the parity odd sector upto first order in the derivative expansion. Finally, we argue that the present construction of the paper could be systematically identified as that of the hydrodynamic description associated with \\textit{spin waves} (away from the domain of quantum criticality) under certain limiting conditions.

  16. Effective theories with broken flavour symmetry

    International Nuclear Information System (INIS)

    The work of Ovrut and Schnitzer on effective theories derived from a non Abelian Gauge Theory is generalised to include the physically interesting case of broken flavour symmetry. The calculations are performed at the 1-loop level. It is shown that at an intermediate stage in the calculations two distinct renormalised gauge coupling constants appear, one describing gauge field coupling to heavy particles and the other describing coupling to light particles. Appropriately modified Slavnov-Taylor identities are shown to hold. A simple alternative to the Ovrut-Schnitzer rules for calculating with effective theories is also considered

  17. Neutrino masses and spontaneously broken flavor symmetries

    International Nuclear Information System (INIS)

    We study the phenomenology of supersymmetric flavor models. We show how the predictions of models based on spontaneously broken non-Abelian discrete flavor symmetries are altered when we include so-called Kaehler corrections. Furthermore, we discuss anomaly-free discrete R symmetries which are compatible with SU(5) unification. We find a set of symmetries compatible with suppressed Dirac neutrino masses and a unique symmetry consistent with the Weinberg operator. We also study a pseudo-anomalous U(1)R symmetry which explains the fermion mass hierarchies and, when amended with additional singlet fields, ameliorates the fine-tuning problem.

  18. HMM-based Trust Model

    DEFF Research Database (Denmark)

    ElSalamouny, Ehab; Nielsen, Mogens; Sassone, Vladimiro

    2010-01-01

    Probabilistic trust has been adopted as an approach to taking security sensitive decisions in modern global computing environments. Existing probabilistic trust frameworks either assume fixed behaviour for the principals or incorporate the notion of ‘decay' as an ad hoc approach to cope with thei...... the major limitation of existing Beta trust model. We show the consistency of the HMM-based trust model and contrast it against the well known Beta trust model with the decay principle in terms of the estimation precision....

  19. Homo economicus belief inhibits trust.

    Science.gov (United States)

    Xin, Ziqiang; Liu, Guofang

    2013-01-01

    As a foundational concept in economics, the homo economicus assumption regards humans as rational and self-interested actors. In contrast, trust requires individuals to believe partners' benevolence and unselfishness. Thus, the homo economicus belief may inhibit trust. The present three experiments demonstrated that the direct exposure to homo economicus belief can weaken trust. And economic situations like profit calculation can also activate individuals' homo economicus belief and inhibit their trust. It seems that people's increasing homo economicus belief may serve as one cause of the worldwide decline of trust. PMID:24146907

  20. Homo economicus belief inhibits trust.

    Directory of Open Access Journals (Sweden)

    Ziqiang Xin

    Full Text Available As a foundational concept in economics, the homo economicus assumption regards humans as rational and self-interested actors. In contrast, trust requires individuals to believe partners' benevolence and unselfishness. Thus, the homo economicus belief may inhibit trust. The present three experiments demonstrated that the direct exposure to homo economicus belief can weaken trust. And economic situations like profit calculation can also activate individuals' homo economicus belief and inhibit their trust. It seems that people's increasing homo economicus belief may serve as one cause of the worldwide decline of trust.

  1. Modeling trust context in networks

    CERN Document Server

    Adali, Sibel

    2013-01-01

    We make complex decisions every day, requiring trust in many different entities for different reasons. These decisions are not made by combining many isolated trust evaluations. Many interlocking factors play a role, each dynamically impacting the others.? In this brief, 'trust context' is defined as the system level description of how the trust evaluation process unfolds.Networks today are part of almost all human activity, supporting and shaping it. Applications increasingly incorporate new interdependencies and new trust contexts. Social networks connect people and organizations throughout

  2. Absorption of solar radiation in broken clouds

    Energy Technology Data Exchange (ETDEWEB)

    Zuev, V.E.; Titov, G.A.; Zhuravleva, T.B. [Institute of Atmospheric Optics, Tomsk (Russian Federation)

    1996-04-01

    It is recognized now that the plane-parallel model unsatisfactorily describes the transfer of radiation through broken clouds and that, consequently, the radiation codes of general circulation models (GCMs) must be refined. However, before any refinement in a GCM code is made, it is necessary to investigate the dependence of radiative characteristics on the effects caused by the random geometry of cloud fields. Such studies for mean fluxes of downwelling and upwelling solar radiation in the visible and near-infrared (IR) spectral range were performed by Zuev et al. In this work, we investigate the mean spectral and integrated absorption of solar radiation by broken clouds (in what follows, the term {open_quotes}mean{close_quotes} will be implied but not used, for convenience). To evaluate the potential effect of stochastic geometry, we will compare the absorption by cumulus (0.5 {le} {gamma} {le} 2) to that by equivalent stratus ({gamma} <<1) clouds; here {gamma} = H/D, H is the cloud layer thickness and D the characteristic horizontal cloud size. The equivalent stratus clouds differ from cumulus only in the aspect ratio {gamma}, all the other parameters coinciding.

  3. Trust in Internet Election

    DEFF Research Database (Denmark)

    Markussen, Randi; Ronquillo, Lorena; Schürmann, Carsten

    2014-01-01

    This paper discusses the Decryption and Counting Ceremony held in conjunction with the internet voting trial on election day in the Ministry of Local Government and Regional Development of Norway in 2013. We examine the organizers' ambition of making the decryption and counting of electronic votes...... public in order to sustain trust in internet voting. We introduce a pragmatic approach to trust that emphasises the inseparability of truth from witnessing it. Based on this and on a description of how the event was made observable and how the complexities in the counting process were disclosed, we...... discuss what we term economy of truth from the perspective of the IT community involved in the ceremony. We claim that broadening the economy of truth by including more explicitly social and political perspectives in the ceremony, and in internet elections in general, and how witnessing is brought about...

  4. Trust and Corruption

    DEFF Research Database (Denmark)

    Graeff, Peter; Svendsen, Gert Tinggaard

    2013-01-01

    Why are the Scandinavian countries in the European Union significantly richer than South-ern/Eastern European countries? We try to answer this question from an empirical social capital perspective. In particular, we are interested in the interplay of social trust as a positive and corruption as a...... capital by applying a path model that accounts for Granger-like causal effects. Our empirical results, referring to a sample of up to 25 EU countries, show that corruption might harm poor European countries but is not able to affect social trust. However, corruption in itself means that resources end up...... in the wrong places and not in socioeconomically optimal investments. There is, therefore, a direct damaging effect of corruption on wealth. This implies that economic actors have to invest higher transaction and control costs which will bind resources to non-productive purposes and thus destroy...

  5. Free Riding or Trust?

    DEFF Research Database (Denmark)

    Svendsen, Gert Tinggaard; Nilsson, Jerker

    2011-01-01

    It is often observed that members have little interest in monitoring their cooperatives. One explanation is that the members are free-riders, hoping that others will perform the task. Another explanation is that the weak member interest is a consequence of members having trust in the leadership....... These competing explanations refer to the theory of collective action and the social capital paradigm, respectively, and may be linked to the classical Gesellschaft and Gemeinschaft concepts. Hence, one may expect free-rider behavior when conditions of Gesellschaft exist and trustful behavior when...... Gemeinschaft conditions rule. These propositions get support from five studies of members’ readership of their cooperatives’ annual reports. In large and heterogeneous memberships there is free-riding behavior, which explains the members’ low interest in governing their cooperatives. To a limited extent a...

  6. The neurobiology of trust.

    Science.gov (United States)

    Zak, Paul J; Kurzban, Robert; Matzner, William T

    2004-12-01

    This is the first report that endogenous oxytocin in humans is related to social behaviors, which is consistent with a large animal literature. Subjects are put into a social dilemma in which absent communication, cooperative behavior can benefit both parties randomly assigned to a dyad. The dilemma arises because one participant must make a monetary sacrifice to signal the degree of trust in the other before the other's behavioral response is known. We show that receipt of a signal of trust is associated with a higher level of peripheral oxytocin than that in subjects receiving a random monetary transfer of the same average amount. Oxytocin levels were also related to trustworthy behavior (sharing a greater proportion of the monetary gains). We conclude that oxytocin may be part of the human physiology that motivates cooperation. PMID:15677415

  7. Time and Trust

    DEFF Research Database (Denmark)

    Hansen, Annette Skovsted

    example of how Japan has tried to build networks in Africa is Jomo Kenyatta University of Agriculture and Technology in Kenya. The university was first established as Jomo Kenyatta College of Agriculture in 1981. The focus remains agriculture and technology and social science and humanities’ courses......Aid relationships in Africa often rely on old networks established by various flows of migrants, students, merchants, colonial administrators, missionaries, development workers, fellows, and diplomats. Many of these have been or are Asian or of Asian descent. The main aim of this paper is to see...... current Africa strategies as part of a long history of a variety of stakeholders on the African continent. I argue that trust and lack of trust based on long term relations influence choices on aid distribution made by African and partner countries. The analysis is based on a reading of OECD statistics...

  8. Fear, Trust and Agroterrorism

    OpenAIRE

    Turvey, Calum G.

    2006-01-01

    This paper presents results from a consumer survey on risk perceptions about agroterrorism and the safety of the US food supply. The survey conducted in the United States during the fall of 2004, provides insights into what consumers are thinking about terrorism against the food system, their knowledge base on food safety, the vulnerabilities of the food supply chain and food categories to terrorist contamination, and their trust in government and groceries to protect the food supply.

  9. Pricing and Trust

    OpenAIRE

    Huck, Steffen; Ruchala, Gabriele K.; Tyran, Jean-Robert

    2007-01-01

    We experimentally examine the effects of flexible and fixed prices in markets for experience goods in which demand is driven by trust. With flexible prices, we observe low prices and high quality in competitive (oligopolistic) markets, and high prices coupled with low quality in non-competitive (monopolistic) markets. We then introduce a regulated intermediate price above the oligopoly price and below the monopoly price. The effect in monopolies is more or less in line with standard intuition...

  10. Trust in anthropology

    OpenAIRE

    Corsín Jiménez, Alberto

    2011-01-01

    The article explores some of the assumptions behind the current valence of the notion of trust and in particular its entanglement in discourses of social robustness, the management and reporting of (corporate) knowledge, and its underlying culture and systems of responsibility. It unfolds by contrasting classic and contemporary anthropological work on cultures of suspicion, culpability and spiritual ambiguity with the new vocabulary of capitalist corporate ethics. Finally, the argument examin...

  11. Trust in Digital Repositories

    Directory of Open Access Journals (Sweden)

    Elizabeth Yakel

    2013-06-01

    Full Text Available ISO 16363:2012, Space Data and Information Transfer Systems - Audit and Certification of Trustworthy Digital Repositories (ISO TRAC, outlines actions a repository can take to be considered trustworthy, but research examining whether the repository’s designated community of users associates such actions with trustworthiness has been limited. Drawing from this ISO document and the management and information systems literatures, this paper discusses findings from interviews with 66 archaeologists and quantitative social scientists. We found similarities and differences across the disciplines and among the social scientists. Both disciplinary communities associated trust with a repository’s transparency. However, archaeologists mentioned guarantees of preservation and sustainability more frequently than the social scientists, who talked about institutional reputation. Repository processes were also linked to trust, with archaeologists more frequently citing metadata issues and social scientists discussing data selection and cleaning processes. Among the social scientists, novices mentioned the influence of colleagues on their trust in repositories almost twice as much as the experts. We discuss the implications our findings have for identifying trustworthy repositories and how they extend the models presented in the management and information systems literatures.

  12. Fully Countering Trusting Trust through Diverse Double-Compiling

    CERN Document Server

    Wheeler, David A

    2010-01-01

    An Air Force evaluation of Multics, and Ken Thompson's Turing award lecture ("Reflections on Trusting Trust"), showed that compilers can be subverted to insert malicious Trojan horses into critical software, including themselves. If this "trusting trust" attack goes undetected, even complete analysis of a system's source code will not find the malicious code that is running. Previously-known countermeasures have been grossly inadequate. If this attack cannot be countered, attackers can quietly subvert entire classes of computer systems, gaining complete control over financial, infrastructure, military, and/or business systems worldwide. This dissertation's thesis is that the trusting trust attack can be detected and effectively countered using the "Diverse Double-Compiling" (DDC) technique, as demonstrated by (1) a formal proof that DDC can determine if source code and generated executable code correspond, (2) a demonstration of DDC with four compilers (a small C compiler, a small Lisp compiler, a small malic...

  13. The use of dispersants in broken ice

    International Nuclear Information System (INIS)

    The effectiveness of two commercial dispersants in breaking up oil spilled onto a mixture of broken ice and water, were evaluated. Tests were conducted in which a light crude oil was spilled into containment booms which had been frozen into the ice of a salt-water-filled wave tank. Cleaning agents were then added and low amplitude waves were generated for two hours. Spills were dispersed by 90% or better in a short time. Oil in water dispersion was monitored by fluorimetry, by video and still photography. At the end of the experiment, the remaining oil on the water and ice surface was measured. No measurable oil was dispersed into the water column between two moving smooth lead surfaces. It was concluded that it may be possible to disperse spilled oil with chemicals in the northern seas during ice formation and in early spring when the sheet ice is breaking up. 6 refs., 2 tabs., 3 figs

  14. Broken superfluid in dense quark matter

    International Nuclear Information System (INIS)

    Quark matter at high densities is a superfluid. Properties of the superfluid become highly non-trivial if the effects of strange-quark mass and the weak interactions are considered. These properties are relevant for a microscopic description of compact stars. We discuss the effect of a (small) explicitly symmetry-breaking term on the properties of a zero-temperature superfluid in a relativistic φ4 theory. If the U(1) symmetry is exact, chemical potential and superflow can be equivalently introduced either via (1) a background gauge field or (2) a topologically nontrivial mode. However, in the case of the explicitly broken symmetry, we demonstrate that the scenarios (1) and (2) lead to quantitatively different results for the mass of the pseudo-Goldstone mode and the critical velocity for superfluidity.

  15. Effective action of softly broken supersymmetric theories

    International Nuclear Information System (INIS)

    We study the renormalization of (softly) broken supersymmetric theories at the one loop level in detail. We perform this analysis in a superspace approach in which the supersymmetry breaking interactions are parameterized using spurion insertions. We comment on the uniqueness of this parameterization. We compute the one loop renormalization of such theories by calculating superspace vacuum graphs with multiple spurion insertions. To preform this computation efficiently we develop algebraic properties of spurion operators, that naturally arise because the spurions are often surrounded by superspace projection operators. Our results are general apart from the restrictions that higher super covariant derivative terms and some finite effects due to non-commutativity of superfield dependent mass matrices are ignored. One of the soft potentials induces renormalization of the Kaehler potential. (author)

  16. Restoring broken entanglement by injecting separable correlations

    CERN Document Server

    Pirandola, Stefano

    2012-01-01

    The distribution of entanglement is central in many protocols of quantum information and computation. However it is also known to be a very fragile process when loss and noise come into play. The inevitable interaction of the quantum systems with the external environment induces effects of decoherence which may be so strong to destroy any input entanglement, a phenomenon known as "entanglement breaking". Here we study this catastrophic process in a correlated-noise environment showing how the presence of classical-type correlations can restore the distribution of entanglement. In particular, we consider a Gaussian environment whose thermal noise is strong enough to break the entanglement of two bosonic modes of the electromagnetic field. In this scenario, we show that the injection of separable correlations from the same environment is able to reactivate the broken entanglement. This paradoxical effect happens both in schemes of direct distribution, where a third party (Charlie) broadcasts entangled states to...

  17. Modified broken rice starch as fat substitute in sausages

    Directory of Open Access Journals (Sweden)

    Valéria Maria Limberger

    2011-09-01

    Full Text Available The demand for low-fat beef products has led the food industry to use fat substitutes such as modified starch. About 14% of broken rice is generated during processing. Nevertheless, this by-product contains high levels of starch; being therefore, great raw material for fat substitution. This study evaluated the applicability of chemically and physically modified broken rice starch as fat substitute in sausages. Extruded and phosphorylated broken rice was used in low-fat sausage formulation. All low-fat sausages presented about 55% reduction in the fat content and around 28% reduction in the total caloric value. Fat replacement with phosphorylated and extruded broken rice starch increased the texture acceptability of low-fat sausages, when compared to low-fat sausages with no modified broken rice. Results suggest that modified broken rice can be used as fat substitute in sausage formulations, yielding lower caloric value products with acceptable sensory characteristics.

  18. International Trust and Public Diplomacy

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    Countries struggle to find ways to be perceived as trustworthy by people around the world because trust is linked to efficiency, business opportunities and political influence. Social trust is also important for democracy to function. A central concept in this paper is International Trust...... Council’s strategy for trust-building in China (2012); Russian President Vladimir Putin’s letter in The New York Times (2013), and the USA’s trust-building effort in Turkey (from 2006). The best results have been obtained where Public Diplomacy has been linked to successful traditional diplomacy at state...... for a Public Diplomacy initiative to succeed. From a social responsible perspective journalists may have a role to play in creating international trust, and Public Diplomacy staffs consider it already important...

  19. Optimal Distinctiveness Signals Membership Trust.

    Science.gov (United States)

    Leonardelli, Geoffrey J; Loyd, Denise Lewin

    2016-07-01

    According to optimal distinctiveness theory, sufficiently small minority groups are associated with greater membership trust, even among members otherwise unknown, because the groups are seen as optimally distinctive. This article elaborates on the prediction's motivational and cognitive processes and tests whether sufficiently small minorities (defined by relative size; for example, 20%) are associated with greater membership trust relative to mere minorities (45%), and whether such trust is a function of optimal distinctiveness. Two experiments, examining observers' perceptions of minority and majority groups and using minimal groups and (in Experiment 2) a trust game, revealed greater membership trust in minorities than majorities. In Experiment 2, participants also preferred joining minorities over more powerful majorities. Both effects occurred only when minorities were 20% rather than 45%. In both studies, perceptions of optimal distinctiveness mediated effects. Discussion focuses on the value of relative size and optimal distinctiveness, and when membership trust manifests. PMID:27140657

  20. Capturing Young American Trust in National Databases

    Science.gov (United States)

    Menard, Lauren A.

    2011-01-01

    A pattern of decreasing trusting proportions in each consecutive decade and increasing trusting proportions with age was revealed in data. Although trust levels were lower in younger adults and the 2000s, findings did not support hypotheses of more rapidly falling trust levels or a college degree procuring less trust in the 2000s. A hypothesis of…

  1. Homo Economicus Belief Inhibits Trust

    OpenAIRE

    Ziqiang Xin; Guofang Liu

    2013-01-01

    As a foundational concept in economics, the homo economicus assumption regards humans as rational and self-interested actors. In contrast, trust requires individuals to believe partners' benevolence and unselfishness. Thus, the homo economicus belief may inhibit trust. The present three experiments demonstrated that the direct exposure to homo economicus belief can weaken trust. And economic situations like profit calculation can also activate individuals' homo economicus belief and inhibit t...

  2. Metaphoric Conceptualization of Interpersonal Trust

    OpenAIRE

    Rodrigo Yáñez Gallardo; Jorge Osorio Baeza; Iraide Ibarretxe – Antuñano

    2008-01-01

    Since there is no agreement among researchers on how to conceptualizethe interpersonal trust, we analyzed the metaphoric expressions made by students about trust, identifying the conceptual metaphors, the most frequent dimensions of interpersonal trust that are the most frequent ones in these expressions, and establishing the possible relations among those dimensions. A survey was carried out on 61 students from Psychology and Nursery Departments. 124 metaphoric expressions related to 17 conc...

  3. Trust, Inequality, and Ethnic Heterogeneity

    OpenAIRE

    Andrew Leigh

    2006-01-01

    Using a large Australian social survey, combined with precise data on neighbourhood characteristics, I explore the factors that affect trust at a local level (‘localised trust’) and at a national level (‘generalised trust’). Trust is positively associated with the respondent’s education, and negatively associated with the amount of time spent commuting. At a neighbourhood level, trust is higher in affluent areas, and lower in ethnically and linguistically heterogeneous communities, with the e...

  4. Employee Trust and Workplace Performance

    OpenAIRE

    Brown, S.; McHardy, J; Taylor, K

    2013-01-01

    We explore the relationship between employee trust and workplace performance. We present a theoretical framework which serves to establish a link between employee trust and firm performance as well as to identify possible mechanisms through which the relationship may operate. We then analyse matched workplace and employee data in order to ascertain whether the average level of employee trust within the workplace influences workplace performance. We exploit the 2004 and 2011 Work Place and Emp...

  5. Employee trust and workplace performance

    OpenAIRE

    Brown, Sarah; Gray, Daniel; McHardy, Jolian; Taylor, Karl

    2015-01-01

    We explore the relationship between employee trust of managers and workplace performance. We present a theoretical framework which serves to establish a link between employee trust and firm performance as well as to identify possible mechanisms through which the relationship may operate. We then analyse matched workplace and employee data in order to ascertain whether the average level of employee trust within the workplace influences workplace performance. We exploit the 2004 and 2011 Workpl...

  6. Does trust influence consumer behaviour?

    OpenAIRE

    Dierks, Leef H.

    2007-01-01

    Against the background of diverse food scandals this article investigates the role of trust as a determinant of consumer behaviour in Germany. As empirical analyses indicate, the impact of trust on consumer behaviour in a quotidian and presumably safe setting is to be neglected. In the environment of a food scandal, however, trust proves to be a crucial element with regard to a more in-depth understanding of consumer behaviour under uncertainty. Moreover, it is analysed whether different valu...

  7. Trade, Trust and Transaction Cost

    OpenAIRE

    Frank A.G. den Butter; Robert H.J. Mosch

    2003-01-01

    Transaction costs are a major reason why international trade flows are much smaller than traditional trade theory would suggest. Trust between trading partners lowers transaction costs and may therefore enhance trade. The empirical analysis of this paper shows that more trust leads to more trade so that part of the "mystery of missing trade" can be attributed to the lack of trust between trading partners, e.g. because of cultural differences and habits, or because of insufficient information ...

  8. Lesson on Demand. Lesson Plan.

    Science.gov (United States)

    Weaver, Sue

    This lesson plan helps students understand the role consumer demand plays in the market system, i.e., how interactions in the marketplace help determine pricing. Students will participate in an activity that demonstrates the concepts of demand, demand schedule, demand curve, and the law of demand. The lesson plan provides student objectives;…

  9. Trust Propagation in Small Worlds

    DEFF Research Database (Denmark)

    Gray, Elizabeth; Seigneur, Jean-Marc; Chen, Yong; Jensen, Christian D.

    do not scale well. We aim to develop trust-based security mechanisms using small world concepts to optimise formation and propagation of trust amongst entities in these vast networks. In this regard, we surmise that in a very large mobile ad hoc network, trust, risk, and recommendations can be...... propagated through relatively short paths connecting entities. Our work describes the design of trust-formation and risk-assessment systems, as well as that of an entity recognition scheme, within the context of the small world network topology....

  10. Mediating Trust in Terrorism Coverage

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    crisis. While the framework is presented in the context of television coverage of a terror-related crisis situation, it can equally be used in connection with all other forms of mediated trust. Key words: National crisis, risk communication, crisis management, television coverage, mediated trust.......Mass mediated risk communication can contribute to perceptions of threats and fear of “others” and/or to perceptions of trust in fellow citizens and society to overcome problems. This paper outlines a cross-disciplinary holistic framework for research in mediated trust building during an acute...

  11. TEE-Based Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe

    Today, it is safe to assume that any program or data can be compromised, if they are not protected by hardware within a secure area. Systems based on crypto-processors (e.g., a trusted platform module, a smart card or a hardware security module) rely on the properties of tamper resistant hardware...... mainstream trusted storage for personal data. We believe that this role can be taken over by systems equipped with Trusted Execution Environments (TEE), such as ARM’s TrustZone. Indeed, even if TEEs provide weaker security guarantees than crypto-processors, they already provide a secure area on many personal...

  12. Trusting Relationships in International Politics

    DEFF Research Database (Denmark)

    Keating, Vincent Charles; Ruzicka, Jan

    2014-01-01

    How can trusting relationships be identified in international politics? The recent wave of scholarship on trust in International Relations answers this question by looking for one or the combination of three indicators – the incidence of cooperation; discourses expressing trust; or the calculated...... acceptance of vulnerability. These methods are inadequate both theoretically and empirically. Distinguishing between the concepts of trust and confidence, we instead propose an approach that focuses on the actors’ hedging strategies. We argue that actors either declining to adopt or removing hedging...

  13. Designing High-Trust Organizations

    DEFF Research Database (Denmark)

    Jagd, Søren

    The specific problem considered in this paper is what are the key issues to consider for managers involved in designing high-trust organizations, a design problem still not properly explored. This paper intends to take the first step in filling this lacuna. In the paper, I first present the...... existing management and research literature on building high-trust organizations. Then I explore Alan Fox’s (1974) analysis of low-trust vs. high-trust dynamics which, I argue, may serve as a theoretically stronger basis for understanding the issues management have to consider when designing hightrust...

  14. The Need to Trust and to Trust More Wisely in Academe

    Science.gov (United States)

    Bowman, Richard F.

    2012-01-01

    Where trust is an issue, there is no trust. Trust in diverse organizations has never been lower. A shadow of doubt stalks one's every decision to trust collegially and institutionally. Still, colleagues sense intuitively that institutions cannot function optimally without a bedrock level of trust. In academic life, trust is a form of social…

  15. The Heritage Trust Model

    Czech Academy of Sciences Publication Activity Database

    Špánek, Roman; Tyl, Pavel

    Berlin: Springer, 2011 - (Cherifi, H.; Zain, J.; El-Qawasmeh, E.), s. 307-321. (Communications in Computer and Information Science. 167). ISBN 978-3-642-22026-5. ISSN 1865-0929. [DICTAP 2011. International Conference on Digital Information and Communication Technology and Its Applications. Dijon (FR), 21.06.2011-23.06.2011] R&D Projects: GA ČR GAP202/10/0761 Grant ostatní: ČVUT(CZ) SGS 2011/7821 Institutional research plan: CEZ:AV0Z10300504 Keywords : trust * reputation * ontology * dynamic graph Subject RIV: IN - Informatics, Computer Science

  16. In archiving we trust

    OpenAIRE

    Seadle, Michael; Greifeneder, Elke

    2008-01-01

    If 25 specialists in preserving scholarly information had sat together in June of 1907 at the University of Berlin on Unter den Linden (Humboldt–Universität zu Berlin), they could likely have agreed that materials stored in the libraries of one of the world’s great research universities in the capitol of the richest and most powerful state in Europe could reasonably be trusted to survive long term. One hundred years later, after the events of the twentieth century had assaulted the collection...

  17. Trust for intelligent recommendation

    CERN Document Server

    Bhuiyan, Touhid

    2013-01-01

    Recommender systems are one of the recent inventions to deal with the ever-growing information overload in relation to the selection of goods and services in a global economy. Collaborative Filtering (CF) is one of the most popular techniques in recommender systems. The CF recommends items to a target user based on the preferences of a set of similar users known as the neighbors, generated from a database made up of the preferences of past users. In the absence of these ratings, trust between the users could be used to choose the neighbor for recommendation making. Better recommendations can b

  18. Pricing and Trust

    DEFF Research Database (Denmark)

    Huck, Steffen; Ruchala, Gabriele K.; Tyran, Jean-Robert

    We experimentally examine the effects of flexible and fixed prices in markets for experience goods in which demand is driven by trust. With flexible prices, we observe low prices and high quality in competitive (oligopolistic) markets, and high prices coupled with low quality in non......-competitive (monopolistic) markets. We then introduce a regulated intermediate price above the oligopoly price and below the monopoly price. The effect in monopolies is more or less in line with standard intuition. As price falls volume increases and so does quality, such that overall efficiency is raised by 50%. However...

  19. Generalized Trust and Trust in Institutions in Confucian Asia

    Science.gov (United States)

    Tan, Soo Jiuan; Tambyah, Siok Kuan

    2011-01-01

    This study examines generalized trust and trust in institutions in Confucian Asia, covering six countries namely, China, Japan, Singapore, South Korea, Taiwan and Vietnam, and one dependent region, Hong Kong. Using data from the 2006 AsiaBarometer Survey, our study affirms the reliability and validity of using a two-item scale to measure…

  20. Trust beyond reputation: A computational trust model based on stereotypes

    CERN Document Server

    Liu, Xin; Rzadca, Krzysztof

    2011-01-01

    Trust plays important roles in diverse, large scale, open environments. Computational trust models help to, for instance, guide users' judgements in online auction sites about other users; or determine quality of contributions in web 2.0 sites. Most existing trust models, however, require historical information about past behavior of a specific agent in question -- information that is not always available. In contrast, in real life interactions, in order to make the first guess about the trustworthiness of a stranger, we commonly use our "instinct" -- essentially stereotypes developed from our past interactions with "similar" other people. In this paper, we propose StereoTrust, a computational trust model inspired by use of stereotypes in real life. A stereotype contains certain features of agents and an expected outcome of the transaction. These features can be taken from the agents' profile information, or the agents' observed behavior. When facing a stranger, the stereotypes matching stranger's profile are...

  1. Dynamics, robustness and fragility of trust

    CERN Document Server

    Pavlovic, Dusko

    2008-01-01

    Trust is often conveyed through delegation, or through recommendation. This makes the trust authorities, who process and publish the trust recommendations, into an attractive target for attacks and spoofing. In some recent empiric studies, this was shown to lead to a remarkable phenomenon of *adverse selection*: a greater percentage of unreliable or malicious web merchants were found among those with certain types of trust certificates, then among those without. While such findings can be attributed to a lack of diligence in trust authorities, or even to conflicts of interest, our analysis of trust dynamics suggests that the public trust networks would probably remain vulnerable even if the trust authorities were perfectly diligent. The reason is that the main processes of trust building, under reasonable modeling assumptions, naturally lead to power-law distributions of trust: the rich get richer, the trusted attract more trust. The evolutionary processes governed by such distributions, ubiquitous in nature,...

  2. An intercultural concept of trust in management

    OpenAIRE

    Rittenhofer, Iris

    2012-01-01

    The proposed paper takes outset in the findings of a research review on trust in management literature (Rittenhofer 2012) conducted within a transdisciplinary research project MULTI-TRUST. The paper takes outset in the following findings: there is no consensus on trust in management research; the creation and maintenance of trust is seriously underresearched; trust research on the role of culture is only emerging; trust is seriously under-theorized; an interdisciplinary conceptualization of t...

  3. Towards a Formal Notion of Trust

    DEFF Research Database (Denmark)

    Nielsen, Mogens; Krukow, Karl Kristian

    2003-01-01

    Trust management systems have been proposed as an alternative to traditional security mechanisms in Global Computing. We present some challenges in establishing a formal foundation for the notion of trust, and some preliminary ideas towards a category of trust models.......Trust management systems have been proposed as an alternative to traditional security mechanisms in Global Computing. We present some challenges in establishing a formal foundation for the notion of trust, and some preliminary ideas towards a category of trust models....

  4. Gluons as Goldstone Bosons when Flavor Symmetry is Broken Spontaneously

    CERN Document Server

    Törnqvist, N A

    1997-01-01

    The mechanism where flavor symmetry is broken spontaneously is discussed within a scalar QCD model with effective three-meson couplings. For sufficiently large coupling the model is unstable with respect to quantum loops from mesonic vacuum polarization. It is argued that color and gluons naturally can account for the Goldstone degrees of freedom expected when flavor symmetry is spontaneously broken.

  5. Planck driven by vision, broken by war

    CERN Document Server

    Brown, Brandon R

    2015-01-01

    Planck's Law, an equation used by physicists to determine the radiation leaking from any object in the universe, was described by Albert Einstein as "the basis of all twentieth-century physics." Max Planck is credited with being the father of quantum theory, and his work laid the foundation for our modern understanding of matter and energetic processes. But Planck's story is not well known, especially in the United States. A German physicist working during the first half of the twentieth century, his library, personal journals, notebooks, and letters were all destroyed with his home in World War II. What remains, other than his contributions to science, are handwritten letters in German shorthand, and tributes from other scientists of the time, including his close friend Albert Einstein. In Planck: Driven by Vision, Broken by War, Brandon R. Brown interweaves the voices and writings of Planck, his family, and his contemporaries-with many passages appearing in English for the first time-to create a portrait of...

  6. Trust and New Communication Technologies

    DEFF Research Database (Denmark)

    Ess, Charles

    2010-01-01

    I approach philosophical analyses of the phenomenon of trust vis-à-vis online communication, beginning with an overview from within the framework of computer-mediated communication (CMC) of concerns and paradigmatic failures of trust in the history of online communication. I turn to more directly...

  7. TRUST – A LEADERSHIP SKILL

    OpenAIRE

    Anca Tutulea

    2010-01-01

    In these difficult, dramatic days, everyone is looking for a something to hold on. Some are looking for family support, others are looking for colleague’s assistance and others can even seek confidence on their job leaders. All these searching are based on trust gained. People are running where they find trust, honesty and solutions to their problems.

  8. Trust and Financial Crisis Experiences

    NARCIS (Netherlands)

    van der Cruijsen, Carin; de Haan, Jakob; Jansen, David-Jan

    2016-01-01

    Using eight annual household surveys for the Netherlands between 2006 and 2013, we find that respondents' personal adverse financial crisis experiences do not only reduce their trust in banks, but also have an immediate negative effect on generalized trust. Respondents who were customers of a bank t

  9. Towards Trust Engineering for Opportunistic Cloud Services

    DEFF Research Database (Denmark)

    Kuada, Eric

    2014-01-01

    The systematic review methodology has been employed to review trust related studies in cloud computing. It was observed that trusted computing technologies and reputation based approaches are the main approaches to trust engineering in cloud computing. Also, trusted third party approaches and the...... deployment model play a significant role in enhancing trust between service providers and consumers. It was observed that the concept of trust is used loosely without any formal specification in cloud computing discussions and trust engineering in general. As a first step towards addressing this problem, we...... have contextualized the formal trust specification in multi-agent environments for cloud computing....

  10. Trust and Sensemaking in Organizations

    DEFF Research Database (Denmark)

    Fuglsang, Lars; Jagd, Søren; Olsen, Poul Bitsch

    The literature on trust and the literature on sensemaking constitute two separate streams of literature that are both seen as highly relevant to understanding organisational processes in modern complex high-trust organisations. However, though a few studies have argued for the relevance of linking...... the two streams of literature (Meyerson et al. 1996; Adobor 2005; Wright and Ehnert 2006), no explicit attempts have until now been made to analyse how these two perspectives may be related. This paper argues that sensemaking can be seen as an endogenous perspective on organizational processes that...... can help furthering the understanding of trust processes in organizations. The variety of links between sensemaking and trust processes is illustrated by the intertwining of trust and four processes of sensemaking: arguing, expecting, committing and manipulation identified by Karl Weick....

