WorldWideScience

Sample records for broken trust lessons

  1. Betrayed trust: healing a broken hospital through servant leadership.

    Science.gov (United States)

    Yancer, Deborah A

    2012-01-01

    An investigative reporter with The Washington Post broke the news of a no-confidence vote by the medical staff of a hospital in the suburbs of Washington, District of Columbia. The chaos that followed created a perfect storm for needed change and offered the rare opportunity for unbridled deep and creative collaboration. Issues the hospital faced as a result of this crisis and subsequent events that tested the authenticity of change are summarized. This article focuses on the approach used by the registered nurse chief executive officer (RN-CEO) to humanize the hospital, viewing it as though it were a patient and leading a clinical approach to organizational recovery and health. The relationship that developed between the medical staff leaders and the RN-CEO was pivotal to the hospital's recovery and evolved as a hybrid of servant leadership. Outcomes achieved over a 7-year period and attributable to this relational model are summarized. Finally, the RN-CEO shares lessons learned through experience and reflection and advice for nurses interested in pursuing executive leadership roles.

  2. Forms, Sources and Processes of Trust

    NARCIS (Netherlands)

    Nooteboom, B.

    2006-01-01

    This chapter reviews some key points in the analysis of trust, based on Nooteboom (2002)i.The following questions are addressed.What can we have trust in?What is the relation between trust and control?What are the sources of trust? And what are its limits?By what process is trust built up and broken

  3. Improving service quality in NHS Trust hospitals: lessons from the hotel sector.

    Science.gov (United States)

    Desombre, T; Eccles, G

    1998-01-01

    This article looks to review recent practice undertaken within the UK hotel sector to improve customer service, and suggests ideals that could be implemented within National Health (NHS) Trust hospitals. At a time of increasing competition, hotel firms are using service enhancement as a means to gain competitive advantage, and therefore developing a range of techniques to measure levels of service quality improvement. With continued change in the health service, where greater focus now lies with patient satisfaction, so there is a requirement for managers to adapt techniques presently being offered in other service industries to improve levels of customer service and ensure patients are targeted to define their levels of satisfaction.

  4. Broken Bones (For Parents)

    Science.gov (United States)

    ... Feeding Your 1- to 2-Year-Old Broken Bones KidsHealth > For Parents > Broken Bones Print A A ... bone fragments in place. When Will a Broken Bone Heal? Fractures heal at different rates, depending upon ...

  5. Facts about Broken Bones

    Science.gov (United States)

    ... Room? What Happens in the Operating Room? Broken Bones KidsHealth > For Kids > Broken Bones Print A A ... sticking through the skin . What Happens When a Bone Breaks? It hurts to break a bone! It's ...

  6. The trust formula: Trust = fairness + leadership

    Energy Technology Data Exchange (ETDEWEB)

    Lovenheim, R. [Regulatory and Legislative Consultants, Inc., Rochester, NY (United States)

    1995-11-01

    Many state and compact LLW siting processes have been characterized by slippage and failure. The paper focuses on two major {open_quotes}lessons learned{close_quotes} regarding public interaction and trust, and how these lessons are being applied to current siting efforts. The relationship of environmental idealism and trust will be explored further in this paper. Supreme Court Justice Stephen Breyer concludes his 1994 book, Breaking the Vicious Circle by stating: {open_quotes}Finally, this book also reflects a belief that trust in institutions arises not simply as a result of openness in government, responses to local interest groups, or priorities emphasized in the press -- though these attitudes and actions play an important role -- but also from those institutions doing a difficult job well.{close_quotes}

  7. Removal of broken hardware.

    Science.gov (United States)

    Hak, David J; McElvany, Matthew

    2008-02-01

    Despite advances in metallurgy, fatigue failure of hardware is common when a fracture fails to heal. Revision procedures can be difficult, usually requiring removal of intact or broken hardware. Several different methods may need to be attempted to successfully remove intact or broken hardware. Broken intramedullary nail cross-locking screws may be advanced out by impacting with a Steinmann pin. Broken open-section (Küntscher type) intramedullary nails may be removed using a hook. Closed-section cannulated intramedullary nails require additional techniques, such as the use of guidewires or commercially available extraction tools. Removal of broken solid nails requires use of a commercial ratchet grip extractor or a bone window to directly impact the broken segment. Screw extractors, trephines, and extraction bolts are useful for removing stripped or broken screws. Cold-welded screws and plates can complicate removal of locked implants and require the use of carbide drills or high-speed metal cutting tools. Hardware removal can be a time-consuming process, and no single technique is uniformly successful.

  8. Organizational trust or beyond appearances

    Directory of Open Access Journals (Sweden)

    Maria Dromereschi

    2010-12-01

    Full Text Available People and organizations to whom I am giving life to have an enormous need to trust and be trustworthy. Trust represents a fragile asset who needs to be invested in, which is difficult to obtain and takes time to obtain it, but which can be easily broken. Paradoxically, it is a universal trade currency, world-widely understood and appreciated. The relations based on trust are those which determine a company to grow and create a competitive advantage. Trust generates trust. It is the one that inspires and motivates, requires the preservation of a certain set of values, mainly sincerity, fairness, perseverance and a real preoccupation for meeting the needs of other people.

  9. Trust in agile teams

    DEFF Research Database (Denmark)

    Tjørnehøj, Gitte; Fransgård, Mette; Skalkam, Signe

    2012-01-01

    success. This article reports from a study of two agile DSD teams with very different organization and collaboration patterns. It addresses the role of trust and distrust in DSD by analyzing how the team members’ trust developed and erode through the lifetime of the two collaborations and how management...... actions influenced this. We see two important lessons from the analysis. First the agile practices of daily Scrum and self organizing team can empower DSD teams to manage their own development of trust and thereby alleviate the obstacles of DSD. Second if management fails to support the development......Abstract. Distributed software development (DSD) is becoming everyday practice in the software field. Difficult challenges and difficulty reaching the expected benefits are well documented. The key challenges are communication, coordination and control issues due to temporal, geographical and socio...

  10. Weakly broken galileon symmetry

    Energy Technology Data Exchange (ETDEWEB)

    Pirtskhalava, David [Scuola Normale Superiore, Piazza dei Cavalieri 7, 56126 Pisa (Italy); Santoni, Luca; Trincherini, Enrico [Scuola Normale Superiore, Piazza dei Cavalieri 7, 56126 Pisa (Italy); INFN, Sezione di Pisa, Piazza dei Cavalieri 7, 56126 Pisa (Italy); Vernizzi, Filippo [Institut de Physique Théorique, Université Paris Saclay, CEA, CNRS, Gif-sur-Yvette cédex, F-91191 (France)

    2015-09-01

    Effective theories of a scalar ϕ invariant under the internal galileon symmetryϕ→ϕ+b{sub μ}x{sup μ} have been extensively studied due to their special theoretical and phenomenological properties. In this paper, we introduce the notion of weakly broken galileon invariance, which characterizes the unique class of couplings of such theories to gravity that maximally retain their defining symmetry. The curved-space remnant of the galileon’s quantum properties allows to construct (quasi) de Sitter backgrounds largely insensitive to loop corrections. We exploit this fact to build novel cosmological models with interesting phenomenology, relevant for both inflation and late-time acceleration of the universe.

  11. How Cryptosystems Get Broken

    Institute of Scientific and Technical Information of China (English)

    Adi Shamir

    2009-01-01

    @@ It's all us pleasure to come to China.a great deal of cheerful times already.I hope that we have additional opportunity to meet,talk about cryptography and other components.Today I am going to give a general talk which is not designed for special lists,about how could the systems get broken like this.I think I don't assume you know much about cryptography and some of the basics.Cryptography deals with issue how to send secret information from a sender which is usually called Alice.to a receiver which is usually called Bob.The usual way how to encrypt data is to use an encryption box that accepts the plaintext,the plaintext is the message that you would like to send encrypted.It could be just"Good morning".By using a secret cryptographic key K,you put ciphertext which looks very very strange."zqvkj…".

  12. Rethinking trust.

    Science.gov (United States)

    Kramer, Roderick M

    2009-06-01

    Will we ever learn? We'd barely recovered from Enron and WorldCom before we faced the subprime mortgage meltdown and more scandals that shook our trust in businesspeople. Which raises the question: Do we trust too much? In this article, Stanford professor and social psychologist Kramer explores the reasons we trust so easily--and, often, so unwisely. He explains that genetics and childhood learning make us predisposed to trust and that it's been a good survival mechanism. That said, our willingness to trust makes us vulnerable. Our sense of trust kicks in on remarkably simple cues, such as when people look like us or are part of our social group. We also rely on third parties to verify the character of others, sometimes to our detriment (as the victims of Bernard Madoff learned). Add in our illusions of invulnerability and our tendencies to see what we want to see and to overestimate our own judgment, and the bottom line is that we're often easily fooled. We need to develop tempered trust. For those who trust too much, that means reading cues better; for the distrustful, it means developing more receptive behaviors. Everyone should start with small acts of trust that encourage reciprocity and build up. Having a hedge against potential abuses also helps. Hollywood scriptwriters, for instance, register their treatments with the Writers Guild of America to prevent their ideas from being stolen by the executives they pitch. To attract the right relationships, people must strongly signal their own honesty, proactively allay concerns, and, if their trust is abused, retaliate. Trusting individuals in certain roles, which essentially means trusting the system that selects and trains them, also works but isn't foolproof. And don't count on due diligence alone for protection; constant vigilance is needed to make sure the landscape hasn't changed.

  13. The affordances of broken affordances

    DEFF Research Database (Denmark)

    Grünbaum, Martin Gielsgaard; Simonsen, Jakob Grue

    2015-01-01

    important: how users may (i) achieve their goals in the presence of such broken affordances, and may (ii) repurpose or otherwise interact with artefacts with broken affordances. We argue that (A) thorough analyses of breakdowns of affordances and their associated signifiers and feedbacks have implication...

  14. Universal lessons learned by a gastroenterologist from a deaf and mute patient: the importance of nonverbal communication and establishing patient rapport and trust.

    Science.gov (United States)

    Cappell, Mitchell S

    2009-01-01

    Deaf and mute patients may require minimal extra attention to establish trust and allay anxieties before minor medical maneuvers such as rectal examination. An extreme case is reported of the consequences from failure to accomplish this. A generally cooperative deaf and mute patient struggled and suffered a rectal tear and perforation during enema insertion that required emergency colorectal surgery; his nurse had failed to establish a trusting relationship before enema insertion. Ironically, the patient's physician had earlier easily performed digital rectal examination, a similar medical maneuver, with patient cooperation after establishing patient rapport. This report demonstrates the importance of treating individuals with disabilities like everyone else in addressing anxieties before medical maneuvers. The health care worker has the same responsibility of calming the patient, whether deaf or not; the sole difference is that communication between deaf and hearing requires greater skill and patience.

  15. Trust matters

    DEFF Research Database (Denmark)

    Østergaard, Lise Rosendal

    2015-01-01

    of this article trust is defined as a voluntary course of action, which involves the optimistic expectation that the trustee will do no harm to the trustor and is increasingly perceived as an important influence on health system functioning. The article looks at trust issues in interpersonal, intergroup...... and institutional situations. The findings of the review point to four elements that are important for trust to develop in health sector relationships: the sensitive use of discretionary power by health workers, perceived empathy by patients of the health workers, the quality of medical care and workplace...

  16. Broken Bones, Sprains, and Strains (For Parents)

    Science.gov (United States)

    ... Feeding Your 1- to 2-Year-Old Broken Bones, Sprains, and Strains KidsHealth > For Parents > Broken Bones, ... home. What to Do: For a Suspected Broken Bone: Do not move a child whose injury involves ...

  17. Distal Radius Fracture (Broken Wrist)

    Science.gov (United States)

    .org Distal Radius Fracture (Broken Wrist) Page ( 1 ) The radius is the larger of the two bones of the forearm. The ... the distal end. A fracture of the distal radius occurs when the area of the radius near ...

  18. Broken toe - self-care

    Science.gov (United States)

    Fractured toe - self-care; Broken bone - toe - self-care; Fracture - toe - self-care; Fracture phalanx - toe ... often treated without surgery and can be taken care of at home. Severe injuries include: Breaks that ...

  19. Can we trust robots?

    NARCIS (Netherlands)

    Coeckelbergh, Mark

    2011-01-01

    Can we trust robots? Responding to the literature on trust and e-trust, this paper asks if the question of trust is applicable to robots, discusses different approaches to trust, and analyses some preconditions for trust. In the course of the paper a phenomenological-social approach to trust is arti

  20. Job loss and broken partnerships

    DEFF Research Database (Denmark)

    Kriegbaum, Margit; Christensen, Ulla; Lund, Rikke;

    2008-01-01

    The aim of this study was to investigate the effects of the accumulated number of job losses and broken partnerships (defined as the end of cohabitation) on the risk of fatal and nonfatal events of ischemic heart disease (IHD).......The aim of this study was to investigate the effects of the accumulated number of job losses and broken partnerships (defined as the end of cohabitation) on the risk of fatal and nonfatal events of ischemic heart disease (IHD)....

  1. Trust, confidentiality, and the acceptability of sharing HIV-related patient data: lessons learned from a mixed methods study about Health Information Exchanges

    Directory of Open Access Journals (Sweden)

    Maiorana Andre

    2012-04-01

    Full Text Available Abstract Background Concerns about the confidentiality of personal health information have been identified as a potential obstacle to implementation of Health Information Exchanges (HIEs. Considering the stigma and confidentiality issues historically associated with human immunodeficiency virus (HIV disease, we examine how trust—in technology, processes, and people—influenced the acceptability of data sharing among stakeholders prior to implementation of six HIEs intended to improve HIV care in parts of the United States. Our analyses identify the kinds of concerns expressed by stakeholders about electronic data sharing and focus on the factors that ultimately facilitated acceptability of the new exchanges. Methods We conducted 549 surveys with patients and 66 semi-structured interviews with providers and other stakeholders prior to implementation of the HIEs to assess concerns about confidentiality in the electronic sharing of patient data. The patient quantitative data were analyzed using SAS 9.2 to yield sample descriptive statistics. The analysis of the qualitative interviews with providers and other stakeholders followed an open-coding process, and convergent and divergent perspectives emerging from those data were examined within and across the HIEs. Results We found widespread acceptability for electronic sharing of HIV-related patient data through HIEs. This acceptability appeared to be driven by growing comfort with information technologies, confidence in the security protocols utilized to protect data, trust in the providers and institutions who use the technologies, belief in the benefits to the patients, and awareness that electronic exchange represents an enhancement of data sharing already taking place by other means. HIE acceptability depended both on preexisting trust among patients, providers, and institutions and on building consensus and trust in the HIEs as part of preparation for implementation. The process of HIE

  2. Trusted Domain

    DEFF Research Database (Denmark)

    Hjorth, Theis Solberg; Torbensen, Rune

    2012-01-01

    In the digital age of home automation and with the proliferation of mobile Internet access, the intelligent home and its devices should be accessible at any time from anywhere. There are many challenges such as security, privacy, ease of configuration, incompatible legacy devices, a wealth...... remote access via IP-based devices such as smartphones. The Trusted Domain platform fits existing legacy technologies by managing their interoperability and access controls, and it seeks to avoid the security issues of relying on third-party servers outside the home. It is a distributed system...... of wireless standards, limited resources of embedded systems, etc. Taking these challenges into account, we present a Trusted Domain home automation platform, which dynamically and securely connects heterogeneous networks of Short-Range Wireless devices via simple non-expert user. interactions, and allows...

  3. Trusted Objects

    Energy Technology Data Exchange (ETDEWEB)

    CAMPBELL,PHILIP L.; PIERSON,LYNDON G.; WITZKE,EDWARD L.

    1999-10-27

    In the world of computers a trusted object is a collection of possibly-sensitive data and programs that can be allowed to reside and execute on a computer, even on an adversary's machine. Beyond the scope of one computer we believe that network-based agents in high-consequence and highly reliable applications will depend on this approach, and that the basis for such objects is what we call ''faithful execution.''

  4. Invariants of broken discrete symmetries

    OpenAIRE

    Kalozoumis, P.; Morfonios, C.; Diakonos, F. K.; Schmelcher, P.

    2014-01-01

    The parity and Bloch theorems are generalized to the case of broken global symmetry. Local inversion or translation symmetries are shown to yield invariant currents that characterize wave propagation. These currents map the wave function from an arbitrary spatial domain to any symmetry-related domain. Our approach addresses any combination of local symmetries, thus applying in particular to acoustic, optical and matter waves. Nonvanishing values of the invariant currents provide a systematic ...

  5. Invariants of broken discrete symmetries

    CERN Document Server

    Kalozoumis, P; Diakonos, F K; Schmelcher, P

    2014-01-01

    The parity and Bloch theorems are generalized to the case of broken global symmetry. Local inversion or translation symmetries are shown to yield invariant currents that characterize wave propagation. These currents map the wave function from an arbitrary spatial domain to any symmetry-related domain. Our approach addresses any combination of local symmetries, thus applying in particular to acoustic, optical and matter waves. Nonvanishing values of the invariant currents provide a systematic pathway to the breaking of discrete global symmetries.

  6. Learning to Trust

    NARCIS (Netherlands)

    Nooteboom, B.

    2005-01-01

    Trust is full of puzzle and paradox.Trust is both rational and emotional. Trust can go beyond calculative self-interest, but has its limits.People may want to trust, while they may also feel threatened by it.If trust is not in place prior to a relationship, on the basis of institutions, prior experi

  7. Trusting the state, trusting each other?

    DEFF Research Database (Denmark)

    Sønderskov, Kim Mannemar; Dinesen, Peter Thisted

    2016-01-01

    Trust in state institutions is a prominent explanation of social trust. However, previous—mainly cross-sectional—analyses provide limited causal evidence regarding the relationship between institutional trust and social trust and it is thus essentially unknown whether an observed relationship...... reflects reverse causality (social trust forming institutional trust), or both forms of trust reflecting deep-seated dispositions (common confounding). Against the backdrop of the shortcomings of previous cross-sectional analyses, this paper utilizes two Danish panel surveys containing measures of both...... types of trust for the same individuals surveyed at multiple points in time over a long time-span (up to 18 years) to address the potentially reverse and/or spurious relationship. Using individual fixed effects and cross-lagged panel models, the results provide strong evidence of trust in state...

  8. Architecture of Trusted PC

    Institute of Scientific and Technical Information of China (English)

    WU Shuhua; ZHU Yuefei

    2006-01-01

    This paper, focusing on the trusted computing group's standards, explained the key concept of trusted computing and provided the architecture of trusted PC. It built trust bottom-up by starting with trusted hardware and adding layers of trusted software. It is a system-level solution available to all applications running on the member platforms. This solution reduces the security burden on applications and thus simplifies application programming.

  9. Invariants of Broken Discrete Symmetries

    Science.gov (United States)

    Kalozoumis, P. A.; Morfonios, C.; Diakonos, F. K.; Schmelcher, P.

    2014-08-01

    The parity and Bloch theorems are generalized to the case of broken global symmetry. Local inversion or translation symmetries in one dimension are shown to yield invariant currents that characterize wave propagation. These currents map the wave function from an arbitrary spatial domain to any symmetry-related domain. Our approach addresses any combination of local symmetries, thus applying, in particular, to acoustic, optical, and matter waves. Nonvanishing values of the invariant currents provide a systematic pathway to the breaking of discrete global symmetries.

  10. Ritual of the Broken Stone

    OpenAIRE

    Bel, Bernard

    2011-01-01

    This “ritual of the broken stone” was performed in July 1996 to celebrate an auspicious event in a private house of Choglamsar, a settlement of Tibetan migrates in a suburb of Leh (Ladakh, India). According to local informants, its performers were ermits living in caves of Spiti. Most astonishing is the mixture of a religious ritual with comical scenes and demonstrations of 'magical' powers. Este “ritual de la piedra rota“ se llevó a cabo en julio de 1996 para celebrar un acontecimiento au...

  11. Broken Windows and Collective Efficacy

    Directory of Open Access Journals (Sweden)

    Aldrin Abdullah

    2015-01-01

    Full Text Available The broken windows thesis posits that signs of disorder increase crime and fear, both directly and indirectly. Although considerable theoretical evidence exists to support the idea that disorder is positively related to fear of crime, the empirical literature on examining the indirect effect of the individual’s perception of incivilities on fear of crime is limited, especially in developing countries. This research was conducted to assess the indirect relationship between perceived disorder and fear of crime through collective efficacy. A total of 235 households from Penang, Malaysia, participated in this study. Results reveal that high perception of disorder is negatively associated with collective efficacy. High collective efficacy is associated with low fear of crime. Moreover, a significant and indirect effect of disorder on fear of crime exists through collective efficacy. The results provide empirical support for the broken windows theory in the Malaysian context and suggest that both environmental conditions and interactions of residents play a role in the perceived fear of crime.

  12. Trust and Leadership

    DEFF Research Database (Denmark)

    Bordum, Anders

    2005-01-01

    The concept and phenomenon of trust and its relation to leadership has recently come into focus. What role does trust play? Can trust be created strategically? Questions like these are often raised. How we conceive of and conceptualize trust is not as often discussed. Among those conceptualizations...... flexibility of form for example, the idea that one with leadership tools can consciously bring forth trust. In the conclusion, the question about trust communication is addressed. In this section I argue that trust is positively value-laden, becausesincerity is a functional and pragmatic condition...

  13. Balancing Trust and Control

    DEFF Research Database (Denmark)

    Jagd, Søren

    This paper focuses on the leadership challenge of balancing trust and control. The relation between trust and control has for a long time been a puzzling issue for management researchers. In the paper I first show that there has been a dramatic change in the way the relation between trust...... and control has been conceptualized in trust research. While the relation between trust and control earlier was conceptualized as a more or less stable balance between trust and control, more recent research conceptualizes the relation between trust and control more as a dynamical process that involves...... an ongoing process of balancing the relation between trust and control. Second, taking the departure in the recent conceptualization of the balance between trust and control as an interactive process I discuss the challenges for management in handling this more subtle balancing of trust and control...

  14. New technique for withdrawing broken sheath

    Directory of Open Access Journals (Sweden)

    Süleyman Cagan Efe

    2016-03-01

    Full Text Available A sheath that is broken inside vessel is a rare complication, and intravascular fragments from broken sheaths are retrieving transcutaneously by techniques including the loop snare catheter, basket catheter, and grasping/biopsy forceps. We reported a less common type of broken central venous sheath in location and a successful unique technique for retrieving it from subclavian vein by using noncompliant balloon from 40 year old female patient.

  15. Calculativeness and trust

    DEFF Research Database (Denmark)

    Frederiksen, Morten

    2014-01-01

    Williamson’s characterisation of calculativeness as inimical to trust contradicts most sociological trust research. However, a similar argument is found within trust phenomenology. This paper re-investigates Williamson’s argument from the perspective of Løgstrup’s phenomenological theory of trust....... Contrary to Williamson, however, Løgstrup’s contention is that trust, not calculativeness, is the default attitude and only when suspicion is awoken does trust falter. The paper argues that while Williamson’s distinction between calculativeness and trust is supported by phenomenology, the analysis needs...... to take actual subjective experience into consideration. It points out that, first, Løgstrup places trust alongside calculativeness as a different mode of engaging in social interaction, rather conceiving of trust as a state or the outcome of a decision-making process. Secondly, the analysis must take...

  16. Dimensions of trust

    DEFF Research Database (Denmark)

    Frederiksen, Morten

    2012-01-01

    Georg Simmel is the seminal author on trust within sociology, but though inspired by Simmel, subsequent studies of intersubjective trust have failed to address Simmel’s suggestion that trust is as differentiated as the social relations of which it is part. Rather, trust has been studied within...... limited sets of exchange or work relations. This article revisits Simmel’s concept of trust as social form in order to investigate this differentiation. From an interview study, the differentiation and limits of trust are analysed within different types of social relations. Trust is found to vary greatly...... in scope and mode influenced by the intersecting dimensions of relations, objects and situations. Furthermore, trust exists between an outer threshold of expected deceit and an inner threshold of confident reliance. The findings from the qualitative study contribute new knowledge on the diversity of trust...

  17. 49 CFR 230.39 - Broken staybolts.

    Science.gov (United States)

    2010-10-01

    ..., DEPARTMENT OF TRANSPORTATION STEAM LOCOMOTIVE INSPECTION AND MAINTENANCE STANDARDS Boilers and Appurtenances Staybolts § 230.39 Broken staybolts. (a) Maximum allowable number of broken staybolts. No boiler shall be... inside the firebox or combustion chamber on a straight line. No boiler shall be allowed to remain...

  18. Modeling Trusted Computing

    Institute of Scientific and Technical Information of China (English)

    CHEN Shuyi; WEN Yingyou; ZHAO Hong

    2006-01-01

    In this paper, a formal approach based on predicate logic is proposed for representing and reasoning of trusted computing models. Predicates are defined to represent the characteristics of the objects and the relationship among these objects in a trusted system according to trusted computing specifications. Inference rules of trusted relation are given too. With the semantics proposed, some trusted computing models are formalized and verified, which shows that Predicate calculus logic provides a general and effective method for modeling and reasoning trusted computing systems.

  19. Looking for Trust

    DEFF Research Database (Denmark)

    Bøge, Ask Risom; Lauritsen, Peter

    Trust and surveillance are often seen as opposites. Trust is regularly characterized as the glue that holds society together, while surveillance is seen as corrosive. However, in Scandinavia high levels of trust and surveillance coexist. It is therefore interesting to investigate if there is a co......Trust and surveillance are often seen as opposites. Trust is regularly characterized as the glue that holds society together, while surveillance is seen as corrosive. However, in Scandinavia high levels of trust and surveillance coexist. It is therefore interesting to investigate...

  20. Reliable Design Versus Trust

    Science.gov (United States)

    Berg, Melanie; LaBel, Kenneth A.

    2016-01-01

    This presentation focuses on reliability and trust for the users portion of the FPGA design flow. It is assumed that the manufacturer prior to hand-off to the user tests FPGA internal components. The objective is to present the challenges of creating reliable and trusted designs. The following will be addressed: What makes a design vulnerable to functional flaws (reliability) or attackers (trust)? What are the challenges for verifying a reliable design versus a trusted design?

  1. The productivity of trust

    DEFF Research Database (Denmark)

    Bjørnskov, Christian; Méon, Pierre-Guillaume

    This paper returns to one of the early questions of the literature on social trust, whether trust affects total factor productivity (TFP). Using both development and growth accounting, we find strong evidence of a causal effect of trust on the level and growth of TFP. Using a three-stage least......-squares procedure, we moreover observe that the effect of trust on TFP runs entirely through property-rights institutions and not political institutions. Those findings resist a series of robustness checks....

  2. Trust and controlling

    OpenAIRE

    Bieńkowska Agnieszka; Zabłocka-Kluczka Anna

    2016-01-01

    The purpose of this study is to discuss the trust within and towards an organisation in the context of implementation of controlling therein. In this context the essence of trust and its importance in organisation management was presented, as well as trust in the contemporary management methods and concepts. Controlling as a trust-building factor inside an organisation was pointed out. Especially controlling and control were described. Moreover management by considering deviations in controll...

  3. Trust in Consumer Electronics

    Science.gov (United States)

    Kursawe, Klaus; Katzenbeisser, Stefan

    While Trusted Computing is getting increasing attention in the PC world, consumer electronics devices have limited benefit from the Trusted Computing solutions currently under development. In this paper we outline the different requirements of consumer electronics devices, when compared to the PC world, and point out the technical consequences for standards like the Trusted Computing Group. In addition, we will touch on economic aspects that may inhibit or support Trusted Computing in this domain.

  4. The Process of Trust Development

    DEFF Research Database (Denmark)

    Jagd, Søren; Højland, Jeppe

    by high trust and co-operation? In this paper we explore the process of trust development during an organisational change project in a Danish SME by looking at two kinds of trust relations: employee trust in management and trust relations among employees. We find substantial differences in trust...

  5. Trust and Credit

    DEFF Research Database (Denmark)

    Harste, Gorm

    The present paper is an answer to the question, how did trust and credit emerge. The systems of trust and credit reduce the environmental and contextual complexities in which trust and credit are embedded. The paper analyses the forms of this reduction in a number of stages in the evolution...

  6. Trust Management V

    DEFF Research Database (Denmark)

    2011-01-01

    from 42 submissions. The papers feature both theoretical research and real-world case studies from academia, business and government focusing on areas such as: trust models, social and behavioral aspects of trust, trust in networks, mobile systems and cloud computation, privacy, reputation systems...

  7. Trust Drives Internet Use

    DEFF Research Database (Denmark)

    Ljunge, Jan Martin

    to all media, as individuals with high trust are shown to consume less television. The finding provides evidence for one mechanism through which trust creates good outcomes. Individuals with high trust spend time online, and eschew the isolation of the TV couch, which may produce more productive...

  8. Planning Lessons

    Institute of Scientific and Technical Information of China (English)

    Linda Jensen

    2007-01-01

    @@ Jensen's "Lesson Planning"article serves aS a guide fOr novice teachers who need to create formalized lesson plans.The article covers why,when,and how teachers plan lessons,as well aS basic lesson plan principles and a lesson plan template.

  9. Social Trust and Fractionalization:

    DEFF Research Database (Denmark)

    Bjørnskov, Christian

    2008-01-01

    This paper takes a closer look at the importance of fractionalization for the creation of social trust. It first argues that the determinants of trust can be divided into two categories: those affecting individuals' trust radii and those affecting social polarization. A series of estimates using...... a much larger country sample than in previous literature confirms that fractionalization in the form of income inequality and political diversity adversely affects social trust while ethnic diversity does not. However, these effects differ systematically across countries, questioning standard...... interpretations of the influence of fractionalization on trust....

  10. Trust Based Pervasive Computing

    Institute of Scientific and Technical Information of China (English)

    LI Shiqun; Shane Balfe; ZHOU Jianying; CHEN Kefei

    2006-01-01

    Pervasive computing environment is a distributed and mobile space. Trust relationship must be established and ensured between devices and the systems in the pervasive computing environment. The trusted computing (TC) technology introduced by trusted computing group is a distributed-system-wide approach to the provisions of integrity protection of resources. The TC' notion of trust and security can be described as conformed system behaviors of a platform environment such that the conformation can be attested to a remote challenger. In this paper the trust requirements in a pervasive/ubiquitous environment are analyzed. Then security schemes for the pervasive computing are proposed using primitives offered by TC technology.

  11. Nobel Prize for work on broken symmetries

    CERN Multimedia

    2008-01-01

    The 2008 Nobel Prize for Physics goes to three physicists who have worked on broken symmetries in particle physics. The announcement of the 2008 Nobel Prize for physics was transmitted to the Globe of Science and Innovation via webcast on the occasion of the preview of the Nobel Accelerator exhibition.On 7 October it was announced that the Royal Swedish Academy of Sciences had awarded the 2008 Nobel Prize for physics to three particle physicists for their fundamental work on the mechanisms of broken symmetries. Half the prize was awarded to Yoichiro Nambu of Fermilab for "the discovery of the mechanism of spontaneous broken symmetry in subatomic physics". The other half is shared by Makato Kobayashi of Japan’s KEK Institute and Toshihide Maskawa of the Yukawa Institute at the University of Kyoto "for the discovery of the origin of the broken symmetry which predicts the existence of at least three families of quarks in Nature". At th...

  12. Social Networks in Crisis Response: Trust is Vital

    Science.gov (United States)

    2016-06-01

    Understanding the characteristics of these two types of social networks is important in correlating them with some of the positive and negative ...Distribution Unlimited Social Networks in Crisis Response: Trust is Vital Tom Humplik, Sarah B. Smedley, Elizabeth A. Collins... social networking , looking for lessons learned, and focusing on social /organizational theories. The results of this study will inform stakeholders of

  13. Trust in Strategic Alliances

    DEFF Research Database (Denmark)

    Nielsen, Bo

    2011-01-01

    This article examines the dynamic and multi-dimensional nature of trust in strategic alliances. Adopting a co-evolutionary approach, I developed a framework to show how trust, conceptualised in different forms, plays distinct roles at various evolutionary stages of the alliance relationship....... Emphasising the multi-dimensional and dynamic role of trust, the framework illustrates how initial levels of a particular type of trust may co-evolve with the alliance and influence subsequent phases of the relationship – either on its own or in combination with other types or dimensions of trust....... The theoretical distinction between trust as antecedent, moderator and outcome during the evolution of the alliance relationship leads to research questions that may guide future empirical research....

  14. Balancing Trust and Control

    DEFF Research Database (Denmark)

    Jagd, Søren

    2010-01-01

    The purpose of this paper is to show that conceptualizing trust and control as interactively related processes, as opposed to more static conceptualizations of the two concepts and the relations between them, adds importantly towards understanding the challenges involved in balancing of trust...... and control in organizations. The paper examines recent literature on the conceptualization of the relation between trust and control in and between organizations. The literature review shows that trust and control has been conceptualized as either substituting or complementing each other. Further......, it is found that the complementary/substitution debate calls for an explicit conceptualization of the relation between trust and control as an interactive process, in contrast to earlier conceptualizations of trust and control as two relatively static and isolated concepts. While the static perspective...

  15. Trust vs. Confidence

    Science.gov (United States)

    2016-06-07

    Page 1 1. Introduction Our goal in this short paper is to explore the relationship between trust and confidence...goal of this paper is to consider the relationship between our concept of trust, and the notion of confidence as represented by Baranski’s work and to...This definition clearly argues that trust relates to expectations around several key properties of the trustee, and is affected by both interpersonal

  16. The Dimensionality of Trust

    Science.gov (United States)

    2016-06-07

    undesired events. Several trust theorists have characterized distrust as that which is feared, and trust as that which is hoped (e.g., Deutsch , 1958...earliest trust theorist, Morton Deutsch (1958, p. 267) defines suspicion (a concept Deutsch has used interchangeably with the distrust concept) as...theorists have conceptualised distrust as a psychological state as well as a choice behaviour. Theorists such as Deutsch (1958) have equated non

  17. Softly Broken Supersymmetric Gauge Theories through Compactifications

    CERN Document Server

    Takenaga, K

    1998-01-01

    Effects of boundary conditions of fields for compactified space directions on the supersymmetric gauge theories are discussed. For general and possible boundary conditions the supersymmetry is explicitly broken to yield universal soft supersymmetry breaking terms, and the gauge symmetry of the theory can also be broken through the dynamics of non-integrable phases, depending on number and the representation under the gauge group of matters. The 4-dimensional supersymmetric QCD is studied as a toy model when one of the space coordinates is compactified on $S^1$.

  18. Does trust pay off?

    NARCIS (Netherlands)

    R. de Bliek (Ruben)

    2012-01-01

    textabstractIt is believed that a society's level of trust in strangers, also known as generalized or interpersonal trust, is an accurate reflection of the quality of civil society and of the success of its accompanying economy. Two unresolved issues remain. The first issue concerns the generalizabi

  19. Trust vs. Crisis

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    2014-01-01

    to judge whom to trust. One logical solution to a crisis is to rebuild a shared understanding of the norms involved in any given context. Banking is used as a case. Central concepts are borrowed from Niklas Luhmann Trust (1968), Alf Ross Directives and Norms (1967), and Arthur G. Neal National Trauma...

  20. The Determinants of Trust

    DEFF Research Database (Denmark)

    Bjørnskov, Christian

    , in particular emphasizing the role of social trust. This is in turn defined as the confidence people have that strangers, i.e. fellow citizens on whom they have no specific information, will not take advantage of them (Uslaner, 2002; Bjørnskov, 2006). Using the answers to the World Values Survey question “In...... general, do you think that most people can be trusted?”, the by now quite substantial literature has found that social trust is associated with a set of different macroeconomic outcomes: economic growth, the rule of law and overall quality of governance, corruption, education, the extent of violent crime...... and subjective well-being are all influenced by the propensity of people within any nation to trust each other. The questions are therefore where trust comes from and whether or not it can be affected by public policy. The answers to these questions seem to divide researchers into two camps: the optimists...

  1. Trust, Innovation and Prosperity

    Directory of Open Access Journals (Sweden)

    Stanislav Szabo

    2013-12-01

    Full Text Available Economic development and its determinants, esp. trust or innovation are subjects of several scientific studies. Several authors claim the importance of innovation for economic development. Some studies identified that one of the most crucial factor for economic growth and prosperity is the trust between people. Within the research in this paper we have tried to identify the role of interpersonal trust within the innovation vs. prosperity relation. For this purpose and for causality analysis, we have applied decision tree models. Through our analysis of country based data (involved in trust related WVS surveys in opposition to current studies, we have identified, that interpersonal trust is more significant determinant of innovation development as prosperity.

  2. Trust and controlling

    Directory of Open Access Journals (Sweden)

    Bieńkowska Agnieszka

    2016-12-01

    Full Text Available The purpose of this study is to discuss the trust within and towards an organisation in the context of implementation of controlling therein. In this context the essence of trust and its importance in organisation management was presented, as well as trust in the contemporary management methods and concepts. Controlling as a trust-building factor inside an organisation was pointed out. Especially controlling and control were described. Moreover management by considering deviations in controlling and the teamwork in controlling were described. The role of controlling in process of trust-building to an organisation was presented. Establishing relations with the environment and systems of measurement of organisation’s achievements were presented, too.

  3. Ratchet due to broken friction symmetry

    DEFF Research Database (Denmark)

    Norden, Bengt; Zolotaryuk, Yaroslav; Christiansen, Peter Leth;

    2002-01-01

    A ratchet mechanism that occurs due to asymmetric dependence of the friction of a moving system on its velocity or a driving force is reported. For this kind of ratchet, instead of a particle moving in a periodic potential, the dynamics of which have broken space-time symmetry, the system must be...

  4. Broken windows, mediocre methods, and substandard statistics

    NARCIS (Netherlands)

    Wicherts, J.M.; Bakker, M.

    2014-01-01

    Broken windows theory states that cues of inappropriate behavior like litter or graffiti amplify norm-violating behavior. In a series of quasi-experiments, Keizer, Lindenberg, and Steg altered cues of inappropriate behavior in public places and observed how many passersby subsequently violated norms

  5. PERIODIC-SOLUTIONS IN SPONTANEOUSLY BROKEN THEORIES

    NARCIS (Netherlands)

    BRIHAYE, Y; KUNZ, J

    1992-01-01

    A class of spontaneously broken field theories is proposed, and the occurrence of their periodic, classical solutions is investigated in detail. The emergence of multiple solutions is observed, their normal modes of oscillation are studied, and the bifurcations of the classical energy functional are

  6. Trust transitivity in social networks

    CERN Document Server

    Richters, Oliver

    2010-01-01

    Non-centralized recommendation-based decision making is a central feature of several social and technological processes, such as market dynamics, peer-to-peer file-sharing and the web of trust of digital certification. We investigate the properties of trust propagation on networks, based on a simple metric of trust transitivity. We investigate analytically the percolation properties of trust transitivity in random networks with arbitrary degree distribution, and compare with numerical realizations. We find that the existence of a non-zero fraction of absolute trust (i.e. entirely confident trust) is a requirement for the viability of global trust propagation in large systems: The average pair-wise trust is marked by a discontinuous transition at a specific fraction of absolute trust, below which it vanishes. Furthermore, we perform an extensive analysis of the Pretty Good Privacy (PGP) web of trust, in view of the concepts introduced. We compare different scenarios of trust distribution: community- and author...

  7. Trusted dynamic level scheduling based on Bayes trust model

    Institute of Scientific and Technical Information of China (English)

    WANG Wei; ZENG GuoSun

    2007-01-01

    A kind of trust mechanism-based task scheduling model was presented. Referring to the trust relationship models of social persons, trust relationship is built among Grid nodes, and the trustworthiness of nodes is evaluated by utilizing the Bayes method. Integrating the trustworthiness of nodes into a Dynamic Level Scheduling (DLS) algorithm, the Trust-Dynamic Level Scheduling (Trust-DLS) algorithm is proposed. Theoretical analysis and simulations prove that the Trust-DLS algorithm can efficiently meet the requirement of Grid tasks in trust, sacrificing fewer time costs, and assuring the execution of tasks in a security way in Grid environment.

  8. Chimpanzees Trust Their Friends.

    Science.gov (United States)

    Engelmann, Jan M; Herrmann, Esther

    2016-01-25

    The identification and recruitment of trustworthy partners represents an important adaptive challenge for any species that relies heavily on cooperation [1, 2]. From an evolutionary perspective, trust is difficult to account for as it involves, by definition, a risk of non-reciprocation and defection by cheaters [3, 4]. One solution for this problem is to form close emotional bonds, i.e., friendships, which enable trust even in contexts where cheating would be profitable [5]. Little is known about the evolutionary origins of the human tendency to form close social bonds to overcome the trust problem. Studying chimpanzees (Pan troglodytes), one of our closest living relatives, is one way of identifying these origins. While a growing body of research indicates that at least some of the properties of close human relationships find parallels in the social bonds of chimpanzees [6-10] and that chimpanzees extend favors preferentially toward selected individuals [11-14], it is unclear whether such interactions are based on trust. To fill this gap in knowledge, we observed the social interactions of a group of chimpanzees and established dyadic friendship relations. We then presented chimpanzees with a modified, non-verbal version of the human trust game and found that chimpanzees trust their friends significantly more frequently than their non-friends. These results suggest that trust within closely bonded dyads is not unique to humans but rather has its evolutionary roots in the social relationships of our closest primate relatives.

  9. Trust vs. Crisis

    Directory of Open Access Journals (Sweden)

    Kirsten Mogensen

    2014-06-01

    Full Text Available The three social phenomena -- norms, trust, and crisis -- are in this paper combined into one model that illustrates their function and relationship. Crisis is seen as a reaction to serious violations of expectations that leave people disoriented, insecure about situational norms, and unable to judge whom to trust. One logical solution to a crisis is to rebuild a shared understanding of the norms involved in any given context. Banking is used as a case. Central concepts are borrowed from Niklas Luhmann Trust (1968, Alf Ross Directives and Norms (1967, and Arthur G. Neal National Trauma & Collective Memory (1998.

  10. Governance, Trust and Taxes

    DEFF Research Database (Denmark)

    Weihe, Guri; Joensen, E. Juanna Schröter

    This paper examines the role of social capital (trust) vis-à-vis the propensity of a country to be a tax haven. The empirical analysis corroborates that better governed countries have a higher ceteris paribus probability to be tax havens. However, social capital counteracts the effect of governance...... quality. This effect is so strong that the partial effect of governance quality is reversed for countries with the trust index in the top quartile – making these high trust countries less likely to be tax havens – even as governance quality is increased. Thus it is crucial to consider the interaction...

