WorldWideScience

Sample records for broken trust lessons

  1. Broken trusts: The Texas Attorney General versus the oil industry, 1889-1909

    Science.gov (United States)

    Singer, Jonathan Whitney

    The legal history of state antitrust enforcement and the oil industry in Texas illustrates how and why antitrust law contemplated complementary enforcement at the state and federal government level. Historians, economists, and lawyers have concentrated on federal antitrust law and enforcement, ignoring state efforts. Yet for most of the first twenty-five years following the enactment of the Sherman Antitrust Act, federal enforcement efforts were extremely limited, leaving the field to the states. Texas was one of several states that had strong antitrust laws, and whose attorneys general prosecuted antitrust violations with vigor. Political ambition was a factor in the decisions to investigate and prosecute cases against a highly visible target, the petroleum industry, but there was also a genuine belief in the goals of antitrust policy, and in the efficacy of enforcement of the laws. Enforcement efforts were also complicated by the fact that large oil companies provided vital commodities, articles of "prime necessity," to the citizens of Texas and following the discovery of large oil fields, played an increasingly important role in the economies of many Texas communities. The Texas Attorney General's antitrust enforcement efforts against the oil industry in this time of transition from an agricultural society to an industrial society provide insights into the litigation process, and reveal how well the rhetoric of trust-busting fit with the reality of antitrust enforcement. The antitrust crusade against the petroleum industry also highlights the changing roles of state government in the late nineteenth and early twentieth centuries, particularly the Attorney General's Department. The experience of Texas undermines the view that federal action has always dominated antitrust enforcement efforts and that antitrust litigation against Standard Oil was ineffective and ineffectual. Rather, the Texas Attorney General's litigations and their results suggest that some states

  2. The crisis of patient-physician trust and bioethics: lessons and inspirations from China.

    Science.gov (United States)

    Nie, Jing-Bao; Li, Lun; Gillett, Grant; Tucker, Joseph D; Kleinman, Arthur

    2017-09-18

    Trust is indispensable not only for interpersonal relationships and social life, but for good quality healthcare. As manifested in the increasing violence and tension in patient-physician relationships, China has been experiencing a widespread and profound crisis of patient-physician trust. And globally, the crisis of trust is an issue that every society, either developing or developed, has to face in one way or another. Yet, in spite of some pioneering works, the subject of patient-physician trust and mistrust - a crucial matter in healthcare especially because there are numerous ethical implications - has largely been marginalized in bioethics as a global discourse. Drawing lessons as well as inspirations from China, this paper demonstrates the necessity of a trust-oriented bioethics and presents some key theoretical, methodological and philosophical elements of such a bioethics. A trust-oriented bioethics moves beyond the current dominant bioethical paradigms through putting the subject of trust and mistrust in the central agenda of the field, learning from the social sciences, and reviving indigenous moral resources. In order for global bioethics to claim its relevance to the things that truly matter in social life and healthcare, trust should be as vital as such central norms like autonomy and justice and can serve as a potent theoretical framework. © 2017 John Wiley & Sons Ltd.

  3. Improving patient safety incident reporting systems by focusing upon feedback - lessons from English and Welsh trusts.

    Science.gov (United States)

    Wallace, Louise M; Spurgeon, Peter; Benn, Jonathan; Koutantji, Maria; Vincent, Charles

    2009-08-01

    This paper describes practical implications and learning from a multi-method study of feedback from patient safety incident reporting systems. The study was performed using the Safety Action and Information Feedback from Incident Reporting model, a model of the requirements of the feedback element of a patient safety incident reporting and learning system, derived from a scoping review of research and expert advice from world leaders in safety in high-risk industries. We present the key findings of the studies conducted in the National Health Services (NHS) trusts in England and Wales in 2006. These were a survey completed by risk managers for 351 trusts in England and Wales, three case studies including interviews with staff concerning an example of good practice feedback and an audit of 90 trusts clinical risk staff newsletters. We draw on an Expert Workshop that included 71 experts from the NHS, from regulatory bodies in health care, Royal Colleges, Health and Safety Executive and safety agencies in health care and high-risk industries (commercial aviation, rail and maritime industries). We draw recommendations of enduring relevance to the UK NHS that can be used by trust staff to improve their systems. The recommendations will be of relevance in general terms to health services worldwide.

  4. Forms, Sources and Processes of Trust

    NARCIS (Netherlands)

    Nooteboom, B.

    2006-01-01

    This chapter reviews some key points in the analysis of trust, based on Nooteboom (2002)i.The following questions are addressed.What can we have trust in?What is the relation between trust and control?What are the sources of trust? And what are its limits?By what process is trust built up and broken

  5. Improving service quality in NHS Trust hospitals: lessons from the hotel sector.

    Science.gov (United States)

    Desombre, T; Eccles, G

    1998-01-01

    This article looks to review recent practice undertaken within the UK hotel sector to improve customer service, and suggests ideals that could be implemented within National Health (NHS) Trust hospitals. At a time of increasing competition, hotel firms are using service enhancement as a means to gain competitive advantage, and therefore developing a range of techniques to measure levels of service quality improvement. With continued change in the health service, where greater focus now lies with patient satisfaction, so there is a requirement for managers to adapt techniques presently being offered in other service industries to improve levels of customer service and ensure patients are targeted to define their levels of satisfaction.

  6. Our broken death penalty

    National Research Council Canada - National Science Library

    Fletcher, William A

    2014-01-01

      A lecture entitled Our Broken Death Penalty is presented. But the title is misleading, for it suggests that America's death penalty might, at some earlier time, have been something other than broken...

  7. Broken or dislocated jaw

    Science.gov (United States)

    ... jaw; Fractured jaw; Fractured mandible; Broken jaw; TMJ dislocation; Mandibular dislocation ... needed to do this, particularly if repeated jaw dislocations occur. After dislocating your jaw, you should not ...

  8. Lessons learned in Liberia: preliminary examination of the psychometric properties of trust and teamwork among maternal healthcare workers.

    Science.gov (United States)

    Lori, Jody R; Munro, Michelle L; Moore, Jennifer E; Fladger, Jessica

    2013-04-11

    Post-conflict Liberia has one of the fastest growing populations on the continent and one of the highest maternal mortality rates among the world. However, in the rural regions, less than half of all births are attended by a skilled birth attendant. There is a need to evaluate the relationship between trained traditional healthcare providers and skilled birth attendants to improve maternal health outcomes. This evaluation must also take into consideration the needs and desires of the patients. The purpose of this pilot study was to establish the validity and reliability of a survey tool to evaluate trust and teamwork in the working relationships between trained traditional midwives and certified midwives in a post-conflict country. A previously established scale, the Trust and Teambuilding Scale, was used with non- and low-literate trained traditional midwives (n=48) in rural Liberia to evaluate trust and teamwork with certified midwives in their communities. Initial results indicated that the scale and response keys were culturally inadequate for this population. A revised version of the scale, the Trust and Teamwork Scale - Liberia, was created and administered to an additional group of non- and low-literate, trained traditional midwives (n=42). Exploratory factor analysis using Mplus for dichotomous variables was used to determine the psychometric properties of the revised scale and was then confirmed with the full sample (n=90). Additional analyses included contrast validity, convergent validity, and Kuder-Richardson reliability. Exploratory factor analysis revealed two factors in the revised Trust and Teamwork Scale - Liberia. These two factors, labeled trust and teamwork, included eleven of the original eighteen items used in the Trust and Teamwork Scale and demonstrated contrast and convergent validity and adequate reliability. The revised scale is suitable for use with non- and low-literate, trained traditional midwives in rural Liberia. Continued cross

  9. Lessons learned in Liberia: preliminary examination of the psychometric properties of trust and teamwork among maternal healthcare workers

    Science.gov (United States)

    2013-01-01

    Background Post-conflict Liberia has one of the fastest growing populations on the continent and one of the highest maternal mortality rates among the world. However, in the rural regions, less than half of all births are attended by a skilled birth attendant. There is a need to evaluate the relationship between trained traditional healthcare providers and skilled birth attendants to improve maternal health outcomes. This evaluation must also take into consideration the needs and desires of the patients. The purpose of this pilot study was to establish the validity and reliability of a survey tool to evaluate trust and teamwork in the working relationships between trained traditional midwives and certified midwives in a post-conflict country. Methods A previously established scale, the Trust and Teambuilding Scale, was used with non- and low-literate trained traditional midwives (n=48) in rural Liberia to evaluate trust and teamwork with certified midwives in their communities. Initial results indicated that the scale and response keys were culturally inadequate for this population. A revised version of the scale, the Trust and Teamwork Scale – Liberia, was created and administered to an additional group of non- and low-literate, trained traditional midwives (n=42). Exploratory factor analysis using Mplus for dichotomous variables was used to determine the psychometric properties of the revised scale and was then confirmed with the full sample (n=90). Additional analyses included contrast validity, convergent validity, and Kuder-Richardson reliability. Results Exploratory factor analysis revealed two factors in the revised Trust and Teamwork Scale – Liberia. These two factors, labeled trust and teamwork, included eleven of the original eighteen items used in the Trust and Teamwork Scale and demonstrated contrast and convergent validity and adequate reliability. Conclusions The revised scale is suitable for use with non- and low-literate, trained traditional

  10. The trust formula: Trust = fairness + leadership

    Energy Technology Data Exchange (ETDEWEB)

    Lovenheim, R. [Regulatory and Legislative Consultants, Inc., Rochester, NY (United States)

    1995-11-01

    Many state and compact LLW siting processes have been characterized by slippage and failure. The paper focuses on two major {open_quotes}lessons learned{close_quotes} regarding public interaction and trust, and how these lessons are being applied to current siting efforts. The relationship of environmental idealism and trust will be explored further in this paper. Supreme Court Justice Stephen Breyer concludes his 1994 book, Breaking the Vicious Circle by stating: {open_quotes}Finally, this book also reflects a belief that trust in institutions arises not simply as a result of openness in government, responses to local interest groups, or priorities emphasized in the press -- though these attitudes and actions play an important role -- but also from those institutions doing a difficult job well.{close_quotes}

  11. Reflections of a Vaccinologist: Lessons Learned About What We Can Do to Improve Trust in Vaccines and Vaccine Programsa.

    Science.gov (United States)

    Halsey, Neal A

    2017-03-01

    Public trust can be improved by learning from past mistakes, by establishing a standing forum for review of new concerns as they arise, and by maintaining a robust vaccine safety system. Developing standard guidelines for reporting causality assessment in case reports would help educate physicians and prevent future unnecessary concerns based on false assumptions of causal relationships. © The Author 2015. Published by Oxford University Press on behalf of The Journal of the Pediatric Infectious Diseases Society. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  12. Trust in agile teams

    DEFF Research Database (Denmark)

    Tjørnehøj, Gitte; Fransgård, Mette; Skalkam, Signe

    2012-01-01

    of the problems of DSD. However important incompatibilities between the challenges of DSD and the key tenets of agility exist and achieving a beneficially balanced agile practice in DSD can be difficult. Trust could be the key to this, since trust is crucial for the necessary corporate behavior that leads to team...... success. This article reports from a study of two agile DSD teams with very different organization and collaboration patterns. It addresses the role of trust and distrust in DSD by analyzing how the team members’ trust developed and erode through the lifetime of the two collaborations and how management...... actions influenced this. We see two important lessons from the analysis. First the agile practices of daily Scrum and self organizing team can empower DSD teams to manage their own development of trust and thereby alleviate the obstacles of DSD. Second if management fails to support the development...

  13. riences from REACH Trust, Malawi

    African Journals Online (AJOL)

    Drawing on the experiences of REACH Trust, this paper highlights practical lessons of using research processes and outcomes to promote equity in health policy and practice. The REACH '11'ust is first introduced. Case studies are then used to highlight how REACH Trust has worked in a par- ticipatory manner with key ...

  14. Broken or knocked out tooth

    Science.gov (United States)

    ... not need an emergency visit for a simple chip or a broken tooth that is not causing ... Center, Norwalk, CT. Review provided by VeriMed Healthcare Network. Also reviewed by David Zieve, MD, MHA, Isla ...

  15. Broken toe - self-care

    Science.gov (United States)

    Fractured toe - self-care; Broken bone - toe - self-care; Fracture - toe - self-care; Fracture phalanx - toe ... often treated without surgery and can be taken care of at home. Severe injuries include: Breaks that ...

  16. Femur Shaft Fractures (Broken Thighbone)

    Science.gov (United States)

    ... either in a long-leg splint or in skeletal traction. This is to keep your broken bones as ... and to maintain the length of your leg. Skeletal traction is a pulley system of weights and counterweights ...

  17. The affordances of broken affordances

    DEFF Research Database (Denmark)

    Grünbaum, Martin Gielsgaard; Simonsen, Jakob Grue

    2015-01-01

    We consider the use of physical and virtual objects having one or more affordances associated to simple interactions with them. Based on Kaptelinin and Nardi’s notion of instrumental affordance, we investigate what it means to break an affordance, and the two ensuing questions we deem most...... important: how users may (i) achieve their goals in the presence of such broken affordances, and may (ii) repurpose or otherwise interact with artefacts with broken affordances. We argue that (A) thorough analyses of breakdowns of affordances and their associated signifiers and feedbacks have implication...... for design, particularly so for virtual artefacts, and that (B) there is a largely unexplored design space for designing, and redesigning objects with broken affordances, rather than broken or decayed objects....

  18. Job loss and broken partnerships

    DEFF Research Database (Denmark)

    Kriegbaum, Margit; Christensen, Ulla; Lund, Rikke

    2008-01-01

    The aim of this study was to investigate the effects of the accumulated number of job losses and broken partnerships (defined as the end of cohabitation) on the risk of fatal and nonfatal events of ischemic heart disease (IHD).......The aim of this study was to investigate the effects of the accumulated number of job losses and broken partnerships (defined as the end of cohabitation) on the risk of fatal and nonfatal events of ischemic heart disease (IHD)....

  19. "Doing Trust".

    Science.gov (United States)

    Guillemin, Marilys; Gillam, Lynn; Barnard, Emma; Stewart, Paul; Walker, Hannah; Rosenthal, Doreen

    2016-10-01

    Trust in research is important but not well understood. We examine the ways that researchers understand and practice trust in research. Using a qualitative research design, we interviewed 19 researchers, including eight researchers involved in Australian Indigenous research. The project design focused on sensitive research including research involving vulnerable participants and sensitive research topics. Thematic analysis was used to analyze the data. We found that researchers' understanding of trust integrates both the conceptual and concrete; researchers understand trust in terms of how it relates to other similar concepts and how they practice trust in research. This provides a sound basis to better understand trust in research, as well as identifying mechanisms to regain trust when it is lost in research.

  20. Broken Ergodicity in MHD Turbulence

    Science.gov (United States)

    Shebalin, John V.

    2010-01-01

    Ideal magnetohydrodynamic (MHD) turbulence may be represented by finite Fourier series, where the inherent periodic box serves as a surrogate for a bounded astrophysical plasma. Independent Fourier coefficients form a canonical ensemble described by a Gaussian probability density function containing a Hermitian covariance matrix with positive eigenvalues. The eigenvalues at lowest wave number can be very small, resulting in a large-scale coherent structure: a turbulent dynamo. This is seen in computations and a theoretical explanation in terms of 'broken ergodicity' contains Taylor s theory of force-free states. An important problem for future work is the case of real, i.e., dissipative flows. In real flows, broken ergodicity and coherent structure are still expected to occur in MHD turbulence at the largest scale, as suggested by low resolution simulations. One challenge is to incorporate coherent structure at the largest scale into the theory of turbulent fluctuations at smaller scales.

  1. Academy Trust

    Indian Academy of Sciences (India)

    The Academy Trust (tAcT) was set up in August 2014 as a non-governmental entity under the auspices of the Indian Academy of Sciences (IASc), Bengaluru. Working closely with some of the most distinguished scientific minds in the country through the Fellowship of the IASc, the Trust hopes to bring about a tangible ...

  2. Broken links and black boxes

    DEFF Research Database (Denmark)

    Sindbæk, Søren Michael

    2013-01-01

    Long-distance communication has emerged as a particular focus for archaeological exploration using network theory, analysis, and modelling. Initial attempts to adapt methods from social network analysis to archaeological data have, however, struggled to produce decisive results. This paper argues...... that the archaeological study of communication networks in the past calls for radically different analytical methods from those employed by most other forms of social network analysis. The fragmentary archaeological evidence presents researchers with the task of reconstructing the broken links of a ruined network from...

  3. Broken Windows and Collective Efficacy

    Directory of Open Access Journals (Sweden)

    Aldrin Abdullah

    2015-01-01

    Full Text Available The broken windows thesis posits that signs of disorder increase crime and fear, both directly and indirectly. Although considerable theoretical evidence exists to support the idea that disorder is positively related to fear of crime, the empirical literature on examining the indirect effect of the individual’s perception of incivilities on fear of crime is limited, especially in developing countries. This research was conducted to assess the indirect relationship between perceived disorder and fear of crime through collective efficacy. A total of 235 households from Penang, Malaysia, participated in this study. Results reveal that high perception of disorder is negatively associated with collective efficacy. High collective efficacy is associated with low fear of crime. Moreover, a significant and indirect effect of disorder on fear of crime exists through collective efficacy. The results provide empirical support for the broken windows theory in the Malaysian context and suggest that both environmental conditions and interactions of residents play a role in the perceived fear of crime.

  4. Trust, confidentiality, and the acceptability of sharing HIV-related patient data: lessons learned from a mixed methods study about Health Information Exchanges.

    Science.gov (United States)

    Maiorana, Andre; Steward, Wayne T; Koester, Kimberly A; Pearson, Charles; Shade, Starley B; Chakravarty, Deepalika; Myers, Janet J

    2012-04-19

    Concerns about the confidentiality of personal health information have been identified as a potential obstacle to implementation of Health Information Exchanges (HIEs). Considering the stigma and confidentiality issues historically associated with human immunodeficiency virus (HIV) disease, we examine how trust-in technology, processes, and people-influenced the acceptability of data sharing among stakeholders prior to implementation of six HIEs intended to improve HIV care in parts of the United States. Our analyses identify the kinds of concerns expressed by stakeholders about electronic data sharing and focus on the factors that ultimately facilitated acceptability of the new exchanges. We conducted 549 surveys with patients and 66 semi-structured interviews with providers and other stakeholders prior to implementation of the HIEs to assess concerns about confidentiality in the electronic sharing of patient data. The patient quantitative data were analyzed using SAS 9.2 to yield sample descriptive statistics. The analysis of the qualitative interviews with providers and other stakeholders followed an open-coding process, and convergent and divergent perspectives emerging from those data were examined within and across the HIEs. We found widespread acceptability for electronic sharing of HIV-related patient data through HIEs. This acceptability appeared to be driven by growing comfort with information technologies, confidence in the security protocols utilized to protect data, trust in the providers and institutions who use the technologies, belief in the benefits to the patients, and awareness that electronic exchange represents an enhancement of data sharing already taking place by other means. HIE acceptability depended both on preexisting trust among patients, providers, and institutions and on building consensus and trust in the HIEs as part of preparation for implementation. The process of HIE development also resulted in forging shared vision among

  5. New technique for withdrawing broken sheath

    Directory of Open Access Journals (Sweden)

    Süleyman Cagan Efe

    2016-03-01

    Full Text Available A sheath that is broken inside vessel is a rare complication, and intravascular fragments from broken sheaths are retrieving transcutaneously by techniques including the loop snare catheter, basket catheter, and grasping/biopsy forceps. We reported a less common type of broken central venous sheath in location and a successful unique technique for retrieving it from subclavian vein by using noncompliant balloon from 40 year old female patient.

  6. Can we trust robots?

    NARCIS (Netherlands)

    Coeckelbergh, Mark

    2011-01-01

    Can we trust robots? Responding to the literature on trust and e-trust, this paper asks if the question of trust is applicable to robots, discusses different approaches to trust, and analyses some preconditions for trust. In the course of the paper a phenomenological-social approach to trust is

  7. Trust matters

    DEFF Research Database (Denmark)

    Østergaard, Lise Rosendal

    2015-01-01

    This article makes a contribution to the debate about health service utilisation and the role of trust in fostering demand for health services in sub-Saharan Africa. It is framed as a narrative literature review based on a thematic analysis of nine empirical, qualitative studies. For the purposes...... and institutional situations. The findings of the review point to four elements that are important for trust to develop in health sector relationships: the sensitive use of discretionary power by health workers, perceived empathy by patients of the health workers, the quality of medical care and workplace......-workers and managers, will improve health sector collaboration and stimulate demand for health care services....

  8. A Slot Machine, A Broken Test Tube

    Indian Academy of Sciences (India)

    IAS Admin

    BOOK │ REVIEW. A Slot Machine, A Broken. Test Tube. Vinita Shivakumar and. Dipshikha Chakravortty. A Slot Machine, A Broken Test. Tube – An Autobiography. Salvador Edward Luria. Harper Collins Publishers Inc.,. USA. 1984. 1st edn. 228 pp. (Original from the University of. Michigan). Price: Rs 60/-. Salvador Edward ...

  9. Personal trust increases cooperation beyond general trust

    National Research Council Canada - National Science Library

    Acedo-Carmona, Cristina; Gomila, Antoni

    2014-01-01

    ..., according to whether or not players personally trust each other. The design thus goes beyond standard approaches to the role of trust in fostering cooperation, which is restricted to general trust...

  10. Recovering from trust breakdowns in large system Implementations

    DEFF Research Database (Denmark)

    Schlichter, Bjarne Rerup; Andersen, Povl Erik Rostgård

    On the basis of experiences from the Faroese large-scale implementation of integrated healthcare information systems and insights into dynamic aspects of trust, we offer the following lessons learned for the successful management and recovery of trust (breakdowns) in large system implementations...

  11. Recovering from trust breakdowns in large system implementations

    DEFF Research Database (Denmark)

    Rerup Schlichter, Bjarne Rerup; Andersen, Povl Erik Rostgård

    2011-01-01

    On the basis of experiences from the Faroese large-scale implementation of integrated healthcare information systems and insights into dynamic aspects of trust, we offer the following lessons learned for the successful management and recovery of trust (breakdowns) in large system implementations...

  12. Trusted Domain

    DEFF Research Database (Denmark)

    Hjorth, Theis Solberg; Torbensen, Rune

    2012-01-01

    In the digital age of home automation and with the proliferation of mobile Internet access, the intelligent home and its devices should be accessible at any time from anywhere. There are many challenges such as security, privacy, ease of configuration, incompatible legacy devices, a wealth...... of wireless standards, limited resources of embedded systems, etc. Taking these challenges into account, we present a Trusted Domain home automation platform, which dynamically and securely connects heterogeneous networks of Short-Range Wireless devices via simple non-expert user. interactions, and allows...... remote access via IP-based devices such as smartphones. The Trusted Domain platform fits existing legacy technologies by managing their interoperability and access controls, and it seeks to avoid the security issues of relying on third-party servers outside the home. It is a distributed system...

  13. Trusted Objects

    Energy Technology Data Exchange (ETDEWEB)

    CAMPBELL,PHILIP L.; PIERSON,LYNDON G.; WITZKE,EDWARD L.

    1999-10-27

    In the world of computers a trusted object is a collection of possibly-sensitive data and programs that can be allowed to reside and execute on a computer, even on an adversary's machine. Beyond the scope of one computer we believe that network-based agents in high-consequence and highly reliable applications will depend on this approach, and that the basis for such objects is what we call ''faithful execution.''

  14. Renormalizations in softly broken SUSY gauge theories

    Science.gov (United States)

    Avdeev, L. V.; Kazakov, D. I.; Kondrashuk, I. N.

    1998-01-01

    The supergraph technique for calculations in supersymmetric gauge theories where supersymmetry is broken in a "soft" way (without introducing quadratic divergencies) is reviewed. By introducing an external spurion field the set of Feynman rules is formulated and explicit connections between the UV counterterms of a softly broken and rigid SUSY theories are found. It is shown that the renormalization constants of softly broken SUSY gauge theory also become external superfields depending on the spurion field. Their explicit form repeats that of the constants of a rigid theory with the redefinition of the couplings. The method allows us to reproduce all known results on the renormalization of soft couplings and masses in a softly broken theory. As an example the renormalization group functions for soft couplings and masses in the Minimal Supersymmetric Standard Model up to the three-loop level are calculated.

  15. Renormalizations in softly broken SUSY gauge theories

    Energy Technology Data Exchange (ETDEWEB)

    Avdeev, L.V.; Kazakov, D.I.; Kondrashuk, I.N. [Joint Inst. for Nuclear Research, Dubna (Russian Federation). Lab. of Theoretical Physics

    1998-01-19

    The supergraph technique for calculations in supersymmetric gauge theories where supersymmetry is broken in a ``soft`` way (without introducing quadratic divergencies) is reviewed. By introducing an external spurion field the set of Feynman rules is formulated and explicit connections between the UV counterterms of a softly broken and rigid SUSY theories are found. It is shown that the renormalization constants of softly broken SUSY gauge theory also become external superfields depending on the spurion field. Their explicit form repeats that of the constants of a rigid theory with the redefinition of the couplings. The method allows us to reproduce all known results on the renormalization of soft couplings and masses in a softly broken theory. As an example the renormalization group functions for soft couplings and masses in the minimal supersymmetric standard model up to the three-loop level are calculated. (orig.). 16 refs.

  16. Nobel Prize for work on broken symmetries

    CERN Multimedia

    2008-01-01

    The 2008 Nobel Prize for Physics goes to three physicists who have worked on broken symmetries in particle physics. The announcement of the 2008 Nobel Prize for physics was transmitted to the Globe of Science and Innovation via webcast on the occasion of the preview of the Nobel Accelerator exhibition.On 7 October it was announced that the Royal Swedish Academy of Sciences had awarded the 2008 Nobel Prize for physics to three particle physicists for their fundamental work on the mechanisms of broken symmetries. Half the prize was awarded to Yoichiro Nambu of Fermilab for "the discovery of the mechanism of spontaneous broken symmetry in subatomic physics". The other half is shared by Makato Kobayashi of Japan’s KEK Institute and Toshihide Maskawa of the Yukawa Institute at the University of Kyoto "for the discovery of the origin of the broken symmetry which predicts the existence of at least three families of quarks in Nature". At th...