  11. The Business of Trust.

    Science.gov (United States)

    Frisse, Mark E

    2016-04-01

    New mobile devices, social networks, analytics, and communications technologies are emerging at an unparalleled rate. As a result, academic health centers will face both new opportunities and formidable challenges. Unlike previous transitions from paper-based systems to networked computer systems, these new technologies are the product of new entrepreneurial and commercial interests driven by consumers. As these new commercial products and services are more widely adopted, the likelihood grows that data will be used in unanticipated ways inconsistent with societal norms. Academic health centers will have to understand the implications of these technologies and engage more actively in processes governing the collection, aggregation, and use of health data produced in a new era of consumer-driven health care technology. Maintaining public trust should be a paramount concern. PMID:26630611

  12. International trust and public diplomacy

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    2015-01-01

    National leaders struggle to communicate in ways that are perceived as trustworthy by citizens of other nations because trust is linked to efficiency, business opportunities, and political influence. In this article, four recent public diplomacy activities are analyzed from a trust-building persp......National leaders struggle to communicate in ways that are perceived as trustworthy by citizens of other nations because trust is linked to efficiency, business opportunities, and political influence. In this article, four recent public diplomacy activities are analyzed from a trust......-building perspective: Iranian President Hassan Rouhani's letter in The Washington Post, The British Council's strategy for trust building in China, Russian President Vladimir V. Putin's letter in The New York Times, and the USA's trust-building effort in Turkey. The analyses are based on already publicized...... descriptions of public diplomacy activities, public polls, and scholarly literature. Public diplomacy ideas discussed include lightshow, hand-on cooperation, win-win projects, and the creation of frameworks for self-expression. A central concept is international trust as described by Brewer, Gross, Aday...

  13. International trust and public diplomacy

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    2015-01-01

    National leaders struggle to communicate in ways that are perceived as trustworthy by citizens of other nations because trust is linked to efficiency, business opportunities, and political influence. In this article, four recent public diplomacy activities are analyzed from a trust-building persp......National leaders struggle to communicate in ways that are perceived as trustworthy by citizens of other nations because trust is linked to efficiency, business opportunities, and political influence. In this article, four recent public diplomacy activities are analyzed from a trust......-building perspective: Iranian President Hassan Rouhani's letter in The Washington Post, The British Council's strategy for trust building in China, Russian President Vladimir V. Putin's letter in The New York Times, and the USA's trust-building effort in Turkey. The analyses are based on already publicized...... descriptions of public diplomacy activities, public polls, and scholarly literature. Public diplomacy ideas discussed include lightshow, hand-on cooperation, win-win projects, and the creation of frameworks for self-expression. A central concept is international trust as described by Brewer, Gross, Aday, and...

  14. Trust management in cloud services

    CERN Document Server

    Noor, Talal H; Bouguettaya, Athman

    2014-01-01

    This book describes the design and implementation of Cloud Armor, a novel approach for credibility-based trust management and automatic discovery of cloud services in distributed and highly dynamic environments. This book also helps cloud users to understand the difficulties of establishing trust in cloud computing and the best criteria for selecting a service cloud. The techniques have been validated by a prototype system implementation and experimental studies using a collection of real world trust feedbacks on cloud services.The authors present the design and implementation of a novel pro

  15. A Libertarian Analysis of “BrokenWindow” Policing

    OpenAIRE

    Block, Walter

    2015-01-01

    Abstract. “Broken window” policing refers to the practice of stopping small relatively unimportant crimes (windows broken by hooligans) so that more serious ones will decrease. If the windows are allowed to be broken, criminals will get the message there is little or nothing to stop them from breaking more serious laws. The present paper looks at this practice from a libertarian point of view, and finds some of it justified, some of it not.Keywords. Libertarianism, Crime, Safety, Policing.JEL...

  16. 77 FR 39143 - Executive Branch Qualified Trusts

    Science.gov (United States)

    2012-07-02

    ... trust arrangements and preserve confidence in the Federal qualified trust program. Accordingly, under... communications and preserve confidence in the Federal qualified trust program. Accordingly, under its authority... qualified trust. An interested party may put most types of assets (such as cash, stocks, bonds, mutual...

  17. A Formal Model for Trust Lifecycle Management

    DEFF Research Database (Denmark)

    Wagealla, Waleed; Carbone, Marco; English, Colin;

    2003-01-01

    We propose a formal model of trust informed by the Global Computing scenario and focusing on the aspects of trust formation, evolution, and propagation. The model is based on a novel notion of trust structures which, building on concepts from trust management and domain theory, feature at the same...

  18. The Relationship between Teamwork and Organizational Trust

    Directory of Open Access Journals (Sweden)

    Musab Işık

    2015-04-01

    Full Text Available The aim of this study is to investigate the relationship between teamwork and organizational trust. In the implementation section the data from the survey of 250 workers is employed in call centers in Erzurum by using relevant statistical methods. Consequently, it is found that there is a positive and significant relationship between teamwork and organizational trust. Thus, the hypothesis of the study is supported as it was expected. Besides, it is found that there are positive and significant relationships between communication, openness to innovation, participation-trust in teamwork and organizational trust, trust in management, trust in co-workers, and trust in workplace.

  19. Lessons Learned

    International Nuclear Information System (INIS)

    The examples of lessons learned comprise an outline of the problems encountered at the nuclear facilities involved. The situations are typical of the difficulties that can arise when planning or implementing a decommissioning project for a small facility. Although the information is not intended to be exhaustive, the reader is encouraged to evaluate the applicability of the lessons learned to a specific decommissioning project. The general categories of problem and the relevant section in which they are discussed are shown. One should also note that in almost all cases the lack/inadequacy of construction or operational records contributed to the seriousness of the reported occurrences.

  20. Trust Propagation in Small Worlds

    DEFF Research Database (Denmark)

    Gray, Elizabeth; Seigneur, Jean-Marc; Chen, Yong;

    2003-01-01

    do not scale well. We aim to develop trust-based security mechanisms using small world concepts to optimise formation and propagation of trust amongst entities in these vast networks. In this regard, we surmise that in a very large mobile ad hoc network, trust, risk, and recommendations can be...... propagated through relatively short paths connecting entities. Our work describes the design of trust-formation and risk-assessment systems, as well as that of an entity recognition scheme, within the context of the small world network topology.......The possibility of a massive, networked infrastructure of diverse entities partaking in collaborative applications with each other increases more and more with the proliferation of mobile devices and the development of ad hoc networking technologies. In this context, traditional security measures...

  1. Public and Conservation Trust Lands

    Data.gov (United States)

    California Department of Resources — A 1:100,000 polygon features class representing public, conservation and trust land ownership in the state of California. Developed for the California Resources...

  2. A Note on a Broken-Cycle Theorem for Hypergraphs

    Directory of Open Access Journals (Sweden)

    Trinks Martin

    2014-08-01

    Full Text Available Whitney’s Broken-cycle Theorem states the chromatic polynomial of a graph as a sum over special edge subsets. We give a definition of cycles in hypergraphs that preserves the statement of the theorem there

  3. The Process Perspective on Trust in Organizations

    DEFF Research Database (Denmark)

    Jagd, Søren

    Several trust researchers have pointed to the relevance of the process perspective for understanding trust in organizations. In this paper I review the attempts to apply the process perspective in trust research distinguishing between a soft and a strong process perspective. It appears that nearl...... perspective in particular may be important and interesting way ahead for trust research opening up for an understanding of the micro-processes that constitutes trust and trustworthiness....

  4. Trust, distrust and the paradox of democracy

    OpenAIRE

    Sztompka, Piotr

    1997-01-01

    According to the three-dimensional theory of trust which the author develops in his recent work, the measure of trust that people vest on their fellow citizens or institutions depends on three factors: the reflected trustworthiness as estimated by themselves in more or less rational manner, the attitude of basic trustfulness deriving from socialization, and the culture of trust pervading their society and normatively constraining for each member. The culture of trust is shaped by historical e...

  5. Trust, dependence and interorganizational systems

    OpenAIRE

    Ibrahim, M.K.M.

    2006-01-01

    Organizations form interorganizational relationships and utilize information technology to improve performance. This thesis discusses the influences of dependence and different types of trust on the use of interorganizational systems and subsequently the attainment of strategic benefits. The findings indicate that dependence can influence efforts of individuals, internal business-processes and knowledge repositories. The findings also indicate that when trust is based on perceptions of compet...

  6. Elastoconductivity as a probe of broken mirror symmetries

    OpenAIRE

    Hlobil, Patrik; Maharaj, Akash V.; Hosur, Pavan; Shapiro, M. C.; Fisher, I. R.; Raghu, S.

    2015-01-01

    We propose the possible detection of broken mirror symmetries in correlated two-dimensional materials by elastotransport measurements. Using linear response theory we calculate the shearconductivity $\\Gamma_{xx,xy}$, defined as the linear change of the longitudinal conductivity $\\sigma_{xx}$ due to a shear strain $\\epsilon_{xy}$. This quantity can only be non-vanishing when in-plane mirror symmetries are broken and we discuss how candidate states in the cuprate pseudogap regime (e.g. various ...

  7. Broken Images : Eliot, Lorca, Neruda and the discontinuity of Modernism

    OpenAIRE

    Young, Howard T.

    1998-01-01

    T. S. Eliot's powerful trope in The Waste Land ("a heap of broken images"), which may derive in part from Tennyson's Idylls of the King, has overflowed into Lorca's Poeta en Nueva York and Neruda's Residencia en la tierra. What these three poets see while "walking around" is the detritus of urban life, broken and abandoned objects. With values fractured and icons turned into shards, Eliot's image relates as well to the discontinuity that underlines many examples of modern...

  8. Trust and Online Reputation Systems

    Science.gov (United States)

    Kwan, Ming; Ramachandran, Deepak

    Web 2.0 technologies provide organizations with unprecedented opportunities to expand and solidify relationships with their customers, partners, and employees—while empowering firms to define entirely new business models focused on sharing information in online collaborative environments. Yet, in and of themselves, these technologies cannot ensure productive online interactions. Leading enterprises that are experimenting with social networks and online communities are already discovering this fact and along with it, the importance of establishing trust as the foundation for online collaboration and transactions. Just as today's consumers must feel secure to bank, exchange personal information and purchase products and services online; participants in Web 2.0 initiatives will only accept the higher levels of risk and exposure inherent in e-commerce and Web collaboration in an environment of trust. Indeed, only by attending to the need to cultivate online trust with customers, partners and employees will enterprises ever fully exploit the expanded business potential posed by Web 2.0. But developing online trust is no easy feat. While various preliminary attempts have occurred, no definitive model for establishing or measuring it has yet been established. To that end, nGenera has identified three, distinct dimensions of online trust: reputation (quantitative-based); relationship (qualitative-based) and process (system-based). When considered together, they form a valuable model for understanding online trust and a toolbox for cultivating it to support Web 2.0 initiatives.

  9. Trusted counsellor retires

    CERN Multimedia

    2006-01-01

    His astute counsel, knowing smile and distinguished eloquence will be missed by many. With a pang of regret, the man himself admits that 'CERN was like a drug for me'. Last week, Jean-Daniel Mandica retired, after 40 years of loyal service. He was the trusted counsellor of every Director of the Administration and Director-General for eighteen years, from 1986 to 2003. Head of the planning unit for the Directorate and the Administration from 1986 to 1996, he was then named Head of the Directorate Services Unit in 1996, a position he held until the end of 2003. Throughout that time, he conducted key tasks for the Organization, such as restructuring the Administration and carrying out audits. His role in the creation of Microcosm and his commitment to CERN's participation in the Universal Exposition at Seville in 1992 contributed in no small part to the spread of the Laboratory's fame. Jean-Daniel Mandica's incomparable knowledge of the Administration, sense of diplomacy and great ability to listen made him a v...

  10. Broken Ergodicity in Two-Dimensional Homogeneous Magnetohydrodynamic Turbulence

    Science.gov (United States)

    Shebalin, John V.

    2010-01-01

    Two-dimensional (2-D) homogeneous magnetohydrodynamic (MHD) turbulence has many of the same qualitative features as three-dimensional (3-D) homogeneous MHD turbulence.The se features include several ideal invariants, along with the phenomenon of broken ergodicity. Broken ergodicity appears when certain modes act like random variables with mean values that are large compared to their standard deviations, indicating a coherent structure or dynamo.Recently, the origin of broken ergodicity in 3-D MHD turbulence that is manifest in the lowest wavenumbers was explained. Here, a detailed description of the origins of broken ergodicity in 2-D MHD turbulence is presented. It will be seen that broken ergodicity in ideal 2-D MHD turbulence can be manifest in the lowest wavenumbers of a finite numerical model for certain initial conditions or in the highest wavenumbers for another set of initial conditions.T he origins of broken ergodicity in ideal 2-D homogeneous MHD turbulence are found through an eigen analysis of the covariance matrices of the modal probability density functions.It will also be shown that when the lowest wavenumber magnetic field becomes quasi-stationary, the higher wavenumber modes can propagate as Alfven waves on these almost static large-scale magnetic structures

  11. Building effective partnerships: the role of trust in the Virus Resistant Cassava for Africa project

    Directory of Open Access Journals (Sweden)

    Ezezika Obidimma C

    2012-11-01

    Full Text Available Abstract Background Virus Resistant Cassava for Africa (VIRCA is an agricultural biotechnology public-private partnership (PPP comprising the Donald Danforth Plant Sciences Center (DDPSC, National Agricultural Research Organization (NARO of Uganda and Kenya Agricultural Research Institute (KARI. The project seeks to develop virus-resistant cassava for farmers in Kenya and Uganda. Yet, there is much public skepticism about the use of genetically modified (GM crops and private sector involvement in Africa. This case study sought to understand the role of trust in the VIRCA partnership. Methods We conducted semi-structured, face-to-face interviews to obtain stakeholders’ views on the challenges to, and practices for, building trust in the VIRCA partnership. Interviewee responses, together with relevant documents and articles, were analyzed to generate descriptions of how trust is operationalized in this evolving agbiotech PPP. Data were analyzed based on recurring and emergent themes from the interviewee responses. Results Various factors undermine and build trust in agbiotech PPPs. Individual and institutional enthusiasm and detailed collaborative agreements stipulating partner roles and responsibilities are likely to enhance trust among partners. On the other hand, negative perceptions propagated by international partners about the capacities of African institutions and scientists, coupled with slow regulatory processes in Africa, are likely to be impediments to trust building. Conclusions Based on the findings of this study, we have derived four key lessons. First, differences in the capacity of the partner institutions and individuals should be respected. Second, technical and infrastructural capacity support for regulatory processes in Africa must be built. Third, detailed agreements and open and transparent partner practices during project implementation are necessary to dispel perceptions of inequality among partners. Fourth, institutional

  12. Multiple Trust Model in Online Transaction by Trusted Third Party

    Directory of Open Access Journals (Sweden)

    R. Suganya

    2016-02-01

    Full Text Available the information fortune and the connectivity are provided by the universe of E-commerce over an enormous distance at all time. In an open and distributed environment the buyers or providers will not act in a mutually understood or agreed manner by which the incomplete practices and fraudulent activities happen. So in any online transaction the security and trust are two important factors that are to be considered. In Ecommerce markets the above mentioned problems are criticized as the most important barriers. In order to improve these barriers a trust based third party mechanism is successfully adopted as a self-regulatory system to improve the buyer and seller trust. The online transactions are made very easy now days by E-commerce technologies. Built integrity belief approach (BIB, Support Vector Mechanic approach (SVM and Random Number Generation approach (RNG are the three approaches which are mainly used in this paper for online trust management. The seller and the buyer communication will be handled through the trusted third party. Apart from this a coupon based approach is introduced as an advancement in this paper for providing discount schemes which is helpful in attracting the customer who purchase beyond the threshold level fixed by the seller. Moreover a product review study is integrated in order to reduce the scam reviews in online transactions.

  13. Productive Information System Oriented Trust Chain Scheme

    Directory of Open Access Journals (Sweden)

    Shen Chang-xiang

    2012-09-01

    Full Text Available Productive information system has high-level security requirements, but Trusted Computing Group’s solution of trust chain isn’t competent. After analysis and comparison of two different trust transfer ways, a new trust chain scheme was designed and its architecture was shown. With independent TPCM as a trust root, this scheme combined the advantages of linear and radial transfer. So that stronger cryptographic algorithm could be adopted by TPCM and applications’ trust attenuation decreased a lot. This scheme was described formally by 6 linear temporal logic rules. It was proved that based on these rules, this scheme could transfer trust from trust root to applications. Meanwhile, it could actively report and handle exceptions in trust chain building and system running. Conclusion and future work were given at the end of this manuscript.

  14. Countering Trusting Trust through Diverse Double-Compiling

    CERN Document Server

    Wheeler, David A

    2010-01-01

    An Air Force evaluation of Multics, and Ken Thompson's famous Turing award lecture "Reflections on Trusting Trust," showed that compilers can be subverted to insert malicious Trojan horses into critical software, including themselves. If this attack goes undetected, even complete analysis of a system's source code will not find the malicious code that is running, and methods for detecting this particular attack are not widely known. This paper describes a practical technique, termed diverse double-compiling (DDC), that detects this attack and some compiler defects as well. Simply recompile the source code twice: once with a second (trusted) compiler, and again using the result of the first compilation. If the result is bit-for-bit identical with the untrusted binary, then the source code accurately represents the binary. This technique has been mentioned informally, but its issues and ramifications have not been identified or discussed in a peer-reviewed work, nor has a public demonstration been made. This pa...

  15. Social trust and ionizing radiation

    International Nuclear Information System (INIS)

    The linkages that exist between the environmental risks associated with nuclear energy production (both perceived and real) and the myriad of social and political issues and processes that influence social trust are a current issue in literature, but are not well explored, particularly for the Canadian context. This paper will examine one particular issue and its relationship with social trust: ionizing radiation and public health. Social trust is defined for this paper as including interpersonal trust, but having a much broader focus, extending to public trust in governments, institutions, corporations, and the power elite, and across whole societies. Of particular interest for the nuclear energy issue is how waning social trust may impact the functioning of democratic decision-making processes, particularly those associated with the siting of waste facilities. Social trust is a central issue in the management of environmental risks, particularly those related to high technology; its absence is seen as a major cause of intractable conflict in decisions related to nuclear power generation and waste disposal. Understanding the dynamics of social trust is important if a resolution is to be found to the nuclear waste management debate in Canada, that is, one that involves broad public, or social, support. For instance, what factors cause distrust to emerge, and when distrust emerges, what authorities do members of affected communities seek out for information and support? This paper begins to examine social trust in relation to human health and ionizing radiation, particularly low dose radiation from radioactive wastes resulting from uranium and radium processing activities in Port Hope, Ontario. These activities date back to the 1930s and are of great concern to community members. This paper looks at some of the roots of public concern, for example, scientific uncertainty around whether or not human health is compromised by exposure to low dose ionizing radiation

  16. Learning to trust strangers: an evolutionary perspective

    OpenAIRE

    Courtois, Pierre; Tazdaït, Tarik

    2011-01-01

    What if living in a relatively trustworthy society was sufficient to blindly trust strangers? In this paper we interpret generalized trust as a learning process and analyse the trust game paradox in light of the replicator dynamics. Given that trust inevitably implies doubts about others, we assume incomplete information and study the dynamics of trust in buyer-supplier purchase transactions. Considering a world made of “good” and “bad” suppliers, we show that the trust game admits a unique e...

  17. Trusting the other or taking a chance?

    DEFF Research Database (Denmark)

    Frederiksen, Morten; Heinskou, Marie Bruvik

    2016-01-01

    Theories of modernity and risk society argue that increasing levels of risk fundamentally alter or lower the level of trust in society. In this article we argue that this assumption is based in a fallacious theoretical link between trust and risk. Rather than calculative assessment of risk...... and specific events, trust directs anticipation towards process. First, we outline dominant approaches to trust as a question of actions and uncertainty of outcomes, arguing that these approaches treat trust and chance as interchangeable, conflating the different socio-temporalities within which risk and trust...

  18. Proton-neutron correlations in a broken-pair model

    International Nuclear Information System (INIS)

    In this thesis nuclear-structure calculations are reported which were performed with the broken-pair model. The model which is developed, is an extension of existing broken-pair models in so far that it includes both proton and neutron valence pairs. The relevant formalisms are presented. In contrast to the number-non-conserving model, a proton-neutron broken-pair model is well suited to study the correlations which are produced by the proton-neutron interaction. It is shown that the proton-neutron force has large matrix elements which mix the proton- with neutron broken-pair configurations. This occurs especially for Jsup(PI)=2+ and 3- pairs. This property of the proton-neutron force is used to improve the spectra of single-closed shell nuclei, where particle-hole excitations of the closed shell are a special case of broken-pair configurations. Using Kr and Te isotopes it is demonstrated that the proton-neutron force gives rise to correlated pair structures, which remain remarkably constant with varying nucleon numbers. (Auth.)

  19. Bifurcation and catastrophe of seepage flow system in broken rock

    Institute of Scientific and Technical Information of China (English)

    MIAO Xie-xing; LI Shun-cai; CHEN Zhan-qing

    2009-01-01

    The study of dynamical behavior of water or gas flows in broken rock is a basic research topic among a series of key projects about stability control of the surrounding rocks in mines and the prevention of some disasters such as water inrush or gas outburst and the protection of the groundwater resource. It is of great theoretical and engineering importance in respect of promo-tion of security in mine production and sustainable development of the coal industry. According to the non-Darcy property of seepage flow in broken rock dynamic equations of non-Darcy and non-steady flows in broken rock are established. By dimensionless transformation, the solution diagram of steady-states satisfying the given boundary conditions is obtained. By numerical analysis of low relaxation iteration, the dynamic responses corresponding to the different flow parameters have been obtained. The stability analysis of the steady-states indicate that a saddle-node bifurcaton exists in the seepage flow system of broken rock. Consequently, using catastrophe theory, the fold catastrophe model of seepage flow instability has been obtained. As a result, the bifurcation curves of the seepage flow systems with different control parameters are presented and the standard potential function is also given with respect to the generalized state variable for the fold catastrophe of a dynamic system of seepage flow in broken rock.

  20. Tyco senior vice president to speak on restoring trust in corporate world

    OpenAIRE

    Ho, Sookhan

    2005-01-01

    Eric M. Pillmore, senior vice president of corporate governance at Tyco International, will be the guest speaker at the 15th annual Conference on Business Ethics organized by the Department of Management in the Pamplin College of Business. Pillmore's talk at 7 p.m. on Monday, April 25, in Burruss Auditorium, is titled: "Tyco: restoring trust in the corporate world and related lessons learned." No tickets are necessary for the event, which is free and open to the public.

  1. Trust in Government: A Note from Nigeria

    Directory of Open Access Journals (Sweden)

    Iroghama Paul Iroghama

    2012-06-01

    Full Text Available The relationship between trust in government and factors that accounts for Nigerians citizen trust in their government has been of interest due a dearth of literature on such issue. This study is an attempt to bridge the gap from a public policy perspective. One of the measures usually used in the literature to measure trust or distrust in government is perception of corruption, but there are other yardsticks with which to measure determinant of trust in government, such as economic performance or political participation. This study used a micro-level analysis of public opinion survey data (question by question to ascertain empirical linkages of political trust within Nigeria. To this end, Afrobarometer survey Round Four conducted in 2008 was used for the analyses. Descriptive statistics provide background information on the sample, while multivariate logistic regression using SPSS were used to model the citizens’ trust for government in Nigeria. This study revealed that political trust or trust in governments in Nigeria stems from a number of factors. These are economy performance, media, interest in public affairs, religious membership, political participation, interpersonal trust, lack of basic needs, and management of corruption. Furthermore, the variables that influence trust in government the most are interpersonal trust and government management of corruption issue. Those that reported interpersonal trust also reported that they have trust for the government. While those that believe the governments are fighting or managing corruption nicely have a tendency to trust in the government. Although this study does not claim to provide all the answer on political trust or trust in governments in Nigeria, its attempt is to bridge gap in the literature on the topic and to assist future research in the area, as nothing exist on the topic as the moment. It is hope the subject will forms a basis upon which further analytical work on political

  2. International Trust and Public Diplomacy

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    described by Brewer, Gross, Aday and Willnat (2004). The paper is based on case studies of five Public Diplomacy activities: Iranian President Hassan Rouhani’s letter in The Washington Post (2013); Denmark’s trust-building effort in Pakistan following the so-called “Muhammad crisis” (from 2010); The British...... Council’s strategy for trust-building in China (2012); Russian President Vladimir Putin’s letter in The New York Times (2013), and the USA’s trust-building effort in Turkey (from 2006). The best results have been obtained where Public Diplomacy has been linked to successful traditional diplomacy at state......-level (Iran) or has created a framework for people-to-people relations (Denmark, UK and USA). A backlash was experienced in the case where a foreign state leader patronized the national leader (Russia). In all cases, respect for people in other countries despite differences in culture seems fundamental for a...

  3. Neutrino mixing: from the broken μ-τ symmetry to the broken Friedberg–Lee symmetry

    International Nuclear Information System (INIS)

    I argue that the observed flavor structures of leptons and quarks might imply the existence of certain flavor symmetries. The latter should be a good starting point to build realistic models towards deeper understanding of the fermion mass spectra and flavor mixing patterns. The μ-τ permutation symmetry serves for such an example to interpret the almost maximal atmospheric neutrino mixing angle (θ23 ~ 45°) and the strongly suppressed CHOOZ neutrino mixing angle (θ13 < 10°). In this talk I like to highlight a new kind of flavor symmetry, the Friedberg–Lee symmetry, for the effective Majorana neutrino mass operator. Luo and I have shown that this symmetry can be broken in an oblique way, such that the lightest neutrino remains massless but an experimentally-favored neutrino mixing pattern is achievable. We get a novel prediction for θ13 in the CP-conserving case: sinθ13 = tanθ12|(1 - tanθ23)/(1 + tanθ23)|. Our scenario can simply be generalized to accommodate CP violation and be combined with the seesaw mechanism. Finally I stress the importance of probing possible effects of μ-τ symmetry breaking either in terrestrial neutrino oscillation experiments or with ultrahigh-energy cosmic neutrino telescopes. (author)

  4. A Longitudianl Study of the Link Between Broken Homes and Criminality.

    Science.gov (United States)

    McCord, Joan

    Possible explanatory theories of the relationship between broken homes and crime include the following: (1) broken homes lead to crimes if there are "catalytic agents"; (2) broken homes lead to crime if these homes fail to provide certain conditions which promote socialization; and (3) broken homes and crime have a common source, but not a causal…

  5. Misunderstanding that the Effective Action is Convex under Broken Symmetry

    CERN Document Server

    Asanuma, Nobu-Hiko

    2016-01-01

    The widespread belief that the effective action is convex and has a flat bottom under broken global symmetry is shown to be wrong. We show spontaneous symmetry breaking necessarily accompanies non-convexity in the effective action for quantum field theory, or in the free energy for statistical mechanics, and clarify the magnitude of non-convexity. For quantum field theory, it is also explicitly proved that translational invariance breaks spontaneously when the system is in the non-convex region, and that different vacua of spontaneously broken symmetry cannot be superposed. As applications of non-convexity, we study the first-order phase transition which happens at the zero field limit of spontaneously broken symmetry, and we propose a simple model of phase coexistence which obeys the Born rule.

  6. Strongly broken Peccei-Quinn symmetry in the early Universe

    Energy Technology Data Exchange (ETDEWEB)

    Takahashi, Fuminobu [Department of Physics, Tohoku University,Sendai, Miyagi 980-8578 (Japan); Kavli IPMU (WPI), TODIAS, The University of Tokyo,Kashiwa, Chiba 277-8583 (Japan); Yamada, Masaki [Kavli IPMU (WPI), TODIAS, The University of Tokyo,Kashiwa, Chiba 277-8583 (Japan); Institute for Cosmic Ray Research, ICRR, The University of Tokyo,Kashiwa, Chiba 277-8582 (Japan)

    2015-10-06

    We consider QCD axion models where the Peccei-Quinn symmetry is badly broken by a larger amount in the past than in the present, in order to avoid the axion isocurvature problem. Specifically we study supersymmetric axion models where the Peccei-Quinn symmetry is dynamically broken by either hidden gauge interactions or the SU(3){sub c} strong interactions whose dynamical scales are temporarily enhanced by the dynamics of flat directions. The former scenario predicts a large amount of self-interacting dark radiation as the hidden gauge symmetry is weakly coupled in the present Universe. We also show that the observed amount of baryon asymmetry can be generated by the QCD axion dynamics via spontaneous baryogenesis. We briefly comment on the case in which the PQ symmetry is broken by a non-minimal coupling to gravity.

  7. Strongly broken Peccei-Quinn symmetry in the early Universe

    CERN Document Server

    Takahashi, Fuminobu

    2015-01-01

    We consider QCD axion models where the Peccei-Quinn symmetry is badly broken by a larger amount in the past than in the present, in order to avoid the axion isocurvature problem. Specifically we study supersymmetric axion models where the Peccei-Quinn symmetry is dynamically broken by either hidden gauge interactions or the $SU(3)_c$ strong interactions whose dynamical scales are temporarily enhanced by the dynamics of flat directions. The former scenario predicts a large amount of self-interacting dark radiation as the hidden gauge symmetry is weakly coupled in the present Universe. We also show that the observed amount of baryon asymmetry can be generated by the QCD axion dynamics via spontaneous baryogenesis. We briefly comment on the case in which the PQ symmetry is broken by a non-minimal coupling to gravity.

  8. Commitment And Trust In International Marketing Relations

    OpenAIRE

    Nes, E B; Solberg, C A

    1999-01-01

    In this working paper, we discuss the influence of national culture and communication on the commitment and trust perceived by exporters towards importers and agents, and indicate the effect of trust and commitment on performance.

  9. Online Health Information: Can You Trust It?

    Science.gov (United States)

    ... and Aging Online Health Information: Can You Trust It? How Do I Find Reliable Health Information Online? ... of the medical news is current. Some of it is not. Choosing which websites to trust is ...

  10. The problem of reggeization in theories with broken global symmetries

    International Nuclear Information System (INIS)

    The problem of reggeization arbitarily broken gauge theories is discussed: in particular, the non-degeneracy of vector meson masses and 'ω-phi' type mixing are taken into account. It is shown that the leading logarithm calculations of high-energy fermion-fermion amplitudes are consistent, up tp 6th perturbative order, with the reggeization of vector mesons in the arbitrary theory with underlying semisimple 'hidden' Lie algebra. In the case of broken symmetries with abelian content and non-trivial mixing there exist trajectories which cannot be associated with any physical vector meson. Simultaneously fixed pole terms appear which cancel contributions of such trajectories at J =1. (Auth.)

  11. Electromagnetic media with Higgs-type spontaneously broken transparency

    International Nuclear Information System (INIS)

    In the framework of standard electrodynamics with linear local response, we construct a model that provides spontaneously broken transparency. The functional dependence of the medium parameter turns out to be of the Higgs type. - Highlights: • We study a class of electrodynamics models endowed with a symmetric-type skewon field. • We describe a spontaneous broken transparence phenomenon in some subclass of these models. • The phenomenon is turned out to be of the Higgs-type known from particle physics. • We construct a simple explicit 1-parametric skewon model and calculate the corresponding dispersion relation

  12. Bayesian Fusion Algorithm for Inferring Trust in Wireless Sensor Networks

    OpenAIRE

    Mohammad Momani; Subhash Challa; Rami Alhmouz

    2010-01-01

    This paper introduces a new Bayesian fusion algorithm to combine more than one trust component (data trust and communication trust) to infer the overall trust between nodes. This research work proposes that one trust component is not enough when deciding on whether or not to trust a specific node in a wireless sensor network. This paper discusses and analyses the results from the communication trust component (binary) and the data trust component (continuous) and proves that either component ...

  13. Comparing Local, Collective, and Global Trust Models

    OpenAIRE

    Haydar, Charif; Roussanaly, Azim; Boyer, Anne

    2014-01-01

    —Today, trust modelling is a serious issue on the social web. Social web allows information exchange between anonymous users who have no prior knowledge to each other. The aim of a trust model is to rerank acquired information according to their reliability and the trustworthiness of their author. During the last decade, trust models were proposed to assist the user to state his opinion about the acquired information, and about their sources. We identify three paradigms for trust modelling: t...

  14. A SELF-ADAPTIVE TRUST REGION ALGORITHM

    Institute of Scientific and Technical Information of China (English)

    Long Hei

    2003-01-01

    In this paper we propose a self-adaptive trust region algorithm. The trust region radius is updated at a variable rate according to the ratio between the actual reduction and the predicted reduction of the objective function, rather than by simply enlarging or reducing the original trust region radius at a constant rate. We show that this new algorithm preserves the strong convergence property of traditional trust region methods. Numerical results are also presented.

  15. Trust Strategies for the Semantic Web

    OpenAIRE

    O'Hara, Kieron; Alani, Harith; Kalfoglou, Yannis; Shadbolt, Nigel

    2004-01-01

    Everyone agrees on the importance of enabling trust on the SemanticWeb to ensure more efficient agent interaction. Current research on trust seems to focus on developing computational models, semantic representations, inference techniques, etc. However, little attention has been given to the plausible trust strategies or tactics that an agent can follow when interacting with other agents on the Semantic Web. In this paper we identify five most common strategies of trust and discuss their envi...

  16. Trusted Cloud Platform for Cloud Infrastructure

    OpenAIRE

    Punit Gupta; Deepika Agrawal

    2013-01-01

    Reliability and trust Models are used to enhance secure , reliable scheduling , load balancing and QoS in cloud and Distributed environment. Trust models that are being used in Distributed and Grid environment, does not qualify cloud computing environment requirements. Since the parameters that have being taken into consideration in these trust models, does not fit in the cloud Infrastructure As A Service, a suitable trust model is proposed based on the existing model that is suitable for tru...

  17. Beyond Rule; Trust and Power as Capacities

    DEFF Research Database (Denmark)

    Raffnsøe, Sverre

    2013-01-01

    Taking an approach that avoids comprehending power and trust as entities to be studied apart, the article insists on elucidating trust and power as they are enacted in their intimate and delicate relationship to each other and to other human and social phenomena of similar importance, such as...... trusting as an exercise of power and an anticipatory affect. Trust is a resolve to bear an experienced risk by confiding in the new and unknown....