  11. Trust repertoires for collaboration

    DEFF Research Database (Denmark)

    Fuglsang, Lars

    This case study analyses the role of trust in a public private innovation network that involved a private consultancy company as a facilitator. We know that collaboration is a important for innovation, and that collaboration across organizational boundaries is not a trivial issue. But we know very...... little about how such processes develop and how trust, understood as “confident positive expectations” (Lewicki et al. 1998) to collaborative activities, arises out of collaboration. The paper contributes by showing how trust and collaboration are intertwined. The main finding is that a facilitator can...

  12. Competition Fosters Trust

    DEFF Research Database (Denmark)

    Huck, Steffen; Lünser, Gabriele; Tyran, Jean-Robert Karl

    2012-01-01

    We study the effects of reputation and competition in a trust game. If trustees are anonymous, outcomes are poor: trustees are not trustworthy, and trustors do not trust. If trustees are identifiable and can, hence, build a reputation, efficiency quadruples but is still at only a third of the first...... best. Adding more information by granting trustors access to all trustees' complete history has, somewhat surprisingly, no effect. On the other hand, we find that competition, coupled with some minimal information, eliminates the trust problem almost completely...

  13. Development of Trusted Computing Research

    Institute of Scientific and Technical Information of China (English)

    ZHANG Huanguo; LUO Jie; JIN Gang; ZHU Zhiqiang; YU Fajiang; YAN Fei

    2006-01-01

    Trusted computing is the new trend of information security today. This paper surveys the theory and technology of trusted computing. The development history of trusted computing, and the development of trusted computing in China are introduced in this paper,and then it analyzes some problems of trusted computing at present which are delay in theory research, some key technologies to be developed and lack of trusted software system. Some fields are worthy to be explored on are pointed out including key technology, basic theory and application in trusted computing.

  14. Broken Ergodicity in Ideal, Homogeneous, Incompressible Turbulence

    Science.gov (United States)

    Morin, Lee; Shebalin, John; Fu, Terry; Nguyen, Phu; Shum, Victor

    2010-01-01

    We discuss the statistical mechanics of numerical models of ideal homogeneous, incompressible turbulence and their relevance for dissipative fluids and magnetofluids. These numerical models are based on Fourier series and the relevant statistical theory predicts that Fourier coefficients of fluid velocity and magnetic fields (if present) are zero-mean random variables. However, numerical simulations clearly show that certain coefficients have a non-zero mean value that can be very large compared to the associated standard deviation. We explain this phenomena in terms of broken ergodicity', which is defined to occur when dynamical behavior does not match ensemble predictions on very long time-scales. We review the theoretical basis of broken ergodicity, apply it to 2-D and 3-D fluid and magnetohydrodynamic simulations of homogeneous turbulence, and show new results from simulations using GPU (graphical processing unit) computers.

  15. Simple Technique for Removing Broken Pedicular Screws

    Directory of Open Access Journals (Sweden)

    A Agrawal

    2014-03-01

    Full Text Available The procedure for removing a broken pedicle screw should ideally be technically easy and minimally invasive, as any damage to the pedicle, during removal of the broken screw, may weaken the pedicle, thus compromising on the success of re-instrumentation. We describe the case of a 32-year old man who had undergone surgery for traumatic third lumbar vertebral body fracture three years prior to current admission and had developed the complication of pedicle screw breakage within the vertebral body. The patient underwent re-exploration and removal of the distal screws. Through a paravertebral incision and muscle separation, the screws and rods were exposed and the implants were removed.

  16. Trust and Professional Skepticism in the Relationship between auditors and Clients: Overcoming the dichotomy Myth

    DEFF Research Database (Denmark)

    Aschauer, Ewald; Fink, Matthias; Andrea, Moro

    2017-01-01

    This study empirically investigates the relationship between auditors' identification-based trust in client firm's managers and their perceptions of auditors' professional skepticism. We employ a multimethod approach broken Down into two studies. First, in study 1, we approached auditors and clie......This study empirically investigates the relationship between auditors' identification-based trust in client firm's managers and their perceptions of auditors' professional skepticism. We employ a multimethod approach broken Down into two studies. First, in study 1, we approached auditors...... and clients using narrative interviews in order to identify the working definitions of interpersonal trust and professional skepticism and also to develop an empirical and testable hypothesis against the backdrop of the current literature. Second, in Study 2, an ordinary least Squares regression based on data...

  17. Some correlates of trust.

    Science.gov (United States)

    Frost, T; Stimpson, D V; Maughan, M R

    1978-05-01

    Trust has been variously defined by behavioral scientists and not very thoroughly investigated. In this study trust was defined as an expectancy held by an individual that the behavior of another person or a group would be altruistic and personally beneficial. An attempt was made, using this conceptual definition, to identify some personality and behavioral correlates of trust. Seven interpersonal relations groups with approximately 10 male and female undergraduates per group were studied with use of the Janis and Field self-esteem inventory, Schutz's FIRO-B scale, and the Rotter internal-external scale. It was discovered that a trusted person is one who is highly influential, has an internal locus of control, a low need to control others, high self-esteem, and is open to being influenced by others.

  18. Trusts and Financialization

    DEFF Research Database (Denmark)

    Harrington, Brooke

    2016-01-01

    This article identifies trusts as a legal structure associated with the global spread of financialization. Although trusts originated in Medieval England, they have acquired a new significance in contemporary finance by virtue of their advantages in terms of 10 profit maximization and capital...... mobility. As a result, trusts have become common in contemporary structured finance for corporations, in addition to their traditional functions as estate planning and asset protection vehicles for high-net-worth individuals. This article specifies three ways in which the trust structure has facilitated...... the global spread of financialization: by privileging the rentier–investor within the 15 world economy; by perpetuating a distinctively Anglo-American approach to finance internationally; and by increasing the autonomy of finance vis-a-vis the nation-state. This study shares the primarily descriptive...

  19. Trust and virtual worlds

    DEFF Research Database (Denmark)

    Ess, Charles; Thorseth, May

    2011-01-01

    We collect diverse philosophical analyses of the issues and problems clustering around trust online with specific attention to establishing trust in virtual environments. The book moves forward important discussions of how virtual worlds and virtuality are to be defined and understood; the role...... by virtuality, such as virtual child pornography. The introduction further develops a philosophical anthropology, rooted in Kantian ethics, phenomenology, virtue ethics, and feminist perspectives, that grounds a specific approach to ethical issues in virtual environments....

  20. Impact of signals and experience on trust and trusting behavior.

    Science.gov (United States)

    Chen, Ying-Hueih; Chien, Shu-Hua; Wu, Jyh-Jeng; Tsai, Pei-Yin

    2010-10-01

    Trust is an essential factor that drives virtual interaction and transactions on the Internet. Researchers have investigated the trust development process, and identified several important factors that form the basis for trust. This research combines the signal perspective and trust theory to examine the impact of market signals and past experience on trust formation and trusting behavior. Three market signals, including brand image, Web-site investment, and privacy policies, are identified and empirically tested to determine their impact on consumer trust. Based on 322 active Web users, the quantitative results suggest that brand image, Web-site investment, privacy policies, and past experience all positively impact trust formation. Furthermore, trust shows a positive effect on Web-site stickiness. Both theoretical and practical implications of the results are also offered.

  1. Trusted Computing Technologies, Intel Trusted Execution Technology.

    Energy Technology Data Exchange (ETDEWEB)

    Guise, Max Joseph; Wendt, Jeremy Daniel

    2011-01-01

    We describe the current state-of-the-art in Trusted Computing Technologies - focusing mainly on Intel's Trusted Execution Technology (TXT). This document is based on existing documentation and tests of two existing TXT-based systems: Intel's Trusted Boot and Invisible Things Lab's Qubes OS. We describe what features are lacking in current implementations, describe what a mature system could provide, and present a list of developments to watch. Critical systems perform operation-critical computations on high importance data. In such systems, the inputs, computation steps, and outputs may be highly sensitive. Sensitive components must be protected from both unauthorized release, and unauthorized alteration: Unauthorized users should not access the sensitive input and sensitive output data, nor be able to alter them; the computation contains intermediate data with the same requirements, and executes algorithms that the unauthorized should not be able to know or alter. Due to various system requirements, such critical systems are frequently built from commercial hardware, employ commercial software, and require network access. These hardware, software, and network system components increase the risk that sensitive input data, computation, and output data may be compromised.

  2. Strength Assessment of Broken Rock Postgrouting Reinforcement Based on Initial Broken Rock Quality and Grouting Quality

    Directory of Open Access Journals (Sweden)

    Hongfa Xu

    2017-01-01

    Full Text Available To estimate postgrouting rock mass strength growth is important for engineering design. In this paper, using self-developed indoor pressure-grouting devices, 19 groups of test cubic blocks were made of the different water cement ratio grouting into the broken rock of three kinds of particle sizes. The shear strength parameters of each group under different conditions were tested. Then this paper presents a quantitative calculation method for predicting the strength growth of grouted broken rock. Relational equations were developed to investigate the relationship between the growth rates of uniaxial compressive strength (UCS, absolute value of uniaxial tensile strength (AUTS, internal friction angle, and cohesion for post- to pregrouting broken rock based on Mohr-Coulomb strength criterion. From previous test data, the empirical equation between the growth rate of UCS and the ratio of the initial rock mass UCS to the grout concretion UCS has been determined. The equations of the growth rates of the internal friction coefficient and UCS for grouting broken rock with rock mass rating (RMR and its increment have been established. The calculated results are consistent with the experimental results. These observations are important for engineered design of grouting reinforcement for broken rock mass.

  3. Fuzzy Model for Trust Evaluation

    Institute of Scientific and Technical Information of China (English)

    Zhang Shibin; He Dake

    2006-01-01

    Based on fuzzy set theory, a fuzzy trust model is established by using membership function to describe the fuzziness of trust. The trust vectors of subjective trust are obtained based on a mathematical model of fuzzy synthetic evaluation. Considering the complicated and changeable relationships between various subjects, the multi-level mathematical model of fuzzy synthetic evaluation is introduced. An example of a two-level fuzzy synthetic evaluation model confirms the feasibility of the multi-level fuzzy synthesis evaluation model. The proposed fuzzy model for trust evaluation may provide a promising method for research of trust model in open networks.

  4. Trust Models in Ubiquitous Computing

    DEFF Research Database (Denmark)

    Nielsen, Mogens; Krukow, Karl; Sassone, Vladimiro

    2008-01-01

    We recapture some of the arguments for trust-based technologies in ubiquitous computing, followed by a brief survey of some of the models of trust that have been introduced in this respect. Based on this, we argue for the need of more formal and foundational trust models.......We recapture some of the arguments for trust-based technologies in ubiquitous computing, followed by a brief survey of some of the models of trust that have been introduced in this respect. Based on this, we argue for the need of more formal and foundational trust models....

  5. Trusted Translation Services

    Science.gov (United States)

    Atif, Yacine; Serhani, Mohamed Adel; Campbell, Piers; Mathew, Sujith Samuel

    Administering multilingual Web sites and applications reliably, involves interconnected and multipart tasks, where trust in the involved parties and content translation sources is paramount. Published Web sites may reflect content from databases, content management systems and other repositories to manage related Web content. But a Web site mirrored wholly or selectively onto a target language version requires streamlined trusted processes. Traditionally, files are translated and transferred via FTP, e-mail, or other communication means. Similarly, translation instructions are communicated between involved parties through verbal instruction, e-mail, and instruction files lead to a variety of inconsistencies and lack of trust in the translation process. This paper proposes a Web service approach to streamline the translation processes and an integration of trust properties in the proposed translation Web services. Web Services have been instrumental in handling problems inherent to systems integration, allowing web-based systems to converse and communicate data automatically. The OASIS Translation Web Services Technical Committee has released a standard way for Web Services to serve the translation and localization business. This article proposes a framework to centralize translation services at a reputable source providing a workflow and a mechanism to quantify service trust. An implementation of the framework is also described in the context of a localization case study.

  6. Broken Lifshitz invariance, spin waves and hydrodynamics

    CERN Document Server

    Roychowdhury, Dibakar

    2016-01-01

    In this paper, based on the basic principles of thermodynamics, we explore the hydrodynamic regime of interacting Lifshitz field theories in the presence of broken rotational invariance. We compute the entropy current and discover new dissipative effects those are consistent with the principle of local entropy production in the fluid. In our analysis, we consider both the parity even as well as the parity odd sector upto first order in the derivative expansion. Finally, we argue that the present construction of the paper could be systematically identified as that of the hydrodynamic description associated with \\textit{spin waves} (away from the domain of quantum criticality) under certain limiting conditions.

  7. Spontaneously broken Lorentz symmetry and gravity

    CERN Document Server

    Jacobson, T; Jacobson, Ted; Mattingly, David

    2000-01-01

    We study a generally covariant model in which local Lorentz invariance is broken "spontaneously" by a dynamical unit timelike vector field $u^a$---the "aether". Such a model makes it possible to study the gravitational and cosmological consequences of preferred frame effects, such as ``variable speed of light" or high frequency dispersion, while preserving a generally covariant metric theory of gravity. In this paper we restrict attention to an action for an effective theory of the aether which involves only the antisymmetrized derivative $\

  8. Broken safety pin in bronchus - Anaesthetic considerations

    Directory of Open Access Journals (Sweden)

    Roona Shad

    2012-01-01

    Full Text Available Safety pins are not commonly aspirated objects in infants and form only a small fraction of all the metallic foreign body (FB which accounts for 4.4% of all foreign bodies found in tracheobronchial tree. Bronchoscopy procedure has various complications, in addition to failure to remove FB due to its impaction, especially with metallic pointed objects ending up in open surgical removal. Infant with inhaled foreign body are always a challenge to anaesthetist. We had one such case of broken safety pin impacted in the wall of right bronchus of an infant with failure to remove on repeated attempts at rigid bronchoscopy.

  9. Broken safety pin in bronchus - Anaesthetic considerations.

    Science.gov (United States)

    Shad, Roona; Agarwal, Aditya

    2012-11-01

    Safety pins are not commonly aspirated objects in infants and form only a small fraction of all the metallic foreign body (FB) which accounts for 4.4% of all foreign bodies found in tracheobronchial tree. Bronchoscopy procedure has various complications, in addition to failure to remove FB due to its impaction, especially with metallic pointed objects ending up in open surgical removal. Infant with inhaled foreign body are always a challenge to anaesthetist. We had one such case of broken safety pin impacted in the wall of right bronchus of an infant with failure to remove on repeated attempts at rigid bronchoscopy.

  10. Rotating optical microcavities with broken chiral symmetry

    CERN Document Server

    Sarma, Raktim; Wiersig, Jan; Cao, Hui

    2014-01-01

    We demonstrate in open microcavities with broken chiral symmetry, quasi-degenerate pairs of co-propagating modes in a non-rotating cavity evolve to counter-propagating modes with rotation. The emission patterns change dramatically by rotation, due to distinct output directions of CW and CCW waves. By tuning the degree of spatial chirality, we maximize the sensitivity of microcavity emission to rotation. The rotation-induced change of emission is orders of magnitude larger than the Sagnac effect, pointing to a promising direction for ultrasmall optical gyroscopes.

  11. Comments on Holography with Broken Lorentz Invariance

    CERN Document Server

    Gordeli, Ivan

    2009-01-01

    Recently a family of solutions of the Einstein equations in backgrounds with broken Lorentz invariance was found ArXiv:0712.1136. We show that the gravitational solution recently obtained by Kachru, Liu and Mulligan in ArXiv:0808.1725 is a part of the former solution which was derived earlier in the framework of extra dimensional theories. We show how the energy-momentum and Einstein tensors are related and establish a correspondence between parameters which govern Lorentz invariance violation. At the end we speculate on relations between the RG flow of a boundary theory and asymptotic behavior of gravitational solutions in the bulk.

  12. Neutrino masses and spontaneously broken flavor symmetries

    Energy Technology Data Exchange (ETDEWEB)

    Staudt, Christian

    2014-06-16

    We study the phenomenology of supersymmetric flavor models. We show how the predictions of models based on spontaneously broken non-Abelian discrete flavor symmetries are altered when we include so-called Kaehler corrections. Furthermore, we discuss anomaly-free discrete R symmetries which are compatible with SU(5) unification. We find a set of symmetries compatible with suppressed Dirac neutrino masses and a unique symmetry consistent with the Weinberg operator. We also study a pseudo-anomalous U(1){sub R} symmetry which explains the fermion mass hierarchies and, when amended with additional singlet fields, ameliorates the fine-tuning problem.

  13. Trusts and Financialization

    DEFF Research Database (Denmark)

    Harrington, Brooke

    2016-01-01

    the global spread of financialization: by privileging the rentier–investor within the 15 world economy; by perpetuating a distinctively Anglo-American approach to finance internationally; and by increasing the autonomy of finance vis-a-vis the nation-state. This study shares the primarily descriptive...... and conceptual intent of Krippner’s work on financialization, but extends it in two ways: by comparing trusts to the better- known corporate form of organizing financial activity, and by showing how private 20 capital is implicated in the financialized economy alongside corporate wealth.......This article identifies trusts as a legal structure associated with the global spread of financialization. Although trusts originated in Medieval England, they have acquired a new significance in contemporary finance by virtue of their advantages in terms of 10 profit maximization and capital...

  14. Trust in media information

    Directory of Open Access Journals (Sweden)

    Miquel Rodrigo

    2003-06-01

    Full Text Available For Miquel Rodrigo, cultural diversity places informative discourse in a crisis because it needs new categories to explain reality, and these categories are not always shared by journalists and by those who receive the information. Instead of gaining an easy trust drawnfrom stereotypes, he proposes, as a better way of overcoming the crisis, fostering the existence of sceptical readers. The media interprets social phenomena with its personal and professional limitations. The sceptical reader is one who knows why the media says what it says and understands that its truths are not absolute, since all ways of seeing are ways of concealing. The relationship between scepticism and trust is that which opposes a blind, acrylic and capitulating trust.

  15. Absorption of solar radiation in broken clouds

    Energy Technology Data Exchange (ETDEWEB)

    Zuev, V.E.; Titov, G.A.; Zhuravleva, T.B. [Institute of Atmospheric Optics, Tomsk (Russian Federation)

    1996-04-01

    It is recognized now that the plane-parallel model unsatisfactorily describes the transfer of radiation through broken clouds and that, consequently, the radiation codes of general circulation models (GCMs) must be refined. However, before any refinement in a GCM code is made, it is necessary to investigate the dependence of radiative characteristics on the effects caused by the random geometry of cloud fields. Such studies for mean fluxes of downwelling and upwelling solar radiation in the visible and near-infrared (IR) spectral range were performed by Zuev et al. In this work, we investigate the mean spectral and integrated absorption of solar radiation by broken clouds (in what follows, the term {open_quotes}mean{close_quotes} will be implied but not used, for convenience). To evaluate the potential effect of stochastic geometry, we will compare the absorption by cumulus (0.5 {le} {gamma} {le} 2) to that by equivalent stratus ({gamma} <<1) clouds; here {gamma} = H/D, H is the cloud layer thickness and D the characteristic horizontal cloud size. The equivalent stratus clouds differ from cumulus only in the aspect ratio {gamma}, all the other parameters coinciding.

  16. Free Riding or Trust?

    DEFF Research Database (Denmark)

    Svendsen, Gert Tinggaard; Nilsson, Jerker

    2011-01-01

    It is often observed that members have little interest in monitoring their cooperatives. One explanation is that the members are free-riders, hoping that others will perform the task. Another explanation is that the weak member interest is a consequence of members having trust in the leadership....... These competing explanations refer to the theory of collective action and the social capital paradigm, respectively, and may be linked to the classical Gesellschaft and Gemeinschaft concepts. Hence, one may expect free-rider behavior when conditions of Gesellschaft exist and trustful behavior when Gemeinschaft...

  17. Competition Fosters Trust

    DEFF Research Database (Denmark)

    Huck, Steffen; Ruchala, Gabriele K.; Tyran, Jean-Robert

    We study the effects of reputation and competition in a stylized market for experience goods. If interaction is anonymous, such markets perform poorly: sellers are not trustworthy, and buyers do not trust sellers. If sellers are identifiable and can, hence, build a reputation, efficiency quadruples...... but is still at only a third of the first best. Adding more information by granting buyers access to all sellers’ complete history has, somewhat surprisingly, no effect. On the other hand, we find that competition, coupled with some minimal information, eliminates the trust problem almost completely...

  18. Trust and Social Commerce

    Directory of Open Access Journals (Sweden)

    Julia Y. Lee

    2016-01-01

    The Article focuses on the rise of “social commerce,” a socio-economic phenomenon centered on the use of social media and other modes of social connection in electronic commerce. It identifies three mechanisms that are central to the development of trust in social commerce: communication and voluntary disclosure; barriers to entry; and community policing. These mechanisms simulate the characteristics of closely-knit environments, creating conditions conducive to trust. The Article describes these mechanisms in four new commercial settings: the sharing economy; next generation electronic commerce; online escort services; and online black markets in credit cards and controlled substances.

  19. Trusted cloud computing

    CERN Document Server

    Krcmar, Helmut; Rumpe, Bernhard

    2014-01-01

    This book documents the scientific results of the projects related to the Trusted Cloud Program, covering fundamental aspects of trust, security, and quality of service for cloud-based services and applications. These results aim to allow trustworthy IT applications in the cloud by providing a reliable and secure technical and legal framework. In this domain, business models, legislative circumstances, technical possibilities, and realizable security are closely interwoven and thus are addressed jointly. The book is organized in four parts on "Security and Privacy", "Software Engineering and

  20. Trust Development in Small Teams

    Science.gov (United States)

    2016-06-07

    values, shared goals) Category-Based Trust Expectations (e.g. rank, recognition, responsibil ity, stereotypes , roles, reputation) Task Features (e.g...categories to which people belong. This form of trust has been called category-based trust (Kramer, 1999). Many common categories (e.g. women , men...particular stereotypes within small military teams (e.g. cultural, gender stereotypes ) are also likely to influence judgements of trust. No specific

  1. Constitutional Verbosity and Social Trust

    DEFF Research Database (Denmark)

    Bjørnskov, Christian; Voigt, Stefan

    2014-01-01

    A common argument in the trust literature is that high-trust cultures allow efficient commercial contracts to be shorter, covering fewer contingencies. We take this idea to the topic of social contracts. Specifically, we ask whether social trust affects the length and detail of constitutions. Cross......-country estimates suggest that national trust levels are indeed robustly and negatively associated with the length of countries’ constitutions....

  2. International Trust and Public Diplomacy

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    Countries struggle to find ways to be perceived as trustworthy by people around the world because trust is linked to efficiency, business opportunities and political influence. Social trust is also important for democracy to function. A central concept in this paper is International Trust...... for a Public Diplomacy initiative to succeed. From a social responsible perspective journalists may have a role to play in creating international trust, and Public Diplomacy staffs consider it already important...

  3. Four Essential Practices for Building Trust

    Science.gov (United States)

    Combs, Julie Peterson; Harris, Sandra; Edmonson, Stacey

    2015-01-01

    The presence of trust can enhance an organization's efforts to fulfill its mission, and the lack of trust can constrict those efforts. The authors offer four essential guidelines to help school leaders communicate in a way that builds trust. Build trust by understanding trust. Trusted leaders demonstrate care, character, and competence in their…

  4. Trusting Relationships in International Politics

    DEFF Research Database (Denmark)

    Keating, Vincent Charles; Ruzicka, Jan

    2014-01-01

    How can trusting relationships be identified in international politics? The recent wave of scholarship on trust in International Relations answers this question by looking for one or the combination of three indicators – the incidence of cooperation; discourses expressing trust; or the calculated...

  5. Why Teachers Trust School Leaders

    Science.gov (United States)

    Handford, Victoria; Leithwood, Kenneth

    2013-01-01

    Purpose: Trust among teachers in schools is significantly related to student achievement and trust in school leaders is an important influence on such trust. The purpose of this study is to identify leadership practices which teachers interpret as signs of trustworthiness on the part of their principals. Design/methodology/approach: Evidence for…

  6. Trust as a Critical Concept

    DEFF Research Database (Denmark)

    Bordum, Anders

    2004-01-01

    In this articlei I will argue that trust is a fundamental and critical concept because trust is the direct or transcendental constitutive ground of most social phenomena, as well as applicable as an operational method in critical theory. There are two different but overlapping positions on trust I...

  7. Incremental Trust in Grid Computing

    DEFF Research Database (Denmark)

    Brinkløv, Michael Hvalsøe; Sharp, Robin

    2007-01-01

    This paper describes a comparative simulation study of some incremental trust and reputation algorithms for handling behavioural trust in large distributed systems. Two types of reputation algorithm (based on discrete and Bayesian evaluation of ratings) and two ways of combining direct trust and ...... of Grid computing systems....

  8. Trust, contract and relationship development

    NARCIS (Netherlands)

    Klein Woolthuis, R.J.A.; Hillebrand, B.; Nooteboom, B.

    2005-01-01

    This article contributes to the debate on the relation between trust and control in the management of inter-organizational relations. More specifically, we focus on the question how trust and formal contract are related. While there have been studies on whether trust and contract are substitutes or

  9. Creating trust through narrative strategy

    NARCIS (Netherlands)

    Gabbay, SM; Leenders, RTAJ

    2003-01-01

    In the rational model of trust, an actor's level of trust is a function of the expected gain and loss involved. As a consequence, if A can influence the gain and loss perceived by B, A can influence B's level of trust. In this article we study how A can do this through the strategic use of narrative

  10. Trust It or Trash It?

    Science.gov (United States)

    Trust It or Trash It? About | Contact | Español Tab 1 Tab 2 What is Trust It or Trash It? This is a tool to help you think ... here for the developer version. Home Who Said It? Who wrote it? Think about TRUSTING IT if: ...

  11. Trust and Estate Planning

    DEFF Research Database (Denmark)

    Harrington, Brooke

    2012-01-01

    This article offers a new perspective on the connection between socioeconomic inequality and occupations by examining the impact of trust and estate planners on global wealth stratification. While many studies treat the professions as mirrors of inequalities in their environments, this article...

  12. Trust and Influence

    Science.gov (United States)

    2012-03-05

    Stokes – Dynamic Trust Model PI: Charlene Stokes (AFRL) Lab Task Drs. Lin ( Sunway U) and Chen (NICTA) Objective: Examine contextual factors...Media interests, possible co-funding Air University Culture & Language Center: focus is mainly on training related to language and culture Defense

  13. Trust, Collegiality, and Community

    Science.gov (United States)

    DeShaw, Michele

    2009-01-01

    The purpose of this study was to examine and describe the role of trust, a complex and understudied aspect of working relationships, among teachers in smaller learning communities (SLC). Based on a review of the literature, four kinds of interpersonal professional relationships were defined and described from individualism to community. An…

  14. Initial Formation of Trust

    DEFF Research Database (Denmark)

    Schärfe, Henrik; Dougerthery, Elizabeth Ann

    2011-01-01

    In this paper we present a study of how touch may be used as a way of inducing trust in the meeting with a teloperated android, the Geminoid-DK. The use of hapics with Gestalt-based 'Balance Theory' is used as a persuasive desing of the interaction between human and robot. Balance theory includes...

  15. Trust transparency and PPP

    NARCIS (Netherlands)

    Lousberg, L.H.M.J.; Noorderhaven, N.

    2014-01-01

    This paper argues how transparency can increase trust and therefore indirectly enhances the results of Public Private Partnerships in complex construction projects. Complex construction projects, e.g. large infrastructure or urban development projects, with public client organizations and private co

  16. Pricing and Trust

    DEFF Research Database (Denmark)

    Huck, Steffen; Ruchala, Gabriele K.; Tyran, Jean-Robert

    We experimentally examine the effects of flexible and fixed prices in markets for experience goods in which demand is driven by trust. With flexible prices, we observe low prices and high quality in competitive (oligopolistic) markets, and high prices coupled with low quality in non...

  17. Restoring broken entanglement by injecting separable correlations

    CERN Document Server

    Pirandola, Stefano

    2012-01-01

    The distribution of entanglement is central in many protocols of quantum information and computation. However it is also known to be a very fragile process when loss and noise come into play. The inevitable interaction of the quantum systems with the external environment induces effects of decoherence which may be so strong to destroy any input entanglement, a phenomenon known as "entanglement breaking". Here we study this catastrophic process in a correlated-noise environment showing how the presence of classical-type correlations can restore the distribution of entanglement. In particular, we consider a Gaussian environment whose thermal noise is strong enough to break the entanglement of two bosonic modes of the electromagnetic field. In this scenario, we show that the injection of separable correlations from the same environment is able to reactivate the broken entanglement. This paradoxical effect happens both in schemes of direct distribution, where a third party (Charlie) broadcasts entangled states to...

  18. Effective Action of Softly Broken Supersymmetric Theories

    CERN Document Server

    Nibbelink, S G; Nibbelink, Stefan Groot; Nyawelo, Tino S.

    2007-01-01

    We study the renormalization of (softly) broken supersymmetric theories at the one loop level in detail. We perform this analysis in a superspace approach in which the supersymmetry breaking interactions are parameterized using spurion insertions. We comment on the uniqueness of this parameterization. We compute the one loop renormalization of such theories by calculating superspace vacuum graphs with multiple spurion insertions. To preform this computation efficiently we develop algebraic properties of spurion operators, that naturally arise because the spurions are often surrounded by superspace projection operators. Our results are general apart from the restrictions that higher super covariant derivative terms and some finite effects due to non-commutativity of superfield dependent mass matrices are ignored. One of the soft potentials induces renormalization of the Kaehler potential.

  19. Nonreciprocal Multiferroic Superlattices with Broken Parity Symmetry

    Science.gov (United States)

    Tang, Zhenghua; Zhang, Weiyi

    Multiferroic materials are characterized by the coexistence of ferroelectric and ferromagnetic (or antiferromagnetic) orders, the coupling to lattice vibration can be invoked either through piezoelectric or piezomagnetic effects. In this paper, the polaritonic band structures of multiferroic superlattices composed of oppositely polarized domains are investigated using the generalized transfer matrix method. For the primitive cell with broken parity symmetry, the polaritonic band structure is asymmetrical with respect to the forward and backward propagation directions (nonreciprocality). In particular, the band extreme points move away from the Brillouin zone center. This asymmetry in band-gap positions and widths can be used to design compact one-way optical isolators, while the extremely slow light velocities near the asymmetrical upper edges of lower bands includes the essential ingredients for designing slow light devices.

  20. Effects of broken affordance on visual extinction.

    Science.gov (United States)

    Wulff, Melanie; Humphreys, Glyn W

    2015-01-01

    Previous studies have shown that visual extinction can be reduced if two objects are positioned to "afford" an action. Here we tested if this affordance effect was disrupted by "breaking" the affordance, i.e., if one of the objects actively used in the action had a broken handle. We assessed the effects of broken affordance on recovery from extinction in eight patients with right hemisphere lesions and left-sided extinction. Patients viewed object pairs that were or were not commonly used together and that were positioned for left- or right-hand actions. In the unrelated pair conditions, either two tools or two objects were presented. In line with previous research (e.g., Riddoch et al., 2006), extinction was reduced when action-related object pairs and when unrelated tool pairs were presented compared to unrelated object pairs. There was no significant difference in recovery rate between action-related (object-tool) and unrelated tool pairs. In addition, performance with action-related objects decreased when the tool appeared on the ipsilesional side compared to when it was on the contralesional side, but only when the tool handle was intact. There were minimal effects of breaking the handle of an object rather than a tool, and there was no effect of breaking the handle on either tools or objects on single item trials. The data suggest that breaking the handle of a tool lessens the degree to which it captures attention, with this attentional capture being strongest when the tool appears on the ipsilesional side. The capture of attention by the ipsilesional item then reduces the chance of detecting the contralesional stimulus. This attentional capture effect is mediated by the affordance to the intact tool.

  1. Effects of broken affordance on visual extinction

    Directory of Open Access Journals (Sweden)

    Melanie eWulff

    2015-09-01

    Full Text Available Previous studies have shown that visual extinction can be reduced if two objects are positioned to afford an action. Here we tested if this affordance effect was disrupted by breaking the affordance – if one of the objects actively used in the action had a broken handle. We assessed the effects of broken affordance on recovery from extinction in eight patients with right hemisphere lesions and left-sided extinction. Patients viewed object pairs that were or were not commonly used together and that were positioned for left- or right-hand actions. In the unrelated pair conditions, either two tools or two objects were presented. In line with previous research (e.g., Riddoch et al., 2006, extinction was reduced when action-related object pairs and when unrelated tool pairs were presented compared to unrelated object pairs. There was no significant difference in recovery rate between action-related (object-tool and unrelated tool-tool pairs. In addition, performance with action-related objects decreased when the tool appeared on the ipsilesional side compared to when it was on the contralesional side, but only when the tool handle was intact. There were minimal effects of breaking the handle of an object rather than a tool, and there was no effect of breaking the handle on either tools or objects on single item trials. The data suggest that breaking the handle of a tool lessens the degree to which it captures attention, with this attentional capture being strongest when the tool appears on the ipsilesional side. The capture of attention by the ipsilesional item then reduces the chance of detecting the contralesional stimulus. This attentional capture effect is mediated by the affordance to the intact tool.

  2. Modified broken rice starch as fat substitute in sausages

    Directory of Open Access Journals (Sweden)

    Valéria Maria Limberger

    2011-09-01

    Full Text Available The demand for low-fat beef products has led the food industry to use fat substitutes such as modified starch. About 14% of broken rice is generated during processing. Nevertheless, this by-product contains high levels of starch; being therefore, great raw material for fat substitution. This study evaluated the applicability of chemically and physically modified broken rice starch as fat substitute in sausages. Extruded and phosphorylated broken rice was used in low-fat sausage formulation. All low-fat sausages presented about 55% reduction in the fat content and around 28% reduction in the total caloric value. Fat replacement with phosphorylated and extruded broken rice starch increased the texture acceptability of low-fat sausages, when compared to low-fat sausages with no modified broken rice. Results suggest that modified broken rice can be used as fat substitute in sausage formulations, yielding lower caloric value products with acceptable sensory characteristics.

  3. Homo economicus belief inhibits trust.

    Science.gov (United States)

    Xin, Ziqiang; Liu, Guofang

    2013-01-01

    As a foundational concept in economics, the homo economicus assumption regards humans as rational and self-interested actors. In contrast, trust requires individuals to believe partners' benevolence and unselfishness. Thus, the homo economicus belief may inhibit trust. The present three experiments demonstrated that the direct exposure to homo economicus belief can weaken trust. And economic situations like profit calculation can also activate individuals' homo economicus belief and inhibit their trust. It seems that people's increasing homo economicus belief may serve as one cause of the worldwide decline of trust.

  4. HMM-based Trust Model

    DEFF Research Database (Denmark)

    ElSalamouny, Ehab; Nielsen, Mogens; Sassone, Vladimiro

    2010-01-01

    with their dynamic behaviour. Using Hidden Markov Models (HMMs) for both modelling and approximating the behaviours of principals, we introduce the HMM-based trust model as a new approach to evaluating trust in systems exhibiting dynamic behaviour. This model avoids the fixed behaviour assumption which is considered...... the major limitation of existing Beta trust model. We show the consistency of the HMM-based trust model and contrast it against the well known Beta trust model with the decay principle in terms of the estimation precision....

  5. Modeling trust context in networks

    CERN Document Server

    Adali, Sibel

    2013-01-01

    We make complex decisions every day, requiring trust in many different entities for different reasons. These decisions are not made by combining many isolated trust evaluations. Many interlocking factors play a role, each dynamically impacting the others.? In this brief, 'trust context' is defined as the system level description of how the trust evaluation process unfolds.Networks today are part of almost all human activity, supporting and shaping it. Applications increasingly incorporate new interdependencies and new trust contexts. Social networks connect people and organizations throughout

  6. Public health, public trust and lobbying.

    Science.gov (United States)

    Wynia, Matthew K

    2007-06-01

    Each year, infection with Human Papillomavirus (HPV) leads to millions of abnormal Pap smears and thousands of cases of cervical cancer in the US. Throughout the developing world, where Pap smears are less common, HPV is a leading cause of cancer death among women. So when the international pharmaceutical giant Merck developed a vaccine that could prevent infection with several key strains of HPV, the public health community was anxious to celebrate a major advance. But then marketing and lobbying got in the way. Merck chose to pursue an aggressive lobbying campaign, trying to make its new vaccine mandatory for young girls. The campaign stoked public mistrust about how vaccines come to be mandated, and now it's not just Merck's public image that has taken a hit. The public health community has also been affected. What is the lesson to be learned from this story? Public health communication relies on public trust.

  7. Trust and Corruption

    DEFF Research Database (Denmark)

    Graeff, Peter; Svendsen, Gert Tinggaard

    2013-01-01

    Why are the Scandinavian countries in the European Union significantly richer than South-ern/Eastern European countries? We try to answer this question from an empirical social capital perspective. In particular, we are interested in the interplay of social trust as a positive and corruption...... capital by applying a path model that accounts for Granger-like causal effects. Our empirical results, referring to a sample of up to 25 EU countries, show that corruption might harm poor European countries but is not able to affect social trust. However, corruption in itself means that resources end up...... in the wrong places and not in socioeconomically optimal investments. There is, therefore, a direct damaging effect of corruption on wealth. This implies that economic actors have to invest higher transaction and control costs which will bind resources to non-productive purposes and thus destroy economic...

  8. Trust in Internet Election

    DEFF Research Database (Denmark)

    Markussen, Randi; Ronquillo, Lorena; Schürmann, Carsten

    2014-01-01

    This paper discusses the Decryption and Counting Ceremony held in conjunction with the internet voting trial on election day in the Ministry of Local Government and Regional Development of Norway in 2013. We examine the organizers' ambition of making the decryption and counting of electronic votes...... public in order to sustain trust in internet voting. We introduce a pragmatic approach to trust that emphasises the inseparability of truth from witnessing it. Based on this and on a description of how the event was made observable and how the complexities in the counting process were disclosed, we...... discuss what we term economy of truth from the perspective of the IT community involved in the ceremony. We claim that broadening the economy of truth by including more explicitly social and political perspectives in the ceremony, and in internet elections in general, and how witnessing is brought about...

  9. Trusted Emergency Management

    Science.gov (United States)

    2009-03-01

    information that can enable effective emergency response relate to: • Physical security– building plans , transportation logistics, critical control...of government plans ” and information about chemical/biological warfare supplies and antidotes. • Trade secrets – the inner workings of...E. Irvine, T. E. Levin, T. D. Nguyen, and T. M. Vidas , SecureCore software architecture: Trusted path application (TPA) requirements, Tech. Rep. NPS

  10. Fully Countering Trusting Trust through Diverse Double-Compiling

    CERN Document Server

    Wheeler, David A

    2010-01-01

    An Air Force evaluation of Multics, and Ken Thompson's Turing award lecture ("Reflections on Trusting Trust"), showed that compilers can be subverted to insert malicious Trojan horses into critical software, including themselves. If this "trusting trust" attack goes undetected, even complete analysis of a system's source code will not find the malicious code that is running. Previously-known countermeasures have been grossly inadequate. If this attack cannot be countered, attackers can quietly subvert entire classes of computer systems, gaining complete control over financial, infrastructure, military, and/or business systems worldwide. This dissertation's thesis is that the trusting trust attack can be detected and effectively countered using the "Diverse Double-Compiling" (DDC) technique, as demonstrated by (1) a formal proof that DDC can determine if source code and generated executable code correspond, (2) a demonstration of DDC with four compilers (a small C compiler, a small Lisp compiler, a small malic...

  11. Trust in Digital Repositories

    Directory of Open Access Journals (Sweden)

    Elizabeth Yakel

    2013-06-01

    Full Text Available ISO 16363:2012, Space Data and Information Transfer Systems - Audit and Certification of Trustworthy Digital Repositories (ISO TRAC, outlines actions a repository can take to be considered trustworthy, but research examining whether the repository’s designated community of users associates such actions with trustworthiness has been limited. Drawing from this ISO document and the management and information systems literatures, this paper discusses findings from interviews with 66 archaeologists and quantitative social scientists. We found similarities and differences across the disciplines and among the social scientists. Both disciplinary communities associated trust with a repository’s transparency. However, archaeologists mentioned guarantees of preservation and sustainability more frequently than the social scientists, who talked about institutional reputation. Repository processes were also linked to trust, with archaeologists more frequently citing metadata issues and social scientists discussing data selection and cleaning processes. Among the social scientists, novices mentioned the influence of colleagues on their trust in repositories almost twice as much as the experts. We discuss the implications our findings have for identifying trustworthy repositories and how they extend the models presented in the management and information systems literatures.

  12. Planck driven by vision, broken by war

    CERN Document Server

    Brown, Brandon R

    2015-01-01

    Planck's Law, an equation used by physicists to determine the radiation leaking from any object in the universe, was described by Albert Einstein as "the basis of all twentieth-century physics." Max Planck is credited with being the father of quantum theory, and his work laid the foundation for our modern understanding of matter and energetic processes. But Planck's story is not well known, especially in the United States. A German physicist working during the first half of the twentieth century, his library, personal journals, notebooks, and letters were all destroyed with his home in World War II. What remains, other than his contributions to science, are handwritten letters in German shorthand, and tributes from other scientists of the time, including his close friend Albert Einstein. In Planck: Driven by Vision, Broken by War, Brandon R. Brown interweaves the voices and writings of Planck, his family, and his contemporaries-with many passages appearing in English for the first time-to create a portrait of...

  13. The wave has finally broken: now what?

    Science.gov (United States)

    Simborg, Donald W; Detmer, Don Eugene; Berner, Eta S

    2013-06-01

    In 2005, the authors published a paper, 'Will the wave finally break? A brief view of the adoption of electronic medical records in the United States', which predicted that rapid adoption of electronic health records (EHR) would occur in the next 5 years given appropriate incentives. The wave has finally broken with the stimulus of the health information technology for economic and clinical health legislation in 2009, and there have been both positive and negative developments in the ensuing years. The positive developments, among others described, are increased adoption of EHR, the emergence of a national network infrastructure and the recognition of clinical informatics as a medical specialty. Problems that still exist include, among others described, continued user interface problems, distrust of EHR-generated notes and an increased potential for fraud and abuse. It is anticipated that in the next 5 years there will be near universal EHR adoption, greater emphasis on standards and interoperability, greater involvement of Congress in health information technology (IT), breakthroughs in user interfaces, compelling online medical and IT education, both increased use of data analytics for personalized healthcare and a realization of the difficulties of this approach, a blurring of the distinction between EHR and telemedicine, a resurgence of computer-assisted diagnosis and the emergence of a 'continuously learning' healthcare system.