  17. Trusting the state, trusting each other?

    DEFF Research Database (Denmark)

    Sønderskov, Kim Mannemar; Dinesen, Peter Thisted

    2016-01-01

    reflects reverse causality (social trust forming institutional trust), or both forms of trust reflecting deep-seated dispositions (common confounding). Against the backdrop of the shortcomings of previous cross-sectional analyses, this paper utilizes two Danish panel surveys containing measures of both......Trust in state institutions is a prominent explanation of social trust. However, previous—mainly cross-sectional—analyses provide limited causal evidence regarding the relationship between institutional trust and social trust and it is thus essentially unknown whether an observed relationship...... types of trust for the same individuals surveyed at multiple points in time over a long time-span (up to 18 years) to address the potentially reverse and/or spurious relationship. Using individual fixed effects and cross-lagged panel models, the results provide strong evidence of trust in state...

  18. Trust makers, breakers and brokers: building trust in the Australian food system.

    Science.gov (United States)

    Wilson, Annabelle; Coveney, John; Henderson, Julie; Meyer, Samantha; Calnan, Michael; Caraher, Martin; Webb, Trevor; Elliott, Anthony; Ward, Paul

    2013-03-15

    The importance of consumer trust in the food supply has previously been identified, and dimensions of consumer trust in food-who they trust and the type of trust that they exhibit-has been explored. However, there is a lack of research about the mechanisms through which consumer trust in the food supply is developed, maintained, broken and repaired. This study seeks to address this gap by exploring if, and how, consumer trust in the food supply is considered by the media, food industry and governments when responding to food scares. The aim of the research is to develop models of trust building that can be implemented following food scares. Semi-structured interviews will be undertaken with media, public relations officials and policy makers in Australia, New Zealand and the United Kingdom. Participants will be recruited through purposive sampling and will be asked to discuss a hypothetical case study outlining a food incident, and any experiences of specific food scares. Models of trust development, maintenance and repair will be developed from interview data. Comment on these models will be sought from experts in food-related organizations through a Delphi study, where participants will be asked to consider the usefulness of the models. Participants' comments will be used to revise the models until consensus is reached on the suitability and usability of the models. This study will contribute to the literature about systems-based trust, and explore trust as a social and regulatory process. The protocol and results will be of interest and use to the food industry, food regulators, consumer advocate groups, media seeking to report food-related issues and policy makers concerned with public health and consumer health and well-being. This research represents an important contribution to the translation of the theoretical conceptualizations of trust into practical use in the context of food.

  19. Of Slot Machines and Broken Test Tubes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 19; Issue 5. Of Slot Machines and Broken Test Tubes. S Mahadevan. General Article Volume 19 Issue 5 May 2014 pp 395-405. Fulltext. Click here to view fulltext PDF. Permanent link: http://www.ias.ac.in/article/fulltext/reso/019/05/0395-0405. Keywords.

  20. Broken windows, mediocre methods, and substandard statistics

    NARCIS (Netherlands)

    Wicherts, J.M.; Bakker, M.

    2014-01-01

    Broken windows theory states that cues of inappropriate behavior like litter or graffiti amplify norm-violating behavior. In a series of quasi-experiments, Keizer, Lindenberg, and Steg altered cues of inappropriate behavior in public places and observed how many passersby subsequently violated

  1. PERIODIC-SOLUTIONS IN SPONTANEOUSLY BROKEN THEORIES

    NARCIS (Netherlands)

    BRIHAYE, Y; KUNZ, J

    A class of spontaneously broken field theories is proposed, and the occurrence of their periodic, classical solutions is investigated in detail. The emergence of multiple solutions is observed, their normal modes of oscillation are studied, and the bifurcations of the classical energy functional are

  2. Trust in Scientific Publishing

    NARCIS (Netherlands)

    Hummels, Harry; Roosendaal, Hans E.

    2001-01-01

    Trust is an important phenomenon to reduce organisational complexity and uncertainty. In the literature many types of trust are distinguished. An important framework to understand the variety and development of trust in organisations is provided by Zucker. She distinguishes three types of trust:

  3. The Academy Trust

    Indian Academy of Sciences (India)

    user

    The Academy Trust. Agenda. Date: 3rd November 2016. Time: 0900 hrs. Venue: Visitors' Hostel – Auditorium, IISER Bhopal. 0900 – 0930 hrs Welcome and Introduction to the Academy Trust (Chair Academy. Trust or Trustee). Remarks by Director, IISER, Bhopal. Remarks by: Eklavya Trust. 0930 – 1015 hrs Talk by Prof.

  4. Trust and Leadership

    DEFF Research Database (Denmark)

    Bordum, Anders

    2005-01-01

    The concept and phenomenon of trust and its relation to leadership has recently come into focus. What role does trust play? Can trust be created strategically? Questions like these are often raised. How we conceive of and conceptualize trust is not as often discussed. Among those conceptualizations...... flexibility of form for example, the idea that one with leadership tools can consciously bring forth trust. In the conclusion, the question about trust communication is addressed. In this section I argue that trust is positively value-laden, becausesincerity is a functional and pragmatic condition...

  5. Simple Technique for Removing Broken Pedicular Screws

    Directory of Open Access Journals (Sweden)

    A Agrawal

    2014-03-01

    Full Text Available The procedure for removing a broken pedicle screw should ideally be technically easy and minimally invasive, as any damage to the pedicle, during removal of the broken screw, may weaken the pedicle, thus compromising on the success of re-instrumentation. We describe the case of a 32-year old man who had undergone surgery for traumatic third lumbar vertebral body fracture three years prior to current admission and had developed the complication of pedicle screw breakage within the vertebral body. The patient underwent re-exploration and removal of the distal screws. Through a paravertebral incision and muscle separation, the screws and rods were exposed and the implants were removed.

  6. Ratchet device with broken friction symmetry

    DEFF Research Database (Denmark)

    Norden, Bengt; Zolotaryuk, Yaroslav; Christiansen, Peter Leth

    2002-01-01

    An experimental setup (gadget) has been made for demonstration of a ratchet mechanism induced by broken symmetry of a dependence of dry friction on external forcing. This gadget converts longitudinal oscillating or fluctuating motion into a unidirectional rotation, the direction of which is in ac...... is in accordance with given theoretical arguments. Despite the setup being three dimensional, the ratchet rotary motion is proved to be described by one simple dynamic equation. This kind of motion is a result of the interplay of friction and inertia.......An experimental setup (gadget) has been made for demonstration of a ratchet mechanism induced by broken symmetry of a dependence of dry friction on external forcing. This gadget converts longitudinal oscillating or fluctuating motion into a unidirectional rotation, the direction of which...

  7. Effective field theory of broken spatial diffeomorphisms

    Energy Technology Data Exchange (ETDEWEB)

    Lin, Chunshan [Yukawa Institute for Theoretical Physics, Kyoto University,Kitashirakawa Oiwakecho, Sakyo-ku, Kyoto 606-8502 (Japan); Kavli Institute for the Physics and Mathematics of the Universe (WPI),The University of Tokyo Institutes for Advanced Study, The University of Tokyo,Kashiwa, Chiba 277-8583 (Japan); Labun, Lance Z. [Department of Physics, University of Texas,2515 Speedway, MS #C1510, Austin, TX 78712-1068 (United States); Department of Physics, National Taiwan University,No. 1, Sec. 4, Roosevelt Road, Taipei 10617, Taiwan (China); Leung Center for Cosmology and Particle Astrophysics (LeCosPA), National Taiwan University,No. 1, Sec. 4, Roosevelt Road, Taipei 10617, Taiwan (China)

    2016-03-17

    We study the low energy effective theory describing gravity with broken spatial diffeomorphism invariance. In the unitary gauge, the Goldstone bosons associated with broken diffeomorphisms are eaten and the graviton becomes a massive spin-2 particle with 5 well-behaved degrees of freedom. In this gauge, the most general theory is built with the lowest dimension operators invariant under only temporal diffeomorphisms. Imposing the additional shift and SO(3) internal symmetries, we analyze the perturbations on a FRW background. At linear perturbation level, the observables of this theory are characterized by five parameters, including the usual cosmological parameters and one additional coupling constant for the symmetry-breaking scalars. In the de Sitter and Minkowski limit, the three Goldstone bosons are supermassive and can be integrated out, leaving two massive tensor modes as the only propagating degrees of freedom. We discuss several examples relevant to theories of massive gravity.

  8. Broken Ergodicity in Ideal, Homogeneous, Incompressible Turbulence

    Science.gov (United States)

    Morin, Lee; Shebalin, John; Fu, Terry; Nguyen, Phu; Shum, Victor

    2010-01-01

    We discuss the statistical mechanics of numerical models of ideal homogeneous, incompressible turbulence and their relevance for dissipative fluids and magnetofluids. These numerical models are based on Fourier series and the relevant statistical theory predicts that Fourier coefficients of fluid velocity and magnetic fields (if present) are zero-mean random variables. However, numerical simulations clearly show that certain coefficients have a non-zero mean value that can be very large compared to the associated standard deviation. We explain this phenomena in terms of broken ergodicity', which is defined to occur when dynamical behavior does not match ensemble predictions on very long time-scales. We review the theoretical basis of broken ergodicity, apply it to 2-D and 3-D fluid and magnetohydrodynamic simulations of homogeneous turbulence, and show new results from simulations using GPU (graphical processing unit) computers.

  9. A broken catheter in the epidural space.

    Science.gov (United States)

    Anwari, Jamil S; Al-Wahbi, Yahya; Al-Nahdi, Saleh

    2014-04-01

    The Arrow FlexTip epidural catheter has reinforced coiled stainless steel wire, which facilitates its insertion and is less likely to puncture the blood vessels. However, as compared with non-reinforced, reinforced epidural catheters are more vulnerable to break. We report a case from Saudi Arabia on a retained fragment of a broken epidural catheter. Measures to prevent this mishap and its management are discussed.

  10. Trusting the State, Trusting Each Other? The Effect of Institutional Trust on Social Trust

    DEFF Research Database (Denmark)

    Sønderskov, Kim Mannemar; Dinesen, Peter Thisted

    2016-01-01

    Trust in state institutions is a prominent explanation of social trust. However, previous—mainly cross-sectional—analyses provide limited causal evidence regarding the relationship between institutional trust and social trust and it is thus essentially unknown whether an observed relationship...... reflects reverse causality (social trust forming institutional trust), or both forms of trust reflecting deep-seated dispositions (common confounding). Against the backdrop of the shortcomings of previous cross-sectional analyses, this paper utilizes two Danish panel surveys containing measures of both...... types of trust for the same individuals surveyed at multiple points in time over a long time-span (up to 18 years) to address the potentially reverse and/or spurious relationship. Using individual fixed effects and cross-lagged panel models, the results provide strong evidence of trust in state...

  11. Calculativeness and trust

    DEFF Research Database (Denmark)

    Frederiksen, Morten

    2014-01-01

    Williamson’s characterisation of calculativeness as inimical to trust contradicts most sociological trust research. However, a similar argument is found within trust phenomenology. This paper re-investigates Williamson’s argument from the perspective of Løgstrup’s phenomenological theory of trust....... Contrary to Williamson, however, Løgstrup’s contention is that trust, not calculativeness, is the default attitude and only when suspicion is awoken does trust falter. The paper argues that while Williamson’s distinction between calculativeness and trust is supported by phenomenology, the analysis needs...... to take actual subjective experience into consideration. It points out that, first, Løgstrup places trust alongside calculativeness as a different mode of engaging in social interaction, rather conceiving of trust as a state or the outcome of a decision-making process. Secondly, the analysis must take...

  12. Trust in motives, trust in competence

    Directory of Open Access Journals (Sweden)

    Matt Twyman

    2008-01-01

    Full Text Available According to Siegrist, Earle and Gutscher's (2003 model of risk communication, the effect of advice about risk on an agent's behavior depends on the agent's trust in the competence of the advisor and on their trust in the motives of the advisor. Trust in competence depends on how good the advice received from the source has been in the past. Trust in motives depends on how similar the agent assesses the advisor's values to be to their own. We show that past quality of advice and degree of similarity between advisors' and judges' values have separate (non-interacting effects on two types of agent behavior: the degree of trust expressed in a source (stated trust and the weight given to the source's advice (revealed trust. These findings support Siegrist et al.'s model. We also found that revealed trust was affected more than stated trust by differences in advisor quality. It is not clear how this finding should be accommodated within Siegrist et al.'s (2003 model.

  13. Looking for Trust

    DEFF Research Database (Denmark)

    Bøge, Ask Risom; Lauritsen, Peter

    Trust and surveillance are often seen as opposites. Trust is regularly characterized as the glue that holds society together, while surveillance is seen as corrosive. However, in Scandinavia high levels of trust and surveillance coexist. It is therefore interesting to investigate if there is a co......Trust and surveillance are often seen as opposites. Trust is regularly characterized as the glue that holds society together, while surveillance is seen as corrosive. However, in Scandinavia high levels of trust and surveillance coexist. It is therefore interesting to investigate...

  14. Suitability of Broken Bottles as Fine Aggregate for Production of ...

    African Journals Online (AJOL)

    The use of broken bottles as partial replacement of river sand for production of concrete was investigated. The grading of the broken bottles and sand fell in zone II. The specific gravity of the bottles was 2.55 and that of sand was 2.65. Sand was replaced with the broken bottles in the proportions of 0%, 10%, 20%, 30%, 40%, ...

  15. Strength Assessment of Broken Rock Postgrouting Reinforcement Based on Initial Broken Rock Quality and Grouting Quality

    Directory of Open Access Journals (Sweden)

    Hongfa Xu

    2017-01-01

    Full Text Available To estimate postgrouting rock mass strength growth is important for engineering design. In this paper, using self-developed indoor pressure-grouting devices, 19 groups of test cubic blocks were made of the different water cement ratio grouting into the broken rock of three kinds of particle sizes. The shear strength parameters of each group under different conditions were tested. Then this paper presents a quantitative calculation method for predicting the strength growth of grouted broken rock. Relational equations were developed to investigate the relationship between the growth rates of uniaxial compressive strength (UCS, absolute value of uniaxial tensile strength (AUTS, internal friction angle, and cohesion for post- to pregrouting broken rock based on Mohr-Coulomb strength criterion. From previous test data, the empirical equation between the growth rate of UCS and the ratio of the initial rock mass UCS to the grout concretion UCS has been determined. The equations of the growth rates of the internal friction coefficient and UCS for grouting broken rock with rock mass rating (RMR and its increment have been established. The calculated results are consistent with the experimental results. These observations are important for engineered design of grouting reinforcement for broken rock mass.

  16. Reliable Design Versus Trust

    Science.gov (United States)

    Berg, Melanie; LaBel, Kenneth A.

    2016-01-01

    This presentation focuses on reliability and trust for the users portion of the FPGA design flow. It is assumed that the manufacturer prior to hand-off to the user tests FPGA internal components. The objective is to present the challenges of creating reliable and trusted designs. The following will be addressed: What makes a design vulnerable to functional flaws (reliability) or attackers (trust)? What are the challenges for verifying a reliable design versus a trusted design?

  17. The productivity of trust

    DEFF Research Database (Denmark)

    Bjørnskov, Christian; Méon, Pierre-Guillaume

    This paper returns to one of the early questions of the literature on social trust, whether trust affects total factor productivity (TFP). Using both development and growth accounting, we find strong evidence of a causal effect of trust on the level and growth of TFP. Using a three-stage least...

  18. Balancing Trust and Control

    DEFF Research Database (Denmark)

    Jagd, Søren

    This paper focuses on the leadership challenge of balancing trust and control. The relation between trust and control has for a long time been a puzzling issue for management researchers. In the paper I first show that there has been a dramatic change in the way the relation between trust and con...

  19. Trust and innovation

    NARCIS (Netherlands)

    Nooteboom, B.; Bachmann, R.; Zaheer, A.

    2013-01-01

    In innovation, trust is especially needed as well as especially problematic. One needs trust under uncertainty and in innovation uncertainty is high. If one were certain about conditions, conduct and outcomes one would no longer talk about trust. This is related to a paradox of information

  20. Trust Management V

    DEFF Research Database (Denmark)

    2011-01-01

    from 42 submissions. The papers feature both theoretical research and real-world case studies from academia, business and government focusing on areas such as: trust models, social and behavioral aspects of trust, trust in networks, mobile systems and cloud computation, privacy, reputation systems...

  1. Trust and Credit

    DEFF Research Database (Denmark)

    Harste, Gorm

    The present paper is an answer to the question, how did trust and credit emerge. The systems of trust and credit reduce the environmental and contextual complexities in which trust and credit are embedded. The paper analyses the forms of this reduction in a number of stages in the evolution...

  2. Impact Through Trust

    DEFF Research Database (Denmark)

    Mayoral, Juan A.

    trust between judges as a new mechanism for enhancing the cooperation and compliance by national courts with the CJEU jurisprudence and EU legal mandates. The chapter describes the conditions under which national judges trust the CJEU to identify how the Court can promote trust in its role as a supreme...

  3. Trust Drives Internet Use

    DEFF Research Database (Denmark)

    Ljunge, Jan Martin

    This paper estimates the effect of trust on internet use by studying the general population as well as second generation immigrants in 29 European countries with ancestry in 87 nations. There is a significant positive effect of trust on internet use. The positive trust effect is not universal...

  4. The Dimensionality of Trust

    Science.gov (United States)

    2005-06-30

    REMPEL , J.K. (1989). Trust in close relationships . In C. Hendrick (Ed.). Close Relationships . Newbury Park...conduct behaviour research? Journal of Marketing Research, 33, 1-8. REMPEL , J., HOLMES, J., & ZANNA, M. (1985). Trust in Close Relationships ... closeness but was less in close relationships . Moreover, in relationships with more than two parties, having a third party amplified both trust

  5. Rotating optical microcavities with broken chiral symmetry

    CERN Document Server

    Sarma, Raktim; Wiersig, Jan; Cao, Hui

    2014-01-01

    We demonstrate in open microcavities with broken chiral symmetry, quasi-degenerate pairs of co-propagating modes in a non-rotating cavity evolve to counter-propagating modes with rotation. The emission patterns change dramatically by rotation, due to distinct output directions of CW and CCW waves. By tuning the degree of spatial chirality, we maximize the sensitivity of microcavity emission to rotation. The rotation-induced change of emission is orders of magnitude larger than the Sagnac effect, pointing to a promising direction for ultrasmall optical gyroscopes.

  6. Social Trust and Fractionalization:

    DEFF Research Database (Denmark)

    Bjørnskov, Christian

    2008-01-01

    This paper takes a closer look at the importance of fractionalization for the creation of social trust. It first argues that the determinants of trust can be divided into two categories: those affecting individuals' trust radii and those affecting social polarization. A series of estimates using...... a much larger country sample than in previous literature confirms that fractionalization in the form of income inequality and political diversity adversely affects social trust while ethnic diversity does not. However, these effects differ systematically across countries, questioning standard...... interpretations of the influence of fractionalization on trust....

  7. Dimensions of trust

    DEFF Research Database (Denmark)

    Frederiksen, Morten

    2012-01-01

    limited sets of exchange or work relations. This article revisits Simmel’s concept of trust as social form in order to investigate this differentiation. From an interview study, the differentiation and limits of trust are analysed within different types of social relations. Trust is found to vary greatly...... in scope and mode influenced by the intersecting dimensions of relations, objects and situations. Furthermore, trust exists between an outer threshold of expected deceit and an inner threshold of confident reliance. The findings from the qualitative study contribute new knowledge on the diversity of trust...

  8. Trust Management: Literature Review

    Directory of Open Access Journals (Sweden)

    Joanna Olga Paliszkiewicz

    2011-12-01

    Full Text Available The concept of trust has become popular in public debate andacademic analysis. In high income countries this interest is associatedwith concern for the decline of trust in governments andprofessionals, and in developing countries has been promptedby debates around the motion of social capital. Trust has beenidentified as a major factor influencing such things as capital investment,relationship marketing, cross-cultural communication,learning and various types of cooperation. Trust management isbecoming also very important inside the organization. The studywill review empirical research on organizational trust. The purposeof the study will be also evaluation of the advancements andsetbacks in current empirical research in terms of managementorganizational trust. This paper will analyze the theoretical approach,the conceptualization and the measurement issues coveredin studies on management organizational trust. Althoughtrust has emerged as an important factor in organizational relationships,there are still major conceptual and methodologicalchallenges to be met when studying this complex concept.

  9. Ethics at Israeli universities: unlearned lessons from professional ethics.

    Science.gov (United States)

    Rubin, Simon Shimshon

    2011-03-01

    At the practical level, sustained attention to ethical issues in academia in Israel is inadequate. This paper suggests that professional models of ethics education and training present constructive alternatives. The author views this topic from the dual perspective of a professional clinical psychologist and a committed faculty member. After a brief introduction, the paper opens with a case vignette of ethical violations of trust in academia, its handling, and how a similar case 25 years later illustrates the lack of progress in preparing the academic community for such things. A discussion of normative actions and behavioral norms in academia follows. Three lessons from the professions are offered: 1) the importance of involving members in the process of identifying ethical violations; 2) the value of adopting for academia current practices preparing persons for work in research, (for example the standardization of online modules for training in ethics); and c) the significance of addressing self-interest and its limits. If silence around a code of ethics is being practiced, that silence should be broken.

  10. Personal Trust Increases Cooperation beyond General Trust

    Science.gov (United States)

    Acedo-Carmona, Cristina; Gomila, Antoni

    2014-01-01

    In this paper we present a new methodology which, while allowing for anonymous interaction, it also makes possible to compare decisions of cooperating or defecting when playing games within a group, according to whether or not players personally trust each other. The design thus goes beyond standard approaches to the role of trust in fostering cooperation, which is restricted to general trust. It also allows considering the role of the topology of the social network involved may play in the level of cooperation found. The results of this work support the idea that personal trust promotes cooperation beyond the level of general trust. We also found that this effect carries over to the whole group, making it more cohesive, but that higher levels of cohesion rely on a particular topology. As a conclusion, we hypothesize that personal trust is a psychological mechanism evolved to make human social life possible in the small groups our ancestors lived in, and that this mechanism persists and plays a role in sustaining cooperation and social cohesion. PMID:25144539

  11. Ratchet due to broken friction symmetry

    DEFF Research Database (Denmark)

    Norden, Bengt; Zolotaryuk, Yaroslav; Christiansen, Peter Leth

    2002-01-01

    with it have been carried out. In this device, an asymmetry of friction dependence on an applied force appears, resulting in rectification of rotary motion, In experiments, our setup is observed to rotate only in one direction, which is in accordance with given theoretical arguments, Despite the setup being...... three dimensional, the ratchet rotary motion is proved to be described by one dynamical equation. This kind of motion is a result of the interplay of friction and inertia. We also consider a case with viscous friction, which is irrelevant to this gadget, but it can be a possible mechanism of rotary......A ratchet mechanism that occurs due to asymmetric dependence of the friction of a moving system on its velocity or a driving force is reported. For this kind of ratchet, instead of a particle moving in a periodic potential, the dynamics of which have broken space-time symmetry, the system must...

  12. Broken Symmetries and the Higgs Boson

    Directory of Open Access Journals (Sweden)

    Horváth Dezső

    2014-01-01

    Full Text Available The 40 years old Standard Model, the theory of particle physics, seems to describe all experimental data very well. The theory is based on symmetries, some of them are broken, mostly by the weak interaction. All of its elementary particles were identified and studied apart from the Higgs boson until 2012, when the two main experiments of the Large Hadron Collider at CERN, CMS and ATLAS observed a new particle with properties close to those predicted for the Higgs boson. The discovery of the Higgs boson proves the validity of the Brout-Englert-Higgs mechanism of spontaneous symmetry breaking and François Englert and Peter Higgs received the 2013 Nobel Prize in Physics. There are several questions yet concerning the possible theoretical significance of the mass of the new particle.

  13. Modified broken rice starch as fat substitute in sausages

    Directory of Open Access Journals (Sweden)

    Valéria Maria Limberger

    2011-09-01

    Full Text Available The demand for low-fat beef products has led the food industry to use fat substitutes such as modified starch. About 14% of broken rice is generated during processing. Nevertheless, this by-product contains high levels of starch; being therefore, great raw material for fat substitution. This study evaluated the applicability of chemically and physically modified broken rice starch as fat substitute in sausages. Extruded and phosphorylated broken rice was used in low-fat sausage formulation. All low-fat sausages presented about 55% reduction in the fat content and around 28% reduction in the total caloric value. Fat replacement with phosphorylated and extruded broken rice starch increased the texture acceptability of low-fat sausages, when compared to low-fat sausages with no modified broken rice. Results suggest that modified broken rice can be used as fat substitute in sausage formulations, yielding lower caloric value products with acceptable sensory characteristics.

  14. Trust in Strategic Alliances

    DEFF Research Database (Denmark)

    Nielsen, Bo

    2011-01-01

    This article examines the dynamic and multi-dimensional nature of trust in strategic alliances. Adopting a co-evolutionary approach, I developed a framework to show how trust, conceptualised in different forms, plays distinct roles at various evolutionary stages of the alliance relationship....... Emphasising the multi-dimensional and dynamic role of trust, the framework illustrates how initial levels of a particular type of trust may co-evolve with the alliance and influence subsequent phases of the relationship – either on its own or in combination with other types or dimensions of trust....... The theoretical distinction between trust as antecedent, moderator and outcome during the evolution of the alliance relationship leads to research questions that may guide future empirical research....

  15. Neither Trust nor Distrust

    DEFF Research Database (Denmark)

    Jensen, Tina Gudrun

    2016-01-01

    This article deals with the politicised notions of trust and social cohesion in urban spaces through a focus on practices of everyday relations in a mixed neighbourhood. Quantitative studies maintain that ethnically diverse neighbourhoods lack in trust and solidarity. However, the very meaning...... and effect of concepts such as `diversity`, `contact` and `trust´ are often unclear. This article challenges both the politicised assumptions and methodological basis for statements on trust as a condition for coexistence. Drawing on fieldwork in a multi-ethnic social housing estate in Copenhagen......, this article explores residents´ understandings of diversity, contact and trust. The article argues that trust and strong ties may not be the prerequisite for coexistence in neighbourhoods, where the micro-politics of everyday contacts predominate....