  18. On the deployment of Mobile Trusted Modules

    OpenAIRE

    Schmidt, Andreas U.; Kuntze, Nicolai; Kasper, Michael

    2007-01-01

    In its recently published TCG Mobile Reference Architecture, the TCG Mobile Phone Work Group specifies a new concept to enable trust into future mobile devices. For this purpose, the TCG devises a trusted mobile platform as a set of trusted engines on behalf of different stakeholders supported by a physical trust-anchor. In this paper, we present our perception on this emerging specification. We propose an approach for the practical design and implementation of this concept and how to deploy ...

  19. Control Is Good, But Trust Is Cheaper

    DEFF Research Database (Denmark)

    Jensen, Keld; Svendsen, Gert Tinggaard

    2014-01-01

    Trust or Control? Trust-Based Management and the Thriving Workplace Lenin once said, “Trust is good, but control is better” – and many a modern manager seems to agree. One sees precious time and resources plowed into paper-pushing, form-filling, and the drafting of voluminous, hyper-detailed cont...

  20. Heuritic Trust in IoT

    DEFF Research Database (Denmark)

    Kaur, Bipjeet; Tange, Henrik

    2015-01-01

    Increasing use of Internet of things in diverse fields has demanding association in security and trust of such services. The trust on the services cannot exist independent. It is greatly depended on the security of system at each layer. In this paper we analyze different existing trust algorithms...

  1. Trust and Relationship Building in Electronic Commerce.

    Science.gov (United States)

    Papadopoulou, Panagiota; Andreou, Andreas; Kanellis, Panagiotis; Martakos, Drakoulis

    2001-01-01

    Discussion of the need for trust in electronic commerce to build customer relationships focuses on a model drawn from established theoretical work on trust and relationship marketing that highlights differences between traditional and electronic commerce. Considers how trust can be built into virtual environments. (Contains 50 references.)…

  2. 17 CFR 300.104 - Trust accounts.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Trust accounts. 300.104... A to Part 285 RULES OF THE SECURITIES INVESTOR PROTECTION CORPORATION Accounts of âseparateâ Customers of Sipc Members § 300.104 Trust accounts. (a) A trust account held with a member shall be deemed...

  3. Toward a generic model of trust for electronic commerce

    NARCIS (Netherlands)

    Tan, YH; Thoen, W

    2000-01-01

    The authors present a generic model of trust for electronic commerce consisting of two basic components, party trust and control trust, based on the concept that trust in a transaction with another party combines trust in the other parry and trust in the control mechanisms that ensure the successful

  4. The Effects of Trust Transference, Mobile Attributes and Enjoyment on Mobile Trust

    Directory of Open Access Journals (Sweden)

    Cristiane Junqueira Giovannini

    2015-01-01

    Full Text Available Trust is essential in building relationships. In mobile commerce, as in electronic commerce, trust is even more valuable given the absence of human contact and direct observation of the service provider. Despite the importance of trust for mobile commerce, there has been little academic effort to study the relationships between mobile devices unique components of interactivity and customer trust, or the relationship between offline, online and mobile trust. This study proposes a trust-mediated model for customer attitude and transaction intentions in mobile commerce contexts that incorporates trust transference and unique factors present in mobile commerce. Data were collected in an online survey and analyzed via structural equations modeling. Results suggest that trust transferred from online contexts and ease of use have significant effects on mobile trust formation, while also indicating that mobile trust influences consumers’ attitudes and intentions to purchase using mobile devices.

  5. Trust enhances IT service management.

    Science.gov (United States)

    2007-08-01

    ITIL process adoption may be a prerequisite for the National Programme for IT (NPfIT), but implementation is far from straightforward. IT services company Plan-Net has been assisting Barts and The London NHS Trust with implementing its ambitious ITIL processes deployment. PMID:17847874

  6. Ombud's Corner: tried and trusted

    CERN Multimedia

    Sudeshna Datta-Cockerill

    2014-01-01

    Trust is an essential ingredient in all working relationships. When trust breaks down, conflicts may arise and teams may stop working in harmony. The Ombud is there to help you to find your way out before the point of no return is reached.   Reliability, integrity, expertise and good will: these are the four pillars on which trust is built. Trust between colleagues may break down for many different reasons, including misunderstandings, and the way to restoring the relationship is through working on these four pillars. For instance, if we assume that we do indeed have the expertise to deal with a particular task assigned to us, we may need to improve our reliability by making sure that we meet deadlines and expectations or demonstrate our integrity by acknowledging and accepting accountability for this, all the while showing that we are doing our best to do whatever it takes to achieve the common goals and restore our colleagues’ faith in us. All four of these pillars need to be in...

  7. A Calculus for Trust Management

    DEFF Research Database (Denmark)

    Carbone, Marco; Nielsen, Mogens; Sassone, Vladimiro

    2004-01-01

    We introduce ctm, a process calculus which embodies a notion of trust for global computing systems. In ctm each principal (location) is equipped with a policy, which determines its legal behaviour, and with a protocol, which allows interactions between principals and the flow of information from ...

  8. Description of the Wellcome Trust

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    @@ Introduction The Wellcome Trust supports research of the highest quality with the aim of improving human and animal health, and our Strategic Plan provides the framework for how we intend to evolve our support to be even more effective in achieving this aim.

  9. Income trusts and limited partnerships

    International Nuclear Information System (INIS)

    This author provided a conceptual overview of income trusts and limited partnerships that are designed to pass operating cash flow directly to investors without the imposition of corporate taxes, discussed the evolution of the market, the mechanism used to price income funds, past and present performance of the sector, and made some predictions concerning the sector's future performance. 13 figs

  10. Trusted Certificates in Quantum Cryptography

    OpenAIRE

    Perkins, William

    2006-01-01

    This paper analyzes the performance of Kak's three stage quantum cryptographic protocol based on public key cryptography against a man-in-the-middle attack. A method for protecting against such an attack is presented using certificates distributed by a trusted third party.

  11. The Effects of Trust Transference, Mobile Attributes and Enjoyment on Mobile Trust

    OpenAIRE

    Cristiane Junqueira Giovannini; Jorge Brantes Ferreira; Jorge Ferreira da Silva; Daniel Brantes Ferreira

    2015-01-01

    Trust is essential in building relationships. In mobile commerce, as in electronic commerce, trust is even more valuable given the absence of human contact and direct observation of the service provider. Despite the importance of trust for mobile commerce, there has been little academic effort to study the relationships between mobile devices unique components of interactivity and customer trust, or the relationship between offline, online and mobile trust. This study proposes a t...

  12. Unpacking Professional Trust – Dimensions of Trust in Swedish Auditors' Client Relations

    OpenAIRE

    Bengt Larsson

    2007-01-01

    This paper studies client trust in professionals, theoretically and empirically. The theoretical elaboration, founded on general sociological theories of trust, aims to distinguish different dimensions of trust – personal, impersonal, and process trust – and to explicate the stabilizing identities and control mechanisms on which they are based: persons, roles, programs and values. The empirical case study concerns what aspects of trust, and what expectations and controls, are most importa...

  13. Lesson Learning at JPL

    Science.gov (United States)

    Oberhettinger, David

    2011-01-01

    A lessons learned system is a hallmark of a mature engineering organization A formal lessons learned process can help assure that valuable lessons get written and published, that they are well-written, and that the essential information is "infused" into institutional practice. Requires high-level institutional commitment, and everyone's participation in gathering, disseminating, and using the lessons

  14. Lessons learnt from the organ retention controversy

    International Nuclear Information System (INIS)

    This paper examines the lessons to be learnt from the organ retention controversy in the Republic of Ireland. The paper emphasises the importance of good communication between clinicians and families of deceased persons and a move away from a medical culture based on paternalism to a partnership approach between clinicians and patients based on mutual trust and understanding. A model of authorisation rather than consent is proposed as the way forward for dealing with the difficult and traumatic experience of asking families for permission to carry out a post mortem examination on their deceased child. (authors)

  15. Analysis of broken rotor bars in large induction motors

    OpenAIRE

    Cleber Gustavo Dias; Ivan Eduardo Chabu

    2006-01-01

    A new technique to detect broken rotor bars, in large squirrelcage induction motors is presented. In order to avoid problems in industrial applications, the electromagnetic behavior of induction machines with rotor faults was examined, by using a mathematical model. Simulation results are presented from the model implemented in the Simulink-Matlab. Experimental results are presented in order to validate the proposed method.

  16. Weaving Broken Threads: A Portrait of Artist Phil Young.

    Science.gov (United States)

    Akwe:kon Journal, 1993

    1993-01-01

    The artwork of Phil Young represents his quest to reconnect his identity with the land and with his Cherokee ancestors and thereby "weave broken threads" of his family history back together. Young discusses his training as an artist, the process of creating his artwork, and what his Cherokee heritage means to him. (LP)

  17. PP-waves and softly broken N=1 SYM

    OpenAIRE

    Bigazzi, F.; Cotrone, A. L.

    2004-01-01

    We review the Penrose limit of the Type IIB dual of softly broken N=1 SYM in four dimensions obtained as a deformation of the Maldacena-Nunez background. We extract the string spectrum on the resulting pp-wave background and discuss some properties of the conjectured dual gauge theory hadrons, the so called ``Annulons''.

  18. Fixed points and vacuum energy of dynamically broken gauge theories

    International Nuclear Information System (INIS)

    We show that if a gauge theory with dynamical symmetry breaking has non-trivial fixed points, for values of the coupling constant within the range delimiting the dynamically broken phase, they will correspond to extrema of the vacuum energy. This relationship provides a different method to find fixed points, and we suggest that it can be tested in lattice simulations. (author)

  19. Dynamically broken Anti-de Sitter action for gravity

    OpenAIRE

    Tresguerres, Romualdo

    2008-01-01

    Due to a suitable Higgs mechanism, a standard Anti-de Sitter gauge theory becomes spontaneously broken. The resulting Lorentz invariant gravitational action includes the Hilbert-Einstein term of ordinary Einstein-Cartan gravity with cosmological constant, plus contributions quadratic in curvature and torsion, and a scalar Higgs sector.

  20. Quantum restoration of broken symmetry in onedimensional loop space

    Indian Academy of Sciences (India)

    Pinaki Patra; Tanmay Mandal; Jyoti Prasad Saha

    2014-06-01

    For one-dimensional loop space, a nonlinear nonlocal transformation of fields is given to make the action of the self-interacting quantum field to the free one. A specific type of classically broken symmetry is restored in quantum theory. One-dimensional sine-Gordon system and sech interactions are treated as the explicit examples.

  1. Remanent magnetization model for the broken ridge satellite magnetic anomaly

    Science.gov (United States)

    Johnson, B. D.

    1983-01-01

    A crustal model for the interpretation of the Broken Ridge satellite magnetic anomaly was constructed from bathymetric data assuming an Airy-type isostatic compensation. An average crustal magnetization of 6 A.m is required to account for the observed anomaly amplitudes provided that the whole crust is homogeneously magnetized. In contrast, a model representing only the topographic expression of the Broken Ridge, above the surrounding sea floor, requires a magnetization of the order of 40 A.m-1. Since this latter figure is much higher than is to be expected from studies of magnetic properties of oceanic rocks, it is concluded that the majority of the crustal volume of Broken Ridge is magnetized relatively uniformly. The direction of the source magnetization is consistent with an inclination shallower than the present geomagnetic field and close to that of an axial dipole. Since a more northerly source location for Broken Ridge is contrary to the paleolatitude data it is though that the magnetization represents a magnetization obtained by averaging the geomagnetic field direction over a sufficient time to remove secular variation effects. This pattern is indicative of viscous magnetization.

  2. Toward the differentiation of trust in supervisor and trust in organization.

    Science.gov (United States)

    Tan, H H; Tan, C S

    2000-05-01

    Trust in supervisor and trust in organization are argued to be distinct but related constructs, each with its own set of antecedents and outcomes. Empirical field results supported the proposition. Although trust in supervisor and trust in organization were positively and significantly correlated, trust in supervisor was more strongly associated with proximal variables (ability, benevolence, and integrity of supervisor), whereas trust in organization was more strongly correlated with global variables (perceived organizational support and justice). This conclusion held despite the inclusion of proximal variables in the regression on trust in organization and the inclusion of global variables in the regression on trust in supervisor. In addition to the differential antecedents of trust in supervisor and trust in organization, the outcomes for both variables were different. Trust in supervisor was related to increased innovative behavior and satisfaction with supervisor, and trust in organization was related to higher organizational commitment and lower intention to leave. Therefore, the authors provide clear preliminary data on the distinctiveness of trust in supervisor and trust in organization. One implication of this set of results is that organizations should adopt a more holistic approach in building trust, which can be achieved by focusing on the various constituents of the organization and the various levels (e.g., the supervisor level and the organizational level). PMID:10846623

  3. Trust-Based Leadership in the Making

    DEFF Research Database (Denmark)

    Bentzen, Tina Øllgaard; Jagd, Søren

    I spite of the popularity of trust-based leadership in consultancy and popular management writings empirical research on the transformation from traditional top-down to trust-based leadership is still limited. In this paper we study the implementation of a trust-based leadership reform in the City...... of Copenhagen taking place since 2012. We focus on understanding the trust dynamics in this major transformation. We show that the implementation of trust-based leadership should be seen as an emergent process involving a variety of actors within the organization. The case study reveals that the...

  4. Economic and Other Determinants of Political Trust

    Directory of Open Access Journals (Sweden)

    William R. DiPietro

    2016-01-01

    Full Text Available Political trust is important for the effective functioning of government. This paper uses cross country regression analysis to see whether three different measures of economic performance matter for political trust. The results lend support to the hypothesis that political trust is influenced by economic growth, the standard of living, and the appropriate use of government spending. In addition, the paper considers two institutional variables, perceived independence of the judiciary and the degree of democracy to assess their effect on political trust. It finds that perceived judicial independence has a positive effect on political trust, but democracy has a negative effect.

  5. Exploring trust relationships during times of change

    Directory of Open Access Journals (Sweden)

    Hartmut Von der Ohe

    2010-03-01

    Full Text Available Orientation: In the current economic climate and the resulting fast-changing global business and political environment, trust among different role players in organisations has become critical for survival.Research purpose: The objective of this study was to explore the impact of different variables such as demographics on trust relationships in South African organisations.Motivation for the study: Anecdotal evidence and preliminary data collected for a national trust indicator seemed to suggest a shift in trust levels in organisations.Research design: A trust questionnaire was administered to a convenience sample of 307 respondents in all economic sectors. Parametric and nonparametric analyses were used to determine significant differences among economic sectors, job levels and sample periods.Main findings: No significant differences were found for job levels or the different sample periods. However, significant differences were found for the economic sectors and, specifically, between government participants and other sectors for the dimensions of change, team management, organisational trust, information sharing and credibility.Practical implications: In times of change, leadership in organisations need to be aware of the impact on trust levels. It is therefore important that leaders in government focus more on trust-enhancing behaviours needed to repair mistrust in organisations.Contribution: Although the effect of time on trust levels is inconclusive, the clearly differing levels of trust in various economic sectors point to the importance of appropriate and fitting approaches to building trust and not a ‘one-size-fits-all’ attitude.

  6. Going global: Trust research and international relations

    DEFF Research Database (Denmark)

    Ruzicka, Jan; Keating, Vincent Charles

    2015-01-01

    In this review article we explore the growing body of literature on the subject of trust in the field of international relations. We argue that the international level represents a unique challenge for trust research. This is so because some of the most pressing problems facing the world today...... require the development of trusting relationships internationally. In addition, the international environment is structurally different from domestic or personal relations on which much of the trust literature has focused so far. We identify three main strands of trust literature in international...... relations – rationalist, social and psychological. We not only note the contributions these have made to understanding the role of trust internationally, but also highlight areas where more research is needed. Particularly, we argue that this includes theorising processes of trust...

  7. Using informed consent to save trust.

    Science.gov (United States)

    Eyal, Nir

    2014-07-01

    Increasingly, bioethicists defend informed consent as a safeguard for trust in caretakers and medical institutions.This paper discusses an ‘ideal type’ of that move. What I call the trust-promotion argument for informed consent states:1. Social trust, especially trust in caretakers and medical institutions, is necessary so that, for example,people seek medical advice, comply with it, and participate in medical research.2. Therefore, it is usually wrong to jeopardise that trust.3. Coercion, deception, manipulation and other violations of standard informed consent requirements seriously jeopardise that trust.4. Thus, standard informed consent requirements are justified.This article describes the initial promise of this argument, then identifies challenges to it. As I show, the value of trust fails to account for some common sense intuitions about informed consent. We should revise the argument, common sense morality, or both. PMID:25180355

  8. The Relationship between Teamwork and Organizational Trust

    Directory of Open Access Journals (Sweden)

    Musab Isik

    2016-01-01

    Full Text Available The aim of this study is to investigate the relationship between teamwork and organizational trust. In the implementation section the data from the survey of 250 workers is employed in call centers in Erzurum by using relevant statistical  methods. Consequently, it is found that there is a positive and significant relationship between teamwork and organizational trust. Thus, the hypothesis of the study is supported as it was expected. Besides, it is found that there are positive and significant relationships between communication, openness to innovation, participation-trust in teamwork and organizational trust, trust in management, trust in co-workers, and trust in workplace.

  9. Going global: Trust research and international relations

    DEFF Research Database (Denmark)

    Ruzicka, Jan; Keating, Vincent Charles

    2015-01-01

    In this review article we explore the growing body of literature on the subject of trust in the field of international relations. We argue that the international level represents a unique challenge for trust research. This is so because some of the most pressing problems facing the world today...... require the development of trusting relationships internationally. In addition, the international environment is structurally different from domestic or personal relations on which much of the trust literature has focused so far. We identify three main strands of trust literature in international...... relations – rationalist, social and psychological. We not only note the contributions these have made to understanding the role of trust internationally, but also highlight areas where more research is needed. Particularly, we argue that this includes theorising processes of trust-building, the...

  10. Personalised and Dynamic Trust in Social Networks

    CERN Document Server

    Walter, Frank E; Schweitzer, Frank

    2009-01-01

    We propose a novel trust metric for social networks that is personalised and dynamic. It allows to compute the indirect trust between two agents in a social network which are not neighbours based on the direct trust between agents that are neighbours. In analogy with some personalised versions of PageRank, this metric is based on the notion of feedback centrality and overcomes some of the limitations of other trust metrics. It takes into account all the paths in the graph, including cycles. In particular, it does not neglect the patterns responsible for the high clustering coefficient that characterises social networks, as some other algorithms do. From a mathematical point of view, the resulting expression of indirect trust in terms of the original, direct trust matrix involves only simple linear algebra. We also propose a way to make trust dynamic over time and we show, by means of analytical approximations and computer simulations, that it converges to the desired behaviour.

  11. Trust, Welfare States and Income Equality

    DEFF Research Database (Denmark)

    Bergh, Andreas; Bjørnskov, Christian

    2014-01-01

    The cross-country correlation between social trust and income equality is well documented, but few studies examine the direction of causality. We show theoretically that by facilitating cooperation, trust may lead to more equal outcomes, while the feedback from inequality to trust is ambiguous....... Using a structural equation model estimated on a large country sample, we find that trust has a positive effect on both market and net income equality. Larger welfare states lead to higher net equality but neither net income equality nor welfare state size seems to have a causal effect on trust. We...... conclude that while trust facilitates welfare state policies that may reduce net inequality, this decrease in inequality does not increase trust....

  12. The Volatile Nature of Social Trust

    DEFF Research Database (Denmark)

    Kjærsgård, Andreas Pihl; Anhøj, Anne Iversen

    undertakes. The article conducts a comparative study of the development of social trust in Croatia and Slovenia. In spite these countries’ common Yugoslavian heritage they show a remarkably diversified development in social trust over a rather short timespan (1996-2007). The two cases thus provide good cases...... for examining dynamic or rather short term effects influencing social trust at the aggregated level, which in existing literature is assumed to be rather stable. The article synthesises arguments from existing theory on social trust and claims that the level of social trust could be heavily influenced...... by the development of public sentiment in a given context. The development of social trust in Croatia and Slovenia thus correlate with factors as the sense of trust and corruption among politicians, public officials and public institutions, the general economic and social development in the country...

  13. Multiple Trust Model in Online Transaction by Trusted Third Party

    OpenAIRE

    R Suganya; C. Merlin Pauliester

    2016-01-01

    the information fortune and the connectivity are provided by the universe of E-commerce over an enormous distance at all time. In an open and distributed environment the buyers or providers will not act in a mutually understood or agreed manner by which the incomplete practices and fraudulent activities happen. So in any online transaction the security and trust are two important factors that are to be considered. In Ecommerce markets the above mentioned problems are criticized as the most im...

  14. Exploring the Change from Low-Trust to High-Trust Organizations

    DEFF Research Database (Denmark)

    Jagd, Søren

    and employees. An especially important issue is the trust/self-control nexus. Following this analysis it may be argued that the distinction low versus high-trust is much more complex and involves radical changes in organizational culture and identity than assumed by most management literature on trust......A growing body of literature point to the increasing importance of trust for organizations and for the explicit use of trust as a management tool. The explicit or implicit message in both management literature and research literature on trust as a management tool is that managers should pursue...... what the notion of high-trust organization actually means, and that the change process in the direction of high trust organizations involves not only a quantitative growth in trust, but may involve important qualitative changes in the organization, especially concerning the relations between management...

  15. Dimensionality of trust: An analysis of the relations between propensity, trustworthiness and trust

    Directory of Open Access Journals (Sweden)

    Marita Heyns

    2015-02-01

    Full Text Available Orientation: Research concerning trust relationships on the interpersonal level, particularly when studied in dyadic relationships from the follower’s point of view, is relatively scarce. Only a few researchers have attempted to link multiple dimensions of trust in the same study.Research purpose: This study examined the dynamic interplay between trust propensity, trustworthiness beliefs and the decision to trust, as perceived within dyadic workplace relationships. Motivation for the study: No studies, as far as the authors are aware, have ever attempted to use a combination of Mayer and Davis’s well-known assessment of trustworthiness and Gillespie’s measure of behavioural trust within the same study. By including measures of main antecedents and the actual decision to trust in the same study, the multidimensionality of trust can be established more concretely.Research approach, design and method: A cross-sectional survey design with a convenience sample (N = 539 was used. The Behavioural Trust Inventory and the Organisational Trust Instrument were administered.Main findings: Results confirmed the distinctness of propensity, trustworthiness and trust as separate main constructs. Trust was strongly associated with trustworthiness beliefs. Trustworthiness beliefs fully mediated the relationship between propensity and trust. The observed relations between propensity and trustworthiness suggest that individuals with a natural predisposition to trust others will be more inclined to perceive a specific trust referent as trustworthy.Practical/managerial implications: Leaders should realise that their attitudes and behaviour have a decisive impact on trust formation processes: if they are being perceived as trustworthy, followers will be likely to respond by engaging in trusting behaviours towards them. Tools to assess followers’ perceptions of the trustworthiness of the leader may provide useful feedback that can guide leaders

  16. Trust me, I am Robot!

    DEFF Research Database (Denmark)

    Stoyanova, Angelina; Drefeld, Jonas; Tanev, Stoyan;

    The aim of this paper is to discuss some of the issues regarding the emergence of trust within the context of the interaction between human patients and medical rehabilitation technology based on robot system solutions. The starting assumption of the analysis is that the articulation of the...... emerging trust relationship is a key component of the use value of the robotic system and of the value proposition of the robotic system producers. The study is based on a qualitative research approach combining the phenomenological research paradigm with a grounded theory building approach based on......, 1972). The analysis will use some of the insights of Byzantine philosophy (Kapriev, 2005) regarding the distinction between the terms hypostasis (unique actualization of an essence) and prosopon (persona or person) to suggest a more general notion of interpersonality that could provide some additional...

  17. Viewpoint: Trust and the sociology of the professions

    OpenAIRE

    Groenewegen, Peter P

    2006-01-01

    There is a fast-growing literature on trust in health care, especially interpersonal trust, but also public or institutional trust, reflecting the growing awareness in both the research and policy communities of the importance of trust. At a general level, trust as part of the broader concept of social capital is related to people’s health and wellbeing. Trust within provider-patient relations is important for its non-specific treatment effects. Finally, trust is also important for the smooth...

  18. Parental Divorce and Generalized Trust

    OpenAIRE

    Viitanen, Tarja K.

    2011-01-01

    This paper examines the effect of parental divorce during childhood on generalized trust later on in life using Australian HILDA panel data. The dependent variable is composed of answers to the statement: “Generally speaking, most people can be trusted”. The main explanatory variables include the occurrence of parental divorce for the whole sample and the age at which parents divorced for the sub-sample. The analysis is conducted using random effects ordered probit, correlated random effects ...

  19. Can Audit (still) be Trusted?

    OpenAIRE

    Mueller, Frank; Carter, Chris; Whittle, Andrea

    2015-01-01

    This paper analyses audit as an exemplar of an expert system. The paper explores the premise that systemic trust in audit has been damaged and requires repair, looking specifically at the role of the institutionalised mechanism of the public inquiry. This is examined empirically in relation to the interaction between the Heads of the Big Four accounting firms in the UK and the House of Lords Economic Select Committee in the course of the recent parliamentary investigation into the UK Audit ma...

  20. Trust Assessment Using Cloud Broker

    OpenAIRE

    P S Pawar; Rajarajan, M.; Dimitrakos, T.; Zisman, A.

    2014-01-01

    Despite the advantages and rapid growth of Cloud computing, the cloud environments are still not sufficiently trustworthy from a customer’s perspective. Several challenges such as specification of service level agreements, standards, security measures, selection of service providers and computation of trust still persists, that concerns the customer. To deal with these challenges and provide a trustworthy environment, a mediation layer may be essential. In this paper we propose a cloud broker...

  1. Privacy, Surveillance and Public Trust

    OpenAIRE

    Neyland, D.

    2006-01-01

    Surveillance, privacy and public trust form a burgeoning presence within debates surrounding technological developments, particularly in the current 'war on terror' environment. Social, economic and political issues are invoked in collecting, categorizing, scrutinizing and mobilizing information on the everyday activities of the population. These are implicated in new legislative developments, ways of conceptualizing society and a growth in the industry of protest. However, what do we know ab...

  2. Foundation Trusts: A Retrospective Review

    OpenAIRE

    Chris Bojke; Maria Goddard

    2010-01-01

    There is limited research evidence on foundation trusts (FTs) and much of the available material is in the form of commentary or the regular reports from Monitor. Comparative research is made difficult through lack of a counter-factual and robust methods are required to overcome bias. Summary points from the literature and from some initial analysis of Monitor reports that we have undertaken for this review are given below. Future policy and research issues are highlighted in the main report.

  3. Multilevel Contracts for Trusted Components

    Directory of Open Access Journals (Sweden)

    Mohamed Messabihi

    2010-10-01

    Full Text Available This article contributes to the design and the verification of trusted components and services. The contracts are declined at several levels to cover then different facets, such as component consistency, compatibility or correctness. The article introduces multilevel contracts and a design+verification process for handling and analysing these contracts in component models. The approach is implemented with the COSTO platform that supports the Kmelia component model. A case study illustrates the overall approach.

  4. Does Interpersonal Trust Influence Organizational Behavior?

    Directory of Open Access Journals (Sweden)

    Aziz BAKAY

    2015-05-01

    Full Text Available This research investigates into interpersonal trust and workplace outcomes in organizations within social exchange perspective. Current study is building upon the theoretical underpinnings of trust studies that pose trust as a psychological state and a social glue. Current research develops a theoretical model of interpersonal trust presuming that different trust objects -namely peers and senior managementhave unique and direct effects on global workplace outcomes: Affective commitment, turnover intention, and job satisfaction. The data was collected via convenience sampling and data consists of 134 professionals working in Turkey. Structural Equation Modeling (SEM using Partial Least Squares (PLS is employed to test our model. Findings suggest that trust in peers and trust in senior management translate into higher affective commitment. Results indicate a positive association between job satisfaction and trust in senior management. Turnover intention however, did not significantly associate with any of the trust variables suggesting the difference between economic exchange and social exchange, which involves reciprocal behaviors. Simultaneous investigation of two trust objects in organizations as well as inclusion of variety of contextual factors bring rigor to the scope of the research and the explanations of workplace outcomes.

  5. Strategies for building trust with farmers: the case of Bt maize in South Africa

    Directory of Open Access Journals (Sweden)

    Ezezika Obidimma C

    2012-11-01

    Full Text Available Abstract Background In 1999, South Africa became the first African country to approve commercial production of subsistence genetically modified (GM maize. The introduction of GM crop technology is often met with skepticism by stakeholders including farmers. The involvement of the private sector in this process can further breed mistrust or misperceptions. To examine these issues more closely, the objective of this case study was to understand the role of trust in the public-private partnership (PPP arrangement involved in the development of Bacillus thuringiensis (Bt maize in South Africa. Methods We conducted semi-structured, face-to-face interviews to obtain stakeholders’ understanding of trust in general as well as in the context of agricultural biotechnology (agbiotech PPPs. A thematic analysis of the interview transcripts, documents, reports and research articles was conducted to generate insights into the challenges to, and practices for, building trust among the partners and with the public. Results The findings of this study are organized into four main lessons on trust building. First, as the end users of GM technology, farmers must be engaged from the start of the project through field demonstrations and educational activities. Second, an effective technology (i.e., the seed is key to the success of an agbiotech PPP. Third, open communication and full disclosure between private sector companies and government regulatory bodies will build trust and facilitate the regulatory processes. Fourth, enforcing good agronomic practices, including appropriate management of the refuge areas, will serve the interests of both the farmers and the seed companies. Conclusions Trust has proven to be a critical factor determining the success of the Bt maize project in South Africa. Distrust of the private sector and of GM technology were cited as major barriers to building trust. The trust-building practices described in this case study have often

  6. Broken detailed balance at mesoscopic scales in active biological systems.

    Science.gov (United States)

    Battle, Christopher; Broedersz, Chase P; Fakhri, Nikta; Geyer, Veikko F; Howard, Jonathon; Schmidt, Christoph F; MacKintosh, Fred C

    2016-04-29

    Systems in thermodynamic equilibrium are not only characterized by time-independent macroscopic properties, but also satisfy the principle of detailed balance in the transitions between microscopic configurations. Living systems function out of equilibrium and are characterized by directed fluxes through chemical states, which violate detailed balance at the molecular scale. Here we introduce a method to probe for broken detailed balance and demonstrate how such nonequilibrium dynamics are manifest at the mesosopic scale. The periodic beating of an isolated flagellum from Chlamydomonas reinhardtii exhibits probability flux in the phase space of shapes. With a model, we show how the breaking of detailed balance can also be quantified in stationary, nonequilibrium stochastic systems in the absence of periodic motion. We further demonstrate such broken detailed balance in the nonperiodic fluctuations of primary cilia of epithelial cells. Our analysis provides a general tool to identify nonequilibrium dynamics in cells and tissues. PMID:27126047

  7. Broken Lorentz symmetry and the dimension of space-time

    International Nuclear Information System (INIS)

    It is shown that the modification of Newton's potential, following from a deviation of the number of spatial dimensions from the integer value of 3, can also be obtained in a usual four-dimensional context, provided that the SO(3, 1) gauge symmetry of gravity is broken. The experimental data on the periastron shifts or orbiting bodies can then be used to obtain a bound on the possible degree of violation of the local Lorentz symmetry on astronomical length scales. (orig.)

  8. Mental Suffering in Protracted Political Conflict: Feeling Broken or Destroyed

    Science.gov (United States)

    Barber, Brian K.; McNeely, Clea A.; Daher, Mahmoud; Giacaman, Rita; Arafat, Cairo; Barnes, William; Abu Mallouh, Mohammed

    2016-01-01

    Purpose This mixed-methods exploratory study identified and then developed and validated a quantitative measure of a new construct of mental suffering in the occupied Palestinian territory: feeling broken or destroyed. Methods Group interviews were conducted in 2011 with 68 Palestinians, most aged 30–40, in the West Bank, East Jerusalem, and the Gaza Strip to discern local definitions of functioning. Interview participants articulated of a type of suffering not captured in existing mental health instruments used in regions of political conflict. In contrast to the specific difficulties measured by depression and PTSD (sleep, appetite, energy, flashbacks, avoidance, etc.), participants elaborated a more existential form of mental suffering: feeling that one’s spirit, morale and/or future was broken or destroyed, and emotional and psychological exhaustion. Participants articulated these feelings when describing the rigors of the political and economic contexts in which they live. We wrote survey items to capture these sentiments and administered these items—along with standard survey measures of mental health—to a representative sample of 1,778 32–43 year olds in the occupied Palestinian territory. The same survey questions also were administered to a representative subsample (n = 508) six months earlier, providing repeated measures of the construct. Results Across samples and time, the feeling broken or destroyed scale: 1) comprised a separate factor in exploratory factor analyses, 2) had high inter-item consistency, 3) was reported by both genders and in all regions, 4) showed discriminate validity via moderate correlations with measures of feelings of depression and trauma-related stress, and 5) was more commonly experienced than either feelings of depression or trauma-related stress. Conclusions Feeling broken or destroyed can be reliably measured and distinguished from conventional measures of mental health. Such locally grounded and contextualized

  9. Phenomenology of supersymmetry with broken R-parity

    International Nuclear Information System (INIS)

    In some phenomenological supersymmetric models R-parity (+1 for particles, -1 for sparticles) is spontaneously broken along with tau lepton number Lsub(tau) by a vacuum expectation value vsub(tau) of the tau sneutrino νsub(tau). In this paper the authors explore the phenomenological constraints on models with spontaneous violation of R-parity and Lsub(tau), and propose some experimental signatures. (author)

  10. The Quantum Hall Effect: Novel Excitations and Broken Symmetries

    OpenAIRE

    Girvin, Steven M.

    1999-01-01

    These pedagogical lecture notes present a general introduction to most aspects of the integer and fractional quantum Hall effects. This is followed by an extensive discussion of quantum Hall ferromagnetism, both for spins in single-layer systems and `pseudospins' in double-layer systems. The effective field theories describing various broken symmetry states and `skyrmion' and `meron' spin textures are derived and discussed in some detail. Pedagogical presentations on Berry phases and lowest L...

  11. General Broken Lines as advanced track fitting method

    OpenAIRE

    Kleinwort., C

    2012-01-01

    In HEP experiments the description of the trajectory of a charged particle is obtained from a fit to measurements in tracking detectors. The parametrization of the trajectory has to account for bending in the magnetic field, energy loss and multiple scattering in the detector material. General broken lines implement a track model with proper description of multiple scattering leading to linear equations with a special structure of the corresponding matrix allowing for a fast solution with the...