  14. Towards a politics of trust.

    Science.gov (United States)

    Gilbert, T

    1998-05-01

    This paper draws upon sociological theory to demonstrate that the manufacture and deployment of trust is an integral part of the function of complex systems such as health care. The discussion begins by identifying the error within the nursing literature which arises from a rather technical conceptualization of trust. This tends to limit the dimensions to trust which is established, and fails to recognize that trust may be subject to competition and conflict. The paper continues by drawing upon the work of two theorists, Niklas Luhmann and Susan P. Shapiro, to demonstrate how trust functions within systems such as health care and the mechanisms through which it is controlled. The title of this paper, 'Towards a politics of trust', identifies that this is merely the first stage in the analysis. Further stages are necessary which analyse the ways in which power is exercised in the conflict for control within discrete elements of the system.

  15. Optimal Distinctiveness Signals Membership Trust.

    Science.gov (United States)

    Leonardelli, Geoffrey J; Loyd, Denise Lewin

    2016-07-01

    According to optimal distinctiveness theory, sufficiently small minority groups are associated with greater membership trust, even among members otherwise unknown, because the groups are seen as optimally distinctive. This article elaborates on the prediction's motivational and cognitive processes and tests whether sufficiently small minorities (defined by relative size; for example, 20%) are associated with greater membership trust relative to mere minorities (45%), and whether such trust is a function of optimal distinctiveness. Two experiments, examining observers' perceptions of minority and majority groups and using minimal groups and (in Experiment 2) a trust game, revealed greater membership trust in minorities than majorities. In Experiment 2, participants also preferred joining minorities over more powerful majorities. Both effects occurred only when minorities were 20% rather than 45%. In both studies, perceptions of optimal distinctiveness mediated effects. Discussion focuses on the value of relative size and optimal distinctiveness, and when membership trust manifests.

  16. A Requisite for Employee Trust: Leadership.

    Science.gov (United States)

    Hart, Kerry Marshall

    1988-01-01

    Provides background on organizational trust as product of need satisfaction and presents framework for understanding organizational trust with regard to theoretical differentiation of personal trust and system trust. Defines three factors of organizational trust: openness/congruity, shared values, and autonomy/feedback. Discusses how supervisors…

  17. The Virginia Generalist Initiative: Lessons Learned in a Statewide Consortium.

    Science.gov (United States)

    Morse, R. Michael; Plungas, Gay S.; Duke, Debra; Rollins, Lisa K.; Barnes, H. Verdain; Brinson, Betsy K.; Martindale, James R.; Marsland, David W.

    1999-01-01

    To increase supply of generalist physicians, three state-supported Virginia medical schools formed a partnership with governmental stakeholders in the Generalist Physician Initiative. Lessons learned concerning stakeholder participation in planning, shared philosophical commitment, support for risk-taking, attitudes toward change, and trust are…

  18. Mediating Trust in Terrorism Coverage

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    crisis. While the framework is presented in the context of television coverage of a terror-related crisis situation, it can equally be used in connection with all other forms of mediated trust. Key words: National crisis, risk communication, crisis management, television coverage, mediated trust.......Mass mediated risk communication can contribute to perceptions of threats and fear of “others” and/or to perceptions of trust in fellow citizens and society to overcome problems. This paper outlines a cross-disciplinary holistic framework for research in mediated trust building during an acute...

  19. Consumer Trust in Information Sources

    Directory of Open Access Journals (Sweden)

    Brad Love

    2013-06-01

    Full Text Available Trust is essential to understanding public reaction to innovative issues. This research focuses on trust in information sources by explicating the construct of trust and testing a comprehensive model on several information sources about genetically modified foods. Results from a survey of 369 participants reveal the significance of projecting competence and the role of the environment in which a target public receives information. Perceptions of regulatory, social, business, and technical environments affect how likely individuals are to follow advice from institutions like the Food and Drug Administration and the news media. Future research should incorporate knowledge levels and personal relevance as variables likely to influence trusting relationships.

  20. The Need to Trust and to Trust More Wisely in Academe

    Science.gov (United States)

    Bowman, Richard F.

    2012-01-01

    Where trust is an issue, there is no trust. Trust in diverse organizations has never been lower. A shadow of doubt stalks one's every decision to trust collegially and institutionally. Still, colleagues sense intuitively that institutions cannot function optimally without a bedrock level of trust. In academic life, trust is a form of social…

  1. Generalized Trust and Trust in Institutions in Confucian Asia

    Science.gov (United States)

    Tan, Soo Jiuan; Tambyah, Siok Kuan

    2011-01-01

    This study examines generalized trust and trust in institutions in Confucian Asia, covering six countries namely, China, Japan, Singapore, South Korea, Taiwan and Vietnam, and one dependent region, Hong Kong. Using data from the 2006 AsiaBarometer Survey, our study affirms the reliability and validity of using a two-item scale to measure…

  2. Maintaining control while delegating trust: Integrity constraints in trust management

    NARCIS (Netherlands)

    Etalle, Sandro; Winsborough, William H.

    2009-01-01

    We introduce the use, monitoring, and enforcement of integrity constraints in trust management-style authorization systems. We consider what portions of the policy state must be monitored to detect violations of integrity constraints. Then, we address the fact that not all participants in a trust-ma

  3. Pricing and Trust

    DEFF Research Database (Denmark)

    Huck, Steffen; Ruchala, Gabriele K.; Tyran, Jean-Robert

    We experimentally examine the effects of flexible and fixed prices in markets for experience goods in which demand is driven by trust. With flexible prices, we observe low prices and high quality in competitive (oligopolistic) markets, and high prices coupled with low quality in non-competitive...... (monopolistic) markets. We then introduce a regulated intermediate price above the oligopoly price and below the monopoly price. The effect in monopolies is more or less in line with standard intuition. As price falls volume increases and so does quality, such that overall efficiency is raised by 50%. However...

  4. Trust for intelligent recommendation

    CERN Document Server

    Bhuiyan, Touhid

    2013-01-01

    Recommender systems are one of the recent inventions to deal with the ever-growing information overload in relation to the selection of goods and services in a global economy. Collaborative Filtering (CF) is one of the most popular techniques in recommender systems. The CF recommends items to a target user based on the preferences of a set of similar users known as the neighbors, generated from a database made up of the preferences of past users. In the absence of these ratings, trust between the users could be used to choose the neighbor for recommendation making. Better recommendations can b

  5. Trust beyond reputation: A computational trust model based on stereotypes

    CERN Document Server

    Liu, Xin; Rzadca, Krzysztof

    2011-01-01

    Trust plays important roles in diverse, large scale, open environments. Computational trust models help to, for instance, guide users' judgements in online auction sites about other users; or determine quality of contributions in web 2.0 sites. Most existing trust models, however, require historical information about past behavior of a specific agent in question -- information that is not always available. In contrast, in real life interactions, in order to make the first guess about the trustworthiness of a stranger, we commonly use our "instinct" -- essentially stereotypes developed from our past interactions with "similar" other people. In this paper, we propose StereoTrust, a computational trust model inspired by use of stereotypes in real life. A stereotype contains certain features of agents and an expected outcome of the transaction. These features can be taken from the agents' profile information, or the agents' observed behavior. When facing a stranger, the stereotypes matching stranger's profile are...

  6. Towards a Formal Notion of Trust

    DEFF Research Database (Denmark)

    Nielsen, Mogens; Krukow, Karl Kristian

    2003-01-01

    Trust management systems have been proposed as an alternative to traditional security mechanisms in Global Computing. We present some challenges in establishing a formal foundation for the notion of trust, and some preliminary ideas towards a category of trust models.......Trust management systems have been proposed as an alternative to traditional security mechanisms in Global Computing. We present some challenges in establishing a formal foundation for the notion of trust, and some preliminary ideas towards a category of trust models....

  7. Trust and Financial Crisis Experiences

    NARCIS (Netherlands)

    van der Cruijsen, Carin; de Haan, Jakob; Jansen, David-Jan

    2016-01-01

    Using eight annual household surveys for the Netherlands between 2006 and 2013, we find that respondents' personal adverse financial crisis experiences do not only reduce their trust in banks, but also have an immediate negative effect on generalized trust. Respondents who were customers of a bank t

  8. International trust and public diplomacy

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    2015-01-01

    -building perspective: Iranian President Hassan Rouhani's letter in The Washington Post, The British Council's strategy for trust building in China, Russian President Vladimir V. Putin's letter in The New York Times, and the USA's trust-building effort in Turkey. The analyses are based on already publicized...

  9. Trust and New Communication Technologies

    DEFF Research Database (Denmark)

    Ess, Charles

    2010-01-01

    I approach philosophical analyses of the phenomenon of trust vis-à-vis online communication, beginning with an overview from within the framework of computer-mediated communication (CMC) of concerns and paradigmatic failures of trust in the history of online communication. I turn to more directly...

  10. Towards Trust Engineering for Opportunistic Cloud Services

    DEFF Research Database (Denmark)

    Kuada, Eric

    2014-01-01

    The systematic review methodology has been employed to review trust related studies in cloud computing. It was observed that trusted computing technologies and reputation based approaches are the main approaches to trust engineering in cloud computing. Also, trusted third party approaches...... and the deployment model play a significant role in enhancing trust between service providers and consumers. It was observed that the concept of trust is used loosely without any formal specification in cloud computing discussions and trust engineering in general. As a first step towards addressing this problem, we...... have contextualized the formal trust specification in multi-agent environments for cloud computing....

  11. Trust me, I am Robot!

    DEFF Research Database (Denmark)

    Stoyanova, Angelina; Drefeld, Jonas; Tanev, Stoyan

    of the emerging trust relationship is a key component of the use value of the robotic system and of the value proposition of the robotic system producers. The study is based on a qualitative research approach combining the phenomenological research paradigm with a grounded theory building approach based...... on multiple case studies. The investigation so far suggests that it will be necessary to conceptualize three types of trust – interpersonal, social trust and trust in automation. This knowledge is incorporated in a descriptive model that could be used by technology and application designers....../developers to further refine their product design. The paper will conclude with a more detailed conceptual analysis of interpersonal trust in human-technology interactions. The personalization of technological artifacts or assigning personality to active objects has been considered as natural to human beings (Gombrich...

  12. Trusted computing strengthens cloud authentication.

    Science.gov (United States)

    Ghazizadeh, Eghbal; Zamani, Mazdak; Ab Manan, Jamalul-lail; Alizadeh, Mojtaba

    2014-01-01

    Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM). Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM) are great technologies for solving the trust and security concerns in the cloud identity environment. Single sign-on (SSO) and OpenID have been released to solve security and privacy problems for cloud identity. This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in .Net environment. Security analyzing, simulation, and BLP confidential model are three ways to evaluate and analyze our proposed model.

  13. Trusted Computing Strengthens Cloud Authentication

    Directory of Open Access Journals (Sweden)

    Eghbal Ghazizadeh

    2014-01-01

    Full Text Available Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM. Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM are great technologies for solving the trust and security concerns in the cloud identity environment. Single sign-on (SSO and OpenID have been released to solve security and privacy problems for cloud identity. This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in .Net environment. Security analyzing, simulation, and BLP confidential model are three ways to evaluate and analyze our proposed model.

  14. A Note on a Broken-Cycle Theorem for Hypergraphs

    Directory of Open Access Journals (Sweden)

    Trinks Martin

    2014-08-01

    Full Text Available Whitney’s Broken-cycle Theorem states the chromatic polynomial of a graph as a sum over special edge subsets. We give a definition of cycles in hypergraphs that preserves the statement of the theorem there

  15. Offline detection of broken rotor bars in AC induction motors

    Science.gov (United States)

    Powers, Craig Stephen

    ABSTRACT. OFFLINE DETECTION OF BROKEN ROTOR BARS IN AC INDUCTION MOTORS. The detection of the broken rotor bar defect in medium- and large-sized AC induction machines is currently one of the most difficult tasks for the motor condition and monitoring industry. If a broken rotor bar defect goes undetected, it can cause a catastrophic failure of an expensive machine. If a broken rotor bar defect is falsely determined, it wastes time and money to physically tear down and inspect the machine only to find an incorrect diagnosis. Previous work in 2009 at Baker/SKF-USA in collaboration with the Korea University has developed a prototype instrument that has been highly successful in correctly detecting the broken rotor bar defect in ACIMs where other methods have failed. Dr. Sang Bin and his students at the Korea University have been using this prototype instrument to help the industry save money in the successful detection of the BRB defect. A review of the current state of motor conditioning and monitoring technology for detecting the broken rotor bar defect in ACIMs shows improved detection of this fault is still relevant. An analysis of previous work in the creation of this prototype instrument leads into the refactoring of the software and hardware into something more deployable, cost effective and commercially viable.

  16. Broken Ergodicity in Two-Dimensional Homogeneous Magnetohydrodynamic Turbulence

    Science.gov (United States)

    Shebalin, John V.

    2010-01-01

    Two-dimensional (2-D) homogeneous magnetohydrodynamic (MHD) turbulence has many of the same qualitative features as three-dimensional (3-D) homogeneous MHD turbulence.The se features include several ideal invariants, along with the phenomenon of broken ergodicity. Broken ergodicity appears when certain modes act like random variables with mean values that are large compared to their standard deviations, indicating a coherent structure or dynamo.Recently, the origin of broken ergodicity in 3-D MHD turbulence that is manifest in the lowest wavenumbers was explained. Here, a detailed description of the origins of broken ergodicity in 2-D MHD turbulence is presented. It will be seen that broken ergodicity in ideal 2-D MHD turbulence can be manifest in the lowest wavenumbers of a finite numerical model for certain initial conditions or in the highest wavenumbers for another set of initial conditions.T he origins of broken ergodicity in ideal 2-D homogeneous MHD turbulence are found through an eigen analysis of the covariance matrices of the modal probability density functions.It will also be shown that when the lowest wavenumber magnetic field becomes quasi-stationary, the higher wavenumber modes can propagate as Alfven waves on these almost static large-scale magnetic structures

  17. Time and Trust

    DEFF Research Database (Denmark)

    Hansen, Annette Skovsted

    Aid relationships in Africa often rely on old networks established by various flows of migrants, students, merchants, colonial administrators, missionaries, development workers, fellows, and diplomats. Many of these have been or are Asian or of Asian descent. The main aim of this paper is to see...... on aid distribution in combination with select interviews with stakeholders in foreign aid, and archival findings on the historical presence of Japanese, Chinese, Indian, European, and North American people on the African continent. By looking at the impact of historical networks on ODA distribution...... in Africa, we can map a territory, within which current stakeholders from Asia are bound to operate. In the case of Japan, a fifty year history of capacity development projects in Africa has established channels of communication and trust to compete with longer term European, Chinese, and Indian ties. One...

  18. The Business of Trust.

    Science.gov (United States)

    Frisse, Mark E

    2016-04-01

    New mobile devices, social networks, analytics, and communications technologies are emerging at an unparalleled rate. As a result, academic health centers will face both new opportunities and formidable challenges. Unlike previous transitions from paper-based systems to networked computer systems, these new technologies are the product of new entrepreneurial and commercial interests driven by consumers. As these new commercial products and services are more widely adopted, the likelihood grows that data will be used in unanticipated ways inconsistent with societal norms. Academic health centers will have to understand the implications of these technologies and engage more actively in processes governing the collection, aggregation, and use of health data produced in a new era of consumer-driven health care technology. Maintaining public trust should be a paramount concern.

  19. Trusted Data Repositories

    Science.gov (United States)

    Giaretta, D.

    2008-08-01

    Data is valuable, expensive to create, and may be impossible to re-create, so who can be trusted to look after it in the long term? This is a question which applies to all the types of digital data on which most astronomical research, and much of the rest of civilisation, depends. This talk will outline the work which has been, and continues to be, carried out to provide an answer to the question of how to judge whether any given data repository is up to the task and deserves to be funded. The OAIS Reference Model (ISO 14721) forms the basis of most serious work on digital preservation and the aim of the work described here is to build on OAIS to create an international standard on which an accreditation and certification process can be based. The talk will touch on some of the fundamental ideas about preservation of digital objects and on ways to detect preservation snakeoil salesmen.

  20. A matter of trust

    DEFF Research Database (Denmark)

    Smed, Sinne; Andersen, Laura Mørch; Kærgård, Niels

    2013-01-01

    production are found not to have no significant causual effect on actual behaviour, whereas concern for artificial additives and low price sensitivity have. Even when differences in time varying attitudes have been controlled for there is still a rather large heterogeneity in the organic purchasing behaviour......This article shows that trust in the organic label as well as perceived positive health effects of consumption of organic products have positive causal effects on actual organic consumption. Furthermore perceived positive environmental effects and perceived better animal welfare related to organic....... Part of this heterogeneity can be explained by differences in urbanisation or level of education, while income does not seem to have any effect when education has been controlled for. The data used is panel data for 830 households reporting actual purchases as well as stated preferences and attitudes...

  1. Applying Lessons of Trust in Future Command Arrangements

    Science.gov (United States)

    2011-05-19

    Generals Bradley and Quesada in WWII, Generals Schwarzkopf and Horner in Operation Desert Storm, and Generals Clark and Short in Operation Allied...Generals Bradley and Quesada in WWII, Generals Schwarzkopf and Horner in Operation Desert Storm, and Generals Clark and Short in Operation Allied Force...4 Quesada and Bradley

  2. Trust Propagation in Small Worlds

    DEFF Research Database (Denmark)

    Gray, Elizabeth; Seigneur, Jean-Marc; Chen, Yong

    2003-01-01

    The possibility of a massive, networked infrastructure of diverse entities partaking in collaborative applications with each other increases more and more with the proliferation of mobile devices and the development of ad hoc networking technologies. In this context, traditional security measures...... do not scale well. We aim to develop trust-based security mechanisms using small world concepts to optimise formation and propagation of trust amongst entities in these vast networks. In this regard, we surmise that in a very large mobile ad hoc network, trust, risk, and recommendations can...

  3. In the CJEU Judges Trust

    DEFF Research Database (Denmark)

    Mayoral, Juan A.

    2016-01-01

    references by national courts. However, there is still a gap in the literature on the development of trust as a functional principle encouraging co-operation between national and international courts. This article explores the nature, causes and potentials of judicial trust for the EU judicial system....... A theory is offered in the article, which links national judges' trust in the CJEU to their corporatist identification and profile, to their attitudes towards the EU, and to their beliefs about the CJEU's ability to provide decisions that: 1) offer a clear guidance on European Union law, and 2...

  4. Trust management in cloud services

    CERN Document Server

    Noor, Talal H; Bouguettaya, Athman

    2014-01-01

    This book describes the design and implementation of Cloud Armor, a novel approach for credibility-based trust management and automatic discovery of cloud services in distributed and highly dynamic environments. This book also helps cloud users to understand the difficulties of establishing trust in cloud computing and the best criteria for selecting a service cloud. The techniques have been validated by a prototype system implementation and experimental studies using a collection of real world trust feedbacks on cloud services.The authors present the design and implementation of a novel pro

  5. Understanding Trust in Financial Services

    DEFF Research Database (Denmark)

    Hansen, Torben

    2012-01-01

    , respectively. In addition, the results marginally indicate that broad-scope trust negatively moderates the relationship between consumer financial knowledge and narrow-scope trust. This study encourages public policy makers, consumer organizations, and financial service providers to continue, improve, and...... their customers and/or in improving their financial healthiness........ This research extends prior research by developing a conceptual framework explaining how these constructs affect consumers' trust in their financial service provider. Based on two surveys comprising 764 pension consumers and 892 mortgage consumers, respectively, the results of this study indicate that financial...

  6. The Process Perspective on Trust in Organizations

    DEFF Research Database (Denmark)

    Jagd, Søren

    all process oriented trust researchers have applied the weak process perspective having studied questions like: how trust processes get started; how the trust process may grow and develop over time; and how to understand the qualitative transformations of trust in the course of a relationship...

  7. Metadata trust in a personal video recorder

    NARCIS (Netherlands)

    Boertjes, E.M.

    2004-01-01

    Trust is the belief or confidence in someone that their recommendations will work for you, i.e. that you will like the TV-programs (or other content) that they recommend. Many systems incorporate some notion of trust. Trust is more than similarity in taste, which makes trust a broader concept than t

  8. 7 CFR 1400.100 - Revocable trust.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Revocable trust. 1400.100 Section 1400.100... AND SUBSEQUENT CROP, PROGRAM, OR FISCAL YEARS Payment Limitation § 1400.100 Revocable trust. A revocable trust and the grantor of the trust will be considered to be the same person....

  9. Trust, Behavior, and High School Outcomes

    Science.gov (United States)

    Romero, Lisa S.

    2015-01-01

    Purpose: The purpose of this paper is to contribute to the literature on student trust and to examine the relationship between student trust, behavior, and academic outcomes in high school. It asks, first, does trust have a positive effect on high school outcomes? Second, does trust influence student behavior, exerting an indirect effect on…

  10. Trust Based Certificate Revocation for Secure Routing

    DEFF Research Database (Denmark)

    xmw970, xmw970

    2016-01-01

    propose to develop a CA distribution and a Trust based threshold revocation method. Initially the trust value is computed from the direct and indirect trust values. And the certificate authorities distributes the secret key to al the nodes. Followed by this a trust based threshold revocation method...

  11. Revealing Preconditions for Trustful Collaboration in CSCL

    Science.gov (United States)

    Gerdes, Anne

    2010-01-01

    This paper analyses preconditions for trust in virtual learning environments. The concept of trust is discussed with reference to cases reporting trust in cyberspace and through a philosophical clarification holding that trust in the form of self-surrender is a common characteristic of all human co-existence. In virtual learning environments,…

  12. A Formal Model for Trust Lifecycle Management

    DEFF Research Database (Denmark)

    Wagealla, Waleed; Carbone, Marco; English, Colin;

    2003-01-01

    We propose a formal model of trust informed by the Global Computing scenario and focusing on the aspects of trust formation, evolution, and propagation. The model is based on a novel notion of trust structures which, building on concepts from trust management and domain theory, feature at the sam...

  13. The Comet With a Broken Heart

    Science.gov (United States)

    2006-04-01

    ). Fragment B seems to have fragmented again, bringing the total of fragments close to 40, some being most probably very small, boulder-sized objects with irregular and short-lived activity. The new observations reveal that this new small fragment has split again! The image clearly reveals that below the main B fragment, there is a small fragment that is divided into two and a careful analysis reveals five more tiny fragments almost aligned. Thus, this image alone shows at least 7 fragments. The comet has thus produced a whole set of mini-comets! ESO PR Photo 15b/06 ESO PR Photo 15b/06 Broken Fragments of Comet SW-3 Will the process continue? Will more and more fragments form and will the comet finally disintegrate? How bright will the fragments be when the comet will be the closest to the Earth, on 11 to 14 May, and how many new fragments will have appeared before the comet reaches its closest approach to the Sun, around 7 June? Fragment C of the comet should be the closest to Earth on 11 May, when it will be about 12 million km away, while fragment B will come as 'close' as 10 million km from Earth on 14 May. Although this is the closest a comet ever approached Earth in more than twenty years - even Comet Hyakutake's smallest distance was 15 million km - this is still 26 times the distance between the Earth and the Moon and therefore does not pose any threat to our planet. ESO PR Photo 15/06 ESO PR Photo 15c/06 Mini-Comets coming off Comet SW-3 If nothing else happens, at the time of closest approach, fragment B will be just visible with unaided eye by experienced observers. It should be an easy target however to observe with binoculars. If we are lucky, however, fragment B presents another outburst, becoming a magnificent sight in the night sky. On the other hand, it could just as well fade away into oblivion. But then, the main fragment C should still be visible, even possibly with the unaided eye. ESO telescopes will observe the comet in the greatest detail at the end of

  14. The Relationship between Teamwork and Organizational Trust

    Directory of Open Access Journals (Sweden)

    Musab Işık

    2015-04-01

    Full Text Available The aim of this study is to investigate the relationship between teamwork and organizational trust. In the implementation section the data from the survey of 250 workers is employed in call centers in Erzurum by using relevant statistical methods. Consequently, it is found that there is a positive and significant relationship between teamwork and organizational trust. Thus, the hypothesis of the study is supported as it was expected. Besides, it is found that there are positive and significant relationships between communication, openness to innovation, participation-trust in teamwork and organizational trust, trust in management, trust in co-workers, and trust in workplace.

  15. Building effective partnerships: the role of trust in the Virus Resistant Cassava for Africa project

    Directory of Open Access Journals (Sweden)

    Ezezika Obidimma C

    2012-11-01

    Full Text Available Abstract Background Virus Resistant Cassava for Africa (VIRCA is an agricultural biotechnology public-private partnership (PPP comprising the Donald Danforth Plant Sciences Center (DDPSC, National Agricultural Research Organization (NARO of Uganda and Kenya Agricultural Research Institute (KARI. The project seeks to develop virus-resistant cassava for farmers in Kenya and Uganda. Yet, there is much public skepticism about the use of genetically modified (GM crops and private sector involvement in Africa. This case study sought to understand the role of trust in the VIRCA partnership. Methods We conducted semi-structured, face-to-face interviews to obtain stakeholders’ views on the challenges to, and practices for, building trust in the VIRCA partnership. Interviewee responses, together with relevant documents and articles, were analyzed to generate descriptions of how trust is operationalized in this evolving agbiotech PPP. Data were analyzed based on recurring and emergent themes from the interviewee responses. Results Various factors undermine and build trust in agbiotech PPPs. Individual and institutional enthusiasm and detailed collaborative agreements stipulating partner roles and responsibilities are likely to enhance trust among partners. On the other hand, negative perceptions propagated by international partners about the capacities of African institutions and scientists, coupled with slow regulatory processes in Africa, are likely to be impediments to trust building. Conclusions Based on the findings of this study, we have derived four key lessons. First, differences in the capacity of the partner institutions and individuals should be respected. Second, technical and infrastructural capacity support for regulatory processes in Africa must be built. Third, detailed agreements and open and transparent partner practices during project implementation are necessary to dispel perceptions of inequality among partners. Fourth, institutional

  16. Trust, dependence and interorganizational systems

    NARCIS (Netherlands)

    Ibrahim, M.K.M.

    2006-01-01

    Organizations form interorganizational relationships and utilize information technology to improve performance. This thesis discusses the influences of dependence and different types of trust on the use of interorganizational systems and subsequently the attainment of strategic benefits. The finding

  17. Ethnic Diversity and Social Trust

    DEFF Research Database (Denmark)

    Dinesen, Peter Thisted; Sønderskov, Kim Mannemar

    2015-01-01

    We argue that residential exposure to ethnic diversity reduces social trust. Previous within-country analyses of the relationship between contextual ethnic diversity and trust have been conducted at higher levels of aggregation, thus ignoring substantial variation in actual exposure to ethnic......, whereas the effect vanishes in larger contextual units. This supports the conjecture that interethnic exposure underlies the negative relationship between ethnic diversity in residential contexts and social trust....... diversity. In contrast, we analyze how ethnic diversity of the immediate micro-context—where interethnic exposure is inevitable—affects trust. We do this using Danish survey data linked with register-based data, which enables us to obtain precise measures of the ethnic diversity of each individual...

  18. Public and Conservation Trust Lands

    Data.gov (United States)

    California Department of Resources — A 1:100,000 polygon features class representing public, conservation and trust land ownership in the state of California. Developed for the California Resources...

  19. TEE-Based Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe

    Today, it is safe to assume that any program or data can be compromised, if they are not protected by hardware within a secure area. Systems based on crypto-processors (e.g., a trusted platform module, a smart card or a hardware security module) rely on the properties of tamper resistant hardware...... trusted storage for personal data. We believe that this role can be taken over by systems equipped with Trusted Execution Environments (TEE), such as ARM’s TrustZone. Indeed, even if TEEs provide weaker security guarantees than crypto-processors, they already provide a secure area on many personal devices...... to establish a tight security parameter around a reduced set of predefined functionalities. Such systems are very secure, but they impose strong constraints on the functionalities, the connectivity or the resources available within the secure area. They have not proven versatile enough to provide mainstream...

  20. Ethnic Diversity and Social Trust

    DEFF Research Database (Denmark)

    Dinesen, Peter Thisted; Sønderskov, Kim Mannemar

    2015-01-01

    In this paper we argue that residential exposure to ethnic diversity reduces social trust. Previous within-country analyses of the relationship between contextual ethnic diversity and trust have been conducted at higher levels of aggregation, concealing substantial variation in actual exposure...... to ethnic diversity. In contrast, we analyze how ethnic diversity of the immediate micro-context – where interethnic exposure is inevitable – affects trust. We do this using Danish survey data linked with register-based data, which enables us to obtain precise measures of the ethnic diversity of each......, while the effect vanishes in larger contextual units. This supports the conjecture that interethnic exposure underlies the negative relationship between ethnic diversity in residential contexts and social trust....

  1. Trust and Privacy in Our Networked World

    OpenAIRE

    Tavani, Herman T.; Dieter Arnold

    2011-01-01

    Remarking on the relationship between the concepts of trust and privacy, Charles Fried (1990, p. 56) [1] writes: Trust is the attitude of expectation that another will behave according to the constraints of morality… There can be no trust where there is no possibility of error. More specifically, man cannot know that he is trusted unless he has the right to act without constant surveillance so that he knows he can betray the trust. Privacy confers that essential right… Without privacy and the...

  2. Trusted Silicon Stratus (TSS) Workshop

    Science.gov (United States)

    2011-02-01

    Possible solutions discussed included the use of authentication technologies such as Physically Unclonable Functions ( PUF ) and a knowledge base...Gate-level characterization • PUF and PPUF Primitives • IC DRM • Trusted Remote Operation • Trusted Synthesis using Untrusted Tools and IP...Public Physically Unclonable Function PUF Physically Unclonable Function SaaS Software-as-a-Service SIP Semiconductor Intellectual Property SNL

  3. Mobile security and trusted computing

    OpenAIRE

    Mitchell, Chris J.

    2006-01-01

    Some of the most significant security issues arising in the context of ubiquitous mobile computing are reviewed. Emerging technologies which may be able to help overcome these security problems are also described; in particular we consider methods for secure 'imprinting' of mobile devices, techniques proposed for establishing trust between devices with no prior relationship, and finally the relevence of trusted computing technology to mobile security issues.

  4. Bifurcation and catastrophe of seepage flow system in broken rock

    Institute of Scientific and Technical Information of China (English)

    MIAO Xie-xing; LI Shun-cai; CHEN Zhan-qing

    2009-01-01

    The study of dynamical behavior of water or gas flows in broken rock is a basic research topic among a series of key projects about stability control of the surrounding rocks in mines and the prevention of some disasters such as water inrush or gas outburst and the protection of the groundwater resource. It is of great theoretical and engineering importance in respect of promo-tion of security in mine production and sustainable development of the coal industry. According to the non-Darcy property of seepage flow in broken rock dynamic equations of non-Darcy and non-steady flows in broken rock are established. By dimensionless transformation, the solution diagram of steady-states satisfying the given boundary conditions is obtained. By numerical analysis of low relaxation iteration, the dynamic responses corresponding to the different flow parameters have been obtained. The stability analysis of the steady-states indicate that a saddle-node bifurcaton exists in the seepage flow system of broken rock. Consequently, using catastrophe theory, the fold catastrophe model of seepage flow instability has been obtained. As a result, the bifurcation curves of the seepage flow systems with different control parameters are presented and the standard potential function is also given with respect to the generalized state variable for the fold catastrophe of a dynamic system of seepage flow in broken rock.

  5. Broken-Rotor-Bar Diagnosis for Induction Motors

    Science.gov (United States)

    Wang, Jinjiang; Gao, Robert X.; Yan, Ruqiang

    2011-07-01

    Broken rotor bar is one of the commonly encountered induction motor faults that may cause serious motor damage to the motor if not detected timely. Past efforts on broken rotor bar diagnosis have been focused on current signature analysis using spectral analysis and wavelet transform. These methods require accurate slip estimation to localize fault-related frequency. This paper presents a new approach to broken rotor bar diagnosis without slip estimation, based on the ensemble empirical mode decomposition (EEMD) and the Hilbert transform. Specifically, the Hilbert transform first extracts the envelope of the motor current signal, which contains broken rotor fault-related frequency information. Subsequently, the envelope signal is adaptively decomposed into a number of intrinsic mode functions (IMFs) by the EEMD algorithm. Two criteria based on the energy and correlation analyses have been investigated to automate the IMF selection. Numerical and experimental studies have confirmed that the proposed approach is effective in diagnosing broken rotor bar faults for improved induction motor condition monitoring and damage assessment.

  6. Trust and Online Reputation Systems

    Science.gov (United States)

    Kwan, Ming; Ramachandran, Deepak

    Web 2.0 technologies provide organizations with unprecedented opportunities to expand and solidify relationships with their customers, partners, and employees—while empowering firms to define entirely new business models focused on sharing information in online collaborative environments. Yet, in and of themselves, these technologies cannot ensure productive online interactions. Leading enterprises that are experimenting with social networks and online communities are already discovering this fact and along with it, the importance of establishing trust as the foundation for online collaboration and transactions. Just as today's consumers must feel secure to bank, exchange personal information and purchase products and services online; participants in Web 2.0 initiatives will only accept the higher levels of risk and exposure inherent in e-commerce and Web collaboration in an environment of trust. Indeed, only by attending to the need to cultivate online trust with customers, partners and employees will enterprises ever fully exploit the expanded business potential posed by Web 2.0. But developing online trust is no easy feat. While various preliminary attempts have occurred, no definitive model for establishing or measuring it has yet been established. To that end, nGenera has identified three, distinct dimensions of online trust: reputation (quantitative-based); relationship (qualitative-based) and process (system-based). When considered together, they form a valuable model for understanding online trust and a toolbox for cultivating it to support Web 2.0 initiatives.

  7. [Trust and reliability in surgery].

    Science.gov (United States)

    Weigel, T F; Hanisch, E; Buia, A; Hessler, C

    2017-03-01

    Social interactions are hardly possible without trust. Medical and in particular surgical actions can change the lives of people directly and indirectly existentially. Thus, the relationship between doctor and patient is a special form of social interaction, and will be hard to find anywhere else. The nature of the doctor-patient relationship also determines the success of a treatment. The core and the importance of trust, as a central part of this relationship, will be reconstructed in the present paper. The increasing possibilities of information acquisition in modern societies, and the ever-present need for transparency, impact more and more on the doctor-patient relationship. At first glance, concepts of trust seem to be of secondary importance. The current developments regarding the remuneration of services in the medical system likewise bear the risk to increasingly determine the importance of trust in the doctor-patient relationship. However, it is necessary to delineate reliability from trust. Due to the conditions which are constitutive for the operational disciplines, a climate of trust, even in a modern information society, is more necessary than ever.

  8. Trusted counsellor retires

    CERN Multimedia

    2006-01-01

    His astute counsel, knowing smile and distinguished eloquence will be missed by many. With a pang of regret, the man himself admits that 'CERN was like a drug for me'. Last week, Jean-Daniel Mandica retired, after 40 years of loyal service. He was the trusted counsellor of every Director of the Administration and Director-General for eighteen years, from 1986 to 2003. Head of the planning unit for the Directorate and the Administration from 1986 to 1996, he was then named Head of the Directorate Services Unit in 1996, a position he held until the end of 2003. Throughout that time, he conducted key tasks for the Organization, such as restructuring the Administration and carrying out audits. His role in the creation of Microcosm and his commitment to CERN's participation in the Universal Exposition at Seville in 1992 contributed in no small part to the spread of the Laboratory's fame. Jean-Daniel Mandica's incomparable knowledge of the Administration, sense of diplomacy and great ability to listen made him a v...

  9. Neutrino Mixing: from the Broken \\mu-\\tau Symmetry to the Broken Friedberg-Lee Symmetry

    CERN Document Server

    Xing, Z

    2007-01-01

    I argue that the observed flavor structures of leptons and quarks might imply the existence of certain flavor symmetries. The latter should be a good starting point to build realistic models towards deeper understanding of the fermion mass spectra and flavor mixing patterns. The \\mu-\\tau permutation symmetry serves for such an example to interpret the almost maximal atmospheric neutrino mixing angle (\\theta_23 \\sim 45^\\circ) and the strongly suppressed CHOOZ neutrino mixing angle (\\theta_13 < 10^\\circ). In this talk I like to highlight a new kind of flavor symmetry, the Friedberg-Lee symmetry, for the effective Majorana neutrino mass operator. Luo and I have shown that this symmetry can be broken in an oblique way, such that the lightest neutrino remains massless but an experimentally-favored neutrino mixing pattern is achievable. We get a novel prediction for \\theta_13 in the CP-conserving case: \\sin\\theta_13 = \\tan\\theta_12 |(1- \\tan\\theta_23)/ (1+ \\tan\\theta_{23})|. Our scenario can simply be generalize...

  10. Neutrino Mixing:. from the Broken μ-τ Symmetry to the Broken Friedberg-Lee Symmetry

    Science.gov (United States)

    Xing, Zhi-Zhong

    I argue that the observed flavor structures of leptons and quarks might imply the existence of certain flavor symmetries. The latter should be a good starting point to build realistic models towards deeper understanding of the fermion mass spectra and flavor mixing patterns. The μ-τ permutation symmetry serves for such an example to interpret the almost maximal atmospheric neutrino mixing angle (θ23 ~ 45°) and the strongly suppressed CHOOZ neutrino mixing angle (θ13 Friedberg-Lee symmetry, for the effective Majorana neutrino mass operator. Luo and I have shown that this symmetry can be broken in an oblique way, such that the lightest neutrino remains massless but an experimentally-favored neutrino mixing pattern is achievable. We get a novel prediction for θ13 in the CP-conserving case: sinθ13 = tanθ12|(1 - tanθ23)/(1 + tanθ23)|. Our scenario can simply be generalized to accommodate CP violation and be combined with the seesaw mechanism. Finally I stress the importance of probing possible effects of μ-τ symmetry breaking either in terrestrial neutrino oscillation experiments or with ultrahigh-energy cosmic neutrino telescopes.

  11. Consumer trust in the Australian food system - The everyday erosive impact of food labelling.

    Science.gov (United States)

    Tonkin, Emma; Webb, Trevor; Coveney, John; Meyer, Samantha B; Wilson, Annabelle M

    2016-08-01

    Consumer trust in food system actors is foundational for ensuring consumer confidence in food safety. As food labelling is a direct communication between consumers and food system actors, it may influence consumer perceptions of actor trustworthiness. This study explores the judgements formed about the trustworthiness of the food system and its actors through labelling, and the expectations these judgements are based on. In-depth, semi-structured interviews with 24 Australian consumers were conducted. Theoretical sampling focussed on shopping location, dietary requirements, rurality, gender, age and educational background. The methodological approach used (adaptive theory) enabled emerging data to be examined through the lens of a set of guiding theoretical concepts, and theory reconsidered in light of emerging data. Food labelling acted as a surrogate for personal interaction with industry and government for participants. Judgements about the trustworthiness of these actors and the broader food system were formed through interaction with food labelling and were based on expectations of both competence and goodwill. Interaction with labelling primarily reduced trust in actors within the food system, undermining trust in the system as a whole. Labelling has a role as an access point to the food system. Access points are points of vulnerability for systems, where trust can be developed, reinforced or broken down. For the participants in this study, in general labelling demonstrates food system actors lack goodwill and violate their fiduciary responsibility. This paper provides crucial insights for industry and policy actors to use this access point to build, rather than undermine, trust in food systems.

  12. Misunderstanding that the Effective Action is Convex under Broken Symmetry

    CERN Document Server

    Asanuma, Nobu-Hiko

    2016-01-01

    The widespread belief that the effective action is convex and has a flat bottom under broken global symmetry is shown to be wrong. We show spontaneous symmetry breaking necessarily accompanies non-convexity in the effective action for quantum field theory, or in the free energy for statistical mechanics, and clarify the magnitude of non-convexity. For quantum field theory, it is also explicitly proved that translational invariance breaks spontaneously when the system is in the non-convex region, and that different vacua of spontaneously broken symmetry cannot be superposed. As applications of non-convexity, we study the first-order phase transition which happens at the zero field limit of spontaneously broken symmetry, and we propose a simple model of phase coexistence which obeys the Born rule.

  13. Strongly broken Peccei-Quinn symmetry in the early Universe

    Energy Technology Data Exchange (ETDEWEB)

    Takahashi, Fuminobu [Department of Physics, Tohoku University,Sendai, Miyagi 980-8578 (Japan); Kavli IPMU (WPI), TODIAS, The University of Tokyo,Kashiwa, Chiba 277-8583 (Japan); Yamada, Masaki [Kavli IPMU (WPI), TODIAS, The University of Tokyo,Kashiwa, Chiba 277-8583 (Japan); Institute for Cosmic Ray Research, ICRR, The University of Tokyo,Kashiwa, Chiba 277-8582 (Japan)

    2015-10-06

    We consider QCD axion models where the Peccei-Quinn symmetry is badly broken by a larger amount in the past than in the present, in order to avoid the axion isocurvature problem. Specifically we study supersymmetric axion models where the Peccei-Quinn symmetry is dynamically broken by either hidden gauge interactions or the SU(3){sub c} strong interactions whose dynamical scales are temporarily enhanced by the dynamics of flat directions. The former scenario predicts a large amount of self-interacting dark radiation as the hidden gauge symmetry is weakly coupled in the present Universe. We also show that the observed amount of baryon asymmetry can be generated by the QCD axion dynamics via spontaneous baryogenesis. We briefly comment on the case in which the PQ symmetry is broken by a non-minimal coupling to gravity.

  14. Experimental Study on the Porosity Creep Properties of Broken Limestone

    Directory of Open Access Journals (Sweden)

    Li Shun-cai

    2016-01-01

    Full Text Available In the underground engineering, the long-term stability of the surrounding rocks (especially the broken rocks containing water and the ground settlement resulted from the seepage-creep coupling above goaf have been the important research subjects concerning the deep mining. For the broken rock, its porosity is an important structural parameter determining its creep properties, and the porosity change rate is more superior to describe the creep characteristics compared with the strain change rate at a certain direction. In this paper, MTS815.02 Rock Mechanics Test System is used to carry out the creep experiments on water-saturated broken limestone, and then the time curves of porosity and of the porosity change rate are obtained. By regression, we have got the relation equation between the porosity change rate with the instant porosity and the stress level during the creep. The study indicates that when the stress retains a constant level, the relation between the porosity change rate and the instant porosity can be fitted with a cubical polynomial. The obtained creep relation equation between the porosity change rate and the instant porosity and the instant stress provides a necessary state equation for studying the coupling between the seepage and the creep of the broken rock. Furthermore, the seepage in the broken rock has been verified to satisfy the Forchheimer’s non-Darcy flow according to our previous studies, and its seepage properties, k, β and ca can all be expressed respectively as the polynomial of the porosity, so, by combining with these three state equations we have obtained the four essential state equations for solving the coupling problems of the seepage and the creep for the broken rocks.