  16. Terrorism, Trust and Tourism

    DEFF Research Database (Denmark)

    Jensen, Susanne; Svendsen, Gert Tinggaard

    2017-01-01

    How does terrorism affect social trust and tourism? The rising number of terrorist attacks in Western Europe has caused safety problems not only for local citizens but also for tourists. In fact, terrorists challenge the formal violence monopoly of the state thus creating a sense of anarchy...... and distrust. Social trust is about trusting strangers, so when less predictable behaviour occurs in, a given country, people become more careful as they tend to trust most other people less. An interesting case for future research is Scandinavia as the level of terrorism is still low and, at the same time......, Scandinavia can record most social trust in the world meaning a competitive advantage when attracting tourists. Arguably, a double dividend is created from fighting terrorism, namely more social trust accumulated and more tourists attracted. Future research should therefore try to further test our model...

  17. Logotherapy Counseling to Improve Acceptance of Broken Home Child

    Directory of Open Access Journals (Sweden)

    Erwin Erlangga

    2017-08-01

    Full Text Available This study aims to increase the enrollment of children of a broken home that life has meaning. Subjects are 100 children in Demak whose families experiencing divorce. Research themes include three things: individual counseling, engineering logotherapy, reception, and a child of a broken home. Data obtained based on interviews, observation, and psychological scale showed that of the 100 children of a broken home has a low acceptance that individual counseling with logotherapy techniques were considered appropriate to increase the enrollment of children of a broken home. Factors - factors that affect the acceptance of a child of a broken home is self-blame, anger and did not have a purpose in life again. In addition the environment is also a significant effect on the enrollment of children of a broken home. Environmental labeling of families experiencing divorce as a family that failed so that children are increasingly stressed with the stamp of the community. Based on the field test results, the level of acceptance of the child of a broken home increases after the individual is given counseling services with logotherapy techniques. Indicated by changes in the level of acceptance of children of a broken home before being given treatment (initial evaluation and after (final evaluation of 130 points. The results of effectiveness test statistic t test calculations also showed 0,010 <0.05.It was concluded that counseling individuals with logotherapy effective technique to increase the enrollment of children of a broken home

  18. The geography of trust.

    Science.gov (United States)

    Joni, Saj-nicole A

    2004-03-01

    Leaders who rely forever on the same internal advisers, entrusting them with issues of ever greater sensitivity and consequence, run the risk of being sold short and possibly betrayed. Alternatively, lone-wolf leaders who trust no one may make enormous, yet preventable, mistakes when trying to sort through difficult decisions. A sophisticated understanding of trust can protect leaders from both fates. During the past decade, author and consultant Saj-nicole Joni studied leadership in more than 150 European and North American companies. Her research reveals three fundamental types of trustpersonal trust, expertise trust, and structural trust. Executives may persevere in relationships that are based on personal trust, no matter how exalted their leadership roles become. But such relationships are unlikely to remain static. They also probably won't provide the kinds of deep, often specialized knowledge leaders need. In circumstances where advisers' competence matters as much as their character, expertise trust--reliance on an adviser's ability in a specific subject--enters the picture. In organizations, leaders develop expertise trust by working closely with people who consistently demonstrate their mastery of particular subjects or processes. Structural trust refers to how roles and ambitions influence advisers' perspectives and candor. It shifts constantly as people rise through organizations. High-level structural trust can provide leaders with pure insight and information--but advisers in positions of the highest structural trust generally reside outside organizations. These advisers provide leaders with insights that their organizations cannot. High-performing leaders' most enduring--and most valuable--relationships are characterized by enormous levels of all three kinds of trust.

  19. Trust and Influence

    Science.gov (United States)

    2012-03-05

    strikes, messaging, developmental activities) •Understanding the cognitive mechanisms that drive influence effects – identify the avenues of influence...competencies – trust building AF Tech Horizon‟s 2010 “In the near to mid-term, developing methods for establishing „certifiable trust in...Stokes – Dynamic Trust Model PI: Charlene Stokes (AFRL) Lab Task Drs. Lin ( Sunway U) and Chen (NICTA) Objective: Examine contextual factors

  20. Trust repertoires for collaboration

    DEFF Research Database (Denmark)

    Fuglsang, Lars

    This case study analyses the role of trust in a public private innovation network that involved a private consultancy company as a facilitator. We know that collaboration is a important for innovation, and that collaboration across organizational boundaries is not a trivial issue. But we know very...... little about how such processes develop and how trust, understood as “confident positive expectations” (Lewicki et al. 1998) to collaborative activities, arises out of collaboration. The paper contributes by showing how trust and collaboration are intertwined. The main finding is that a facilitator can...... mediate trust in such a context by drawing on cultural repertoires of justification...

  1. In regulation we trust.

    Science.gov (United States)

    Wiig, Siri; Tharaldsen, Jorunn Elise

    2012-01-01

    The role of trust has been argued to play an increasingly important role in modern, complex, and ambivalent risk societies. Trust within organizational research is anticipated to have a general strategic impact on aspects such as organizational performance, communication and knowledge exchange, and learning from accidents. Trust is also an important aspect related to regulation of risk. Diverse regulatory regimes, their contexts and risks influence regulators use of trust and distrust in regulatory practice. The aim of this paper is to discuss the relationship between risk regulation and trust across diverse risk regulation regimes. By drawing from studies of risk regulation, risk perception, and trust the purpose is to discuss how regulation and trust are linked and used in practice to control risk across system levels in socio-technical systems in high risk industries. This paper provides new knowledge on 1) how functional and dysfunctional trust and distrust are grounded in the empirical realities of high risk industries, 2) how different perspectives on trust and distrust act together and bring new knowledge on how society control risk.

  2. The Determinants of Trust

    DEFF Research Database (Denmark)

    Bjørnskov, Christian

    general, do you think that most people can be trusted?”, the by now quite substantial literature has found that social trust is associated with a set of different macroeconomic outcomes: economic growth, the rule of law and overall quality of governance, corruption, education, the extent of violent crime...... that the empirical associations between social trust and e.g. education or rule of law reflect the reverse causal direction, i.e. that trust has caused part of the cross-country differences in these factors. The aim of this paper is to assess the impact of a number of the central factors proposed in the literature...

  3. Trust Discovery in Online Communities

    Science.gov (United States)

    Piorkowski, John

    2014-01-01

    This research aims to discover interpersonal trust in online communities. Two novel trust models are built to explain interpersonal trust in online communities drawing theories and models from multiple relevant areas, including organizational trust models, trust in virtual settings, speech act theory, identity theory, and common bond theory. In…

  4. Balancing Trust and Control

    DEFF Research Database (Denmark)

    Jagd, Søren

    2010-01-01

    The purpose of this paper is to show that conceptualizing trust and control as interactively related processes, as opposed to more static conceptualizations of the two concepts and the relations between them, adds importantly towards understanding the challenges involved in balancing of trust and...

  5. Does trust pay off?

    NARCIS (Netherlands)

    R. de Bliek (Ruben)

    2012-01-01

    textabstractIt is believed that a society's level of trust in strangers, also known as generalized or interpersonal trust, is an accurate reflection of the quality of civil society and of the success of its accompanying economy. Two unresolved issues remain. The first issue concerns the

  6. National Education Trust Fund

    Science.gov (United States)

    Shapp, Milton J.

    1975-01-01

    A proposal from the governor of Pennsylvania for financing all levels of education through a National Education Trust Fund (NETF) that would operate as the present Federal Highway Trust Fund does on a revolving, self-liquidating basis with the cost of an individual's education repaid through a progressive education tax on income. (JT)

  7. Dimensionality of Organizational Trust

    Science.gov (United States)

    Adams, Samuel H.; Wiswell, Albert K.

    2007-01-01

    Trust facilitates individual and organizational learning, and is often misunderstood by organizations although they must continuously learn in order to attain organizational goals and survive. Leaders of organizations often view trust defensively and their reactions may impede organizational learning This paper builds on prior research concerning…

  8. On Representative Trust

    NARCIS (Netherlands)

    Bellemare, C.; Kroger, S.

    2003-01-01

    Because of its relation to economic growth, there is a policy interest in measuring social capital and average trust as its currently most important proxy.In this paper we measure societal trust and trustworthiness by combining the virtues of laboratory experiments and survey data and present

  9. [Broken Racz catheter during application (case report)].

    Science.gov (United States)

    Karaman, Haktan; Oztürkmen Akay, Hatice; Turhanoğlu, Selim

    2006-01-01

    The most important complication of lumber disc hernia operations is Failed Back Surgery Syndrome (FBSS), which goes with fibrotic adhesions at the surgical site. The primary treatment applied to the cases that develop FBSS is the placement of Racz catheter under floroscopy and application of epidural neuroplasty which is a three-day procedure. However, this intervention, from which patients benefit a great deal, has some important complications during and after the application. One of these complications is that some pieces of Racz catheter may be broken out and retain at some levels of epidural space and subcutaneous tissue during placement and removal. General approach is to remove the retaining piece surgically. However, there is a less common view that, instead of removing the retaining piece, the patient should be followed up strictly and regularly in terms of neurologic complications. In our case, we decided to perform epidural neuroplasty to the patient diagnosed as FBSS. However, during the placement of the catheter, it was trapped in the left side of L5-S1 foramen by accident due to dense fibrotic tissues, and the subcutaneus part retained in the epidural space. Monthly follow-ups for 12 month were proposed to the patient, while surgery was not recommended. At the end of this period, no sign of infection was observed and neurologic and radiologic findings of the patient did not worsen. It is also interesting that a remarkable recovery was observed in the patient's clinical situation.

  10. Planck driven by vision, broken by war

    CERN Document Server

    Brown, Brandon R

    2015-01-01

    Planck's Law, an equation used by physicists to determine the radiation leaking from any object in the universe, was described by Albert Einstein as "the basis of all twentieth-century physics." Max Planck is credited with being the father of quantum theory, and his work laid the foundation for our modern understanding of matter and energetic processes. But Planck's story is not well known, especially in the United States. A German physicist working during the first half of the twentieth century, his library, personal journals, notebooks, and letters were all destroyed with his home in World War II. What remains, other than his contributions to science, are handwritten letters in German shorthand, and tributes from other scientists of the time, including his close friend Albert Einstein. In Planck: Driven by Vision, Broken by War, Brandon R. Brown interweaves the voices and writings of Planck, his family, and his contemporaries-with many passages appearing in English for the first time-to create a portrait of...

  11. The wave has finally broken: now what?

    Science.gov (United States)

    Simborg, Donald W; Detmer, Don Eugene; Berner, Eta S

    2013-06-01

    In 2005, the authors published a paper, 'Will the wave finally break? A brief view of the adoption of electronic medical records in the United States', which predicted that rapid adoption of electronic health records (EHR) would occur in the next 5 years given appropriate incentives. The wave has finally broken with the stimulus of the health information technology for economic and clinical health legislation in 2009, and there have been both positive and negative developments in the ensuing years. The positive developments, among others described, are increased adoption of EHR, the emergence of a national network infrastructure and the recognition of clinical informatics as a medical specialty. Problems that still exist include, among others described, continued user interface problems, distrust of EHR-generated notes and an increased potential for fraud and abuse. It is anticipated that in the next 5 years there will be near universal EHR adoption, greater emphasis on standards and interoperability, greater involvement of Congress in health information technology (IT), breakthroughs in user interfaces, compelling online medical and IT education, both increased use of data analytics for personalized healthcare and a realization of the difficulties of this approach, a blurring of the distinction between EHR and telemedicine, a resurgence of computer-assisted diagnosis and the emergence of a 'continuously learning' healthcare system.

  12. Trust and Wellbeing

    Directory of Open Access Journals (Sweden)

    John F. Helliwell

    2011-01-01

    Full Text Available

    This paper presents new evidence linking trust and subjective wellbeing, based primarily on data from the Gallup World Poll and cycle 17 of the Canadian General Social Survey (GSS17. Because several of the general explanations for subjective wellbeing examined here show large and significant linkages to both household income and various measures of trust, it is possible to estimate income-equivalent compensating differentials for different types of trust. Measures of trust studied include general social trust, trust in management, trust in co-workers, trust in neighbours, and trust in police. In addition, some Canadian surveys and the Gallup World Poll ask respondents to estimate the chances that a lost wallet would be returned to them if found by different individuals, including neighbours, police and strangers.

    Our results reveal strong linkages between several trust measures and subjective well-being, as well as strong linkages between social trust and two major global causes of death—suicides and traffic fatalities. This suggests the value of learning more about how trust can be built and maintained, or repaired where it has been damaged. We therefore use data from the Canadian GSS17 to analyze personal and neighbourhood characteristics, including education, migration history, and mobility, that help explain differences in trust

  13. Softly broken finite supersymmetric grand unified theory

    Energy Technology Data Exchange (ETDEWEB)

    Kazakov, D.I. [Joint Inst. for Nucl. Res., Dubna (Russian Federation). Bogoliubov Lab. of Theor. Phys.; Kalmykov, M.Yu. [Joint Inst. for Nucl. Res., Dubna (Russian Federation). Bogoliubov Lab. of Theor. Phys.; Kondrashuk, I.N. [Joint Inst. for Nucl. Res., Dubna (Russian Federation). Bogoliubov Lab. of Theor. Phys.; Gladyshev, A.V. [Physics Department, Moscow State University, 119 899 Moscow (Russian Federation)

    1996-07-15

    In the context of the standard SUSY GUT scenario, we present a detailed analysis of the softly broken finite supersymmetric grand unified theory. The model, albeit nonminimal, remains very rigid due to the requirement of finiteness. It is based on the SU(5) gauge group and is UV finite to all orders of perturbation theory. It contains three generations of the matter fields together with four pairs of Higgses. The requirement of UV finiteness fixes all the Yukawa couplings at the GUT scale. Imposing the condition of universality on the soft couplings at the Planck scale and then extending the condition of finiteness to them, one gets a completely finite unified theory above M{sub GUT}. This makes the fine-tuning procedure more meaningful and leads to the usual Minimal Supersymmetric Standard Model below M{sub GUT}. All the masses of the ordinary particles including Higgses are obtained due to the Higgs mechanism at the electro-weak scale. The hierarchy of quark and lepton masses is related to that of v.e.v.`s of the Higgs fields and is governed by the Higgs mixing matrix in the generation space. Superpartners develop their masses according to the RG equations starting from the soft terms at the Planck scale. The suggestion of complete finiteness and maximal simplicity of the unified theory leads to the connection between the initial values of soft SUSY breaking parameters, namely m{sub 0}{sup 2}=1/3m{sub 1/2}{sup 2}, A{sub t}=A{sub b}=A{sub {tau}}=-m{sub 1/2}, B=-m{sub 1/2}, so that the number of free parameters is less than that of the MSSM. (orig.).

  14. Softly broken finite supersymmetric grand unified theory

    Science.gov (United States)

    Kazakov, D. I.; Kalmykov, M. Yu.; Kondrashuk, I. N.; Gladyshev, A. V.

    1996-02-01

    In the context of the standard SUSY GUT scenario, we present a detailed analysis of the softly broken finite supersymmetric grand unified theory. The model, albeit nonminimal, remains very rigid due to the requirement of finiteness. It is based on the SU(5) gauge group and is UV finite to all orders of perturbation theory. It contains three generations of the matter fields together with four pairs of Higgses. The requirement of UV finiteness fixes all the Yukawa couplings at the GUT scale. Imposing the condition of universality on the soft couplings at the Planck scale and then extending the condition of finiteness to them, one gets a completely finite unified theory above MGUT. This makes the fine-tuning procedure more meaningful and leads to the usual Minimal Supersymmetric Standard Model below MGUT. All the masses of the ordinary particles including Higgses are obtained due to the Higgs mechanism at the electro-weak scale. The hierarchy of quark and lepton masses is related to that of v.e.v.'s of the Higgs fields and is governed by the Higgs mixing matrix in the generation space. Superpartners develop their masses according to the RG equations starting from the soft terms at the Planck scale. The suggestion of complete finiteness and maximal simplicity of the unified theory leads to the connection between the initial values of soft SUSY breaking parameters, namely m 02 = {1}/{3}m {1}/{2}2, A t = A b = A τ= -m {1}/{2}, B = -m {1}/{2}, so that the number of free parameters is less than that of the MSSM.

  15. Autonomy, Trust, and Respect.

    Science.gov (United States)

    Nys, Thomas

    2016-02-01

    This article seeks to explore and analyze the relationship between autonomy and trust, and to show how these findings could be relevant to medical ethics. First, I will argue that the way in which so-called "relational autonomy theories" tie the notions of autonomy and trust together is not entirely satisfying Then, I will introduce the so-called Encapsulated Interest Account as developed by Russell Hardin. This will bring out the importance of the reasons for trust. What good reasons do we have for trusting someone? I will criticize Hardin's business model as insufficiently robust, especially in the context of health care, and then turn to another source of trust, namely, love. It may seem that trust-through-love is much better suited for the vulnerability that is often involved in health care, but I will also show that it has its own deficiencies. Good health care should therefore pay attention to both models of trust, and I will offer some tentative remarks on how to do this. © The Author 2015. Published by Oxford University Press, on behalf of the Journal of Medicine and Philosophy Inc. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  16. Quantifying and Qualifying Trust: Spectral Decomposition of Trust Networks

    NARCIS (Netherlands)

    Pavlovic, Dusko

    In a previous FAST paper, I presented a quantitative model of the process of trust building, and showed that trust is accumulated like wealth: the rich get richer. This explained the pervasive phenomenon of adverse selection of trust certificates, as well as the fragility of trust networks in

  17. Trust vs. Crisis

    Directory of Open Access Journals (Sweden)

    Kirsten Mogensen

    2014-06-01

    Full Text Available The three social phenomena -- norms, trust, and crisis -- are in this paper combined into one model that illustrates their function and relationship. Crisis is seen as a reaction to serious violations of expectations that leave people disoriented, insecure about situational norms, and unable to judge whom to trust. One logical solution to a crisis is to rebuild a shared understanding of the norms involved in any given context. Banking is used as a case. Central concepts are borrowed from Niklas Luhmann Trust (1968, Alf Ross Directives and Norms (1967, and Arthur G. Neal National Trauma & Collective Memory (1998.

  18. Trust vs. Crisis

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    2014-01-01

    The three social phenomena -- norms, trust, and crisis -- are in this paper combined into one model that illustrates their function and relationship. Crisis is seen as a reaction to serious violations of expectations that leave people disoriented, insecure about situational norms, and unable...... to judge whom to trust. One logical solution to a crisis is to rebuild a shared understanding of the norms involved in any given context. Banking is used as a case. Central concepts are borrowed from Niklas Luhmann Trust (1968), Alf Ross Directives and Norms (1967), and Arthur G. Neal National Trauma...

  19. Competition Fosters Trust

    DEFF Research Database (Denmark)

    Huck, Steffen; Lünser, Gabriele; Tyran, Jean-Robert Karl

    2012-01-01

    We study the effects of reputation and competition in a trust game. If trustees are anonymous, outcomes are poor: trustees are not trustworthy, and trustors do not trust. If trustees are identifiable and can, hence, build a reputation, efficiency quadruples but is still at only a third of the first...... best. Adding more information by granting trustors access to all trustees' complete history has, somewhat surprisingly, no effect. On the other hand, we find that competition, coupled with some minimal information, eliminates the trust problem almost completely...

  20. Renormalization in the gauge theories with spontaneously broken supersymmetry

    CERN Document Server

    Kazakov, D I; Velizhanin, V N; Kondrashuk, I N

    2001-01-01

    A review of recent results on renormalizations in gauge theories with spontaneously broken supersymmetry is given. It is shown that the renormalizations in a broken theory are completely defined by those in a rigid theory and may be obtained with the help of expansion over the Grassmannian variables. New exact as well as suitable approximate analytic solutions of the renormalization group equations are obtained in some particular models: the Minimal Supersymmetric Standard Model, supersymmetric Grand Unified Theories, softly broken finite theories, and N=2 supersymmetric Seiberg-Witten theory

  1. Trusting Crowdsourced Geospatial Semantics

    Science.gov (United States)

    Goodhue, P.; McNair, H.; Reitsma, F.

    2015-08-01

    The degree of trust one can place in information is one of the foremost limitations of crowdsourced geospatial information. As with the development of web technologies, the increased prevalence of semantics associated with geospatial information has increased accessibility and functionality. Semantics also provides an opportunity to extend indicators of trust for crowdsourced geospatial information that have largely focused on spatio-temporal and social aspects of that information. Comparing a feature's intrinsic and extrinsic properties to associated ontologies provides a means of semantically assessing the trustworthiness of crowdsourced geospatial information. The application of this approach to unconstrained semantic submissions then allows for a detailed assessment of the trust of these features whilst maintaining the descriptive thoroughness this mode of information submission affords. The resulting trust rating then becomes an attribute of the feature, providing not only an indication as to the trustworthiness of a specific feature but is able to be aggregated across multiple features to illustrate the overall trustworthiness of a dataset.

  2. Trusts and Financialization

    DEFF Research Database (Denmark)

    Harrington, Brooke

    2017-01-01

    This article identifies trusts as a legal structure associated with the global spread of financialization. Although trusts originated in Medieval England, they have acquired a new significance in contemporary finance by virtue of their advantages in terms of 10 profit maximization and capital...... mobility. As a result, trusts have become common in contemporary structured finance for corporations, in addition to their traditional functions as estate planning and asset protection vehicles for high-net-worth individuals. This article specifies three ways in which the trust structure has facilitated...... the global spread of financialization: by privileging the rentier–investor within the 15 world economy; by perpetuating a distinctively Anglo-American approach to finance internationally; and by increasing the autonomy of finance vis-a-vis the nation-state. This study shares the primarily descriptive...

  3. Balancing trust and power

    DEFF Research Database (Denmark)

    Broholm-Jørgensen, Marie; Guassora, Ann Dorrit; Reventlow, Susanne

    2017-01-01

    OBJECTIVE: Little is known about how strategies of retaining patients are acted out by general practitioners (GPs) in the clinical encounter. With this study, we apply Grimens' (2009) analytical connection between trust and power to explore how trust and power appear in preventive health checks...... from the GPs' perspectives, and in what way trust and power affect and/or challenge strategies towards retaining patients without formal education. DESIGN: Data in this study were obtained through semi-structured interviews with GPs participating in an intervention project, as well as observations...... of clinical encounters. RESULTS: From the empirical data, we identified three dimensions of respect: respect for the patient's autonomy, respect for professional authority and respect as a mutual exchange. A balance of respect influenced trust in the relationship between GP and patients and the transfer...

  4. Balancing trust and power

    DEFF Research Database (Denmark)

    Broholm-Jørgensen, Marie; Guassora, Ann Dorrit; Reventlow, Susanne

    2017-01-01

    from the GPs' perspectives, and in what way trust and power affect and/or challenge strategies towards retaining patients without formal education. DESIGN: Data in this study were obtained through semi-structured interviews with GPs participating in an intervention project, as well as observations......OBJECTIVE: Little is known about how strategies of retaining patients are acted out by general practitioners (GPs) in the clinical encounter. With this study, we apply Grimens' (2009) analytical connection between trust and power to explore how trust and power appear in preventive health checks...... of power in the encounter. The GPs articulated that a balance was needed in preventive health checks in order to establish trust and thus retain the patient in the clinic. One way this balance of respect was carried out was with the use of humour. CONCLUSIONS: To retain patients without formal education...

  5. Education and Social Trust

    DEFF Research Database (Denmark)

    Oskarsson, Sven; Dinesen, Peter Thisted; Dawes, Christopher

    2017-01-01

    One of the clearest results in previous studies on social trust is the robust positive relationship with educational attainment. The most common interpretation is that education has a causal effect on social trust. The theoretical argument and empirical results in this article suggest a different...... interpretation. We argue that common preadult factors such as cognitive abilities and personality traits rooted in genes and early-life family environment may confound the relationship between educational attainment and social trust. We provide new evidence on this question by utilizing the quasi......-experiment of twinning. By looking at the relationship between education and social trust within monozygotic (MZ) twin pairs, we are able to avoid potential confounders rooted in genetic factors and common environmental influences because the monozygotic twins share both. The results suggest that when controlling...

  6. Building trust-business essentials

    Science.gov (United States)

    Sandy MacIver

    2008-01-01

    (Please note: This paper only contains the abstract.) Trust is particularly vital in the leadership of organizations. Trust is built by working through "joy, fear, and vulnerability," especially as it relates to trust in others and in teams. Key is learning to trust the right people in the right way in the right circumstances. In addition...

  7. Trust and Influence

    Science.gov (United States)

    2013-03-06

    Influence effects • Psychological /Behavioral Effects of Novel Weaponry BRI •Cognitive mechanisms for influence •Socio-digital Influence BRI...Officer AFOSR/RTC Air Force Research Laboratory Trust and Influence Date:6 MAR 2013 Report Documentation Page Form ApprovedOMB No. 0704-0188 Public...00-2013 4. TITLE AND SUBTITLE Trust and Influence 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT

  8. Foundation trusts. Power sharing.

    Science.gov (United States)

    Jobanputra, Renu; Buchan, James

    2003-05-01

    Foundation trusts will in theory have greater freedoms over pay, non-pay rewards and recruitment, although details are still unclear. Foundations are likely to differ in their use of these powers, partly because of desire and partly because of practical limits. Taking advantage of new powers for short-term gain, at the expense of other trusts, will have negative effects if not part of a wider development of HR practice.

  9. Computationally modeling interpersonal trust

    OpenAIRE

    Lee, Jin Joo; Knox, W. Bradley; Wormwood, Jolie B.; Breazeal, Cynthia; DeSteno, David

    2013-01-01

    We present a computational model capable of predicting—above human accuracy—the degree of trust a person has toward their novel partner by observing the trust-related nonverbal cues expressed in their social interaction. We summarize our prior work, in which we identify nonverbal cues that signal untrustworthy behavior and also demonstrate the human mind’s readiness to interpret those cues to assess the trustworthiness of a social robot. We demonstrate that domain knowledge gained from our pr...