  12. Is optical bistability an example of a broken symmetry

    International Nuclear Information System (INIS)

    The purpose of this paper is to examine the behaviour of the phase of the electric field in the phenomenon of optical bistability. Present theories treat optical bistability as a broken symmetry caused by the locking of the phase of the field in the cavity to the phase of the driving laser field. The author obtains new results by a method similar to the method used by Glauber to model the laser radiation field over twenty years ago

  13. H-Trust:A Group Trust Management System for Peer-to-Peer Desktop Grid

    Institute of Scientific and Technical Information of China (English)

    Huanyu Zhao; Xiaolin Li

    2009-01-01

    Peer-to-Peer Desktop Grid(P2PDG)has emerged as a pervasive cyber-infrastructure tackling many largescale applications with high impacts.As a burgeoning research area,P2PDG can support numerous applications,including scientific computing,file sharing,web services,and virtual organization for collaborative activities and projects.To handle trustworthiness issues of these services.trust and reputation schemes are proposed to establish trust among peers in P2PDG.In this paper,we propose a robust group trust management system,called H-Trust,inspired by the H-index aggregation technique.Leveraging the robustness of the H-index algorithm under incomplete and uncertain circumstances.H-Trust offers a robust personalized reputation evaluation mechanism for both individual and group trusts with minimal communication and computation overheads.We present the H-Trust scheme in five phases,including trust recording,local trust evaluation,trust query phase,spatiai-temporal update phase,and group reputation evaluation phases.The rationale for its design,the analysis of the algorithm are further investigated.To validate the performance of H-Trust scheme.we designed the H-Trust simulator HTrust-Sim to conduct multi-agent-based simulations.Simulation results demonstrate that H-Trust is robust and can identify and isolate malicious peers in large scale systems even when a large portion of peers are malicious.

  14. "It Reminded Me of What Really Matters": Teacher Responses to the Lessons from Auschwitz Project

    Science.gov (United States)

    Maitles, Henry; Cowan, Paula

    2012-01-01

    Since 2007, the Lessons from Auschwitz Project organised by the Holocaust Education Trust, has taken groups of Scottish senior school students (between 16 and 18 years) and where possible an accompanying teacher from their school, to Auschwitz-Birkenau Memorial and Museum as part of a process of increasing young people's knowledge and…

  15. Spontaneously Broken Yang-Mills-Einstein Supergravities as Double Copies

    CERN Document Server

    Chiodaroli, Marco; Johansson, Henrik; Roiban, Radu

    2015-01-01

    Color/kinematics duality and the double-copy construction have proved to be systematic tools for gaining new insight into gravitational theories. Extending our earlier work, in this paper we introduce new double-copy constructions for large classes of spontaneously-broken Yang-Mills-Einstein theories with adjoint Higgs fields. One gauge-theory copy entering the construction is a spontaneously-broken (super-)Yang-Mills theory, while the other copy is a bosonic Yang-Mills-scalar theory with trilinear scalar interactions that display an explicitly-broken global symmetry. We show that the kinematic numerators of these gauge theories can be made to obey color/kinematics duality by exhibiting particular additional Lie-algebraic relations. We discuss in detail explicit examples with N=2 supersymmetry, focusing on Yang-Mills-Einstein supergravity theories belonging to the generic Jordan family in four and five dimensions, and identify the map between the supergravity and double-copy fields and parameters. We also bri...

  16. Social information influences trust behaviour in adolescents.

    Science.gov (United States)

    Lee, Nikki C; Jolles, Jelle; Krabbendam, Lydia

    2016-01-01

    Trust plays an integral role in daily interactions within adolescents' social environment. Using a trust game paradigm, this study investigated the modulating influence of social information about three interaction partners on trust behaviour in adolescents aged 12-18 (N = 845). After receiving information about their interaction partners prior to the task, participants were most likely to share with a 'good' partner and rate this partner as most trustworthy. Over the course of the task all interaction partners showed similar levels of trustworthy behaviour, but overall participants continued to trust and view the good partner as more trustworthy than 'bad' and 'neutral' partners throughout the game. However, with age the ability to overcome prior social information and adapt trust behaviour improved: middle and late adolescents showed a larger decrease in trust of the good partner than early adolescents, and late adolescents were more likely to reward trustworthy behaviour from the negative partner. PMID:26599529

  17. A New Kind of Subjective Trust Model

    Institute of Scientific and Technical Information of China (English)

    ZHANG Guangwei; KANG Jianchu; LUO Ziqiang; MENG Xiangyi; FANG Peici; LI Deyi

    2006-01-01

    Based on the outstanding characteristics of Cloud Model on the process of transforming a qualitative concept to a set of quantitative numerical values, a formalized model of subjective trust is introduced by which we can transform between qualitative reputation and quantitative voting data. The present paper brings forward algorithms to compute direct trust and recommender trust. Further more, an effective similarity measuring method used to distinguish two users'reputation on knowledge level is also proposed. The given model properly settles the uncertainty and fuzziness properties of subjective trust which is always the weakness of traditional subjective trust model, and provides a step in the direction of proper understanding and definition of human trust.

  18. Principals, Trust, and Cultivating Vibrant Schools

    Directory of Open Access Journals (Sweden)

    Megan Tschannen-Moran

    2015-03-01

    Full Text Available Although principals are ultimately held accountable to student learning in their buildings, the most consistent research results have suggested that their impact on student achievement is largely indirect. Leithwood, Patten, and Jantzi proposed four paths through which this indirect influence would flow, and the purpose of this special issue is to examine in greater depth these mediating variables. Among mediating variables, we assert that trust is key. In this paper, we explore the evidence that points to the role that faculty trust in the principal plays in student learning and how principals can cultivate trust by attending to the five facets of trust, as well as the correlates of trust that mediate student learning, including academic press, collective teacher efficacy, and teacher professionalism. We argue that trust plays a role in each of the four paths identified by Leithwood, Patten, and Jantzi. Finally, we explore possible new directions for future research.

  19. Increasing interpersonal trust through divergent thinking

    Directory of Open Access Journals (Sweden)

    RobertaSellaro

    2014-06-01

    Full Text Available Interpersonal trust is an essential ingredient of many social relationships but how stable is it actually, and how is it controlled? There is evidence that the degree of trust into others might be rather volatile and can be affected by manipulations like drawing attention to personal interdependence or independence. Here we investigated whether the degree of interpersonal trust can be biased by inducing either a more integrative or a more cognitive-control mode by means of a creativity task requiring divergent or convergent thinking, respectively. Participants then performed the Trust Game, which provides an index of interpersonal trust by assessing the money units one participant (the trustor transfers to another participant (the trustee. As expected, participants transferred significantly more money to the trustee after engaging in divergent thinking as compared to convergent thinking. This observation provides support for the idea that interpersonal trust is controlled by domain-general (i.e., not socially dedicated cognitive states.

  20. The Value of Trust to Nursing.

    Science.gov (United States)

    Rutherford, Marcella M

    2014-01-01

    Trust, one of nursing's intangible assets, impacts nurses' ability to form meaningful relationships with patients and this connection positively impacts health outcomes. Linking trust to the fabric of nursing and investing in its measurement will become essential to nursing's valuation and the resulting investment in nursing. Trust, as nursing's core value, should be fostered by nurse educators as they prepare the next generation of nurses. Nurse administrators should connect the trust a patient has for his or her nurse and patient cooperation and honest transparent communication between providers and the patient. Banking trust as a valuable nursing asset will substantiate nursing's marketing and support its worth. Nursing's trustworthiness is an intangible asset that warrants protection, as trust once lost is hard to recapture. PMID:26267958

  1. Exploring the Change from Low-Trust to High-Trust Organizations

    DEFF Research Database (Denmark)

    Jagd, Søren

    projects of personal and organizational change leading to high-trust organizations. In this paper I explore how we may understand this change towards high-trust organizations: What does it mean, what is the content of such a change, and what may be the consequences. I show that it is still rather unclear...... what the notion of high-trust organization actually means, and that the change process in the direction of high trust organizations involves not only a quantitative growth in trust, but may involve important qualitative changes in the organization, especially concerning the relations between management......A growing body of literature point to the increasing importance of trust for organizations and for the explicit use of trust as a management tool. The explicit or implicit message in both management literature and research literature on trust as a management tool is that managers should pursue...

  2. Trust-Building in Electronic Markets: Relative Importance and Interaction Effects of Trust-Building Mechanisms

    Science.gov (United States)

    Tams, Stefan

    We examine the relative and complementary effectiveness of trust-building strategies in online environments. While prior research has examined various antecedents to trust, we investigated two trust-building mechanisms more in depth: Web site trust and vendor reputation. We tried to understand the relative effectiveness of these two important mechanisms to provide online businesses with a clear recommendation of how to establish trust in an effective and efficient manner. Drawing from the literature on trust, we proposed vendor reputation to be more effective than Web site trust. Moreover, we examined a potential complementary effect of these mechanisms so as to provide online businesses with a deeper understanding of how to derive superior trust. We hypothesize a small such effect. The study proposes a laboratory experiment to test the model.

  3. Trust is bound to emerge (In the repeated Trust Game)

    OpenAIRE

    Luciano Andreozzi

    2010-01-01

    This paper addresses the emergence of cooperation in asymmetric pris- oners' dilemmas in which one player chooses after having observed the other player's choice (Trust Game). We use the finite automata approach with complexity costs to study the equilibria of the repeated version of this game. We show that there is a small set of automata that form the unique Closed Under Rational Behavior (CURB) set for this game. This set contains two non-strict Nash equilibria, a cooperative and a non- co...

  4. Viewpoint : Trust and the sociology of the professions

    NARCIS (Netherlands)

    Groenewegen, Peter P.

    2006-01-01

    There is a fast-growing literature on trust in health care, especially interpersonal trust, but also public or institutional trust, reflecting the growing awareness in both the research and policy communities of the importance of trust. At a general level, trust as part of the broader concept of soc

  5. Young children's selective trust in informants

    OpenAIRE

    Harris, Paul L.; Corriveau, Kathleen H.

    2011-01-01

    Young children readily act on information from adults, setting aside their own prior convictions and even continuing to trust informants who make claims that are manifestly false. Such credulity is consistent with a long-standing philosophical and scientific conception of young children as prone to indiscriminate trust. Against this conception, we argue that children trust some informants more than others. In particular, they use two major heuristics. First, they keep track of the history of ...

  6. Exploring trust relationships during times of change

    OpenAIRE

    Hartmut Von der Ohe; Nico Martins

    2010-01-01

    Orientation: In the current economic climate and the resulting fast-changing global business and political environment, trust among different role players in organisations has become critical for survival.Research purpose: The objective of this study was to explore the impact of different variables such as demographics on trust relationships in South African organisations.Motivation for the study: Anecdotal evidence and preliminary data collected for a national trust indicator seemed to sugge...

  7. PEERS ORGANIZING TRUST BASED ON METRICS

    OpenAIRE

    Sheshadri Shirisha; K. Chandra Sekharaiah

    2014-01-01

    Every system in the network considered as peer, which are open to malicious activities in nature. Prevention of these malicious activities is achieved by developing trust between the peers. Trustworthiness of a peer can be calculated based on the prior interactions with other peers in the network. Peers create their own trust network in their proximity by using local information available and do not try to learn global trust information. Interactions and recommendations are ...

  8. Trust and Distrust as Cultural Frames

    DEFF Research Database (Denmark)

    Perry, Kevin Anthony

    2016-01-01

    One view on trust that has largely gone unexamined in the literature is the process perspective. The process perspective advances the view that trust develops over time in the local context through a history of interaction between knowledgeable social actors. The term ‘knowledgeable social actor’...... chapter contributes towards understanding of the micro-processes at play in trust- and distrust-building processes....

  9. Trust Issues: Evidence from Second Generation Immigrants

    OpenAIRE

    Ljunge, Martin

    2012-01-01

    This paper estimates the intergeneration transmission of trust by studying second generation immigrants in 29 European countries with ancestry in 87 nations. There is significant transmission of trust on the mother’s side. The transmission is stronger in Northern Europe. Ancestry from more developed countries suggests a stronger transmission of trust, but the heterogeneity in ancestry dissipates for individuals who reside in Northern Europe. The results suggest an interaction between cultural...

  10. Immigrant Assimilation, Trust and Social Capital

    OpenAIRE

    Cox, James C.; Orman, Wafa Hakim

    2010-01-01

    Trust is a crucial component of social capital. We use an experimental moonlighting game with a representative sample of the U.S. population, oversampling immigrants, to study trust, positive, and negative reciprocity between first-generation immigrants and native-born Americans as a measure of immigrant assimilation. We also survey subjects in order to relate trusting and trustworthy behavior with demographic characteristics and traditional, survey-based measures of social capital. We find t...

  11. Trust and its Relationship to Demographic Factors

    Directory of Open Access Journals (Sweden)

    Asghar Mirfardi

    2011-01-01

    Full Text Available Problem statement: Social trust is the main theme in the social life. Trust is “the expectation that arises within a community of regular, honest and cooperative behavior, based on commonly shared norms”. Development, social trust and security are intertwined categories and have interaction to each other. Social trust, as a main factor in social capital, provide social context for developmental programs. This study, examine the affect of Demographic factors on the social trust to others. As social trust is a key factor in social relationship, this study is needed to evaluate such factor according to demographic factors. Approach: This study has been done on existing data about Iranian values and attitudes. Some factors such as gender, age, education level, job situation, marital situation have been studied in this study. Some of these variables such as education, correspondence to development level, especially in social development. This study is done via documental method (archive and Documental data about mentioned themes and second analysis of The Iranian National Values and attitudes Survey (2000. Results: Findings of this study indicated that there is significant relationship between all of independent variables (Gender, age, education level, job situation, marital situation and social trust to families and relatives, there is significant relationship between variables such as gender, education level, job situation, marital situation (independent variables and social trust to friends. Analyzing the data showed that, the residents of less and more developed cities have different situation in trust. Conclusion/Recommendations: This study introduces three types of trust upon the development level of societies. Trust in Iran is an example of trust structure in developing societies.

  12. Representing Trust in cognitive social simulations

    OpenAIRE

    Pollock, Shawn S.; Alt, Jonathan K.; Darken, Christian J.

    2011-01-01

    Trust plays a critical role in communications, strength of relationships, and information processing at the individual and group level. Cognitive social simulations show promise in providing an experimental platform for the examination of social phenomena such as trust formation. This paper describes the initial attempts at representation of trust in a cognitive social simulation using reinforcement learning algorithms centered around a cooperative Public Commodity game within a dynamic soc...

  13. Exploring Trust in Personal Learning Environments

    OpenAIRE

    Li, Na; Najafian-Razavi, Maryam; Gillet, Denis

    2011-01-01

    The design of effective trust and reputation mechanisms for personal learning environments (PLEs) is believed to be a promising research direction. In this paper, we propose a 4-dimensional trust model that complies with the specific requirements of PLEs. Trust is explored in four dimensions: trustor, trustee, context and visibility. The importance of these four dimensions is investigated through a number of scenarios. The model is implemented in a PLE platform named Graaasp. Preliminary eval...

  14. Trust in Spanish Governments: Antecedents and Consequences

    OpenAIRE

    Gloria Alarcón García; Edgardo Ayala Gaytán

    2013-01-01

    We used the Fiscal Observatory Survey of the University of Murcia (2007) to examine the antecedents of trust in the Spanish government (at city, regional and state levels). We found that the main drivers of trust are individuals’ perception of the government’s performance and the socio-economic environment in which they live. Regarding the consequences, we tested a variant of the rule compliance hypothesis: the higher the trust in the government, the higher the citizens’ fiscal awareness, mea...

  15. Consumers' Trust in Feelings as Information

    OpenAIRE

    Tamar Avnet; Michel Tuan Pham; Stephen, Andrew T.

    2012-01-01

    The diagnosticity of feelings in judgment depends not only on their representativeness and relevance, but also on people's trust in their feelings in general. Trust in feelings is the degree to which individuals believe that their feelings generally point toward the "right" direction in judgments and decisions. Six studies show that a higher trust in feelings (a) increases the reliance on feelings as a judgment criterion, (b) amplifies the influence of ad-induced feelings in persuasion, (c) m...

  16. Trust Authentication Protocol on the Web

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    It is unsuitable to use traditional identity-based authentication on the Web where entities are not foreknown to each other. Trust relationship must be established between strangers before authentication. To achieve trust authentication, the resource-constrained trust negotiation is addressed, and traditional authentication key exchange protocol is extended. Owing to avoiding the heavy computational demands the public key cryptography operations bring about, the authentication protocol is well-suited for security authentication on the Web.

  17. 77 FR 19661 - City of Broken Bow, OK; Notice of Technical Conference

    Science.gov (United States)

    2012-04-02

    ... Energy Regulatory Commission City of Broken Bow, OK; Notice of Technical Conference March 21, 2012. Take.... Forest Service on November 16, 2007 for the Broken Bow Re-Regulation Dam Hydroelectric Project No. 12470.... Forest Service's Hochatown Office, Route 4, Broken Bow, OK 74728. All local, state, and federal...

  18. A mobile and portable trusted computing platform

    Directory of Open Access Journals (Sweden)

    Nepal Surya

    2011-01-01

    Full Text Available Abstract The mechanism of establishing trust in a computing platform is tightly coupled with the characteristics of a specific machine. This limits the portability and mobility of trust as demanded by many emerging applications that go beyond the organizational boundaries. In order to address this problem, we propose a mobile and portable trusted computing platform in a form of a USB device. First, we describe the design and implementation of the hardware and software architectures of the device. We then demonstrate the capabilities of the proposed device by developing a trusted application.

  19. History-based trust negotiation model

    Institute of Scientific and Technical Information of China (English)

    ZHAO Yi-zhu; ZHAO Yan-hua; LU Hong-wei

    2009-01-01

    Trust negotiation (TN) is an approach to establish trust between strangers through iterative disclosure of digital credentials. Speeding up subsequent negotiations between the same negotiators is a problem worth of research. This paper introduces the concept of visiting card, and presents a history-based trust negotiation (HBTN) model. HBTN creates an account for a counterpart at the first negotiation and records valid credentials that the counterpart disclosed during each trust negotiation in his historical information base (HIB). For the following negotiation, no more credentials need to be disclosed for both parties. HBTN speeds up subsequent negotiations between the entities that interact with each other frequently without impairing the privacy preservation.

  20. The Puzzle of Education and Trust

    DEFF Research Database (Denmark)

    Frederiksen, Morten; Larsen, Christian Albrekt; Lolle, Henrik

    The literature on trust has come to assume that education has a rather universal positive effect. Using the survey item that has dominated the trust literature – “whether one believes most people can be trusted or one never can be too careful” – education is often found to be one of the strongest...... positive effect on “generalized trust” is largely a phenomenon found in low-corruption countries. In high-corruption countries, increased education actually decreases the propensity to trust “most people” or people one “meet for the first time”.......The literature on trust has come to assume that education has a rather universal positive effect. Using the survey item that has dominated the trust literature – “whether one believes most people can be trusted or one never can be too careful” – education is often found to be one of the strongest...... predictors of trust; more important that age, income, wealth, health or any another individual characteristic. Thus, there are indeed reasons to believe that education sometimes increase the propensity to trust other people. However, the paper argues that there are limits to this positive effect from...

  1. Assessing User Trust to Improve Web Usability

    Directory of Open Access Journals (Sweden)

    Punam Bedi

    2006-01-01

    Full Text Available The technological advancement has significantly influenced the style of human-computer interaction, especially for World Wide Web. The users can now afford to choose amongst multiple websites offering similar services. The website which provides a usable interface along with requisite services, scores over its competitors. User interaction with a website is driven by two major factors- the performance factors associated with the site and the emotional factors associated with human being. Amongst the emotional factors, trust is a dominant driving factor of web usage. The more a user trusts a website, more shall be the usage and vice-versa. Trust has almost always been specified qualitatively. This study presents a distinct method of measuring user trust on a website, by considering the features of that website. Four distinct states of a feature are considered in the study. Each of these states has a different impact on user trust formation. The method proposed considers the features, their states and their contribution towards trust formation to compute the user trust on a website. Such a measure can be effectively employed to determine the trust level of a website as perceived by its users. Comparison of different websites with respect to their trust levels can therefore, provide the designer an insight into the weak features of that site. Identifying and correcting these, can help in retaining the users and hence increase the usability of that site.

  2. In Bio-Fuel We Trust

    OpenAIRE

    Henning, Annette

    2006-01-01

    In bio-fuel we trust. Or do we? In this chapter, ethnographic material from Sweden is used to discuss ways sin which trust may influence the choice of bio-fuel for heating purposes. The meaning and substance of trust or distrust, as well as the very conditions for trust, are elaborated on in relation to solar and bio-pellet systems, district heating with bio-fuel, and traditional fireplaces. An important conclusion of this chapter is that the degree to which people perceive others as being li...

  3. Is It a Trust Issue? Factors That Influence Trust for Persons Living With HIV/AIDS.

    Science.gov (United States)

    Krause, Denise D; May, Warren L

    2016-09-01

    Trust in one's health care provider, trust in the health care system in general, and even trust in one's community affects engagement in HIV-related health care. This article examines the issue of trust among a random sample of HIV-infected individuals residing in Mississippi, an area hard-hit by the HIV/AIDS epidemic. Five constructs based on survey responses from these individuals were developed: (1) trust in one's provider to offer the best possible medical care, (2) trust in one's provider to protect patient privacy, (3) willingness to disclose HIV status to one's provider, (4) trust in the health care system, and (5) trust in one's community. Findings suggest that interventions to improve trust in providers to deliver the highest quality of care should be targeted to young people, African Americans, and the more highly educated. Interventions to increase trust in providers to protect privacy should focus on creating and strengthening social support groups or networks that build relationships and foster trust. Interventions aimed to increase community trust also should be targeted to young people. This information is useful to researchers, policy makers, health care providers, and organizations interested in prioritizing interventions and strategies that have the greatest potential to reduce health disparities in HIV diagnosis and treatment in the Deep South. PMID:27095034

  4. 26 CFR 26.2654-1 - Certain trusts treated as separate trusts.

    Science.gov (United States)

    2010-04-01

    ... shares or trusts as separate trusts for GST tax purposes generally permits the allocation of GST tax exemption, the making of various elections permitted for GST tax purposes, and the occurrence of a taxable distribution or termination with regard to a particular resulting share or trust, with no GST tax impact on...

  5. Drawing on a Knowledge-Based Trust Perspective to Examine and Conceptualize within-School Trust Development by Principals

    Science.gov (United States)

    Cosner, Shelby

    2010-01-01

    Research has revealed the importance of trust to schools and pointed to the central role that principals play in cultivating within-school trust, yet less is known about the ways that principals cultivate such trust. Moreover, divergent perspectives and varied contexts for examining trust have limited the transfer of trust scholarship to practice…

  6. Consumer trust in the Australian food system - The everyday erosive impact of food labelling.

    Science.gov (United States)

    Tonkin, Emma; Webb, Trevor; Coveney, John; Meyer, Samantha B; Wilson, Annabelle M

    2016-08-01

    Consumer trust in food system actors is foundational for ensuring consumer confidence in food safety. As food labelling is a direct communication between consumers and food system actors, it may influence consumer perceptions of actor trustworthiness. This study explores the judgements formed about the trustworthiness of the food system and its actors through labelling, and the expectations these judgements are based on. In-depth, semi-structured interviews with 24 Australian consumers were conducted. Theoretical sampling focussed on shopping location, dietary requirements, rurality, gender, age and educational background. The methodological approach used (adaptive theory) enabled emerging data to be examined through the lens of a set of guiding theoretical concepts, and theory reconsidered in light of emerging data. Food labelling acted as a surrogate for personal interaction with industry and government for participants. Judgements about the trustworthiness of these actors and the broader food system were formed through interaction with food labelling and were based on expectations of both competence and goodwill. Interaction with labelling primarily reduced trust in actors within the food system, undermining trust in the system as a whole. Labelling has a role as an access point to the food system. Access points are points of vulnerability for systems, where trust can be developed, reinforced or broken down. For the participants in this study, in general labelling demonstrates food system actors lack goodwill and violate their fiduciary responsibility. This paper provides crucial insights for industry and policy actors to use this access point to build, rather than undermine, trust in food systems. PMID:27063669

  7. Does conflict shatter trust or does trust obliterate conflict? Revisiting the relationships between team diversity, conflict, and trust

    NARCIS (Netherlands)

    Curseu, P.; Schruijer, S.G.L.

    2010-01-01

    This article explores the interplay between trust and conflict as antecedents of team effectiveness. In the first cross-sectional study, two alternative path models are tested in a sample of 174 teams (897 participants) with the emergent states of task conflict, relationship conflict, and trust acti

  8. Mining Trust Relationships from Online Social Networks

    Institute of Scientific and Technical Information of China (English)

    Yu Zhang; Tong Yu

    2012-01-01

    With the growing popularity of online social network,trust plays a more and more important role in connecting people to each other.We rely on our personal trust to accept recommendations,to make purchase decisions and to select transaction partners in the online community.Therefore,how to obtain trust relationships through mining online social networks becomes an important research topic.There are several shortcomings of existing trust mining methods.First,trust is category-dependent.However,most of the methods overlook the category attribute of trust relationships,which leads to low accuracy in trust calculation.Second,since the data in online social networks cannot be understood and processed by machines directly,traditional mining methods require much human effort and are not easily applied to other applications.To solve the above problems,we propose a semantic-based trust reasoning mechanism to mine trust relationships from online social networks automatically.We emphasize the category attribute of pairwise relationships and utilize Semantic Web technologies to build a domain ontology for data communication and knowledge sharing.We exploit role-based and behavior-based reasoning functions to infer implicit trust relationships and category-specific trust relationships.We make use of path expressions to extend reasoning rules so that the mining process can be done directly without much human effort.We perform experiments on real-life data extracted from Epinions.The experimental results verify the effectiveness and wide application use of our proposed method.

  9. Trust: the sublime duty in health care leadership.

    Science.gov (United States)

    Piper, Llewellyn E

    2010-01-01

    Trust is the essence of human social existence. From the moment of birth, trust is the basic component in any human relationship and interaction. Trust is the Holy Grail for human confidence in others. From human survival to organizational survival, trust is the primordial bond. No organization is more dependent on trust than health care. This article views trust as the most basic fundamental quality for leadership. Trust is a sublime duty of a leader and the leadership of an organization. Leadership sets the culture of trust. Trust is the one quality that is essential for guiding an organization toward serving others. This article addresses trust from many perspectives. Trust is viewed from our subordinates, our peers, our superiors, and the public we serve. This article postulates how trust in an organization is the sublime duty of leadership that unites all human understanding and without it destroys all human relationships. PMID:20145465

  10. SERVANT LEADERSHIP AND ORGANIZATIONAL TRUST: THE MEDIATING EFFECT OF THE LEADER TRUST AND ORGANIZATIONAL COMMUNICATION

    Directory of Open Access Journals (Sweden)

    Morad Rezaei

    2012-01-01

    Full Text Available The purpose of this paper aims to clarify the relationship between servant leadership and organizational trust, and tries to demonstrate the mediator role of leader trust and organizational communication in this relationship. The study sample included 258 employees of Guilan province Tax Administration and for sampling we used cluster method. Previous studies have also focused on the positive impact of servant leadership in organizational trust and in this article the results show that there is a significant relationship between servant leadership, organizational trust, leader trust and organizational communication.

  11. Massive Kaluza-Klein theories and their spontaneously broken symmetries

    Energy Technology Data Exchange (ETDEWEB)

    Hohm, O.

    2006-07-15

    In this thesis we investigate the effective actions for massive Kaluza-Klein states, focusing on the massive modes of spin-3/2 and spin-2 fields. To this end we determine the spontaneously broken gauge symmetries associated to these 'higher-spin' states and construct the unbroken phase of the Kaluza-Klein theory. We show that for the particular background AdS{sub 3} x S{sup 3} x S{sup 3} a consistent coupling of the first massive spin-3/2 multiplet requires an enhancement of local supersymmetry, which in turn will be partially broken in the Kaluza-Klein vacuum. The corresponding action is constructed as a gauged maximal supergravity in D=3. Subsequently, the symmetries underlying an infinite tower of massive spin-2 states are analyzed in case of a Kaluza-Klein compactification of four-dimensional gravity to D=3. It is shown that the resulting gravity-spin-2 theory is given by a Chern-Simons action of an affine algebra and also allows a geometrical interpretation in terms of 'algebra-valued' differential geometry. The global symmetry group is determined, which contains an affine extension of the Ehlers group. We show that the broken phase can in turn be constructed via gauging a certain subgroup of the global symmetry group. Finally, deformations of the Kaluza-Klein theory on AdS{sub 3} x S{sup 3} x S{sup 3} and the corresponding symmetry breakings are analyzed as possible applications for the AdS/CFT correspondence. (Orig.)

  12. Experimental study for sensorless broken bar detection in induction motors

    International Nuclear Information System (INIS)

    This study presents experimental results of sensorless broken bar detection in induction motors based on fluctuations of the stator current zero crossing instants before actual breakdown occurs. These fluctuations are sensed by a microcontroller (μC), and transferred to a computer for monitoring the amplitude changes on specific frequency components using fast Fourier transformation algorithms. The motor current signal is also monitored for verification purposes. The main reasons of rotor faults are broken bars, end ring faults and bearing faults. Most recent efforts are focusing on current spectrum analysis, as the current signal is easily accessible for all induction motors. Instead of sampling motor current with a high resolution analog to digital converter, zero crossing instants are recorded as the waveforms cross zero. Fluctuations in the intervals between successive zero crossings of the three phase current waveforms are analyzed in the frequency domain. Broken bars and end ring breakages, supply unbalances, rotor eccentricities and shaft misalignment faults are distinguished by monitoring amplitude changes of the 2sf, fr, and 2f spectral components, where s is the motor slip, f is supply frequency and fr is rotor speed. Appearance of only the 2sf component in zero crossing times (ZCT) of the signal spectrum implies rotor faults. The 2f component occurs only when supply is unbalanced or in the case of stator winding faults. Separation of these two faults is implemented by monitoring both components. In addition, when there is additional rotor eccentricity due to bearing deterioration or shaft misalignment, it is also necessary to monitor the fr fault signature component to distinguish mixed faults. It may be necessary to include additional signals such as motor vibration or temperature to extend the reliability of the fault detection system for critical machines

  13. Massive Kaluza-Klein theories and their spontaneously broken symmetries

    International Nuclear Information System (INIS)

    In this thesis we investigate the effective actions for massive Kaluza-Klein states, focusing on the massive modes of spin-3/2 and spin-2 fields. To this end we determine the spontaneously broken gauge symmetries associated to these 'higher-spin' states and construct the unbroken phase of the Kaluza-Klein theory. We show that for the particular background AdS3 x S3 x S3 a consistent coupling of the first massive spin-3/2 multiplet requires an enhancement of local supersymmetry, which in turn will be partially broken in the Kaluza-Klein vacuum. The corresponding action is constructed as a gauged maximal supergravity in D=3. Subsequently, the symmetries underlying an infinite tower of massive spin-2 states are analyzed in case of a Kaluza-Klein compactification of four-dimensional gravity to D=3. It is shown that the resulting gravity-spin-2 theory is given by a Chern-Simons action of an affine algebra and also allows a geometrical interpretation in terms of 'algebra-valued' differential geometry. The global symmetry group is determined, which contains an affine extension of the Ehlers group. We show that the broken phase can in turn be constructed via gauging a certain subgroup of the global symmetry group. Finally, deformations of the Kaluza-Klein theory on AdS3 x S3 x S3 and the corresponding symmetry breakings are analyzed as possible applications for the AdS/CFT correspondence. (Orig.)

  14. Public trust: Struggle and regain

    International Nuclear Information System (INIS)

    The after-effect of Monju and Tokai accidents has been much larger than expected. It struck PNC a fierce blow and the damage did not stop there but extended to the nuclear community at large. As a result, PNC was reformed into a new corporate, Japan Nuclear Cycle Development Institute (JNC). JNC has been given a new body but its mind must be cultivated so as to be able to regain public trust. This presentation summarizes the struggle to regain public trust in case of Monju. After five and a half years of construction work, Monju began pre-operation tests in May 1991, achieved initial criticality in April 1994 and the first connection to the grid in August 1995, and the accident occurs in December 1995. Until then, there was confidence, perhaps overconfidence, and it was taken for granted that the public was always in favour of 'nuclear'. The struggle to regain the public confidence involved: (1) Improvement of safety measures and emergency management; (2) Cultivation of a new corporate culture; (3) Open information; (4) Public communication (i.e. 'Door-to-door visit', 'Public meeting', 'Come-and-see', Weekly press conference. The struggle may continue for some time

  15. Trusted computing for embedded systems

    CERN Document Server

    Soudris, Dimitrios; Anagnostopoulos, Iraklis

    2015-01-01

    This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. Case studies are used to present new techniques designed as industrial security solutions. Coverage includes development of tamper resistant hardware and firmware mechanisms for lightweight embedded devices, as well as those serving as security anchors for embedded platforms required by applications such as smart power grids, smart networked and home appliances, environmental and infrastructure sensor networks, etc. ·         Enables readers to address a variety of security threats to embedded hardware and software; ·         Describes design of secure wireless sensor networks, to address secure authen...

  16. An Analysis of a supervisor-subordinate trust relationship

    OpenAIRE

    A. S. Engelbrecht; B. E. Cloete

    2000-01-01

    In view of the importance of interpersonal trust as recognized by organizational scholars and the problems associated with the study of trust in organizations, the development of a conceptual model of organizational trust is essential. The aim of this study was to establish empirically the validity of a theoretically sound model of trust in the South African work context. The overall results confirmed a positive relationship between interpersonal trust, trustworthiness and successful trust re...

  17. Technology Trust in Internet-Based Interorganizational Electronic Commerce

    OpenAIRE

    Pauline Ratnasingam; Paul A. Pavlou

    2003-01-01

    Trust in Internet-based Business-to-Business (B2B) e-commerce is an important issue for both practicioners and academicians. Whereas the traditional notion of dyadic interfirm trust primarily focuses on trust in a trading partner firm, trust in e-commerce also implicitly incorporates the notion of trust in the transaction infrastructure and underlying control mechanisms (technology trust), which deals with transaction integrity, authentication, confidentliality, non-repudiation, and best busi...

  18. A Strategic Model of Trust Management in Web Services

    Science.gov (United States)

    Sun, Junqing; Sun, Zhaohao; Li, Yuanzhe; Zhao, Shuliang

    This article examines trust and trust management in web services and proposes a multiagent model of trust relationship in web services. It looks at the hierarchical structure of trust management in web services and proposes a strategic model of trust management in web services. The proposed approach in this article will facilitate research and development of trust management in e-commerce, web services and social networking.