  15. Multiple Trust Model in Online Transaction by Trusted Third Party

    Directory of Open Access Journals (Sweden)

    R. Suganya

    2016-02-01

    Full Text Available the information fortune and the connectivity are provided by the universe of E-commerce over an enormous distance at all time. In an open and distributed environment the buyers or providers will not act in a mutually understood or agreed manner by which the incomplete practices and fraudulent activities happen. So in any online transaction the security and trust are two important factors that are to be considered. In Ecommerce markets the above mentioned problems are criticized as the most important barriers. In order to improve these barriers a trust based third party mechanism is successfully adopted as a self-regulatory system to improve the buyer and seller trust. The online transactions are made very easy now days by E-commerce technologies. Built integrity belief approach (BIB, Support Vector Mechanic approach (SVM and Random Number Generation approach (RNG are the three approaches which are mainly used in this paper for online trust management. The seller and the buyer communication will be handled through the trusted third party. Apart from this a coupon based approach is introduced as an advancement in this paper for providing discount schemes which is helpful in attracting the customer who purchase beyond the threshold level fixed by the seller. Moreover a product review study is integrated in order to reduce the scam reviews in online transactions.

  16. Elastoconductivity as a probe of broken mirror symmetries

    Energy Technology Data Exchange (ETDEWEB)

    Hlobil, Patrik; Maharaj, Akash V.; Hosur, Pavan; Shapiro, M. C.; Fisher, I. R.; Raghu, S.

    2015-07-27

    We propose the possible detection of broken mirror symmetries in correlated two-dimensional materials by elastotransport measurements. Using linear response theory we calculate the“shear conductivity” Γ x x , x y , defined as the linear change of the longitudinal conductivity σ x x due to a shear strain ε x y . This quantity can only be nonvanishing when in-plane mirror symmetries are broken and we discuss how candidate states in the cuprate pseudogap regime (e.g., various loop current or charge orders) may exhibit a finite shear conductivity. We also provide a realistic experimental protocol for detecting such a response.

  17. Trust Dynamics in a Large System Implementation

    DEFF Research Database (Denmark)

    Schlichter, Bjarne Rerup; Rose, Jeremy

    2013-01-01

    A large information systems implementation (such as ERP systems) relies on the trust of its stakeholders to suc-ceed. Such projects impact diverse groups of stakeholders, each with their legitimate interests and expectations. Levels of stakeholder trust can be expected to vary in large scale impl...... and restoration of trust, the role of the information system in restoring trust, and the emergent and reciprocal nature of trust and project outcomes......A large information systems implementation (such as ERP systems) relies on the trust of its stakeholders to suc-ceed. Such projects impact diverse groups of stakeholders, each with their legitimate interests and expectations. Levels of stakeholder trust can be expected to vary in large scale...... implementations (which can take several years), and cannot be taken for granted. Previous studies have largely focused on the taxonomic deconstruction of the trust construct, through point-in-time variance studies. They have identified the relationship between trust and project outcomes, but largely ignored...

  18. Lesson Learning at JPL

    Science.gov (United States)

    Oberhettinger, David

    2011-01-01

    A lessons learned system is a hallmark of a mature engineering organization A formal lessons learned process can help assure that valuable lessons get written and published, that they are well-written, and that the essential information is "infused" into institutional practice. Requires high-level institutional commitment, and everyone's participation in gathering, disseminating, and using the lessons

  19. Global Trust: A Trust Model for Cloud Service Selection

    Directory of Open Access Journals (Sweden)

    Fatima Zohra Filali

    2015-04-01

    Full Text Available Cloud Computing refers to network-based service provided by a large number of computers, sharing computing and storage resources. Combined with on-demand provisioning mechanisms and relied on a pay-per-use business model. The Cloud Computing offers the possibilities to scale rapidly, to store data remotely and to share services in a dynamic environment. However, these benefits can be seen as weaknesses for assuring trust, and providing confidence to the users of service. In this case, some traditional mechanisms to guarantee reliable services are no longer suitable or dynamic enough, and new models need to be developed to fit this paradigm. This study describes the assessment of the trust in the context of Cloud Computing, proposes a new trust model adapted to Cloud environments, and shows some experiments in regards of the proposed solution.

  20. Trust Management System for Opportunistic Cloud Services

    DEFF Research Database (Denmark)

    Kuada, Eric

    2013-01-01

    We have over the past three years been working on the feasibility of Opportunistic Cloud Services (OCS) for enterprises. OCS is about enterprises strategically contributing and utilizing spare IT resources as cloud services. One of the major challenges that such a platform faces is data security...... and trust management issues. This paper presents a trust management system for OCS platforms. It models the concept of trust and applies it to OCS platforms. The trust model and the trust management system are verified through the simulation of the computation of the trust values with Infrastructure...

  1. Design and Implementation of Trusted-Router Based on Trust Management System

    Institute of Scientific and Technical Information of China (English)

    Sun Bin; Mao Yuankui

    2011-01-01

    This paper presents a scheme to perform QoS management and assure network security by using the trusted-router based on the Trust Management System.In this trusted-router,every IP packet is forwarded and queued by its trust value,which is the quantification of the network's expectation for this packet's and its owner's behavior in the network.We outline the algorithms to calculate the trust value of the trusted-router and the IP packet.We also introduce the trust-based QoS management algorithm and the deployment of the trusted-routers which carry out this algorithm.The simulation results show that the least trusted IP packets will be dropped to save resources for those highly trusted IP packets.This will ecourage all the elements in the network to keep a good trust record.

  2. Quantum restoration of broken symmetry in onedimensional loop space

    Indian Academy of Sciences (India)

    Pinaki Patra; Tanmay Mandal; Jyoti Prasad Saha

    2014-06-01

    For one-dimensional loop space, a nonlinear nonlocal transformation of fields is given to make the action of the self-interacting quantum field to the free one. A specific type of classically broken symmetry is restored in quantum theory. One-dimensional sine-Gordon system and sech interactions are treated as the explicit examples.

  3. Bags in relativistic quantum field theory with spontaneously broken symmetry

    Energy Technology Data Exchange (ETDEWEB)

    Wadati, M.; Matsumoto, H.; Umezawa, H.

    1978-08-15

    Presented is a microscopic derivation of bags from a relativistic quantum theory with spontaneously broken symmetry. The static energy of a bag whose singularity is the surface of a sphere coincides with the volume tension in the MIT bag theory. A similarity between the bags and the point defects in crystals is pointed out.

  4. Dynamically broken Anti-de Sitter action for gravity

    CERN Document Server

    Tresguerres, Romualdo

    2008-01-01

    Due to a suitable Higgs mechanism, a standard Anti-de Sitter gauge theory becomes spontaneously broken. The resulting Lorentz invariant gravitational action includes the Hilbert-Einstein term of ordinary Einstein-Cartan gravity with cosmological constant, plus contributions quadratic in curvature and torsion, and a scalar Higgs sector.

  5. Trust in Government: A Note from Nigeria

    Directory of Open Access Journals (Sweden)

    Iroghama Paul Iroghama

    2012-06-01

    Full Text Available The relationship between trust in government and factors that accounts for Nigerians citizen trust in their government has been of interest due a dearth of literature on such issue. This study is an attempt to bridge the gap from a public policy perspective. One of the measures usually used in the literature to measure trust or distrust in government is perception of corruption, but there are other yardsticks with which to measure determinant of trust in government, such as economic performance or political participation. This study used a micro-level analysis of public opinion survey data (question by question to ascertain empirical linkages of political trust within Nigeria. To this end, Afrobarometer survey Round Four conducted in 2008 was used for the analyses. Descriptive statistics provide background information on the sample, while multivariate logistic regression using SPSS were used to model the citizens’ trust for government in Nigeria. This study revealed that political trust or trust in governments in Nigeria stems from a number of factors. These are economy performance, media, interest in public affairs, religious membership, political participation, interpersonal trust, lack of basic needs, and management of corruption. Furthermore, the variables that influence trust in government the most are interpersonal trust and government management of corruption issue. Those that reported interpersonal trust also reported that they have trust for the government. While those that believe the governments are fighting or managing corruption nicely have a tendency to trust in the government. Although this study does not claim to provide all the answer on political trust or trust in governments in Nigeria, its attempt is to bridge gap in the literature on the topic and to assist future research in the area, as nothing exist on the topic as the moment. It is hope the subject will forms a basis upon which further analytical work on political

  6. Adequate trust avails, mistaken trust matters: on the moral responsibility of doctors as proxies for patients' trust in biobank research.

    Science.gov (United States)

    Johnsson, Linus; Helgesson, Gert; Hansson, Mats G; Eriksson, Stefan

    2013-11-01

    In Sweden, most patients are recruited into biobank research by non-researcher doctors. Patients' trust in doctors may therefore be important to their willingness to participate. We suggest a model of trust that makes sense of such transitions of trust between domains and distinguishes adequate trust from mistaken trust. The unique position of doctors implies, we argue, a Kantian imperfect duty to compensate for patients' mistaken trust. There are at least three kinds of mistaken trust, each of which requires a different set of countermeasures. First, trust is mistaken when necessary competence is lacking; the competence must be developed or the illusion dispelled. Second, trust is irrational whenever the patient is mistaken about his actual reasons for trusting. Care must therefore be taken to support the patient's reasoning and moral agency. Third, some patients inappropriately trust doctors to recommend only research that will benefit them directly. Such trust should be counteracted by nurturing a culture where patients expect to be asked occasionally to contribute to the common good.

  7. Barometer. Acute trusts February 2005.

    Science.gov (United States)

    2005-03-17

    Almost two thirds of acute trusts rate the quality of commissioning from their PCTs at three out of 10 or less, according to the latest HSJ Barometer survey. This is the lowest score since we began the survey a year ago. Confidence in their performance against the 98 per cent four-hour A&E target fell sharply from a December high to an average of 6.87. The survey also found that fewer than one in seven trusts were confident of winning foundation status by the end of 2006-07.

  8. A Calculus for Trust Management

    DEFF Research Database (Denmark)

    Carbone, Marco; Nielsen, Mogens; Sassone, Vladimiro

    2004-01-01

    We introduce ctm, a process calculus which embodies a notion of trust for global computing systems. In ctm each principal (location) is equipped with a policy, which determines its legal behaviour, and with a protocol, which allows interactions between principals and the flow of information from...... principals to policies. We elect to formalise policies using a Datalog-like logic, and to express protocols in the process algebra style. This yields an expressive calculus very suitable for the global computing scenarios, and provides a formalisation of notions such as trust evolution. For ctm we define...

  9. Applying Machine Trust Models to Forensic Investigations

    Science.gov (United States)

    Wojcik, Marika; Venter, Hein; Eloff, Jan; Olivier, Martin

    Digital forensics involves the identification, preservation, analysis and presentation of electronic evidence for use in legal proceedings. In the presence of contradictory evidence, forensic investigators need a means to determine which evidence can be trusted. This is particularly true in a trust model environment where computerised agents may make trust-based decisions that influence interactions within the system. This paper focuses on the analysis of evidence in trust-based environments and the determination of the degree to which evidence can be trusted. The trust model proposed in this work may be implemented in a tool for conducting trust-based forensic investigations. The model takes into account the trust environment and parameters that influence interactions in a computer network being investigated. Also, it allows for crimes to be reenacted to create more substantial evidentiary proof.

  10. Evaluating WikiTrust: a trust support tool for Wikipedia

    NARCIS (Netherlands)

    Lucassen, Teun; Schraagen, Jan Maarten

    2011-01-01

    Because of the open character of Wikipedia readers should always be aware of the possibility of false information. WikiTrust aims at helping readers to judge the trustworthiness of articles by coloring the background of less trustworthy words in a shade of orange. In this study we look into the effe

  11. An Investigation of Children's Peer Trust across Culture: Is the Composition of Peer Trust Universal?

    Science.gov (United States)

    Betts, Lucy R.; Rotenberg, Ken J.; Petrocchi, Serena; Lecciso, Flavia; Sakai, Atsushi; Maeshiro, Kazumi; Judson, Helen

    2014-01-01

    The components of children's trust in same-gender peers (trust beliefs, ascribed trustworthiness, and dyadic reciprocal trust) were examined in samples of 8-11-year-olds from the UK, Italy, and Japan. Trust was assessed by children's ratings of the extent to which same-gender classmates kept promises and kept secrets. Social relations analyses…

  12. Trust or Consequences: The Relationship between Faculty Trust and Faculty Learning Communities in Higher Education

    Science.gov (United States)

    Wilson, Gaye R.

    2011-01-01

    The purpose of this study was to investigate relationships between FLC membership and faculty trust in higher education colleagues and faculty trust in higher education administration in public and private universities in the United States. This quantitative study examines trust in colleagues and trust in administration in higher education, two…

  13. Validation and verification of agent models for trust: Independent compared to relative trust

    NARCIS (Netherlands)

    Hoogendoorn, M.; Jaffry, S.W.; Maanen, P.P. van

    2011-01-01

    In this paper, the results of a validation experiment for two existing computational trust models describing human trust are reported. One model uses experiences of performance in order to estimate the trust in different trustees. The second model in addition carries the notion of relative trust. Th

  14. Trust, Welfare States and Income Equality

    DEFF Research Database (Denmark)

    Bergh, Andreas; Bjørnskov, Christian

    2014-01-01

    . Using a structural equation model estimated on a large country sample, we find that trust has a positive effect on both market and net income equality. Larger welfare states lead to higher net equality but neither net income equality nor welfare state size seems to have a causal effect on trust. We...... conclude that while trust facilitates welfare state policies that may reduce net inequality, this decrease in inequality does not increase trust....

  15. Trusting Relationships in the NATO Alliance

    DEFF Research Database (Denmark)

    Keating, Vincent Charles

    trust-building among its members, this paper represents an initial attempt to consider how the question of trust can be considered with respect to the existing literature on both alliances and NATO. In doing so, it brings together three literatures: trust theory, alliance theory, and NATO studies......, in order to reveal the points of intersection that might help us to understand how and why trusting relationships can be formed within the NATO alliance....

  16. A SELF-ADAPTIVE TRUST REGION ALGORITHM

    Institute of Scientific and Technical Information of China (English)

    Long Hei

    2003-01-01

    In this paper we propose a self-adaptive trust region algorithm. The trust region radius is updated at a variable rate according to the ratio between the actual reduction and the predicted reduction of the objective function, rather than by simply enlarging or reducing the original trust region radius at a constant rate. We show that this new algorithm preserves the strong convergence property of traditional trust region methods. Numerical results are also presented.

  17. Inferring Trust Based on Similarity with TILLIT

    Science.gov (United States)

    Tavakolifard, Mozhgan; Herrmann, Peter; Knapskog, Svein J.

    A network of people having established trust relations and a model for propagation of related trust scores are fundamental building blocks in many of today’s most successful e-commerce and recommendation systems. However, the web of trust is often too sparse to predict trust values between non-familiar people with high accuracy. Trust inferences are transitive associations among users in the context of an underlying social network and may provide additional information to alleviate the consequences of the sparsity and possible cold-start problems. Such approaches are helpful, provided that a complete trust path exists between the two users. An alternative approach to the problem is advocated in this paper. Based on collaborative filtering one can exploit the like-mindedness resp. similarity of individuals to infer trust to yet unknown parties which increases the trust relations in the web. For instance, if one knows that with respect to a specific property, two parties are trusted alike by a large number of different trusters, one can assume that they are similar. Thus, if one has a certain degree of trust to the one party, one can safely assume a very similar trustworthiness of the other one. In an attempt to provide high quality recommendations and proper initial trust values even when no complete trust propagation path or user profile exists, we propose TILLIT — a model based on combination of trust inferences and user similarity. The similarity is derived from the structure of the trust graph and users’ trust behavior as opposed to other collaborative-filtering based approaches which use ratings of items or user’s profile. We describe an algorithm realizing the approach based on a combination of trust inferences and user similarity, and validate the algorithm using a real large-scale data-set.

  18. Toward a generic model of trust for electronic commerce

    NARCIS (Netherlands)

    Tan, YH; Thoen, W

    2000-01-01

    The authors present a generic model of trust for electronic commerce consisting of two basic components, party trust and control trust, based on the concept that trust in a transaction with another party combines trust in the other parry and trust in the control mechanisms that ensure the successful

  19. Trust and Relationship Building in Electronic Commerce.

    Science.gov (United States)

    Papadopoulou, Panagiota; Andreou, Andreas; Kanellis, Panagiotis; Martakos, Drakoulis

    2001-01-01

    Discussion of the need for trust in electronic commerce to build customer relationships focuses on a model drawn from established theoretical work on trust and relationship marketing that highlights differences between traditional and electronic commerce. Considers how trust can be built into virtual environments. (Contains 50 references.)…

  20. The Role of Trust in Computer Security

    DEFF Research Database (Denmark)

    Jensen, Christian D.

    2012-01-01

    technologies and show how many of them concern the placement of trust on human or system agents. We argue that making such assumptions about trust explicit is an essential requirement for the future of system security and argue why the formalisation of computational trust is necessary when we wish to reason...

  1. Temperament Constructs Related to Betrayal of Trust

    Science.gov (United States)

    1991-12-01

    disintegrate. The interrelatedness between system trust and interpersonal trust has been noted by Durkheim (1933), who predicted a loss of trust in others...and suspicion. Journal of Conflict Resolution, 2, 265-279. Durkheim , E. (1933). The division of labor in societ’. New York: Free Press of Glencoe

  2. Trust, accreditation, and philanthropy in the Netherlands.

    NARCIS (Netherlands)

    Bekkers, Rene H.F.P.

    2003-01-01

    Given the increasing numbers of scandals, the awareness among fund-raisers that the public’s trust is crucial for the nonprofit sector is growing. This study investigates the relationship between trust and charitable giving. Charitable organizations can increase the public’s trust by signaling their

  3. 46 CFR 67.36 - Trust.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 2 2010-10-01 2010-10-01 false Trust. 67.36 Section 67.36 Shipping COAST GUARD... Citizenship Requirements for Vessel Documentation § 67.36 Trust. (a) For the purpose of obtaining a registry or recreational endorsement, a trust arrangement meets citizenship requirements if: (1) Each of...

  4. 40 CFR 280.102 - Trust fund.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 26 2010-07-01 2010-07-01 false Trust fund. 280.102 Section 280.102...) Financial Responsibility § 280.102 Trust fund. (a) An owner or operator may satisfy the requirements of § 280.93 by establishing a trust fund that conforms to the requirements of this section. The...

  5. An Adaptive Trust Model of Web Services

    Institute of Scientific and Technical Information of China (English)

    SU Jin-dian; GUO He-qing; GAO Yin

    2005-01-01

    This paper proposes a dynamic Web service trust(WS Trust ) model, and some corresponding trust metric evaluation algorithms. The main goal is to evaluate the trustworthiness and predict the future behaviors of entities in order to help users find trustworthy Web service providers and prevent users from providing unfair ratings against service providers.

  6. 76 FR 60757 - Executive Branch Qualified Trusts

    Science.gov (United States)

    2011-09-30

    ... portfolio must meet the diversification requirements of Sec. 2634.406(b)(2) of this subpart. (2) In the case... of the trust's portfolio would be materially enhanced. Additionally, as with the blind trust, the... qualified trusts provisions for the executive branch in subparts D and E of 5 CFR part 2634 (see 57 FR...

  7. Heuritic Trust in IoT

    DEFF Research Database (Denmark)

    Kaur, Bipjeet; Tange, Henrik

    2015-01-01

    Increasing use of Internet of things in diverse fields has demanding association in security and trust of such services. The trust on the services cannot exist independent. It is greatly depended on the security of system at each layer. In this paper we analyze different existing trust algorithms...

  8. Agent based computational model of trust

    NARCIS (Netherlands)

    A. Gorobets (Alexander); B. Nooteboom (Bart)

    2004-01-01

    textabstractThis paper employs the methodology of Agent-Based Computational Economics (ACE) to investigate under what conditions trust can be viable in markets. The emergence and breakdown of trust is modeled in a context of multiple buyers and suppliers. Agents adapt their trust in a partner, the w

  9. Animal Behaviour: Friendship Enhances Trust in Chimpanzees.

    Science.gov (United States)

    Silk, Joan

    2016-01-25

    Individuals that participate in exchanges with delayed rewards can be exploited if their partners don't reciprocate. In humans, friendships are built on trust, and trust enhances cooperation. New evidence suggests that close social bonds also enhance trust in chimpanzees.

  10. Trusted Certificates in Quantum Cryptography

    OpenAIRE

    Perkins, William

    2006-01-01

    This paper analyzes the performance of Kak's three stage quantum cryptographic protocol based on public key cryptography against a man-in-the-middle attack. A method for protecting against such an attack is presented using certificates distributed by a trusted third party.

  11. Social Capital. Trust and Ideology

    Directory of Open Access Journals (Sweden)

    Jacek TITTENBRUN

    2013-06-01

    Full Text Available The paper offers a critical analysis of the central concept around which the popular construct of social capital is organised, i.e. trust. To this end the views of Fukuyama, the leading exponent of the said concept are considered. As a result, the concept in question is found to be ideologically charged and substantively weak in many respects.

  12. Education and the National Trust.

    Science.gov (United States)

    Binns, Gareth

    1995-01-01

    Defines the British National Trust as it marks its centenary. Known for its work in protecting historic buildings and places of natural beauty, a major focus is now education. Schoolchildren may attend curriculum-based special programs when visiting historic houses and the countryside. Others use open-space sites with no specific education…

  13. Trust enhances IT service management.

    Science.gov (United States)

    2007-08-01

    ITIL process adoption may be a prerequisite for the National Programme for IT (NPfIT), but implementation is far from straightforward. IT services company Plan-Net has been assisting Barts and The London NHS Trust with implementing its ambitious ITIL processes deployment.

  14. Trusted advisers build business success

    NARCIS (Netherlands)

    V.M. Strike (Vanessa)

    2010-01-01

    textabstractThe role of the trusted and most loyal adviser has been a crucial one to family concerns throughout the ages. During the Korean Joseon Dynasty, Kim Cheo-Seon, a eunuch, advised successive kings wisely. Sir Francis Walsingham, Principal Secretary to Queen Elizabeth I of England, is rememb

  15. Description of the Wellcome Trust

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    @@ Introduction The Wellcome Trust supports research of the highest quality with the aim of improving human and animal health, and our Strategic Plan provides the framework for how we intend to evolve our support to be even more effective in achieving this aim.

  16. Ombud's Corner: tried and trusted

    CERN Multimedia

    Sudeshna Datta-Cockerill

    2014-01-01

    Trust is an essential ingredient in all working relationships. When trust breaks down, conflicts may arise and teams may stop working in harmony. The Ombud is there to help you to find your way out before the point of no return is reached.   Reliability, integrity, expertise and good will: these are the four pillars on which trust is built. Trust between colleagues may break down for many different reasons, including misunderstandings, and the way to restoring the relationship is through working on these four pillars. For instance, if we assume that we do indeed have the expertise to deal with a particular task assigned to us, we may need to improve our reliability by making sure that we meet deadlines and expectations or demonstrate our integrity by acknowledging and accepting accountability for this, all the while showing that we are doing our best to do whatever it takes to achieve the common goals and restore our colleagues’ faith in us. All four of these pillars need to be in...

  17. Taxability of Educational Benefits Trusts

    Science.gov (United States)

    Temple Law Quarterly, 1976

    1976-01-01

    Corporations have found the promise of providing a college education to the children of employees--without the recognition of income to the parent-employee--to be a popular fringe benefit. The Internal Revenue Service has attacked educational benefit trusts in Revenue Ruling 75-448. Implications are discussed. (LBH)

  18. Corneoscleral abscess resulting from a broken suture after cataract surgery.

    Science.gov (United States)

    Cameron, J A; Huaman, A

    1994-01-01

    An 82-year-old man had pain and decreased vision in his right eye 15 months after uncomplicated cataract surgery. Examination revealed a large corneoscleral abscess with a 2 mm x 1 mm area of fluorescein staining at the base of a broken protruding 10-0 nylon suture. Streptococcus pneumoniae was isolated from both the suture and base of the ulcer. Despite intensive topical, subconjunctival, and systemic antibiotics, a large corneal perforation developed, necessitating a 10 mm tectonic penetrating keratoplasty. Long-term follow-up of patients after cataract surgery is important and should include an inspection of the limbal wound and removal of loose or broken exposed sutures. Suture-related complications will be eliminated if clinical studies prove the safety and efficacy of sutureless cataract surgery.

  19. Consistency condition for inflation from (broken) conformal symmetry

    Energy Technology Data Exchange (ETDEWEB)

    Schalm, Koenraad; Aalst, Ted van der [Instituut-Lorentz for Theoretical Physics, Universiteit Leiden, Niels Bohrweg 2, Leiden (Netherlands); Shiu, Gary, E-mail: kschalm@lorentz.leidenuniv.nl, E-mail: shiu@physics.wisc.edu, E-mail: vdaalst@lorentz.leidenuniv.nl [Department of Physics, University of Wisconsin-Madison, Madison, WI 53706 (United States)

    2013-03-01

    We investigate the symmetry constraints on the bispectrum, i.e. the three-point correlation function of primordial density fluctuations, in slow-roll inflation. It follows from the defining property of slow-roll inflation that primordial correlation functions inherit most of their structure from weakly broken de Sitter symmetries. Using holographic techniques borrowed from the AdS/CFT correspondence, the symmetry constraints on the bispectrum can be mapped to a set of stress-tensor Ward identities in a weakly broken 2+1-dimensional Euclidean CFT. We construct the consistency condition from these Ward identities using conformal perturbation theory. This requires a second order Ward identity and the use of the evolution equation. Our result also illustrates a subtle difference between conformal perturbation theory and the slow-roll expansion.

  20. Adiabatic approximation for the Rabi model with broken inversion symmetry

    Science.gov (United States)

    Shen, Li-Tuo; Yang, Zhen-Biao; Wu, Huai-Zhi

    2017-01-01

    We study the properties and behavior of the Rabi model with broken inversion symmetry. Using an adiabatic approximation approach, we explore the high-frequency qubit and oscillator regimes, and obtain analytical solutions for the qubit-oscillator system. We demonstrate that, due to broken inversion symmetry, the positions of two potentials and zero-point energies in the oscillators become asymmetric and have a quadratic dependence on the mean dipole moments within the high-frequency oscillator regime. Furthermore, we find that there is a critical point above which the qubit-oscillator system becomes unstable, and the position of this critical point has a quadratic dependence on the mean dipole moments within the high-frequency qubit regime. Finally, we verify this critical point based on the method of semiclassical approximation.

  1. Afterglow Light Curves and Broken Power Laws: A Statistical Study

    CERN Document Server

    J'ohannesson, G; Gudmundsson, E H; J\\'ohannesson, Gudlaugur; Bj\\"ornsson, Gunnlaugur; Gudmundsson, Einar H.

    2006-01-01

    In gamma-ray burst research it is quite common to fit the afterglow light curves with a broken power law to interpret the data. We apply this method to a computer simulated population of afterglows and find systematic differences between the known model parameters of the population and the ones derived from the power law fits. In general, the slope of the electron energy distribution is overestimated from the pre-break light curve slope while being underestimated from the post-break slope. We also find that the jet opening angle derived from the fits is overestimated in narrow jets and underestimated in wider ones. Results from fitting afterglow light curves with broken power laws must therefore be interpreted with caution since the uncertainties in the derived parameters might be larger than estimated from the fit. This may have implications for Hubble diagrams constructed using gamma-ray burst data.

  2. Anomalous dimensions in CFT with weakly broken higher spin symmetry

    Science.gov (United States)

    Giombi, Simone; Kirilin, Vladimir

    2016-11-01

    In a conformal field theory with weakly broken higher spin symmetry, the leading order anomalous dimensions of the broken currents can be efficiently determined from the structure of the classical non-conservation equations. We apply this method to the explicit example of O( N) invariant scalar field theories in various dimensions, including the large N critical O( N) model in general d, the Wilson-Fisher fixed point in d = 4 - ɛ, cubic scalar models in d = 6 - ɛ and the nonlinear sigma model in d = 2 + ɛ. Using information from the d = 4 - ɛ and d = 2 + ɛ expansions, we obtain some estimates for the dimensions of the higher spin operators in the critical 3d O( N) models for a few low values of N and spin.

  3. The multileveled division of trust labour

    DEFF Research Database (Denmark)

    Frederiksen, Morten

    The trust concept is inherently linked to institutional issues. Trust, according to contemporary research, may be directed at both people and institutions and the influence of institutions may affect both trust in other people and trust in other institutions. This conceptual stretching takes place...... at the intersubjective and institutional levels. I argue that confidence in institutions define the playing field of uncertainty in intersubjective relations, thus underpinning both the possibility and scope of intersubjective trust. However, once confidence in the institutional setting is brought into question...

  4. Mass Formulae for Broken Supersymmetry in Curved Space-Time

    CERN Document Server

    Ferrara, Sergio

    2016-01-01

    We derive the mass formulae for ${\\cal N}=1$, $D=4$ matter-coupled Supergravity for broken (and unbroken) Supersymmetry in curved space-time. These formulae are applicable to de Sitter configurations as is the case for inflation. For unbroken Supersymmetry in anti-de Sitter (AdS) one gets the mass relations modified by the AdS curvature. We compute the mass relations both for the potential and its derivative non-vanishing.

  5. Baryon currents in the C-broken phase of QCD

    CERN Document Server

    Lucini, B; Pica, C

    2007-01-01

    In a space with some sufficiently small compact dimension (with non-trivial cycles) and with periodic boundary conditions for the fermions, the charge conjugation (C), spatial parity (P), time reversal (T) and CPT symmetries are spontaneously broken in QCD. We have investigated what are the physical consequences of the breaking of these discrete symmetries, that is what local observables can be used to detect it. We show that the breaking induces the generation of baryon currents, propagating along the compact dimensions.

  6. Exploring trust relationships during times of change

    Directory of Open Access Journals (Sweden)

    Hartmut Von der Ohe

    2010-03-01

    Full Text Available Orientation: In the current economic climate and the resulting fast-changing global business and political environment, trust among different role players in organisations has become critical for survival.Research purpose: The objective of this study was to explore the impact of different variables such as demographics on trust relationships in South African organisations.Motivation for the study: Anecdotal evidence and preliminary data collected for a national trust indicator seemed to suggest a shift in trust levels in organisations.Research design: A trust questionnaire was administered to a convenience sample of 307 respondents in all economic sectors. Parametric and nonparametric analyses were used to determine significant differences among economic sectors, job levels and sample periods.Main findings: No significant differences were found for job levels or the different sample periods. However, significant differences were found for the economic sectors and, specifically, between government participants and other sectors for the dimensions of change, team management, organisational trust, information sharing and credibility.Practical implications: In times of change, leadership in organisations need to be aware of the impact on trust levels. It is therefore important that leaders in government focus more on trust-enhancing behaviours needed to repair mistrust in organisations.Contribution: Although the effect of time on trust levels is inconclusive, the clearly differing levels of trust in various economic sectors point to the importance of appropriate and fitting approaches to building trust and not a ‘one-size-fits-all’ attitude.

  7. Research on Trust Mechanism in Rural Cooperatives

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    The thesis introduces the generation and mechanism of action of trust during cooperation, which indicates that trust can activate the members’ participation in management and investment, and preclude the generation of members’ will and behavior of breach of contract so as to guarantee the stable development of farmers’ cooperatives; the decreasing degree of trust can put sand in the wheels of farmers’ cooperatives. Based on these, we conduct survey of questionnaire on 197 rural households of 10 farmers’ cooperatives in Yanliang, Xi’an, Lintong and Yanglin . By analyzing the generation of trust mechanism and survey data, some suggestions are put forward as follows: promote inner communication; remodel the trust culture of informal system; hew to contractual system; perfect the system of motivation and punishment; establish the system of equal property right and investment; implement management and supervision by job rotation so as to promote the trust degree among the members of farmers’ cooperatives and keep the benign recycle of "trust-cooperation".

  8. Trust dynamics in a large system implementation

    DEFF Research Database (Denmark)

    Schlichter, Bjarne Rerup; Rose, Jeremy

    2013-01-01

    A large information systems implementation (such as Enterprise Resource Planning systems) relies on the trust of its stakeholders to succeed. Such projects impact diverse groups of stakeholders, each with their legitimate interests and expectations. Levels of stakeholder trust can be expected...... outcomes, but largely ignored the dynamics of trust relations. Giddens, as part of his study of modernity, theorises trust dynamics in relation to abstract social systems, though without focusing on information systems. We use Giddens’ concepts to investigate evolving trust relationships in a longitudinal...... to vary in large-scale implementations (which can take several years), and cannot be taken for granted. Previous studies have largely focused on the taxonomic deconstruction of the trust construct, through point-in-time variance studies. They have identified the relationship between trust and project...

  9. The Relationship between Teamwork and Organizational Trust

    Directory of Open Access Journals (Sweden)

    Musab Isik

    2016-01-01

    Full Text Available The aim of this study is to investigate the relationship between teamwork and organizational trust. In the implementation section the data from the survey of 250 workers is employed in call centers in Erzurum by using relevant statistical  methods. Consequently, it is found that there is a positive and significant relationship between teamwork and organizational trust. Thus, the hypothesis of the study is supported as it was expected. Besides, it is found that there are positive and significant relationships between communication, openness to innovation, participation-trust in teamwork and organizational trust, trust in management, trust in co-workers, and trust in workplace.

  10. Ultrasound Won't Help Broken Bones Heal, Expert Panel Says

    Science.gov (United States)

    ... fullstory_163763.html Ultrasound Won't Help Broken Bones Heal, Expert Panel Says Detailed review suggests it's ... LIPUS) -- to help speed the healing of broken bones. But an international panel of experts now says ...

  11. Predators and the public trust.

    Science.gov (United States)

    Treves, Adrian; Chapron, Guillaume; López-Bao, Jose V; Shoemaker, Chase; Goeckner, Apollonia R; Bruskotter, Jeremy T

    2017-02-01

    Many democratic governments recognize a duty to conserve environmental resources, including wild animals, as a public trust for current and future citizens. These public trust principles have informed two centuries of U.S.A. Supreme Court decisions and environmental laws worldwide. Nevertheless numerous populations of large-bodied, mammalian carnivores (predators) were eradicated in the 20th century. Environmental movements and strict legal protections have fostered predator recoveries across the U.S.A. and Europe since the 1970s. Now subnational jurisdictions are regaining management authority from central governments for their predator subpopulations. Will the history of local eradication repeat or will these jurisdictions adopt public trust thinking and their obligation to broad public interests over narrower ones? We review the role of public trust principles in the restoration and preservation of controversial species. In so doing we argue for the essential roles of scientists from many disciplines concerned with biological diversity and its conservation. We look beyond species endangerment to future generations' interests in sustainability, particularly non-consumptive uses. Although our conclusions apply to all wild organisms, we focus on predators because of the particular challenges they pose for government trustees, trust managers, and society. Gray wolves Canis lupus L. deserve particular attention, because detailed information and abundant policy debates across regions have exposed four important challenges for preserving predators in the face of interest group hostility. One challenge is uncertainty and varied interpretations about public trustees' responsibilities for wildlife, which have created a mosaic of policies across jurisdictions. We explore how such mosaics have merits and drawbacks for biodiversity. The other three challenges to conserving wildlife as public trust assets are illuminated by the biology of predators and the interacting

  12. Sinking slowly: Diversity in propensity to trust predicts downward trust spirals in small groups.

    Science.gov (United States)

    Ferguson, Amanda J; Peterson, Randall S

    2015-07-01

    This paper examines the phenomenon of trust spirals in small groups. Drawing on literature on the spiral reinforcement of trust, we theorize that diversity in propensity to trust has affective and cognitive consequences related to trust (i.e., feelings of frustration and perceptions of low similarity), reducing the level of experienced intragroup trust early in a group's development. Reduced experienced trust then fuels relationship conflict and lowers trust even further over time, ultimately having a negative effect on group performance. These ideas are tested using a sample of MBA student groups surveyed at 3 time periods over 4 months. Results confirm our hypothesis that diversity in propensity to trust is sufficient to trigger a downward trust spiral and poor performance in small groups.

  13. Public knowledge and public trust.

    Science.gov (United States)

    Cunningham-Burley, Sarah

    2006-01-01

    As health care applications derived from human genetics research are likely to move increasingly from 'clinic to community', there is growing interest not just in how patients understand and take up health-related genetic information but also in the views of the wider population, as well as a range of professional groups. In this paper, issues relating public knowledge and public trust are raised and discussed in an attempt to move forward debates about public involvement in genomic research and the role of sociologists within interdisciplinary teams. As the field of public understanding of science has developed, we have seen a shift from a focus on the lack of scientific literacy as problem to a recognition of the range of different knowledges that people have and use as they confront science and technology in their everyday lives. As a mood for dialogue pervades many institutions in their relations with 'publics', attention must now be paid to the way in which knowledge and expertise is expressed, heard and acted upon in dialogic encounters. There is increasing concern about public trust in science and calls to increase public confidence, particularly through more open engagement with a range of publics. However, lack of trust or loss of confidence may be constructed as problems rather than reflecting empirical reality, where more complex relationships and attitudes prevail. Lack of trust is often privatized, deeply rooted in lived experience and routinely managed. Trust relations are generally characterized by ambivalence, uncertainty and risk, and are always provisional. Drawing on selected literature and empirical research to review and illustrate this field, this paper argues that scepticism or ambivalence on the part of publics are not necessarily problems to be overcome in the interest of scientific progress, but rather should be mobilized to enhance open and public debates about the nature and direction of genomics research, medicine, and the related

  14. Dimensionality of trust: An analysis of the relations between propensity, trustworthiness and trust

    Directory of Open Access Journals (Sweden)

    Marita Heyns

    2015-02-01

    Full Text Available Orientation: Research concerning trust relationships on the interpersonal level, particularly when studied in dyadic relationships from the follower’s point of view, is relatively scarce. Only a few researchers have attempted to link multiple dimensions of trust in the same study.Research purpose: This study examined the dynamic interplay between trust propensity, trustworthiness beliefs and the decision to trust, as perceived within dyadic workplace relationships. Motivation for the study: No studies, as far as the authors are aware, have ever attempted to use a combination of Mayer and Davis’s well-known assessment of trustworthiness and Gillespie’s measure of behavioural trust within the same study. By including measures of main antecedents and the actual decision to trust in the same study, the multidimensionality of trust can be established more concretely.Research approach, design and method: A cross-sectional survey design with a convenience sample (N = 539 was used. The Behavioural Trust Inventory and the Organisational Trust Instrument were administered.Main findings: Results confirmed the distinctness of propensity, trustworthiness and trust as separate main constructs. Trust was strongly associated with trustworthiness beliefs. Trustworthiness beliefs fully mediated the relationship between propensity and trust. The observed relations between propensity and trustworthiness suggest that individuals with a natural predisposition to trust others will be more inclined to perceive a specific trust referent as trustworthy.Practical/managerial implications: Leaders should realise that their attitudes and behaviour have a decisive impact on trust formation processes: if they are being perceived as trustworthy, followers will be likely to respond by engaging in trusting behaviours towards them. Tools to assess followers’ perceptions of the trustworthiness of the leader may provide useful feedback that can guide leaders

  15. Strategies for building trust with farmers: the case of Bt maize in South Africa

    Directory of Open Access Journals (Sweden)

    Ezezika Obidimma C

    2012-11-01

    Full Text Available Abstract Background In 1999, South Africa became the first African country to approve commercial production of subsistence genetically modified (GM maize. The introduction of GM crop technology is often met with skepticism by stakeholders including farmers. The involvement of the private sector in this process can further breed mistrust or misperceptions. To examine these issues more closely, the objective of this case study was to understand the role of trust in the public-private partnership (PPP arrangement involved in the development of Bacillus thuringiensis (Bt maize in South Africa. Methods We conducted semi-structured, face-to-face interviews to obtain stakeholders’ understanding of trust in general as well as in the context of agricultural biotechnology (agbiotech PPPs. A thematic analysis of the interview transcripts, documents, reports and research articles was conducted to generate insights into the challenges to, and practices for, building trust among the partners and with the public. Results The findings of this study are organized into four main lessons on trust building. First, as the end users of GM technology, farmers must be engaged from the start of the project through field demonstrations and educational activities. Second, an effective technology (i.e., the seed is key to the success of an agbiotech PPP. Third, open communication and full disclosure between private sector companies and government regulatory bodies will build trust and facilitate the regulatory processes. Fourth, enforcing good agronomic practices, including appropriate management of the refuge areas, will serve the interests of both the farmers and the seed companies. Conclusions Trust has proven to be a critical factor determining the success of the Bt maize project in South Africa. Distrust of the private sector and of GM technology were cited as major barriers to building trust. The trust-building practices described in this case study have often

  16. Multilevel Contracts for Trusted Components

    CERN Document Server

    Messabihi, Mohamed; Attiogbé, Christian; 10.4204/EPTCS.37.6

    2010-01-01

    This article contributes to the design and the verification of trusted components and services. The contracts are declined at several levels to cover then different facets, such as component consistency, compatibility or correctness. The article introduces multilevel contracts and a design+verification process for handling and analysing these contracts in component models. The approach is implemented with the COSTO platform that supports the Kmelia component model. A case study illustrates the overall approach.

  17. Calibration of Trust and Distrust

    Science.gov (United States)

    2016-06-07

    entrenched beliefs and behaviours, regardless of whether they are positive or negative ( Deutsch , 1973). Any proclivity toward either an exaggerated...Trust in Organizations: Frontiers of Theory and Research (pp. 246-260). Thousand Oaks, CA: Sage Publications. DEUTSCH , M. (1973). The...Bunker, B., & Rubin, J. (Eds.). Conflict, cooperation, and justice: Essays inspired by the work of Morton Deutsch . (pp.133-173). San Francisco, CA, US

  18. H-Trust:A Group Trust Management System for Peer-to-Peer Desktop Grid

    Institute of Scientific and Technical Information of China (English)

    Huanyu Zhao; Xiaolin Li

    2009-01-01

    Peer-to-Peer Desktop Grid(P2PDG)has emerged as a pervasive cyber-infrastructure tackling many largescale applications with high impacts.As a burgeoning research area,P2PDG can support numerous applications,including scientific computing,file sharing,web services,and virtual organization for collaborative activities and projects.To handle trustworthiness issues of these services.trust and reputation schemes are proposed to establish trust among peers in P2PDG.In this paper,we propose a robust group trust management system,called H-Trust,inspired by the H-index aggregation technique.Leveraging the robustness of the H-index algorithm under incomplete and uncertain circumstances.H-Trust offers a robust personalized reputation evaluation mechanism for both individual and group trusts with minimal communication and computation overheads.We present the H-Trust scheme in five phases,including trust recording,local trust evaluation,trust query phase,spatiai-temporal update phase,and group reputation evaluation phases.The rationale for its design,the analysis of the algorithm are further investigated.To validate the performance of H-Trust scheme.we designed the H-Trust simulator HTrust-Sim to conduct multi-agent-based simulations.Simulation results demonstrate that H-Trust is robust and can identify and isolate malicious peers in large scale systems even when a large portion of peers are malicious.