  10. Trust and virtual worlds

    DEFF Research Database (Denmark)

    Ess, Charles; Thorseth, May

    2011-01-01

    We collect diverse philosophical analyses of the issues and problems clustering around trust online with specific attention to establishing trust in virtual environments. The book moves forward important discussions of how virtual worlds and virtuality are to be defined and understood; the role...... by virtuality, such as virtual child pornography. The introduction further develops a philosophical anthropology, rooted in Kantian ethics, phenomenology, virtue ethics, and feminist perspectives, that grounds a specific approach to ethical issues in virtual environments....

  11. Trusted Computing Technologies, Intel Trusted Execution Technology.

    Energy Technology Data Exchange (ETDEWEB)

    Guise, Max Joseph; Wendt, Jeremy Daniel

    2011-01-01

    We describe the current state-of-the-art in Trusted Computing Technologies - focusing mainly on Intel's Trusted Execution Technology (TXT). This document is based on existing documentation and tests of two existing TXT-based systems: Intel's Trusted Boot and Invisible Things Lab's Qubes OS. We describe what features are lacking in current implementations, describe what a mature system could provide, and present a list of developments to watch. Critical systems perform operation-critical computations on high importance data. In such systems, the inputs, computation steps, and outputs may be highly sensitive. Sensitive components must be protected from both unauthorized release, and unauthorized alteration: Unauthorized users should not access the sensitive input and sensitive output data, nor be able to alter them; the computation contains intermediate data with the same requirements, and executes algorithms that the unauthorized should not be able to know or alter. Due to various system requirements, such critical systems are frequently built from commercial hardware, employ commercial software, and require network access. These hardware, software, and network system components increase the risk that sensitive input data, computation, and output data may be compromised.

  12. The Process of Trust Development

    DEFF Research Database (Denmark)

    Jagd, Søren; Højland, Jeppe

    by high trust and co-operation? In this paper we explore the process of trust development during an organisational change project in a Danish SME by looking at two kinds of trust relations: employee trust in management and trust relations among employees. We find substantial differences in trust......Trust is critical for the quality of social interaction especially in organisations based on employee cooperation and empowerment. An important question is how organisations pass from a situation with low trust between management and employees and among employees to a situation characterised...... in management among employees. Trust is found to be higher among employees interacting regularly with managers, as in the project coordination group. It is found that personal relations are very important for the development of trust. The success of the project may be explained by the involvement of an ‘elite...

  13. Shedding Light on Trust

    Directory of Open Access Journals (Sweden)

    Lesley Gill

    2013-01-01

    Full Text Available New Zealand Human Resource Development practitioners interviewed in earlier research indicates that building “trust” is necessary if training efforts in the area of Emotional Intelligence are to be successful.  Yet, trust is often not defined clearly by those working in the field of HRD.  To establish a definition of trust that provides HRD practitioners with direction in the design of training programs, a large group conversation utilizing the “World Café” process was undertaken, after which EI training practitioners wrote reflections on the nature of trust.  Experienced EI Trainers tended to define trust in terms of the outcome produced in training, which was the readiness of participants to talk.  Defining trust in this way has the advantage of involving a low level of inference.  Trainers also identified actions within their control that could stimulate greater readiness amongst training participants about their experiences to trainers and other learners. The aim of the article is to provide a practice-based definition of trust that can inform HRD practitioners working in the field of Emotional Intelligence.

  14. Computationally modeling interpersonal trust

    Science.gov (United States)

    Lee, Jin Joo; Knox, W. Bradley; Wormwood, Jolie B.; Breazeal, Cynthia; DeSteno, David

    2013-01-01

    We present a computational model capable of predicting—above human accuracy—the degree of trust a person has toward their novel partner by observing the trust-related nonverbal cues expressed in their social interaction. We summarize our prior work, in which we identify nonverbal cues that signal untrustworthy behavior and also demonstrate the human mind's readiness to interpret those cues to assess the trustworthiness of a social robot. We demonstrate that domain knowledge gained from our prior work using human-subjects experiments, when incorporated into the feature engineering process, permits a computational model to outperform both human predictions and a baseline model built in naiveté of this domain knowledge. We then present the construction of hidden Markov models to investigate temporal relationships among the trust-related nonverbal cues. By interpreting the resulting learned structure, we observe that models built to emulate different levels of trust exhibit different sequences of nonverbal cues. From this observation, we derived sequence-based temporal features that further improve the accuracy of our computational model. Our multi-step research process presented in this paper combines the strength of experimental manipulation and machine learning to not only design a computational trust model but also to further our understanding of the dynamics of interpersonal trust. PMID:24363649

  15. Computationally Modeling Interpersonal Trust

    Directory of Open Access Journals (Sweden)

    Jin Joo eLee

    2013-12-01

    Full Text Available We present a computational model capable of predicting—above human accuracy—the degree of trust a person has toward their novel partner by observing the trust-related nonverbal cues expressed in their social interaction. We summarize our prior work, in which we identify nonverbal cues that signal untrustworthy behavior and also demonstrate the human mind’s readiness to interpret those cues to assess the trustworthiness of a social robot. We demonstrate that domain knowledge gained from our prior work using human-subjects experiments, when incorporated into the feature engineering process, permits a computational model to outperform both human predictions and a baseline model built in naivete' of this domain knowledge. We then present the construction of hidden Markov models to incorporate temporal relationships among the trust-related nonverbal cues. By interpreting the resulting learned structure, we observe that models built to emulate different levels of trust exhibit different sequences of nonverbal cues. From this observation, we derived sequence-based temporal features that further improve the accuracy of our computational model. Our multi-step research process presented in this paper combines the strength of experimental manipulation and machine learning to not only design a computational trust model but also to further our understanding of the dynamics of interpersonal trust.

  16. Gene Therapy Might Someday Mend Badly Broken Bones

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_165664.html Gene Therapy Might Someday Mend Badly Broken Bones Animal ... 2017 (HealthDay News) -- An experimental method that combines gene therapy, stem cells and ultrasound has healed large ...

  17. Trust Revision for Conflicting Sources

    Science.gov (United States)

    2017-02-01

    analyst wants to include the realistic possibility that there can be rain and sunshine simultaneously, then the domain would need to include a...tative and idempotent; but it is not associative. IV. TRUST DISCOUNTING The general idea behind trust discounting is to express degrees of trust in an...A:C X is revised. Trust revision consists of increasing distrust at the cost of trust and uncertainty. The idea is that sources found to be unreliable

  18. Characterization and Preparation of Broken Rice Proteins Modified by Proteases

    Directory of Open Access Journals (Sweden)

    Lixia Hou

    2010-01-01

    Full Text Available Broken rice is an underutilized by-product of milling. Proteins prepared from broken rice by treatments with alkaline protease and papain have been characterized with regard to nutritional and functional properties. The protein content and the protein recovery were 56.45 and 75.45 % for alkaline protease treatment, and 65.45 and 46.32 % for papain treatment, respectively. Protease treatment increased the lysine and valine content, leading to a more balanced amino acid profile. Broken rice proteins had high emulsifying capacity, 58.3–71.6 % at neutral pH, and adequate water holding capacity, ranging from 1.96 to 2.93 g/g of proteins. At pH=7.0, the broken rice protein had the highest water holding capacity and the best interfacial activities (emulsifying capacity, emulsifying stability, foaming capacity and foaming stability, which may be the result of the higher solubility at pH=7.0. The interfacial activities increased with the increase in the mass fraction of broken rice proteins. The proteins prepared by the papain treatment had higher water holding capacity (p>0.05, emulsifying capacity (p0.05 than alkaline protease treatment at the same pH or mass fraction. To test the fortification of food products with broken rice proteins, pork sausages containing the proteins were prepared. Higher yield of the sausages was obtained with the increased content of broken rice proteins, in the range of 2.0–9.0 %. The results indicate that broken rice proteins have potential to be used as the protein fortification ingredient for food products.

  19. Relationship between broken appointments and dental students' clinical experience level.

    Science.gov (United States)

    Teich, Sorin T; Wan, Zhuang; Faddoul, Fady F

    2012-09-01

    As more dental schools adopt a comprehensive care model focused on patients' needs rather than a certain number of required procedures, clinic time utilization by students is coming under increasingly close scrutiny. This article presents an analysis of the influence of broken appointment rates on dental students' clinical experience levels. The total percentage of broken appointments experienced by each student from the classes of 2010 and 2011 at Case Western Reserve University School of Dental Medicine during his or her clinical education in the junior and senior years was determined, and the impact of the broken appointment rate on students' clinical experience levels was analyzed. The results show a statistically significant difference regarding the percentage of broken appointments between the classes of 2010 and 2011: 18.64 percent and 14.44 percent, respectively. When the rate of no-shows was compared to the students' clinical experience level, a weak but significant negative correlation was determined for the class of 2010 but not for the class of 2011. It is concluded that the rate of broken appointments accounts for a small part of the variability observed in the number of clinical procedures performed in the predoctoral clinic. When this rate is lowered below a threshold of 14.5 percent, broken appointments seem to have no influence on students' clinical experience level.

  20. Impact of signals and experience on trust and trusting behavior.

    Science.gov (United States)

    Chen, Ying-Hueih; Chien, Shu-Hua; Wu, Jyh-Jeng; Tsai, Pei-Yin

    2010-10-01

    Trust is an essential factor that drives virtual interaction and transactions on the Internet. Researchers have investigated the trust development process, and identified several important factors that form the basis for trust. This research combines the signal perspective and trust theory to examine the impact of market signals and past experience on trust formation and trusting behavior. Three market signals, including brand image, Web-site investment, and privacy policies, are identified and empirically tested to determine their impact on consumer trust. Based on 322 active Web users, the quantitative results suggest that brand image, Web-site investment, privacy policies, and past experience all positively impact trust formation. Furthermore, trust shows a positive effect on Web-site stickiness. Both theoretical and practical implications of the results are also offered.

  1. A Model of Trusted Measurement Model

    OpenAIRE

    Ma Zhili; Wang Zhihao; Dai Liang; Zhu Xiaoqin

    2017-01-01

    A model of Trusted Measurement supporting behavior measurement based on trusted connection architecture (TCA) with three entities and three levels is proposed, and a frame to illustrate the model is given. The model synthesizes three trusted measurement dimensions including trusted identity, trusted status and trusted behavior, satisfies the essential requirements of trusted measurement, and unified the TCA with three entities and three levels.

  2. Trust Transitivity in Social Networks

    Science.gov (United States)

    Richters, Oliver; Peixoto, Tiago P.

    2011-01-01

    Non-centralized recommendation-based decision making is a central feature of several social and technological processes, such as market dynamics, peer-to-peer file-sharing and the web of trust of digital certification. We investigate the properties of trust propagation on networks, based on a simple metric of trust transitivity. We investigate analytically the percolation properties of trust transitivity in random networks with arbitrary in/out-degree distributions, and compare with numerical realizations. We find that the existence of a non-zero fraction of absolute trust (i.e. entirely confident trust) is a requirement for the viability of global trust propagation in large systems: The average pair-wise trust is marked by a discontinuous transition at a specific fraction of absolute trust, below which it vanishes. Furthermore, we perform an extensive analysis of the Pretty Good Privacy (PGP) web of trust, in view of the concepts introduced. We compare different scenarios of trust distribution: community- and authority-centered. We find that these scenarios lead to sharply different patterns of trust propagation, due to the segregation of authority hubs and densely-connected communities. While the authority-centered scenario is more efficient, and leads to higher average trust values, it favours weakly-connected “fringe” nodes, which are directly trusted by authorities. The community-centered scheme, on the other hand, favours nodes with intermediate in/out-degrees, in detriment of the authorities and its “fringe” peers. PMID:21483683

  3. Trust transitivity in social networks.

    Directory of Open Access Journals (Sweden)

    Oliver Richters

    Full Text Available Non-centralized recommendation-based decision making is a central feature of several social and technological processes, such as market dynamics, peer-to-peer file-sharing and the web of trust of digital certification. We investigate the properties of trust propagation on networks, based on a simple metric of trust transitivity. We investigate analytically the percolation properties of trust transitivity in random networks with arbitrary in/out-degree distributions, and compare with numerical realizations. We find that the existence of a non-zero fraction of absolute trust (i.e. entirely confident trust is a requirement for the viability of global trust propagation in large systems: The average pair-wise trust is marked by a discontinuous transition at a specific fraction of absolute trust, below which it vanishes. Furthermore, we perform an extensive analysis of the Pretty Good Privacy (PGP web of trust, in view of the concepts introduced. We compare different scenarios of trust distribution: community- and authority-centered. We find that these scenarios lead to sharply different patterns of trust propagation, due to the segregation of authority hubs and densely-connected communities. While the authority-centered scenario is more efficient, and leads to higher average trust values, it favours weakly-connected "fringe" nodes, which are directly trusted by authorities. The community-centered scheme, on the other hand, favours nodes with intermediate in/out-degrees, in detriment of the authorities and its "fringe" peers.

  4. The Church as Christ’s broken body responding to the emerging global challenges in a divided world

    Directory of Open Access Journals (Sweden)

    Roderick R. Hewitt

    2017-02-01

    Full Text Available Public debate about the role of the church within society has gained momentum especially because the contemporary changing global political and economic landscape has resulted in deeply a divided world. People are asking questions about the missional identity and vocation of the church. If the church is the broken body of Christ in the world, what are the ways in which it is expressing that brokenness in practical ways? This vulnerable status necessitates modelling the politics of Jesus that risks putting up resistance against all threats that prevent people from experiencing fullness of life. The contemporary era of global governance is characterised by ‘moral lowlifes’ in political leadership that uses judicial and executive overreach to weaken democracy and empower the wealthy elites. Furthermore, the impact of technology and computation on shaping human relations has produced a consequential decline in human trust and relationships. Therefore, the missional agenda of the church as the broken body of Christ serving a divided world, calls for building life-affirming relationships that overcome dehumanising barriers.

  5. The Comet With a Broken Heart

    Science.gov (United States)

    2006-04-01

    ). Fragment B seems to have fragmented again, bringing the total of fragments close to 40, some being most probably very small, boulder-sized objects with irregular and short-lived activity. The new observations reveal that this new small fragment has split again! The image clearly reveals that below the main B fragment, there is a small fragment that is divided into two and a careful analysis reveals five more tiny fragments almost aligned. Thus, this image alone shows at least 7 fragments. The comet has thus produced a whole set of mini-comets! ESO PR Photo 15b/06 ESO PR Photo 15b/06 Broken Fragments of Comet SW-3 Will the process continue? Will more and more fragments form and will the comet finally disintegrate? How bright will the fragments be when the comet will be the closest to the Earth, on 11 to 14 May, and how many new fragments will have appeared before the comet reaches its closest approach to the Sun, around 7 June? Fragment C of the comet should be the closest to Earth on 11 May, when it will be about 12 million km away, while fragment B will come as 'close' as 10 million km from Earth on 14 May. Although this is the closest a comet ever approached Earth in more than twenty years - even Comet Hyakutake's smallest distance was 15 million km - this is still 26 times the distance between the Earth and the Moon and therefore does not pose any threat to our planet. ESO PR Photo 15/06 ESO PR Photo 15c/06 Mini-Comets coming off Comet SW-3 If nothing else happens, at the time of closest approach, fragment B will be just visible with unaided eye by experienced observers. It should be an easy target however to observe with binoculars. If we are lucky, however, fragment B presents another outburst, becoming a magnificent sight in the night sky. On the other hand, it could just as well fade away into oblivion. But then, the main fragment C should still be visible, even possibly with the unaided eye. ESO telescopes will observe the comet in the greatest detail at the end of

  6. Review of Interorganizational Trust Models

    Science.gov (United States)

    2010-09-01

    trust in the salesperson . For example: ‘‘Anyone who trusts him/her is asking for trouble.’’ And three items measuring trust in the company. For...and benevolence of a target of Credibility and benevolence Trust of the supplier firm was measured on eight items, and trust of the salesperson on...used in the evaluation. Plank et al. (1999) ‘‘Trust is a global belief on the part of the buyer that the salesperson , product, and company will

  7. Trust Models in Ubiquitous Computing

    DEFF Research Database (Denmark)

    Nielsen, Mogens; Krukow, Karl; Sassone, Vladimiro

    2008-01-01

    We recapture some of the arguments for trust-based technologies in ubiquitous computing, followed by a brief survey of some of the models of trust that have been introduced in this respect. Based on this, we argue for the need of more formal and foundational trust models.......We recapture some of the arguments for trust-based technologies in ubiquitous computing, followed by a brief survey of some of the models of trust that have been introduced in this respect. Based on this, we argue for the need of more formal and foundational trust models....

  8. Trust as a Critical Concept

    DEFF Research Database (Denmark)

    Bordum, Anders

    2004-01-01

    In this articlei I will argue that trust is a fundamental and critical concept because trust is the direct or transcendental constitutive ground of most social phenomena, as well as applicable as an operational method in critical theory. There are two different but overlapping positions on trust I...... where trust is treated as if it was a value-neutral system-internal decision, which presupposes that trust and mistrust are symmetrically interrelated functionally (Luhmann 1979). In his early book Trust and Power, Niklas Luhmann seems to agree with the vision guiding my general argument...

  9. Governance, Trust and Taxes

    DEFF Research Database (Denmark)

    Weihe, Guri; Joensen, E. Juanna Schröter

    This paper examines the role of social capital (trust) vis-à-vis the propensity of a country to be a tax haven. The empirical analysis corroborates that better governed countries have a higher ceteris paribus probability to be tax havens. However, social capital counteracts the effect of governance...... quality. This effect is so strong that the partial effect of governance quality is reversed for countries with the trust index in the top quartile – making these high trust countries less likely to be tax havens – even as governance quality is increased. Thus it is crucial to consider the interaction...... between institutions and social capital, since the same governance institutions have a different impact on the tax haven propensity for countries with different social capital....

  10. Trust in media information

    Directory of Open Access Journals (Sweden)

    Miquel Rodrigo

    2003-06-01

    Full Text Available For Miquel Rodrigo, cultural diversity places informative discourse in a crisis because it needs new categories to explain reality, and these categories are not always shared by journalists and by those who receive the information. Instead of gaining an easy trust drawnfrom stereotypes, he proposes, as a better way of overcoming the crisis, fostering the existence of sceptical readers. The media interprets social phenomena with its personal and professional limitations. The sceptical reader is one who knows why the media says what it says and understands that its truths are not absolute, since all ways of seeing are ways of concealing. The relationship between scepticism and trust is that which opposes a blind, acrylic and capitulating trust.

  11. Where is trust heading?

    Directory of Open Access Journals (Sweden)

    Edgard Weber

    2003-06-01

    Full Text Available Edgard Weber thinks of trust as a process which places the individual in a position which does not only take into account his or her group, his or her direct environment or that of his or her interest, but rather all humanity, regardless of origin, race or social class.In other words, a process that departs from that which is particular and takes an interest in that which is universal, like a horizon that retreats the more we approach it and as a process constructed with the Other. In this sense, three conditions underlie trust: hope, love, and faith.

  12. Trusted cloud computing

    CERN Document Server

    Krcmar, Helmut; Rumpe, Bernhard

    2014-01-01

    This book documents the scientific results of the projects related to the Trusted Cloud Program, covering fundamental aspects of trust, security, and quality of service for cloud-based services and applications. These results aim to allow trustworthy IT applications in the cloud by providing a reliable and secure technical and legal framework. In this domain, business models, legislative circumstances, technical possibilities, and realizable security are closely interwoven and thus are addressed jointly. The book is organized in four parts on "Security and Privacy", "Software Engineering and

  13. Competition Fosters Trust

    DEFF Research Database (Denmark)

    Huck, Steffen; Ruchala, Gabriele K.; Tyran, Jean-Robert

    We study the effects of reputation and competition in a stylized market for experience goods. If interaction is anonymous, such markets perform poorly: sellers are not trustworthy, and buyers do not trust sellers. If sellers are identifiable and can, hence, build a reputation, efficiency quadruples...... but is still at only a third of the first best. Adding more information by granting buyers access to all sellers’ complete history has, somewhat surprisingly, no effect. On the other hand, we find that competition, coupled with some minimal information, eliminates the trust problem almost completely...

  14. Pricing and Trust

    DEFF Research Database (Denmark)

    Huck, Steffen; Ruchala, Gabriele K.; Tyran, Jean-Robert

    We experimentally examine the effects of flexible and fixed prices in markets for experience goods in which demand is driven by trust. With flexible prices, we observe low prices and high quality in competitive (oligopolistic) markets, and high prices coupled with low quality in non-competitive (......We experimentally examine the effects of flexible and fixed prices in markets for experience goods in which demand is driven by trust. With flexible prices, we observe low prices and high quality in competitive (oligopolistic) markets, and high prices coupled with low quality in non...

  15. Free Riding or Trust?

    DEFF Research Database (Denmark)

    Svendsen, Gert Tinggaard; Nilsson, Jerker

    2011-01-01

    It is often observed that members have little interest in monitoring their cooperatives. One explanation is that the members are free-riders, hoping that others will perform the task. Another explanation is that the weak member interest is a consequence of members having trust in the leadership. ...... have a subset of members who trusts the leadership so they do not read the annual reports....... conditions rule. These propositions get support from five studies of members’ readership of their cooperatives’ annual reports. In large and heterogeneous memberships there is free-riding behavior, which explains the members’ low interest in governing their cooperatives. To a limited extent a membership may...

  16. Trust in Anonymity Networks

    Science.gov (United States)

    Sassone, Vladimiro; Hamadou, Sardaouna; Yang, Mu

    Anonymity is a security property of paramount importance, as we move steadily towards a wired, online community. Its import touches upon subjects as different as eGovernance, eBusiness and eLeisure, as well as personal freedom of speech in authoritarian societies. Trust metrics are used in anonymity networks to support and enhance reliability in the absence of verifiable identities, and a variety of security attacks currently focus on degrading a user's trustworthiness in the eyes of the other users. In this paper, we analyse the privacy guarantees of the Crowds anonymity protocol, with and without onion forwarding, for standard and adaptive attacks against the trust level of honest users.

  17. Banking system trust, bank trust, and bank loyalty

    NARCIS (Netherlands)

    van Esterik-Plasmeijer, P.; van Raaij, W.F.

    2017-01-01

    Purpose The purpose of this paper is to test a model of banking system trust as an antecedent of bank trust and bank loyalty. Six determinants of trust and loyalty are included: competence, stability, integrity, customer orientation, transparency, and value congruence. The study provides insights

  18. Cultivating trust : how do public policies become trusted

    NARCIS (Netherlands)

    Breeman, Gerard Engelbert

    2006-01-01

    Trust research has become vitally important in the study of public administration. Many scholars emphasize the importance of trust for society, because it may improve co-operation. The relation between trust and policy making, however, has not yet been discussed very thoroughly. This is remarkable

  19. Understanding Trust in Financial Services

    DEFF Research Database (Denmark)

    Hansen, Torben

    2012-01-01

    . This research extends prior research by developing a conceptual framework explaining how these constructs affect consumers' trust in their financial service provider. Based on two surveys comprising 764 pension consumers and 892 mortgage consumers, respectively, the results of this study indicate that financial...... healthiness, broad-scope trust, knowledge, and satisfaction positively affect narrow-scope trust in financial services. Furthermore, it is found that broad-scope trust negatively moderates the relationships between financial healthiness and narrow-scope trust and between satisfaction and narrow-scope trust......, respectively. In addition, the results marginally indicate that broad-scope trust negatively moderates the relationship between consumer financial knowledge and narrow-scope trust. This study encourages public policy makers, consumer organizations, and financial service providers to continue, improve, and...

  20. Initial Formation of Trust

    DEFF Research Database (Denmark)

    Schärfe, Henrik; Dougerthery, Elizabeth Ann

    2011-01-01

    In this paper we present a study of how touch may be used as a way of inducing trust in the meeting with a teloperated android, the Geminoid-DK. The use of hapics with Gestalt-based 'Balance Theory' is used as a persuasive desing of the interaction between human and robot. Balance theory includes...

  1. Trust and Critical Thinking

    Science.gov (United States)

    Kleinig, John

    2018-01-01

    This article discusses the tension between trust, as an expression of interpersonal commitment, and critical thinking, which includes a demand for reasons. It explores the importance of each for individual flourishing, and then seeks to establish some ways in which they intersect, drawing on ideas of authority and trustworthiness. It argues that…

  2. Balancing trust and power

    DEFF Research Database (Denmark)

    Broholm-Jørgensen, Marie; Guassora, Ann Dorrit; Reventlow, Susanne

    2017-01-01

    of clinical encounters. Results: From the empirical data, we identified three dimensions of respect: respect for the patient’s autonomy, respect for professional authority and respect as a mutual exchange. A balance of respect influenced trust in the relationship between GP and patients and the transfer...

  3. TRUSTING CROWDSOURCED GEOSPATIAL SEMANTICS

    Directory of Open Access Journals (Sweden)

    P. Goodhue

    2015-08-01

    Full Text Available The degree of trust one can place in information is one of the foremost limitations of crowdsourced geospatial information. As with the development of web technologies, the increased prevalence of semantics associated with geospatial information has increased accessibility and functionality. Semantics also provides an opportunity to extend indicators of trust for crowdsourced geospatial information that have largely focused on spatio-temporal and social aspects of that information. Comparing a feature’s intrinsic and extrinsic properties to associated ontologies provides a means of semantically assessing the trustworthiness of crowdsourced geospatial information. The application of this approach to unconstrained semantic submissions then allows for a detailed assessment of the trust of these features whilst maintaining the descriptive thoroughness this mode of information submission affords. The resulting trust rating then becomes an attribute of the feature, providing not only an indication as to the trustworthiness of a specific feature but is able to be aggregated across multiple features to illustrate the overall trustworthiness of a dataset.

  4. Time and Trust

    DEFF Research Database (Denmark)

    Hansen, Annette Skovsted

    in Africa, we can map a territory, within which current stakeholders from Asia are bound to operate. In the case of Japan, a fifty year history of capacity development projects in Africa has established channels of communication and trust to compete with longer term European, Chinese, and Indian ties. One...