  19. Trust Model for Social Network using Singular Value Decomposition

    OpenAIRE

    Bundi Ntwiga, Davis; Weke, Patrick; Kiura Kirumbu, Michael

    2016-01-01

    For effective interactions to take place in a social network, trust is important. We model trust of agents using the peer to peer reputation ratings in the network that forms a real valued matrix. Singular value decomposition discounts the reputation ratings to estimate the trust levels as trust is the subjective probability of future expectations based on current reputation ratings. Reputation and trust are closely related and singular value decomposition can estimate trust using the...

  20. Repair for a broken market: the medical service company.

    Science.gov (United States)

    Greene, A

    1993-01-01

    Sky-rocketing costs are fueling debate over whether market mechanisms can work for the healthcare services industry. The market for health care certainly seems to be broken. Value is decreasing, services are fragmented and costly transactions among providers are exacting a great toll in efficiency and service. Perhaps ironically, this situation presents a golden opportunity for providers who understand that the market is merely responding to the combined stimuli of inflated demand and excessive regulation. We believe that Medical Service Companies, which unite physicians and hospitals under one corporate roof, can reduce market friction, improve the responsiveness of providers and provide better value than traditional provider organizations. PMID:10133278

  1. Raman amplification in the broken-wave regime

    CERN Document Server

    Farmer, John P

    2015-01-01

    In regimes far beyond the wavebreaking theshold of Raman amplification, we show that significant amplifcation can occur after the onset of wavebreaking, before phase mixing destroys the coupling between pump and probe. The amplification efficiency in this regime is therefore strongly dependent on the energy-transfer rate when wavebreaking occurs, and is, as such, sensitive to both the probe amplitude and profile. In order to access the higher-efficiency broken-wave regime, a short, intense probe is required. Parameter scans show the marked difference in behaviour compared to below wavebreaking, where longer, more energetic pulses lead to improved efficiencies.

  2. Instabilities of Hexagonal Patterns with Broken Chiral Symmetry

    CERN Document Server

    Echebarria, B; Echebarria, Blas; Riecke, Hermann

    1999-01-01

    Three coupled Ginzburg-Landau equations for hexagonal patterns with broken chiral symmetry are investigated. They are relevant for the dynamics close to onset of rotating non-Boussinesq or surface-tension-driven convection. Steady and oscillatory, long- and short-wave instabilities of the hexagons are found. For the long-wave behavior coupled phase equations are derived. Numerical simulations of the Ginzburg-Landau equations indicate bistability between spatio-temporally chaotic patterns and stable steady hexagons. The chaotic state can, however, not be described properly with the Ginzburg-Landau equations.

  3. Conformal bootstrap with slightly broken higher spin symmetry

    Science.gov (United States)

    Alday, Luis F.; Zhiboedov, Alexander

    2016-06-01

    We consider conformal field theories with slightly broken higher spin symmetry in arbitrary spacetime dimensions. We analyze the crossing equation in the double light-cone limit and solve for the anomalous dimensions of higher spin currents γ s with large spin s. The result depends on the symmetries and the spectrum of the unperturbed conformal field theory. We reproduce all known results and make further predictions. In particular we make a prediction for the anomalous dimensions of higher spin currents in the 3d Ising model.

  4. Einsteinian gravity from a spontaneously broken topological BF theory

    Energy Technology Data Exchange (ETDEWEB)

    Mielke, Eckehard W., E-mail: ekke@xanum.uam.m [Departamento de Fisica, Universidad Autonoma Metropolitana-Iztapalapa, Apartado Postal 55-534, C.P. 09340, Mexico, D.F. (Mexico)

    2010-05-10

    Recently, (anti-)de Sitter gauge theories of gravity have been reconsidered. We generalize this to a metric-free sl(5,R) gauge framework and apply spontaneous symmetry breaking to the corresponding topological BF scheme. Effectively, we end-up with Einstein spaces with a tiny cosmological constant related to the scale of symmetry breaking. An induced 'background' metric emerges from a Higgs-like mechanism. It is indicated how the finiteness of such a deformed topological scheme may convert into asymptotic safeness after quantization of the spontaneously broken model.

  5. Cosmology of a universe with spontaneously broken Lorentz symmetry

    Science.gov (United States)

    Ferreira, P. G.; Gripaios, B. M.; Saffari, R.; Zlosnik, T. G.

    2007-02-01

    A self-consistent effective field theory of modified gravity has recently been proposed with spontaneous breaking of local Lorentz invariance. The symmetry is broken by a vector field with the wrong-sign mass term and it has been shown to have additional graviton modes and modified dispersion relations. In this paper we study the evolution of a homogeneous and isotropic universe in the presence of such a vector field with a minimum lying along the timelike direction. A plethora of different regimes is identified, such as accelerated expansion, loitering, collapse, and tracking.

  6. Tuning the Cosmological Constant, Broken Scale Invariance, Unitarity

    CERN Document Server

    Forste, Stefan

    2016-01-01

    We study gravity coupled to a cosmological constant and a scale but not conformally invariant sector. In Minkowski vacuum, scale invariance is spontaneously broken. We consider small fluctuations around the Minkowski vacuum. At the linearised level we find that the trace of metric perturbations receives a positive or negative mass squared contribution. However, only for the Fierz-Pauli combination the theory is free of ghosts. The mass term for the trace of metric perturbations can be cancelled by explicitly breaking scale invariance. This reintroduces fine-tuning. Models based on four form field strength show similarities with explicit scale symmetry breaking due to quantisation conditions.

  7. A Computational Trust Model for Collaborative Ventures

    Directory of Open Access Journals (Sweden)

    Weigang Wang

    2012-01-01

    Full Text Available Problem statement: The conceptual notion of trust and its underlying computational methods has been an important issue for researchers in electronic communities. While the independent trust evaluation is suitable in certain circumstances, such unilateral process falls short in supporting mutual evaluation between partners. Perceived reputation, the depth and breadth of trust, Trust Perception (TP, Repeat Collaborators at a Threshold (RCT and a collective trust index (c index have all been defined to specify the optimal trust criteria. Approach: By taking the evaluator’s own trust level as a threshold to identify compatible partners, a mutual balance between excess and deficiency in trust has been addressed. Since the number of repeated collaborations which signify retested confidence is more straightforward to capture than the manually provided feedback ratings, we have developed computational definitions for the above-mentioned concepts. Results and Conclusion: The results from the experiments based on the eBay dataset shows that the c index can be used to classify PowerSellers into normally distributed and comprehensible categories that can facilitate mutual evaluation.

  8. Trust in a Time of Increasing Diversity

    DEFF Research Database (Denmark)

    Dinesen, Peter Thisted; Sønderskov, Kim Mannemar

    2012-01-01

    In this study, we examine the impact of ethnic diversity in Danish municipalities on citizens’ social trust over the last three decades. During this period, Danish society has grown increasingly ethnically diverse, and this begs the question whether this has influenced trust in others negatively...

  9. Perceptions of Trust in Public Examinations

    Science.gov (United States)

    Simpson, Lucy; Baird, Jo-Anne

    2013-01-01

    Over recent years, the credibility of public examinations in England has increasingly come to the fore. Government agencies have invested time and money into researching public perceptions of the reliability and validity of examinations. Whilst such research overlaps into the conceptual domain of trust, trust in examinations remains an elusive…

  10. The Importance of Trust in Electronic Commerce.

    Science.gov (United States)

    Ratnasingham, Pauline

    1998-01-01

    Introduces the new concept of trust and how it influences the process of managing the security of an organization operating in an electronic commerce environment. Theoretically, the study aims to develop a framework of trust and security to provide a set of guidelines for secure electronic commerce. (Author/LRW)

  11. Further Exploration of Organizational Trust Factors

    Science.gov (United States)

    Adams, Samuel H.; Wiswell, Albert K.

    2008-01-01

    Trust facilitates individual and organizational learning, and is often misunderstood by organizations although they must continuously learn in order to attain strategic goals and survive. Furthermore, leaders of organizations often view trust defensively and their reactions may impede organizational learning. This paper builds on prior research…

  12. Going global: Trust research and international relations

    DEFF Research Database (Denmark)

    Ruzicka, Jan; Keating, Vincent Charles

    2015-01-01

    In this review article we explore the growing body of literature on the subject of trust in the field of international relations. We argue that the international level represents a unique challenge for trust research. This is so because some of the most pressing problems facing the world today...

  13. Trust Building in PPPs for Service Delivery

    DEFF Research Database (Denmark)

    Schulze, Christiane

    for service delivery in Denmark leads to two main findings. First, despite the existence of rather formalized procedures trust based on the perception of the other managers’ competence is already important before the contract is entered. Second, this trust is not automatically transferred onto the next...

  14. Building Trust in High-Performing Teams

    Directory of Open Access Journals (Sweden)

    Aki Soudunsaari

    2012-06-01

    Full Text Available Facilitation of growth is more about good, trustworthy contacts than capital. Trust is a driving force for business creation, and to create a global business you need to build a team that is capable of meeting the challenge. Trust is a key factor in team building and a needed enabler for cooperation. In general, trust building is a slow process, but it can be accelerated with open interaction and good communication skills. The fast-growing and ever-changing nature of global business sets demands for cooperation and team building, especially for startup companies. Trust building needs personal knowledge and regular face-to-face interaction, but it also requires empathy, respect, and genuine listening. Trust increases communication, and rich and open communication is essential for the building of high-performing teams. Other building materials are a shared vision, clear roles and responsibilities, willingness for cooperation, and supporting and encouraging leadership. This study focuses on trust in high-performing teams. It asks whether it is possible to manage trust and which tools and operation models should be used to speed up the building of trust. In this article, preliminary results from the authors’ research are presented to highlight the importance of sharing critical information and having a high level of communication through constant interaction.

  15. The importance of trust in computer security

    DEFF Research Database (Denmark)

    Jensen, Christian D.

    2014-01-01

    fail. In particular, we identify areas where the “hard” security properties are based on trust in the different agents in the system and certain external agents who enforce the legislative and contractual frameworks. Trust is generally considered a “soft” security property, so building a “hard...

  16. TRUSTED CLOUD COMPUTING FRAMEWORK FOR HEALTHCARE SECTOR

    Directory of Open Access Journals (Sweden)

    Mervat Adib Bamiah

    2014-01-01

    Full Text Available Cloud computing is rapidly evolving due to its efficient characteristics such as cost-effectiveness, availability and elasticity. Healthcare organizations and consumers lose control when they outsource their sensitive data and computing resources to a third party Cloud Service Provider (CSP, which may raise security and privacy concerns related to data loss and misuse appealing threats. Lack of consumers’ knowledge about their data storage location may lead to violating rules and regulations of Health Insurance Portability and Accountability Act (HIPAA that can cost them huge penalty. Fear of data breach by internal or external hackers may decrease consumers’ trust in adopting cloud computing and benefiting from its promising features. We designed a Healthcare Trusted Cloud Computing (HTCC framework that maintains security, privacy and considers HIPAA regulations. HTCC framework deploys Trusted Computing Group (TCG technologies such as Trusted Platform Module (TPM, Trusted Software Stack (TSS, virtual Trusted Platform Module (vTPM, Trusted Network Connect (TNC and Self Encrypting Drives (SEDs. We emphasize on using strong multi-factor authentication access control mechanisms and strict security controls, as well as encryption for data at storage, in-transit and while process. We contributed in customizing a cloud Service Level Agreement (SLA by considering healthcare requirements. HTCC was evaluated by comparing with previous researchers’ work and conducting survey from experts. Results were satisfactory and showed acceptance of the framework. We aim that our proposed framework will assist in optimizing trust on cloud computing to be adopted in healthcare sector.

  17. Trust and the Development of Distributed Leadership

    Science.gov (United States)

    Smylie, Mark A.; Mayrowetz, David; Murphy, Joseph; Louis, Karen Seashore

    2007-01-01

    This article examines the relationship between trust and the development of distributed leadership. It presents a theoretical argument with supporting evidence from longitudinal fieldwork examining distributed leadership development in comparative cases of two secondary schools. The analysis suggests that trust matters in the design, performance,…

  18. New Superintendents: Trust, Networking, and Social Capital

    Science.gov (United States)

    Ripley, Joan; Mitchell, Roxanne M.; Richman, John A.

    2013-01-01

    This instrumental case study explored how five newly appointed superintendents identified key stakeholders and built trust and social capital with stakeholders in their districts. Stakeholder, trust, and social capital theory were the lenses that guided this study. We utilized a pragmatic research design and thematic data analysis to interpret our…

  19. Trusting Transformational Principals: An Empirical Surprise.

    Science.gov (United States)

    Mannion, Patrick T.

    This study explored the relationship between transformational leadership and trust in schools. The central thesis is that high levels of trust should significantly correlate with transformational leadership behaviors by school principals. The study involved a sample of 451 teachers in 39 public secondary schools located in four suburban areas…

  20. Trust region minimization of orbital localization functions

    DEFF Research Database (Denmark)

    Høyvik, Ida-Marie; Jansik, Branislav; Jørgensen, Poul

    2012-01-01

    The trust region method has been applied to the minimization of localization functions, and it is shown that both local occupied and local virtual Hartree–Fock (HF) orbitals can be obtained. Because step sizes are size extensive in the trust region method, large steps may be required when the...

  1. Trust in prescription drug brand websites: website trust cues, attitude toward the website, and behavioral intentions.

    Science.gov (United States)

    Huh, Jisu; Shin, Wonsun

    2014-01-01

    Direct-to-consumer (DTC) prescription drug brand websites, as a form of DTC advertising, are receiving increasing attention due to the growing number and importance as an ad and a consumer information source. This study examined consumer trust in a DTC website as an important factor influencing consumers' attitude toward the website and behavioral intention. Applying the conceptual framework of website trust, the particular focus of investigation was the effect of the website trust cue factor on consumers' perceived DTC website trust and subsequent attitudinal and behavioral responses. Results show a significant relation between the website trust cue factor and consumers' perceived DTC website trust. Perceived DTC website trust, in turn, was found to be significantly associated with consumers' attitude toward the DTC website and behavioral intention. PMID:24094133

  2. Analysis of Trusted Identity Based Encryption (IBE-Trust Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yusnani Mohd Yussoff

    2011-12-01

    Full Text Available The peculiarity of Wireless Sensor Networks demands extra consideration during the design of the security protocol. One of the most challenging yet important security features in Wireless Sensor Network is in establishing trusted communication between sensor node and base station. While the term trusted has been widely used referring to valid nodes in the group, this paper discuss the term trusted based on the specifications of Trusted Computing Group (TCG and presents an IBE-Trust security protocol utilizing well-known identity based encryption scheme. The protocol incorporates ideas from Trusted Computing Group and Identity-based cryptosystem by Boneh Franklin in ensuring trusted and secured communications between sender and receiver. The proposed protocols were then modeled using the high-level formal language HLPSL and verified using the model checking tool AVISPA. Analysis on the proposed protocols is presented at the end of this paper.

  3. DualTrust: A Distributed Trust Model for Swarm-Based Autonomic Computing Systems

    Energy Technology Data Exchange (ETDEWEB)

    Maiden, Wendy M.; Dionysiou, Ioanna; Frincke, Deborah A.; Fink, Glenn A.; Bakken, David E.

    2011-02-01

    For autonomic computing systems that utilize mobile agents and ant colony algorithms for their sensor layer, trust management is important for the acceptance of the mobile agent sensors and to protect the system from malicious behavior by insiders and entities that have penetrated network defenses. This paper examines the trust relationships, evidence, and decisions in a representative system and finds that by monitoring the trustworthiness of the autonomic managers rather than the swarming sensors, the trust management problem becomes much more scalable and still serves to protect the swarm. We then propose the DualTrust conceptual trust model. By addressing the autonomic manager’s bi-directional primary relationships in the ACS architecture, DualTrust is able to monitor the trustworthiness of the autonomic managers, protect the sensor swarm in a scalable manner, and provide global trust awareness for the orchestrating autonomic manager.

  4. Lessons learned bulletin

    International Nuclear Information System (INIS)

    During the past four years, the Department of Energy -- Savannah River Operations Office and the Westinghouse Savannah River Company (WSRC) Environmental Restoration (ER) Program completed various activities ranging from waste site investigations to closure and post closure projects. Critiques for lessons learned regarding project activities are performed at the completion of each project milestone, and this critique interval allows for frequent recognition of lessons learned. In addition to project related lessons learned, ER also performs lessons learned critiques. T'he Savannah River Site (SRS) also obtains lessons learned information from general industry, commercial nuclear industry, naval nuclear programs, and other DOE sites within the complex. Procedures are approved to administer the lessons learned program, and a database is available to catalog applicable lessons learned regarding environmental remediation, restoration, and administrative activities. ER will continue to use this database as a source of information available to SRS personnel

  5. Making sense of institutional trust in organizations

    DEFF Research Database (Denmark)

    Fuglsang, Lars; Jagd, Søren

    2015-01-01

    and inter-organizational level. We suggest, however, that the actor-dimension of institutional-based trust is an underexplored issue in the literature. Quoting Fligstein, institutional theory needs to explain how ‘some social actors are better at producing desired social outcomes than are others’ (Fligstein......, 1997: 398). While Fligstein refers to actors who engage in ‘robust or local action’ we argue that actors who engage in (robust, local) sensemaking activities are better at (re)producing institutional-based trust. Particularly in situations when institutions are relatively unstable, unfamiliar...... to the actors and ambiguous, sensemaking strategies directed towards exploring the institutional foundations of trust at a local level can be an important basis of interpersonal trust-relations. First, based on a summary of studies of institutional-based trust we argue that an unresolved issue is how...

  6. Does Education Lead to Higher Generalized Trust?

    DEFF Research Database (Denmark)

    Charron, Nicholas; Rothstein, Bo

    2016-01-01

    Generalized trust has become a prominent concept at the nexus of several disciplines, and the wide differences in trust between different societies continue to puzzle the social sciences. In this study, we explore the effects of micro and macro level factors in explaining an individual's propensity...... to ‘trust others'. We hypothesize that higher levels of education will lead to higher social trust in individuals, given that the context (country or regions within countries) in which they reside has a sufficiently impartial and non-corrupt institutional setting. However, the positive effect of...... education on trust among individuals is expected to be negligible in contexts with greater levels of corruption and favoritism toward certain people are more inclined to view the system as ‘rigged' as they become more educated. This multi-level interaction effect is tested using original survey data of 85...

  7. Hybrid Trust Model for Internet Routing

    CERN Document Server

    Rantala, Pekka; Isoaho, Jouni

    2011-01-01

    The current Internet is based on a fundamental assumption of reliability and good intent among actors in the network. Unfortunately, unreliable and malicious behaviour is becoming a major obstacle for Internet communication. In order to improve the trustworthiness and reliability of the network infrastructure, we propose a novel trust model to be incorporated into BGP routing. In our approach, trust model is defined by combining voting and recommendation to direct trust estimation for neighbour routers located in different autonomous systems. We illustrate the impact of our approach with cases that demonstrate the indication of distrusted paths beyond the nearest neighbours and the detection of a distrusted neighbour advertising a trusted path. We simulated the impact of weighting voted and direct trust in a rectangular grid of 15*15 nodes (autonomous systems) with a randomly connected topology.

  8. Water-resisting ability of cemented broken rocks

    Institute of Scientific and Technical Information of China (English)

    Yu Bangyong; Chen Zhanqing; Yu Linli

    2016-01-01

    Using the self-designed testing system, the seepage tests for cemented broken rocks were conducted, and the impact of different factors on water-resisting ability was analyzed. The results show that (1) seepage process of the cemented broken rocks can be divided into two categories:in one category, seepage insta-bility occurs after a period of time, in the other, the permeability decreases slowly and tends to be stable, and seepage instability does not occur;(2) cementing performance of cementing agent and grain size dis-tribution are the decisive factors for water-resisting ability, with the increase of cementing performance and the mass percentage of large grains, the water-resisting ability of the specimen strengthens; (3) aggregate type has little effect on seepage stability, for the specimens with different aggregate types, the permeability and the duration of seepage instability have small difference; (4) initial porosity has a certain effect on the water-resisting ability of the specimen, but has no decisive role. With the increase of the initial porosity, the duration of seepage instability decreases.

  9. Soflty broken supersymmetry and the fine-tuning problem

    Energy Technology Data Exchange (ETDEWEB)

    Foda, O.E.

    1984-02-20

    The supersymmetry of the simple Wess-Zumino model is broken, in the tree-approximation, by adding all possible parity-even(mass)-dimension 2 and 3 terms. The model is then renormalized using BPHZ and the normal product algorithm, such that supersymmetry is only softly broken (in the original sense of Schroer and Symanzik). We show that, within the above renormalization scheme, none of the added breaking terms give rise to technical fine-tuning problems (defined in the sense of Gildener) in larger models, with scalar multiplets and hierarchy of mass scales, which is in contrast to what we obtain via analytic schemes such as dimensional renormalization, or supersymmetry extension of which. The discrepancy (which can be shown to persist in more general models) originates in the inherent local ambiguity in the finite parts of subtracted Feynman integrals. Emphasizing that the issue is purely technical (as opposed to physical) in origin, and that all physical properties are scheme-independent (as they should be), we conclude that the technical fine-tuning problem, in the specific sense used in this paper, being scheme dependent, is not a well-defined issue within the context of renormalized perturbation theory. 30 references.

  10. Integral-charge quarks and spontaneously broken color symmetry

    International Nuclear Information System (INIS)

    A unified model of strong and electromagnetic interactions with broken color symmetry and integral-charge quarks is discussed. In the framework of this model considered are the e+e- annihilation into hadrons, the radiative decays of heavy mesons and the anomalous magnetic moment of a muon. Basing on the method of the finite-energy sum rules the model in question is shown to satisfactorily describe the available experimental data on the e+e- annihilation into hadrons, provided the color symmetry breaking occurs at intervals by far exceeding 1 GeV-1. The perturbation theory is shown to be inapplicable to the integral-charge quark model for the calculation of the radiative decays of heavy mesons and the muon anomalous magnetic moment. Description of interactions at large intervals in the framework of broken color symmetry is, after all, reduced (just as in QCD) to the strong interaction problem, i.e. to the problem of total or partial confinement of quarks. The actual value of the integral-charge quark model is the introduction of new, as compared to QCD, degrees of freedom related with the scalar Higgs fields, and the final selection of a model needs a further theoretical analysis of the whole set of experimental data

  11. Large scale implementation of guided wave based broken rail monitoring

    Science.gov (United States)

    Burger, Francois A.; Loveday, Philip W.; Long, Craig S.

    2015-03-01

    A guided wave ultrasound system has been developed over the past 17 years to detect breaks in continuously welded rail track. Installation of the version 4 system on an 840 km long heavy duty freight line was conducted between January 2013 and June 2014. The system operates in pitch - catch mode with alternate transmit and receive transducers spaced approximately 1km apart. If the acoustic signal is not received at the receive station an alarm is triggered to indicate a break in the rail between the transmit station and the receive station. The system is permanently installed, powered by solar panels and issues broken rail alarms using the GSM network where available, and digital radio technology in other areas. A total of 931 stations were installed and the entire length of rail is interrogated every fifteen minutes. The system operates reliably although some problems involving unreliable GSM communication and theft of solar panels have been experienced. In the first two months of operation four broken rails were detected and train operation was halted temporarily for repairs.

  12. Soflty broken supersymmetry and the fine-tuning problem

    International Nuclear Information System (INIS)

    The supersymmetry of the simple Wess-Zumino model is broken, in the tree-approximation, by adding all possible parity-even[mass]-dimension 2 and 3 terms. The model is then renormalized using BPHZ and the normal product algorithm, such that supersymmetry is only softly broken (in the original sense of Schroer and Symanzik). We show that, within the above renormalization scheme, none of the added breaking terms give rise to technical fine-tuning problems (defined in the sense of Gildener) in larger models, with scalar multiplets and hierarchy of mass scales, which is in contrast to what we obtain via analytic schemes such as dimensional renormalization, or supersymmetry extension of which. The discrepancy (which can be shown to persist in more general models) originates in the inherent local ambiguity in the finite parts of subtracted Feynman integrals. Emphasizing that the issue is purely technical (as opposed to physical) in origin, and that all physical properties are scheme-independent (as they should be), we conclude that the technical fine-tuning problem, in the specific sense used in this paper, being scheme dependent, is not a well-defined issue within the context of renormalized perturbation theory. (orig.)

  13. Mass spectra in softly broken ${\\cal N}=2$ SQCD

    CERN Document Server

    Chernyak, Victor L

    2016-01-01

    Considered is ${\\cal N}=2\\,\\, SU(N_c)$ or $U(N_c)$ SQCD with $N_c+1broken down to ${\\cal N}=1$ by the mass term $\\mu_{\\rm x}{\\rm Tr} (X^2)$ of colored adjoint scalar partners of gluons, $\\mu_{\\rm x}\\ll\\Lambda_2$ ( $\\Lambda_2$ is the scale factor of the $SU(N_c)$ gauge coupling). There is a large number of different types of vacua in this theory with both unbroken and spontaneously broken global flavor symmetry $U(N_F)\\rightarrow U({\\rm n}_1)\\times U({\\rm n}_2)$. We consider in this paper the large subset of these vacua with the unbroken nontrivial $Z_{2N_c-N_F\\geq 2}$ discrete symmetry, at different hierarchies between the Lagrangian parameters $m\\gtrless\\Lambda_2,\\, \\mu_{\\rm x}\\gtrless m$. The forms of low energy Lagrangians, quantum numbers of light particles and mass spectra are described for all these vacua. Our results differ from corresponding results in recent papers arXiv:1304.0822; 1403.60...

  14. Broken Ergodicity in MHD Turbulence in a Spherical Domain

    Science.gov (United States)

    Shebalin, John V.; wang, Yifan

    2011-01-01

    Broken ergodicity (BE) occurs in Fourier method numerical simulations of ideal, homogeneous, incompressible magnetohydrodynamic (MHD) turbulence. Although naive statistical theory predicts that Fourier coefficients of fluid velocity and magnetic field are zero-mean random variables, numerical simulations clearly show that low-wave-number coefficients have non-zero mean values that can be very large compared to the associated standard deviation. In other words, large-scale coherent structure (i.e., broken ergodicity) in homogeneous MHD turbulence can spontaneously grow out of random initial conditions. Eigenanalysis of the modal covariance matrices in the probability density functions of ideal statistical theory leads to a theoretical explanation of observed BE in homogeneous MHD turbulence. Since dissipation is minimal at the largest scales, BE is also relevant for resistive magnetofluids, as evidenced in numerical simulations. Here, we move beyond model magnetofluids confined by periodic boxes to examine BE in rotating magnetofluids in spherical domains using spherical harmonic expansions along with suitable boundary conditions. We present theoretical results for 3-D and 2-D spherical models and also present computational results from dynamical simulations of 2-D MHD turbulence on a rotating spherical surface. MHD turbulence on a 2-D sphere is affected by Coriolus forces, while MHD turbulence on a 2-D plane is not, so that 2-D spherical models are a useful (and simpler) intermediate stage on the path to understanding the much more complex 3-D spherical case.

  15. Partnering for bioregionalism in England: a case study of the Westcountry Rivers Trust

    Directory of Open Access Journals (Sweden)

    Hadrian Cook

    2016-06-01

    Full Text Available The adoption of bioregionalism by institutions that are instrumental in river basin management has significant potential to resolve complex water resource management problems. The Westcountry Rivers Trust (WRT in England provides an example of how localized bioregional institutionalization of adaptive comanagement, consensus decision making, local participation, indigenous technical and social knowledge, and "win-win" outcomes can potentially lead to resilient partnership working. Our analysis of the WRT's effectiveness in confronting nonpoint source water pollution, previously impervious to centralized agency responses, provides scope for lesson-drawing on institutional design, public engagement, and effective operation, although some evident issues remain.

  16. Trust and Traditions in Transitions

    DEFF Research Database (Denmark)

    McQuaid, Sara Dybris

    On New Year’s Eve 2013, months of talks on ‘Dealing with the past’, ‘Flags’ and ‘Parades’ ended without agreement on how to move towards a reconciliation of positions in Northern Ireland. The failure of the talks illustrates the importance of culture and (mis)trust in divided societies, where pol...... recesses of memory in the current transition. And b) that patterns of ‘competitive commemoration’ in parades should be understood in relation to the increasing dissonance between vernacular languages of conflict and the official post-conflict discourses in Northern Ireland....... politics often pivot around whose culture shall be official and whose subordinated, whose history shall be remembered and whose forgotten (Jordan and Weedon 1995). These struggles are particularly intense in times of transition where traditions, power relations and frames of relevant remembrance are...

  17. Lessons from hydrodynamic turbulence

    International Nuclear Information System (INIS)

    Turbulent flows, with their irregular behavior, confound any single attempts to understand them. But physicists have succeeded in identifying some universal properties of turbulence and relating them to broken symmetries. (author)

  18. Lessons Learned in Engineering

    Science.gov (United States)

    Blair, J. C.; Ryan, R. S.; Schutzenhofer, L. A.

    2011-01-01

    This Contractor Report (CR) is a compilation of Lessons Learned in approximately 55 years of engineering experience by each James C. Blair, Robert S. Ryan, and Luke A. Schutzenhofer. The lessons are the basis of a course on Lessons Learned that has been taught at Marshall Space Flight Center. The lessons are drawn from NASA space projects and are characterized in terms of generic lessons learned from the project experience, which are further distilled into overarching principles that can be applied to future projects. Included are discussions of the overarching principles followed by a listing of the lessons associated with that principle. The lesson with sub-lessons are stated along with a listing of the project problems the lesson is drawn from, then each problem is illustrated and discussed, with conclusions drawn in terms of Lessons Learned. The purpose of this CR is to provide principles learned from past aerospace experience to help achieve greater success in future programs, and identify application of these principles to space systems design. The problems experienced provide insight into the engineering process and are examples of the subtleties one experiences performing engineering design, manufacturing, and operations.

  19. Genetic influences are virtually absent for trust.

    Directory of Open Access Journals (Sweden)

    Paul A M Van Lange

    Full Text Available Over the past decades, numerous twin studies have revealed moderate to high heritability estimates for individual differences in a wide range of human traits, including cognitive ability, psychiatric disorders, and personality traits. Even factors that are generally believed to be environmental in nature have been shown to be under genetic control, albeit modest. Is such heritability also present in social traits that are conceptualized as causes and consequences of social interactions or in other ways strongly shaped by behavior of other people? Here we examine a population-based sample of 1,012 twins and relatives. We show that the genetic influence on generalized trust in other people (trust-in-others: h2 = 5%, ns, and beliefs regarding other people's trust in the self (trust-in-self: h2 = 13%, ns, is virtually absent. As test-retest reliability for both scales were found to be moderate or high (r = .76 and r = .53, respectively in an independent sample, we conclude that all variance in trust is likely to be accounted for by non-shared environmental influences. We show that, relative to cognitive abilities, psychiatric disorders, and classic personality variables, genetic influences are smaller for trust, and propose that experiences with or observations of the behavior of other people shape trust more strongly than other traits.

  20. Trust and the transformation of energy systems

    Energy Technology Data Exchange (ETDEWEB)

    Rayner, Steve [James Martin Institute for Science and Civilization, Said Business School, Park End Street, Oxford, OX1 1HP (United Kingdom)

    2010-06-15

    The author looks at diverse concepts and roles of trust in the challenge of decarbonising energy systems, drawing on 25 years of personal experience in the fields of energy and environmental policy research. The paper focuses on three issues-public trust in science, institutional trust in making technology choices, and the idea that high-trust societies are more sustainable than those exhibiting low-trust. While trust is a key concept in understanding the public acceptability of technology choices, it is only one of a suite of interrelated concepts that must be addressed, which also includes liability, consent, and fairness. Furthermore, rational distrust among competing institutional world views may be critical in understanding the role of social capital in socioeconomic and technological development. Thus the concept of trust has become a portmanteau, carrying a diverse range of ideas and conditions for sustainable energy systems. The paper concludes with three emphases for decision makers. First, the issue is the energy system, not particular generating technologies. Second, the energy system must be recognized to be as much a social system as it is a technical one. Third, the system requires incorporation of the minimum level of diversity of engineering technologies and social actors to be sustainable. (author)

  1. Trust and cooperation: a new experimental approach.

    Science.gov (United States)

    Acedo, Cristina; Gomila, Antoni

    2013-09-01

    Several theories within different disciplines emphasize the role of trust in fostering cooperation in human social life. Despite differences, the core of these notions of trust is affectively motivated loyalty, which makes the individuals feel mutually committed and willing to accept vulnerability because of positive expectations about each other's behavior. In evolutionary game theory and experimental economics, the notion of trust is much simpler: it is an expectation about another's behavior, a kind of wager, in which the sense of mutual commitment and vulnerability is completely absent. In order to extend the paradigm of trust games typical in those fields to explore the fuller sense of trust relationships, we have developed a new experimental design, in which an iterated prisoner dilemma is played by participants who do or do not hold a trusting personal relationship, while anonymity is preserved. We present here the results of our two pilot studies, which indicate the relevance of personal trust in fostering cooperation and suggest the influence of the structure of social networks on the degree of cooperation achieved. PMID:25708082

  2. Trust and the transformation of energy systems

    International Nuclear Information System (INIS)

    The author looks at diverse concepts and roles of trust in the challenge of decarbonising energy systems, drawing on 25 years of personal experience in the fields of energy and environmental policy research. The paper focuses on three issues-public trust in science, institutional trust in making technology choices, and the idea that high-trust societies are more sustainable than those exhibiting low-trust. While trust is a key concept in understanding the public acceptability of technology choices, it is only one of a suite of interrelated concepts that must be addressed, which also includes liability, consent, and fairness. Furthermore, rational distrust among competing institutional world views may be critical in understanding the role of social capital in socioeconomic and technological development. Thus the concept of trust has become a portmanteau, carrying a diverse range of ideas and conditions for sustainable energy systems. The paper concludes with three emphases for decision makers. First, the issue is the energy system, not particular generating technologies. Second, the energy system must be recognized to be as much a social system as it is a technical one. Third, the system requires incorporation of the minimum level of diversity of engineering technologies and social actors to be sustainable.

  3. NASA Engineering Network Lessons Learned

    Data.gov (United States)

    National Aeronautics and Space Administration — The NASA Lessons Learned system provides access to official, reviewed lessons learned from NASA programs and projects. These lessons have been made available to the...

  4. How Does Social Trust Affect Economic Growth?

    DEFF Research Database (Denmark)

    Bjørnskov, Christian

    This paper connects two strands of the literature on social trust by estimating the effects of trust on growth through a set of potential transmission mechanisms directly. It does so by modelling the process using a three-stage least squares estimator on a sample of countries for which a full data...... set is available. The results indicate that trust affects schooling and the rule of law directly. These variables in turn affect the investment rate (schooling) and provide a direct effect (rule of law) on the growth rate. The paper closes with a short discussion of the relevance of the findings....