  19. From the general to the specific: How social trust motivates relational trust.

    Science.gov (United States)

    Robbins, Blaine G

    2016-01-01

    When people form beliefs about the trustworthiness of others with respect to particular matters (i.e., when individuals trust), theory suggests that they rely on preexistent cognitive schemas regarding the general cooperativeness of individuals and organizations (i.e., social trust). In spite of prior work, the impact of social trust on relational trust-or what Russell Hardin (2002) calls trust as a three-part relation where actor A trusts actor B with reference to matter Y-is not well established. Four vignette experiments were administered to Amazon.com Mechanical Turk workers (N = 1388 and N = 1419) and to public university undergraduate students (N = 995 and N = 956) in order to investigate the relationship between social trust and relational trust. Measures of general social trust and particular social trust produced statistically equivalent effects that were positively associated with relational trust. Political trust, however, was statistically unrelated to relational trust. These results support the idea that people rely on schemas and stereotypes concerned with the general cooperativeness and helpfulness of others when forming beliefs about another person's trustworthiness with respect to a particular matter at hand.

  20. Trust me, I'm a researcher!: The role of trust in biomedical research.

    Science.gov (United States)

    Kerasidou, Angeliki

    2017-03-01

    In biomedical research lack of trust is seen as a great threat that can severely jeopardise the whole biomedical research enterprise. Practices, such as informed consent, and also the administrative and regulatory oversight of research in the form of research ethics committees and Institutional Review Boards, are established to ensure the protection of future research subjects and, at the same time, restore public trust in biomedical research. Empirical research also testifies to the role of trust as one of the decisive factors in research participation and lack of trust as a barrier for consenting to research. However, what is often missing is a clear definition of trust. This paper seeks to address this gap. It starts with a conceptual analysis of the term trust. It compares trust with two other related terms, those of reliance and trustworthiness, and offers a defence of Baier's attribute of 'good will' a basic characteristic of trust. It, then, proceeds to consider trust in the context of biomedical research by examining two questions: First, is trust necessary in biomedical research?; and second, do increases in regulatory oversight of biomedical research also increase trust in the field? This paper argues that regulatory oversight is important for increasing reliance in biomedical research, but it does not improve trust, which remains important for biomedical research. It finishes by pointing at professional integrity as a way of promoting trust and trustworthiness in this field.

  1. Trusted Routing Based on Dynamic Trust Mechanism in Mobile Ad-Hoc Networks

    Science.gov (United States)

    Peng, Sancheng; Jia, Weijia; Wang, Guojun; Wu, Jie; Guo, Minyi

    Due to the distributed nature, mobile ad-hoc networks (MANETs) are vulnerable to various attacks, resulting in distrusted communications. To achieve trusted communications, it is important to build trusted routes in routing algorithms in a self-organizing and decentralized fashion. This paper proposes a trusted routing to locate and to preserve trusted routes in MANETs. Instead of using a hard security mechanism, we employ a new dynamic trust mechanism based on multiple constraints and collaborative filtering. The dynamic trust mechanism can effectively evaluate the trust and obtain the precise trust value among nodes, and can also be integrated into existing routing protocols for MANETs, such as ad hoc on-demand distance vector routing (AODV) and dynamic source routing (DSR). As an example, we present a trusted routing protocol, based on dynamic trust mechanism, by extending DSR, in which a node makes a routing decision based on the trust values on its neighboring nodes, and finally, establish a trusted route through the trust values of the nodes along the route in MANETs. The effectiveness of our approach is validated through extensive simulations.

  2. Massive Kaluza-Klein theories and their spontaneously broken symmetries

    Energy Technology Data Exchange (ETDEWEB)

    Hohm, O.

    2006-07-15

    In this thesis we investigate the effective actions for massive Kaluza-Klein states, focusing on the massive modes of spin-3/2 and spin-2 fields. To this end we determine the spontaneously broken gauge symmetries associated to these 'higher-spin' states and construct the unbroken phase of the Kaluza-Klein theory. We show that for the particular background AdS{sub 3} x S{sup 3} x S{sup 3} a consistent coupling of the first massive spin-3/2 multiplet requires an enhancement of local supersymmetry, which in turn will be partially broken in the Kaluza-Klein vacuum. The corresponding action is constructed as a gauged maximal supergravity in D=3. Subsequently, the symmetries underlying an infinite tower of massive spin-2 states are analyzed in case of a Kaluza-Klein compactification of four-dimensional gravity to D=3. It is shown that the resulting gravity-spin-2 theory is given by a Chern-Simons action of an affine algebra and also allows a geometrical interpretation in terms of 'algebra-valued' differential geometry. The global symmetry group is determined, which contains an affine extension of the Ehlers group. We show that the broken phase can in turn be constructed via gauging a certain subgroup of the global symmetry group. Finally, deformations of the Kaluza-Klein theory on AdS{sub 3} x S{sup 3} x S{sup 3} and the corresponding symmetry breakings are analyzed as possible applications for the AdS/CFT correspondence. (Orig.)

  3. General broken lines as advanced track fitting method

    Energy Technology Data Exchange (ETDEWEB)

    Kleinwort, Claus

    2012-01-15

    In HEP experiments the description of the trajectory of a charged particle is obtained from a fit to measurements in tracking detectors. The parametrization of the trajectory has to account for bending in the magnetic field, energy loss and multiple scattering in the detector material. General broken lines implement a track model with proper description of multiple scattering leading to linear equations with a special structure of the corresponding matrix allowing for a fast solution with the computing time depending linearly on the number of measurements. The calculation of the full covariance matrix along the trajectory enables the application to track based alignment and calibration of large detectors with global methods. (orig.)

  4. Tuning the cosmological constant, broken scale invariance, unitarity

    Energy Technology Data Exchange (ETDEWEB)

    Förste, Stefan; Manz, Paul [Bethe Center for Theoretical Physics,Nussallee 12, 53115 Bonn (Germany); Physikalisches Institut der Universität Bonn,Nussallee 12, 53115 Bonn (Germany)

    2016-06-10

    We study gravity coupled to a cosmological constant and a scale but not conformally invariant sector. In Minkowski vacuum, scale invariance is spontaneously broken. We consider small fluctuations around the Minkowski vacuum. At the linearised level we find that the trace of metric perturbations receives a positive or negative mass squared contribution. However, only for the Fierz-Pauli combination the theory is free of ghosts. The mass term for the trace of metric perturbations can be cancelled by explicitly breaking scale invariance. This reintroduces fine-tuning. Models based on four form field strength show similarities with explicit scale symmetry breaking due to quantisation conditions.

  5. Mass formulae for broken supersymmetry in curved space-time

    Energy Technology Data Exchange (ETDEWEB)

    Ferrara, Sergio [Theoretical Physics Department, CERN, Geneva (Switzerland); INFN - Laboratori Nazionali di Frascati, Frascati (Italy); Department of Physics and Astronomy, U.C.L.A, Los Angeles, CA (United States); Proeyen, Antoine van [KU Leuven, Institute for Theoretical Physics, Leuven (Belgium)

    2016-11-15

    We derive the mass formulae for N = 1, D = 4 matter-coupled Supergravity for broken (and unbroken) Supersymmetry in curved space-time. These formulae are applicable to De Sitter configurations as is the case for inflation. For unbroken Supersymmetry in anti-de Sitter (AdS) one gets the mass relations modified by the AdS curvature. We compute the mass relations both for the potential and its derivative non-vanishing. (copyright 2016 WILEY-VCH Verlag GmbH and Co. KGaA, Weinheim)

  6. The Small Step toward Asymmetry: Aesthetic Judgment of Broken Symmetries

    Directory of Open Access Journals (Sweden)

    Andreas Gartus

    2013-08-01

    Full Text Available Symmetry and complexity both affect the aesthetic judgment of abstract patterns. However, although beauty tends to be associated with symmetry, there are indications that small asymmetries can also be beautiful. We investigated the influence of small deviations from symmetry on people's aesthetic liking for abstract patterns. Breaking symmetry not only decreased patterns' symmetry but also increased their complexity. While an increase of complexity normally results in a higher liking, we found that even a small decrease of symmetry has a strong effect, such that patterns with slightly broken symmetries were significantly less liked than fully symmetric ones.

  7. Raman amplification in the broken-wave regime

    CERN Document Server

    Farmer, John P

    2015-01-01

    In regimes far beyond the wavebreaking theshold of Raman amplification, we show that significant amplifcation can occur after the onset of wavebreaking, before phase mixing destroys the coupling between pump and probe. The amplification efficiency in this regime is therefore strongly dependent on the energy-transfer rate when wavebreaking occurs, and is, as such, sensitive to both the probe amplitude and profile. In order to access the higher-efficiency broken-wave regime, a short, intense probe is required. Parameter scans show the marked difference in behaviour compared to below wavebreaking, where longer, more energetic pulses lead to improved efficiencies.

  8. Broken current anomalous dimensions, conformal manifolds and RG flows

    CERN Document Server

    Bashmakov, Vladimir; Raj, Himanshu

    2016-01-01

    We consider deformations of a conformal field theory explicitly breaking some global symmetries of the theory, addressing both cases of marginal and relevant deformations. Exploiting the constraints put by conformal symmetry, we compute anomalous dimensions of broken currents. Our analysis is done using field theory techniques and also holographic ones, where necessary. Field theoretical methods suffice to discuss e.g. symmetry-breaking deformations of the $O(N )$ model in $d=4-\\epsilon$ dimensions. Holography is instrumental, instead, to compute current anomalous dimensions in $\\beta$-deformed superconformal field theories, and in a class of $N = 1$ RG flows at large 't Hooft coupling.

  9. Trust in a Time of Increasing Diversity

    DEFF Research Database (Denmark)

    Dinesen, Peter Thisted; Sønderskov, Kim Mannemar

    2012-01-01

    In this study, we examine the impact of ethnic diversity in Danish municipalities on citizens’ social trust over the last three decades. During this period, Danish society has grown increasingly ethnically diverse, and this begs the question whether this has influenced trust in others negatively....... Existing evidence from the Anglo-Saxon countries would suggest that this is the case, whereas evidence from the European continent mainly suggests that no link exists between ethnic diversity and social trust. The empirical analysis uses individual-level data on social trust from several surveys in Denmark...... in the period from 1979 to 2009 coupled with diversity at the municipality level. Individual-level measures of trust over time enable us to estimate the impact on social trust of changes in ethnic diversity within municipalities and, we argue, thereby obtain a more precise estimate of the effect of ethnic...

  10. Explaining the emergence of social trust

    DEFF Research Database (Denmark)

    Svendsen, Gunnar Lind Haase; Tinggaard Svendsen, Gert; Graeff, Peter

    2012-01-01

    How does social trust emerge in a country? By comparing the cases of Denmark and Germany through six historical phases, we suggest that a plausible explanation is long run political stability. In Denmark, social trust was arguably allowed to accumulate slowly over time and was probably not destro...... not destroyed up till the universal welfare state of the 20th century. In Germany, however, political instability since the first German state building hampered the emergence and maintenance of social trust, which is why social trust was never allowed to grow in this country.......How does social trust emerge in a country? By comparing the cases of Denmark and Germany through six historical phases, we suggest that a plausible explanation is long run political stability. In Denmark, social trust was arguably allowed to accumulate slowly over time and was probably...

  11. A New Kind of Subjective Trust Model

    Institute of Scientific and Technical Information of China (English)

    ZHANG Guangwei; KANG Jianchu; LUO Ziqiang; MENG Xiangyi; FANG Peici; LI Deyi

    2006-01-01

    Based on the outstanding characteristics of Cloud Model on the process of transforming a qualitative concept to a set of quantitative numerical values, a formalized model of subjective trust is introduced by which we can transform between qualitative reputation and quantitative voting data. The present paper brings forward algorithms to compute direct trust and recommender trust. Further more, an effective similarity measuring method used to distinguish two users'reputation on knowledge level is also proposed. The given model properly settles the uncertainty and fuzziness properties of subjective trust which is always the weakness of traditional subjective trust model, and provides a step in the direction of proper understanding and definition of human trust.

  12. The Value of Trust to Nursing.

    Science.gov (United States)

    Rutherford, Marcella M

    2014-01-01

    Trust, one of nursing's intangible assets, impacts nurses' ability to form meaningful relationships with patients and this connection positively impacts health outcomes. Linking trust to the fabric of nursing and investing in its measurement will become essential to nursing's valuation and the resulting investment in nursing. Trust, as nursing's core value, should be fostered by nurse educators as they prepare the next generation of nurses. Nurse administrators should connect the trust a patient has for his or her nurse and patient cooperation and honest transparent communication between providers and the patient. Banking trust as a valuable nursing asset will substantiate nursing's marketing and support its worth. Nursing's trustworthiness is an intangible asset that warrants protection, as trust once lost is hard to recapture.

  13. An adaptive trust region method and its convergence

    Institute of Scientific and Technical Information of China (English)

    ZHANG; Xiangsun(章祥荪); ZHANG; Juliang(张菊亮); LIAO; Lizhi(廖立志)

    2002-01-01

    In this paper, a new trust region subproblem is proposed. The trust radius in the new subproblem adjusts itself adaptively. As a result, an adaptive trust region method is constructed based on the new trust region subproblem. The local and global convergence results of the adaptive trust region method are proved.Numerical results indicate that the new method is very efficient.

  14. Trust and its Relationship to Demographic Factors

    Directory of Open Access Journals (Sweden)

    Asghar Mirfardi

    2011-01-01

    Full Text Available Problem statement: Social trust is the main theme in the social life. Trust is “the expectation that arises within a community of regular, honest and cooperative behavior, based on commonly shared norms”. Development, social trust and security are intertwined categories and have interaction to each other. Social trust, as a main factor in social capital, provide social context for developmental programs. This study, examine the affect of Demographic factors on the social trust to others. As social trust is a key factor in social relationship, this study is needed to evaluate such factor according to demographic factors. Approach: This study has been done on existing data about Iranian values and attitudes. Some factors such as gender, age, education level, job situation, marital situation have been studied in this study. Some of these variables such as education, correspondence to development level, especially in social development. This study is done via documental method (archive and Documental data about mentioned themes and second analysis of The Iranian National Values and attitudes Survey (2000. Results: Findings of this study indicated that there is significant relationship between all of independent variables (Gender, age, education level, job situation, marital situation and social trust to families and relatives, there is significant relationship between variables such as gender, education level, job situation, marital situation (independent variables and social trust to friends. Analyzing the data showed that, the residents of less and more developed cities have different situation in trust. Conclusion/Recommendations: This study introduces three types of trust upon the development level of societies. Trust in Iran is an example of trust structure in developing societies.

  15. Effects of Cognitive Load on Trust

    Science.gov (United States)

    2013-10-01

    dynamically by the fluctuation in cognitive load. AOARD-12-4076 Effects of Cognitive Load on Trust 10 Figure 1: Proposed conceptual model of trust...that multiple methods of cognitive load measurement are available, in particular, recordings of participants’ speech and language and logged keystrokes ...J. B., & Stokes, C. K. (2010). Exploring a dynamic model of trust management. A white paper by Air Force Research Laboratory. Marcus, N., Cooper, M

  16. Representing Trust in Cognitive Social Simulations

    Science.gov (United States)

    Pollock, Shawn S.; Alt, Jonathan K.; Darken, Christian J.

    Trust plays a critical role in communications, strength of relationships, and information processing at the individual and group level. Cognitive social simulations show promise in providing an experimental platform for the examination of social phenomena such as trust formation. This paper describes the initial attempts at representation of trust in a cognitive social simulation using reinforcement learning algorithms centered around a cooperative Public Commodity game within a dynamic social network.

  17. Trust Authentication Protocol on the Web

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    It is unsuitable to use traditional identity-based authentication on the Web where entities are not foreknown to each other. Trust relationship must be established between strangers before authentication. To achieve trust authentication, the resource-constrained trust negotiation is addressed, and traditional authentication key exchange protocol is extended. Owing to avoiding the heavy computational demands the public key cryptography operations bring about, the authentication protocol is well-suited for security authentication on the Web.

  18. Assessing Interpersonal Trust in Networked Teams

    Science.gov (United States)

    2012-07-01

    John Mathieu, Stacey Connaughton, Kurt Kraiger, Joyce Osland, and Joan Rentsch). v ASSESSING INTERPERSONAL TRUST IN NETWORKED TEAMS...in Robinson , Shaver, & Wrightsman, 1991, pp. 393–396] and Tolerance for Ambiguity (adapted from Budner, 1962). Propensity to Trust was assessed by...An integrative model of organizational trust. Academy of Management Review, 20(3), 709-734. Robinson , J. P., Shaver, P. R., & Wrightsman, L. S

  19. Information Hiding based Trusted Computing System Design

    Science.gov (United States)

    2014-07-18

    and the environment where the system operates (electrical network frequency signals), and how to improve the trust in a wireless sensor network with...the system (silicon PUF) and the environment where the system operates (ENF signals). We also study how to improve the trust in a wireless sensor...Harbin Institute of Technology, Shenzhen , China, May 26, 2013. (Host: Prof. Aijiao Cui) 13) “Designing Trusted Energy-Efficient Circuits and Systems

  20. A LINE SEARCH AND TRUST REGION ALGORITHM WITH TRUST REGION RADIUS CONVERGING TO ZERO

    Institute of Scientific and Technical Information of China (English)

    Jin-yan Fan; Wen-bao Ai; Qun-ying Zhang

    2004-01-01

    In this paper, we present a new line search and trust region algorithm for unconstrained optimization problem with the trust region radius converging to zero. The new trust region algorithm performs a backtracking line search from the failed. Point instead of resolving the subproblem when the trial step results in an increase in the objective function. We show that the algorithm preserves the convergence properties of the traditional trust region algorithms. Numerical results are also given.

  1. Trust and Privacy in Our Networked World

    Directory of Open Access Journals (Sweden)

    Herman T. Tavani

    2011-10-01

    Full Text Available Remarking on the relationship between the concepts of trust and privacy, Charles Fried (1990, p. 56 [1] writes: Trust is the attitude of expectation that another will behave according to the constraints of morality… There can be no trust where there is no possibility of error. More specifically, man cannot know that he is trusted unless he has the right to act without constant surveillance so that he knows he can betray the trust. Privacy confers that essential right… Without privacy and the possibility of error which it protects that aspect of his humanity is denied to him. The important relationship between trust and privacy that Fried describes is often overlooked in the contemporary literature on privacy, as well in the recent publications that focus on trust and trust-related topics. The six essays included in this special issue of Information, however, give us some additional insights into certain conceptual and practical connections involving the notions of trust and privacy. In this respect, the contributing authors expand upon the insight in Fried’s classic work on the interconnection between the two concepts.[...

  2. Playing Attack and Defense with Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe; Bouganim, Luc

    2014-01-01

    It is often convenient to assume in a data management platform that one or several computing devices are trusted, specially when the goal is to provide privacy guarantees over personal data. But what does it take for a computing device to be trusted? More specifically, how can a personal device...... provide trusted storage? This is the question we tackle in this demonstration. We describe how secure devices, equipped with a trusted execution environment, differ from general purpose devices. We illustrate with our demonstration scenario, that it is much more difficult to attack a storage service...... running on a secure device, than to attack the same service running on a general purpose device....

  3. A mobile and portable trusted computing platform

    Directory of Open Access Journals (Sweden)

    Nepal Surya

    2011-01-01

    Full Text Available Abstract The mechanism of establishing trust in a computing platform is tightly coupled with the characteristics of a specific machine. This limits the portability and mobility of trust as demanded by many emerging applications that go beyond the organizational boundaries. In order to address this problem, we propose a mobile and portable trusted computing platform in a form of a USB device. First, we describe the design and implementation of the hardware and software architectures of the device. We then demonstrate the capabilities of the proposed device by developing a trusted application.

  4. Assessing User Trust to Improve Web Usability

    Directory of Open Access Journals (Sweden)

    Punam Bedi

    2006-01-01

    Full Text Available The technological advancement has significantly influenced the style of human-computer interaction, especially for World Wide Web. The users can now afford to choose amongst multiple websites offering similar services. The website which provides a usable interface along with requisite services, scores over its competitors. User interaction with a website is driven by two major factors- the performance factors associated with the site and the emotional factors associated with human being. Amongst the emotional factors, trust is a dominant driving factor of web usage. The more a user trusts a website, more shall be the usage and vice-versa. Trust has almost always been specified qualitatively. This study presents a distinct method of measuring user trust on a website, by considering the features of that website. Four distinct states of a feature are considered in the study. Each of these states has a different impact on user trust formation. The method proposed considers the features, their states and their contribution towards trust formation to compute the user trust on a website. Such a measure can be effectively employed to determine the trust level of a website as perceived by its users. Comparison of different websites with respect to their trust levels can therefore, provide the designer an insight into the weak features of that site. Identifying and correcting these, can help in retaining the users and hence increase the usability of that site.

  5. On Propagating Interpersonal Trust in Social Networks

    Science.gov (United States)

    Ziegler, Cai-Nicolas

    The age of information glut has fostered the proliferation of data and documents on the Web, created by man and machine alike. Hence, there is an enormous wealth of minable knowledge that is yet to be extracted, in particular, on the Semantic Web. However, besides understanding information stated by subjects, knowing about their credibility becomes equally crucial. Hence, trust and trust metrics, conceived as computational means to evaluate trust relationships between individuals, come into play. Our major contribution to Semantic Web trust management through this work is twofold. First, we introduce a classification scheme for trust metrics along various axes and discuss advantages and drawbacks of existing approaches for Semantic Web scenarios. Hereby, we devise an advocacy for local group trust metrics, guiding us to the second part, which presents Appleseed, our novel proposal for local group trust computation. Compelling in its simplicity, Appleseed borrows many ideas from spreading activation models in psychology and relates their concepts to trust evaluation in an intuitive fashion. Moreover, we provide extensions for the Appleseed nucleus that make our trust metric handle distrust statements.

  6. Does Religiosity Promote or Discourage Social Trust?

    DEFF Research Database (Denmark)

    Berggren, Niclas; Bjørnskov, Christian

    We look at the effect of religiosity on social trust, defined as the share of a population that thinks that people in general can be trusted. This is important since social trust is related to many desired outcomes, such as growth, education, democratic stability and subjective well...... countries and the U.S. states, measuring religiosity by the share of the population that answers yes to the question "Is religion an important part of your daily life?". Our empirical results, making use of regression analysis whereby we control for other possible determinants of social trust and, by using...

  7. Explaining the emergence of social trust

    DEFF Research Database (Denmark)

    Svendsen, Gunnar Lind Haase; Svendsen, Gert Tinggaard; Graeff, Peter

    2012-01-01

    How does social trust emerge in a country? By comparing the cases of Denmark and Germany through six historical phases, we suggest that a plausible explanation is long run political stability. In Denmark, social trust was arguably allowed to accumulate slowly over time and was probably...... not destroyed up till the universal welfare state of the 20th century. In Germany, however, political instability since the first German state building hampered the emergence and maintenance of social trust, which is why social trust was never allowed to grow in this country....

  8. History-based trust negotiation model

    Institute of Scientific and Technical Information of China (English)

    ZHAO Yi-zhu; ZHAO Yan-hua; LU Hong-wei

    2009-01-01

    Trust negotiation (TN) is an approach to establish trust between strangers through iterative disclosure of digital credentials. Speeding up subsequent negotiations between the same negotiators is a problem worth of research. This paper introduces the concept of visiting card, and presents a history-based trust negotiation (HBTN) model. HBTN creates an account for a counterpart at the first negotiation and records valid credentials that the counterpart disclosed during each trust negotiation in his historical information base (HIB). For the following negotiation, no more credentials need to be disclosed for both parties. HBTN speeds up subsequent negotiations between the entities that interact with each other frequently without impairing the privacy preservation.

  9. Does Education Lead to Higher Generalized Trust?

    DEFF Research Database (Denmark)

    Charron, Nicholas; Rothstein, Bo

    2016-01-01

    Generalized trust has become a prominent concept at the nexus of several disciplines, and the wide differences in trust between different societies continue to puzzle the social sciences. In this study, we explore the effects of micro and macro level factors in explaining an individual's propensity...... to ‘trust others'. We hypothesize that higher levels of education will lead to higher social trust in individuals, given that the context (country or regions within countries) in which they reside has a sufficiently impartial and non-corrupt institutional setting. However, the positive effect of education...

  10. Mass spectra in softly broken ${\\cal N}=2$ SQCD

    CERN Document Server

    Chernyak, Victor L

    2016-01-01

    Considered is ${\\cal N}=2\\,\\, SU(N_c)$ or $U(N_c)$ SQCD with $N_c+1broken down to ${\\cal N}=1$ by the mass term $\\mu_{\\rm x}{\\rm Tr} (X^2)$ of colored adjoint scalar partners of gluons, $\\mu_{\\rm x}\\ll\\Lambda_2$ ( $\\Lambda_2$ is the scale factor of the $SU(N_c)$ gauge coupling). There is a large number of different types of vacua in this theory with both unbroken and spontaneously broken global flavor symmetry $U(N_F)\\rightarrow U({\\rm n}_1)\\times U({\\rm n}_2)$. We consider in this paper the large subset of these vacua with the unbroken nontrivial $Z_{2N_c-N_F\\geq 2}$ discrete symmetry, at different hierarchies between the Lagrangian parameters $m\\gtrless\\Lambda_2,\\, \\mu_{\\rm x}\\gtrless m$. The forms of low energy Lagrangians, quantum numbers of light particles and mass spectra are described for all these vacua. Our results differ from corresponding results in recent papers arXiv:1304.0822; 1403.60...

  11. Soflty broken supersymmetry and the fine-tuning problem

    Energy Technology Data Exchange (ETDEWEB)

    Foda, O.E.

    1984-02-20

    The supersymmetry of the simple Wess-Zumino model is broken, in the tree-approximation, by adding all possible parity-even(mass)-dimension 2 and 3 terms. The model is then renormalized using BPHZ and the normal product algorithm, such that supersymmetry is only softly broken (in the original sense of Schroer and Symanzik). We show that, within the above renormalization scheme, none of the added breaking terms give rise to technical fine-tuning problems (defined in the sense of Gildener) in larger models, with scalar multiplets and hierarchy of mass scales, which is in contrast to what we obtain via analytic schemes such as dimensional renormalization, or supersymmetry extension of which. The discrepancy (which can be shown to persist in more general models) originates in the inherent local ambiguity in the finite parts of subtracted Feynman integrals. Emphasizing that the issue is purely technical (as opposed to physical) in origin, and that all physical properties are scheme-independent (as they should be), we conclude that the technical fine-tuning problem, in the specific sense used in this paper, being scheme dependent, is not a well-defined issue within the context of renormalized perturbation theory. 30 references.

  12. Banishment in Public Housing: Testing an Evolution of Broken Windows

    Directory of Open Access Journals (Sweden)

    Jose Torres

    2016-10-01

    Full Text Available Banishment policies grant police the authority to formally ban individuals from entering public housing and arrest them for trespassing if they violate the ban. Despite its widespread use and the social consequences resulting from it, an empirical evaluation of the effectiveness of banishment has not been performed. Understanding banishment enforcement is an evolution of broken windows policing, this study explores how effective bans are at reducing crime in public housing. We analyze crime data, spanning the years 2001–2012, from six public housing communities and 13 surrounding communities in one southeastern U.S. city. Using Arellano-Bond dynamic panel models, we investigate whether or not issuing bans predicts reductions in property and violent crimes as well as increases in drug and trespass arrests in public housing. We find that this brand of broken windows policing does reduce crime, albeit relatively small reductions and only for property crime, while resulting in an increase in trespass arrests. Given our findings that these policies have only a modest impact on property crime, yet produce relatively larger increases in arrests for minor offenses in communities of color, and ultimately have no significant impact on violent crime, it will be important for police, communities, and policy makers to discuss whether the returns are worth the potential costs.

  13. Classification of Broken Rice Kernels using 12D Features

    Directory of Open Access Journals (Sweden)

    SUNDER ALI KHOWAJA

    2016-07-01

    Full Text Available Integrating the technological aspect for assessment of rice quality is very much needed for the Asian markets where rice is one of the major exports. Methods based on image analysis has been proposed for automated quality assessment by taking into account some of the textural features. These features are good at classifying when rice grains are scanned in controlled environment but it is not suitable for practical implementation. Rice grains are placed randomly on the scanner which neither maintains the uniformity in intensity regions nor the placement strategy is kept ideal thus resulting in false classification of grains. The aim of this research is to propose a method for extracting set of features which can overcome the said issues. This paper uses morphological features along-with gray level and Hough transform based features to overcome the false classification in the existing methods. RBF (Radial Basis function is used as a classification mechanism to classify between complete grains and broken grains. Furthermore the broken grains are classified into two classes? i.e. acceptable grains and non-acceptable grains. This research also uses image enhancement technique prior to the feature extraction and classification process based on top-hat transformation. The proposed method has been simulated in MATLAB to visually analyze and validate the results.

  14. Evidence of Broken Reciprocity in Chiral Liquid Crystals

    Science.gov (United States)

    Moreira, Michele; Venkataraman, Nithya; Taheri, Bahman; Palffy-Muhoray, Peter

    2008-03-01

    Reciprocity in light scattering is predicated on bounded scattering media with symmetric and linear permittivity, conductivity and permeability. Due to their anisotropy and chirality, cholesteric liquid crystal form periodic dielectric structures. If the periodicity is comparable to the wavelength of light, these phases are self-assembled photonic band gap structures. There appear in the permittivity odd powers of the wave vector resulting from nonlocality and broken inversion symmetry. Evidence of non-reciprocity has been found in optically active crystals by Bennett [1] and in stacks of cholesteric and nematic liquid crystal cells by Takezoe [2]. We present experimental data showing broken reciprocity in transmittance and reflectance in cholesteric cells with different pitches having overlapping but distinct reflection bands. We explain our results in terms of simple analytic descriptions of material properties and propagating modes. [1] P.J. Bennett, S. Dhanjal, Yu. P. Svirko and N. I. Zheludev, Opt. Lett. 21, 1955 (1996) [2] J. Hwang; M.H. Song; B. Park; S. Nishimura; T. Toyooka; J.W. Wu; Y. Takanishi; K. Ishikawa; H. Takezoe, Nat. Mat. 4, 383 (2005).

  15. Water-resisting ability of cemented broken rocks

    Institute of Scientific and Technical Information of China (English)

    Yu Bangyong; Chen Zhanqing; Yu Linli

    2016-01-01

    Using the self-designed testing system, the seepage tests for cemented broken rocks were conducted, and the impact of different factors on water-resisting ability was analyzed. The results show that (1) seepage process of the cemented broken rocks can be divided into two categories:in one category, seepage insta-bility occurs after a period of time, in the other, the permeability decreases slowly and tends to be stable, and seepage instability does not occur;(2) cementing performance of cementing agent and grain size dis-tribution are the decisive factors for water-resisting ability, with the increase of cementing performance and the mass percentage of large grains, the water-resisting ability of the specimen strengthens; (3) aggregate type has little effect on seepage stability, for the specimens with different aggregate types, the permeability and the duration of seepage instability have small difference; (4) initial porosity has a certain effect on the water-resisting ability of the specimen, but has no decisive role. With the increase of the initial porosity, the duration of seepage instability decreases.

  16. Exploring the Change from Low-Trust to High-Trust Organizations

    DEFF Research Database (Denmark)

    Jagd, Søren

    and employees. An especially important issue is the trust/self-control nexus. Following this analysis it may be argued that the distinction low versus high-trust is much more complex and involves radical changes in organizational culture and identity than assumed by most management literature on trust a new...

  17. Review of Interorganizational Trust Models

    Science.gov (United States)

    2010-09-01

    Trust Models Humansystems® Resume Le gouvernement du Canada a demandé que l’on élabore une stratégie et une politique cohérentes pour toute mission...qui nécessite l’intégration et la coordination de multiples ministères et organismes du gouvernement , afin que l’on puisse accomplir efficacement...CR 2010-143; Defence R&D Canada – Toronto; September 2010. Le gouvernement du Canada a demandé que l’on élabore une stratégie et une politique

  18. Trust and Traditions in Transitions

    DEFF Research Database (Denmark)

    McQuaid, Sara Dybris

    and the state and more recently, trust in the peace process. As the contest over meaning is always determined by the context of articulation, this paper examines the role of parades in the current ‘post-conflict’ phase of the peace process. Using theories of cultural and collective memory (Assman 2011, Olick...... recesses of memory in the current transition. And b) that patterns of ‘competitive commemoration’ in parades should be understood in relation to the increasing dissonance between vernacular languages of conflict and the official post-conflict discourses in Northern Ireland....

  19. NASA Engineering Network Lessons Learned

    Data.gov (United States)

    National Aeronautics and Space Administration — The NASA Lessons Learned system provides access to official, reviewed lessons learned from NASA programs and projects. These lessons have been made available to the...

  20. Mining Trust Relationships from Online Social Networks

    Institute of Scientific and Technical Information of China (English)

    Yu Zhang; Tong Yu

    2012-01-01

    With the growing popularity of online social network,trust plays a more and more important role in connecting people to each other.We rely on our personal trust to accept recommendations,to make purchase decisions and to select transaction partners in the online community.Therefore,how to obtain trust relationships through mining online social networks becomes an important research topic.There are several shortcomings of existing trust mining methods.First,trust is category-dependent.However,most of the methods overlook the category attribute of trust relationships,which leads to low accuracy in trust calculation.Second,since the data in online social networks cannot be understood and processed by machines directly,traditional mining methods require much human effort and are not easily applied to other applications.To solve the above problems,we propose a semantic-based trust reasoning mechanism to mine trust relationships from online social networks automatically.We emphasize the category attribute of pairwise relationships and utilize Semantic Web technologies to build a domain ontology for data communication and knowledge sharing.We exploit role-based and behavior-based reasoning functions to infer implicit trust relationships and category-specific trust relationships.We make use of path expressions to extend reasoning rules so that the mining process can be done directly without much human effort.We perform experiments on real-life data extracted from Epinions.The experimental results verify the effectiveness and wide application use of our proposed method.

  1. SERVANT LEADERSHIP AND ORGANIZATIONAL TRUST: THE MEDIATING EFFECT OF THE LEADER TRUST AND ORGANIZATIONAL COMMUNICATION

    Directory of Open Access Journals (Sweden)

    Morad Rezaei

    2012-01-01

    Full Text Available The purpose of this paper aims to clarify the relationship between servant leadership and organizational trust, and tries to demonstrate the mediator role of leader trust and organizational communication in this relationship. The study sample included 258 employees of Guilan province Tax Administration and for sampling we used cluster method. Previous studies have also focused on the positive impact of servant leadership in organizational trust and in this article the results show that there is a significant relationship between servant leadership, organizational trust, leader trust and organizational communication.

  2. Building trusted national identity management systems: Presenting the privacy concern-trust (PCT) model

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    This paper discusses the effect of trust and information privacy concerns on citizens’ attitude towards national identity management systems. We introduce the privacyconcerns- trust model, which shows the role of trust in mediating and moderating citizens’ attitude towards identity management...... systems. We adopted a qualitative research approach in our analysis of data that was gathered through a series of interviews and a stakeholder workshop in Ghana. Our findings indicate that, beyond the threshold level of trust, societal information privacy concern is low; hence, trust is high, thereby...... encouraging further institutional collaboration and acceptance of citizens’ informational self-determination....

  3. Trust Model for Social Network using Singular Value Decomposition

    OpenAIRE

    Davis Bundi Ntwiga; Patrick Weke; Michael Kiura Kirumbu

    2016-01-01

    For effective interactions to take place in a social network, trust is important. We model trust of agents using the peer to peer reputation ratings in the network that forms a real valued matrix. Singular value decomposition discounts the reputation ratings to estimate the trust levels as trust is the subjective probability of future expectations based on current reputation ratings. Reputation and trust are closely related and singular value decomposition can estimate trust using the...

  4. A Strategic Model of Trust Management in Web Services

    Science.gov (United States)

    Sun, Junqing; Sun, Zhaohao; Li, Yuanzhe; Zhao, Shuliang

    This article examines trust and trust management in web services and proposes a multiagent model of trust relationship in web services. It looks at the hierarchical structure of trust management in web services and proposes a strategic model of trust management in web services. The proposed approach in this article will facilitate research and development of trust management in e-commerce, web services and social networking.

  5. Trusted computing for embedded systems

    CERN Document Server

    Soudris, Dimitrios; Anagnostopoulos, Iraklis

    2015-01-01

    This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. Case studies are used to present new techniques designed as industrial security solutions. Coverage includes development of tamper resistant hardware and firmware mechanisms for lightweight embedded devices, as well as those serving as security anchors for embedded platforms required by applications such as smart power grids, smart networked and home appliances, environmental and infrastructure sensor networks, etc. ·         Enables readers to address a variety of security threats to embedded hardware and software; ·         Describes design of secure wireless sensor networks, to address secure authen...

  6. Social Trust and the Growth of Schooling

    DEFF Research Database (Denmark)

    Bjørnskov, Christian

    The paper develops a simple model to exemplify how social trust might affect the growth of schooling through lowering transaction costs. In a sample of 52 countries, the paper thereafter provides empirical evidence that trust has indeed led to faster growth of schooling in the period 1960...

  7. The Importance of Trust in Electronic Commerce.

    Science.gov (United States)

    Ratnasingham, Pauline

    1998-01-01

    Introduces the new concept of trust and how it influences the process of managing the security of an organization operating in an electronic commerce environment. Theoretically, the study aims to develop a framework of trust and security to provide a set of guidelines for secure electronic commerce. (Author/LRW)

  8. Building Trust in High-Performing Teams

    Directory of Open Access Journals (Sweden)

    Aki Soudunsaari

    2012-06-01

    Full Text Available Facilitation of growth is more about good, trustworthy contacts than capital. Trust is a driving force for business creation, and to create a global business you need to build a team that is capable of meeting the challenge. Trust is a key factor in team building and a needed enabler for cooperation. In general, trust building is a slow process, but it can be accelerated with open interaction and good communication skills. The fast-growing and ever-changing nature of global business sets demands for cooperation and team building, especially for startup companies. Trust building needs personal knowledge and regular face-to-face interaction, but it also requires empathy, respect, and genuine listening. Trust increases communication, and rich and open communication is essential for the building of high-performing teams. Other building materials are a shared vision, clear roles and responsibilities, willingness for cooperation, and supporting and encouraging leadership. This study focuses on trust in high-performing teams. It asks whether it is possible to manage trust and which tools and operation models should be used to speed up the building of trust. In this article, preliminary results from the authors’ research are presented to highlight the importance of sharing critical information and having a high level of communication through constant interaction.

  9. Money Can't Buy Me Trust

    DEFF Research Database (Denmark)

    Christoffersen, Jeppe; Robson, Matthew J.

    2017-01-01

    country partners’ government to support alliances with local, developing country partners. Applying motivation crowding theory to trust processes, we develop theoretical logic explaining how and under what conditions such third-party financial support negatively affects the local partner's trust. Our...

  10. Young Children and Trust in Turkey

    Science.gov (United States)

    Alat, Zeynep

    2014-01-01

    The aim of the study was to examine differences in children's generalised trust and the maternal behaviour, child temperament, and demographic factors on the levels of trust in children. A total of 314 mothers and their children participated in the study. Results showed no evidence of sex differences in children's beliefs. Children living in urban…

  11. How Does Social Trust Affect Economic Growth?

    DEFF Research Database (Denmark)

    Bjørnskov, Christian

    Social capital in the form of generalized trust has been shown to be a determinant of economic growth in a number of studies. Other studies have explored other consequences of trust, such as its effects on governance, corruption, education and investment. This paper connects the two strands...

  12. The Volatile Nature of Social Trust

    DEFF Research Database (Denmark)

    Kjærsgård, Andreas Pihl; Anhøj, Anne Iversen

    by the development of public sentiment in a given context. The development of social trust in Croatia and Slovenia thus correlate with factors as the sense of trust and corruption among politicians, public officials and public institutions, the general economic and social development in the country as well...

  13. TRUSTED CLOUD COMPUTING FRAMEWORK FOR HEALTHCARE SECTOR

    Directory of Open Access Journals (Sweden)

    Mervat Adib Bamiah

    2014-01-01

    Full Text Available Cloud computing is rapidly evolving due to its efficient characteristics such as cost-effectiveness, availability and elasticity. Healthcare organizations and consumers lose control when they outsource their sensitive data and computing resources to a third party Cloud Service Provider (CSP, which may raise security and privacy concerns related to data loss and misuse appealing threats. Lack of consumers’ knowledge about their data storage location may lead to violating rules and regulations of Health Insurance Portability and Accountability Act (HIPAA that can cost them huge penalty. Fear of data breach by internal or external hackers may decrease consumers’ trust in adopting cloud computing and benefiting from its promising features. We designed a Healthcare Trusted Cloud Computing (HTCC framework that maintains security, privacy and considers HIPAA regulations. HTCC framework deploys Trusted Computing Group (TCG technologies such as Trusted Platform Module (TPM, Trusted Software Stack (TSS, virtual Trusted Platform Module (vTPM, Trusted Network Connect (TNC and Self Encrypting Drives (SEDs. We emphasize on using strong multi-factor authentication access control mechanisms and strict security controls, as well as encryption for data at storage, in-transit and while process. We contributed in customizing a cloud Service Level Agreement (SLA by considering healthcare requirements. HTCC was evaluated by comparing with previous researchers’ work and conducting survey from experts. Results were satisfactory and showed acceptance of the framework. We aim that our proposed framework will assist in optimizing trust on cloud computing to be adopted in healthcare sector.

  14. Perceptions of Trust in Public Examinations

    Science.gov (United States)

    Simpson, Lucy; Baird, Jo-Anne

    2013-01-01

    Over recent years, the credibility of public examinations in England has increasingly come to the fore. Government agencies have invested time and money into researching public perceptions of the reliability and validity of examinations. Whilst such research overlaps into the conceptual domain of trust, trust in examinations remains an elusive…

  15. A Computational Trust Model for Collaborative Ventures

    Directory of Open Access Journals (Sweden)

    Weigang Wang

    2012-01-01

    Full Text Available Problem statement: The conceptual notion of trust and its underlying computational methods has been an important issue for researchers in electronic communities. While the independent trust evaluation is suitable in certain circumstances, such unilateral process falls short in supporting mutual evaluation between partners. Perceived reputation, the depth and breadth of trust, Trust Perception (TP, Repeat Collaborators at a Threshold (RCT and a collective trust index (c index have all been defined to specify the optimal trust criteria. Approach: By taking the evaluator’s own trust level as a threshold to identify compatible partners, a mutual balance between excess and deficiency in trust has been addressed. Since the number of repeated collaborations which signify retested confidence is more straightforward to capture than the manually provided feedback ratings, we have developed computational definitions for the above-mentioned concepts. Results and Conclusion: The results from the experiments based on the eBay dataset shows that the c index can be used to classify PowerSellers into normally distributed and comprehensible categories that can facilitate mutual evaluation.