  5. Building Trust in Organic

    OpenAIRE

    Huber, Beate

    2007-01-01

    What are the basics for setting up an organic certification body? How is an efficient and service-oriented certification system implemented? How should the necessary documentation be developed? These are some questions that are explained thoroughly in the completely revised IFOAM publication "Building Trust in Organic".

  6. Experimental Study on the Porosity Creep Properties of Broken Limestone

    Directory of Open Access Journals (Sweden)

    Li Shun-cai

    2016-01-01

    Full Text Available In the underground engineering, the long-term stability of the surrounding rocks (especially the broken rocks containing water and the ground settlement resulted from the seepage-creep coupling above goaf have been the important research subjects concerning the deep mining. For the broken rock, its porosity is an important structural parameter determining its creep properties, and the porosity change rate is more superior to describe the creep characteristics compared with the strain change rate at a certain direction. In this paper, MTS815.02 Rock Mechanics Test System is used to carry out the creep experiments on water-saturated broken limestone, and then the time curves of porosity and of the porosity change rate are obtained. By regression, we have got the relation equation between the porosity change rate with the instant porosity and the stress level during the creep. The study indicates that when the stress retains a constant level, the relation between the porosity change rate and the instant porosity can be fitted with a cubical polynomial. The obtained creep relation equation between the porosity change rate and the instant porosity and the instant stress provides a necessary state equation for studying the coupling between the seepage and the creep of the broken rock. Furthermore, the seepage in the broken rock has been verified to satisfy the Forchheimer’s non-Darcy flow according to our previous studies, and its seepage properties, k, β and ca can all be expressed respectively as the polynomial of the porosity, so, by combining with these three state equations we have obtained the four essential state equations for solving the coupling problems of the seepage and the creep for the broken rocks.

  7. Social Capital, Institutions and Trust

    NARCIS (Netherlands)

    Nooteboom, B.

    2006-01-01

    This paper analyzes the relations between social capital, institutions and trust.These concepts are full of ambiguity and confusion.This paper attempts to dissolve some of the confusion, by distinguishing trust and control, and analyzing institutional and relational conditions of trust.It presents a

  8. Trust-based belief change

    OpenAIRE

    Lorini, Emiliano; Jiang, Guifei; Perrussel, Laurent

    2014-01-01

    International audience; We propose a modal logic that supports reasoning about trust-based belief change. The term trust-based belief change refers to belief change that depends on the degree of trust the receiver has in the source of information.

  9. Trust It or Trash It?

    Science.gov (United States)

    Trust It or Trash It? About | Contact | Español Tab 1 Tab 2 What is Trust It or Trash It? This is a tool ... be true, it may be. (See the second “Trust it” statement above). Click on each element below ...

  10. Creating trust through narrative strategy

    NARCIS (Netherlands)

    Gabbay, SM; Leenders, RTAJ

    2003-01-01

    In the rational model of trust, an actor's level of trust is a function of the expected gain and loss involved. As a consequence, if A can influence the gain and loss perceived by B, A can influence B's level of trust. In this article we study how A can do this through the strategic use of

  11. Trust, Endangerment and Divine Vulnerability

    DEFF Research Database (Denmark)

    Christoffersen, Mikkel Gabriel

    2017-01-01

    Faith is trusting God in the midst of endangerment. Yet, human experience of excessive suffering has challenged any spontaneous trust in God. In this article, I reconsider the idea of faith as trust in God, adding an emphasis on the divine vulnerability in the incarnation, and I develop a more...

  12. Elastoconductivity as a probe of broken mirror symmetries

    Energy Technology Data Exchange (ETDEWEB)

    Hlobil, Patrik; Maharaj, Akash V.; Hosur, Pavan; Shapiro, M. C.; Fisher, I. R.; Raghu, S.

    2015-07-27

    We propose the possible detection of broken mirror symmetries in correlated two-dimensional materials by elastotransport measurements. Using linear response theory we calculate the“shear conductivity” Γ x x , x y , defined as the linear change of the longitudinal conductivity σ x x due to a shear strain ε x y . This quantity can only be nonvanishing when in-plane mirror symmetries are broken and we discuss how candidate states in the cuprate pseudogap regime (e.g., various loop current or charge orders) may exhibit a finite shear conductivity. We also provide a realistic experimental protocol for detecting such a response.

  13. Four Essential Practices for Building Trust

    Science.gov (United States)

    Combs, Julie Peterson; Harris, Sandra; Edmonson, Stacey

    2015-01-01

    The presence of trust can enhance an organization's efforts to fulfill its mission, and the lack of trust can constrict those efforts. The authors offer four essential guidelines to help school leaders communicate in a way that builds trust. Build trust by understanding trust. Trusted leaders demonstrate care, character, and competence in their…

  14. The Condition for Generous Trust.

    Science.gov (United States)

    Shinya, Obayashi; Yusuke, Inagaki; Hiroki, Takikawa

    2016-01-01

    Trust has been considered the "cement" of a society and is much studied in sociology and other social sciences. Most studies, however, have neglected one important aspect of trust: it involves an act of forgiving and showing tolerance toward another's failure. In this study, we refer to this concept as "generous trust" and examine the conditions under which generous trust becomes a more viable option when compared to other types of trust. We investigate two settings. First, we introduce two types of uncertainties: uncertainty as to whether trustees have the intention to cooperate, and uncertainty as to whether trustees have enough competence to accomplish the entrusted tasks. Second, we examine the manner in which trust functions in a broader social context, one that involves matching and commitment processes. Since we expect generosity or forgiveness to work differently in the matching and commitment processes, we must differentiate trust strategies into generous trust in the matching process and that in the commitment process. Our analytical strategy is two-fold. First, we analyze the "modified" trust game that incorporates the two types of uncertainties without the matching process. This simplified setting enables us to derive mathematical results using game theory, thereby giving basic insight into the trust mechanism. Second, we investigate socially embedded trust relationships in contexts involving the matching and commitment processes, using agent-based simulation. Results show that uncertainty about partner's intention and competence makes generous trust a viable option. In contrast, too much uncertainty undermines the possibility of generous trust. Furthermore, a strategy that is too generous cannot stand alone. Generosity should be accompanied with moderate punishment. As for socially embedded trust relationships, generosity functions differently in the matching process versus the commitment process. Indeed, these two types of generous trust coexist, and

  15. Trust and Sensemaking in Organizations

    DEFF Research Database (Denmark)

    Fuglsang, Lars; Jagd, Søren; Olsen, Poul Bitsch

    The literature on trust and the literature on sensemaking constitute two separate streams of literature that are both seen as highly relevant to understanding organisational processes in modern complex high-trust organisations. However, though a few studies have argued for the relevance of linkin...... help furthering the understanding of trust processes in organizations. The variety of links between sensemaking and trust processes is illustrated by the intertwining of trust and four processes of sensemaking: arguing, expecting, committing and manipulation identified by Karl Weick....

  16. HMM-based Trust Model

    DEFF Research Database (Denmark)

    ElSalamouny, Ehab; Nielsen, Mogens; Sassone, Vladimiro

    2010-01-01

    Probabilistic trust has been adopted as an approach to taking security sensitive decisions in modern global computing environments. Existing probabilistic trust frameworks either assume fixed behaviour for the principals or incorporate the notion of ‘decay' as an ad hoc approach to cope with thei...... the major limitation of existing Beta trust model. We show the consistency of the HMM-based trust model and contrast it against the well known Beta trust model with the decay principle in terms of the estimation precision....

  17. Modeling trust context in networks

    CERN Document Server

    Adali, Sibel

    2013-01-01

    We make complex decisions every day, requiring trust in many different entities for different reasons. These decisions are not made by combining many isolated trust evaluations. Many interlocking factors play a role, each dynamically impacting the others.? In this brief, 'trust context' is defined as the system level description of how the trust evaluation process unfolds.Networks today are part of almost all human activity, supporting and shaping it. Applications increasingly incorporate new interdependencies and new trust contexts. Social networks connect people and organizations throughout

  18. Social Trust of Virtual Identities

    Science.gov (United States)

    Seigneur, Jean-Marc

    Most other chapters of this book discuss computational models of trust in broader terms, giving definitions of trust, explaining how trust should evolve over time, surveying the different facets of trust .On the other hand, this chapter has a clear focus on the important element of identity in computational trust mechanisms. Trust and reputation are easier to form in face-to-face situations than in situations involving the use of computers and networks because the identity of the trustee is more difficult to verify. In this chapter, the different means to recognise virtual identities are surveyed. Next, their integration into computational trust engines is discussed, especially according to four main requirements: Adaptability, Security, Usability and Privacy (ASUP).

  19. Quantum restoration of broken symmetry in one-dimensional loop ...

    Indian Academy of Sciences (India)

    Home; Journals; Pramana – Journal of Physics; Volume 82; Issue 6. Quantum restoration of broken symmetry in onedimensional loop space. Pinaki Patra ... For one-dimensional loop space, a nonlinear nonlocal transformation of fields is given to make the action of the self-interacting quantum field to the free one. A specific ...

  20. Dynamically broken Anti-de Sitter action for gravity

    OpenAIRE

    Tresguerres, Romualdo

    2008-01-01

    Due to a suitable Higgs mechanism, a standard Anti-de Sitter gauge theory becomes spontaneously broken. The resulting Lorentz invariant gravitational action includes the Hilbert-Einstein term of ordinary Einstein-Cartan gravity with cosmological constant, plus contributions quadratic in curvature and torsion, and a scalar Higgs sector.

  1. Broken CP Symmetry and the Physics Nobel Prize–2008

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 14; Issue 6. Broken CP Symmetry and the Physics Nobel Prize – 2008. Anjan S Joshipura. General Article Volume 14 Issue 6 June 2009 pp 596-609. Fulltext. Click here to view fulltext PDF. Permanent link:

  2. Fix Broken and Redirected Links Using Group Dashboard Link Report

    Science.gov (United States)

    Learn how to use the tools provided by Drupal in the Group Dashboard to find and correct links on your site that are broken (404 and 403 error codes), or that redirect (301 and 302), for example to a homepage rather than the originally intended content.

  3. Enticing arsonists with broken windows and social disorder

    Science.gov (United States)

    Douglas S. Thomas; David T. Butry; Jeffrey P. Prestemon

    2011-01-01

    In criminology, it is well understood that indicators of urban decay, such as abandoned buildings littered with broken windows, provide criminals with signals identifying neighborhoods with lower crime detection and apprehension rates than better maintained neighborhoods. Whether it is the resident population’s sense of apathy, lack of civic pride, or fear of...

  4. Children and Broken Homes: Sources for the Teacher.

    Science.gov (United States)

    Bentley, Eloise

    The depreciating attitude toward family life in our society has intensified in the past few years. It is not unusual to find substantial numbers of children in a first grade classroom who live in broken homes. Divorce is the answer for more young couples than ever before, and as a result the children involved must face growing up with a parent…

  5. INFLUENCE OF BROKEN ROTOR BARS LOCATION IN THE ...

    African Journals Online (AJOL)

    2013-06-30

    Jun 30, 2013 ... Key words: Induction motor, time stepping finite elements (TSFE) method, broken bars. 1. INTRODUCTION ... In works, where the machine inductances are calculated and the machine performance is ... several assumptions and approximations of the actual machine layout are made, like the effects of stator ...

  6. Cancellation of global anomalies in spontaneously broken gauge ...

    Indian Academy of Sciences (India)

    the Higgs phase of a gauge theory [6]. The would-be Goldstone bosons—the angular components of the Higgs field—are the scalar fields that can be used to write the WZ term. This idea had already been put forward in [7] where the interplay between renormalizability and anomaly cancellation in spontaneously broken ...

  7. A broken fenestrated tracheostomy tube fragment removed from the ...

    African Journals Online (AJOL)

    Open Access article distributed under the terms of the. Creative Commons License [CC BY-NC 3.0] http://creativecommons.org/licenses/by-nc/3.0. A broken fenestrated tracheostomy tube fragment .... 2007;2:58–60. 6. Kantar B, Uzumcugil F, Ankay Yilbas A, et al. Emergency management of aspirated tracheostomy cannula.

  8. A method for removal of broken vertebral screws.

    Science.gov (United States)

    McGuire, R A

    1992-06-01

    A method for removal of a broken vertebral screw is described using an easily obtained 5/64-inch tungsten drill bit and a #1 screw extractor. It allows removal of the screw while retaining pedicle integrity and also minimizes potential nerve root compromise.

  9. A Matter of Trust

    DEFF Research Database (Denmark)

    Blach-Ørsten, Mark; Hartley, Jannie Møller; Wittchen, Maria Bendix

    In 2015 two major journalistic scandals hit the Danish news media. One was a plagiarism scandal in which a freelance foreign correspondent was found to have plagiarized parts of the stories she had filed from other international news media. The other scandal involved a sports journalist who...... was found to have invented a large number of the sources that were quoted in his stories and had made up false co-bylines. In a time of diminishing trust in the news media (Blach-Ørsten & Burkal, 2013; Reuters, 2016) these scandals represented a significant and acute credibility problem for the news media...... that were affected. Using paradigm repair theory this paper analyses which strategies the affected news media employed to re-instore trust in their journalism, and thus in the traditional news paradigm, as quickly as possible. Like previous studies on paradigm repair (Bennet et al, 1975; Hackett, 1984...

  10. Trust in Internet Election

    DEFF Research Database (Denmark)

    Markussen, Randi; Ronquillo, Lorena; Schürmann, Carsten

    2014-01-01

    This paper discusses the Decryption and Counting Ceremony held in conjunction with the internet voting trial on election day in the Ministry of Local Government and Regional Development of Norway in 2013. We examine the organizers' ambition of making the decryption and counting of electronic votes...... public in order to sustain trust in internet voting. We introduce a pragmatic approach to trust that emphasises the inseparability of truth from witnessing it. Based on this and on a description of how the event was made observable and how the complexities in the counting process were disclosed, we...... discuss what we term economy of truth from the perspective of the IT community involved in the ceremony. We claim that broadening the economy of truth by including more explicitly social and political perspectives in the ceremony, and in internet elections in general, and how witnessing is brought about...

  11. Problems of judiciary trust

    Directory of Open Access Journals (Sweden)

    Vuković Slobodan

    2007-01-01

    Full Text Available Topic of the article is problem of trust in judiciary as a most important part of legal system. For all empirical researches so far have shown very law degree of this trust many authors were searching for the causes of this phenomenon. Among multifold causes some are special worth while to be mentioned here: historical inheritance, political pressures, delaying of judiciary decisions, respect of the laws, transferring of responsibility from political power to the judiciary, public comments of judiciary decisions, media pressures, efficiency of judiciary and police. Among inner factors author pays attention to competency of judges, modes of penal policy, modes of judges’ entitlement, problems of communication, involvement into criminal and corruptional affairs, etc.

  12. Trust and Corruption

    DEFF Research Database (Denmark)

    Graeff, Peter; Svendsen, Gert Tinggaard

    2013-01-01

    Why are the Scandinavian countries in the European Union significantly richer than South-ern/Eastern European countries? We try to answer this question from an empirical social capital perspective. In particular, we are interested in the interplay of social trust as a positive and corruption...... capital by applying a path model that accounts for Granger-like causal effects. Our empirical results, referring to a sample of up to 25 EU countries, show that corruption might harm poor European countries but is not able to affect social trust. However, corruption in itself means that resources end up...... in the wrong places and not in socioeconomically optimal investments. There is, therefore, a direct damaging effect of corruption on wealth. This implies that economic actors have to invest higher transaction and control costs which will bind resources to non-productive purposes and thus destroy economic...

  13. Learning to trust: trust and attachment in early psychosis.

    Science.gov (United States)

    Fett, A-K J; Shergill, S S; Korver-Nieberg, N; Yakub, F; Gromann, P M; Krabbendam, L

    2016-05-01

    Distrust and social dysfunction are characteristic in psychosis and may arise from attachment insecurity, which is elevated in the disorder. The relationship between trust and attachment in the early stages of psychosis is unknown, yet could help to understand interpersonal difficulties and disease progression. This study aimed to investigate whether trust is reduced in patients with early psychosis and whether this is accounted for by attachment avoidance and attachment anxiety. We used two trust games with a cooperative and unfair partner in a sample of 39 adolescents with early psychosis and 100 healthy controls. Patients had higher levels of attachment anxiety, but the groups did not differ in attachment avoidance. Basic trust was lower in patients than controls, as indicated by lower initial investments. During cooperation patients increased their trust towards levels of controls, i.e. they were able to learn and to override initial suspiciousness. Patients decreased their trust less than controls during unfair interactions. Anxious attachment was associated with higher basic trust and higher trust during unfair interactions and predicted trust independent of group status. Discussion Patients showed decreased basic trust but were able to learn from the trustworthy behaviour of their counterpart. Worries about the acceptance by others and low self-esteem are associated with psychosis and attachment anxiety and may explain behaviour that is focused on conciliation, rather than self-protection.

  14. Trust and Estate Planning

    DEFF Research Database (Denmark)

    Harrington, Brooke

    2012-01-01

    , these professionals keep a significant portion of the world’s private wealth beyond the reach of the state. Trust and estate planning thus contributes to creating and maintaining socioeconomic inequality on a global scale. The significance of the profession has grown as wealth itself has become more fungible......, spurring innovation in legal, organizational, and financial strategies, and thwarting a myriad of laws and policies designed to limit enduring inequality in modern, democratic societies....

  15. Trust in Digital Repositories

    Directory of Open Access Journals (Sweden)

    Elizabeth Yakel

    2013-06-01

    Full Text Available ISO 16363:2012, Space Data and Information Transfer Systems - Audit and Certification of Trustworthy Digital Repositories (ISO TRAC, outlines actions a repository can take to be considered trustworthy, but research examining whether the repository’s designated community of users associates such actions with trustworthiness has been limited. Drawing from this ISO document and the management and information systems literatures, this paper discusses findings from interviews with 66 archaeologists and quantitative social scientists. We found similarities and differences across the disciplines and among the social scientists. Both disciplinary communities associated trust with a repository’s transparency. However, archaeologists mentioned guarantees of preservation and sustainability more frequently than the social scientists, who talked about institutional reputation. Repository processes were also linked to trust, with archaeologists more frequently citing metadata issues and social scientists discussing data selection and cleaning processes. Among the social scientists, novices mentioned the influence of colleagues on their trust in repositories almost twice as much as the experts. We discuss the implications our findings have for identifying trustworthy repositories and how they extend the models presented in the management and information systems literatures.

  16. Do people trust dentists? Development of the Dentist Trust Scale.

    Science.gov (United States)

    Armfield, J M; Ketting, M; Chrisopoulos, S; Baker, S R

    2017-09-01

    This study aimed to adapt a measure of trust in physicians to trust in dentists and to assess the reliability and validity of the measure. Questionnaire data were collected from a simple random sample of 596 Australian adults. The 11-item General Trust in Physicians Scale was modified to apply to dentists. The Dentist Trust Scale (DTS) had good internal consistency (α = 0.92) and exploratory factor analysis revealed a single-factor solution. Lower DTS scores were associated with less trust in the dentist last visited, having previously changed dentists due to unhappiness with the care received, currently having dental pain, usual visiting frequency, dental avoidance, and with past experiences of discomfort, gagging, fainting, embarrassment and personal problems with the dentist. The majority of people appear to exhibit trust in dentists. The DTS shows promising reliability and validity evidence. © 2017 Australian Dental Association.

  17. A Model of Trusted Measurement Model

    Directory of Open Access Journals (Sweden)

    Ma Zhili

    2017-01-01

    Full Text Available A model of Trusted Measurement supporting behavior measurement based on trusted connection architecture (TCA with three entities and three levels is proposed, and a frame to illustrate the model is given. The model synthesizes three trusted measurement dimensions including trusted identity, trusted status and trusted behavior, satisfies the essential requirements of trusted measurement, and unified the TCA with three entities and three levels.

  18. Sociology of Trust Towards a Sociology of `E-trust'

    OpenAIRE

    Rutter, Jason

    2001-01-01

    This paper focuses on the importance of trust in business-to-consumer e-commerce.Divided into three sections the paper first asks the question of why trust is important to the development and implementation of e-commerce and suggests some of the areas where user trust is specifically important. The second offers a view of trust developed using sociological theory and interactionism and looks at how this can inform our understanding of e-commerce users. Finally, the paper suggests a number of ...

  19. Securing Trust on the Market

    OpenAIRE

    Vurušić, Gordan

    2004-01-01

    The purpose of this paper is twofold: first, on the normative level, the author compares three main ways of securing trust on imperfectly competitive markets – informal social enforcement, formal-third party enforcement, and conditional internal commitment to the cultural norm of trust, in terms of the standard criteria of allocative and adaptive efficiency. Admittedly, the three ways of securing trust in reality rarely exist separately and as ideal types, but the author separates them for th...

  20. Trust in Social Computing

    Science.gov (United States)

    2014-04-07

    Computing Arizona State University Data Mining and Machine Learning Lab WWW2014 52 PageRank [Page et al., 1999]  PageRank is a global metric... Pagerank is from trustees’ perspective  The trustworthiness of a trustee is aggregated from her trustors ─Trustors’ trustworthiness ─Trust values...Frontiers, 7(4-5):337–358, 2005. [Page et al., 1999] L. Page, S. Brin, R. Motwani, and T. Winograd. The pagerank citation ranking: Bringing order to the web

  1. Trust is other people

    DEFF Research Database (Denmark)

    Luckner, Naemi; Werner, Katharina; Subasi, Özge

    , the Internet is often experienced as a place of anonymity, and people are scared of the ’figurative creep’ lurking behind every dark corner. This view on online environments can be a reason for potential sharers not to use sharing platforms. To explore how people view such issues, we conducted an open...... concerning the interaction with strangers through the platform. Putting trust in an online sharing community seems to be the biggest obstacle that influences whether people draw away rather than move closer together and start collaborating in the sharing community. Here, we report on the main issues...

  2. Trust for intelligent recommendation

    CERN Document Server

    Bhuiyan, Touhid

    2013-01-01

    Recommender systems are one of the recent inventions to deal with the ever-growing information overload in relation to the selection of goods and services in a global economy. Collaborative Filtering (CF) is one of the most popular techniques in recommender systems. The CF recommends items to a target user based on the preferences of a set of similar users known as the neighbors, generated from a database made up of the preferences of past users. In the absence of these ratings, trust between the users could be used to choose the neighbor for recommendation making. Better recommendations can b

  3. Trust in Diverse Teams

    DEFF Research Database (Denmark)

    Clausen, Lisbeth

    Multicultural membership and diversity in teams are important to maintain effectiveness in organizations in a global business environment. Multicultural teams offer great potential in international collaboration just as top management teams are becoming increasingly diversified. However......, maintaining team cohesiveness in multicultural teams to collaborate effectively presents a number of challenges. The present study employs the concept of trust to explore influences on team collaboration in high performing teams. The study is based on observation of teams in seven multinational corporations...... as nationalities, gender, functional expertise and international experience. The study contributes insights to diverse teams through a processual study of micro-processes in global organizational contexts crossing multicultural boundaries....

  4. Trust Propagation in Small Worlds

    DEFF Research Database (Denmark)

    Gray, Elizabeth; Seigneur, Jean-Marc; Chen, Yong

    2003-01-01

    do not scale well. We aim to develop trust-based security mechanisms using small world concepts to optimise formation and propagation of trust amongst entities in these vast networks. In this regard, we surmise that in a very large mobile ad hoc network, trust, risk, and recommendations can...... be propagated through relatively short paths connecting entities. Our work describes the design of trust-formation and risk-assessment systems, as well as that of an entity recognition scheme, within the context of the small world network topology....

  5. Consumer Trust in Information Sources

    Directory of Open Access Journals (Sweden)

    Brad Love

    2013-06-01

    Full Text Available Trust is essential to understanding public reaction to innovative issues. This research focuses on trust in information sources by explicating the construct of trust and testing a comprehensive model on several information sources about genetically modified foods. Results from a survey of 369 participants reveal the significance of projecting competence and the role of the environment in which a target public receives information. Perceptions of regulatory, social, business, and technical environments affect how likely individuals are to follow advice from institutions like the Food and Drug Administration and the news media. Future research should incorporate knowledge levels and personal relevance as variables likely to influence trusting relationships.

  6. Designing High-Trust Organizations

    DEFF Research Database (Denmark)

    Jagd, Søren

    The specific problem considered in this paper is what are the key issues to consider for managers involved in designing high-trust organizations, a design problem still not properly explored. This paper intends to take the first step in filling this lacuna. In the paper, I first present...... the existing management and research literature on building high-trust organizations. Then I explore Alan Fox’s (1974) analysis of low-trust vs. high-trust dynamics which, I argue, may serve as a theoretically stronger basis for understanding the issues management have to consider when designing hightrust...

  7. Trusting Relationships in International Politics

    DEFF Research Database (Denmark)

    Keating, Vincent Charles; Ruzicka, Jan

    2014-01-01

    How can trusting relationships be identified in international politics? The recent wave of scholarship on trust in International Relations answers this question by looking for one or the combination of three indicators – the incidence of cooperation; discourses expressing trust; or the calculated...... acceptance of vulnerability. These methods are inadequate both theoretically and empirically. Distinguishing between the concepts of trust and confidence, we instead propose an approach that focuses on the actors’ hedging strategies. We argue that actors either declining to adopt or removing hedging...

  8. Fluorescence microscopy with diffraction resolution barrier broken by stimulated emission

    OpenAIRE

    Klar, Thomas A.; Jakobs, Stefan; Dyba, Marcus; Egner, Alexander; Hell, Stefan W.

    2000-01-01

    The diffraction barrier responsible for a finite focal spot size and limited resolution in far-field fluorescence microscopy has been fundamentally broken. This is accomplished by quenching excited organic molecules at the rim of the focal spot through stimulated emission. Along the optic axis, the spot size was reduced by up to 6 times beyond the diffraction barrier. The simultaneous 2-fold improvement in the radial direction rendered a nearly spherical fluorescence spot with a diameter of 9...