  5. Factors influencing trust of teachers among students

    Directory of Open Access Journals (Sweden)

    Kurnianingsih, Sri

    2012-01-01

    Full Text Available In Indonesia, Ki Hajar Dewantoro is one of the most respected scholars in education philosophy. He stated the importance of trust earned by teachers in guiding students in their learning activities. The teacher, as the leader in the class, needs to develop mutual trust between students and teachers. Trust to teachers is strongly required by students as a foundation in developing and expanding their relationship and also social network. It is also the fundamental element in their desire to pursue higher education, for it is only through a sense of trust that student will embrace an empowering sense of freedom and pursuit the knowledge. The exercise of this freedom requires a risk on behalf of students based on the trust of their teachers and the learning experience that they provide. If students trust their teachers, they will be more able to focus on the task at hand and to work and learn more effectively. A total number of 291 senior high school students in Yogyakarta (males=147, females=144 completed an open-ended questionnaire developed for this study that asks how much they trust their teachers and the reason why they trust their teachers. The data was analyzed using indigenous psychological approach of analyzing the content of open-ended responses, categorization of the responses and cross-tabulating with demographic/background information. Results indicated that 63% of participants stated that they trusted their teachers. The main reason for trusting their teachers are as follows: they are perceived as being similar to their parents, teachers’ ability in transferring knowledge, the relationship with teacher, and their abilities of guiding students. The study concluded that trust of senior high school students was established because of views that teachers are parents that have competence in delivering knowledge and are formally established as teachers. Therefore a teacher’s behavior that similarly represents a parent’s behavior at

  6. Communicating Trust Between Parents and Their Children

    DEFF Research Database (Denmark)

    Demant, Jakob Johan; Ravn, Signe

    2013-01-01

    This article discusses how Danish parents and their children communicate trust. Based on Niklas Luhmann’s sociological theory, the article explores new aspects of communication about alcohol-related rules. The analysis shows how the parents emphasize the importance of communicating trust, while the...... adolescents, on the other hand, observe the parents’ communication on the basis of their own, more instrumental, logic. Trust becomes a functional solution to the parents’ paradoxical situation, because it enables them to balance between a democratic family ideal, emphasizing the adolescents’ independence...

  7. Building Trust in High-Performing Teams

    OpenAIRE

    Aki Soudunsaari; Mila Hakanen

    2012-01-01

    Facilitation of growth is more about good, trustworthy contacts than capital. Trust is a driving force for business creation, and to create a global business you need to build a team that is capable of meeting the challenge. Trust is a key factor in team building and a needed enabler for cooperation. In general, trust building is a slow process, but it can be accelerated with open interaction and good communication skills. The fast-growing and ever-changing nature of global business sets dema...

  8. Gauge-Higgs unification with broken flavour symmetry

    International Nuclear Information System (INIS)

    We study a five-dimensional Gauge-Higgs unification model on the orbifold S1/Z2 based on the extended standard model (SM) gauge group SU(2)L x U(1)Y x SO(3)F. The group SO(3)F is treated as a chiral gauged flavour symmetry. Electroweak-, flavour- and Higgs interactions are unified in one single gauge group SU(7). The unified gauge group SU(7) is broken down to SU(2)L x U(1)Y x SO(3)F by orbifolding and imposing Dirichlet and Neumann boundary conditions. The compactification scale of the theory is O(1) TeV. Furthermore, the orbifold S1/Z2 is put on a lattice. This setting gives a well-defined staring point for renormalisation group (RG) transformations. As a result of the RG-flow, the bulk is integrated out and the extra dimension will consist of only two points: the orbifold fixed points. The model obtained this way is called an effective bilayered transverse lattice model. Parallel transporters (PT) in the extra dimension become nonunitary as a result of the blockspin transformations. In addition, a Higgs potential V(Φ) emerges naturally. The PTs can be written as a product eAyeηeAy of unitary factors eAy and a selfadjoint factor eη. The reduction 48 → 35 + 6 + anti 6 + 1 of the adjoint representation of SU(7) with respect to SU(6) contains SU(2)L x U(1)Y x SO(3)F leads to three SU(2)L Higgs doublets: one for the first, one for the second and one for the third generation. Their zero modes serve as a substitute for the SM Higgs. When the extended SM gauge group SU(2)L x U(1)Y x SO(3)F is spontaneously broken down to U(1)em, an exponential gauge boson mass splitting occurs naturally. At a first step SU(2)L x U(1)Y x SO(3)F is broken to SU(2)L x U(1)Y by VEVs for the selfadjoint factor eη. This breaking leads to masses of flavour changing SO(3)F gauge bosons much above the compactification scale. Such a behaviour has no counterpart within the customary approximation scheme of an ordinary orbifold theory. This way tree-level flavour-changing-neutral-currents are

  9. Broken-Plane Maneuver Applications for Earth to Mars Trajectories

    Science.gov (United States)

    Abilleira, Fernando

    2007-01-01

    Optimization techniques are critical when investigating Earth to Mars trajectories since they have the potential of reducing the total (delta)V of a mission. A deep space maneuver (DSM) executed during the cruise may improve a trajectory by reducing the total mission V. Nonetheless, DSMs not only may improve trajectory performance (from an energetic point of view) but also open up new families of trajectories that would satisfy very specific mission requirements not achievable with ballistic trajectories. In the following pages, various specific examples showing the potential advantages of the usage of broken plane maneuvers will be introduced. These examples correspond to possible scenarios for Earth to Mars trajectories during the next decade (2010-2020).

  10. Bounce and cyclic cosmology in weakly broken galileon theories

    CERN Document Server

    Banerjee, Shreya

    2016-01-01

    We investigate the bounce and cyclicity realization in the framework of weakly broken galileon theories. We study bouncing and cyclic solutions at the background level, reconstructing the potential that can give rise to a given scale factor, and presenting analytical expressions for the bounce requirements. We proceed to a detailed investigation of the perturbations, which after crossing the bouncing point give rise to various observables, such as the scalar and tensor spectral indices and the tensor-to-scalar ratio. Although the scenario at hand shares the disadvantage of all bouncing models, namely that it provides a large tensor-to-scalar ratio, introducing an additional light scalar significantly reduces it through the kinetic amplification of the isocurvature fluctuations.

  11. Locally Broken Crystal Symmetry Facilitates Singlet Exciton Fission.

    Science.gov (United States)

    Petelenz, Piotr; Snamina, Mateusz

    2016-05-19

    Photovoltaic yield is normally limited to at most two charge carriers per photon. In solid pentacene this limit may be potentially bypassed owing to singlet exciton fission into a pair of triplets. The process occurs via a superexchange mechanism mediated by charge-transfer (CT) configurations and is sensitive to their energies. As demonstrated recently, these strongly depend on the local environment of the two molecules on which the charges reside. Using a multiscale model, here we show that in the crystal bulk approximate local symmetry affects CT state energetics in a way unfavorable for fission, so that at the places where this symmetry is broken the fission probability is enhanced by up to an order of magnitude. These fission-favorable locations entail the vicinity of vacancies, specific impurities, and interfaces, such as crystallite boundaries. Hence, photovoltaic yield might be substantially increased by using nanoscopically disordered pentacene rather than highly ordered specimens. PMID:27152577

  12. Vector optical fields broken in the spatial frequency domain

    Science.gov (United States)

    Gao, Xu-Zhen; Pan, Yue; Li, Si-Min; Wang, Dan; Li, Yongnan; Tu, Chenghou; Wang, Hui-Tian

    2016-03-01

    We theoretically and experimentally explore the redistribution of polarization states and orbital angular momentum (OAM) in the output plane, induced by the symmetry breaking in the spatial frequency domain. When the vector fields are obstructed by sector-shaped filters in the spatial frequency domain, the local polarization states in the output plane undergo an abrupt transition from linear to circular polarization. The results reveal the polarization-dependent splitting and the appearance of a series of opposite OAMs in the output plane. We also find the self-healing effect of the vector fields broken in the spatial frequency domain and further explore its potential application. If the vector optical fields are used for information transferring or for imaging, even if the optical field carrying the information or image is partially blocked, the complete information or image can still be obtained, implying that which may increase the robustness of the information transferring and the imaging.

  13. Phases of holographic superconductors with broken translational symmetry

    CERN Document Server

    Baggioli, Matteo

    2015-01-01

    We consider holographic superconductors in a broad class of massive gravity backgrounds. These theories provide a holographic description of a superconductor with broken translational symmetry. Such models exhibit a rich phase structure: depending on the values of the temperature and the doping the boundary system can be in superconducting, normal metallic or normal pseudo-insulating phases. Furthermore the system supports interesting collective excitations of the charge carriers, which appears in the normal phase, persists in the superconducting phase, but eventually gets destroyed by the superconducting condensate. We also show the possibility of building a phase diagram of a system with the superconducting phase occupying a dome-shaped region, therefore resembling more of a real-world doped high-Tc superconductor.

  14. On a Broken Formal Symmetry between Kinetic and Gravitational Energy

    CERN Document Server

    Shirazi, Armin Nikkhah

    2010-01-01

    Historically, the discovery of symmetries has played an important role in the progress of our fundamental understanding of nature. This paper will demonstrate that there exists in Newtonian theory in a spherical gravitational field a formal symmetry between the kinetic (KE) and gravitational potential energy (GPE) of a test mass. Put differently, there exists a way of expressing GPE such that the form of the mathematical expression remains invariant under an interchange of KE and GPE. When extended to relativity by a suitable assumption, it leads to a framework that bridges the general relativistic and Newtonian conceptions of gravitational energy, even though the symmetry is broken except in the infinitesimal limit. Recognizing this symmetry at infinitesimal scales makes it possible to write a relativistic equation of an individual graviton, the properties of which under under one interpretation may be unexpected.

  15. Numerical and physical modelling of oil spreading in broken ice

    Energy Technology Data Exchange (ETDEWEB)

    Gjoesteen, Janne K. Oekland

    2002-07-01

    The present work focuses on oil spreading in broken ice and the content of this thesis falls into three categories: 1) The physical and numerical modelling of oil spreading in ice. 2) Ice models and parameters describing the ice cover. 3) Experiments on oil spreading in broken ice. A background study was carried out to investigate existing models for simulating oil in broken ice. Most of them describe motion of oil simply as a function of the ice motion and do not take advantage of the possibilities that recent ice models provide. We decided to choose another direction, starting from scratch with equations describing the flow of oil on top of a water surface. The equations were implemented numerically, including proper boundary conditions to account for the presence of physical restrictions in the form of ice floes in the simulation area. The implementation was designed to be able to apply data on ice motion calculated by an existing dynamic ice model. A first validation of the model was carried out using existing experimental data. As those data were obtained in a different setting, the recorded parameters and set-up of the experiment were not ideal for our purpose. However, we were able to conclude that our model behaviour was reasonable. We have carried out statistical analysis on meteorological data of wind speeds, temperatures, flow sizes and ice thickness to obtain probability distributions describing the parameters. Those data has been collected in the Pechora Sea. Wind and temperature had been recorded for a period of 30-40 years. For this region we also had available Argos satellite data from four buoys drifting in the ice in April-June 1998. The Argos data were carefully analysed to suggest probability distributions and return periods for certain speeds. (Indoor basin tests were carried out to obtain data on spreading of oil in broken ice. A set of 20 tests was conducted, each with different type of oil, ice concentration, slush concentration or ice

  16. Numerical and physical modelling of oil spreading in broken ice

    International Nuclear Information System (INIS)

    The present work focuses on oil spreading in broken ice and the content of this thesis falls into three categories: 1) The physical and numerical modelling of oil spreading in ice. 2) Ice models and parameters describing the ice cover. 3) Experiments on oil spreading in broken ice. A background study was carried out to investigate existing models for simulating oil in broken ice. Most of them describe motion of oil simply as a function of the ice motion and do not take advantage of the possibilities that recent ice models provide. We decided to choose another direction, starting from scratch with equations describing the flow of oil on top of a water surface. The equations were implemented numerically, including proper boundary conditions to account for the presence of physical restrictions in the form of ice floes in the simulation area. The implementation was designed to be able to apply data on ice motion calculated by an existing dynamic ice model. A first validation of the model was carried out using existing experimental data. As those data were obtained in a different setting, the recorded parameters and set-up of the experiment were not ideal for our purpose. However, we were able to conclude that our model behaviour was reasonable. We have carried out statistical analysis on meteorological data of wind speeds, temperatures, flow sizes and ice thickness to obtain probability distributions describing the parameters. Those data has been collected in the Pechora Sea. Wind and temperature had been recorded for a period of 30-40 years. For this region we also had available Argos satellite data from four buoys drifting in the ice in April-June 1998. The Argos data were carefully analysed to suggest probability distributions and return periods for certain speeds. (Indoor basin tests were carried out to obtain data on spreading of oil in broken ice. A set of 20 tests was conducted, each with different type of oil, ice concentration, slush concentration or ice

  17. Statistical Mechanics where Newton's Third Law is Broken

    Science.gov (United States)

    Ivlev, A. V.; Bartnick, J.; Heinen, M.; Du, C.-R.; Nosenko, V.; Löwen, H.

    2015-01-01

    There is a variety of situations in which Newton's third law is violated. Generally, the action-reaction symmetry can be broken for mesoscopic particles, when their effective interactions are mediated by a nonequilibrium environment. Here, we investigate different classes of nonreciprocal interactions relevant to real experimental situations and present their basic statistical mechanics analysis. We show that in mixtures of particles with such interactions, distinct species acquire distinct kinetic temperatures. In certain cases, the nonreciprocal systems are exactly characterized by a pseudo-Hamiltonian; i.e., being intrinsically nonequilibrium, they can nevertheless be described in terms of equilibrium statistical mechanics. Our results have profound implications, in particular, demonstrating the possibility to generate extreme temperature gradients on the particle scale. We verify the principal theoretical predictions in experimental tests performed with two-dimensional binary complex plasmas.

  18. Gauge-Higgs unification with broken flavour symmetry

    Energy Technology Data Exchange (ETDEWEB)

    Olschewsky, M.

    2007-05-15

    We study a five-dimensional Gauge-Higgs unification model on the orbifold S{sup 1}/Z{sub 2} based on the extended standard model (SM) gauge group SU(2){sub L} x U(1){sub Y} x SO(3){sub F}. The group SO(3){sub F} is treated as a chiral gauged flavour symmetry. Electroweak-, flavour- and Higgs interactions are unified in one single gauge group SU(7). The unified gauge group SU(7) is broken down to SU(2){sub L} x U(1){sub Y} x SO(3){sub F} by orbifolding and imposing Dirichlet and Neumann boundary conditions. The compactification scale of the theory is O(1) TeV. Furthermore, the orbifold S{sup 1}/Z{sub 2} is put on a lattice. This setting gives a well-defined staring point for renormalisation group (RG) transformations. As a result of the RG-flow, the bulk is integrated out and the extra dimension will consist of only two points: the orbifold fixed points. The model obtained this way is called an effective bilayered transverse lattice model. Parallel transporters (PT) in the extra dimension become nonunitary as a result of the blockspin transformations. In addition, a Higgs potential V({phi}) emerges naturally. The PTs can be written as a product e{sup A{sub y}}e{sup {eta}}e{sup A{sub y}} of unitary factors e{sup A{sub y}} and a selfadjoint factor e{sup {eta}}. The reduction 48 {yields} 35 + 6 + anti 6 + 1 of the adjoint representation of SU(7) with respect to SU(6) contains SU(2){sub L} x U(1){sub Y} x SO(3){sub F} leads to three SU(2){sub L} Higgs doublets: one for the first, one for the second and one for the third generation. Their zero modes serve as a substitute for the SM Higgs. When the extended SM gauge group SU(2){sub L} x U(1){sub Y} x SO(3){sub F} is spontaneously broken down to U(1){sub em}, an exponential gauge boson mass splitting occurs naturally. At a first step SU(2){sub L} x U(1){sub Y} x SO(3){sub F} is broken to SU(2){sub L} x U(1){sub Y} by VEVs for the selfadjoint factor e{sup {eta}}. This breaking leads to masses of flavour changing SO(3){sub F

  19. DualTrust: A Trust Management Model for Swarm-Based Autonomic Computing Systems

    Energy Technology Data Exchange (ETDEWEB)

    Maiden, Wendy M. [Washington State Univ., Pullman, WA (United States)

    2010-05-01

    Trust management techniques must be adapted to the unique needs of the application architectures and problem domains to which they are applied. For autonomic computing systems that utilize mobile agents and ant colony algorithms for their sensor layer, certain characteristics of the mobile agent ant swarm -- their lightweight, ephemeral nature and indirect communication -- make this adaptation especially challenging. This thesis looks at the trust issues and opportunities in swarm-based autonomic computing systems and finds that by monitoring the trustworthiness of the autonomic managers rather than the swarming sensors, the trust management problem becomes much more scalable and still serves to protect the swarm. After analyzing the applicability of trust management research as it has been applied to architectures with similar characteristics, this thesis specifies the required characteristics for trust management mechanisms used to monitor the trustworthiness of entities in a swarm-based autonomic computing system and describes a trust model that meets these requirements.

  20. Social Trust Aware Item Recommendation for Implicit Feedback

    Institute of Scientific and Technical Information of China (English)

    郭磊; 马军; 姜浩然; 陈竹敏; 邢长明

    2015-01-01

    Social trust aware recommender systems have been well studied in recent years. However, most of existing methods focus on the recommendation scenarios where users can provide explicit feedback to items. But in most cases, the feedback is not explicit but implicit. Moreover, most of trust aware methods assume the trust relationships among users are single and homogeneous, whereas trust as a social concept is intrinsically multi-faceted and heterogeneous. Simply exploiting the raw values of trust relations cannot get satisfactory results. Based on the above observations, we propose to learn a trust aware personalized ranking method with multi-faceted trust relations for implicit feedback. Specifically, we first introduce the social trust assumption — a user’s taste is close to the neighbors he/she trusts — into the Bayesian Personalized Ranking model. To explore the impact of users’ multi-faceted trust relations, we further propose a category-sensitive random walk method CRWR to infer the true trust value on each trust link. Finally, we arrive at our trust strength aware item recommendation method SocialBPRCRWR by replacing the raw binary trust matrix with the derived real-valued trust strength. Data analysis and experimental results on two real-world datasets demonstrate the existence of social trust influence and the effectiveness of our social based ranking method SocialBPRCRWR in terms of AUC (area under the receiver operating characteristic curve).

  1. 49 CFR 1013.2 - The irrevocability of the trust.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 8 2010-10-01 2010-10-01 false The irrevocability of the trust. 1013.2 Section... BOARD, DEPARTMENT OF TRANSPORTATION GENERAL RULES AND REGULATIONS GUIDELINES FOR THE PROPER USE OF VOTING TRUSTS § 1013.2 The irrevocability of the trust. (a) The trust and the nomination of the...

  2. Principal Leadership: Building Trust to Support School Improvement

    Science.gov (United States)

    Hallam, Pamela; Mathews, Joseph L.

    2008-01-01

    To develop trust, leaders must understand the determinants of a trusting organization. This study examined how an elementary school principal, new to a school that had been designated "in need of improvement," reacted to this status and worked to develop trust in a climate of low trust and increasing public accountability. Hoy and Tschannen-Moran…

  3. Collective Trust: Why Schools Can't Improve without It

    Science.gov (United States)

    Forsyth, Patrick B.; Adams, Curt M.; Hoy, Wayne K.

    2011-01-01

    The culmination of nearly three decades of research, "Collective Trust" offers new insight and practical knowledge on the social construction of trust for school improvement. The authors argue that "collective trust" is not merely an average trust score for a group, but rather an independent concept with distinctive origins and consequences. The…

  4. Institutional and social trust: Is there a causal relationship?

    DEFF Research Database (Denmark)

    Dinesen, Peter Thisted; Sønderskov, Kim Mannemar

    affecting both types of trust. Therefore, conventional analyses using cross-sectional data are ill-suited to determine whether institutional trust actually cause social trust. In contrast to previous analyses, this paper utilizes two Danish panel surveys containing measures of the two types of trust for the...

  5. UTILIZATION OF AMINO ACIDS OF BROKEN RICE IN GROWING PIGS

    Directory of Open Access Journals (Sweden)

    Matej Brestenský

    2014-02-01

    Full Text Available The six cannulated gilts (initial body weight 35.8 ± 0.5 kg fitted with a T-cannula in terminal ileum, were used to determine the apparent (AID and standardized (SID ileal digestibility of nitrogen (N and amino acids (AA in broken rice. Animals were fed twice daily in a two equal doses at a daily rate of 80 g.kg - 0.75. Water was offered ad libitum. The tested feed was the sole source of protein in the diet. The N-free diet was used to determine the ileal endogenous flow of AA and N. Chromium oxide (Cr2O3 was added to the diets as an indigestible marker in an amount of 0.3 % per kg of diet. After a 14 d postoperative period a 6 d adaptation period followed during which the animals were fed with an experimental diet. On d 7 ileal digesta was collected continuously for 24 h. The AID and SID of AA and N were calculated using analytically determined values of N, Cr2O3 and AA. The SID of AA was in a range from 81.6 % (tyrosine to 112.6 % (proline (P 0.05, respectively. There were no differences between standardized ileal digestibility of essential amino acids (94.3 % and nonessential amino acids (95.3 %. Regarding the ileal digestibility of AA, broken rice, a by-product from the food industry, is an appropriate source of digestible AA for growing pigs.

  6. Trust and Electronic Commerce in the Agrifood Sector. A Trust Model and Experimental Experiences

    OpenAIRE

    Fritz, Melanie; Hausen, Tobias; Schiefer, Gerhard; Canavari, Maurizio

    2005-01-01

    Opportunities coming from electronic commerce provide interesting support options for the Agrifood sector. However, due to the product specific information asymmetry in the agrifood sector, the anonymity of the medium creates a lack of trust increasing transaction costs to engage in e-commerce. This paper develops a trust model for electronic commerce in the agrifood industry allowing for the analysis of trust determinants in traditional agrifood transaction relationships and their transfer t...

  7. Trust-in-the-Middle: Towards Establishing Trustworthiness of Authentication Proxies using Trusted Computing

    OpenAIRE

    Uzunay, Yusuf; Bicakci, Kemal

    2015-01-01

    Authentication proxies, which store users' secret credentials and submit them to servers on their behalf, offer benefits with respect to security of the authentication and usability of credential management. However, as being a service that is not in control of users, one important problem they suffer is the trust problem; how users trust that their secrets are handled securely in the proxy and not revealed to third parties. In this paper, we present a solution called Trust-in-the-Middle, a T...

  8. Administrational Trust: An empirical examination of interorganisational trust and distrust in the Flemish administration

    OpenAIRE

    Oomsels, Peter

    2016-01-01

    This dissertation focuses on interorganisational trust in the Flemish public administration, and is the result of a four-year research project in the framework of the Flemish Policy Research Centre – Governmental Organisation – Decisive Governance (2012-2015). The objectives of our research were threefold: 1) to define and identify interorganisational trust in the empirical reality of public administration, 2) to explain the mechanisms of interorganisational trust in the empirical reality of...

  9. The Generalization of Particularized Trust. Paramilitarism and Structures of Trust in Colombia

    OpenAIRE

    Jan Boesten

    2014-01-01

    This paper examines the relation between the politics of state formation and the accompanying appearance of social traps based on the example of Colombia. It shows that egregious exceptions to the rule of law, exemplified by the parapolitica and "false positives" scandals, are themselves a result of "social traps," which are generated by the generalization of particularized trust. The generalization of particularized trust entails the incorporation of a closed trust network in the effort of m...

  10. SERVANT LEADERSHIP AND ORGANIZATIONAL TRUST: THE MEDIATING EFFECT OF THE LEADER TRUST AND ORGANIZATIONAL COMMUNICATION

    OpenAIRE

    Morad Rezaei; Sajjad Salehi; Masomeh Shafiei; Somaye Sabet

    2012-01-01

    The purpose of this paper aims to clarify the relationship between servant leadership and organizational trust, and tries to demonstrate the mediator role of leader trust and organizational communication in this relationship. The study sample included 258 employees of Guilan province Tax Administration and for sampling we used cluster method. Previous studies have also focused on the positive impact of servant leadership in organizational trust and in this article the results show that there ...

  11. The Trust Paradox: A Survey of Economic Inquiries Into the Nature of Trust and Trustworthiness

    OpenAIRE

    Harvey James

    2002-01-01

    This paper examines the concepts of trust and trustworthiness in the context of a one-sided variation of the prisoner's dilemma, and it evaluates four different categories of solutions to the PD problem: changing player preferences, enforcing explicit contracts, establishing implicit contracts, and repeating the interaction of the players. Because these solutions rely on the creation of incentives to induce cooperation, this paper articulates a paradox of trust in that if one trusts another b...

  12. Formation of coated vesicles from coated pits in broken A431 cells

    OpenAIRE

    1989-01-01

    Biochemical and morphological techniques were used to demonstrate the early steps in the endocytosis of transferrin in broken A431 cells. After binding 125I-transferrin, the cells were broken by scraping and then warmed. 125I-transferrin became inaccessible to exogenous anti- transferrin antibody providing a measure of the internalization process. Parallel morphological experiments using transferrin coupled to horseradish peroxidase confirmed internalization in broken cells. The process was c...

  13. Net Benefits from growing lucerne (Medicago sativa) on the Broken Plains of north eastern Victoria

    OpenAIRE

    Trapnell, Lindsay N.; Malcolm, Bill

    2008-01-01

    Clearing of trees and native vegetation over the past 160 years has led to increasing rates of dryland salinization in the Goulburn-Broken Catchment area. In its dryland section, within the Goulburn Highlands, South West Goulburn, and the Broken Highlands subcatchments, hydrologic balance exists. But in the Riverine Plains comprising the Goulburn and Broken Plains sub-catchments, where average annual rainfalls are less than 600 mm per annum, it will be many decades before hydrologic balance i...

  14. Trust- and Location-Based Recommendations for Tourism

    Science.gov (United States)

    Hinze, Annika; Quan, Qiu

    Recommender systems in a travel guide suggest touristic sites a user may like. Typically, people are more willing to trust recommendations from people they know. We present a trust-based recommendation service for a mobile tourist guide that uses the notion of directly and indirectly trusted peers. The recommendations combine information about the peers' ratings on sights, interpersonal trust and geographical constraints. We created two trust propagation models to spread trust information throughout the traveller peer group. Our prototype supports six trust-based, location-aware recommendation algorithms.

  15. BIOS Security Analysis and a Kind of Trusted BIOS

    Science.gov (United States)

    Zhou, Zhenliu; Xu, Rongsheng

    The BIOS's security threats to computer system are analyzed and security requirements for firmware BIOS are summarized in this paper. Through discussion about TCG's trust transitivity, a new approach about CRTM implementation based on BIOS is developed. In this paper, we also put forward a new trusted BIOS architecture-UTBIOS which is built on Intel Framework for EFI/UEFI. The trustworthiness of UTBIOS is based on trusted hardware TPM. In UTBIOS, trust encapsulation and trust measurement are used to construct pre-OS trust chain. Performance of trust measurement is also analyzed in the end.

  16. Making Sense of Context as a Basis for Trust

    DEFF Research Database (Denmark)

    Fuglsang, Lars; Jagd, Søren

    institutional trust raises the more general question of how we may understand the role of context in interpersonal trust relations. The paper attempts to fill the gap in the organizational trust literature, between interpersonal and institutional trust research, by investigating the more general problem of the......The concept of interpersonal trust has been important in organizational trust research for at least a decade, but recently a growing literature is stressing the need to focus more on the institutional dimensions of trust-creation. The opposition between traditions stressing either interpersonal or...... link between context and organizational trust processes. The notion of context is highly important for understanding trust processes in modern organizations, but remains largely absent in trust research. The present study proposes applying the sensemaking approach as a ‘bridging construct’ (Floyd et al...

  17. Online health information - what can you trust?

    Science.gov (United States)

    ... this page: //medlineplus.gov/ency/patientinstructions/000869.htm Online health information - what can you trust? To use ... schools, professional health organizations, and hospitals often provide online health content. Look for ".gov," ".edu," or ".org" ...

  18. How Does Social Trust Affect Economic Growth?

    DEFF Research Database (Denmark)

    Bjørnskov, Christian

    Social capital in the form of generalized trust has been shown to be a determinant of economic growth in a number of studies. Other studies have explored other consequences of trust, such as its effects on governance, corruption, education and investment. This paper connects the two strands of...... literature by estimating the effects of trust on growth through a set of potential transmission mechanisms directly. It does so by modelling the process using a three-stage least squares estimator on a sample of countries for which a full data set is available. The results indicate that trust affects...... schooling and the rule of law directly. These variables in turn affect the investment rate (schooling) and provide a direct effect (rule of law) on the growth rate. The paper closes with a short discussion of the relevance of the findings....

  19. Mediated Trust in the Innovation Ecosystem

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    besides industry, state and academia. In this paper, the concept mediated trust refers to the process in which an independent institution produces a form of mass medium. As is the case with any message, the content of the mass media is coded so that it signals to what degree information and/or opinions......This paper introduces a framework for further studies in the role of mediated trust in the innovation ecosystems. Combining insight from scholars like Etzkowitz, Russel and Nordfors, the concept of innovation ecosystem is described as an extended Triple Helix where media is seen as a fourth strand...... should be considered trustworthy. When receiving the message, the audience will decode the signals. Trust is considered fundamental for mass media if these are to fulfill their normative functions in the innovation ecosystem. However, the concept of trust is not clearly defined in the literature and we...

  20. Usability and trust in e-banking.

    Science.gov (United States)

    Pravettoni, Gabriella; Leotta, Salvatore Nuccio; Lucchiari, Claudio; Misuraca, Raffaella

    2007-12-01

    This study assessed the role of usability in trust of e-banking services. A questionnaire was administered to 185 Italian undergraduate working students who volunteered for the experiment (M age = 30.5 yr., SD = 3.1). Participants were differentiated on computer ability (Expert, n = 104; Nonexpert, n = 81) and e-banking use (User, n = 93; Nonusers, n = 92). Analysis showed that the website usability of e-banking services did not play a very important role for the User group. Instead, institution-based trust, e.g., the trust in the security policy of the Web merchant, customers, and the overall trust of the bank were the crucial factors in the adoption of e-banking. PMID:18361127

  1. Trust in Co-sourced Software Development

    DEFF Research Database (Denmark)

    Schlichter, Bjarne Rerup; Persson, John Stouby

    Software development projects are increasingly geographical distributed with offshoring. Co-sourcing is a highly integrative and cohesive approach, seen successful, to software development offshoring. However, research of how dynamic aspects of trust are shaped in co-sourcing activities is limited....... We present a case study of how the co-sourcing relationship between a certified CMMI-level 5 Danish software company and an offshoring supplier can be conceptualized as an Abstract System. An Abstract System is a dis-embedded social system (such as banking) that is trusted despite lack of detailed...... understanding or personal trust relations. The paper suggests how certain work practices among developers and managers can be explained using a dynamic trust lens based on Abstract Systems, especially dis- and re-embedding mechanisms...

  2. Trust and Coordination in Offshore Outsourcing

    DEFF Research Database (Denmark)

    Tøth, Thomas

    the implementation of handover meetings affected Danish employees' perception of their Indian counterparts in terms of work attitude, competence and reliability - and ultimately how these handover meetings increased the Danish employees' willingness and ability to trust their Indian counterparts...

  3. Public Trust Doctrine Implications of Electricity Production

    DEFF Research Database (Denmark)

    Noel, Lance Douglas; Firestone, Jeremy

    2015-01-01

    ’s impact on those two areas and the comparatively smaller impacts of renewable energy, electricity production has garnered very little public trust doctrine attention. This Article examines how electricity production implicates the public trust doctrine, primarily through the lens of four states...... development; (2) as a legal defense for states to validate actions encouraging renewable electricity development; (3) as a means for courts to more closely scrutinize electricity decisions made by the state; and (4) as an opportunity for state agencies to supplement and guide imperfect statutes. Together......, these four purposes of the public trust can ensure reasonable and timely development of renewable electricity as well as sufficient protection of trust resources....

  4. Corruption, Trust and their Public Sector Consequences

    DEFF Research Database (Denmark)

    Fritzen, Scott A.; Serritzlew, Søren; Svendsen, Gert Tinggaard

    2014-01-01

    Corruption and trust are two important determinants of the quality of public sectors. Empirical studies in different literatures suggest that corruption and trust have effects on factors such as economic growth, the quality of democratic institutions, life quality, the size and effectiveness of the...... public sector and much more. The purpose of this special issue – one that goes to the heart of the comparative policy ethos which is central to the journal’s mission – is to draw on a number of country examples to shed light on the state of the literature on the connection between corruption and trust....... The aim is to show that these two concepts are highly relevant to each other, and that their interconnections are important to understand the public sector consequences of corruption and trust. By focusing on these concepts, we hope that this special issue can pave the road for further comparative...

  5. Trusting Relationships in the NATO Alliance

    DEFF Research Database (Denmark)

    Keating, Vincent Charles

    – particularly given the historical (and even current) animosities between some of the member states. How is it that so many states can work together given the structural bias towards distrust in the international system? Given the goal of the papers on this panel to investigate how NATO might in fact facilitate...... trust-building among its members, this paper represents an initial attempt to consider how the question of trust can be considered with respect to the existing literature on both alliances and NATO. In doing so, it brings together three literatures: trust theory, alliance theory, and NATO studies, in...... order to reveal the points of intersection that might help us to understand how and why trusting relationships can be formed within the NATO alliance....

  6. On the deployment of Mobile Trusted Modules

    CERN Document Server

    Schmidt, Andreas U; Kasper, Michael

    2007-01-01

    In its recently published TCG Mobile Reference Architecture, the TCG Mobile Phone Work Group specifies a new concept to enable trust into future mobile devices. For this purpose, the TCG devises a trusted mobile platform as a set of trusted engines on behalf of different stakeholders supported by a physical trust-anchor. In this paper, we present our perception on this emerging specification. We propose an approach for the practical design and implementation of this concept and how to deploy it to a trustworthy operating platform. In particular we propose a method for the take-ownership of a device by the user and the migration (i.e., portability) of user credentials between devices.