  16. Building consumer trust into health information exchange.

    Science.gov (United States)

    Diamond, Carol; Ricciardi, Lygeia

    2006-01-01

    For nationwide health information exchange to succeed, consumers must trust that their data are being managed responsibly. Regional and other networks that create the nationwide exchange should make consumer trust a priority that is factored into every decision they make. Connecting for Health's Common Framework offers a starting point.

  17. New Superintendents: Trust, Networking, and Social Capital

    Science.gov (United States)

    Ripley, Joan; Mitchell, Roxanne M.; Richman, John A.

    2013-01-01

    This instrumental case study explored how five newly appointed superintendents identified key stakeholders and built trust and social capital with stakeholders in their districts. Stakeholder, trust, and social capital theory were the lenses that guided this study. We utilized a pragmatic research design and thematic data analysis to interpret our…

  18. Going global: Trust research and international relations

    DEFF Research Database (Denmark)

    Ruzicka, Jan; Keating, Vincent Charles

    2015-01-01

    In this review article we explore the growing body of literature on the subject of trust in the field of international relations. We argue that the international level represents a unique challenge for trust research. This is so because some of the most pressing problems facing the world today...

  19. Corruption, Trust and their Public Sector Consequences

    DEFF Research Database (Denmark)

    Fritzen, Scott A.; Serritzlew, Søren; Svendsen, Gert Tinggaard

    2014-01-01

    Corruption and trust are two important determinants of the quality of public sectors. Empirical studies in different literatures suggest that corruption and trust have effects on factors such as economic growth, the quality of democratic institutions, life quality, the size and effectiveness of t...

  20. Social capital and trust in providers.

    Science.gov (United States)

    Ahern, Melissa M; Hendryx, Michael S

    2003-10-01

    Trust in providers has been in decline in recent decades. This study attempts to identify sources of trust in characteristics of health care systems and the wider community. The design is cross-sectional. Data are from (1) the 1996 Household Survey of the Community Tracking Study, drawn from 24 Metropolitan Statistical Areas; (2) a 1996 multi-city broadcast media marketing database including key social capital indicators; (3) Interstudy; (4) the American Hospital Association; and (5) the American Medical Association. Independent variables include individual socio-demographic variables, HMO enrollment, community-level health sector variables, and social capital. The dependent variable is self-reported trust in physicians. Data are merged from the various sources and analyzed using SUDAAN. Subjects include adults in the Household Survey who responded to the items on trust in physicians (N=17,653). Trust in physicians is independently predicted by community social capital (p<0.001). Trust is also negatively related to HMO enrollment and to many individual characteristics. The effect of HMOs is not uniform across all communities. Social capital plays a role in how health care is perceived by citizens, and how health care is delivered by providers. Efforts to build trust and collaboration in a community may improve trust in physicians, health care quality, access, and preserve local health care control.

  1. The Winston Churchill Memorial Trust of Australia

    Science.gov (United States)

    Hilton, Nicolette

    2013-01-01

    The Churchill Trust was established in 1965 to honour the memory of Sir Winston Churchill by awarding overseas research Fellowships known as "Churchill Fellowships". Since its inception, The Churchill Trust has awarded Churchill Fellowships to more than 3,700 Australians who, like Churchill, are innovative, filled with a spirit of…

  2. Young Children and Trust in Turkey

    Science.gov (United States)

    Alat, Zeynep

    2014-01-01

    The aim of the study was to examine differences in children's generalised trust and the maternal behaviour, child temperament, and demographic factors on the levels of trust in children. A total of 314 mothers and their children participated in the study. Results showed no evidence of sex differences in children's beliefs. Children…

  3. Extension of Subjective Logic for Time- Related Trust

    Institute of Scientific and Technical Information of China (English)

    HUANG Chen-lin; HU Hua-ping

    2005-01-01

    To describe the dynamic property of trust relationship, we propose a time-related trust model and extend Josang's subjective logic to fit for time-related trust model.The extension includes propositional conjunction, disjunction and negation for traditional logic and discounting and consensus operators that are evidential operators specially designed for the propagation and computation of trust relationships.With the extension of subjective logic for time-related trust,our time-related trust model is suitable to model the dynamic trust relationship in practice. Finally an example of reputation assessment is offered to demonstrate the usage of our trust model.

  4. Trust in the workplace: factors affecting trust formation between team members.

    Science.gov (United States)

    Spector, Michele D; Jones, Gwen E

    2004-06-01

    The authors used survey data from 127 professional-level employees working in 8 industries to assess the effects of respondent's trusting stance and (a) the trustee's organization membership (internal or external), (b) the hierarchical relationship (supervisor or peer), and (c) the gender of the trustee, on initial trust level for a new project team member. The authors found that trusting stance was positively related to initial trust level. The authors also found an interaction effect between respondent gender and trustee gender on initial trust. Specifically, male initial trust level was higher for a new male team member and lower for a new female team member. The present study provided additional understanding of the formation of initial trust levels and its importance for team functioning.

  5. TrustMAS: Trusted Communication Platform for Multi-Agent Systems

    CERN Document Server

    Szczypiorski, Krzysztof; Mazurczyk, Wojciech; Cabaj, Krzysztof; Radziszewski, Pawel

    2008-01-01

    The paper presents TrustMAS - Trusted Communication Platform for Multi-Agent Systems, which provides trust and anonymity for mobile agents. The platform includes anonymous technique based on random-walk algorithm for providing general purpose anonymous communication for agents. All agents, which take part in the proposed platform, benefit from trust and anonymity that is provided for their interactions. Moreover, in TrustMAS there are StegAgents (SA) that are able to perform various steganographic communication. To achieve that goal, SAs may use methods in different layers of TCP/IP model or specialized middleware enabling steganography that allows hidden communication through all layers of mentioned model. In TrustMAS steganographic channels are used to exchange routing tables between StegAgents. Thus all StegAgents in TrustMAS with their ability to exchange information by using hidden channels form distributed steganographic router (Stegrouter).

  6. Trust in prescription drug brand websites: website trust cues, attitude toward the website, and behavioral intentions.

    Science.gov (United States)

    Huh, Jisu; Shin, Wonsun

    2014-01-01

    Direct-to-consumer (DTC) prescription drug brand websites, as a form of DTC advertising, are receiving increasing attention due to the growing number and importance as an ad and a consumer information source. This study examined consumer trust in a DTC website as an important factor influencing consumers' attitude toward the website and behavioral intention. Applying the conceptual framework of website trust, the particular focus of investigation was the effect of the website trust cue factor on consumers' perceived DTC website trust and subsequent attitudinal and behavioral responses. Results show a significant relation between the website trust cue factor and consumers' perceived DTC website trust. Perceived DTC website trust, in turn, was found to be significantly associated with consumers' attitude toward the DTC website and behavioral intention.

  7. Trusting Facebook in Crisis Situations: The Role of General Use and General Trust Toward Facebook.

    Science.gov (United States)

    Szymczak, Hermann; Kücükbalaban, Pinar; Lemanski, Sandra; Knuth, Daniela; Schmidt, Silke

    2016-01-01

    An important concept that has been rather neglected in research on social media is the concept of trust. Although there is a considerable amount of research on online trust in general, little has been done in the area of social media. As a situation of risk is necessary for trust, the perceived trustworthiness of Facebook in crisis situations was examined in this study. A sample of 340 European Facebook users were questioned as part of a large European study about social media in the context of emergency situations. We found that participants' general trust toward Facebook as a medium predicted to a significant degree how much they would trust Facebook in a crisis situation. General use of Facebook and dispositional trust were also significantly associated with trust toward Facebook in a crisis situation.

  8. Numerical and physical modelling of oil spreading in broken ice

    Energy Technology Data Exchange (ETDEWEB)

    Gjoesteen, Janne K. Oekland

    2002-07-01

    The present work focuses on oil spreading in broken ice and the content of this thesis falls into three categories: 1) The physical and numerical modelling of oil spreading in ice. 2) Ice models and parameters describing the ice cover. 3) Experiments on oil spreading in broken ice. A background study was carried out to investigate existing models for simulating oil in broken ice. Most of them describe motion of oil simply as a function of the ice motion and do not take advantage of the possibilities that recent ice models provide. We decided to choose another direction, starting from scratch with equations describing the flow of oil on top of a water surface. The equations were implemented numerically, including proper boundary conditions to account for the presence of physical restrictions in the form of ice floes in the simulation area. The implementation was designed to be able to apply data on ice motion calculated by an existing dynamic ice model. A first validation of the model was carried out using existing experimental data. As those data were obtained in a different setting, the recorded parameters and set-up of the experiment were not ideal for our purpose. However, we were able to conclude that our model behaviour was reasonable. We have carried out statistical analysis on meteorological data of wind speeds, temperatures, flow sizes and ice thickness to obtain probability distributions describing the parameters. Those data has been collected in the Pechora Sea. Wind and temperature had been recorded for a period of 30-40 years. For this region we also had available Argos satellite data from four buoys drifting in the ice in April-June 1998. The Argos data were carefully analysed to suggest probability distributions and return periods for certain speeds. (Indoor basin tests were carried out to obtain data on spreading of oil in broken ice. A set of 20 tests was conducted, each with different type of oil, ice concentration, slush concentration or ice

  9. Excitation of dark plasmonic modes in symmetry broken terahertz metamaterials.

    Science.gov (United States)

    Chowdhury, Dibakar Roy; Su, Xiaofang; Zeng, Yong; Chen, Xiaoshuang; Taylor, Antoinette J; Azad, Abul

    2014-08-11

    Plasmonic structures with high symmetry, such as double-identical gap split ring resonators, possess dark eigenmodes. These dark eigenmodes are dominated by magnetic dipole and/or higher-order multi-poles such as electric quadrapoles. Consequently these dark modes interact very weakly with the surrounding environment, and can have very high quality factors (Q). In this work, we have studied, experimentally as well as theoretically, these dark eigenmodes in terahertz metamaterials. Theoretical investigations with the help of classical perturbation theory clearly indicate the existence of these dark modes in symmetric plasmonic metamaterials. However, these dark modes can be excited experimentally by breaking the symmetry within the constituting metamaterial resonators cell, resulting in high quality factor resonance mode. The symmetry broken metamaterials with such high quality factor can pave the way in realizing high sensitivity sensors, in addition to other applications.

  10. Broken-Plane Maneuver Applications for Earth to Mars Trajectories

    Science.gov (United States)

    Abilleira, Fernando

    2007-01-01

    Optimization techniques are critical when investigating Earth to Mars trajectories since they have the potential of reducing the total (delta)V of a mission. A deep space maneuver (DSM) executed during the cruise may improve a trajectory by reducing the total mission V. Nonetheless, DSMs not only may improve trajectory performance (from an energetic point of view) but also open up new families of trajectories that would satisfy very specific mission requirements not achievable with ballistic trajectories. In the following pages, various specific examples showing the potential advantages of the usage of broken plane maneuvers will be introduced. These examples correspond to possible scenarios for Earth to Mars trajectories during the next decade (2010-2020).

  11. Bounce and cyclic cosmology in weakly broken galileon theories

    CERN Document Server

    Banerjee, Shreya

    2016-01-01

    We investigate the bounce and cyclicity realization in the framework of weakly broken galileon theories. We study bouncing and cyclic solutions at the background level, reconstructing the potential that can give rise to a given scale factor, and presenting analytical expressions for the bounce requirements. We proceed to a detailed investigation of the perturbations, which after crossing the bouncing point give rise to various observables, such as the scalar and tensor spectral indices and the tensor-to-scalar ratio. Although the scenario at hand shares the disadvantage of all bouncing models, namely that it provides a large tensor-to-scalar ratio, introducing an additional light scalar significantly reduces it through the kinetic amplification of the isocurvature fluctuations.

  12. Desert wanderings: pathways for whole, broken and shattered psyches.

    Science.gov (United States)

    Joseph, S M

    2000-07-01

    This paper challenges an implicit assumption of analytical psychology that centred, mandalic images express psychical wholeness in an optimal fashion across cultures and eras. I suggest that liminal, bardo-like eras, such as our 'post-modern' one, constellate complex, antithetical and ec-centric images, which are process-oriented and which encompass wholeness and fragmentation, conjunction and disjunction, thus holding and expressing actual individual and collective experience. In our era, we inhabit unfolding states of wholeness, brokenness and fragmentation. Images of wholeness, emerging spontaneously from the unconscious, may reflect part or all of these contradictory realities. Examples of such antithetical Self-images are developed from the ancient midrashic traditions of the rabbis; from Jung's contemporary exposition of Pauli's 'world-clock' dream; from Kepler's discovery, at the dawn of modernity, that the planets circled the sun in ellipses rather than circles; and from a clinical illustration.

  13. Phases of holographic superconductors with broken translational symmetry

    CERN Document Server

    Baggioli, Matteo

    2015-01-01

    We consider holographic superconductors in a broad class of massive gravity backgrounds. These theories provide a holographic description of a superconductor with broken translational symmetry. Such models exhibit a rich phase structure: depending on the values of the temperature and the doping the boundary system can be in superconducting, normal metallic or normal pseudo-insulating phases. Furthermore the system supports interesting collective excitations of the charge carriers, which appears in the normal phase, persists in the superconducting phase, but eventually gets destroyed by the superconducting condensate. We also show the possibility of building a phase diagram of a system with the superconducting phase occupying a dome-shaped region, therefore resembling more of a real-world doped high-Tc superconductor.

  14. Gauge-Higgs unification with broken flavour symmetry

    Energy Technology Data Exchange (ETDEWEB)

    Olschewsky, M.

    2007-05-15

    We study a five-dimensional Gauge-Higgs unification model on the orbifold S{sup 1}/Z{sub 2} based on the extended standard model (SM) gauge group SU(2){sub L} x U(1){sub Y} x SO(3){sub F}. The group SO(3){sub F} is treated as a chiral gauged flavour symmetry. Electroweak-, flavour- and Higgs interactions are unified in one single gauge group SU(7). The unified gauge group SU(7) is broken down to SU(2){sub L} x U(1){sub Y} x SO(3){sub F} by orbifolding and imposing Dirichlet and Neumann boundary conditions. The compactification scale of the theory is O(1) TeV. Furthermore, the orbifold S{sup 1}/Z{sub 2} is put on a lattice. This setting gives a well-defined staring point for renormalisation group (RG) transformations. As a result of the RG-flow, the bulk is integrated out and the extra dimension will consist of only two points: the orbifold fixed points. The model obtained this way is called an effective bilayered transverse lattice model. Parallel transporters (PT) in the extra dimension become nonunitary as a result of the blockspin transformations. In addition, a Higgs potential V({phi}) emerges naturally. The PTs can be written as a product e{sup A{sub y}}e{sup {eta}}e{sup A{sub y}} of unitary factors e{sup A{sub y}} and a selfadjoint factor e{sup {eta}}. The reduction 48 {yields} 35 + 6 + anti 6 + 1 of the adjoint representation of SU(7) with respect to SU(6) contains SU(2){sub L} x U(1){sub Y} x SO(3){sub F} leads to three SU(2){sub L} Higgs doublets: one for the first, one for the second and one for the third generation. Their zero modes serve as a substitute for the SM Higgs. When the extended SM gauge group SU(2){sub L} x U(1){sub Y} x SO(3){sub F} is spontaneously broken down to U(1){sub em}, an exponential gauge boson mass splitting occurs naturally. At a first step SU(2){sub L} x U(1){sub Y} x SO(3){sub F} is broken to SU(2){sub L} x U(1){sub Y} by VEVs for the selfadjoint factor e{sup {eta}}. This breaking leads to masses of flavour changing SO(3){sub F

  15. Trust in Client-Vendor Relations

    DEFF Research Database (Denmark)

    Tøth, Thomas

    2014-01-01

    In an ever more globalized world we are faced with the challenges of collaborating across geographical distance. This article examines how trust is established in an offshore outsourcing engagement of IT operations between a leading Danish media company and an Indian IT-service provider. The find......In an ever more globalized world we are faced with the challenges of collaborating across geographical distance. This article examines how trust is established in an offshore outsourcing engagement of IT operations between a leading Danish media company and an Indian IT-service provider...... and organizational boundaries within the field of IT offshore outsourcing. The article concludes that trust is primarily established when the teams are meeting face-to-face and in order to establish trust at a distance they are dependent on technology being readily available and on engaging in active trust building...

  16. Hybrid Trust Model for Internet Routing

    CERN Document Server

    Rantala, Pekka; Isoaho, Jouni

    2011-01-01

    The current Internet is based on a fundamental assumption of reliability and good intent among actors in the network. Unfortunately, unreliable and malicious behaviour is becoming a major obstacle for Internet communication. In order to improve the trustworthiness and reliability of the network infrastructure, we propose a novel trust model to be incorporated into BGP routing. In our approach, trust model is defined by combining voting and recommendation to direct trust estimation for neighbour routers located in different autonomous systems. We illustrate the impact of our approach with cases that demonstrate the indication of distrusted paths beyond the nearest neighbours and the detection of a distrusted neighbour advertising a trusted path. We simulated the impact of weighting voted and direct trust in a rectangular grid of 15*15 nodes (autonomous systems) with a randomly connected topology.

  17. Beyond Rule; Trust and Power as Capacities

    DEFF Research Database (Denmark)

    Raffnsøe, Sverre

    2013-01-01

    Taking an approach that avoids comprehending power and trust as entities to be studied apart, the article insists on elucidating trust and power as they are enacted in their intimate and delicate relationship to each other and to other human and social phenomena of similar importance, such as kno......Taking an approach that avoids comprehending power and trust as entities to be studied apart, the article insists on elucidating trust and power as they are enacted in their intimate and delicate relationship to each other and to other human and social phenomena of similar importance......, such as knowledge and experience, gift-giving, hope, freedom and agency. To permit us to understand power and trust as interdependent dimensions, the article confronts the notions of power as command, coercion, control and calculation and develops a conception of power as a capacity. This permits us to consider...

  18. Fractal Characteristics and Fractal Dimension Measurement on Broken Surfaces of Aluminum Electric Porcelain

    Institute of Scientific and Technical Information of China (English)

    YANG Zhiyuan; ZHOU Anning

    2005-01-01

    The characteristics of broken surfaces were researched by a scanning electron microscope (SEM) and a reflection microscope, and the fractal dimensions of broken surfaces were measured by the Slit Island method. The experimental results indicate that the broken surface of aluminum electric porcelain is a fractal body in statistics, and the fractal dimensions of broken surfaces are different with the different amplification multiple value.In all of measured fractal dimensions,both of values measured in 100× under reflection microscope and in 500× under SEM are maximum, whereas the values measured in 63× under reflection microscope and in 2000× under SEM are obviously minimum. The fractal dimensions of broken surfaces are also affected by the degrees of gray comparison and the kinds of measuring methods. The relationships between the fractal dimensions of broken surfaces and porcelain bend strengths are that they are in positive correlation on the low multiples and in negative correlation on the high multiples.

  19. INFLUENCE OF BROKEN ROTOR BARS LOCATION IN THE SQUIRREL CAGE INDUCTION MOTOR USING FINITE ELEMENT METHOD

    Directory of Open Access Journals (Sweden)

    N. Halem

    2013-06-01

    Full Text Available It is well known that the number of broken bars and varying load affect on the amplitudes of specific harmonic components in the process analysis of induction motors under broken rotor bars. The location of broken bars is an important factor which affects the diagnosis of the broken bars defect. In this paper the simulation is determinate for different cases for distribution of broken bars under induction motor pole in order to show the impact of broken bars location upon the amplitude of harmonic fault. The simulation results are obtained by using time stepping finite elements (TSFE method. The geometrical characteristics of motor, the effects of slotting and the magnetic saturation of lamination core are included in induction motor model.

  20. INFLUENCE OF BROKEN ROTOR BARS LOCATION IN THE SQUIRREL CAGE INDUCTION MOTOR USING FINITE ELEMENT METHOD

    Directory of Open Access Journals (Sweden)

    N. Halem

    2015-07-01

    Full Text Available It is well known that the number of broken bars and varying load affect on the amplitudes of specific harmonic components  in the process analysis of induction motors under broken rotor bars. The location of broken bars is an important factor which affects the diagnosis of the broken bars defect. In this paper the simulation is determinate for different cases for distribution of broken bars under induction motor pole in order to show the impact of broken bars location upon the amplitude of harmonic fault. The simulation results are obtained by using time stepping finite elements (TSFE method. The geometrical characteristics of motor, the effects of slotting and the magnetic saturation of lamination core are included in induction motor model.

  1. Partnering for bioregionalism in England: a case study of the Westcountry Rivers Trust

    Directory of Open Access Journals (Sweden)

    Hadrian Cook

    2016-06-01

    Full Text Available The adoption of bioregionalism by institutions that are instrumental in river basin management has significant potential to resolve complex water resource management problems. The Westcountry Rivers Trust (WRT in England provides an example of how localized bioregional institutionalization of adaptive comanagement, consensus decision making, local participation, indigenous technical and social knowledge, and "win-win" outcomes can potentially lead to resilient partnership working. Our analysis of the WRT's effectiveness in confronting nonpoint source water pollution, previously impervious to centralized agency responses, provides scope for lesson-drawing on institutional design, public engagement, and effective operation, although some evident issues remain.

  2. Collaborative Trust: A Novel Paradigm of Trusted Mobile Computing

    CERN Document Server

    Mal-Sarkar, Tatini

    2010-01-01

    With increasing complexity of modern-day mobile devices, security of these devices in presence of myriad attacks by an intelligent adversary is becoming a major issue. The vast majority of cell phones still remain unsecured from many existing and emerging security threats. To address the security threats in mobile devices we are exploring a technology, which we refer as "Collaborative Trust". It is a technology that uses a system of devices cooperating with each other (working in a fixed or ad-hoc network) to achieve the individual security of each device. The idea is that each device is insecure by itself, since in many cases it is incapable of checking its safety by itself (e.g. when it is compromised it may lose its ability to monitor its own trustworthiness), but together, they can ensure each other's security in a collaborative manner.

  3. Cross-cultural Science: Ten Lessons

    Directory of Open Access Journals (Sweden)

    Joanne Marie Horn

    2015-07-01

    Full Text Available Concerns of infectious disease outbreaks have recently reached the forefront of global security issues and resulted in new engagements among foreign science advisors, host country scientists, and officials. There are lessons to be learned from the numerous organizations working in global regions of endemic disease who are building capacity to survey pathogens and prevent and contain epidemics. Working with foreign scientists, health professionals, and administrators can be challenging; building partnerships based on respect and mutual trust is key to achieve effective change. Engendering ownership, working towards mutual success, paying close attention to cultural norms and the local regulatory climate, close collaboration with other stakeholders, and imaginative problem solving all contribute to mission success.

  4. Mini Lessons from FDA.

    Science.gov (United States)

    Food and Drug Administration (DHEW), Washington, DC.

    Eight self-contained lessons present information about topics of current interest in the Food and Drug Administration. Multidisciplinary in nature, the lessons can be integrated into ongoing activities in elementary or secondary level reading, math, language arts, social studies, science, art, health, consumer education, and home economics. The…

  5. Ben Franklin. [Lesson Plan].

    Science.gov (United States)

    Discovery Communications, Inc., Bethesda, MD.

    Based on Benjamin Franklin's "Poor Richard's Almanac," this lesson plan presents activities designed to help students understand that Ben Franklin is known, among other things, for his wit and wisdom; that Franklin published an almanac for 25 years; and he scattered aphorisms throughout the almanac. The main activity in the lesson is for students…

  6. "Frankenstein." [Lesson Plan].

    Science.gov (United States)

    Simon, Melanie

    Based on Mary Shelley's novel "Frankenstein," this lesson plan presents activities designed to help students understand that active readers interpret a novel (its characters, plot, setting, and theme) in different ways; and the great literature can be and has been adapted in many ways over time. The main activity of the lesson involves students…

  7. Soybean Production Lesson Plan.

    Science.gov (United States)

    Carlson, Keith R.

    These lesson plans for teaching soybean production in a secondary or postsecondary vocational agriculture class are organized in nine units and cover the following topics: raising soybeans, optimum tillage, fertilizer and lime, seed selection, pest management, planting, troubleshooting, double cropping, and harvesting. Each lesson plan contains…

  8. Great Expectations. [Lesson Plan].

    Science.gov (United States)

    Devine, Kelley

    Based on Charles Dickens' novel "Great Expectations," this lesson plan presents activities designed to help students understand the differences between totalitarianism and democracy; and a that a writer of a story considers theme, plot, characters, setting, and point of view. The main activity of the lesson involves students working in groups to…

  9. Gulliver's Travels. [Lesson Plan].

    Science.gov (United States)

    Rooks, Kirsten; McLean, Mary

    Based on Jonathan Swift's novel "Gulliver's Travels," this lesson plan presents activities designed to help students understand that Swift comments on undesirable outcomes of advances in science; and other authors have also warned against abuse of science. The main activity of the lesson involves students developing a poster illustrating views of…

  10. "Walden". [Lesson Plan].

    Science.gov (United States)

    Surber, Gretchen C.

    Based on Henry David Thoreau's book "Walden," this lesson plan presents activities designed to help students understand that acquisitiveness and simplicity can be opposing life philosophies; and that both philosophies have had notable adherents. The main activity of the lesson involves students researching historical characters (including Thoreau)…

  11. Fish Facts. Lesson Plan.

    Science.gov (United States)

    Chan, Mike

    This lesson plan is designed for a 50-minute class to teach extension home economists and homemakers about buying, storing, and using fish. The lesson plan contains references, a list of equipment needed, objectives, and the presentation. The presentation consists of an outline of instruction coordinated with methods of instruction and aids and…

  12. Trust in Nanotechnology? On Trust as Analytical Tool in Social Research on Emerging Technologies.

    Science.gov (United States)

    Am, Trond Grønli

    2011-04-01

    Trust has become an important aspect of evaluating the relationship between lay public and technology implementation. Experiences have shown that a focus on trust provides a richer understanding of reasons for backlashes of technology in society than a mere focus of public understanding of risks and science communication. Therefore, trust is also widely used as a key concept for understanding and predicting trust or distrust in emerging technologies. But whereas trust broadens the scope for understanding established technologies with well-defined questions and controversies, it easily fails to do so with emerging technologies, where there are no shared questions, a lack of public familiarity with the technology in question, and a restricted understanding amongst social researchers as to where distrust is likely to arise and how and under which form the technology will actually be implemented. Rather contrary, 'trust' might sometimes even direct social research into fixed structures that makes it even more difficult for social research to provide socially robust knowledge. This article therefore suggests that if trust is to maintain its important role in evaluating emerging technologies, the approach has to be widened and initially focus not on people's motivations for trust, but rather the object of trust it self, as to predicting how and where distrust might appear, how the object is established as an object of trust, and how it is established in relation with the public.

  13. Hardware IP security and trust

    CERN Document Server

    Bhunia, Swarup; Tehranipoor, Mark

    2017-01-01

    This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle. Readers will gain a comprehensive understanding of the security vulnerabilities of different types of IPs. This book would enable readers to overcome these vulnerabilities through an efficient combination of proactive countermeasures and design-for-security solutions, as well as a wide variety of IP security and trust assessment and validation techniques. This book serves as a single-source of reference for system designers and practitioners for designing secure, reliable and trustworthy SoCs.

  14. Genetic influences are virtually absent for trust.

    Directory of Open Access Journals (Sweden)

    Paul A M Van Lange

    Full Text Available Over the past decades, numerous twin studies have revealed moderate to high heritability estimates for individual differences in a wide range of human traits, including cognitive ability, psychiatric disorders, and personality traits. Even factors that are generally believed to be environmental in nature have been shown to be under genetic control, albeit modest. Is such heritability also present in social traits that are conceptualized as causes and consequences of social interactions or in other ways strongly shaped by behavior of other people? Here we examine a population-based sample of 1,012 twins and relatives. We show that the genetic influence on generalized trust in other people (trust-in-others: h2 = 5%, ns, and beliefs regarding other people's trust in the self (trust-in-self: h2 = 13%, ns, is virtually absent. As test-retest reliability for both scales were found to be moderate or high (r = .76 and r = .53, respectively in an independent sample, we conclude that all variance in trust is likely to be accounted for by non-shared environmental influences. We show that, relative to cognitive abilities, psychiatric disorders, and classic personality variables, genetic influences are smaller for trust, and propose that experiences with or observations of the behavior of other people shape trust more strongly than other traits.

  15. Sudden Trust Collapse in Networked Societies

    CERN Document Server

    Batista, João da Gama; Challet, Damien

    2014-01-01

    Trust is a collective, self-fulfilling phenomenon that suggests analogies with phase transitions. We introduce a stylized model for the build-up and collapse of trust in networks, which generically displays a first order transition. The basic assumption of our model is that whereas trust begets trust, panic also begets panic, in the sense that a small decrease in trust may be amplified and ultimately lead to a sudden and catastrophic drop of trust. We show, using both numerical simulations and mean-field analytic arguments, that there are extended regions of the parameter space where two equilibrium states coexist: a well-connected network where confidence is high, and a poorly connected network where confidence is low. In these coexistence regions, spontaneous jumps from the well-connected state to the poorly connected state can occur, corresponding to a sudden collapse of trust that is not caused by any major external catastrophe. In large systems, spontaneous crises are replaced by history dependence: whet...

  16. Recommendation based on trust diffusion model.

    Science.gov (United States)

    Yuan, Jinfeng; Li, Li

    2014-01-01

    Recommender system is emerging as a powerful and popular tool for online information relevant to a given user. The traditional recommendation system suffers from the cold start problem and the data sparsity problem. Many methods have been proposed to solve these problems, but few can achieve satisfactory efficiency. In this paper, we present a method which combines the trust diffusion (DiffTrust) algorithm and the probabilistic matrix factorization (PMF). DiffTrust is first used to study the possible diffusions of trust between various users. It is able to make use of the implicit relationship of the trust network, thus alleviating the data sparsity problem. The probabilistic matrix factorization (PMF) is then employed to combine the users' tastes with their trusted friends' interests. We evaluate the algorithm on Flixster, Moviedata, and Epinions datasets, respectively. The experimental results show that the recommendation based on our proposed DiffTrust + PMF model achieves high performance in terms of the root mean square error (RMSE), Recall, and F Measure.

  17. How Does a Lesson Plan?

    Science.gov (United States)

    New York City Board of Education, Brooklyn, NY. Div. of Curriculum and Instruction.

    This manual for secondary school teachers offers sample lesson plans that may be used to guide and stimulate experimentation and development of creative instructional units. Lesson plan components are defined, and various types of lessons and their significant characteristics are identified. These characteristic types of lessons are illustrated,…

  18. Expectations as a key element in trusting

    DEFF Research Database (Denmark)

    Rasmussen, Mette Apollo; Hansen, Uffe Kjærgaard; Conradsen, Maria Bosse

    Considering the need for a tangible focus for qualitative research on trusting, we propose that expectations to the behavior of others can provide that. By focusing on expectations, researchers can produce narrative descriptions that explains how trusting develops and changes. Then the key...... theoretical question is “How do we describe and understand expectations in a micro perspective?” In this article we turn to Luhmann, Mead, Denzin and Blumer, to gain a better understanding of expectations. Overall we hope this paper contributes with a framework for research on trusting, which frames...

  19. Mediated Trust in the Innovation Ecosystem

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    This paper introduces a framework for further studies in the role of mediated trust in the innovation ecosystems. Combining insight from scholars like Etzkowitz, Russel and Nordfors, the concept of innovation ecosystem is described as an extended Triple Helix where media is seen as a fourth strand...... should be considered trustworthy. When receiving the message, the audience will decode the signals. Trust is considered fundamental for mass media if these are to fulfill their normative functions in the innovation ecosystem. However, the concept of trust is not clearly defined in the literature and we...

  20. Trusting the other or taking a chance?

    DEFF Research Database (Denmark)

    Frederiksen, Morten; Heinskou, Marie Bruvik

    2016-01-01

    Theories of modernity and risk society argue that increasing levels of risk fundamentally alter or lower the level of trust in society. In this article we argue that this assumption is based in a fallacious theoretical link between trust and risk. Rather than calculative assessment of risk......, respectively, reside. Secondly, the issue of temporality is traced in Luhmann’s work on trust and it is demonstrated how his dichotomous treatment of social time conflates markedly different temporal experiences. As a solution to this, the article presents the notion of a third temporal mode of the process...

  1. Framing Trust at the Street-Level

    DEFF Research Database (Denmark)

    Perry, Kevin Anthony

    This thesis deals with the phenomenon of distrust and trust between young men with minority ethnic backgrounds and public sector employees at the face-to-face level of interaction. The focus is on trust and distrust which can be understood as cultural resources – a valuable approach to researching...... a researcher (outsider) first enters a field setting. Amongst other methodological issues, this chapter presents a theoretical discussion about the significance of trust in relation to the researcher entering the field. Subsequently, the thesis reports finding one: Governmental Distrust Frames, which derives...... outlines the overall contributions of the thesis along with the limitations and recommendations for future research....

  2. Trust in Co-sourced Software Development

    DEFF Research Database (Denmark)

    Schlichter, Bjarne Rerup; Persson, John Stouby

    2014-01-01

    . We present a case study of how the co-sourcing relationship between a certified CMMI-level 5 Danish software company and an offshoring supplier can be conceptualized as an Abstract System. An Abstract System is a dis-embedded social system (such as banking) that is trusted despite lack of detailed...... understanding or personal trust relations. The paper suggest how certain work practices among developers and managers can be explained using a dynamic trust lens based on Abstract Systems, especially dis- and re-embedding mechanisms....

  3. Public trust in health care : Exploring the mechanisms

    NARCIS (Netherlands)

    van der Schee, E.

    2016-01-01

    The aim of this thesis is to investigate how public trust in health care is formed, by studying the mechanisms behind it, addressing the following research question: ‘Which mechanisms explain differences in public trust in health care?’. Public trust in health care is important. Low levels of trust

  4. Teacher Trust in District Administration: A Promising Line of Inquiry

    Science.gov (United States)

    Adams, Curt M.; Miskell, Ryan C.

    2016-01-01

    Purpose: We set out in this study to establish a foundation for a line of inquiry around teacher trust in district administration by (1) describing the role of trust in capacity building, (2) conceptualizing trust in district administration, (3) developing a scale to measure teacher trust in district administration, and (4) testing the…

  5. Making Sense of Context as a Basis for Trust

    DEFF Research Database (Denmark)

    Fuglsang, Lars; Jagd, Søren

    ., 2011) between institutions and interactions to explore how context may be relevant for trust processes. We argue that people must actively and consciously “make sense of context” as a basis for trust. The importance of understanding how actors make sense of context in order to understand organizational...... trust is illustrated by reference to two earlier reported case studies on trust in organizations....

  6. Dynamic Trust Management for Mobile Networks and Its Applications

    Science.gov (United States)

    Bao, Fenye

    2013-01-01

    Trust management in mobile networks is challenging due to dynamically changing network environments and the lack of a centralized trusted authority. In this dissertation research, we "design" and "validate" a class of dynamic trust management protocols for mobile networks, and demonstrate the utility of dynamic trust management…

  7. Trust Matters: Leadership for Successful Schools, 2nd Edition

    Science.gov (United States)

    Tschannen-Moran, Megan

    2014-01-01

    Make your school soar by escalating trust between teachers, students, and families. Trust is an essential element in all healthy relationships, and the relationships that exist in your school are no different. How can your school leaders or teachers cultivate trust? How can your institution maintain trust once it is established? These are the…

  8. RCCtrust: A Combined Trust Model for Electronic Community

    Institute of Scientific and Technical Information of China (English)

    Yu Zhang; Hua-Jun Chen; Xiao-Hong Jiang; Hao Sheng; Zhao-Hui Wu

    2009-01-01

    Previous trust models are mainly focused on reputational mechanism based on explicit trust ratings.However,the large amount of user-generated content and community context published on Web is often ignored.Without enough information,there are several problems with previous trust models:first,they cannot determine in which field one user trusts in another,so many models assume that trust exists in all fields.Second some models are not able to delineate the variation of trust SCales,therefore they regard each user trusts all his friends to the same extent.Third,since these models only focus on explicit trust ratings,so the trust matrix is very sparse.To Solve these problems,we present RCCtrust-a trust model which combines Reputation-,Content-and Context-based mechanisms to provide more accurate,fine-grained and efficient trust management for the electronic community.We extract trust-related information from user-generated content and community context from Web to extend reputation-based trust models. We introduce role-based and behavior-based reasoning functionalities to infer users'i nterests and category-specific trust relationships.Following the study in sociology, RCCtrust exploits similarities between pairs of users to depict difierentiated trust scales.The experimental results show that RCCtrust outperforin8 pure user similarity method and linear decay trust-aware technique in both accuracy and coverage for a Recommender System.

  9. 26 CFR 1.664-2 - Charitable remainder annuity trust.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 8 2010-04-01 2010-04-01 false Charitable remainder annuity trust. 1.664-2... TAX (CONTINUED) INCOME TAXES Estates and Trusts Which May Accumulate Income Or Which Distribute Corpus § 1.664-2 Charitable remainder annuity trust. (a) Description. A charitable remainder annuity trust...

  10. Social Trust Aware Item Recommendation for Implicit Feedback

    Institute of Scientific and Technical Information of China (English)

    郭磊; 马军; 姜浩然; 陈竹敏; 邢长明

    2015-01-01

    Social trust aware recommender systems have been well studied in recent years. However, most of existing methods focus on the recommendation scenarios where users can provide explicit feedback to items. But in most cases, the feedback is not explicit but implicit. Moreover, most of trust aware methods assume the trust relationships among users are single and homogeneous, whereas trust as a social concept is intrinsically multi-faceted and heterogeneous. Simply exploiting the raw values of trust relations cannot get satisfactory results. Based on the above observations, we propose to learn a trust aware personalized ranking method with multi-faceted trust relations for implicit feedback. Specifically, we first introduce the social trust assumption — a user’s taste is close to the neighbors he/she trusts — into the Bayesian Personalized Ranking model. To explore the impact of users’ multi-faceted trust relations, we further propose a category-sensitive random walk method CRWR to infer the true trust value on each trust link. Finally, we arrive at our trust strength aware item recommendation method SocialBPRCRWR by replacing the raw binary trust matrix with the derived real-valued trust strength. Data analysis and experimental results on two real-world datasets demonstrate the existence of social trust influence and the effectiveness of our social based ranking method SocialBPRCRWR in terms of AUC (area under the receiver operating characteristic curve).

  11. 24 CFR 92.500 - The HOME Investment Trust Fund.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false The HOME Investment Trust Fund. 92... Investment Trust Fund. (a) General. A HOME Investment Trust Fund consists of the accounts described in this... Investment Trust Fund United States Treasury account for each participating jurisdiction. Each...

  12. Development of trust during large scale system implementation

    DEFF Research Database (Denmark)

    Schlichter, Bjarne Rerup

    2010-01-01

      Implementations of information systems are complex and problematic with a reputation for being delayed and exceeding budget. A critical factor in implementations is trust in the system, trust in the project and trust between the various stakeholders. This case charts the evolution of trust...

  13. A Novel Trust Service Provider for Internet Based Commerce Applications.

    Science.gov (United States)

    Siyal, M. Y.; Barkat, B.

    2002-01-01

    Presents a framework for enhancing trust in Internet commerce. Shows how trust can be provided through a network of Trust Service Providers (TSp). Identifies a set of services that should be offered by a TSp. Presents a distributed object-oriented implementation of trust services using CORBA, JAVA and XML. (Author/AEF)

  14. 12 CFR 330.10 - Revocable trust accounts.

    Science.gov (United States)

    2010-01-01

    ... includes a natural person as well as a charitable organization and other non-profit entity recognized as... with informal and formal testamentary revocable trusts. Such informal trusts are commonly referred to as payable-on-death accounts, in-trust-for accounts or Totten Trust accounts, and such formal...

  15. Trust Building via Risk Taking: A Cross-Societal Experiment

    Science.gov (United States)

    Cook, Karen S.; Yamagishi, Toshio; Cheshire, Coye; Cooper, Robin; Matsuda, Masafumi; Mashima, Rie

    2005-01-01

    The role of risk taking in building trust relations has largely been overlooked in the burgeoning literature on trust in the social sciences; yet it is central to understanding how trust develops. We argue that a series of risk-taking behaviors is indispensable to building a trust relation. We conducted experiments in Japan and the United States…

  16. DualTrust: A Trust Management Model for Swarm-Based Autonomic Computing Systems

    Energy Technology Data Exchange (ETDEWEB)

    Maiden, Wendy M. [Washington State Univ., Pullman, WA (United States)

    2010-05-01

    Trust management techniques must be adapted to the unique needs of the application architectures and problem domains to which they are applied. For autonomic computing systems that utilize mobile agents and ant colony algorithms for their sensor layer, certain characteristics of the mobile agent ant swarm -- their lightweight, ephemeral nature and indirect communication -- make this adaptation especially challenging. This thesis looks at the trust issues and opportunities in swarm-based autonomic computing systems and finds that by monitoring the trustworthiness of the autonomic managers rather than the swarming sensors, the trust management problem becomes much more scalable and still serves to protect the swarm. After analyzing the applicability of trust management research as it has been applied to architectures with similar characteristics, this thesis specifies the required characteristics for trust management mechanisms used to monitor the trustworthiness of entities in a swarm-based autonomic computing system and describes a trust model that meets these requirements.

  17. Do Reputation Systems Undermine Trust? Divergent Effects of Enforcement Type on Generalized Trust and Trustworthiness.

    Science.gov (United States)

    Kuwabara, Ko

    2015-03-01

    Research shows that enforcing cooperation using contracts or tangible sanctions can backfire, undermining people's intrinsic motivation to cooperate: when the enforcement is removed, people are less trusting or trustworthy than when there is no enforcement to begin with. The author examines whether reputation systems have similar consequences for generalized trust and trustworthiness. Using a web-based experiment simulating online market transactions (studies 1 and 2), he shows that reputation systems can reinforce generalized trust and trustworthiness, unlike contractual enforcement or relational enforcement based on repeated interactions. In a survey experiment (study 3), he finds that recalling their eBay feedback scores made participants more trusting and trustworthy. These results are predicated on the diffuse nature of reputational enforcement to reinforce perceptions of trust and trustworthiness. These results have implications for understanding how different forms of governance affect generalized trust and trustworthiness.