  9. Mass Formulae for Broken Supersymmetry in Curved Space-Time

    CERN Document Server

    Ferrara, Sergio

    2016-01-01

    We derive the mass formulae for ${\\cal N}=1$, $D=4$ matter-coupled Supergravity for broken (and unbroken) Supersymmetry in curved space-time. These formulae are applicable to de Sitter configurations as is the case for inflation. For unbroken Supersymmetry in anti-de Sitter (AdS) one gets the mass relations modified by the AdS curvature. We compute the mass relations both for the potential and its derivative non-vanishing.

  10. Mental Suffering in Protracted Political Conflict: Feeling Broken or Destroyed.

    Directory of Open Access Journals (Sweden)

    Brian K Barber

    Full Text Available This mixed-methods exploratory study identified and then developed and validated a quantitative measure of a new construct of mental suffering in the occupied Palestinian territory: feeling broken or destroyed.Group interviews were conducted in 2011 with 68 Palestinians, most aged 30-40, in the West Bank, East Jerusalem, and the Gaza Strip to discern local definitions of functioning. Interview participants articulated of a type of suffering not captured in existing mental health instruments used in regions of political conflict. In contrast to the specific difficulties measured by depression and PTSD (sleep, appetite, energy, flashbacks, avoidance, etc., participants elaborated a more existential form of mental suffering: feeling that one's spirit, morale and/or future was broken or destroyed, and emotional and psychological exhaustion. Participants articulated these feelings when describing the rigors of the political and economic contexts in which they live. We wrote survey items to capture these sentiments and administered these items-along with standard survey measures of mental health-to a representative sample of 1,778 32-43 year olds in the occupied Palestinian territory. The same survey questions also were administered to a representative subsample (n = 508 six months earlier, providing repeated measures of the construct.Across samples and time, the feeling broken or destroyed scale: 1 comprised a separate factor in exploratory factor analyses, 2 had high inter-item consistency, 3 was reported by both genders and in all regions, 4 showed discriminate validity via moderate correlations with measures of feelings of depression and trauma-related stress, and 5 was more commonly experienced than either feelings of depression or trauma-related stress.Feeling broken or destroyed can be reliably measured and distinguished from conventional measures of mental health. Such locally grounded and contextualized measures should be identified and

  11. Restoration of badly broken, endodontically treated posterior teeth

    OpenAIRE

    Gogna, Rupika; Jagadish, S; Shashikala, K; Keshava Prasad, BS

    2009-01-01

    It is generally agreed that the successful treatment of a badly broken tooth with pulpal disease depends not only on good endodontic therapy, but also on good prosthetic reconstruction of the tooth after the endodontic therapy is complete. Often, we come across an endodontically treated tooth with little or no clinical crown in routine clinical cases. In such cases, additional retention and support of the restoration are difficult to achieve. Two case reports are discussed here where structur...

  12. The star shaped pattern on broken thin sheets

    Science.gov (United States)

    Vandenberghe, Nicolas; Vermorel, Romain; Villermaux, Emmanuel

    2011-03-01

    We study transverse impacts of rigid objects on a thin elastic sheet made of acrylic. After impact, a transverse wave propagates on the sheet and orthoradial stresses lead to the formation of radial cracks. The result of this fragmentation process is the star shaped pattern frequently observed on broken windows. We investigate the variation of the pattern and in particular the number of radial cracks with impact speed and material properties. The formation of rayed craters by meteorite impacts will be briefly discussed.

  13. Mental Suffering in Protracted Political Conflict: Feeling Broken or Destroyed.

    Science.gov (United States)

    Barber, Brian K; McNeely, Clea A; El Sarraj, Eyad; Daher, Mahmoud; Giacaman, Rita; Arafat, Cairo; Barnes, William; Abu Mallouh, Mohammed

    2016-01-01

    This mixed-methods exploratory study identified and then developed and validated a quantitative measure of a new construct of mental suffering in the occupied Palestinian territory: feeling broken or destroyed. Group interviews were conducted in 2011 with 68 Palestinians, most aged 30-40, in the West Bank, East Jerusalem, and the Gaza Strip to discern local definitions of functioning. Interview participants articulated of a type of suffering not captured in existing mental health instruments used in regions of political conflict. In contrast to the specific difficulties measured by depression and PTSD (sleep, appetite, energy, flashbacks, avoidance, etc.), participants elaborated a more existential form of mental suffering: feeling that one's spirit, morale and/or future was broken or destroyed, and emotional and psychological exhaustion. Participants articulated these feelings when describing the rigors of the political and economic contexts in which they live. We wrote survey items to capture these sentiments and administered these items-along with standard survey measures of mental health-to a representative sample of 1,778 32-43 year olds in the occupied Palestinian territory. The same survey questions also were administered to a representative subsample (n = 508) six months earlier, providing repeated measures of the construct. Across samples and time, the feeling broken or destroyed scale: 1) comprised a separate factor in exploratory factor analyses, 2) had high inter-item consistency, 3) was reported by both genders and in all regions, 4) showed discriminate validity via moderate correlations with measures of feelings of depression and trauma-related stress, and 5) was more commonly experienced than either feelings of depression or trauma-related stress. Feeling broken or destroyed can be reliably measured and distinguished from conventional measures of mental health. Such locally grounded and contextualized measures should be identified and included in

  14. Spontaneously broken Yang-Mills-Einstein supergravities as double copies

    Science.gov (United States)

    Chiodaroli, Marco; Günaydin, Murat; Johansson, Henrik; Roiban, Radu

    2017-06-01

    Color/kinematics duality and the double-copy construction have proved to be systematic tools for gaining new insight into gravitational theories. Extending our earlier work, in this paper we introduce new double-copy constructions for large classes of spontaneously-broken Yang-Mills-Einstein theories with adjoint Higgs fields. One gauge-theory copy entering the construction is a spontaneously-broken (super-)Yang-Mills theory, while the other copy is a bosonic Yang-Mills-scalar theory with trilinear scalar interactions that display an explicitly-broken global symmetry. We show that the kinematic numerators of these gauge theories can be made to obey color/kinematics duality by exhibiting particular additional Lie-algebraic relations. We discuss in detail explicit examples with N=2 supersymmetry, focusing on Yang-Mills-Einstein supergravity theories belonging to the generic Jordan family in four and five dimensions, and identify the map between the supergravity and double-copy fields and parameters. We also briefly discuss the application of our results to N=4 supergravity theories. The constructions are illustrated by explicit examples of tree-level and one-loop scattering amplitudes.

  15. Broken instrument retrieval with indirect ultrasonics in a primary molar.

    Science.gov (United States)

    Pk, Musale; Sc, Kataria; As, Soni

    2016-02-01

    The separation of a file during pulpectomy is a rare incident in primary teeth due to inherently wider and relatively straighter root canals. A broken instrument hinders the clinician from optimal preparation and obturation of the root canal system invariably leading to failure, although in such teeth, an extraction followed by suitable space maintenance is considered as the treatment of choice. This case report demonstrates successful nonsurgical retrieval of a separated H file fragment in 84. A 7-year-old girl was referred to the Department of Paedodontics and Preventive Dentistry for endodontic management of a primary tooth 84 with a dento-alveolar abscess. Her medical history was noncontributory. After diagnosing a broken H file in the mesio-lingual canal, the tooth was endodontically treated in two appointments. At the first session, a broken file was successfully retrieved after using low intensity ultrasonic vibrations through a DG 16 endodontic explorer viewed under an operating microscope. After abscess resolution, Vitapex root canal obturation with a preformed metal crown cementation was completed at a second session. The patient was recalled at 3, 6, 12 and 15 month interval and reported to be clinically asymptomatic and radiographically with complete furcal healing. Integration of microscopes and ultrasonics in paediatric dental practice has made it possible to save such teeth with a successful outcome. Favourable location of the separated file, relatively straighter root canal system and patient cooperation resulted in successful nonsurgical management in this case.

  16. Managing Pain from a Broken Hip: A Guide for Adults and Their Caregivers

    Science.gov (United States)

    ... Home Managing Pain From a Broken Hip Managing Pain From a Broken Hip A Guide for Adults and Their Caregivers Consumer Summary May 17, 2011 Download PDF 931.5 KB Related Files Download Audio file [ ...

  17. Generalized Trust and Trust in Institutions in Confucian Asia

    Science.gov (United States)

    Tan, Soo Jiuan; Tambyah, Siok Kuan

    2011-01-01

    This study examines generalized trust and trust in institutions in Confucian Asia, covering six countries namely, China, Japan, Singapore, South Korea, Taiwan and Vietnam, and one dependent region, Hong Kong. Using data from the 2006 AsiaBarometer Survey, our study affirms the reliability and validity of using a two-item scale to measure…

  18. Critical Friendship, Collaboration and Trust as a Basis for Self-Determined Professional Development: A case of science teaching

    Science.gov (United States)

    Dewnarain Ramnarain, Umesh; Modiba, Maropeng

    2013-01-01

    This paper describes the development of curriculum design expertise from the perspective of a teacher reflecting on a science lesson. His involvement in the research process resulted in a self-determined professional development strategy. The description comes from data collected through lesson observations and an in-depth stimulated recall discussion to probe and uncover the teacher's understanding of the importance of the curriculum design principles related to his lesson. These data are supplemented with lessons plans studied over several months. Views expressed indicate that the professional development of the teacher was grounded in trust and trust-building that took time. The views also, suggest, amongst other issues, how empowerment evaluation can be used in enabling development in curriculum design.

  19. The Need to Trust and to Trust More Wisely in Academe

    Science.gov (United States)

    Bowman, Richard F.

    2012-01-01

    Where trust is an issue, there is no trust. Trust in diverse organizations has never been lower. A shadow of doubt stalks one's every decision to trust collegially and institutionally. Still, colleagues sense intuitively that institutions cannot function optimally without a bedrock level of trust. In academic life, trust is a form of social…

  20. InDependent Diabetes Trust.

    Science.gov (United States)

    Evans, Roger

    2014-10-21

    The InDependent Diabetes Trust is a UK-based charity run by people with diabetes for others living with the condition. It was set up in 1994 as the Insulin Dependent Diabetes Trust (IDDT), a registered charity. It is run entirely by voluntary donations and does not accept funding from pharmaceutical companies.

  1. Mediating Trust in Terrorism Coverage

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    crisis. While the framework is presented in the context of television coverage of a terror-related crisis situation, it can equally be used in connection with all other forms of mediated trust. Key words: National crisis, risk communication, crisis management, television coverage, mediated trust....

  2. Towards trusted trade-lanes

    NARCIS (Netherlands)

    Hulstijn, J.; Hofman, W.; Zomer, G.; Tan, Y.H.

    2016-01-01

    Customs administrations are exploring system-based approaches to regulatory supervision, taking the entire set of controls in a process into account. In addition to Trusted Traders, which are recognized by a certification process, customs are considering to identify so called Trusted Trade Lanes:

  3. Context-Aware Trust Domains

    NARCIS (Netherlands)

    Neisse, R.; van Sinderen, Marten J.; Havinga, P.J.M.; Havinga, Paul J.M.; Lijding, M.E.M.; Meratnia, Nirvana; Meratnia, N.; Wegdam, M.

    Context-aware service platforms need to establish and manage trust relationships for users to know if the user’s privacy policies are being enforced and for service providers to control access to their services. Current trust solutions are not suitable for this because they do not address in an

  4. Trust and New Communication Technologies

    DEFF Research Database (Denmark)

    Ess, Charles

    2010-01-01

    I approach the philosophical analyses of the phenomenon of trust vis-à-vis online communication beginning with an overview from within the framework of computer-mediated communication (CMC) of concerns and paradigmatic failures of trust in the history of online communication. I turn to the more...

  5. In the CJEU Judges Trust

    DEFF Research Database (Denmark)

    Mayoral, Juan A.

    2016-01-01

    This article aims to highlight the relevance of judicial trust in international courts, focusing on national judges' trust in the Court of Justice of the European Union (CJEU). EU scholars have put a great deal of effort into explaining how legal and political factors affect the use of preliminar...

  6. Integrity Constraints in Trust Management

    NARCIS (Netherlands)

    Etalle, Sandro; Winsborough, William H.

    We introduce the use, monitoring, and enforcement of integrity constraints in trust managementstyle authorization systems. We consider what portions of the policy state must be monitored to detect violations of integrity constraints. Then we address the fact that not all participants in a trust

  7. Lessons learned

    International Development Research Centre (IDRC) Digital Library (Canada)

    Making PAR work for vulnerable communities. Lessons to date. PAR has proven an effective tool for engag. ▻ ing stakeholders. Building PAR skills is a longterm process. ▻ and needs to start early in the project cycle. The PAR approach lends itself to research. ▻ leadership by atypical 'researchers'. There are clear signs ...

  8. Lessons Learned.

    Science.gov (United States)

    Haynes, Norris M.

    1998-01-01

    Discusses lessons learned in the implementation of James Comer's School Development Program including: (1) leadership; (2) overcoming resistance to change; (3) time required for change; (4) creating a supportive climate; (5) staff commitment and staff time; (6) personnel and staff training; (7) parent involvement; (8) connecting school and…

  9. Trusted computing strengthens cloud authentication.

    Science.gov (United States)

    Ghazizadeh, Eghbal; Zamani, Mazdak; Ab Manan, Jamalul-lail; Alizadeh, Mojtaba

    2014-01-01

    Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM). Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM) are great technologies for solving the trust and security concerns in the cloud identity environment. Single sign-on (SSO) and OpenID have been released to solve security and privacy problems for cloud identity. This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in .Net environment. Security analyzing, simulation, and BLP confidential model are three ways to evaluate and analyze our proposed model.

  10. Trusted Computing Strengthens Cloud Authentication

    Science.gov (United States)

    2014-01-01

    Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM). Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM) are great technologies for solving the trust and security concerns in the cloud identity environment. Single sign-on (SSO) and OpenID have been released to solve security and privacy problems for cloud identity. This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in .Net environment. Security analyzing, simulation, and BLP confidential model are three ways to evaluate and analyze our proposed model. PMID:24701149

  11. Trusted Computing Strengthens Cloud Authentication

    Directory of Open Access Journals (Sweden)

    Eghbal Ghazizadeh

    2014-01-01

    Full Text Available Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM. Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM are great technologies for solving the trust and security concerns in the cloud identity environment. Single sign-on (SSO and OpenID have been released to solve security and privacy problems for cloud identity. This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in .Net environment. Security analyzing, simulation, and BLP confidential model are three ways to evaluate and analyze our proposed model.

  12. Towards a Formal Notion of Trust

    DEFF Research Database (Denmark)

    Nielsen, Mogens; Krukow, Karl Kristian

    2003-01-01

    Trust management systems have been proposed as an alternative to traditional security mechanisms in Global Computing. We present some challenges in establishing a formal foundation for the notion of trust, and some preliminary ideas towards a category of trust models.......Trust management systems have been proposed as an alternative to traditional security mechanisms in Global Computing. We present some challenges in establishing a formal foundation for the notion of trust, and some preliminary ideas towards a category of trust models....

  13. Trust-based environmental regulation.

    Science.gov (United States)

    Lange, Bettina; Gouldson, Andy

    2010-10-15

    Within this paper, we examine the contribution that trust-based relationships can make to achieving better-and particularly more effective, efficient and equitable-environmental regulation. While levels of trust in regulators, regulatory processes and outcomes are often discussed, the influence of trust on different actors and on different measures of regulatory performance is poorly understood. Within this paper, we define trust-based environmental regulation as a specific regulatory style that involves openness and cooperation in interaction between regulated, regulators and third-party stakeholders in order to achieve environmental protection objectives. We then discuss the pros and cons of trust relationships between regulators, regulated businesses and citizens for achieving behavioural change towards greater environmental protection. To illustrate the significance of these issues, we then examine three forms of contractual regulatory style where trust relationships are critically important: responsive regulation, self-regulation and environmental agreements. Based on this analysis, we highlight the importance of trust-based relationships, and we argue that one of the greatest contributions of trust-based environmental regulation is to challenge how we think about regulation. Trust is often understood as enabling existing regulatory relationships or in the case of self-regulation as a complement to regulation. However, we argue that the real potential of trust is to open up new ways for participants in regulatory regimes to engage in collective action, to go beyond a perception of regulation as driven by the competing interests of individual actors, and thus, to open up new channels of influence for behavioural change towards greater environmental protection. Our analysis therefore has great relevance for future research and for on-going debates on the future of regulation. Copyright © 2010. Published by Elsevier B.V.

  14. Towards Trust Engineering for Opportunistic Cloud Services

    DEFF Research Database (Denmark)

    Kuada, Eric

    2014-01-01

    The systematic review methodology has been employed to review trust related studies in cloud computing. It was observed that trusted computing technologies and reputation based approaches are the main approaches to trust engineering in cloud computing. Also, trusted third party approaches...... and the deployment model play a significant role in enhancing trust between service providers and consumers. It was observed that the concept of trust is used loosely without any formal specification in cloud computing discussions and trust engineering in general. As a first step towards addressing this problem, we...... have contextualized the formal trust specification in multi-agent environments for cloud computing....

  15. Trust dynamics in a large system implementation

    DEFF Research Database (Denmark)

    Schlichter, Bjarne Rerup; Rose, Jeremy

    2013-01-01

    A large information systems implementation (such as Enterprise Resource Planning systems) relies on the trust of its stakeholders to succeed. Such projects impact diverse groups of stakeholders, each with their legitimate interests and expectations. Levels of stakeholder trust can be expected...... outcomes, but largely ignored the dynamics of trust relations. Giddens, as part of his study of modernity, theorises trust dynamics in relation to abstract social systems, though without focusing on information systems. We use Giddens’ concepts to investigate evolving trust relationships in a longitudinal......, the maintenance, breakdown and restoration of trust, the role of the information system in restoring trust, and the emergent and reciprocal nature of trust and project outcomes....

  16. Preventing mercury vapor release from broken fluorescent lamps during shipping.

    Science.gov (United States)

    Glenz, Tracy T; Brosseau, Lisa M; Hoffbeck, Richard W

    2009-03-01

    Fluorescent lamps are estimated to annually release 1 t of mercury into the air in the United States; transport of used lamps may play an important role in these emissions. In 1999, the U.S. Environmental Protection Agency added lamps to the universal waste rule to encourage recycling by allowing shipment to recycling facilities by common carrier. The rules required that lamp packaging must be structurally sound and adequate to prevent breakage but did not address vapor release. In 2005, a requirement was added that packaging must be designed to prevent the escape of mercury into the environment, but this change does not apply to fluorescent lamps. The goal of this research was to compare mercury vapor containment among different packaging configurations. In 10 replicate experiments of 5 different packages containing 40 broken, used, low-mercury lamps, two 6-hr samples of airborne mercury vapor concentrations were taken in a well-mixed sealed chamber held at 83 +/- 2 degrees F. Average chamber concentrations ranged from 0.977 mg/m3 for a single cardboard box to 0.004 mg/m3 for a double cardboard box with a plastic-foil laminate bag sandwiched between the boxes. In comparison to the single cardboard box, a single box with an unsealed thin plastic liner lowered mercury concentrations in the chamber by 52%, single or double boxes with a thicker tape-sealed plastic bag lowered concentrations by 90-92%, and a double box with a ziplock plastic-foil laminate bag lowered concentrations by 99.7%. The latter was the only configuration capable of maintaining airborne concentrations below all occupational exposure levels. Standards more specific to mercury containment are needed for packages used to ship fluorescent lamps to recyclers. Results from this study suggest that an effective packaging design should minimize the effect of cuts from broken glass while also preventing the release of mercury vapor from broken lamps.

  17. Interpersonal trust across six Asia-Pacific countries: testing and extending the 'high trust society' and 'low trust society' theory.

    Directory of Open Access Journals (Sweden)

    Paul R Ward

    Full Text Available BACKGROUND: Trust is regarded as a necessary component for the smooth running of society, although societal and political modernising processes have been linked to an increase in mistrust, potentially signalling social and economic problems. Fukuyama developed the notion of 'high trust' and 'low trust' societies, as a way of understanding trust within different societies. The purpose of this paper is to empirically test and extend Fukuyama's theory utilising data on interpersonal trust in Taiwan, Hong Kong, South Korea, Japan, Australia and Thailand. This paper focuses on trust in family, neighbours, strangers, foreigners and people with a different religion. METHODS: Cross-sectional surveys were undertaken in 2009-10, with an overall sample of 6331. Analyses of differences in overall levels of trust between countries were undertaken using Chi square analyses. Multivariate binomial logistic regression analysis was undertaken to identify socio-demographic predictors of trust in each country. RESULTS: Our data indicate a tripartite trust model: 'high trust' in Australia and Hong Kong; 'medium trust' in Japan and Taiwan; and 'low trust' in South Korea and Thailand. Trust in family and neighbours were very high across all countries, although trust in people with a different religion, trust in strangers and trust in foreigners varied considerably between countries. The regression models found a consistent group of subpopulations with low trust across the countries: people on low incomes, younger people and people with poor self-rated health. The results were conflicting for gender: females had lower trust in Thailand and Hong Kong, although in Australia, males had lower trust in strangers, whereas females had lower trust in foreigners. CONCLUSION: This paper identifies high, medium and low trust societies, in addition to high and low trusting population subgroups. Our analyses extend the seminal work of Fukuyama, providing both corroboration and

  18. Mass formulae for broken supersymmetry in curved space-time

    Energy Technology Data Exchange (ETDEWEB)

    Ferrara, Sergio [Theoretical Physics Department, CERN, Geneva (Switzerland); INFN - Laboratori Nazionali di Frascati, Frascati (Italy); Department of Physics and Astronomy, U.C.L.A, Los Angeles, CA (United States); Proeyen, Antoine van [KU Leuven, Institute for Theoretical Physics, Leuven (Belgium)

    2016-11-15

    We derive the mass formulae for N = 1, D = 4 matter-coupled Supergravity for broken (and unbroken) Supersymmetry in curved space-time. These formulae are applicable to De Sitter configurations as is the case for inflation. For unbroken Supersymmetry in anti-de Sitter (AdS) one gets the mass relations modified by the AdS curvature. We compute the mass relations both for the potential and its derivative non-vanishing. (copyright 2016 WILEY-VCH Verlag GmbH and Co. KGaA, Weinheim)

  19. Einsteinian gravity from a spontaneously broken topological BF theory

    Science.gov (United States)

    Mielke, Eckehard W.

    2010-05-01

    Recently, (anti-)de Sitter gauge theories of gravity have been reconsidered. We generalize this to a metric-free sl(5,R) gauge framework and apply spontaneous symmetry breaking to the corresponding topological BF scheme. Effectively, we end-up with Einstein spaces with a tiny cosmological constant related to the scale of symmetry breaking. An induced 'background' metric emerges from a Higgs-like mechanism. It is indicated how the finiteness of such a deformed topological scheme may convert into asymptotic safeness after quantization of the spontaneously broken model.

  20. Restoration of badly broken, endodontically treated posterior teeth.

    Science.gov (United States)

    Gogna, Rupika; Jagadish, S; Shashikala, K; Keshava Prasad, Bs

    2009-07-01

    It is generally agreed that the successful treatment of a badly broken tooth with pulpal disease depends not only on good endodontic therapy, but also on good prosthetic reconstruction of the tooth after the endodontic therapy is complete. Often, we come across an endodontically treated tooth with little or no clinical crown in routine clinical cases. In such cases, additional retention and support of the restoration are difficult to achieve. Two case reports are discussed here where structurally compromised, endodontically treated, posterior teeth were restored using the Richmond crown in the first case, and by the use of two nonparallel cast posts in the second case.

  1. Tuning the cosmological constant, broken scale invariance, unitarity

    Energy Technology Data Exchange (ETDEWEB)

    Förste, Stefan; Manz, Paul [Bethe Center for Theoretical Physics,Nussallee 12, 53115 Bonn (Germany); Physikalisches Institut der Universität Bonn,Nussallee 12, 53115 Bonn (Germany)

    2016-06-10

    We study gravity coupled to a cosmological constant and a scale but not conformally invariant sector. In Minkowski vacuum, scale invariance is spontaneously broken. We consider small fluctuations around the Minkowski vacuum. At the linearised level we find that the trace of metric perturbations receives a positive or negative mass squared contribution. However, only for the Fierz-Pauli combination the theory is free of ghosts. The mass term for the trace of metric perturbations can be cancelled by explicitly breaking scale invariance. This reintroduces fine-tuning. Models based on four form field strength show similarities with explicit scale symmetry breaking due to quantisation conditions.

  2. Penetrating zone II neck injury by broken windshield.

    Science.gov (United States)

    Ozturk, Kayhan; Keles, Bahar; Cenik, Ziya; Yaman, Huseyin

    2006-03-01

    All penetrating neck wounds are potentially dangerous and require emergency treatment because there are important vessels, nerves and organs in the neck. We present the case of a patient who had an unusual penetrating neck injury caused by a broken windshield, noticed accidentally. Because fragments of windshield glass consist of sharp material, and the neck contains vital structures, such penetrating neck injury may cause life-threatening complications. Radiological examinations should be offered before the management of all neck wounds. The risk of retained foreign bodies and related complications can be prevented by using fluoroscopy during surgical exploration of the neck.

  3. Incremental Trust in Grid Computing

    DEFF Research Database (Denmark)

    Brinkløv, Michael Hvalsøe; Sharp, Robin

    2007-01-01

    This paper describes a comparative simulation study of some incremental trust and reputation algorithms for handling behavioural trust in large distributed systems. Two types of reputation algorithm (based on discrete and Bayesian evaluation of ratings) and two ways of combining direct trust...... and reputation (discrete combination and combination based on fuzzy logic) are considered. The various combinations of these methods are evaluated from the point of view of their ability to respond to changes in behaviour and the ease with which suitable parameters for the algorithms can be found in the context...