  7. HYBRID TRUST MODEL FOR INTERNET ROUTING

    Directory of Open Access Journals (Sweden)

    Pekka Rantala

    2011-05-01

    Full Text Available The current Internet is based on a fundamental assumption of reliability and good intent among actors inthe network. Unfortunately, unreliable and malicious behaviour is becoming a major obstacle forInternet communication. In order to improve the trustworthiness and reliability of the networkinfrastructure, we propose a novel trust model to be incorporated into BGP routing. In our approach,trust model is defined by combining voting and recommendation to direct trust estimation for neighbourrouters located in different autonomous systems. We illustrate the impact of our approach with cases thatdemonstrate the indication of distrusted paths beyond the nearest neighbours and the detection of adistrusted neighbour advertising a trusted path. We simulated the impact of weighting voted and directtrust in a rectangular grid of 15*15 nodes (autonomous systems with a randomly connected topology.

  8. 14 CFR 47.8 - Voting trusts.

    Science.gov (United States)

    2010-01-01

    ... Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION AIRCRAFT AIRCRAFT... each voting trustee is not a past, present, or prospective director, officer, employee, attorney, or... prospective beneficiary, creditor, debtor, supplier or contractor of any other party to the trust...

  9. The Contextual Antecedents of Organizational Trust

    DEFF Research Database (Denmark)

    Li, Peter Ping; Bai, Yuntao; Xi, Youmin

    2012-01-01

    cultural norm at the organizational level, on organizational trust directly, and their behavioural outcomes at the individual level indirectly, using organizational trust as a cross-level mediator. The empirical results, based on a hierarchical linear model with a sample of 444 employees from 82 firms in......In this article we seek to explore the contextual antecedents of organizational trust. In light of the complex links between organizational contexts and organizational behaviours, we focus on the effects of the three most critical contextual antecedents, i.e., leadership role, structural rule, and...... China, lent support for our multidimensional cross-level model of context–trust–behaviour link. We extend the research on organizational trust by treating it as a cross-level phenomenon and by specifying its core contextual antecedents and behavioural consequences....

  10. Trust in Co-sourced Software Development

    DEFF Research Database (Denmark)

    Schlichter, Bjarne Rerup; Persson, John Stouby

    2014-01-01

    Software development projects are increasingly geographical distributed with offshoring. Co-sourcing is a highly integrative and cohesive approach, seen successful, to software development offshoring. However, research of how dynamic aspects of trust are shaped in co-sourcing activities is limited....... We present a case study of how the co-sourcing relationship between a certified CMMI-level 5 Danish software company and an offshoring supplier can be conceptualized as an Abstract System. An Abstract System is a dis-embedded social system (such as banking) that is trusted despite lack of detailed...... understanding or personal trust relations. The paper suggest how certain work practices among developers and managers can be explained using a dynamic trust lens based on Abstract Systems, especially dis- and re-embedding mechanisms....

  11. Toward designing for trust in database automation

    International Nuclear Information System (INIS)

    Appropriate reliance on system automation is imperative for safe and productive work, especially in safety-critical systems. It is unsafe to rely on automation beyond its designed use; conversely, it can be both unproductive and unsafe to manually perform tasks that are better relegated to automated tools. Operator trust in automated tools mediates reliance, and trust appears to affect how operators use technology. As automated agents become more complex, the question of trust in automation is increasingly important. In order to achieve proper use of automation, we must engender an appropriate degree of trust that is sensitive to changes in operating functions and context. In this paper, we present research concerning trust in automation in the domain of automated tools for relational databases. Lee and See have provided models of trust in automation. One model developed by Lee and See identifies three key categories of information about the automation that lie along a continuum of attributional abstraction. Purpose-, process-and performance-related information serve, both individually and through inferences between them, to describe automation in such a way as to engender r properly-calibrated trust. Thus, one can look at information from different levels of attributional abstraction as a general requirements analysis for information key to appropriate trust in automation. The model of information necessary to engender appropriate trust in automation [1] is a general one. Although it describes categories of information, it does not provide insight on how to determine the specific information elements required for a given automated tool. We have applied the Abstraction Hierarchy (AH) to this problem in the domain of relational databases. The AH serves as a formal description of the automation at several levels of abstraction, ranging from a very abstract purpose-oriented description to a more concrete description of the resources involved in the automated process

  12. The Development of a Model to evaluate Online Trust

    OpenAIRE

    Hossein Miladian; Nagendra Babu K.

    2009-01-01

    Trust issue is developing into an important topic as the internet becomes increasingly ubiquitous within everyday life, although many discussions of online trust focus on salient factors influencing trust. To address this matter, we develop a conceptual model that links consumer perceptions of web site characteristics and consumer characteristics to perceptions of trust in a web site, and links online trust to behavioral intent related to a web site. We estimate this model in a large-scale em...

  13. Matrix powers algorithms for trust evaluation in PKI architectures

    OpenAIRE

    Dumas, Jean-Guillaume; Hossayni, Hicham

    2011-01-01

    This paper deals with the evaluation of trust in public-key infrastructures. Different trust models have been proposed to interconnect the various PKI components in order to propagate the trust between them. In this paper we provide a new polynomial algorithm using linear algebra to assess trust relationships in a network using different trust evaluation schemes. The advantages are twofold: first the use of matrix computations instead of graph algorithms provides an optimized computational so...

  14. Matrix Powers algorithm for trust evaluation in PKI architectures

    CERN Document Server

    Dumas, Jean-Guillaume

    2011-01-01

    Public-Key Infrastructures (PKI) are considered as the safeguard of the security of communications on large scales networks like Internet. Different trust models have been proposed to interconnect the various PKIs components in order to propagate the trust between them. This paper provides a simple model for trust and reputation management in PKI architectures, and a new algorithm to assess trust relationships in a network using different trust evaluation schemes.

  15. FACTORS DETERMINING CUSTOMER TRUST IN ONLINE TRAVEL SHOPPING

    OpenAIRE

    Manocha, Annum

    2008-01-01

    ABSTRACT The purpose of this study was to determine the dimensions of customer trust in the context of Internet travel shopping. Based on the related literature on relationship marketing in online as well as offline contexts, the study proposed four main factors affecting customer trust towards Internet-based travel Websites. These are perceived quality of travel Web services, institution-based trust, calculative-based trust and trusting beliefs of the online vendor. The study began b...

  16. How Trust in Social Dilemmas Evolves with Age

    OpenAIRE

    Kocher, Martin G.

    2015-01-01

    While trust and trustworthiness provide a fundamental foundation for human relationships, little is known about how trusting and trustworthy behavior in social dilemmas is related to age and aging. A few papers use data from surveys such as the World Values Survey to address a potential connection between trust and age. In this chapter, we will mainly focus on trusting and trustworthy behavior elicited with the use of the seminal trust game (Berg et al., 1995) and with games implementing a si...

  17. Website design and trust across cultures

    OpenAIRE

    Cyr, Dianne

    2010-01-01

    The paper provides an overview of culture related to website design and website trust. This is followed by the documentation of previously unpublished results from cross-cultural comparisons of user reactions to websites related to risk and vendor legitimacy, information privacy and quality, and transaction security. In addition, results are reported for how various design elements statistically impact online trust in Canada, Germany, and China. The paper concludes with sugg...

  18. Yoga beyond wellness: Meditation, trust and cooperation

    OpenAIRE

    Di Bartolomeo Giovanni; Papa Stefano; Bellomo Saverio

    2012-01-01

    Our research aims to find out whether meditation has a positive impact on trust and cooperation. By comparing the behavior of agents exposed to meditation before playing an investment game to others not exposed, we find that the formers show more trust on average than the latters. Meditation seems to reduce risk aversion and “competitiveness” among people inducing agents to behave in a more cooperative (and efficient) way.

  19. Why we need an environmental trust fund

    International Nuclear Information System (INIS)

    This paper examines the reasons for considering environmental externalities in integrated resource planning by utilities in order to fully reflect the environmental costs of producing power in the consumers prices. The author advocates the establishing of an environmental trust fund with revenues from an assessed cost for environmental externalities. The trust fund would be available for environmental mitigation, environmental redress, research and development into resources that reduce pollution, including renewables and energy efficiency, and public education on energy and environmental costs

  20. The Relationship between Teamwork and Organizational Trust

    OpenAIRE

    Musab Işık; Kürşad Timuroğlu; Yussuf Aliyev

    2015-01-01

    The aim of this study is to investigate the relationship between teamwork and organizational trust. In the implementation section the data from the survey of 250 workers is employed in call centers in Erzurum by using relevant statistical methods. Consequently, it is found that there is a positive and significant relationship between teamwork and organizational trust. Thus, the hypothesis of the study is supported as it was expected. Besides, it is found that there are positive and significan...

  1. Procedural justice, trust and institutional legitimacy

    OpenAIRE

    Hough, Mike; Jackson, Jonathan; Bradford, Ben; Myhill, Andy; Quinton, Paul

    2010-01-01

    This paper summarising ‘procedural justice’ approaches to policing, contrasting these to the more politically dominant discourse about policing as crime control. It argues that public trust in policing is needed partly because this may result in public cooperation with justice, but more importantly because public trust in justice builds institutional legitimacy and thus public compliance with the law, and commitment to, the rule of law. Some recent survey findings are presented in support of ...

  2. Internet Banking Security Strategy: Securing Customer Trust

    OpenAIRE

    2012-01-01

    Internet banking strategies should enhance customers¡¯ online experiences which are affected by trust and security issues. This study provides perspectives of users and nonusers on internet banking security with a view to understanding trust and security factors in relation to adoption and continuous usage. Perception of internet banking security influenced usage intentions. Nonusers viewed internet banking to be insecure but users perceived it to be secure with perceived ease of use influenc...

  3. Patient care: Is interpersonal trust missing?

    Directory of Open Access Journals (Sweden)

    Paul A Bourne

    2010-01-01

    Full Text Available Background : Health statistics and studies in the Caribbean have omitted interpersonal trust in their investigations. Aims : This study will examine the effect of interpersonal trust and other conditions on psychosocial subjective wellbeing and self-reported health, in order to assess the significance of interpersonal trust, as well as other socio-demographic factors on health. Materials and Method : The current study utilized primary data commissioned by the Centre of Leadership and Governance, Department of Government, the University of West Indies, Mona, Jamaica, between July and August 2006. It was a nationally representative probability sampling survey. A sample of 1,338 respondents was interviewed with a detailed 166-item questionnaire. Results : Generally, the psychosocial subjective wellbeing of Jamaicans was high (mean = 6.8 ΁ 1.8, and self-reported health was moderately high (mean = 6.3 ΁ 2.6. The current study has revealed that income, political system, subjective social class, employment status, and interpersonal trust determine psychosocial subjective wellbeing as well as self-reported health. Interpersonal trust accounted for between 9.4 to 10.4% of the explanatory power of the wellbeing and self-reported health of Jamaicans. Conclusion : The current study highlights that the determinants of health include interpersonal trust. It is critical to point out here that trust must be taken into consideration in any evaluation of health statistics, as it is a factor of subjective wellbeing and health. It is within this context that clinicians need to incorporate interpersonal trust along with other conditions, as it is a part of the psychosocial determinants of health, subjective wellbeing, and health treatment.

  4. Patient care: Is interpersonal trust missing?

    Directory of Open Access Journals (Sweden)

    Paul A. Bourne

    2010-03-01

    Full Text Available Background: Health statistics and studies in the Caribbean have omitted interpersonal trust in their investigations. Aims: This study will examine the effect of interpersonal trust and other conditions on psychosocial subjective wellbeing and self-reported health, in order to assess the significance of interpersonal trust, as well as other socio-demographic factors on health. Materials and Method: The current study utilized primary data commissioned by the Centre of Leadership and Governance, Department of Government, the University of West Indies, Mona, Jamaica, between July and August 2006. It was a nationally representative probability sampling survey. A sample of 1,338 respondents was interviewed with a detailed 166-item questionnaire. Results: Generally, the psychosocial subjective wellbeing of Jamaicans was high (mean = 6.8 ± 1.8, and self-reported health was moderately high (mean = 6.3 ± 2.6. The current study has revealed that income, political system, subjective social class, employment status, and interpersonal trust determine psychosocial subjective wellbeing as well as self-reported health. Interpersonal trust accounted for between 9.4 to 10.4% of the explanatory power of the wellbeing and self-reported health of Jamaicans. Conclusion: The current study highlights that the determinants of health include interpersonal trust. It is critical to point out here that trust must be taken into consideration in any evaluation of health statistics, as it is a factor of subjective wellbeing and health. It is within this context that clinicians need to incorporate interpersonal trust along with other conditions, as it is a part of the psychosocial determinants of health, subjective wellbeing, and health treatment.

  5. Public trust in Dutch health care.

    OpenAIRE

    Straten, G.F.M.; Friele, R.D.; Groenewegen, P. P.

    2002-01-01

    This article describes the development of a valid and reliable instrument to measure different dimensions of public trust in health care in the Netherlands. This instrument is needed because the concept was not well developed,or operationalized in earlier research. The new instrument will be used in a research project to monitor trust and to predict behaviour of people such as consulting ‘‘alternative practitioners’’. The idea for the research was suggested by economic research into public tr...

  6. Accounting research and trust: a literature review

    OpenAIRE

    Gudrun Baldvinsdottir; Andreas Hagberg; Inga-Lill Johansson; Kristina Jonäll; Jan Marton

    2011-01-01

    Purpose – The purpose of this paper is to provide a structured overview of literature in the nexus of trust and accounting. This can serve as a basis for future research, and thus provide a framework for asking more precise and focused research questions. Design/methodology/approach – All papers published in prominent accounting journals during a 15-year period were examined. Papers pertaining to the field of trust and accounting were categorized and analyzed in more detail, and qualitatively...

  7. 产品伤害危机后消费者信任修复策略研究%The Study on the Consumer Trust Repair Strategy after Product-harm Crises

    Institute of Scientific and Technical Information of China (English)

    熊焰; 钱婷婷

    2012-01-01

    Product-harm crisis which is caused by harms to consumers such as quality,servme,behavlor and many other aspects of related products, can bring about disastrous effects on the enterprise. The most direct impact of them is harmness of consumers' trust. Consumers' trust is one of the most valuable intangible resources for the enterprise, the study indicates that the consumer product the essence of product-harm crises is trust crisis. purchase decision is based on the trust to a large extent, Since 2006, SKII, KFC, Sanlu, Guangming, Toyota Motor and some other famous enterprises have broken out crisis successively, compared to previous, the amount of enterprises that are bothered by product-harm crisis and its frequency is increasing, the harm is continued deteriorating. Some enterprises respond properly and get through the crisis successfully, but others not. Therefore how to repair consumer trust in product harm crisis has practical application value. Researchers has given more and more attention to product-harm crisis, the situational crisis communication theory (SCCT) which is presented by Coombs(2007)has achieved extensive attention. The theory is based on the integration of existing results about crisis management, consider that when we do some crisis management, we must think over some crisis situation,crisis response strategy,matching system of crisis scenarios and crisis response strat- egies, etc. SCCT has considered various factors and their integration, is in accord with realistic scenario, and is recognized by many studies. However, the management of repair trust is rarely taken as the key variable in the existing research of product harm crisis. The present study is based on the situational crisis communication theory. It focus on the effectiveness of repairing the consumer trust by three response to crisis strategies put forward by the theory. At the same time, it is put in different critical situations which are divided by the types of

  8. Towards Trusted Network Access Control

    Science.gov (United States)

    Bente, Ingo; von Helden, Josef

    Network Access Control (NAC) solutions promise to significantly increase the security level of modern networks. In short, they allow to measure the integrity state of an endpoint that tries to get access to the network. Based upon the measurement results, which are compared to a defined NAC policy, access to the network can be allowed or denied. One problem of all currently available NAC solutions is referred to as the “lying endpoint” problem. Normally, special software components are responsible for gathering the relevant integrity information on the endpoint. If an attacker modifies those software components, an endpoint can lie about its current integrity state. Therefore, endpoints which are not compliant to the defined NAC policy can get access to the network. Those endpoints must be considered as potential threat. This paper summarizes a possible solution for the lying endpoint problem based upon the specifications of the Trusted Computing Group (TCG) and the results of the two research projects TNC@ FHH and Turaya. The goal is to develop an open source, TNC compatible NAC solution with full TPM support within a new research project: tNAC.

  9. Lessons in Everyday Leadership

    Science.gov (United States)

    Boesch, Kit

    2009-01-01

    In this article, the author presents and discusses some of the lessons she has learned in everyday leadership. It's the kind of leadership one learns when he or she doesn't expect it--and the kind of lessons one teaches when he or she doesn't even know he or she is doing it.

  10. Automatic Dance Lesson Generation

    Science.gov (United States)

    Yang, Yang; Leung, H.; Yue, Lihua; Deng, LiQun

    2012-01-01

    In this paper, an automatic lesson generation system is presented which is suitable in a learning-by-mimicking scenario where the learning objects can be represented as multiattribute time series data. The dance is used as an example in this paper to illustrate the idea. Given a dance motion sequence as the input, the proposed lesson generation…

  11. Don Quixote. [Lesson Plan].

    Science.gov (United States)

    Rooks, Kristen

    Based on Miguel de Cervantes' novel "Don Quixote," this lesson plan presents activities designed to help students understand that Quixote's misperceptions are understandable; writers often describe one object to sound as if it were something else; and metaphors help readers see with new eyes. The main activity of the lesson involves students…

  12. The Cognitive Basis of Trust. The Relation between Education, Cognitive Ability, and Generalized and Political Trust

    Science.gov (United States)

    Hooghe, Marc; Marien, Sofie; de Vroome, Thomas

    2012-01-01

    Previous research has established convincingly that there is a strong positive relation between educational attainment and trust. There is less agreement however, about the precise determinants of this relation. In this article, we assess how education is related to generalized and political trust, controlling for cognitive ability and…

  13. In Money we Trust? Trust Repair and the Psychology of Financial Compensations

    NARCIS (Netherlands)

    P.T.M. Desmet (Pieter)

    2011-01-01

    textabstractDespite the importance of trust in economic relations, people often engage in behavior that may violate their interaction partner’s trust. Given that transgressions in economic relations often result in distributive harm for the victim (i.e. loss of economic resources), a common approach

  14. Building a Culture of Trust: Trust in the Use of Educational Technology

    Science.gov (United States)

    Kirkman, Jacqueline

    2014-01-01

    This paper investigates the place of trust in a school context and its importance in achieving the aims of schooling, "namely high academic performance and positive affects among members of the school community" (Forsyth, 2008). The role of trust in the use of technology and technological change is examined. Literature is surveyed in the…

  15. Relational Trust and Knowledge Sharing: An Investigation of Principal Trust and School Social Networks

    Science.gov (United States)

    Liou, Yi-Hwa

    2010-01-01

    Trust among teachers is an important aspect of the capacity for reform in schools. In previous research, trust has traditionally been considered as a monolithic variable that characterizes this special element as a relationship across a school (Bryk & Schneider, 2002, 2003; Goddard, 2003; Kochanek, 2005). However, this study proposes that the…

  16. Research of Broken Wire Rope Detection System Based on LabVIEW

    Directory of Open Access Journals (Sweden)

    Jing-ge Gao

    2014-04-01

    Full Text Available In this study, we introduce how to detect broken wires in steel rope based on wavelet transform and virtual instrument technology. By means of the powerful data analysis function of virtual instrument and wavelet transform, the singularity of wires can be found and it could help to improve ability of locating broken wires and determining breakage grade.

  17. 76 FR 65717 - City of Broken Bow, OK; Notice of Availability of Final Environmental Assessment

    Science.gov (United States)

    2011-10-24

    ... Commission's (Commission or FERC) regulations, 18 CFR part 380 (Order No. 486, 52 FR 47897), the Office of Energy Projects has reviewed the application for an Original Major License for the Broken Bow Re... Energy Regulatory Commission City of Broken Bow, OK; Notice of Availability of Final...

  18. 75 FR 33290 - City of Broken Bow, OK; Notice of Availability of Environmental Assessment

    Science.gov (United States)

    2010-06-11

    ... Regulatory Commission's (Commission) regulations, 18 CFR part 380 (Order No. 486, 52 FR 47897), the Office of Energy Projects has reviewed the application for an Original Major License for the Broken Bow Re... Energy Regulatory Commission City of Broken Bow, OK; Notice of Availability of Environmental...

  19. Detection of a Misaligned Broken Pipe by Electromagnetic Interaction

    Science.gov (United States)

    Di Gregorio, Pietro Paolo; Frezza, Fabrizio; Mangini, Fabio; Ferrara, Vincenzo

    2016-04-01

    The study we are presenting concerns electromagnetic scattering of a plane wave due to the presence of a misaligned broken pipe buried in a half-space occupied by cement and by asphalt/ground, for civil-engineering applications. In order to simulate a realistic scenario, the pipe is supposed cylindrical and made of metallic or poly-vinyl chloride (PVC) material whose electromagnetic properties are known in the literature and dimensions are the most used in civil-engineering applications. We consider the longitudinal axis of the pipe running parallel to the air-cement interface. We suppose, after the break of the pipe, that the longitudinal axes of the two parts move on a plane parallel to the separation interface, in opposite directions. The study focuses on the electromagnetic response of the scattered electric field along a line above the interface of the media considering different distances between the longitudinal axis of the tubes in two cases: PVC and metallic material. To accomplish the study, a commercially available simulator based on the Finite Element Method (FEM) is adopted and a circularly-polarized plane wave impinging normally to the interface is considered. This kind of study could be useful for monitoring the status of buried pipes using ground penetrating radar (GPR) techniques in many applications of Civil Engineering without the need to intervene destructively in the structure. Acknowledgement This work is a contribution to COST Action TU1208 "Civil Engineering Applications of Ground Penetrating Radar" (www.GPRadar.eu, www.cost.eu).

  20. Higgs boson physics and broken flavor symmetry -- LHC phenomenology

    CERN Document Server

    Berger, Edmond L

    2014-01-01

    The LHC implications are presented of a simplified model of broken flavor symmetry in which a new scalar (a flavon) emerges with mass in the TeV range. We summarize the influence of the model on Higgs boson physics, notably on the production cross section and decay branching fractions. Limits are obtained on the flavon $\\varphi$ from heavy Higgs boson searches at the LHC at 7 and 8 TeV. The branching fractions of the flavon are computed as a function of the flavon mass and the Higgs-flavon mixing angle. We explore possible discovery of the flavon at 14 TeV, particularly via the $\\varphi \\rightarrow Z^0Z^0$ decay channel in the $2\\ell2\\ell'$ final state, and through standard model Higgs boson pair production $\\varphi \\rightarrow hh$ in the $b\\bar{b}\\gamma\\gamma$ final state. The flavon mass range up to $500$ GeV could probed down to quite small values of the Higgs-flavon mixing angle with 100 fb$^{-1}$ of integrated luminosity at 14 TeV.

  1. Entanglement entropy in quantum spin chains with broken reflection symmetry

    International Nuclear Information System (INIS)

    We investigate the entanglement entropy of a block of L sites in quasifree translation-invariant spin chains concentrating on the effect of reflection-symmetry breaking. The Majorana two-point functions corresponding to the Jordan-Wigner transformed fermionic modes are determined in the most general case; from these, it follows that reflection symmetry in the ground state can only be broken if the model is quantum critical. The large L asymptotics of the entropy are calculated analytically for general gauge-invariant models, which have, until now, been done only for the reflection-symmetric sector. Analytical results are also derived for certain nongauge-invariant models (e.g., for the Ising model with Dzyaloshinskii-Moriya interaction). We also study numerically finite chains of length N with a nonreflection-symmetric Hamiltonian and report that the reflection symmetry of the entropy of the first L spins is violated but the reflection-symmetric Calabrese-Cardy formula is recovered asymptotically. Furthermore, for noncritical reflection-symmetry-breaking Hamiltonians, we find an anomaly in the behavior of the saturation entropy as we approach the critical line. The paper also provides a concise but extensive review of the block-entropy asymptotics in translation-invariant quasifree spin chains with an analysis of the nearest-neighbor case and the enumeration of the yet unsolved parts of the quasifree landscape.

  2. Fano resonance engineering in mirror-symmetry-broken THz metamaterials

    Science.gov (United States)

    Li, Xuefeng; Bian, Xinya; Milne, William I.; Chu, Daping

    2016-04-01

    We introduce a comprehensive approach to the design of mirror-symmetry-broken terahertz (THz) metamaterials and present both the simulation and experimental results which show the desired asymmetric Fano resonances and electromagnetically induced transparency-like windows. With a full-wave simulation, we find these asymmetry-induced resonance modes possess extremely high quality factors and they broaden with an increase in the structure asymmetry. This phenomenon arises from the destructive interference of a super-radiative bright mode and a sub-radiative dark mode which cannot be excited directly. Surface current and electric field distributions are analyzed to explain the emergence of these Fano resonances. An intuitive mechanical coupled oscillator model is derived to explain the unique line-shape of such Fano resonances. Moreover, large resonant frequency tuning (50 GHz) of Fano resonance has been demonstrated by temperature-induced phase change in liquid crystals. We believe that the Fano resonance in THz metamaterials may serve as a strong building block for passive or active THz elements with potential applications for future detection and sensing systems and devices.

  3. A new approach to detect broken rotor bars in induction machines by current spectrum analysis

    Science.gov (United States)

    Didier, G.; Ternisien, E.; Caspary, O.; Razik, H.

    2007-02-01

    This paper deals with a new technique to detect broken rotor bars in polyphase induction machines. Like most techniques, we employ the Fourier Transform of the stator current to make detection. But where the other methods use the Fourier Transform modulus, this alternative approach proposes to analyse its phase. As shown by results, the Fourier Transform phase allows to detect one broken rotor bar when the motor operates under a low load but the method robustness decreases for a half-broken rotor bar. So, in order to improve the diagnosis and to permit the detection of incipient broken rotor bar, the analysis is completed with the Hilbert Transform. This transform provides good results and a partially broken rotor bar can be detected when the load torque is equal or greater than 25%. The main advantage of these methods is that the final decision on the rotor cage state is took without the healthy motor reference.

  4. Lessons learned on stakeholder issues in decommissioning

    International Nuclear Information System (INIS)

    Issues of public concern during decommissioning and dismantling (D and D) are partly the same and partly different from those of the preceding phases (planning, construction and operation). While in the course of construction and operation the main challenges include meeting expectations of a higher quality of life, accommodating a growing population, mitigating construction nuisances, and assuring the safe operation of the facility, the main concerns in the D and D phase are decreasing employment rate, the eventual reduction of revenues for the municipality, the future use of the affected land and negative social impacts (e.g., out-migration). The decommissioning phase is characterised by heterogeneity of stakeholder interests and values, difficulties of reaching consensus or compromise, and difficulties in connection with the harmonization of energy production, environmental protection and sustainable socio-economic development considerations. Typically, there might also be tensions between local and regional decisions. As in other phases, the building of trust between stakeholder is crucial from the point of view of conflict management, and social lessons learnt from the siting and developments of nuclear facilities are widely applicable in the field of D and D as well. A review is presented of major lessons to be learnt from NEA activities in the field of decommissioning and stakeholder involvement. (author)

  5. Lessons learned on stakeholder issues in decommissioning

    Energy Technology Data Exchange (ETDEWEB)

    O' Sullivan, P.; Pescatore, C. [OECD Nuclear Energy Agency, 92 - Issy les Moulineaux (France)

    2008-07-01

    Issues of public concern during decommissioning and dismantling (D and D) are partly the same and partly different from those of the preceding phases (planning, construction and operation). While in the course of construction and operation the main challenges include meeting expectations of a higher quality of life, accommodating a growing population, mitigating construction nuisances, and assuring the safe operation of the facility, the main concerns in the D and D phase are decreasing employment rate, the eventual reduction of revenues for the municipality, the future use of the affected land and negative social impacts (e.g., out-migration). The decommissioning phase is characterised by heterogeneity of stakeholder interests and values, difficulties of reaching consensus or compromise, and difficulties in connection with the harmonization of energy production, environmental protection and sustainable socio-economic development considerations. Typically, there might also be tensions between local and regional decisions. As in other phases, the building of trust between stakeholder is crucial from the point of view of conflict management, and social lessons learnt from the siting and developments of nuclear facilities are widely applicable in the field of D and D as well. A review is presented of major lessons to be learnt from NEA activities in the field of decommissioning and stakeholder involvement. (author)

  6. Does Generalized (Dis)trust Travel? Examining the Impact of Cultural Heritage and Destination Country Environment on Trust of Immigrants

    DEFF Research Database (Denmark)

    Dinesen, Peter Thisted

    2012-01-01

    perspective predicts that trust of immigrants will change according to the environment of the destination country. This article examines how first-generation immigrants from three low-trust countries of origin (Turkey, Poland, and Italy) are affected by migrating to high-trust countries in Northern Europe......, which hold qualities conducive to trust. In contrast to earlier studies examining trust of immigrants, I build on one data set containing data on both migrants and nonmigrants from the same country of origin as well as on a wide range of relevant covariates of trust. Using the method of matching......, the results of the analysis lend most support to the experiential perspective on trust as the destination-country context has a massive impact on trust of immigrants, who display significantly higher levels of trust than comparable respondents in their country of origin. The results are robust to limiting...

  7. Wireless next generation networks a virtue-based trust model

    CERN Document Server

    Harvey, Melissa

    2014-01-01

    This SpringerBrief proposes a trust model motivated by virtue epistemology, addressing the need for a more efficient and flexible trust model for wireless next generation networks. This theory of trust simplifies the computation and communication overhead of strictly cognitive-computational models of trust. Both the advantages and the challenges of virtue-based trust models are discussed. This brief offers new research and a general theory of rationality that enables users to interpret trust and reason as complementary mechanisms that guide our rational conduct at two different epistemic level

  8. Why Different Trust Relationships Matter for Information Systems Users

    OpenAIRE

    Söllner, Matthias; Hoffmann, Axel; Leimeister, Jan Marco

    2016-01-01

    Technology acceptance research has shown that trust is an important factor fostering use of information systems (IS). As a result, numerous IS researchers have studied factors that build trust in IS. However, IS research on trust has mainly focused on user's trust in the IS itself, neglecting other targets of trust that might also drive IS use from a user's point of view. Accordingly, we investigate the importance of different targets of trust in IS use. Therefore, we use the concept of a net...

  9. Online Trust Mechanisms: A Domain Study of Online Auctions

    Directory of Open Access Journals (Sweden)

    Glenn Robert Bewsell

    2008-05-01

    Full Text Available This research investigates mechanisms that impact trust at online auctions. A qualitative study is discussed within this paper to identify mechanisms that impact trust at online auctions. The mechanisms identified are discussed within normative and grounded theoretical approaches to trust. A result of this discussion I seek to answer the question: what factors do people perceive as important to increase online trust prior to an online transaction? This discussion will help professionals understand the factors that emerge from normative and grounded theoretical approaches to online trust research. A better understanding of online trust adds to the body of theory and can be used to improve the design of online auctions.

  10. Development of trust during large scale system implementation

    DEFF Research Database (Denmark)

    Schlichter, Bjarne Rerup

    2010-01-01

      Implementations of information systems are complex and problematic with a reputation for being delayed and exceeding budget. A critical factor in implementations is trust in the system, trust in the project and trust between the various stakeholders. This case charts the evolution of trust in t...... implementation of the Faroese integrated healthcare system and shows how trust relations at various points in the project became difficult, what the causes and consequences of these trust difficulties were, and how they were successfully resolved in the project....

  11. Do Institutions or Culture Determine the Level of Social Trust?

    DEFF Research Database (Denmark)

    Nannestad, Peter; Svendsen, Gert Tinggaard; Dinesen, Peter Thisted; Sønderskov, Kim Mannemar

    2014-01-01

    Do institutions or culture determine levels of social trust in society? If quality of institutions determines levels of social trust, migrants from countries with lower-quality institutions should enhance their level of social trust in countries with higher-quality institutions. If, on the other...... hand, the migrants’ level of social trust is determined by their culture, it should not be affected by a different institutional setting. Furthermore, culturally diverse immigrant groups should have different levels of social trust in the same host country. Analysing migration from several non......-western countries to Denmark, this paper demonstrates that institutions rather than culture matter for social trust....

  12. Introduction to Hardware Security and Trust

    CERN Document Server

    Wang, Cliff

    2012-01-01

    The emergence of a globalized, horizontal semiconductor business model raises a set of concerns involving the security and trust of the information systems on which modern society is increasingly reliant for mission-critical functionality. Hardware-oriented security and trust issues span a broad range including threats related to the malicious insertion of Trojan circuits designed, e.g.,to act as a ‘kill switch’ to disable a chip, to integrated circuit (IC) piracy,and to attacks designed to extract encryption keys and IP from a chip. This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade.  Coverage includes security and trust issues in all types of electronic devices and systems such as ASICs, COTS, FPGAs, microprocessors/DSPs, and embedded systems.  This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of,and trust in, modern society�...