  18. Interpersonal trust and empathy in nurse-nurse relationships.

    Science.gov (United States)

    Northouse, P G

    1979-01-01

    The specific purpose of a study that examined interpersonal communication in ongoing nurse-nurse dyads was to ascertain the nature of the relationship between interpersonal trust and empathy in nurse-nurse interaction. Analysis of questionnaire data collected from a sample of 36 diploma school nursing instructors indicated slight correlations between specific trust and general trust and between general trust and empathy. A strong negative correlation was found between specific trust and empathy. Discussion centered on an explanation for the inverse relationship between specific trust and empathy and a proposed model for how trust functions in ongoing nurse-nurse dyads.

  19. Model of Trust Management in Open Network Environment

    Institute of Scientific and Technical Information of China (English)

    曹元大; 宁宇鹏

    2003-01-01

    To keep open network more efficacious and secure, it is necessary that a nice trust model and method of trust management must be developed. The reason why traditional trust models are incomplete in their function to manage trust is explained, and a general model based on hybrid trust model and introducer protocol is provided. The hybrid model is more flexible and efficacious to manage trust compared with hierarchy model and Web model. The introducer protocol is a better solution to build, maintain and refresh the trust relationship in open network environment.

  20. Dimensions of Trust: The Tensions and Challenges in Provider-Interpreter Trust

    OpenAIRE

    Hsieh, Elaine; Ju, Hyejung; Kong, Haiying

    2009-01-01

    This study problemtizes provider-interpreter trust, examining the challenges to providers' and interpreters' collaboration in bilingual health care. We conducted in-depth interviews and focus groups with 26 medical interpreters (from 17 languages) and 32 providers (from 4 specialties) in the United States to provide an empirically-based framework of provider-interpreter trust. Constant comparative analysis was used for data analysis. We identified four dimensions of trust, theoretical constru...

  1. A trans-domain convergence trust model for network trust architecture

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    This paper presents and analyses five existing trust models for the establishment of network trust architecture, based on that, a new public key infrastructure (PKI) interoperability trust mode with trans-domain convergence is proposed, moreover, its applications on the construction of interoperability models are compared with those of other five models, which shows that this new model maintains the independence and self-management of own system, namely, accords with practical PKI architecture operation.

  2. Research of Broken Wire Rope Detection System Based on LabVIEW

    Directory of Open Access Journals (Sweden)

    Jing-ge Gao

    2014-04-01

    Full Text Available In this study, we introduce how to detect broken wires in steel rope based on wavelet transform and virtual instrument technology. By means of the powerful data analysis function of virtual instrument and wavelet transform, the singularity of wires can be found and it could help to improve ability of locating broken wires and determining breakage grade.

  3. Takotsubo Cardiomyopathy (Broken-Heart Syndrome): A Short Review.

    Science.gov (United States)

    Potu, Kalyan Chakravarthy; Raizada, Amol; Gedela, Maheedhar; Stys, Adam

    2016-04-01

    Takotsubo cardiomyopathy, also called "broken heart" syndrome or apical ballooning syndrome, is a reversible cardiomyopathy characterized by left ventricular dysfunction and ballooning of the left ventricular apex on imaging during systole. It predominantly occurs in post-menopausal women and is commonly associated with emotional or physical stress. Patients commonly present with chest pain and electrocardiographic evidence of ST segment elevation or T-wave-mimicking acute coronary syndrome, but with an absence of angiographic evidence of obstructive coronary disease. The exact cause is unknown, but potential contributors include catecholamine excess and sympathetic nervous system hyperactivity. There is no consensus on pharmacological treatment of takotsubo cardiomyopathy. Based on the suspected pathophysiology of the disease, adrenergic blockade using beta-blocker therapy is employed. Near complete resolution of left ventricular wall motion dyskinesis occurs in the majority of takotsubo cardiomyopathy patients within a month. Although the prognosis is generally favorable, there are reports of complications during the acute phase, including cardiogenic shock, pulmonary edema, ventricular tachycardia, apical thrombus formation, and death. This review article will briefly discuss the epidemiology, etiology, clinical features, diagnostic evaluation, and treatment of this condition.

  4. Entanglement entropy in quantum spin chains with broken reflection symmetry

    CERN Document Server

    Kadar, Zoltan

    2010-01-01

    We investigate the entanglement entropy of a block of L sites in quasifree translation-invariant spin chains concentrating on the effect of reflection symmetry breaking. The majorana two-point functions corresponding to the Jordan-Wigner transformed fermionic modes are determined in the most general case; from these it follows that reflection symmetry in the ground state can only be broken if the model is quantum critical. The large L asymptotics of the entropy is calculated analytically for general gauge-invariant models, which has, until now, been done only for the reflection symmetric sector. Analytical results are also derived for certain non-gauge-invariant models, e.g. for the Ising model with Dzyaloshinskii-Moriya interaction. We also study numerically finite chains of length N with a non-reflection-symmetric Hamiltonian and report that the reflection symmetry of the entropy of the first L spins is violated but the reflection-symmetric Calabrese-Cardy formula is recovered asymptotically. Furthermore, f...

  5. Evidence of Broken Reciprocity in Cholesteric Liquid Crystals

    Science.gov (United States)

    Venkataraman, Nithya; Moreira, Michele; Taheri, Bahman; Palffy-Muhoray, Peter

    2007-03-01

    Reciprocity of scattering of a plane incident wave is predicated on bounded scattering media with symmetric and linear permittivity, conductivity and permeability. In chiral media, such as cholesteric liquid crystals, the dielectric tensor is asymmetric due the presence of odd powers of the wave vector resulting from nonlocality and broken inversion symmetry. Evidence of non-reciprocity has been found in optically active crystals by Bennet [1] and in stacks of cholesteric and nematic liquid crystal cells [2]. Here we present transmittance and reflectance data for cholesteric cells with different pitches having overlapping but distinct reflection bands. We relate our results to simple analytic descriptions of the materials properties and of propagating modes and assess them in light of the requirements for reciprocity. 1. P.J. Bennett, S. Dhanjal, Yu. P. Svirko and N. I. Zheludev, Opt. Lett. 21, 1955 (1996) 2. J. Hwang; M.H. Song; B. Park; S. Nishimura; T. Toyooka; J.W. Wu; Y. Takanishi; K. Ishikawa; H. Takezoe, Nat. Mat. 4, 383 (2005).

  6. Broken particle-hole symmetry in critical fluids

    Science.gov (United States)

    Goldstein, Raymond E.; Parola, Alberto

    1988-06-01

    The quantitative validity of asymptotic particle-hole symmetry in a fluid at its liquid-vapor critical point is determined by means of the exact mapping of the fluid Hamiltonian onto that of an effective Landau-Ginzburg-Wilson model studied first by Hubbard and Schofield. A particular three-particle correlation of a reference fluid is identified as that which controls the breaking of liquid-vapor symmetry, as manifested in a linear mixing of the pure Ising-like scaling fields and a singularity in the coexistence curve diameter. The inherent smallness of the mixing coefficient in a pair-potential fluid is shown to reflect the weak density dependence of the second moment of the two-particle direct correlation function of the reference system. It is further demonstrated that three-body interactions of the Axilrod-Teller-type enhance the broken particle-hole symmetry found in a purely pairwise-additive Hamiltonian, and detailed calculations give diameter anomaly amplitudes which vary linearly with the fluid polarizability, in quantitative agreement with recent experiments.

  7. Detection of a Misaligned Broken Pipe by Electromagnetic Interaction

    Science.gov (United States)

    Di Gregorio, Pietro Paolo; Frezza, Fabrizio; Mangini, Fabio; Ferrara, Vincenzo

    2016-04-01

    The study we are presenting concerns electromagnetic scattering of a plane wave due to the presence of a misaligned broken pipe buried in a half-space occupied by cement and by asphalt/ground, for civil-engineering applications. In order to simulate a realistic scenario, the pipe is supposed cylindrical and made of metallic or poly-vinyl chloride (PVC) material whose electromagnetic properties are known in the literature and dimensions are the most used in civil-engineering applications. We consider the longitudinal axis of the pipe running parallel to the air-cement interface. We suppose, after the break of the pipe, that the longitudinal axes of the two parts move on a plane parallel to the separation interface, in opposite directions. The study focuses on the electromagnetic response of the scattered electric field along a line above the interface of the media considering different distances between the longitudinal axis of the tubes in two cases: PVC and metallic material. To accomplish the study, a commercially available simulator based on the Finite Element Method (FEM) is adopted and a circularly-polarized plane wave impinging normally to the interface is considered. This kind of study could be useful for monitoring the status of buried pipes using ground penetrating radar (GPR) techniques in many applications of Civil Engineering without the need to intervene destructively in the structure. Acknowledgement This work is a contribution to COST Action TU1208 "Civil Engineering Applications of Ground Penetrating Radar" (www.GPRadar.eu, www.cost.eu).

  8. Broken R-parity, stop decays, and neutrino physics

    CERN Document Server

    Restrepo, D A; Valle, José W F; Restrepo, Diego; Porod, Werner; Valle, Jose W. F.

    2001-01-01

    We discuss the phenomenology of the lightest stop in models where R-parity is broken by bilinear superpotential terms. In this class of models we consider scenarios where the R-parity breaking two-body decay ~t_1->\\tau^+b competes with the leading three-body decays such as ~t_1->W^+b~\\chi^0_1. We demonstrate that the R-parity violating decay can be sizable and in some parts of the parameter space even the dominant one. Moreover we discuss the expectations for \\~t_1->\\mu^+b and ~t_1->e^+b. The recent results from solar and atmospheric neutrinos suggest that these are as important as the tau bottom mode. The \\~t_1->l^+b decays are of particular interest for hadron colliders, as they may allow a full mass reconstruction of the lighter stop. Moreover these decay modes allow cross checks on the neutrino mixing angle involved in the solar neutrino puzzle complementary to those possible using neutralino decays. For the so--called small mixing angle or SMA solution ~t_1->e^+b should be negligible, while for the large...

  9. Analysing Trust Transitivity and The Effects of Unknown Dependence

    Directory of Open Access Journals (Sweden)

    Touhid Bhuiyan

    2010-03-01

    Full Text Available Trust can be used to improve online automated recommendation within a given domain. Trust transitivity is used to make it successful. But trust transitivity has different interpretations. Trust and trust transitivity; both are the human mental phenomenon and for this reason, there is no such thing as objective transitivity. Trust transitivity and trust fusion both are important elements in computational trust. This paper analyses the parameter dependence problem in trust transitivity and proposes some definitions considering the effects of base rate. In addition, it also proposes belief functions based on subjective logic to analyse trust transitivity of three specified cases with sensitive and insensitive based rate. Then it presents a quantitative analysis of the effects of unknown dependence problem in an interconnected network environment; such Internet.

  10. Methodological Learning-by-doing: Challenges, lessons learned and rewards

    Directory of Open Access Journals (Sweden)

    Pernilla Pergert, RN, Ph.D.

    2009-06-01

    Full Text Available The experience of minus mentoring in learning classic grounded theory (CGT is shared by many people over the world. The aim of this article is to share experiences of learning and using CGT. Data for the article included methodological discussions in the author’s thesis and articles, as well as memos. Consequences of learning grounded theory by doing are presented in the form of challenges and lessons learned but also some rewards. Challenges and lessons learned include sampling-confusion, delimiting-disregarding, judging saturation and conceptual language-struggling. Rewards include trusting the method, insider-researcher and expert-resourcing. Presented rewards could be seen as advice and inspiration for novice GT researchers.

  11. 产品伤害危机后消费者信任修复策略研究%The Study on the Consumer Trust Repair Strategy after Product-harm Crises

    Institute of Scientific and Technical Information of China (English)

    熊焰; 钱婷婷

    2012-01-01

    Product-harm crisis which is caused by harms to consumers such as quality,servme,behavlor and many other aspects of related products, can bring about disastrous effects on the enterprise. The most direct impact of them is harmness of consumers' trust. Consumers' trust is one of the most valuable intangible resources for the enterprise, the study indicates that the consumer product the essence of product-harm crises is trust crisis. purchase decision is based on the trust to a large extent, Since 2006, SKII, KFC, Sanlu, Guangming, Toyota Motor and some other famous enterprises have broken out crisis successively, compared to previous, the amount of enterprises that are bothered by product-harm crisis and its frequency is increasing, the harm is continued deteriorating. Some enterprises respond properly and get through the crisis successfully, but others not. Therefore how to repair consumer trust in product harm crisis has practical application value. Researchers has given more and more attention to product-harm crisis, the situational crisis communication theory (SCCT) which is presented by Coombs(2007)has achieved extensive attention. The theory is based on the integration of existing results about crisis management, consider that when we do some crisis management, we must think over some crisis situation,crisis response strategy,matching system of crisis scenarios and crisis response strat- egies, etc. SCCT has considered various factors and their integration, is in accord with realistic scenario, and is recognized by many studies. However, the management of repair trust is rarely taken as the key variable in the existing research of product harm crisis. The present study is based on the situational crisis communication theory. It focus on the effectiveness of repairing the consumer trust by three response to crisis strategies put forward by the theory. At the same time, it is put in different critical situations which are divided by the types of

  12. How Much Do You Trust Me? Learning a Case-Based Model of Inverse Trust

    Science.gov (United States)

    2014-10-01

    How Much Do You Trust Me? Learning a Case-Based Model of Inverse Trust Michael W. Floyd1, Michael Drinkwater1, and David W. Aha2 1 Knexus Research...performance by providing new skills or improving existing skills. However, to get the full benefits of a robot the team must trust and use it appropriately. We...present an agent algorithm that allows a robot to estimate its trustworthiness and adapt its behavior in an attempt to increase trust . It uses case

  13. Online trust building through third party trust transfer and third party protection

    Science.gov (United States)

    Wandoko, Wanda; Saleh Abbas, Bahtiar; Budiastuti, Dyah; Kosala, Raymond

    2017-03-01

    The primary objective of this research is to develop an online trust building mechanism for SME (Small Medium Enterprise). Trust is very important in e-commerce. The nature of online shopping has a greater uncertainty than offline shopping. Seeing as there is an uncertainty that can produce risks, a prospective buyer’s trust is needed. A lot of people’s unwillingness to shop online is caused by their lack of trust toward e-commerce. E-commerce is said to be one of the ways for SME to compete with bigger companies. However, building trust requires immense time and cost. SME with limited resources may experience difficulties in building trust just with their own resources. Base on literature research that needs to be validated in next research, we found that trust can be built through trust transfer from the reputable and well-known trust-mark issuer, and third party protection such as escrow account service and credit card issuer.

  14. Touchstone of Trust inside Organizations: Antecedents of high-trust manager-employee relationships

    OpenAIRE

    2016-01-01

    This paper investigates what makes managers trust their employees whereby the leap of faith is taken to be the irrational touchstone of high-trust interpersonal relationships to emerge. We employ an explorative-inductive research design using semi-structured expert-interviews. Embedded within a framework of organizational decision-making, we find five cues to matter for high-trust manager-employee dyads: (1) managers’ expectations of an employee’s trust-worthiness, (2) his/her personal dispos...

  15. Generating citizen trust in e-government using a trust verification agent: A research note

    OpenAIRE

    Elliman, T

    2006-01-01

    Generating Citizen Trust in e-Government using a Trust Verification Agent This is an eGISE network paper. It is motivated by a concern about the extent to which trust issues inhibit a citizen’s take-up of online public sector services or engagement with public decision and policy making. A citizen’s decision to use online systems is influenced by their willingness to trust the environment and agency involved. This project addresses one aspect of individual “trust” decisions by provid...

  16. Generating citizen trust in e-government using a trust verification agent: A research note

    OpenAIRE

    Tassabehji, Rana; Elliman, Tony

    2006-01-01

    Generating Citizen Trust in e-Government using a Trust Verification Agent This is an eGISE network paper. It is motivated by a concern about the extent to which trust issues inhibit a citizen’s take-up of online public sector services or engagement with public decision and policy making. A citizen’s decision to use online systems is influenced by their willingness to trust the environment and agency involved. This project addresses one aspect of individual “trust” decisions by providing...

  17. Trust Based Routing in Ad Hoc Network

    Science.gov (United States)

    Talati, Mikita V.; Valiveti, Sharada; Kotecha, K.

    Ad Hoc network often termed as an infrastructure-less, self- organized or spontaneous network.The execution and survival of an ad-hoc network is solely dependent upon the cooperative and trusting nature of its nodes. However, this naive dependency on intermediate nodes makes the ad-hoc network vulnerable to passive and active attacks by malicious nodes and cause inflict severe damage. A number of protocols have been developed to secure ad-hoc networks using cryptographic schemes, but all rely on the presence of trust authority. Due to mobility of nodes and limitation of resources in wireless network one interesting research area in MANET is routing. This paper offers various trust models and trust based routing protocols to improve the trustworthiness of the neighborhood.Thus it helps in selecting the most secure and trustworthy route from the available ones for the data transfer.

  18. Analyzing Trust Perceptions in System Implementations

    DEFF Research Database (Denmark)

    Schlichter, Bjarne Rerup; Rose, Jeremy

    2009-01-01

    Implementations of large scale information systems are complex and problematic with a reputation for being delayed and going over budget. A critical factor in the success of these implementations is trust in the system, in the project and between the various stakeholders. As problems and delays...... mount, trust relations become strained, leading to a circle of suspicion and disbelief which is both destructive and hard to break out of. This case study analyses trust relations during a problematic period of time in the implementation of the Faroese integrated healthcare information system, using....... A major contribution is that if an implementation project interacts with many or complex abstract systems, the managers must focus on continuous embedding and re-embedding by interacting directly with representatives of the abstract systems in question to maintain trust. Also we observe that actors...

  19. Trust in Co-sourced Software Development

    DEFF Research Database (Denmark)

    Schlichter, Bjarne Rerup; Persson, John Stouby

    2014-01-01

    Software development projects are increasingly geographical distributed with offshoring. Co-sourcing is a highly integrative and cohesive approach, seen successful, to software development offshoring. However, research of how dynamic aspects of trust are shaped in co-sourcing activities is limited....... We present a case study of how the co-sourcing relationship between a certified CMMI-level 5 Danish software company and an offshoring supplier can be conceptualized as an Abstract System. An Abstract System is a dis-embedded social system (such as banking) that is trusted despite lack of detailed...... understanding or personal trust relations. The paper suggests how certain work practices among developers and managers can be explained using a dynamic trust lens based on Abstract Systems, especially dis- and re-embedding mechanisms...

  20. HYBRID TRUST MODEL FOR INTERNET ROUTING

    Directory of Open Access Journals (Sweden)

    Pekka Rantala

    2011-05-01

    Full Text Available The current Internet is based on a fundamental assumption of reliability and good intent among actors inthe network. Unfortunately, unreliable and malicious behaviour is becoming a major obstacle forInternet communication. In order to improve the trustworthiness and reliability of the networkinfrastructure, we propose a novel trust model to be incorporated into BGP routing. In our approach,trust model is defined by combining voting and recommendation to direct trust estimation for neighbourrouters located in different autonomous systems. We illustrate the impact of our approach with cases thatdemonstrate the indication of distrusted paths beyond the nearest neighbours and the detection of adistrusted neighbour advertising a trusted path. We simulated the impact of weighting voted and directtrust in a rectangular grid of 15*15 nodes (autonomous systems with a randomly connected topology.

  1. Trust Ownership of the Tata Group

    DEFF Research Database (Denmark)

    Thomsen, Steen

    The Indian Tata Group is one of the largest and most admired business groups in the world. It has 28 listed subsidiaries and more than 80 operating businesses. It has shown strong financial performance and social responsibility for decades. Interestingly, it has a unique ownership structure......: the main holding company Tata Sons Limited is majority-owned by charitable trusts. We examine the governance of this remarkable entity. The Trusts own 66% of Tata Sons, the main holding company of the Group, while members of the founding Tata family are very small minority shareholders. The governance...... structure is characterized by managerial distance between trusts and Group companies. The Trusts are almost exclusively concerned with philanthropy, and according to the Articles of Association of Tata Sons Limited, their governance role is limited to nominating two members to the Selection Committee which...

  2. The Contextual Antecedents of Organizational Trust

    DEFF Research Database (Denmark)

    Li, Peter Ping; Bai, Yuntao; Xi, Youmin

    2012-01-01

    In this article we seek to explore the contextual antecedents of organizational trust. In light of the complex links between organizational contexts and organizational behaviours, we focus on the effects of the three most critical contextual antecedents, i.e., leadership role, structural rule......, and cultural norm at the organizational level, on organizational trust directly, and their behavioural outcomes at the individual level indirectly, using organizational trust as a cross-level mediator. The empirical results, based on a hierarchical linear model with a sample of 444 employees from 82 firms...... in China, lent support for our multidimensional cross-level model of context–trust–behaviour link. We extend the research on organizational trust by treating it as a cross-level phenomenon and by specifying its core contextual antecedents and behavioural consequences....

  3. Scrap the NMC, says former trust chair.

    Science.gov (United States)

    2012-11-21

    The Nursing and Midwifery Council should be scrapped and the responsibility for dealing with problems handed to employers, a former NHS trust chair told delegates at the Royal College of Midwives conference.

  4. Testosterone inhibits trust but promotes reciprocity.

    Science.gov (United States)

    Boksem, Maarten A S; Mehta, Pranjal H; Van den Bergh, Bram; van Son, Veerle; Trautmann, Stefan T; Roelofs, Karin; Smidts, Ale; Sanfey, Alan G

    2013-11-01

    The steroid hormone testosterone has been associated with behavior intended to obtain or maintain high social status. Although such behavior is typically characterized as aggressive and competitive, it is clear that high social status is achieved and maintained not only through antisocial behavior but also through prosocial behavior. In the present experiment, we investigated the impact of testosterone administration on trust and reciprocity using a double-blind randomized control design. We found that a single dose of 0.5 mg of testosterone decreased trust but increased generosity when repaying trust. These findings suggest that testosterone may mediate different types of status-seeking behavior. It may increase competitive, potentially aggressive, and antisocial behavior when social challenges and threats (i.e., abuse of trust and betrayal) need to be considered; however, it may promote prosocial behavior in the absence of these threats, when high status and good reputation may be best served by prosocial behavior.

  5. Usability and trust in e-banking.

    Science.gov (United States)

    Pravettoni, Gabriella; Leotta, Salvatore Nuccio; Lucchiari, Claudio; Misuraca, Raffaella

    2007-12-01

    This study assessed the role of usability in trust of e-banking services. A questionnaire was administered to 185 Italian undergraduate working students who volunteered for the experiment (M age = 30.5 yr., SD = 3.1). Participants were differentiated on computer ability (Expert, n = 104; Nonexpert, n = 81) and e-banking use (User, n = 93; Nonusers, n = 92). Analysis showed that the website usability of e-banking services did not play a very important role for the User group. Instead, institution-based trust, e.g., the trust in the security policy of the Web merchant, customers, and the overall trust of the bank were the crucial factors in the adoption of e-banking.

  6. Matrix Powers algorithm for trust evaluation in PKI architectures

    CERN Document Server

    Dumas, Jean-Guillaume

    2011-01-01

    Public-Key Infrastructures (PKI) are considered as the safeguard of the security of communications on large scales networks like Internet. Different trust models have been proposed to interconnect the various PKIs components in order to propagate the trust between them. This paper provides a simple model for trust and reputation management in PKI architectures, and a new algorithm to assess trust relationships in a network using different trust evaluation schemes.

  7. Managing trust in information systems by using computer simulations

    OpenAIRE

    Zupančič, Eva

    2009-01-01

    Human factor is more and more important in new information systems and it should be also taken into consideration when developing new systems. Trust issues, which are tightly tied to human factor, are becoming an important topic in computer science. In this work we research trust in IT systems and present computer-based trust management solutions. After a review of qualitative and quantitative methods for trust management, a precise description of a simulation tool for trust management ana...

  8. Social Trust and the Growth of Schooling

    DEFF Research Database (Denmark)

    Bjørnskov, Christian

    2009-01-01

    The paper develops a simple model to examine how social trust might affect the growth of schooling through lowering transaction costs associated with employing educated individuals. In a sample of 52 countries, the paper thereafter provides empirical evidence that trust has led to faster growth...... of schooling in the period 1960-2000. The findings are robust to the inclusion of a set of control variables and being estimated using an instrumental variables approach....

  9. Gaining Customers` Trust In Online Stores

    OpenAIRE

    Anamaria Severin-Humelnicu

    2010-01-01

    Trust is very important in running businesses on the Internet. It plays a significant role in the actions a consumer undertakes in the online purchase process. An online store will never reach the desired level of sales until it gains the trust of its consumers. Building confidence is the key of succes in electronic commerce. Therefore, any online retailer should strive to achieve this goal

  10. Trust-Based Leadership in the Making

    DEFF Research Database (Denmark)

    Bentzen, Tina Øllgaard; Jagd, Søren

    may be seen as a process involving multiple actors contributing to the implementation in diverse ways. The Trust Reform is a complex and fragile process giving rise to radical changes in roles and competences needed for leaders and for employees at different levels in the organization. The study also...... indicates that the implementation of a radical management reform involves a complex interplay of trust relations between actors at multiple levels of the organization....

  11. The Relationship between Teamwork and Organizational Trust

    OpenAIRE

    Musab Işık; Kürşad Timuroğlu; Yussuf Aliyev

    2015-01-01

    The aim of this study is to investigate the relationship between teamwork and organizational trust. In the implementation section the data from the survey of 250 workers is employed in call centers in Erzurum by using relevant statistical methods. Consequently, it is found that there is a positive and significant relationship between teamwork and organizational trust. Thus, the hypothesis of the study is supported as it was expected. Besides, it is found that there are positive and significan...

  12. Patient care: Is interpersonal trust missing?

    Directory of Open Access Journals (Sweden)

    Paul A Bourne

    2010-01-01

    Full Text Available Background : Health statistics and studies in the Caribbean have omitted interpersonal trust in their investigations. Aims : This study will examine the effect of interpersonal trust and other conditions on psychosocial subjective wellbeing and self-reported health, in order to assess the significance of interpersonal trust, as well as other socio-demographic factors on health. Materials and Method : The current study utilized primary data commissioned by the Centre of Leadership and Governance, Department of Government, the University of West Indies, Mona, Jamaica, between July and August 2006. It was a nationally representative probability sampling survey. A sample of 1,338 respondents was interviewed with a detailed 166-item questionnaire. Results : Generally, the psychosocial subjective wellbeing of Jamaicans was high (mean = 6.8 ΁ 1.8, and self-reported health was moderately high (mean = 6.3 ΁ 2.6. The current study has revealed that income, political system, subjective social class, employment status, and interpersonal trust determine psychosocial subjective wellbeing as well as self-reported health. Interpersonal trust accounted for between 9.4 to 10.4% of the explanatory power of the wellbeing and self-reported health of Jamaicans. Conclusion : The current study highlights that the determinants of health include interpersonal trust. It is critical to point out here that trust must be taken into consideration in any evaluation of health statistics, as it is a factor of subjective wellbeing and health. It is within this context that clinicians need to incorporate interpersonal trust along with other conditions, as it is a part of the psychosocial determinants of health, subjective wellbeing, and health treatment.

  13. The Corolla Polynomial for Spontaneously Broken Gauge Theories

    Science.gov (United States)

    Prinz, David

    2016-09-01

    In Kreimer and Yeats (Electr. J. Comb. 41-41, 2013), Kreimer et al. (Annals Phys. 336, 180-222, 2013) and Sars (2015) the Corolla Polynomial C ({Γ }) in C [a_{h1}, ldots , a_{h_{ \\vert {Γ }^{[1/2]} \\vert }}] was introduced as a graph polynomial in half-edge variables {ah}_{h in {Γ }^{[1/2]}} over a 3-regular scalar quantum field theory (QFT) Feynman graph Γ. It allows for a covariant quantization of pure Yang-Mills theory without the need for introducing ghost fields, clarifies the relation between quantum gauge theory and scalar QFT with cubic interaction and translates back the problem of renormalizing quantum gauge theory to the problem of renormalizing scalar QFT with cubic interaction (which is super renormalizable in 4 dimensions of spacetime). Furthermore, it is, as we believe, useful for computer calculations. In Prinz (2015) on which this paper is based the formulation of Kreimer and Yeats (Electr. J. Comb. 41-41, 2013), Kreimer et al. (Annals Phys. 336, 180-222, 2013) and Sars (2015) gets slightly altered in a fashion specialized in the case of the Feynman gauge. It is then formulated as a graph polynomial C ({Γ } ) in C [a_{h_{1 ± }}, ldots , a_{h_{ \\vert {Γ }^{[1/2]} \\vert } {h}_{± }}, b_{h1}, ldots , b_{h_{ \\vert {Γ }^{[1/2]} \\vert }}] in three different types of half-edge variables {a_{h+} , a_{h-} , bh}_{h in {Γ }^{[1/2]}} . This formulation is also suitable for the generalization to the case of spontaneously broken gauge theories (in particular all bosons from the Standard Model), as was first worked out in Prinz (2015) and gets reviewed here.

  14. Lessons of Educational Technology

    Directory of Open Access Journals (Sweden)

    Manuela Repetto

    2006-01-01

    Full Text Available Reception of the book "Lessons of Educational Technology." The book contains materials work in certain aspects relevant to the formation of a teacher who is able to meet the challenges of society 'knowledge.

  15. In Public Education Expenditures We Trust: Does Trust Increase Support for Public Education Expenditures?

    Science.gov (United States)

    Gur, Nurullah; Boyaci, Israfil; Ozcan, Yunus

    2015-01-01

    Trust is one crucial prerequisite for the welfare state. However, very few empirical studies exist that help us understand the mechanisms through which trust affects the welfare state. Influencing public support for developing friendly public policies might be one of these mechanisms. In this study, we use unique micro data from 34 countries to…

  16. Building a Culture of Trust: Trust in the Use of Educational Technology

    Science.gov (United States)

    Kirkman, Jacqueline

    2014-01-01

    This paper investigates the place of trust in a school context and its importance in achieving the aims of schooling, "namely high academic performance and positive affects among members of the school community" (Forsyth, 2008). The role of trust in the use of technology and technological change is examined. Literature is surveyed in the…

  17. Novel indices for broken rotor bars fault diagnosis in induction motors using wavelet transform

    Science.gov (United States)

    Ebrahimi, Bashir Mahdi; Faiz, Jawad; Lotfi-fard, S.; Pillay, P.

    2012-07-01

    This paper introduces novel indices for broken rotor bars diagnosis in three-phase induction motors based on wavelet coefficients of stator current in a specific frequency band. These indices enable to diagnose occurrence and determine number of broken bars in different loads precisely. Besides thanks to the suitability of wavelet transform in transient conditions, it is possible to detect the fault during the start-up of the motor. This is important in the case of start-up of large induction motors with long starting time and also motors with frequent start-up. Furthermore, broken rotor bars in induction motor are detected using spectra analysis of the stator current. It is also shown that rise of number of broken bars and load levels increases amplitude of the particular side-band components of the stator currents in the faulty case. An induction motor with 1, 2, 3 and 4 broken bars at the rated load and the motor with 4 broken bars at no-load, 33%, 66%, 100% and 133% rated load are investigated. Time stepping finite element method is used for modeling broken rotor bars faults in induction motors. In this modeling, effects of the stator winding distribution, stator and rotor slots, geometrical and physical characteristics of different parts of the motor and non-linearity of the core materials are taken into account. The simulation results are are verified by the experimental results.

  18. Corn replacement by broken rice in meat-type quail diets

    Directory of Open Access Journals (Sweden)

    TMB Filgueira

    2014-12-01

    Full Text Available An experiment was conducted to evaluate the effects of broken rice inclusion as substitute for corn in the diet on the performance, carcass yield, and economic viability of meat-type quails between 7 and 49 days of age. A number of 288 quails was distributed according to a completely randomized design into six treatments with six replicates of eight birds each. Treatments consisted of increasing levels of broken rice (0, 20, 40, 60, 80 and 100% in replacement of corn. Increasing levels of corn substitution by broken rice in the diet of 7- to 49-day-old meat-type quails did not affect feed intake, weight gain or feed conversion ratio (p>0.05. Relative to carcass traits, the inclusion of broken rice in the diets did not influence (p>0.05 dressing percentage or breast, leg (thigh+drumstick, liver, and gizzard yields. Moreover, feed cost per kilogram of live weight gain, cost index, and economic efficiency index were not influenced by the replacement of corn by broken rice in the diets. The performance, carcass traits and economic viability of broilers fed the different levels of broken rice inclusion were not different from the control group (p>0.05. These results indicate the economic viability of total replacement of corn by broken rice in the feeding of meat-type quails.

  19. Time-Based Dynamic Trust Model Using Ant Colony Algorithm

    Institute of Scientific and Technical Information of China (English)

    TANG Zhuo; LU Zhengding; LI Kai

    2006-01-01

    The trust in distributed environment is uncertain, which is variation for various factors. This paper introduces TDTM, a model for time-based dynamic trust. Every entity in the distribute environment is endowed with a trust-vector, which figures the trust intensity between this entity and the others. The trust intensity is dynamic due to the time and the inter-operation between two entities, a method is proposed to quantify this change based on the mind of ant colony algorithm and then an algorithm for the transfer of trust relation is also proposed. Furthermore, this paper analyses the influence to the trust intensity among all entities that is aroused by the change of trust intensity between the two entities, and presents an algorithm to resolve the problem. Finally, we show the process of the trusts'change that is aroused by the time' lapse and the inter-operation through an instance.

  20. Of Money And Trust In Biomedical Care

    Directory of Open Access Journals (Sweden)

    Joel Lexchin

    2007-01-01

    Full Text Available Over the past few years we have been repeatedly told that we now live in an evidence-based medical world. That should be good news since evidence comes from science. But on a deeper level doctors' and the public's faith in science rests on trust; trust that the right questions have been asked, trust that the clinical trials have been done correctly, trust that the results of the trials have been interpreted in the proper manner and trust that what finally appears in medical journals and clinical practice guidelines accurately reflects what is known. Erosion of Trust However, this trust is being eroded because of the growing links between the pharmaceutical industry and medicine. At the start of 2006 an influential group of American academics proposed the complete elimination of practices that lead to situations of potential conflict-of-interest in academic medical centres (Brennan et al. , 2006. A few years ago few people would have advocated such a dramatic move but accumulating research has shown the dangers of maintaining such a liaison. Gifts, in the form of trips to resort areas to hear about the virtues of new drugs, can dramatically affect the prescribing behaviour of doctors even when the new drug has no advantage over existing ones and the doctors themselves, before they left on the trip, denied that they could be swayed by such favours (Orlowski et al. , 1992. Denial that they can be influenced is a common finding amongst doctors. Only 1% of residents admitted that they could be influenced a great deal by pharmaceutical sales representatives but they were less certain about their colleagues. They felt that a third of their colleagues could be influenced a great deal and another 16% could be influenced a bit (Steinman et al. , 2001. [No abstract available.

  1. Trust in health information websites: A systematic literature review on the antecedents of trust.

    Science.gov (United States)

    Kim, Yeolib

    2016-06-01

    Health websites are important sources of information for consumers. In choosing websites, trust in websites largely determines which website to access and how to best utilize the information. Thus, it is critical to understand why consumers trust certain websites and distrust others. A systematic literature review was conducted with the goal of identifying the antecedents of trust in health information websites. After four rounds of screening process, 20 articles between 2000 and 2013 were harvested. Factors that determine trust are classified into individual difference antecedents, website-related antecedents, and consumer-to-website interaction-related antecedents. The most frequently studied antecedents were socio-demographics, information quality, appearance, and perceived reputation of the website. Each antecedent of trust are discussed in detail and future research directions are proposed.

  2. Can one trust quantum simulators?

    Science.gov (United States)

    Hauke, Philipp; Cucchietti, Fernando M; Tagliacozzo, Luca; Deutsch, Ivan; Lewenstein, Maciej

    2012-08-01

    Various fundamental phenomena of strongly correlated quantum systems such as high-T(c) superconductivity, the fractional quantum-Hall effect and quark confinement are still awaiting a universally accepted explanation. The main obstacle is the computational complexity of solving even the most simplified theoretical models which are designed to capture the relevant quantum correlations of the many-body system of interest. In his seminal 1982 paper (Feynman 1982 Int. J. Theor. Phys. 21 467), Richard Feynman suggested that such models might be solved by 'simulation' with a new type of computer whose constituent parts are effectively governed by a desired quantum many-body dynamics. Measurements on this engineered machine, now known as a 'quantum simulator,' would reveal some unknown or difficult to compute properties of a model of interest. We argue that a useful quantum simulator must satisfy four conditions: relevance, controllability, reliability and efficiency. We review the current state of the art of digital and analog quantum simulators. Whereas so far the majority of the focus, both theoretically and experimentally, has been on controllability of relevant models, we emphasize here the need for a careful analysis of reliability and efficiency in the presence of imperfections. We discuss how disorder and noise can impact these conditions, and illustrate our concerns with novel numerical simulations of a paradigmatic example: a disordered quantum spin chain governed by the Ising model in a transverse magnetic field. We find that disorder can decrease the reliability of an analog quantum simulator of this model, although large errors in local observables are introduced only for strong levels of disorder. We conclude that the answer to the question 'Can we trust quantum simulators?' is … to some extent.

  3. Characteristics of Scour and Deposition in Front of Breakwaters Under Irregular Broken Clapotis

    Institute of Scientific and Technical Information of China (English)

    高学平; 张亚; 李昌良

    2004-01-01

    First the scour and deposition patterns of the sandy seabed in front of a vertical breakwater under the action of irregular broken clapotis are investigated experimentally and classified into five types: scour type Ⅰ , scour type Ⅱ , scour typeⅢ, deposition type Ⅰ , and deposition type Ⅱ . Secondly, the processes of formation of scour and deposition patterns are probed in comparison with those induced by regular broken clapotis and standing waves. Thirdly, the criteria for distinguishing scour and deposition patterns under irregular broken clapotis are presented.

  4. The value of trust in biotech crop development: a case study of Bt cotton in Burkina Faso

    Directory of Open Access Journals (Sweden)

    Ezezika Obidimma C

    2012-11-01

    Full Text Available Abstract Background Agricultural biotechnology public-private partnerships (PPPs have been recognized as having great potential in improving agricultural productivity and increasing food production in sub-Saharan Africa. However, there is much public skepticism about the use of GM (genetically modified crops and suspicion about private sector involvement in agbiotech projects. This case study sought to understand the role of trust in the Bacillus thuringiensis (Bt cotton in Burkina Faso project by exploring practices and challenges associated with trust-building, and determining what makes these practices effective from the perspective of multiple stakeholders. Methods We conducted semi-structured, face-to-face interviews to obtain stakeholders’ understanding of trust in general as well as in the context of agbiotech PPPs. Relevant documents and articles were analyzed to generate descriptions of how trust was operationalized in this evolving agbiotech PPP. Data was analyzed based on emergent themes to create a comprehensive narrative on how trust is understood and built among the partners and with the community. Results We derived four key lessons from our findings. First, strong collaboration between research, industry and farmers greatly contributes to both the success of, and fostering of trust in, the partnership. Second, this case study also revealed the important, though often unrecognized, role of researchers as players in the communication strategy of the project. Third, effective and comprehensive communication takes into account issues such as illiteracy and diversity. Fourth, follow-up at the field level and the need for a multifaceted communications strategy is important for helping push the project forward. Conclusions Burkina Faso’s well-established and effective cotton selling system laid the foundation for the implementation of the Bt cotton project – particularly, the strong dialogue and the receptivity to collaboration

  5. Does Generalized (Dis)trust Travel? Examining the Impact of Cultural Heritage and Destination Country Environment on Trust of Immigrants

    DEFF Research Database (Denmark)

    Dinesen, Peter Thisted

    2012-01-01

    perspective predicts that trust of immigrants will change according to the environment of the destination country. This article examines how first-generation immigrants from three low-trust countries of origin (Turkey, Poland, and Italy) are affected by migrating to high-trust countries in Northern Europe......, which hold qualities conducive to trust. In contrast to earlier studies examining trust of immigrants, I build on one data set containing data on both migrants and nonmigrants from the same country of origin as well as on a wide range of relevant covariates of trust. Using the method of matching......, the results of the analysis lend most support to the experiential perspective on trust as the destination-country context has a massive impact on trust of immigrants, who display significantly higher levels of trust than comparable respondents in their country of origin. The results are robust to limiting...

  6. Do Institutions or Culture Determine the Level of Social Trust?

    DEFF Research Database (Denmark)

    Nannestad, Peter; Svendsen, Gert Tinggard; Dinesen, Peter Thisted;

    2014-01-01

    hand, the migrants' level of social trust is determined by their culture, it should not be affected by a different institutional setting. Furthermore, culturally diverse immigrant groups should have different levels of social trust in the same host country. Analysing migration from several non......Do institutions or culture determine levels of social trust in society? If quality of institutions determines levels of social trust, migrants from countries with lower-quality institutions should enhance their level of social trust in countries with higher-quality institutions. If, on the other......-western countries to Denmark, this paper demonstrates that institutions rather than culture matter for social trust....

  7. Wireless next generation networks a virtue-based trust model

    CERN Document Server

    Harvey, Melissa

    2014-01-01

    This SpringerBrief proposes a trust model motivated by virtue epistemology, addressing the need for a more efficient and flexible trust model for wireless next generation networks. This theory of trust simplifies the computation and communication overhead of strictly cognitive-computational models of trust. Both the advantages and the challenges of virtue-based trust models are discussed. This brief offers new research and a general theory of rationality that enables users to interpret trust and reason as complementary mechanisms that guide our rational conduct at two different epistemic level

  8. Introduction to Hardware Security and Trust

    CERN Document Server

    Wang, Cliff

    2012-01-01

    The emergence of a globalized, horizontal semiconductor business model raises a set of concerns involving the security and trust of the information systems on which modern society is increasingly reliant for mission-critical functionality. Hardware-oriented security and trust issues span a broad range including threats related to the malicious insertion of Trojan circuits designed, e.g.,to act as a ‘kill switch’ to disable a chip, to integrated circuit (IC) piracy,and to attacks designed to extract encryption keys and IP from a chip. This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade.  Coverage includes security and trust issues in all types of electronic devices and systems such as ASICs, COTS, FPGAs, microprocessors/DSPs, and embedded systems.  This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of,and trust in, modern society�...

  9. Breathing Life into Engineering: A Lesson Study Life Science Lesson

    Science.gov (United States)

    Lawrence, Maria; Yang, Li-Ling; Briggs, May; Hession, Alicia; Koussa, Anita; Wagoner, Lisa

    2016-01-01

    A fifth grade life science lesson was implemented through a lesson study approach in two fifth grade classrooms. The research lesson was designed by a team of four elementary school teachers with the goal of emphasizing engineering practices consistent with the "Next Generation Science Standards" (NGSS) (Achieve Inc. 2013). The fifth…

  10. Creating A Guided- discovery Lesson

    Institute of Scientific and Technical Information of China (English)

    田枫

    2005-01-01

    In a guided - discovery lesson, students sequentially uncover layers of mathematical information one step at a time and learn new mathematics. We have identified eight critical steps necessary in developing a successful guided- discovery lesson.