  4. Trust management in cloud services

    CERN Document Server

    Noor, Talal H; Bouguettaya, Athman

    2014-01-01

    This book describes the design and implementation of Cloud Armor, a novel approach for credibility-based trust management and automatic discovery of cloud services in distributed and highly dynamic environments. This book also helps cloud users to understand the difficulties of establishing trust in cloud computing and the best criteria for selecting a service cloud. The techniques have been validated by a prototype system implementation and experimental studies using a collection of real world trust feedbacks on cloud services.The authors present the design and implementation of a novel pro

  5. Banishment in Public Housing: Testing an Evolution of Broken Windows

    Directory of Open Access Journals (Sweden)

    Jose Torres

    2016-10-01

    Full Text Available Banishment policies grant police the authority to formally ban individuals from entering public housing and arrest them for trespassing if they violate the ban. Despite its widespread use and the social consequences resulting from it, an empirical evaluation of the effectiveness of banishment has not been performed. Understanding banishment enforcement is an evolution of broken windows policing, this study explores how effective bans are at reducing crime in public housing. We analyze crime data, spanning the years 2001–2012, from six public housing communities and 13 surrounding communities in one southeastern U.S. city. Using Arellano-Bond dynamic panel models, we investigate whether or not issuing bans predicts reductions in property and violent crimes as well as increases in drug and trespass arrests in public housing. We find that this brand of broken windows policing does reduce crime, albeit relatively small reductions and only for property crime, while resulting in an increase in trespass arrests. Given our findings that these policies have only a modest impact on property crime, yet produce relatively larger increases in arrests for minor offenses in communities of color, and ultimately have no significant impact on violent crime, it will be important for police, communities, and policy makers to discuss whether the returns are worth the potential costs.

  6. Broken Ergodicity in MHD Turbulence in a Spherical Domain

    Science.gov (United States)

    Shebalin, John V.; wang, Yifan

    2011-01-01

    Broken ergodicity (BE) occurs in Fourier method numerical simulations of ideal, homogeneous, incompressible magnetohydrodynamic (MHD) turbulence. Although naive statistical theory predicts that Fourier coefficients of fluid velocity and magnetic field are zero-mean random variables, numerical simulations clearly show that low-wave-number coefficients have non-zero mean values that can be very large compared to the associated standard deviation. In other words, large-scale coherent structure (i.e., broken ergodicity) in homogeneous MHD turbulence can spontaneously grow out of random initial conditions. Eigenanalysis of the modal covariance matrices in the probability density functions of ideal statistical theory leads to a theoretical explanation of observed BE in homogeneous MHD turbulence. Since dissipation is minimal at the largest scales, BE is also relevant for resistive magnetofluids, as evidenced in numerical simulations. Here, we move beyond model magnetofluids confined by periodic boxes to examine BE in rotating magnetofluids in spherical domains using spherical harmonic expansions along with suitable boundary conditions. We present theoretical results for 3-D and 2-D spherical models and also present computational results from dynamical simulations of 2-D MHD turbulence on a rotating spherical surface. MHD turbulence on a 2-D sphere is affected by Coriolus forces, while MHD turbulence on a 2-D plane is not, so that 2-D spherical models are a useful (and simpler) intermediate stage on the path to understanding the much more complex 3-D spherical case.

  7. Gauge Invariance and Broken Symmetries in Anyon Superfluids

    Science.gov (United States)

    Boyanovsky, Daniel

    We review aspects of broken symmetry and the nature of long range order in theories of anyons starting with bosons with a statistical interaction. We introduce a novel gauge invariant quantization scheme that allows the identification of local and gauge invariant order parameters. The connection between spin and statistics is reviewed and the consequences of broken symmetries in the anyon representation are discussed. An anyon gas is studied in the Bogoliubov approximation, it is determined that the ground state is a condensate of charge-flux composites with “quasi-long-range order” at zero temperature, a “weak” gap in the spectrum and finite helicity modulus. The system is disordered at nonzero temperatures. The disorder is not caused by Goldstone bosons but by the strong infrared behavior arising from the Coulomb interaction induced by the long-range statistical interaction. The properties of topological vortices in nonrelativistic and in relativistic Landau-Ginzburg theories are studied in detail. We study the physics of the mean-field ansatz and quasi-long range order in a simple exactly soluble relativistic model. This model exhibits a novel phenomenon of charge redistribution to the boundaries and restoration of translational invariance in the infinite volume limit. It also illuminates the physics of quasi-long-range order with a gap in the spectrum, statistical charge polarization by external magnetic fields and the role of “large” gauge transformations.

  8. Standard model with spontaneously broken quantum scale invariance

    Science.gov (United States)

    Ghilencea, D. M.; Lalak, Z.; Olszewski, P.

    2017-09-01

    We explore the possibility that scale symmetry is a quantum symmetry that is broken only spontaneously and apply this idea to the standard model. We compute the quantum corrections to the potential of the Higgs field (ϕ ) in the classically scale-invariant version of the standard model (mϕ=0 at tree level) extended by the dilaton (σ ). The tree-level potential of ϕ and σ , dictated by scale invariance, may contain nonpolynomial effective operators, e.g., ϕ6/σ2, ϕ8/σ4, ϕ10/σ6, etc. The one-loop scalar potential is scale invariant, since the loop calculations manifestly preserve the scale symmetry, with the dimensional regularization subtraction scale μ generated spontaneously by the dilaton vacuum expectation value μ ˜⟨σ ⟩. The Callan-Symanzik equation of the potential is verified in the presence of the gauge, Yukawa, and the nonpolynomial operators. The couplings of the nonpolynomial operators have nonzero beta functions that we can actually compute from the quantum potential. At the quantum level, the Higgs mass is protected by spontaneously broken scale symmetry, even though the theory is nonrenormalizable. We compare the one-loop potential to its counterpart computed in the "traditional" dimensional regularization scheme that breaks scale symmetry explicitly (μ =constant) in the presence at the tree level of the nonpolynomial operators.

  9. Soflty broken supersymmetry and the fine-tuning problem

    Energy Technology Data Exchange (ETDEWEB)

    Foda, O.E.

    1984-02-20

    The supersymmetry of the simple Wess-Zumino model is broken, in the tree-approximation, by adding all possible parity-even(mass)-dimension 2 and 3 terms. The model is then renormalized using BPHZ and the normal product algorithm, such that supersymmetry is only softly broken (in the original sense of Schroer and Symanzik). We show that, within the above renormalization scheme, none of the added breaking terms give rise to technical fine-tuning problems (defined in the sense of Gildener) in larger models, with scalar multiplets and hierarchy of mass scales, which is in contrast to what we obtain via analytic schemes such as dimensional renormalization, or supersymmetry extension of which. The discrepancy (which can be shown to persist in more general models) originates in the inherent local ambiguity in the finite parts of subtracted Feynman integrals. Emphasizing that the issue is purely technical (as opposed to physical) in origin, and that all physical properties are scheme-independent (as they should be), we conclude that the technical fine-tuning problem, in the specific sense used in this paper, being scheme dependent, is not a well-defined issue within the context of renormalized perturbation theory. 30 references.

  10. Trusted counsellor retires

    CERN Multimedia

    2006-01-01

    His astute counsel, knowing smile and distinguished eloquence will be missed by many. With a pang of regret, the man himself admits that 'CERN was like a drug for me'. Last week, Jean-Daniel Mandica retired, after 40 years of loyal service. He was the trusted counsellor of every Director of the Administration and Director-General for eighteen years, from 1986 to 2003. Head of the planning unit for the Directorate and the Administration from 1986 to 1996, he was then named Head of the Directorate Services Unit in 1996, a position he held until the end of 2003. Throughout that time, he conducted key tasks for the Organization, such as restructuring the Administration and carrying out audits. His role in the creation of Microcosm and his commitment to CERN's participation in the Universal Exposition at Seville in 1992 contributed in no small part to the spread of the Laboratory's fame. Jean-Daniel Mandica's incomparable knowledge of the Administration, sense of diplomacy and great ability to listen made him a v...

  11. Ethnic Diversity and Social Trust

    DEFF Research Database (Denmark)

    Dinesen, Peter Thisted; Sønderskov, Kim Mannemar

    2015-01-01

    diversity. In contrast, we analyze how ethnic diversity of the immediate micro-context—where interethnic exposure is inevitable—affects trust. We do this using Danish survey data linked with register-based data, which enables us to obtain precise measures of the ethnic diversity of each individual......We argue that residential exposure to ethnic diversity reduces social trust. Previous within-country analyses of the relationship between contextual ethnic diversity and trust have been conducted at higher levels of aggregation, thus ignoring substantial variation in actual exposure to ethnic......’s residential surroundings. We focus on contextual diversity within a radius of 80 meters of a given individual, but we also compare the effect in the micro-context to the impact of diversity in more aggregate contexts. Our results show that ethnic diversity in the micro-context affects trust negatively...

  12. Trust me, I am Robot!

    DEFF Research Database (Denmark)

    Stoyanova, Angelina; Drefeld, Jonas; Tanev, Stoyan

    /developers to further refine their product design. The paper will conclude with a more detailed conceptual analysis of interpersonal trust in human-technology interactions. The personalization of technological artifacts or assigning personality to active objects has been considered as natural to human beings (Gombrich...... on multiple case studies. The investigation so far suggests that it will be necessary to conceptualize three types of trust – interpersonal, social trust and trust in automation. This knowledge is incorporated in a descriptive model that could be used by technology and application designers......, 1972). The analysis will use some of the insights of Byzantine philosophy (Kapriev, 2005) regarding the distinction between the terms hypostasis (unique actualization of an essence) and prosopon (persona or person) to suggest a more general notion of interpersonality that could provide some additional...

  13. Ethnic Diversity and Social Trust

    DEFF Research Database (Denmark)

    Dinesen, Peter Thisted; Sønderskov, Kim Mannemar

    2017-01-01

    Due to its wide-ranging implications for social cohesion in diversifying Western countries, the question of the potential negative consequences of ethnic diversity for social trust is arguably the most contentious question in the literature on social trust. In this chapter we critically review...... the empirical evidence for a negative relationship between contextual ethnic diversity (measured locally within countries) and social trust. We cautiously conclude that there are indications of a negative relationship, although with important variations across study characteristics including national setting......, context unit analyzed, and conditioning on moderating influences. Building on the review, we highlight a number of paths for theoretical and methodological advances, which we argue would advance the literature on the relationship between ethnic diversity and social trust....

  14. International Trust and Public Diplomacy

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    as described by Brewer, Gross, Aday and Willnat (2004). The paper is based on case studies of five Public Diplomacy activities: Iranian President Hassan Rouhani’s letter in The Washington Post (2013); Denmark’s trust-building effort in Pakistan following the so-called “Muhammad crisis” (from 2010); The British...... Council’s strategy for trust-building in China (2012); Russian President Vladimir Putin’s letter in The New York Times (2013), and the USA’s trust-building effort in Turkey (from 2006). The best results have been obtained where Public Diplomacy has been linked to successful traditional diplomacy at state...... for a Public Diplomacy initiative to succeed. From a social responsible perspective journalists may have a role to play in creating international trust, and Public Diplomacy staffs consider it already important...

  15. Trust, dependence and interorganizational systems

    NARCIS (Netherlands)

    Ibrahim, M.K.M.

    2006-01-01

    Organizations form interorganizational relationships and utilize information technology to improve performance. This thesis discusses the influences of dependence and different types of trust on the use of interorganizational systems and subsequently the attainment of strategic benefits. The

  16. Metadata trust in a personal video recorder

    NARCIS (Netherlands)

    Boertjes, E.M.

    2004-01-01

    Trust is the belief or confidence in someone that their recommendations will work for you, i.e. that you will like the TV-programs (or other content) that they recommend. Many systems incorporate some notion of trust. Trust is more than similarity in taste, which makes trust a broader concept than

  17. 7 CFR 1400.100 - Revocable trust.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Revocable trust. 1400.100 Section 1400.100... AND SUBSEQUENT CROP, PROGRAM, OR FISCAL YEARS Payment Limitation § 1400.100 Revocable trust. A revocable trust and the grantor of the trust will be considered to be the same person. ...

  18. Trust, Behavior, and High School Outcomes

    Science.gov (United States)

    Romero, Lisa S.

    2015-01-01

    Purpose: The purpose of this paper is to contribute to the literature on student trust and to examine the relationship between student trust, behavior, and academic outcomes in high school. It asks, first, does trust have a positive effect on high school outcomes? Second, does trust influence student behavior, exerting an indirect effect on…

  19. A Formal Model for Trust Lifecycle Management

    DEFF Research Database (Denmark)

    Wagealla, Waleed; Carbone, Marco; English, Colin

    2003-01-01

    We propose a formal model of trust informed by the Global Computing scenario and focusing on the aspects of trust formation, evolution, and propagation. The model is based on a novel notion of trust structures which, building on concepts from trust management and domain theory, feature at the same...

  20. The Complex Relationship between Cyberbullying and Trust

    Science.gov (United States)

    Pieschl, Stephanie; Porsch, Torsten

    2017-01-01

    Theoretically, there are strong arguments for a relationship between cyberbullying and trust. On the one hand, trust is built on experiences; thus, experiences of malevolence such as cyberbullying might contribute to low trust. On the other hand, high trust may lead to risky online behavior such as self-disclosures that could increase the risk of…

  1. Building and Understanding Trust Relationships

    Science.gov (United States)

    2012-03-17

    to create cultures in new groups, but also to manage cultural issues in mature organizations.”57 Senior military leaders face the challenge of...no different . It requires military leaders to adhere to responsibilities, remain politically neutral, and provide viable military alternatives when... debate and formulation process.82 As trust goes, so does influence. Without trust, even the most highly decorated senior military leader increase the

  2. The Relationship between Teamwork and Organizational Trust

    Directory of Open Access Journals (Sweden)

    Musab Işık

    2015-04-01

    Full Text Available The aim of this study is to investigate the relationship between teamwork and organizational trust. In the implementation section the data from the survey of 250 workers is employed in call centers in Erzurum by using relevant statistical methods. Consequently, it is found that there is a positive and significant relationship between teamwork and organizational trust. Thus, the hypothesis of the study is supported as it was expected. Besides, it is found that there are positive and significant relationships between communication, openness to innovation, participation-trust in teamwork and organizational trust, trust in management, trust in co-workers, and trust in workplace.

  3. Trust is a must: What is involved in trusting those who manage forest fires?

    Science.gov (United States)

    Adam Liljeblad; Bill Borrie; Alan Watson

    2010-01-01

    Trust is a complicated emotion. In the past, many social scientists have studied trust. They discovered that trust involves a number of beliefs and emotions. The scientists in this study were interested in learning more about trust. They believed that forest managers can do a better job if people trust them to do what is best for citizens and the environment (figure 1...

  4. An Operational Semantics for Trust Policies

    DEFF Research Database (Denmark)

    Krukow, Karl Kristian

    2005-01-01

    In the trust-structure model of trust management, principals specify their trusting relationships with other principals in terms of trust policies. In their paper on trust structures, Carbone et al. present a language for trust policies, and provide a suitable denotational semantics. The semantics...... ensures that for any collection of trust policies, there is always a unique global trust-state, compatible with all the policies, specifying everyone's degree of trust in everyone else. However, as the authors themselves point out, the language lacks an operational model: the global trust-state is a well......-defined mathematical object, but it is not clear how principals can actually compute it. This becomes even more apparent when one considers the intended application environment: vast numbers of autonomous principals, distributed and possibly mobile. We provide a compositional operational semantics for a language...

  5. Trust and Online Reputation Systems

    Science.gov (United States)

    Kwan, Ming; Ramachandran, Deepak

    Web 2.0 technologies provide organizations with unprecedented opportunities to expand and solidify relationships with their customers, partners, and employees—while empowering firms to define entirely new business models focused on sharing information in online collaborative environments. Yet, in and of themselves, these technologies cannot ensure productive online interactions. Leading enterprises that are experimenting with social networks and online communities are already discovering this fact and along with it, the importance of establishing trust as the foundation for online collaboration and transactions. Just as today's consumers must feel secure to bank, exchange personal information and purchase products and services online; participants in Web 2.0 initiatives will only accept the higher levels of risk and exposure inherent in e-commerce and Web collaboration in an environment of trust. Indeed, only by attending to the need to cultivate online trust with customers, partners and employees will enterprises ever fully exploit the expanded business potential posed by Web 2.0. But developing online trust is no easy feat. While various preliminary attempts have occurred, no definitive model for establishing or measuring it has yet been established. To that end, nGenera has identified three, distinct dimensions of online trust: reputation (quantitative-based); relationship (qualitative-based) and process (system-based). When considered together, they form a valuable model for understanding online trust and a toolbox for cultivating it to support Web 2.0 initiatives.

  6. Building effective partnerships: the role of trust in the Virus Resistant Cassava for Africa project

    Directory of Open Access Journals (Sweden)

    Ezezika Obidimma C

    2012-11-01

    Full Text Available Abstract Background Virus Resistant Cassava for Africa (VIRCA is an agricultural biotechnology public-private partnership (PPP comprising the Donald Danforth Plant Sciences Center (DDPSC, National Agricultural Research Organization (NARO of Uganda and Kenya Agricultural Research Institute (KARI. The project seeks to develop virus-resistant cassava for farmers in Kenya and Uganda. Yet, there is much public skepticism about the use of genetically modified (GM crops and private sector involvement in Africa. This case study sought to understand the role of trust in the VIRCA partnership. Methods We conducted semi-structured, face-to-face interviews to obtain stakeholders’ views on the challenges to, and practices for, building trust in the VIRCA partnership. Interviewee responses, together with relevant documents and articles, were analyzed to generate descriptions of how trust is operationalized in this evolving agbiotech PPP. Data were analyzed based on recurring and emergent themes from the interviewee responses. Results Various factors undermine and build trust in agbiotech PPPs. Individual and institutional enthusiasm and detailed collaborative agreements stipulating partner roles and responsibilities are likely to enhance trust among partners. On the other hand, negative perceptions propagated by international partners about the capacities of African institutions and scientists, coupled with slow regulatory processes in Africa, are likely to be impediments to trust building. Conclusions Based on the findings of this study, we have derived four key lessons. First, differences in the capacity of the partner institutions and individuals should be respected. Second, technical and infrastructural capacity support for regulatory processes in Africa must be built. Third, detailed agreements and open and transparent partner practices during project implementation are necessary to dispel perceptions of inequality among partners. Fourth, institutional

  7. Lessons in American Music

    Science.gov (United States)

    Robinson Lindsay, Debra Kay

    2006-01-01

    "Lessons in American Music," by Debra Kay Robinson Lindsay, is a collection of lessons covering William Billings, Stephen Foster, Scott Joplin, and "The Star-Spangled Banner." This book is an all-in-one resource for teachers, offering lesson plans, activities, sheet music, and assessments. The set of lessons on William Billings will let your…

  8. Lesson Learning at JPL

    Science.gov (United States)

    Oberhettinger, David

    2011-01-01

    A lessons learned system is a hallmark of a mature engineering organization A formal lessons learned process can help assure that valuable lessons get written and published, that they are well-written, and that the essential information is "infused" into institutional practice. Requires high-level institutional commitment, and everyone's participation in gathering, disseminating, and using the lessons

  9. Broken symmetries in a location-invariant word recognition network.

    Science.gov (United States)

    Hannagan, Thomas; Dandurand, Frédéric; Grainger, Jonathan

    2011-01-01

    We studied the feedforward network proposed by Dandurand et al. (2010), which maps location-specific letter inputs to location-invariant word outputs, probing the hidden layer to determine the nature of the code. Hidden patterns for words were densely distributed, and K-means clustering on single letter patterns produced evidence that the network had formed semi-location-invariant letter representations during training. The possible confound with superseding bigram representations was ruled out, and linear regressions showed that any word pattern was well approximated by a linear combination of its constituent letter patterns. Emulating this code using overlapping holographic representations (Plate, 1995) uncovered a surprisingly acute and useful correspondence with the network, stemming from a broken symmetry in the connection weight matrix and related to the group-invariance theorem (Minsky & Papert, 1969). These results also explain how the network can reproduce relative and transposition priming effects found in humans.

  10. Fluorescence microscopy with diffraction resolution barrier broken by stimulated emission.

    Science.gov (United States)

    Klar, T A; Jakobs, S; Dyba, M; Egner, A; Hell, S W

    2000-07-18

    The diffraction barrier responsible for a finite focal spot size and limited resolution in far-field fluorescence microscopy has been fundamentally broken. This is accomplished by quenching excited organic molecules at the rim of the focal spot through stimulated emission. Along the optic axis, the spot size was reduced by up to 6 times beyond the diffraction barrier. The simultaneous 2-fold improvement in the radial direction rendered a nearly spherical fluorescence spot with a diameter of 90-110 nm. The spot volume of down to 0.67 attoliters is 18 times smaller than that of confocal microscopy, thus making our results also relevant to three-dimensional photochemistry and single molecule spectroscopy. Images of live cells reveal greater details.

  11. Parity-time symmetry broken by point-group symmetry

    Energy Technology Data Exchange (ETDEWEB)

    Fernández, Francisco M., E-mail: fernande@quimica.unlp.edu.ar; Garcia, Javier [INIFTA (UNLP, CCT La Plata-CONICET), División Química Teórica, Blvd. 113 S/N, Sucursal 4, Casilla de Correo 16, 1900 La Plata (Argentina)

    2014-04-15

    We discuss a parity-time (PT) symmetric Hamiltonian with complex eigenvalues. It is based on the dimensionless Schrödinger equation for a particle in a square box with the PT-symmetric potential V(x, y) = iaxy. Perturbation theory clearly shows that some of the eigenvalues are complex for sufficiently small values of |a|. Point-group symmetry proves useful to guess if some of the eigenvalues may already be complex for all values of the coupling constant. We confirm those conclusions by means of an accurate numerical calculation based on the diagonalization method. On the other hand, the Schrödinger equation with the potential V(x, y) = iaxy{sup 2} exhibits real eigenvalues for sufficiently small values of |a|. Point group symmetry suggests that PT-symmetry may be broken in the former case and unbroken in the latter one.

  12. Inflation via Gravitino Condensation in Dynamically Broken Supergravity

    CERN Document Server

    Alexandre, Jean; Mavromatos, Nick E

    2015-01-01

    Gravitino-condensate-induced inflation via the super-Higgs effect is a UV-motivated scenario for both inflating the early universe and breaking local supersymmetry dynamically, entirely independent of any coupling to external matter. As an added benefit, this also removes the (as of yet unobserved) massless Goldstino associated to global supersymmetry breaking from the particle spectrum. In this review we detail the pertinent properties and outline previously hidden details of the various steps required in this context in order to make contact with current inflationary phenomenology. The class of models of SUGRA we use to exemplify our approach are minimal four-dimensional N=1 supergravity and conformal extensions thereof (with broken conformal symmetry). Therein, the gravitino condensate itself can play the role of the inflaton, however the requirement of slow-roll necessitates unnaturally large values of the wave-function renormalisation. Nevertheless, there is an alternative scenario that may provide Staro...

  13. Statistical Mechanics where Newton’s Third Law is Broken

    Directory of Open Access Journals (Sweden)

    A. V. Ivlev

    2015-03-01

    Full Text Available There is a variety of situations in which Newton’s third law is violated. Generally, the action-reaction symmetry can be broken for mesoscopic particles, when their effective interactions are mediated by a nonequilibrium environment. Here, we investigate different classes of nonreciprocal interactions relevant to real experimental situations and present their basic statistical mechanics analysis. We show that in mixtures of particles with such interactions, distinct species acquire distinct kinetic temperatures. In certain cases, the nonreciprocal systems are exactly characterized by a pseudo-Hamiltonian; i.e., being intrinsically nonequilibrium, they can nevertheless be described in terms of equilibrium statistical mechanics. Our results have profound implications, in particular, demonstrating the possibility to generate extreme temperature gradients on the particle scale. We verify the principal theoretical predictions in experimental tests performed with two-dimensional binary complex plasmas.

  14. Broken data: Conceptualising data in an emerging world

    Directory of Open Access Journals (Sweden)

    Sarah Pink

    2018-01-01

    Full Text Available In this article, we introduce and demonstrate the concept-metaphor of broken data. In doing so, we advance critical discussions of digital data by accounting for how data might be in processes of decay, making, repair, re-making and growth, which are inextricable from the ongoing forms of creativity that stem from everyday contingencies and improvisatory human activity. We build and demonstrate our argument through three examples drawn from mundane everyday activity: the incompleteness, inaccuracy and dispersed nature of personal self-tracking data; the data cleaning and repair processes of Big Data analysis and how data can turn into noise and vice versa when they are transduced into sound within practices of music production and sound art. This, we argue is a necessary step for considering the meaning and implications of data as it is increasingly mobilised in ways that impact society and our everyday worlds.

  15. Numerical and physical modelling of oil spreading in broken ice

    Energy Technology Data Exchange (ETDEWEB)

    Gjoesteen, Janne K. Oekland

    2002-07-01

    The present work focuses on oil spreading in broken ice and the content of this thesis falls into three categories: 1) The physical and numerical modelling of oil spreading in ice. 2) Ice models and parameters describing the ice cover. 3) Experiments on oil spreading in broken ice. A background study was carried out to investigate existing models for simulating oil in broken ice. Most of them describe motion of oil simply as a function of the ice motion and do not take advantage of the possibilities that recent ice models provide. We decided to choose another direction, starting from scratch with equations describing the flow of oil on top of a water surface. The equations were implemented numerically, including proper boundary conditions to account for the presence of physical restrictions in the form of ice floes in the simulation area. The implementation was designed to be able to apply data on ice motion calculated by an existing dynamic ice model. A first validation of the model was carried out using existing experimental data. As those data were obtained in a different setting, the recorded parameters and set-up of the experiment were not ideal for our purpose. However, we were able to conclude that our model behaviour was reasonable. We have carried out statistical analysis on meteorological data of wind speeds, temperatures, flow sizes and ice thickness to obtain probability distributions describing the parameters. Those data has been collected in the Pechora Sea. Wind and temperature had been recorded for a period of 30-40 years. For this region we also had available Argos satellite data from four buoys drifting in the ice in April-June 1998. The Argos data were carefully analysed to suggest probability distributions and return periods for certain speeds. (Indoor basin tests were carried out to obtain data on spreading of oil in broken ice. A set of 20 tests was conducted, each with different type of oil, ice concentration, slush concentration or ice

  16. INFLUENCE OF BROKEN ROTOR BARS LOCATION IN THE SQUIRREL CAGE INDUCTION MOTOR USING FINITE ELEMENT METHOD

    Directory of Open Access Journals (Sweden)

    N. Halem

    2015-07-01

    Full Text Available It is well known that the number of broken bars and varying load affect on the amplitudes of specific harmonic components  in the process analysis of induction motors under broken rotor bars. The location of broken bars is an important factor which affects the diagnosis of the broken bars defect. In this paper the simulation is determinate for different cases for distribution of broken bars under induction motor pole in order to show the impact of broken bars location upon the amplitude of harmonic fault. The simulation results are obtained by using time stepping finite elements (TSFE method. The geometrical characteristics of motor, the effects of slotting and the magnetic saturation of lamination core are included in induction motor model.