  13. Power decreases trust in social exchange.

    Science.gov (United States)

    Schilke, Oliver; Reimann, Martin; Cook, Karen S

    2015-10-20

    How does lacking vs. possessing power in a social exchange affect people's trust in their exchange partner? An answer to this question has broad implications for a number of exchange settings in which dependence plays an important role. Here, we report on a series of experiments in which we manipulated participants' power position in terms of structural dependence and observed their trust perceptions and behaviors. Over a variety of different experimental paradigms and measures, we find that more powerful actors place less trust in others than less powerful actors do. Our results contradict predictions by rational actor models, which assume that low-power individuals are able to anticipate that a more powerful exchange partner will place little value on the relationship with them, thus tends to behave opportunistically, and consequently cannot be trusted. Conversely, our results support predictions by motivated cognition theory, which posits that low-power individuals want their exchange partner to be trustworthy and then act according to that desire. Mediation analyses show that, consistent with the motivated cognition account, having low power increases individuals' hope and, in turn, their perceptions of their exchange partners' benevolence, which ultimately leads them to trust. PMID:26438869

  14. The value of trust in biotech crop development: a case study of Bt cotton in Burkina Faso

    Directory of Open Access Journals (Sweden)

    Ezezika Obidimma C

    2012-11-01

    Full Text Available Abstract Background Agricultural biotechnology public-private partnerships (PPPs have been recognized as having great potential in improving agricultural productivity and increasing food production in sub-Saharan Africa. However, there is much public skepticism about the use of GM (genetically modified crops and suspicion about private sector involvement in agbiotech projects. This case study sought to understand the role of trust in the Bacillus thuringiensis (Bt cotton in Burkina Faso project by exploring practices and challenges associated with trust-building, and determining what makes these practices effective from the perspective of multiple stakeholders. Methods We conducted semi-structured, face-to-face interviews to obtain stakeholders’ understanding of trust in general as well as in the context of agbiotech PPPs. Relevant documents and articles were analyzed to generate descriptions of how trust was operationalized in this evolving agbiotech PPP. Data was analyzed based on emergent themes to create a comprehensive narrative on how trust is understood and built among the partners and with the community. Results We derived four key lessons from our findings. First, strong collaboration between research, industry and farmers greatly contributes to both the success of, and fostering of trust in, the partnership. Second, this case study also revealed the important, though often unrecognized, role of researchers as players in the communication strategy of the project. Third, effective and comprehensive communication takes into account issues such as illiteracy and diversity. Fourth, follow-up at the field level and the need for a multifaceted communications strategy is important for helping push the project forward. Conclusions Burkina Faso’s well-established and effective cotton selling system laid the foundation for the implementation of the Bt cotton project – particularly, the strong dialogue and the receptivity to collaboration

  15. Who Adolescents Trust May Impact Their Health: Findings from Baltimore.

    Science.gov (United States)

    Mmari, Kristin; Marshall, Beth; Lantos, Hannah; Blum, Robert Wm

    2016-06-01

    This study is one of the first to explore the relevance of trust to the health of adolescents living in a disadvantaged urban setting. The primary objectives were to determine the differences in the sociodemographic characteristics between adolescents who do and do not trust and to examine the associations between trust and health. Data were drawn from the Well-Being of Adolescents in Vulnerable Environments (WAVE) study, which is a cross-sectional global study of adolescents in very low-income urban settings conducted in 2011-2013. This paper focused on 446 adolescents in Baltimore as it was the primary site where trust was explicitly measured. For the main analyses, six health outcomes were examined: (1) self-rated health; (2) violence victimization; (3) binge drinking; (4) marijuana use; (5) post-traumatic stress disorder (PTSD); and (6) condom use at last sex. Independent variables included sociodemographic variables (age, gender, current school enrolment, perceived relative wealth, and family structure) and two dimensions of trust: community trust (trust in individuals/groups within neighborhood) and institutional trust (trust in authorities). The results show that more than half the sample had no trust in police, and a high proportion had no trust in other types of authority. Among girls, those with higher levels of community trust were less likely to be victimized and involved in binge drinking. Meanwhile, girls with higher levels of institutional trust were more likely to use a condom and less likely to have used marijuana. Among boys, those with higher levels of community trust were more likely to use a condom, while those with higher levels of institutional trust were less likely to use marijuana, but more likely binge drink. Overall, this study highlights the importance of trust for adolescent health. Most surprising were the differences in the associations between boys and girls with regard to the type of trust and specific health outcome that was

  16. The Role of Trust in Computer Security

    DEFF Research Database (Denmark)

    Jensen, Christian D.

    2012-01-01

    human behaviour imposed by social and religious norms. Most of these assumptions, however, are implicit and they will fail when the environment of the systems change, e.g., when systems are used on a global scale on the Internet. This talk identifies such implicit assumptions in current security...... technologies and show how many of them concern the placement of trust on human or system agents. We argue that making such assumptions about trust explicit is an essential requirement for the future of system security and argue why the formalisation of computational trust is necessary when we wish to reason......Summary form only given. Traditional security technologies are based on numerous assumptions about the environment in which systems are used. This includes assumptions about the enforcement of legislative and contractual frameworks, limitations of particular technologies and the constraints on...

  17. Problems in Cross Cultural Trust Building

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    2013-01-01

    Based on an explorative study of the Danish Public Diplomacy activities in Pakistan this paper brings to attention a number of issues related to cross cultural trust building. The empirical data includes information from the communication consultant at the Danish Embassy in Islamabad, and other p...... public documents from the Danish Foreign Ministry. The conclusion is a list of research problems that needs to be investigated in the future, because there are still too many unknown factors that are of relevance for international trust building.......Based on an explorative study of the Danish Public Diplomacy activities in Pakistan this paper brings to attention a number of issues related to cross cultural trust building. The empirical data includes information from the communication consultant at the Danish Embassy in Islamabad, and other...

  18. Redefining genomic privacy: trust and empowerment.

    Directory of Open Access Journals (Sweden)

    Yaniv Erlich

    2014-11-01

    Full Text Available Fulfilling the promise of the genetic revolution requires the analysis of large datasets containing information from thousands to millions of participants. However, sharing human genomic data requires protecting subjects from potential harm. Current models rely on de-identification techniques in which privacy versus data utility becomes a zero-sum game. Instead, we propose the use of trust-enabling techniques to create a solution in which researchers and participants both win. To do so we introduce three principles that facilitate trust in genetic research and outline one possible framework built upon those principles. Our hope is that such trust-centric frameworks provide a sustainable solution that reconciles genetic privacy with data sharing and facilitates genetic research.

  19. Analyzing Trust Perceptions in System Implementations

    DEFF Research Database (Denmark)

    Schlichter, Bjarne Rerup; Rose, Jeremy

    2009-01-01

    Implementations of large scale information systems are complex and problematic with a reputation for being delayed and going over budget. A critical factor in the success of these implementations is trust in the system, in the project and between the various stakeholders. As problems and delays...... a framework based on Giddens´ theory of modernity. The framework theorizes dynamic elements of the evolution of trust, not previously investigated in this context. The data collection involves 4 actors interviewed twice in 2006 and 2007; and the data analysis strategy is content analysis using Nvivo software....... A major contribution is that if an implementation project interacts with many or complex abstract systems, the managers must focus on continuous embedding and re-embedding by interacting directly with representatives of the abstract systems in question to maintain trust. Also we observe that actors...

  20. Modelling Users` Trust in Online Social Networks

    Directory of Open Access Journals (Sweden)

    Iacob Cătoiu

    2014-02-01

    Full Text Available Previous studies (McKnight, Lankton and Tripp, 2011; Liao, Lui and Chen, 2011 have shown the crucial role of trust when choosing to disclose sensitive information online. This is the case of online social networks users, who must disclose a certain amount of personal data in order to gain access to these online services. Taking into account privacy calculus model and the risk/benefit ratio, we propose a model of users’ trust in online social networks with four variables. We have adapted metrics for the purpose of our study and we have assessed their reliability and validity. We use a Partial Least Squares (PLS based structural equation modelling analysis, which validated all our initial assumptions, indicating that our three predictors (privacy concerns, perceived benefits and perceived risks explain 48% of the variation of users’ trust in online social networks, the resulting variable of our study. We also discuss the implications and further research opportunities of our study.

  1. Surrogate Motherhood: A Trust-Based Approach.

    Science.gov (United States)

    Beier, Katharina

    2015-12-01

    Because it is often argued that surrogacy should not be treated as contractual, the question arises in which terms this practice might then be couched. In this article, I argue that a phenomenology of surrogacy centering on the notion of trust provides a description that is illuminating from the moral point of view. My thesis is that surrogacy establishes a complex and extended reproductive unit--the "surrogacy triad" consisting of the surrogate mother, the child, and the intending parents--whose constituents are bound together by mutual trustful commitments. Even though a trust-based approach does not provide an ultimate answer to whether surrogacy should be sanctioned or prohibited, it allows for at least some practical suggestions. In particular, I will argue that, under certain conditions, surrogacy is tenable within familial or other significant relationships, and I will stress the necessity of acknowledging the new relationships and moral commitments that result from this practice. PMID:26449234

  2. Framing Trust at the Street-Level

    DEFF Research Database (Denmark)

    Perry, Kevin Anthony

    This thesis deals with the phenomenon of distrust and trust between young men with minority ethnic backgrounds and public sector employees at the face-to-face level of interaction. The focus is on trust and distrust which can be understood as cultural resources – a valuable approach to researching...... unrest, antisocial behaviour, crime and unnecessary public spending. The purpose of this in-depth study, based on nine months of ethnographic fieldwork in and around two residential housing estates, is to contribute towards understanding the micro-processes at play in distrust and trust building...... processes between public sector employees and young men with minority ethnic backgrounds, an under-researched and often misunderstood area. The central focus is on the relationship between the young men with minority ethnic backgrounds, a team of youth workers, a job consultant and a police officer. This...

  3. Sino-U.S. Strategic Mutual Trust

    Institute of Scientific and Technical Information of China (English)

    Yuan Peng; Zhang Yimeng

    2008-01-01

    Relations between China and the U.S. have been relatively stable for nearly seven years, for the first time since the end of the Cold War. Strategic mutual trust, however, is not enough and there is a long way to go before both countries can achieve a permanent strategic stability. Four problems have prevented stability in bilateral relations, namely structural, internal, accidental, and cognitive issues. The goal of building strategic mutual trust still remains distant, and developing a good understanding between each other is the thorniest problem for both countries. Better mutual understanding can lead to an expansion of bilateral relations. China and the U.S. need to increase mutual trust and work towards achieving strategic stability.

  4. Distributed Trust Management for Validating SLA Choreographies

    Science.gov (United States)

    Haq, Irfan Ul; Alnemr, Rehab; Paschke, Adrian; Schikuta, Erich; Boley, Harold; Meinel, Christoph

    For business workflow automation in a service-enriched environment such as a grid or a cloud, services scattered across heterogeneous Virtual Organizations (VOs) can be aggregated in a producer-consumer manner, building hierarchical structures of added value. In order to preserve the supply chain, the Service Level Agreements (SLAs) corresponding to the underlying choreography of services should also be incrementally aggregated. This cross-VO hierarchical SLA aggregation requires validation, for which a distributed trust system becomes a prerequisite. Elaborating our previous work on rule-based SLA validation, we propose a hybrid distributed trust model. This new model is based on Public Key Infrastructure (PKI) and reputation-based trust systems. It helps preventing SLA violations by identifying violation-prone services at service selection stage and actively contributes in breach management at the time of penalty enforcement.

  5. Measuring Institutional Trust: Evidence from Guyana

    Directory of Open Access Journals (Sweden)

    Troy Devon Thomas

    2015-01-01

    Full Text Available Institutional trust is often measured by several items that are analyzed individually or as sum-scores. However, it is difficult to summarize the results of individual-items analyses, whereas sum-scores may be meaningless if the dimensions that the items are assumed to measure are not verified. Although these limitations are circumvented by using factor analysis, response styles may still bias research results. We use data from Guyana to show that a second-order factor model is appropriate for measuring institutional trust. We also demonstrate that response styles can inflate item and factor convergent validity and may either distort regression effects or create completely spurious ones. We therefore recommend using factor models with corrections for response styles in institutional trust research instead of sum-scores and individual-items analyses.

  6. Integrity Management Infrastructure for Trusted Computing

    Science.gov (United States)

    Munetoh, Seiji; Nakamura, Megumi; Yoshihama, Sachiko; Kudo, Michiharu

    Computer security concerns have been rapidly increasing because of repeated security breaches and leakages of sensitive personal information. Such security breaches are mainly caused by an inappropriate management of the PCs, so maintaining integrity of the platform configuration is essential, and, verifying the integrity of the computer platform and software becomes more significant. To address these problems, the Trusted Computing Group (TCG) has developed various specifications that are used to measure the integrity of the platform based on hardware trust. In the trusted computing technology, the integrity data of each component running on the platform is recorded in the security chip and they are securely checked by a remote attestation. The infrastructure working group in the TCG is trying to define an Integrity Management Infrastructure in which the Platform Trust Services (PTS) is a new key component which deals with an Integrity Report. When we use the PTS in the target platform, it is a service component that collects and measures the runtime integrity of the target platform in a secure way. The PTS can also be used to validate the Integrity Reports. We introduce the notion of the Platform Validation Authority, a trusted third party, which verifies the composition of the integrity measurement of the target platform in the Integrity Reports. The Platform Validation Authority complements the role of the current Certificate Authority in the Public Key Infrastructure which attests to the integrity of the user identity as well as to related artifacts such as digital signatures. In this paper, we cover the research topics in this new area, the relevant technologies and open issues of the trusted computing, and the detail of our PTS implementation.

  7. Overcoming barriers to trust in agricultural biotechnology projects: a case study of Bt cowpea in Nigeria

    Directory of Open Access Journals (Sweden)

    Ezezika Obidimma C

    2012-11-01

    Full Text Available Abstract Background Nigeria, Africa’s most populous country, has been the world’s largest cowpea importer since 2004. The country is currently in the early phases of confined field trials for two genetically modified crops: Bacillus thuringiensis (Bt cowpea and nutritionally enhanced cassava (“BioCassava Plus”. Using the bio-safety guidelines process as a backdrop, we evaluate the role of trust in the operation of the Cowpea Productivity Improvement Project, which is an international agricultural biotechnology public-private partnership (PPP aimed at providing pest-resistant cowpea varieties to Nigerian farmers. Methods We reviewed the published literature and collected data through direct observations and semi-structured, face-to-face interviews. Data were analyzed based on emergent themes to create a comprehensive narrative on how trust is understood and built among the partners and with the community. Results Our findings highlight the importance of respecting mandates and eliminating conflicts of interest; holding community engagement initiatives early on; having on-going internal discussion and planning; and serving a locally-defined need. These four lessons could prove helpful to other agricultural biotechnology initiatives in which partners may face similar trust-related challenges. Conclusions Overcoming challenges to building trust requires concerted effort throughout all stages of project implementation. Currently, plans are being made to backcross the cowpea strain into a local variety in Nigeria. The development and adoption of the Bt cowpea seed hinges on the adoption of a National Biosafety Law in Nigeria. For countries that have decided to adopt biotech crops, the Nigerian cowpea experiment can be used as a model for other West African nations, and is actually applied as such in Ghana and Burkina Faso, interested in developing a Bt cowpea.

  8. Physical trust-based persistent authentication

    DEFF Research Database (Denmark)

    Fujita, Masahiro; Jensen, Christian D.; Arimura, Shiori;

    2015-01-01

    Recently companies have applied two-factor user authentication. Persistent Authentication is one of the interesting authentication mechanisms to establish security and usability of two-factor authentication systems. However, there is room to improve its feasibility and usability. In this paper, we...... propose a new type of persistent authentication, called Persistent Authentication Based On physical Trust (PABOT). PABOT uses a context of “physical trust relationship” that is built by visual contact between users, and thus can offer a persistent authentication mechanism with better usability and higher...

  9. Social trust aspects of rural electrification

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-10-01

    This report is a contribution to a growing body of work which acknowledges the importance of social considerations in the electricity industry, and provides an electricity industry perspective on the role of social trust, which is closely related to concepts such as social responsibility, corporate governance and corporate stewardship. The report provides a full explanation of the concept of social trust, defines its components (competence, commitment, consistency, fairness, respect, caring and empathy) and makes suggestions as to how each of these components could be implemented in a variety of settings and situations such as facility planning, construction and operation, risk management and customer relations.

  10. Macroeconomic Dynamics of Assets, Leverage and Trust

    Science.gov (United States)

    Rozendaal, Jeroen C.; Malevergne, Yannick; Sornette, Didier

    A macroeconomic model based on the economic variables (i) assets, (ii) leverage (defined as debt over asset) and (iii) trust (defined as the maximum sustainable leverage) is proposed to investigate the role of credit in the dynamics of economic growth, and how credit may be associated with both economic performance and confidence. Our first notable finding is the mechanism of reward/penalty associated with patience, as quantified by the return on assets. In regular economies where the EBITA/Assets ratio is larger than the cost of debt, starting with a trust higher than leverage results in the highest long-term return on assets (which can be seen as a proxy for economic growth). Therefore, patient economies that first build trust and then increase leverage are positively rewarded. Our second main finding concerns a recommendation for the reaction of a central bank to an external shock that affects negatively the economic growth. We find that late policy intervention in the model economy results in the highest long-term return on assets. However, this comes at the cost of suffering longer from the crisis until the intervention occurs. The phenomenon that late intervention is most effective to attain a high long-term return on assets can be ascribed to the fact that postponing intervention allows trust to increase first, and it is most effective to intervene when trust is high. These results are derived from two fundamental assumptions underlying our model: (a) trust tends to increase when it is above leverage; (b) economic agents learn optimally to adjust debt for a given level of trust and amount of assets. Using a Markov Switching Model for the EBITA/Assets ratio, we have successfully calibrated our model to the empirical data of the return on equity of the EURO STOXX 50 for the time period 2000-2013. We find that dynamics of leverage and trust can be highly nonmonotonous with curved trajectories, as a result of the nonlinear coupling between the variables. This

  11. Trust and governance in regional planning

    DEFF Research Database (Denmark)

    Tait, Malcolm; Hansen, Carsten Jahn

    2013-01-01

    This paper seeks to understand how planning systems respond to narratives of distrust, focusing on regional planning as a particularly contested field. Using a framework to explore how reforms have enhanced trust, analysis of cases in England and Denmark reveals two distinct actions: firstly, a r...... form of government....... reliance on strengthening formal mechanisms of government, a feature common in England, and secondly, collaborative governance, as seen in Denmark. However, both strategies fail to adequately enhance trust in the values of regional planning, leaving it vulnerable to ideological critique as a worthwhile...

  12. Security, privacy and trust in cloud systems

    CERN Document Server

    Nepal, Surya

    2013-01-01

    The book compiles technologies for enhancing and provisioning security, privacy and trust in cloud systems based on Quality of Service requirements. It is a timely contribution to a field that is gaining considerable research interest, momentum, and provides a comprehensive coverage of technologies related to cloud security, privacy and trust. In particular, the book includes - Cloud security fundamentals and related technologies to-date, with a comprehensive coverage of evolution, current landscape, and future roadmap. - A smooth organization with introductory, advanced and specialist content

  13. Capturing Trust in Social Web Applications

    Science.gov (United States)

    O'Donovan, John

    The Social Web constitutes a shift in information flow from the traditional Web. Previously, content was provided by the owners of a website, for consumption by the end-user. Nowadays, these websites are being replaced by Social Web applications which are frameworks for the publication of user-provided content. Traditionally, Web content could be `trusted' to some extent based on the site it originated from. Algorithms such as Google's PageRank were (and still are) used to compute the importance of a website, based on analysis of underlying link topology. In the Social Web, analysis of link topology merely tells us about the importance of the information framework which hosts the content. Consumers of information still need to know about the importance/reliability of the content they are reading, and therefore about the reliability of the producers of that content. Research into trust and reputation of the producers of information in the Social Web is still very much in its infancy. Every day, people are forced to make trusting decisions about strangers on the Web based on a very limited amount of information. For example, purchasing a product from an eBay seller with a `reputation' of 99%, downloading a file from a peer-to-peer application such as Bit-Torrent, or allowing Amazon.com tell you what products you will like. Even something as simple as reading comments on a Web-blog requires the consumer to make a trusting decision about the quality of that information. In all of these example cases, and indeed throughout the Social Web, there is a pressing demand for increased information upon which we can make trusting decisions. This chapter examines the diversity of sources from which trust information can be harnessed within Social Web applications and discusses a high level classification of those sources. Three different techniques for harnessing and using trust from a range of sources are presented. These techniques are deployed in two sample Social Web

  14. The Relationship between Teamwork and Organizational Trust

    OpenAIRE

    Musab Isik

    2016-01-01

    The aim of this study is to investigate the relationship between teamwork and organizational trust. In the implementation section the data from the survey of 250 workers is employed in call centers in Erzurum by using relevant statistical  methods. Consequently, it is found that there is a positive and significant relationship between teamwork and organizational trust. Thus, the hypothesis of the study is supported as it was expected. Besides, it is found that there are positive and significa...

  15. The multileveled division of trust labour

    DEFF Research Database (Denmark)

    Frederiksen, Morten

    at the expense of accuracy and may block our understanding of the intricacies of the multiple levels involved in trusting. This paper suggests a conceptual clarification of this issue by employing a phenomenological approach to the perspective of the trustor, differentiating the types of uncertainty...... involved at the intersubjective and institutional levels. I argue that confidence in institutions define the playing field of uncertainty in intersubjective relations, thus underpinning both the possibility and scope of intersubjective trust. However, once confidence in the institutional setting is brought...

  16. Novel indices for broken rotor bars fault diagnosis in induction motors using wavelet transform

    Science.gov (United States)

    Ebrahimi, Bashir Mahdi; Faiz, Jawad; Lotfi-fard, S.; Pillay, P.

    2012-07-01

    This paper introduces novel indices for broken rotor bars diagnosis in three-phase induction motors based on wavelet coefficients of stator current in a specific frequency band. These indices enable to diagnose occurrence and determine number of broken bars in different loads precisely. Besides thanks to the suitability of wavelet transform in transient conditions, it is possible to detect the fault during the start-up of the motor. This is important in the case of start-up of large induction motors with long starting time and also motors with frequent start-up. Furthermore, broken rotor bars in induction motor are detected using spectra analysis of the stator current. It is also shown that rise of number of broken bars and load levels increases amplitude of the particular side-band components of the stator currents in the faulty case. An induction motor with 1, 2, 3 and 4 broken bars at the rated load and the motor with 4 broken bars at no-load, 33%, 66%, 100% and 133% rated load are investigated. Time stepping finite element method is used for modeling broken rotor bars faults in induction motors. In this modeling, effects of the stator winding distribution, stator and rotor slots, geometrical and physical characteristics of different parts of the motor and non-linearity of the core materials are taken into account. The simulation results are are verified by the experimental results.

  17. Music lessons enhance IQ.

    Science.gov (United States)

    Schellenberg, E Glenn

    2004-08-01

    The idea that music makes you smarter has received considerable attention from scholars and the media. The present report is the first to test this hypothesis directly with random assignment of a large sample of children (N = 144) to two different types of music lessons (keyboard or voice) or to control groups that received drama lessons or no lessons. IQ was measured before and after the lessons. Compared with children in the control groups, children in the music groups exhibited greater increases in full-scale IQ. The effect was relatively small, but it generalized across IQ subtests, index scores, and a standardized measure of academic achievement. Unexpectedly, children in the drama group exhibited substantial pre- to post-test improvements in adaptive social behavior that were not evident in the music groups. PMID:15270994

  18. Merging and Extending the PGP and PEM Trust Models - the ICE-TEL Trust Model

    OpenAIRE

    Chadwick, David W; Young, Andrew J.; Kapidzic Cicovic, Nada

    1997-01-01

    The ICE-TEL project is a pan-European project that is building an Internet X.509 based certification infrastructure throughout Europe, plus several secure applications that will use it. This paper describes the trust model that is being implemented by the project. A trust model specifies the means by which a user may build trust in the assertion that a remote user is really who he purports to be (authentication) and that he does in fact have a right to access the service or information that h...

  19. Improving the trust algorithm of information in semantic web

    Science.gov (United States)

    Wan, Zong-bao; Min, Jiang

    2012-01-01

    With the rapid development of computer networks, especially with the introduction of the Semantic Web perspective, the problem of trust computation in the network has become an important research part of current computer system theoretical. In this paper, according the information properties of the Semantic Web and interact between nodes, the definition semantic trust as content trust of information and the node trust between the nodes of two parts. By Calculate the content of the trust of information and the trust between nodes, then get the final credibility num of information in semantic web. In this paper , we are improve the computation algorithm of the node trust .Finally, stimulations and analyses show that the improved algorithm can effectively improve the trust of information more accurately.

  20. Trust in automation. Part II. Experimental studies of trust and human intervention in a process control simulation.

    Science.gov (United States)

    Muir, B M; Moray, N

    1996-03-01

    Two experiments are reported which examined operators' trust in and use of the automation in a simulated supervisory process control task. Tests of the integrated model of human trust in machines proposed by Muir (1994) showed that models of interpersonal trust capture some important aspects of the nature and dynamics of human-machine trust. Results showed that operators' subjective ratings of trust in the automation were based mainly upon their perception of its competence. Trust was significantly reduced by any sign of incompetence in the automation, even one which had no effect on overall system performance. Operators' trust changed very little with experience, with a few notable exceptions. Distrust in one function of an automatic component spread to reduce trust in another function of the same component, but did not generalize to another independent automatic component in the same system, or to other systems. There was high positive correlation between operators' trust in and use of the automation; operators used automation they trusted and rejected automation they distrusted, preferring to do the control task manually. There was an inverse relationship between trust and monitoring of the automation. These results suggest that operators' subjective ratings of trust and the properties of the automation which determine their trust, can be used to predict and optimize the dynamic allocation of functions in automated systems. PMID:8849495

  1. An Extended Case Study Methoology for Investigating Influence of Cultural, Organizational, and Automation Factors on Human-Automation Trust

    Science.gov (United States)

    Koltai, Kolina Sun; Ho, Nhut; Masequesmay, Gina; Niedober, David; Skoog, Mark; Johnson, Walter; Cacanindin, Artemio

    2014-01-01

    This paper discusses a case study that examined the influence of cultural, organizational and automation capability upon human trust in, and reliance on, automation. In particular, this paper focuses on the design and application of an extended case study methodology, and on the foundational lessons revealed by it. Experimental test pilots involved in the research and development of the US Air Forces newly developed Automatic Ground Collision Avoidance System served as the context for this examination. An eclectic, multi-pronged approach was designed to conduct this case study, and proved effective in addressing the challenges associated with the cases politically sensitive and military environment. Key results indicate that the system design was in alignment with pilot culture and organizational mission, indicating the potential for appropriate trust development in operational pilots. These include the low-vulnerabilityhigh risk nature of the pilot profession, automation transparency and suspicion, system reputation, and the setup of and communications among organizations involved in the system development.

  2. Water, oil, climate: a dried-up broken down world

    International Nuclear Information System (INIS)

    Climate crisis, oil crisis, water crisis, food crisis: the 21. century has started badly. Climate is deteriorating under man's action and natural resources are drying up while demand is still on the rise under the double effect of demographic and economic growth. Even worse, tensions are working together and worsen each other in a climate of financial crisis. All warning lights are on the red and a huge challenge has been launched which involves all countries, developed and developing. Solutions are urgently needed, otherwise our civilization would be threatened. The reasoned use of technologies, but also the abatement of poverty and inequalities and the education of people are essential points to take up the challenge. The authors examine the interconnections between energy, water, food at the time of climate change and explore the possible alternative solutions. The lesson that should be learnt from their analysis is that everyone should contribute to the complex decisions that will have an impact on the future of humanity. (J.S.)

  3. SURFACE SUBSIDENCE ANALYSES BASED ON THE PRINCIPLE OF EXPANSION AND RECONSOLIDATION OF THE BROKEN ROCK STRATA

    Institute of Scientific and Technical Information of China (English)

    王悦汉; 缪协兴

    1997-01-01

    The results of experimental studies about the characteristics of broken rock expansion and reconsolidation were briefly introduced in this paper, and the surface subsidence coefficient under critical mining conditions was also analysed based on the principle of expansion and reconsolidation of the broken rock strata, a equation to calculate the corresponding surface subsidence was finally produced. This calculation method can be used to calculate more accurately the convergence quantity of consolidated rocks in the broken zone of the working face. In addition, case analyses by using the introduced calculation method were conducted and satisfactory results were obtained.

  4. THE ROLE OF TRUST AND PERCEIVED RISK IN ELECTRONIC COMMERCE

    OpenAIRE

    NICULA DANA LAURA

    2014-01-01

    Trust and risk are very important in consumers' electronic commerce purchasing decisions. How do trust and risk affect an Internet consumer's purchasing decision? To answer this question I’ve developed a theoretical framework describing the trust-based decision-making process a consumer uses when making a purchase from a given site. Consumer disposition to trust, reputation, privacy concerns, security concerns, the information quality of the Website, and the company's reputati...

  5. Trusted computing platforms TPM2.0 in context

    CERN Document Server

    Proudler, Graeme; Dalton, Chris

    2015-01-01

    In this book the authors first describe the background of trusted platforms and trusted computing and speculate about the future. They then describe the technical features and architectures of trusted platforms from several different perspectives, finally explaining second-generation TPMs, including a technical description intended to supplement the Trusted Computing Group's TPM2 specifications. The intended audience is IT managers and engineers and graduate students in information security.

  6. Between compassionateness and assertiveness: a trust matrix for leaders

    OpenAIRE

    Victor Manuel Monteiro Seco; Miguel Pereira Lopes

    2014-01-01

    Purpose: Construct the structure of trust-building perceived by principals in Portuguese public schools.Design/methodology/approach: A grounded theory approach applied to a survey of open questions answered by school’s principals.Findings: (1) self-trust is the single trait common to all respondents; (2) compassion is a striking antecedent in the process of other-trust; compassionateness and assertiveness must combine with one another to achieve leadership based on smart trust, what is outlin...

  7. Trust in building high-performing teams : conceptual approach

    OpenAIRE

    Hakanen, Mila; Häkkinen, Mia; Soudunsaari, Aki

    2015-01-01

    Team building is one of the key factors of success in business. This study highlights the key elements of building winning teams, where trust is one essential building block and top-level sports teams serve as instructive examples. This study highlights earlier findings that revealed a strong connection between trust and high-performing teams. High-performing teams need talented people but also constant trust-based cooperation. Trust supports cooperative...

  8. Oxytocin Receptor Genetic Variation Promotes Human Trust Behavior

    OpenAIRE

    Frank Krueger; Vijeth Iyengar; Robert Lipsky

    2012-01-01

    Given that human trust behavior is heritable and intranasal administration of oxytocin enhances trust, the oxytocin receptor (OXTR) gene is an excellent candidate to investigate genetic contributions to individual variations in trust behavior. Although a single-nucleotide polymorphism involving an adenine (A)/guanine (G) transition (rs53576) has been associated with socio-emotional phenotypes, its link to trust behavior is unclear. We combined genotyping of healthy male students (n = 108) wit...

  9. Trust, Contracting, and Adaptation in Agri-Food Hybrid Structures

    OpenAIRE

    Gaetano Martino

    2011-01-01

    The paper considers the relationship between trust and governance structure from a Transaction Cost Economics perspective. The role of trust in the coordinating decisions is variously conceptualized according to the theoretical view adopted by the scholars. The present study adopt the three-level schema introduced by Williamson (1996) and suggest that determinants of trust may operate both at institutional and governance structure level. The analytical framework depicted maintains that trust ...

  10. Building an e-Government e-Trust Infrastructure

    OpenAIRE

    Hussein A. Omari; Ahmed A. Omari

    2006-01-01

    This paper presents a Trust Model for e-Government implementation. In the first part of the paper, the trust definition from different points of view (psychology, philosophy, linguistic, sociology, and mathematics) was presented. Most people think that to build trust between the government and its customers or citizens, one must start by implementing IT Security and some kinds of Customer Relationship Management (CRM) systems and that will lead to a full customer trust. However, this was not ...

  11. Trust of Second Generation Immigrants: Intergenerational Transmission or Cultural Assimilation?

    OpenAIRE

    Moschion, Julie; Tabasso, Domenico

    2013-01-01

    This paper studies the respective influence of intergenerational transmission and the environment in shaping individual trust. Focusing on second generation immigrants in Australia and the United States, we exploit the variation in the home and in the host country to separate the effect of the cultural background from that of the social and economic conditions on individual trust. Our results indicate that trust in the home country contributes to the trust of second generation immigrants in b...

  12. Consumer trust and confidence: Some recent ideas in the literature

    OpenAIRE

    Fife-Schaw, C; Barnett, J; J. Chenoweth; Morrison, GM; Lundéhn, C

    2008-01-01

    This paper reflects on two recent debates in the consumer literature on trust that have implications for consumer relations in the water industry. The first concerns an important yet seldom made distinction between trust and confidence. The second concerns when and how trust is related to acceptance of, for example, new tariffs or new technologies, and it challenges the conventional view that trust is usually a precursor of acceptance. New conceptual models addressing these debates are descri...

  13. A Hybrid Model for Load Aware Trust Management in Grid

    OpenAIRE

    K. Selvi; R. S.D. Wahida Banu

    2011-01-01

    Problem statement: Trust management in a distributed dynamic environment like grid has been very vital since the allocation of appropriate resources to meet user request influences the success of the system. While considering a set of resources which are loaded invariably, balancing the load also contributes for the efficient resource utilization. Approach: This study proposed a trust calculation model, which considered weighted parameters like direct trust, reputation trust, load average inf...

  14. 5 CFR 2634.310 - Trusts, estates, and investment funds.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Trusts, estates, and investment funds... EXECUTIVE BRANCH FINANCIAL DISCLOSURE, QUALIFIED TRUSTS, AND CERTIFICATES OF DIVESTITURE Contents of Public Reports § 2634.310 Trusts, estates, and investment funds. (a) In general. (1) Except as otherwise...

  15. On Interorganizational Trust and User-driven Innovation

    DEFF Research Database (Denmark)

    Jacobsen, Alexia; Lassen, Astrid Heidemann

    2012-01-01

    trust itself. With an outset in Project InnoDoors, data has been collected in a business network in the construction material industry that is collaborating for conducting user-driven innovation. The outcome is an 8 Phase process, illustrating the different activities performed during the development...... process of trust and the may different forms of trust that emerge during the process....

  16. Trust in Online Collaborative Groups: A Constructivist Psychodynamic View

    Science.gov (United States)

    Smith, Regina O.

    2011-01-01

    Trust represents one of the most critical issues facing online collaborative groups (OCG). The growth of online courses and programs and the growth of collaborative learning pedagogical strategies through the text-based online environment can make trust issues more salient. This paper examines trust issues in the OCG from a psychodynamic view;…

  17. Paying a Price: Culture, Trust, and Negotiation Consequences

    Science.gov (United States)

    Gunia, Brian C.; Brett, Jeanne M.; Nandkeolyar, Amit K.; Kamdar, Dishan

    2011-01-01

    Three studies contrasting Indian and American negotiators tested hypotheses derived from theory proposing why there are cultural differences in trust and how cultural differences in trust influence negotiation strategy. Study 1 (a survey) documented that Indian negotiators trust their counterparts less than American negotiators. Study 2 (a…

  18. The Formation of Parent-School Trust: A Multilevel Analysis

    Science.gov (United States)

    Adams, Curt M.; Forsyth, Patrick B.; Mitchell, Roxanne M.

    2009-01-01

    Purpose: The authors' focus was on understanding antecedents of parent trust toward schools. Two questions guided the inquiry: Is there a systematic difference in parent-school trust across schools? If so, what organizational conditions predict between-school variability in parent-school trust? Research Methods/Approach: Using multilevel modeling,…

  19. Trustsim - A Simulator for Trust Relationships in Grid Systems

    DEFF Research Database (Denmark)

    2006-01-01

    This report describes the use of Trustsim for simulation of trust- and reputation-based phenomena in small or large scale distributed systems. The trust mechanisms which can be simulated are incremental, in the sense that good behaviour is rewarded by a higher degree of trust and bad behaviour by a...

  20. A Trust That Can't Be Breached.

    Science.gov (United States)

    Penning, Nick

    1990-01-01

    Children's Investment Trust is a proposed trust fund for children's services (nutrition, health, education, and social services) similar in design to Social Security fund. The trust would be funded by a small, progressive payroll tax levied on both employer and employee on wages greater than $5 per hour. The tax would raise $25 billion more every…