  11. Overcoming barriers to trust in agricultural biotechnology projects: a case study of Bt cowpea in Nigeria

    Directory of Open Access Journals (Sweden)

    Ezezika Obidimma C

    2012-11-01

    Full Text Available Abstract Background Nigeria, Africa’s most populous country, has been the world’s largest cowpea importer since 2004. The country is currently in the early phases of confined field trials for two genetically modified crops: Bacillus thuringiensis (Bt cowpea and nutritionally enhanced cassava (“BioCassava Plus”. Using the bio-safety guidelines process as a backdrop, we evaluate the role of trust in the operation of the Cowpea Productivity Improvement Project, which is an international agricultural biotechnology public-private partnership (PPP aimed at providing pest-resistant cowpea varieties to Nigerian farmers. Methods We reviewed the published literature and collected data through direct observations and semi-structured, face-to-face interviews. Data were analyzed based on emergent themes to create a comprehensive narrative on how trust is understood and built among the partners and with the community. Results Our findings highlight the importance of respecting mandates and eliminating conflicts of interest; holding community engagement initiatives early on; having on-going internal discussion and planning; and serving a locally-defined need. These four lessons could prove helpful to other agricultural biotechnology initiatives in which partners may face similar trust-related challenges. Conclusions Overcoming challenges to building trust requires concerted effort throughout all stages of project implementation. Currently, plans are being made to backcross the cowpea strain into a local variety in Nigeria. The development and adoption of the Bt cowpea seed hinges on the adoption of a National Biosafety Law in Nigeria. For countries that have decided to adopt biotech crops, the Nigerian cowpea experiment can be used as a model for other West African nations, and is actually applied as such in Ghana and Burkina Faso, interested in developing a Bt cowpea.

  12. Trust, conflict, and cooperation: a meta-analysis.

    Science.gov (United States)

    Balliet, Daniel; Van Lange, Paul A M

    2013-09-01

    Many theories of trust emphasize that trust is most relevant to behavior in situations involving a conflict of interests. However, it is not clear how trust relates to behavior across situations that differ in the degree of conflicting interest: Does trust matter more when the conflict of interest is small or large? According to an interdependence perspective, trust becomes an especially important determinant of behavior in situations involving larger, compared to smaller, degrees of conflicting interests. To examine this perspective, we conducted a meta-analysis involving 212 effect sizes on the relation between trust (both state and dispositional trust in others) and cooperation in social dilemmas-situations that involve varying degrees of conflict between self-interest and collective interest. Results revealed that the positive relation between trust and cooperation is stronger when there is a larger, compared to smaller, degree of conflict. We also examined several other possible moderators of the relation between trust and cooperation. The relation between trust and cooperation was stronger during individual, compared to intergroup, interactions but did not vary as a function of the situation being either a one-shot or repeated interaction. We also find differences across countries in the extent that people condition their own cooperation based on their trust in others. We discuss how the results support an emerging consensus about trust being limited to situations of conflict and address some theoretical and societal implications for our understanding of how and why trust is so important to social interactions and relationships.

  13. An Extended Case Study Methoology for Investigating Influence of Cultural, Organizational, and Automation Factors on Human-Automation Trust

    Science.gov (United States)

    Koltai, Kolina Sun; Ho, Nhut; Masequesmay, Gina; Niedober, David; Skoog, Mark; Johnson, Walter; Cacanindin, Artemio

    2014-01-01

    This paper discusses a case study that examined the influence of cultural, organizational and automation capability upon human trust in, and reliance on, automation. In particular, this paper focuses on the design and application of an extended case study methodology, and on the foundational lessons revealed by it. Experimental test pilots involved in the research and development of the US Air Forces newly developed Automatic Ground Collision Avoidance System served as the context for this examination. An eclectic, multi-pronged approach was designed to conduct this case study, and proved effective in addressing the challenges associated with the cases politically sensitive and military environment. Key results indicate that the system design was in alignment with pilot culture and organizational mission, indicating the potential for appropriate trust development in operational pilots. These include the low-vulnerabilityhigh risk nature of the pilot profession, automation transparency and suspicion, system reputation, and the setup of and communications among organizations involved in the system development.

  14. Measuring Institutional Trust: Evidence from Guyana

    Directory of Open Access Journals (Sweden)

    Troy Devon Thomas

    2015-01-01

    Full Text Available Institutional trust is often measured by several items that are analyzed individually or as sum-scores. However, it is difficult to summarize the results of individual-items analyses, whereas sum-scores may be meaningless if the dimensions that the items are assumed to measure are not verified. Although these limitations are circumvented by using factor analysis, response styles may still bias research results. We use data from Guyana to show that a second-order factor model is appropriate for measuring institutional trust. We also demonstrate that response styles can inflate item and factor convergent validity and may either distort regression effects or create completely spurious ones. We therefore recommend using factor models with corrections for response styles in institutional trust research instead of sum-scores and individual-items analyses.

  15. Distributed Trust Management for Validating SLA Choreographies

    Science.gov (United States)

    Haq, Irfan Ul; Alnemr, Rehab; Paschke, Adrian; Schikuta, Erich; Boley, Harold; Meinel, Christoph

    For business workflow automation in a service-enriched environment such as a grid or a cloud, services scattered across heterogeneous Virtual Organizations (VOs) can be aggregated in a producer-consumer manner, building hierarchical structures of added value. In order to preserve the supply chain, the Service Level Agreements (SLAs) corresponding to the underlying choreography of services should also be incrementally aggregated. This cross-VO hierarchical SLA aggregation requires validation, for which a distributed trust system becomes a prerequisite. Elaborating our previous work on rule-based SLA validation, we propose a hybrid distributed trust model. This new model is based on Public Key Infrastructure (PKI) and reputation-based trust systems. It helps preventing SLA violations by identifying violation-prone services at service selection stage and actively contributes in breach management at the time of penalty enforcement.

  16. Modelling Users` Trust in Online Social Networks

    Directory of Open Access Journals (Sweden)

    Iacob Cătoiu

    2014-02-01

    Full Text Available Previous studies (McKnight, Lankton and Tripp, 2011; Liao, Lui and Chen, 2011 have shown the crucial role of trust when choosing to disclose sensitive information online. This is the case of online social networks users, who must disclose a certain amount of personal data in order to gain access to these online services. Taking into account privacy calculus model and the risk/benefit ratio, we propose a model of users’ trust in online social networks with four variables. We have adapted metrics for the purpose of our study and we have assessed their reliability and validity. We use a Partial Least Squares (PLS based structural equation modelling analysis, which validated all our initial assumptions, indicating that our three predictors (privacy concerns, perceived benefits and perceived risks explain 48% of the variation of users’ trust in online social networks, the resulting variable of our study. We also discuss the implications and further research opportunities of our study.

  17. A Marketing Perspective: Try Looking at Charitable Trusts from the Donor's Point of View.

    Science.gov (United States)

    Thoren, Linda J.

    1979-01-01

    Charitable remainder trusts and charitable income trusts are discussed as essentials in any "marketing mix" of gift-giving options. Unitrusts and annuity trusts are described and tax benefits of the charitable income trust are explained. (MLW)

  18. Duality and Other Exotic Gauge Dynamics in Software Broken Supersymmetric QCD

    CERN Document Server

    Peskin, M

    2003-01-01

    We analyze the theory of softly broken supersymmetric QCD. Exotic behavior like spontaneously broken baryon number, massless composite fermions and Seiberg's duality seems to persist also in the presence of (small) soft supersymmetry breaking. We argue that certain, specially tailored, lattice simulations may be able to detect the novel phenomena. Most of the exotic behavior does not survive the decoupling limit of large SUSY breaking parameters.

  19. Retrieval of a broken guide wire transfixing the hip through the proximal femoral nail hole

    Directory of Open Access Journals (Sweden)

    Jain Saurabh

    2014-02-01

    Full Text Available 【Abstract】Retrieval of a broken guide wire transfixing the acetabulum or with intrapelvic migration is challenging and frustrating for surgeons. We here present a case report on a method to remove a broken guide wire transfixing the acetabulum through the proximal hole of recon nail using a grasping forceps. This method is little invasive, easy, time-saving and without need for changing the inital fixation.

  20. Weakly Nonlinear Theory of Pattern-Forming Systems with Spontaneously Broken Isotropy

    CERN Document Server

    Rossberg, A G; Kramer, L; Pesch, W

    1996-01-01

    Quasi two-dimensional pattern forming systems with spontaneously broken isotropy represent a novel symmetry class, that is experimentally accessible in electroconvection of homeotropically aligned liquid crystals. We present a weakly nonlinear analysis leading to amplitude equations which couple the short-wavelength patterning mode with the Goldstone mode resulting from the broken isotropy. The new coefficients in these equations are calculated from the hydrodynamics. Simulations exhibit a new type of spatio-temporal chaos at onset. The results are compared with experiments.

  1. Proposed fault diagnostics of a broken rotor bar induction motor fed from PWM inverter

    Directory of Open Access Journals (Sweden)

    Faeka M.H. Khater

    2016-12-01

    Full Text Available This paper presents a fault diagnostics technique for a three-phase squirrel cage induction motor. The method is developed using a simplified model affected by bar resistance variation. Based on 3-phase time domain model, the rotor broken bar with different conditions has been simulated to investigate the resulting torque speed characteristic in each condition. The developed fault diagnostics system is capable of identifying the type of the broken-bar faults in the squirrel cage induction machines.

  2. Retrieval of a broken guide wire transfixing the hip through the proximal femoral nail hole

    Institute of Scientific and Technical Information of China (English)

    Saurabh Jain; Abhishek Pathak; Rajeev Kant Pandey

    2014-01-01

    Retrieval of a broken guide wire transfixing the acetabulum or with intrapelvic migration is challenging and frustrating for surgeons.We here present a case report on a method to remove a broken guide wire transfixing the acetabulum through the proximal hole of recon nail using a grasping forceps.This method is little invasive,easy,time-saving and without need for changing the inital fixation.

  3. A Lesson-Planning Model

    Science.gov (United States)

    Linder, Sandra M.

    2010-01-01

    Many models of planning and lesson construction in the United States advocate an objective-driven approach whereby teachers create performance-based goals that their students should accomplish by the end of the lesson. Teachers then evaluate lessons by determining if students have accomplished these objectives. Often, this model of planning…

  4. Lesson Planning the Kodaly Way.

    Science.gov (United States)

    Boshkoff, Ruth

    1991-01-01

    Discusses the contribution of Zoltan Kodaly to music lesson planning. Emphasizes preparation, presentation, and practice as the three important strategies in teaching concepts and skills to be included in a lesson plan. Includes a sample lesson plan covering a semester and advice on choosing song material. (DK)

  5. Social trust aspects of rural electrification

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-10-01

    This report is a contribution to a growing body of work which acknowledges the importance of social considerations in the electricity industry, and provides an electricity industry perspective on the role of social trust, which is closely related to concepts such as social responsibility, corporate governance and corporate stewardship. The report provides a full explanation of the concept of social trust, defines its components (competence, commitment, consistency, fairness, respect, caring and empathy) and makes suggestions as to how each of these components could be implemented in a variety of settings and situations such as facility planning, construction and operation, risk management and customer relations.

  6. Macroeconomic Dynamics of Assets, Leverage and Trust

    Science.gov (United States)

    Rozendaal, Jeroen C.; Malevergne, Yannick; Sornette, Didier

    A macroeconomic model based on the economic variables (i) assets, (ii) leverage (defined as debt over asset) and (iii) trust (defined as the maximum sustainable leverage) is proposed to investigate the role of credit in the dynamics of economic growth, and how credit may be associated with both economic performance and confidence. Our first notable finding is the mechanism of reward/penalty associated with patience, as quantified by the return on assets. In regular economies where the EBITA/Assets ratio is larger than the cost of debt, starting with a trust higher than leverage results in the highest long-term return on assets (which can be seen as a proxy for economic growth). Therefore, patient economies that first build trust and then increase leverage are positively rewarded. Our second main finding concerns a recommendation for the reaction of a central bank to an external shock that affects negatively the economic growth. We find that late policy intervention in the model economy results in the highest long-term return on assets. However, this comes at the cost of suffering longer from the crisis until the intervention occurs. The phenomenon that late intervention is most effective to attain a high long-term return on assets can be ascribed to the fact that postponing intervention allows trust to increase first, and it is most effective to intervene when trust is high. These results are derived from two fundamental assumptions underlying our model: (a) trust tends to increase when it is above leverage; (b) economic agents learn optimally to adjust debt for a given level of trust and amount of assets. Using a Markov Switching Model for the EBITA/Assets ratio, we have successfully calibrated our model to the empirical data of the return on equity of the EURO STOXX 50 for the time period 2000-2013. We find that dynamics of leverage and trust can be highly nonmonotonous with curved trajectories, as a result of the nonlinear coupling between the variables. This

  7. Problems in Cross Cultural Trust Building

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    2013-01-01

    Based on an explorative study of the Danish Public Diplomacy activities in Pakistan this paper brings to attention a number of issues related to cross cultural trust building. The empirical data includes information from the communication consultant at the Danish Embassy in Islamabad, and other...... public documents from the Danish Foreign Ministry. The conclusion is a list of research problems that needs to be investigated in the future, because there are still too many unknown factors that are of relevance for international trust building....

  8. Trust and Distrust as Cultural Frames

    DEFF Research Database (Denmark)

    Perry, Kevin Anthony

    2016-01-01

    One view on trust that has largely gone unexamined in the literature is the process perspective. The process perspective advances the view that trust develops over time in the local context through a history of interaction between knowledgeable social actors. The term ‘knowledgeable social actor......’ implies that individuals respond actively to unfolding events in the context and modify their responses to meet changes in circumstances. Within a process perspective, this chapter looks closely at the relationships between a group of young men with minority ethnic backgrounds, a team of youth workers...

  9. Trust Building in PPPs for Service Delivery

    DEFF Research Database (Denmark)

    Schulze, Christiane

    for service delivery in Denmark leads to two main findings. First, despite the existence of rather formalized procedures trust based on the perception of the other managers’ competence is already important before the contract is entered. Second, this trust is not automatically transferred onto the next...... hierarchical level, being the middle managers who span boundaries during the contract stage. Consequently it should not be taken as a matter of course, but more focus should be devoted on the transition from the pre-contract to the contract stage. Not least, boundary spanners during the latter stage should...

  10. Security, privacy and trust in cloud systems

    CERN Document Server

    Nepal, Surya

    2013-01-01

    The book compiles technologies for enhancing and provisioning security, privacy and trust in cloud systems based on Quality of Service requirements. It is a timely contribution to a field that is gaining considerable research interest, momentum, and provides a comprehensive coverage of technologies related to cloud security, privacy and trust. In particular, the book includes - Cloud security fundamentals and related technologies to-date, with a comprehensive coverage of evolution, current landscape, and future roadmap. - A smooth organization with introductory, advanced and specialist content

  11. Savings in its sights for Somerset Trust.

    Science.gov (United States)

    Russell, Colin

    2011-10-01

    Colin Russell, healthcare specialist at Schneider Electric (pictured), explains how the company has recently worked with Taunton and Somerset NHS Foundation Trust to implement a major energy-saving project at the Trust's Musgrove Park Hospital in Taunton. He argues that, at a time when all areas of the service are being asked to reduce costs, such partnerships can potentially save the institution millions of pounds and significantly reduce carbon emissions, while "revitalising" parts of the NHS estate, and ensuring continuity of vital hospital services for facilities managers.

  12. Trust and governance in regional planning

    DEFF Research Database (Denmark)

    Tait, Malcolm; Hansen, Carsten Jahn

    2013-01-01

    This paper seeks to understand how planning systems respond to narratives of distrust, focusing on regional planning as a particularly contested field. Using a framework to explore how reforms have enhanced trust, analysis of cases in England and Denmark reveals two distinct actions: firstly......, a reliance on strengthening formal mechanisms of government, a feature common in England, and secondly, collaborative governance, as seen in Denmark. However, both strategies fail to adequately enhance trust in the values of regional planning, leaving it vulnerable to ideological critique as a worthwhile...

  13. Capturing Trust in Social Web Applications

    Science.gov (United States)

    O'Donovan, John

    The Social Web constitutes a shift in information flow from the traditional Web. Previously, content was provided by the owners of a website, for consumption by the end-user. Nowadays, these websites are being replaced by Social Web applications which are frameworks for the publication of user-provided content. Traditionally, Web content could be `trusted' to some extent based on the site it originated from. Algorithms such as Google's PageRank were (and still are) used to compute the importance of a website, based on analysis of underlying link topology. In the Social Web, analysis of link topology merely tells us about the importance of the information framework which hosts the content. Consumers of information still need to know about the importance/reliability of the content they are reading, and therefore about the reliability of the producers of that content. Research into trust and reputation of the producers of information in the Social Web is still very much in its infancy. Every day, people are forced to make trusting decisions about strangers on the Web based on a very limited amount of information. For example, purchasing a product from an eBay seller with a `reputation' of 99%, downloading a file from a peer-to-peer application such as Bit-Torrent, or allowing Amazon.com tell you what products you will like. Even something as simple as reading comments on a Web-blog requires the consumer to make a trusting decision about the quality of that information. In all of these example cases, and indeed throughout the Social Web, there is a pressing demand for increased information upon which we can make trusting decisions. This chapter examines the diversity of sources from which trust information can be harnessed within Social Web applications and discusses a high level classification of those sources. Three different techniques for harnessing and using trust from a range of sources are presented. These techniques are deployed in two sample Social Web

  14. The Relationship between Teamwork and Organizational Trust

    OpenAIRE

    Musab Isik

    2016-01-01

    The aim of this study is to investigate the relationship between teamwork and organizational trust. In the implementation section the data from the survey of 250 workers is employed in call centers in Erzurum by using relevant statistical  methods. Consequently, it is found that there is a positive and significant relationship between teamwork and organizational trust. Thus, the hypothesis of the study is supported as it was expected. Besides, it is found that there are positive and significa...

  15. Trust Factors Affecting Cooperation in Construction

    DEFF Research Database (Denmark)

    Ditlev Bohnstedt, Kristian; Haugbølle, Kim; Bejder, Erik

    2013-01-01

    With all the advances in professionalism, methods, technology, and human resource training, we should have seen an increase in productivity. However, this has not happened and the construction industry is losing the battle to be competitive and has instead become a high-cost, low-productivity...... sector. By applying the theory that insufficient cooperation is the result of low trust the aim was to investigate how conditions for formation of positive and lasting trustful relationships can be created. A questionnaire survey including clients, contractors, architects, engineers and client design...

  16. Trust region minimization of orbital localization functions

    DEFF Research Database (Denmark)

    Høyvik, Ida-Marie; Jansik, Branislav; Jørgensen, Poul

    2012-01-01

    The trust region method has been applied to the minimization of localization functions, and it is shown that both local occupied and local virtual Hartree–Fock (HF) orbitals can be obtained. Because step sizes are size extensive in the trust region method, large steps may be required when the met...... radius and the length of the step is determined from a line search along the obtained direction. Numerical results for large molecular systems have shown that large steps can then safely be taken, and a robust and nearly monotonic convergence is obtained....

  17. Distinction of broken cellular wall Ganoderma lucidum spores and G. lucidum spores using FTIR microspectroscopy

    Science.gov (United States)

    Chen, Xianliang; Liu, Xingcun; Sheng, Daping; Huang, Dake; Li, Weizu; Wang, Xin

    2012-11-01

    In this paper, FTIR microspectroscopy was used to identify broken cellular wall Ganoderma lucidum spores and G. lucidum spores. For IR spectra, broken cellular wall G. lucidum spores and G. lucidum spores were mainly different in the regions of 3000-2800, 1660-1600, 1400-1200 and 1100-1000 cm-1. For curve fitting, the results showed the differences in the protein secondary structures and the polysaccharide structures/content between broken cellular wall G. lucidum spores and G. lucidum spores. Moreover, the value of A1078/A1741 might be a potentially useful factor to distinguish broken cellular wall G. lucidum spores from G. lucidum spores. Additionally, FTIR microspectroscopy could identify broken cellular wall G. lucidum spores and G. lucidum spores accurately when it was combined with hierarchical cluster analysis. The result suggests FTIR microspectroscopy is very simple and efficient for distinction of broken cellular wall G. lucidum spores and G. lucidum spores. The result also indicates FTIR microspectroscopy may be useful for TCM identification.

  18. Survey of trust models in different network domains

    CERN Document Server

    Momani, Mohammad

    2010-01-01

    This paper introduces the security and trust concepts in wireless sensor networks and explains the difference between them, stating that even though both terms are used interchangeably when defining a secure system, they are not the same. The difference between reputation and trust is also explained, highlighting that reputation partially affects trust. A survey of trust and reputation systems in various domains is conducted, with more details given to models in ad-hoc and sensor networks as they are closely related to each other and to our research interests. The methodologies used to model trust and their references are presented. The factors affecting trust updating are summarised and some examples of the systems in which these factors have been implemented are given. The survey states that, even though researchers have started to explore the issue of trust in wireless sensor networks, they are still examining the trust associated with routing messages between nodes (binary events). However, wireless senso...

  19. Improving the trust algorithm of information in semantic web

    Science.gov (United States)

    Wan, Zong-bao; Min, Jiang

    2012-01-01

    With the rapid development of computer networks, especially with the introduction of the Semantic Web perspective, the problem of trust computation in the network has become an important research part of current computer system theoretical. In this paper, according the information properties of the Semantic Web and interact between nodes, the definition semantic trust as content trust of information and the node trust between the nodes of two parts. By Calculate the content of the trust of information and the trust between nodes, then get the final credibility num of information in semantic web. In this paper , we are improve the computation algorithm of the node trust .Finally, stimulations and analyses show that the improved algorithm can effectively improve the trust of information more accurately.

  20. Decoupling, re-Engaging: managing trust relationships in implementation projects

    DEFF Research Database (Denmark)

    Rose, Jeremy; Schlichter, Bjarne Rerup

    2012-01-01

    , is likely to vary over time, and should not be taken for granted. Previous studies have identified the relationship between trust and project outcomes, and suggested trust-building strategies, but have largely ignored the dynamic quality of trust relations through the life of a major project......An important aspect of the successful implementation of large information systems (such as ERP systems) is trust. These implementations impact the legitimate interests of many groups of stakeholders, and trust is a critical factor for success. Trust in the project is contingent upon many factors......, and the complex demands of managing those fluctuations. We investigate evolving trust relationships in a longitudinal case analysis of a large Integrated Hospital System implementation for the Faroe Islands. Trust relationships suffered various breakdowns, but the project was able to recover and eventually meet...

  1. Social Trust, Quality of Government and Ethnic Diversity

    DEFF Research Database (Denmark)

    Charron, Nicholas; Rothstein, Bo

    What factors lead to greater levels of generalized trust in society? The research field has established four channels through which it is commonly argued trust is affected at the macro level—economic inequality, civic participation, ethnic heterogeneity, and institutional quality. However...... impartially and without corruption—is the strongest determinant of regional variations in trust within countries, while economic inequality, civic participation and ethnic hetero-geneity are not significant factors in explaining variations in trust patterns....

  2. Trusted computing platforms TPM2.0 in context

    CERN Document Server

    Proudler, Graeme; Dalton, Chris

    2015-01-01

    In this book the authors first describe the background of trusted platforms and trusted computing and speculate about the future. They then describe the technical features and architectures of trusted platforms from several different perspectives, finally explaining second-generation TPMs, including a technical description intended to supplement the Trusted Computing Group's TPM2 specifications. The intended audience is IT managers and engineers and graduate students in information security.

  3. Physical temperature effects on trust behavior: the role of insula

    OpenAIRE

    Kang, Yoona; Williams, Lawrence E.; Clark, Margaret S.; Gray, Jeremy R.; Bargh, John A.

    2010-01-01

    Trust lies at the heart of person perception and interpersonal decision making. In two studies, we investigated physical temperature as one factor that can influence human trust behavior, and the insula as a possible neural substrate. Participants briefly touched either a cold or warm pack, and then played an economic trust game. Those primed with cold invested less with an anonymous partner, revealing lesser interpersonal trust, as compared to those who touched a warm pack. In Study 2, we ex...

  4. What predicts the trust of online health information?

    OpenAIRE

    Kwon, Jeong Hyun; Kye, Su-Yeon; Park, Eun Young; Oh, Kyung Hee; Park, Keeho

    2015-01-01

    OBJECTIVES: Little attention has been paid to levels of trust in online sources of health information. The objective of this study was to investigate levels of trust in various sources of health information (interpersonal channels, traditional media, and Internet media), and to examine the predictors of trust in health information available on the Internet. METHODS: A questionnaire was administered to 1,300 people (20 years of age or older), evaluating levels of trust in various sources of he...

  5. Trust hierarchy trees applied in team management and data access

    Directory of Open Access Journals (Sweden)

    Laura Danilescu

    2011-12-01

    Full Text Available Controlling access to data and information within organizations is an important concerntoday and also our aim. This paper is based on the concept of trust, which allows access control andcontrol of actions that can be applied to data and information indocuments held in computer systems.Methods we have used are: defining trust hierarchies applied to team members, data and actions.Results we have obtained are trust policies based on trust hierarchies.

  6. The history of a lesson

    DEFF Research Database (Denmark)

    Rasmussen, Mikkel Vedby

    2003-01-01

    and emphasises the need to study the history of lessons rather than the lessons of history. This approach shows that Munich is the end point of a constitutive history that begins in the failure of the Versailles treaty to create a durable European order following the First World War. The Munich lesson is thus...... one element of the lesson of Versailles, which is a praxeology that defines how the West is to make peace, and against whom peace must be defended. The lesson of Versailles has been, at least in part, constitutive of the outbreak of the Cold War, and it continues to define the Western conception...

  7. Sustaining Lesson Study: Resources and Factors that Support and Constrain Mathematics Teachers' Ability to Continue After the Grant Ends

    Science.gov (United States)

    Druken, Bridget Kinsella

    Lesson study, a teacher-led vehicle for inquiring into teacher practice through creating, enacting, and reflecting on collaboratively designed research lessons, has been shown to improve mathematics teacher practice in the United States, such as improving knowledge about mathematics, changing teacher practice, and developing communities of teachers. Though it has been described as a sustainable form of professional development, little research exists on what might support teachers in continuing to engage in lesson study after a grant ends. This qualitative and multi-case study investigates the sustainability of lesson study as mathematics teachers engage in a district scale-up lesson study professional experience after participating in a three-year California Mathematics Science Partnership (CaMSP) grant to improve algebraic instruction. To do so, I first provide a description of material (e.g. curricular materials and time), human (attending district trainings and interacting with mathematics coaches), and social (qualities like trust, shared values, common goals, and expectations developed through relationships with others) resources present in the context of two school districts as reported by participants. I then describe practices of lesson study reported to have continued. I also report on teachers' conceptions of what it means to engage in lesson study. I conclude by describing how these results suggest factors that supported and constrained teachers' in continuing lesson study. To accomplish this work, I used qualitative methods of grounded theory informed by a modified sustainability framework on interview, survey, and case study data about teachers, principals, and Teachers on Special Assignment (TOSAs). Four cases were selected to show the varying levels of lesson study practices that continued past the conclusion of the grant. Analyses reveal varying levels of integration, linkage, and synergy among both formally and informally arranged groups of

  8. 26 CFR 1.851-7 - Certain unit investment trusts.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 9 2010-04-01 2010-04-01 false Certain unit investment trusts. 1.851-7 Section... (CONTINUED) INCOME TAXES Regulated Investment Companies and Real Estate Investment Trusts § 1.851-7 Certain unit investment trusts. (a) In general. For purposes of the Internal Revenue Code, a unit...

  9. Trust in School: A Pathway to Inhibit Teacher Burnout?

    Science.gov (United States)

    Van Maele, Dimitri; Van Houtte, Mieke

    2015-01-01

    Purpose: The purpose of this paper is to consider trust as an important relational source in schools by exploring whether trust lowers teacher burnout. The authors examine how trust relationships with different school parties such as the principal relate to distinct dimensions of teacher burnout. The authors further analyze whether school-level…

  10. Implicit vs. Explicit Trust in Social Matrix Factorization

    NARCIS (Netherlands)

    Fazeli, Soude; Loni, Babak; Bellogin, Alejandro; Drachsler, Hendrik; Sloep, Peter

    2014-01-01

    Incorporating social trust in Matrix Factorization (MF) methods demonstrably improves accuracy of rating prediction. Such approaches mainly use the trust scores explicitly expressed by users. However, it is often challenging to have users provide explicit trust scores of each other. There exist quit

  11. Revisiting the Trust Effect in Urban Elementary Schools

    Science.gov (United States)

    Adams, Curt M.; Forsyth, Patrick B.

    2013-01-01

    More than a decade after Goddard, Tschannen-Moran, and Hoy (2001) found that collective faculty trust in clients predicts student achievement in urban elementary schools, we sought to identify a plausible link for this relationship. Our purpose in revisiting the trust effect was twofold: (1) to test the main effect of collective faculty trust on…

  12. The importance of trust for investment : Evidence from venture capital

    NARCIS (Netherlands)

    Bottazzi, L.; Da Rin, Marco; Hellmann, T.

    2016-01-01

    We examine the effect of trust in venture capital. Our theory predicts a positive relationship of trust with investment, but a negative relationship with success. Using a hand-collected dataset of European venture capital deals, we find that the Eurobarometer measure of trust among nations positivel

  13. Trusting Relationships and Emotional Epistemologies: A Foundational Leadership Issue

    Science.gov (United States)

    Beatty, Brenda R.; Brew, Christine R.

    2004-01-01

    The connections among relational trust, learning and development are implicit in transformational leadership theory. They have also been established empirically in recent studies. Leadership preparation programs often endorse the need for leaders to build effective collaborative relationships that rely on trust. Trust is an emotional phenomenon.…

  14. Individualist-Collectivist Culture and Trust Radius : A Multilevel Approach

    NARCIS (Netherlands)

    van Hoorn, André

    2015-01-01

    We apply a multilevel approach to examine empirically the nexus between individualist and collectivist culture on the one hand and people’s radius of trust on the other. People’s trust level (i.e., the intensity with which people trust other people) has been extensively studied. Increasingly, howeve

  15. 78 FR 29787 - ALPS ETF Trust, et al.;

    Science.gov (United States)

    2013-05-21

    ... COMMISSION ALPS ETF Trust, et al.; Notice of Application May 14, 2013. AGENCY: Securities and Exchange... sections 12(d)(1)(A) and (B) of the Act. APPLICANTS: ALPS ETF Trust (``Trust''), ALPS Advisors, Inc. (``Adviser''), and ALPS Distributors, Inc. (the ``Distributor''). SUMMARY: Summary of Application:...

  16. 7 CFR 3550.72 - Community land trusts.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Community land trusts. 3550.72 Section 3550.72... AGRICULTURE DIRECT SINGLE FAMILY HOUSING LOANS AND GRANTS Section 502 Origination § 3550.72 Community land trusts. Eligible dwellings located on land owned by a community land trust may be financed if: (a)...

  17. 26 CFR 1.58-5 - Common trust funds.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 1 2010-04-01 2010-04-01 true Common trust funds. 1.58-5 Section 1.58-5... Preference Regulations § 1.58-5 Common trust funds. Section 58(e) provides that each participant in a common trust fund (as defined in section 584 and the regulations thereunder) is to treat as items of...

  18. 26 CFR 1.1493-1 - Definition of foreign trust.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 12 2010-04-01 2010-04-01 false Definition of foreign trust. 1.1493-1 Section 1... (CONTINUED) INCOME TAXES Tax on Transfers to Avoid Income Tax § 1.1493-1 Definition of foreign trust. For taxable years beginning before January 1, 1967, a trust is to be considered a “foreign trust” within...

  19. 26 CFR 1.584-1 - Common trust funds.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 7 2010-04-01 2010-04-01 true Common trust funds. 1.584-1 Section 1.584-1...) INCOME TAXES (CONTINUED) Banking Institutions § 1.584-1 Common trust funds. (a) Method of taxation. A common trust fund maintained by a bank is not subject to taxation under this chapter and is...

  20. CONIC TRUST REGION METHOD FOR LINEARLY CONSTRAINED OPTIMIZATION

    Institute of Scientific and Technical Information of China (English)

    Wen-yu Sun; Jin-yun Yuan; Ya-xiang Yuan

    2003-01-01

    In this paper we present a trust region method of conic model for linearly constrainedoptimization problems. We discuss trust region approaches with conic model subproblems.Some equivalent variation properties and optimality conditions are given. A trust regionalgorithm based on conic model is constructed. Global convergence of the method isestablished.

  1. 24 CFR 203.434 - Declaration of trust.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 2 2010-04-01 2010-04-01 false Declaration of trust. 203.434... Mortgage § 203.434 Declaration of trust. A sale of a beneficial interest in a group of insured mortgages... interest in a specific mortgage shall be made only pursuant to a declaration of trust, which has...

  2. 24 CFR 203.493 - Declaration of trust.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 2 2010-04-01 2010-04-01 false Declaration of trust. 203.493... Declaration of trust. A sale of a beneficial interest in a group of insured loans, where the interest to be... be made only pursuant to a declaration of trust, which has been approved by the Commissioner prior...

  3. Collective Trust: A Social Indicator of Instructional Capacity

    Science.gov (United States)

    Adams, Curt M.

    2013-01-01

    Purpose: The purpose of this study is to test the validity of using collective trust as a social indicator of instructional capacity. Design/methodology/approach: A hypothesized model was advanced for the empirical investigation. Collective trust was specified as a latent construct with observable indicators being principal trust in faculty (PTF),…

  4. 40 CFR 280.103 - Standby trust fund.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 26 2010-07-01 2010-07-01 false Standby trust fund. 280.103 Section... (UST) Financial Responsibility § 280.103 Standby trust fund. (a) An owner or operator using any one of the mechanisms authorized by §§ 280.96, 280.98, or 280.99 must establish a standby trust fund when...

  5. 7 CFR 795.9 - Estate or trust.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Estate or trust. 795.9 Section 795.9 Agriculture... PROVISIONS COMMON TO MORE THAN ONE PROGRAM PAYMENT LIMITATION General § 795.9 Estate or trust. (a) An estate or irrevocable trust shall be considered as one person except that, where two or more estates...

  6. 9 CFR 201.42 - Custodial accounts for trust funds.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 2 2010-01-01 2010-01-01 false Custodial accounts for trust funds... STOCKYARDS ACT Proceeds of Sale § 201.42 Custodial accounts for trust funds. (a) Payments for livestock are trust funds. Each payment that a livestock buyer makes to a market agency selling on commission is...

  7. Teachers' Beliefs about the Development of Teacher-Adolescent Trust

    Science.gov (United States)

    Russell, Shannon L.; Wentzel, Kathryn R.; Donlan, Alice E.

    2016-01-01

    In this study, we examined teachers' beliefs concerning the meaning and nature of teacher--student trust in a diverse sample of secondary-school teachers (n = 34). Using a grounded-theory approach, a process model of teacher-adolescent trust emerged based on semi-structured interviews and focus groups. Antecedents of trust could be categorised as…

  8. Paying a Price: Culture, Trust, and Negotiation Consequences

    Science.gov (United States)

    Gunia, Brian C.; Brett, Jeanne M.; Nandkeolyar, Amit K.; Kamdar, Dishan

    2011-01-01

    Three studies contrasting Indian and American negotiators tested hypotheses derived from theory proposing why there are cultural differences in trust and how cultural differences in trust influence negotiation strategy. Study 1 (a survey) documented that Indian negotiators trust their counterparts less than American negotiators. Study 2 (a…

  9. The Lifecycle of Trust in Educational Leadership: An Ecological Perspective

    Science.gov (United States)

    Kutsyuruba, Benjamin; Walker, Keith

    2015-01-01

    As establishing and fostering trust are imperative activities for school leaders, cognizance of the fundamental importance of trust is essential for the leader's moral agency and ethical decision-making. In this article, we use an ecological perspective to uncover the dynamics of the lifecycle of trust as evident from extant literature on…

  10. Multi-agent Model of Trust in a Human Game

    NARCIS (Netherlands)

    Jonker, C.M.; Meijer, S.A.; Tykhonov, D.; Verwaart, D.

    2006-01-01

    Individual-level trust is formalized within the context of a multi-agent system that models human behaviour with respect to trust in the Trust and Tracing Game. This is a trade game on commodity supply chains and networks, designed as a reserach tool and to be played by human players. The model of t

  11. The emergence of trust in clinics of alternative medicine

    DEFF Research Database (Denmark)

    Pedersen, Inge Kryger; Hansen, Vibeke Holm; Grünenberg, Kristina

    2016-01-01

    qualitative studies and informing the empirical findings with a sociological concept of trust, this article provides new empirical insights on how trust emerges in Danish clinics of acupuncture, reflexology and homeopathy. The analysis demonstrates how trust is situational and emerges through both clients...

  12. 36 CFR 1010.13 - Trust decision-making procedures.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Trust decision-making procedures. 1010.13 Section 1010.13 Parks, Forests, and Public Property PRESIDIO TRUST ENVIRONMENTAL QUALITY § 1010.13 Trust decision-making procedures. To ensure that at major decision-making points all...

  13. Investigation of the Relationship between Organizational Trust and Organizational Commitment

    Science.gov (United States)

    Bastug, Gülsüm; Pala, Adem; Kumartasli, Mehmet; Günel, Ilker; Duyan, Mehdi

    2016-01-01

    Organizational trust and organizational commitment are considered as the most important entraining factors for organizational success. The most important factor in the formation of organizational commitment is trust that employees have in their organizations. In this study, the relationship between organizational trust and organizational…

  14. Trusted Defense Microelectronics: Future Access and Capabilities Are Uncertain

    Science.gov (United States)

    2015-10-28

    TRUSTED DEFENSE MICROELECTRONICS Future Access and Capabilities Are Uncertain Statement of Marie A. Mak...1. REPORT DATE OCT 2015 2. REPORT TYPE 3. DATES COVERED 00-00-2015 to 00-00-2015 4. TITLE AND SUBTITLE Trusted Defense Microelectronics ...House of Representatives October 2015 TRUSTED DEFENSE MICROELECTRONICS Future Access and Capabilities Are Uncertain Why GAO Did This Study DOD’s

  15. Exploring the Antecedents of Trust in Virtual Communities

    Science.gov (United States)

    Hsu, Meng-Hsiang; Chang, Chun-Ming; Yen, Chia-Hui

    2011-01-01

    Although previous research has established that interpersonal trust and system trust are critical in shaping individual behaviour in virtual settings, the two perspectives have not been examined by IS researchers in virtual communities (VCs) simultaneously. Drawing from prior literature on trust and VCs, a research model for understanding the…

  16. A Response to Nicholson's "The Politics of Trust."

    Science.gov (United States)

    Berry, Kathleen S.

    2002-01-01

    Notes a response to any discussion of trust is itself in danger of repeating the very problems that Helen Nicholson raises in her article "The Politics of Trust: Drama Education and the Ethics of Care" (2002). Agrees in part with the elaborations of her thesis, but admits to some serious hesitation regarding any discussion of trust as a guiding…

  17. Effects of cognitive load on trusting behavior--an experiment using the trust game.

    Science.gov (United States)

    Samson, Katarzyna; Kostyszyn, Patrycjusz

    2015-01-01

    Last decades have witnessed a progressing decline of social trust, which has been predominantly linked to worsening economic conditions and increasing social inequality. In the present research we propose a different type of explanation for the observed decline - cognitive load related to technological development and the accelerating pace of modern life. In an experimental study participants played the trust game while performing one of two different secondary tasks - listening to a disturbing noise or memorizing a sequence of characters - or with no additional task in the control condition. Results show that in both cognitive load conditions participants expressed significantly less trust in the trust game than in case of no cognitive load. Additionally, when cognitive resources were limited, participants' behavior was more impulsive than when their resources were fully available.

  18. Effects of cognitive load on trusting behavior--an experiment using the trust game.

    Directory of Open Access Journals (Sweden)

    Katarzyna Samson

    Full Text Available Last decades have witnessed a progressing decline of social trust, which has been predominantly linked to worsening economic conditions and increasing social inequality. In the present research we propose a different type of explanation for the observed decline - cognitive load related to technological development and the accelerating pace of modern life. In an experimental study participants played the trust game while performing one of two different secondary tasks - listening to a disturbing noise or memorizing a sequence of characters - or with no additional task in the control condition. Results show that in both cognitive load conditions participants expressed significantly less trust in the trust game than in case of no cognitive load. Additionally, when cognitive resources were limited, participants' behavior was more impulsive than when their resources were fully available.

  19. Study of Trust as an Organizational Contingency, Part II: Examining Four Dimensions of Trust in ELICIT Experimentation

    Science.gov (United States)

    2010-06-01

    several interrelated cognitive processes and orientations” (p. 571). Zand (1972) is more emphatic, stating that trust “is not a global feeling of warmth ...economic activity overwhelm interpersonal trust relations” (p. 411). Schoorman et al. (2007) take a different view, asserting that the bureaucracy... Interpersonal Trust. Journal of Personality, 35 (4), 651-665. Rotter J. B. (1980). Interpersonal trust, trustworthiness, and gullibility. American Psychology

  20. Building trust in biotechnology crops in light of the Arab Spring: a case study of Bt maize in Egypt

    Directory of Open Access Journals (Sweden)

    Ezezika Obidimma C

    2012-11-01

    Full Text Available Abstract Background The case of Bacillus thuringiensis (Bt maize in Egypt presents a unique perspective on the role of trust in agricultural biotechnology (agbiotech public-private partnerships (PPPs. This is especially relevant given the recent pro-democracy uprisings that spread throughout the Arab world that have significantly impacted the current political climate and status of both the public and private sector, and especially public-private collaborative initiatives. This case study aims to shed light on various trust-building practices adopted, and trust-related challenges faced, in the Bt maize project in Egypt. Methods We reviewed published materials on Bt maize in Egypt and collected data through direct observations and semi-structured, face-to-face interviews with stakeholders of the Bt maize project in Egypt. Data from the interviews were analyzed based on emergent themes to create a comprehensive narrative on how trust is understood and built among the partners and with the community. Results We have distilled five key lessons from this case study. First, it is important to have transparent interactions and clearly defined project priorities, roles and responsibilities among core partners. Second, partners need to engage farmers by using proven-effective, hands-on approaches as a means for farmers to build trust in the technology. Third, positive interactions with the technology are important; increased yields and secure income attributable to the seed will facilitate trust. Fourth, there is a need for improved communication strategies and appropriate media response to obviate unwarranted public perceptions of the project. Finally, the political context cannot be ignored; there is a need to establish trust in both the public and private sector as a means to secure the future of agbiotech PPPs in Egypt. Conclusions Most important to the case of Egypt is the effect of the current political climate on project success. There is reason