  17. INFLUENCE OF BROKEN ROTOR BARS LOCATION IN THE SQUIRREL CAGE INDUCTION MOTOR USING FINITE ELEMENT METHOD

    Directory of Open Access Journals (Sweden)

    N. Halem

    2013-06-01

    Full Text Available It is well known that the number of broken bars and varying load affect on the amplitudes of specific harmonic components in the process analysis of induction motors under broken rotor bars. The location of broken bars is an important factor which affects the diagnosis of the broken bars defect. In this paper the simulation is determinate for different cases for distribution of broken bars under induction motor pole in order to show the impact of broken bars location upon the amplitude of harmonic fault. The simulation results are obtained by using time stepping finite elements (TSFE method. The geometrical characteristics of motor, the effects of slotting and the magnetic saturation of lamination core are included in induction motor model.

  18. UTILIZATION OF AMINO ACIDS OF BROKEN RICE IN GROWING PIGS

    Directory of Open Access Journals (Sweden)

    Matej Brestenský

    2014-02-01

    Full Text Available The six cannulated gilts (initial body weight 35.8 ± 0.5 kg fitted with a T-cannula in terminal ileum, were used to determine the apparent (AID and standardized (SID ileal digestibility of nitrogen (N and amino acids (AA in broken rice. Animals were fed twice daily in a two equal doses at a daily rate of 80 g.kg - 0.75. Water was offered ad libitum. The tested feed was the sole source of protein in the diet. The N-free diet was used to determine the ileal endogenous flow of AA and N. Chromium oxide (Cr2O3 was added to the diets as an indigestible marker in an amount of 0.3 % per kg of diet. After a 14 d postoperative period a 6 d adaptation period followed during which the animals were fed with an experimental diet. On d 7 ileal digesta was collected continuously for 24 h. The AID and SID of AA and N were calculated using analytically determined values of N, Cr2O3 and AA. The SID of AA was in a range from 81.6 % (tyrosine to 112.6 % (proline (P 0.05, respectively. There were no differences between standardized ileal digestibility of essential amino acids (94.3 % and nonessential amino acids (95.3 %. Regarding the ileal digestibility of AA, broken rice, a by-product from the food industry, is an appropriate source of digestible AA for growing pigs.

  19. Conformality lost: Broken symmetries in the early universe

    Science.gov (United States)

    Joyce, Austin

    In this dissertation, we introduce and investigate a general framework to describe the dynamics of the early universe. This mechanism is based on spontaneously broken conformal symmetry; we find that spectator fields in the theory can acquire a scale invariant spectrum of perturbations under generic conditions. Before introducing the conformal mechanism, we first consider the landscape of cosmologies involving a single scalar field which can address the canonical early universe puzzles. We find that, generically, single field non-inflationary solutions become strongly-coupled. We are therefore led to consider theories with multiple fields. We introduce the conformal mechanism via specific examples before constructing the most general effective theory for the conformal mechanism by utilizing the coset construction familiar from particle physics to construct the lagrangian for the Goldstone field of the broken conformal symmetry. This theory may be observationally distinguished from inflation by considering the non-linearly realized conformal symmetries. We systematically derive the Ward identities associated to the non-linearly realized symmetries, which relate (N + 1)-point correlation functions with a soft external Goldstone to N-point functions, and discuss observational implications, which cannot be mimicked by inflation. Finally, we consider violating the null energy condition (NEC) within the general framework considered. We show that the DBI conformal galileons, derived from the world-volume theory of a 3-brane moving in an Anti-de Sitter bulk, admit a background which violates the NEC. Unlike other known examples of NEC violation, such as ghost condensation and conformal galileons, this theory also admits a stable, Poincare-invariant vacuum. However, perturbations around deformations of this solution propagate superluminally.

  20. On what bases? The role of trust cues in longitudinal trust development during newcomer socialisation

    OpenAIRE

    van der Werff, Lisa

    2014-01-01

    Despite recent theoretical advances, the pattern of trust development between coworkers is a topic of dispute and many basic trust processes remain unclear. Increasingly, trust researchers are recognising that trust development is a context specific process that requires more nuanced empirical investigation of trust changes over time and in specific situations. Furthermore, theory suggests that employees attend to an array of independent trust cues but it fails to identify which cues are impo...

  1. Hijacking Subaltern’s history (broken bodies, broken voices: Decolonial critique of ‘Subaltern whiteness’ in South Africa

    Directory of Open Access Journals (Sweden)

    Chammah J. Kaunda

    2017-02-01

    Full Text Available This article uses decolonial to critique the discourse of ‘subaltern whiteness’ by questioning some Afrikaner scholars’ morality of regarding ‘white Afrikaners as subaltern’. Subaltern designates submerged, subordinated, exploited or suppressed – those whose voices have been historically muted, their humanity stripped by those with sociopolitical and economic power. Within South Africa, this raises the question: to what extent can white Afrikaners be regarded as subaltern? The article proposes indivisibility of epistemic vulnerability and regenerative theological praxis both emerging within Afrikaner theological discussion as viable response to broken bodies of those who still bear the marks or scars of apartheid and rather not to seek to hijack their voice.

  2. Hijacking Subaltern’s history (broken bodies, broken voices: Decolonial critique of ‘Subaltern whiteness’ in South Africa

    Directory of Open Access Journals (Sweden)

    Chammah J. Kaunda

    2017-11-01

    Full Text Available This article uses decolonial to critique the discourse of ‘subaltern whiteness’ by questioning some Afrikaner scholars’ morality of regarding ‘white Afrikaners as subaltern’. Subaltern designates submerged, subordinated, exploited or suppressed – those whose voices have been historically muted, their humanity stripped by those with sociopolitical and economic power. Within South Africa, this raises the question: to what extent can white Afrikaners be regarded as subaltern? The article proposes indivisibility of epistemic vulnerability and regenerative theological praxis both emerging within Afrikaner theological discussion as viable response to broken bodies of those who still bear the marks or scars of apartheid and rather not to seek to hijack their voice.

  3. The Process Perspective on Trust in Organizations

    DEFF Research Database (Denmark)

    Jagd, Søren

    Several trust researchers have pointed to the relevance of the process perspective for understanding trust in organizations. In this paper I review the attempts to apply the process perspective in trust research distinguishing between a soft and a strong process perspective. It appears that nearly......’s history? A few examples of studies applying a strong process perspective to trust in organizations is discussed.  Summarising, I argue that the process perspective, in general, may contribute furthering the understanding of the complexities of the development of trust over time and that the strong process...... all process oriented trust researchers have applied the weak process perspective having studied questions like: how trust processes get started; how the trust process may grow and develop over time; and how to understand the qualitative transformations of trust in the course of a relationship...

  4. 25 CFR 115.815 - How does a tribe request trust funds from a tribal trust account?

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false How does a tribe request trust funds from a tribal trust... ACTIVITIES TRUST FUNDS FOR TRIBES AND INDIVIDUAL INDIANS Tribal Accounts Withdrawing Tribal Trust Funds § 115.815 How does a tribe request trust funds from a tribal trust account? To request trust funds from a...

  5. Trust Management System for Opportunistic Cloud Services

    DEFF Research Database (Denmark)

    Kuada, Eric

    2013-01-01

    We have over the past three years been working on the feasibility of Opportunistic Cloud Services (OCS) for enterprises. OCS is about enterprises strategically contributing and utilizing spare IT resources as cloud services. One of the major challenges that such a platform faces is data security...... and trust management issues. This paper presents a trust management system for OCS platforms. It models the concept of trust and applies it to OCS platforms. The trust model and the trust management system are verified through the simulation of the computation of the trust values with Infrastructure...

  6. Trust-Based Leadership in the Making

    DEFF Research Database (Denmark)

    Bentzen, Tina Øllgaard; Jagd, Søren

    I spite of the popularity of trust-based leadership in consultancy and popular management writings empirical research on the transformation from traditional top-down to trust-based leadership is still limited. In this paper we study the implementation of a trust-based leadership reform in the City...... of Copenhagen taking place since 2012. We focus on understanding the trust dynamics in this major transformation. We show that the implementation of trust-based leadership should be seen as an emergent process involving a variety of actors within the organization. The case study reveals that the Trust Reform...

  7. Disaggregating ethnoracial disparities in physician trust.

    Science.gov (United States)

    Sewell, Abigail A

    2015-11-01

    Past research yields mixed evidence regarding whether ethnoracial minorities trust physicians less than Whites. Using the 2002 and 2006 General Social Surveys, variegated ethnoracial differences in trust in physicians are identified by disaggregating a multidimensional physician trust scale. Compared to Whites, Blacks are less likely to trust the technical judgment and interpersonal competence of doctors. Latinos are less likely than Whites to trust the fiduciary ethic, technical judgment, and interpersonal competence of doctors. Black-Latino differences in physician trust are a function of ethnoracial differences in parental nativity. The ways ethnoracial hierarchies are inscribed into power-imbalanced clinical exchanges are discussed. Copyright © 2015 Elsevier Inc. All rights reserved.

  8. Analyzing Trust Perceptions in System Implementations

    DEFF Research Database (Denmark)

    Schlichter, Bjarne Rerup; Rose, Jeremy

    2009-01-01

    mount, trust relations become strained, leading to a circle of suspicion and disbelief which is both destructive and hard to break out of. This case study analyses trust relations during a problematic period of time in the implementation of the Faroese integrated healthcare information system, using......' perceptions of trust relations influence future actions, and in this way have both negative and positive consequences. We also conclude that Giddens' theories of trust provide a promising insight into the dynamic aspects of trust relations in implementation projects, which go further than trust theories...

  9. A Trusted Portable Computing Device

    Science.gov (United States)

    Ming-wei, Fang; Jun-jun, Wu; Peng-fei, Yu; Xin-fang, Zhang

    A trusted portable computing device and its security mechanism were presented to solve the security issues, such as the attack of virus and Trojan horse, the lost and stolen of storage device, in mobile office. It used smart card to build a trusted portable security base, virtualization to create a secure virtual execution environment, two-factor authentication mechanism to identify legitimate users, and dynamic encryption to protect data privacy. The security environment described in this paper is characteristic of portability, security and reliability. It can meet the security requirement of mobile office.

  10. A Calculus for Trust Management

    DEFF Research Database (Denmark)

    Carbone, Marco; Nielsen, Mogens; Sassone, Vladimiro

    2004-01-01

    We introduce ctm, a process calculus which embodies a notion of trust for global computing systems. In ctm each principal (location) is equipped with a policy, which determines its legal behaviour, and with a protocol, which allows interactions between principals and the flow of information from...... principals to policies. We elect to formalise policies using a Datalog-like logic, and to express protocols in the process algebra style. This yields an expressive calculus very suitable for the global computing scenarios, and provides a formalisation of notions such as trust evolution. For ctm we define...

  11. Learning to trust: trust and attachment in early psychosis

    NARCIS (Netherlands)

    Fett, A.J.; Shergill, S.; Korver-Nieberg, N.; Yakub, F.; Gromann, P.; Krabbendam, L.

    2016-01-01

    Background Distrust and social dysfunction are characteristic in psychosis and may arise from attachment insecurity, which is elevated in the disorder. The relationship between trust and attachment in the early stages of psychosis is unknown, yet could help to understand interpersonal difficulties

  12. Maintaining control while delegating trust: Integrity constraints in trust management

    NARCIS (Netherlands)

    Etalle, Sandro; Winsborough, William H.

    2009-01-01

    We introduce the use, monitoring, and enforcement of integrity constraints in trust management-style authorization systems. We consider what portions of the policy state must be monitored to detect violations of integrity constraints. Then, we address the fact that not all participants in a

  13. An Operational Semantics for Trust Policies

    DEFF Research Database (Denmark)

    Krukow, Karl

    2006-01-01

    In the trust-structure framework for trust management, principals specify their trusting relationships in terms of trust policies. In their paper on trust structures, Carbone et al. present a language for such policies, and provide a suitable denotational semantics. The semantics ensures that for......In the trust-structure framework for trust management, principals specify their trusting relationships in terms of trust policies. In their paper on trust structures, Carbone et al. present a language for such policies, and provide a suitable denotational semantics. The semantics ensures...... that for any collection of policies, there is always a unique global trust-state, compatible with all the policies, specifying everyone's degree of trust in everyone else. However, as the authors themselves point out, the language lacks an operational model: the global trust-state is a well......-defined mathematical object, but it is not clear how principals can actually compute it. This becomes even more apparent when one considers the intended application environment: vast numbers of autonomous principals, distributed and possibly mobile. We provide a compositional operational semantics for a language...

  14. Schrödinger operators on a periodically broken zigzag carbon ...

    Indian Academy of Sciences (India)

    In this paper, we study the spectra of Schrödinger operators on zigzag carbon nanotubes, which are broken by abrasion or during refining process. Throughout this paper, we assume that the carbon nanotubes are broken periodically and we deal with one of those models. Making use of the Floquet–Bloch theory, we ...

  15. Energy dissipation in thirty-foot broken-back culverts using laboratory models.

    Science.gov (United States)

    2014-09-01

    This research investigates the reduction in scour downstream of a broken-back culvert by forming a hydraulic jump : inside the culvert. A broken-back culvert is used in areas of high relief and steep topography as it has one or more breaks in profile...

  16. Schrödinger operators on a periodically broken zigzag carbon ...

    Indian Academy of Sciences (India)

    nanotubes change if they are broken. The aim of this paper is to study spectral properties of Schrödinger operator on a 'broken' carbon nanotube. Carbon nanotubes are graphene sheets with a cylindrical structure and are divided into three classes: zigzag, armchair and chiral. In this paper, we deal with zigzag nanotubes.

  17. Removal of a Broken Cannulated Femoral Nail: A Novel Retrograde Impaction Technique

    Directory of Open Access Journals (Sweden)

    Kongkhet Riansuwan

    2013-01-01

    Full Text Available This report presents a surgical technique to remove a broken cannulated nail from the femur. A Harrington rod was modified for retrograde impaction of the retained fragment. The broken implant was finally removed without complication. This particular procedure was safe, simple, and promising.

  18. Listening to What Cannot Be Said: Broken Narratives and the Lived Body

    Science.gov (United States)

    Kokanovic, Renata; Stone, Meredith

    2018-01-01

    The core of this special issue of "Arts and Humanities in Higher Education" emerged from the "Broken Narratives and the Lived Body" conference held in 2016. The "Broken Narrative" essays included in this issue open up a critical space for understanding and theorising illness narratives that defy a conventional…

  19. Cracked and broken teeth--definitions, differential diagnosis and treatment.

    Science.gov (United States)

    Paul, R A; Tamse, A; Rosenberg, E

    2007-04-01

    Cracked and broken teeth present a diagnostic dilemma to the dentist and the sooner a correct diagnosis is made the greater are the chances to save the tooth. As the location, direction and size of the crack or fracture dictates the choice of treatment, it is important to first define the types of cracks and fractures in the coronal and radicular tooth structure. Cracks and fractures can be classified as follows: 1. craze lines 2. fractured cusps 3. cracked teeth 4. split teeth 5. vertical root fractures. The vertical root fracture has been described recently in two articles in this publication, and therefore will not be discussed here. Diagnosis of a cracked tooth is not always initially obvious. The patient's response to clinical testing is the primary diagnostic tool along with the dental history provided by the patient. Radiographs are secondary in making a diagnosis. Clinical aids for reproducing the patient's symptoms such as occlusal bite devices, observing occlusal wear facets and the application of cold water to one tooth at a time may isolate the offending tooth. In situations where an irreversible pulpitis is diagnosed, endodontic treatment is indicated. In the case of a questionable diagnosis, or one in which a potential reversible pulpitis is made, a provisional restoration can be placed for an unspecified time as a diagnostic aid. If endodontic therapy were indicated, consultation with the patient as to the compromised prognosis and the alternatives to endodontic treatment is essential.

  20. Spontaneously broken spacetime symmetries and the role of inessential Goldstones

    Science.gov (United States)

    Klein, Remko; Roest, Diederik; Stefanyszyn, David

    2017-10-01

    In contrast to internal symmetries, there is no general proof that the coset construction for spontaneously broken spacetime symmetries leads to universal dynamics. One key difference lies in the role of Goldstone bosons, which for spacetime symmetries includes a subset which are inessential for the non-linear realisation and hence can be eliminated. In this paper we address two important issues that arise when eliminating inessential Goldstones. The first concerns the elimination itself, which is often performed by imposing so-called inverse Higgs constraints. Contrary to claims in the literature, there are a series of conditions on the structure constants which must be satisfied to employ the inverse Higgs phenomenon, and we discuss which parametrisation of the coset element is the most effective in this regard. We also consider generalisations of the standard inverse Higgs constraints, which can include integrating out inessential Goldstones at low energies, and prove that under certain assumptions these give rise to identical effective field theories for the essential Goldstones. Secondly, we consider mappings between non-linear realisations that differ both in the coset element and the algebra basis. While these can always be related to each other by a point transformation, remarkably, the inverse Higgs constraints are not necessarily mapped onto each other under this transformation. We discuss the physical implications of this non-mapping, with a particular emphasis on the coset space corresponding to the spontaneous breaking of the Anti-De Sitter isometries by a Minkowski probe brane.

  1. Orebody Modelling for Exploration: The Western Mineralisation, Broken Hill, NSW

    Energy Technology Data Exchange (ETDEWEB)

    Lotfolah Hamedani, Mohammad, E-mail: mlotfham@gmail.com; Plimer, Ian Rutherford [University of Adelaide, School of Earth and Environmental Sciences (Australia); Xu Chaoshui [University of Adelaide, School of Civil, Environmental and Mining Engineering (Australia)

    2012-09-15

    The Western Mineralisation in the Broken Hill deposit was studied to identify the zonation sequence of lithogeochemical haloes along and across the strike of the orebody. Samples used are from 77 drill holes and the samples were assayed for Pb, Zn, Fe, S, Cu, Ag, Cd, Sb, Bi and As. Variogram analyses were calculated for all the elements and kriging was used to construct the 3D block model. Analysis of cross sections along and across the strike of the orebody shows that Bi and Sb form broader halos around sulphide masses and this suggests that they are pathfinder elements for the Pb and Zn elements of this orebody. The threshold concentrations (minimum anomaly) of the 10 elements were determined using the concentration-area analysis. On east-west vertical cross sections, the values of linear productivity, variability gradient and zonality index were calculated for each element. Based on the maximum zonality index of each element, the sequence of geochemical zonation pattern was determined from top to bottom of the orebody. The result shows that S, Pb, Zn and Cd tend to concentrate in the upper part of the mineralisation whereas Ag, Cu, Bi and As have a tendency to concentrate in the lower part of the mineralised rocks. Also, an empirical product ratio index was developed based on the position of the elements in the zonation sequence. The methods and results of this research are applicable to exploration of similar Zn and Pb sulphide ore deposits.

  2. Attention modulates adaptive motor learning in the 'broken escalator' paradigm.

    Science.gov (United States)

    Patel, Mitesh; Kaski, Diego; Bronstein, Adolfo M

    2014-07-01

    The physical stumble caused by stepping onto a stationary (broken) escalator represents a locomotor aftereffect (LAE) that attests to a process of adaptive motor learning. Whether such learning is primarily explicit (requiring attention resources) or implicit (independent of attention) is unknown. To address this question, we diverted attention in the adaptation (MOVING) and aftereffect (AFTER) phases of the LAE by loading these phases with a secondary cognitive task (sequential naming of a vegetable, fruit and a colour). Thirty-six healthy adults were randomly assigned to 3 equally sized groups. They performed 5 trials stepping onto a stationary sled (BEFORE), 5 with the sled moving (MOVING) and 5 with the sled stationary again (AFTER). A 'Dual-Task-MOVING (DTM)' group performed the dual-task in the MOVING phase and the 'Dual-Task-AFTEREFFECT (DTAE)' group in the AFTER phase. The 'control' group performed no dual task. We recorded trunk displacement, gait velocity and gastrocnemius muscle EMG of the left (leading) leg. The DTM, but not the DTAE group, had larger trunk displacement during the MOVING phase, and a smaller trunk displacement aftereffect compared with controls. Gait velocity was unaffected by the secondary cognitive task in either group. Thus, adaptive locomotor learning involves explicit learning, whereas the expression of the aftereffect is automatic (implicit). During rehabilitation, patients should be actively encouraged to maintain maximal attention when learning new or challenging locomotor tasks.

  3. Trusted Product Evaluations. A Guide for Vendors

    National Research Council Canada - National Science Library

    1990-01-01

    Trusted Product Evaluations: A Guide for Vendors describes procedures for conducting business with the Information Systems Security Organization within the National Security Agency using the Trusted Product Evaluation Program...

  4. Trust Networks on the Semantic Web

    National Research Council Canada - National Science Library

    Golbeck, Jennifer; Parisa, Bijan; Hendler, James

    2006-01-01

    The so-called "Web of Trust" is one of the ultimate goals of the Semantic Web. Research on the topic of trust in this domain has focused largely on digital signatures, certificates, and authentication...

  5. 77 FR 39143 - Executive Branch Qualified Trusts

    Science.gov (United States)

    2012-07-02

    ... executive branch qualified trust, an entity must meet the strict requirements for independence set forth in... this subpart. A parent or guardian may execute the umbrella trust agreement on behalf of a required...

  6. Laparoscopic retrieval of a foreign body (broken surgical knife from retroperitoneal space: An interesting case

    Directory of Open Access Journals (Sweden)

    Dipak Limbachia

    2017-11-01

    Full Text Available We present a rare and interesting case, of a retrieval of a broken surgical knife blade, from the retroperitoneal space, through laparoscopic approach by a gynecology endoscopist. A 40-year-old man underwent open lumbar discectomy surgery, when the surgical knife blade inadvertently broke, and was retained in the disc space. The broken blade could not be removed during the initial surgery. A second attempt was made to retrieve it; however, it migrated further anteriorly into the retroperitoneal space. Subsequently, a gynecology endoscopist was called in, who successfully retrieved the broken blade from the retroperitoneal space through laparoscopic approach. A four-port laparoscopic transperitoneal approach was performed. The broken fragment of the knife was found just medial to the left common iliac artery in the retroperitoneal space, which was removed. Operation time was 40 minutes and the postoperative course was uneventful. Keywords: broken knife, foreign body, laparoscopy, retroperitoneal

  7. Social Capital. Trust and Ideology

    Directory of Open Access Journals (Sweden)

    Jacek TITTENBRUN

    2013-06-01

    Full Text Available The paper offers a critical analysis of the central concept around which the popular construct of social capital is organised, i.e. trust. To this end the views of Fukuyama, the leading exponent of the said concept are considered. As a result, the concept in question is found to be ideologically charged and substantively weak in many respects.

  8. TEE-Based Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe

    Today, it is safe to assume that any program or data can be compromised, if they are not protected by hardware within a secure area. Systems based on crypto-processors (e.g., a trusted platform module, a smart card or a hardware security module) rely on the properties of tamper resistant hardware...

  9. International trust and public diplomacy

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    2015-01-01

    descriptions of public diplomacy activities, public polls, and scholarly literature. Public diplomacy ideas discussed include lightshow, hand-on cooperation, win-win projects, and the creation of frameworks for self-expression. A central concept is international trust as described by Brewer, Gross, Aday...

  10. INNOVATION - THE ROLE OF TRUST

    Directory of Open Access Journals (Sweden)

    Kornélia Lazányi

    2017-11-01

    Full Text Available Innovations and constant change are inevitable parts of our everyday lives. It is not only because advanced technologies are more effective, but mostly because in the 21st century more and more realise that scarce resources – among them the safe and clean environment as such - necessitate a paradigm change and intense innovation. This revolution is easily trackable in the organisational and (supranational policies. However, innovation, and its necessary prerequisites are seldom investigated from the individuals’ point of view. It is easy to understand that inter-organisational trust is inevitable on both the consumers’ and the providers’ (innovators’ side, however, it has to be made clear that an innovative organisation has to create a trusting environment within the company, in order to foster collaboration, the generation of new ideas, creativity and finally innovation. The present paper endeavours to call attention to the notion of trust and its antecedents and consequences in relation to innovations. The aim is to provide assistance in understanding how to develop trust in each other and hence foster further innovations and development.

  11. Ombud's Corner: tried and trusted

    CERN Multimedia

    Sudeshna Datta-Cockerill

    2014-01-01

    Trust is an essential ingredient in all working relationships. When trust breaks down, conflicts may arise and teams may stop working in harmony. The Ombud is there to help you to find your way out before the point of no return is reached.   Reliability, integrity, expertise and good will: these are the four pillars on which trust is built. Trust between colleagues may break down for many different reasons, including misunderstandings, and the way to restoring the relationship is through working on these four pillars. For instance, if we assume that we do indeed have the expertise to deal with a particular task assigned to us, we may need to improve our reliability by making sure that we meet deadlines and expectations or demonstrate our integrity by acknowledging and accepting accountability for this, all the while showing that we are doing our best to do whatever it takes to achieve the common goals and restore our colleagues’ faith in us. All four of these pillars need to be in...

  12. Secure Hardware Design for Trust

    Science.gov (United States)

    2014-03-01

    benchmarks as the algorithm takes the fault propagation and masking effects into account. In these types of encryption, a fault is always excited on...Multiplier with incorrect key. 6.3. Grain using Sequential XOR Logic Encryption Cryptographic algorithms are a key feature in secure and trusted...10 6.1.1 AES Algorithm Details

  13. Design for Trust - Online Grocery Shopping

    OpenAIRE

    Karahasanovic, Amela; Holm, Kristoffer T.; Nejad, Aria

    2017-01-01

    This paper presents our ongoing research into trust and the risks related to online grocery shopping. More specifically, we investigate how to increase customer trust when buying perishable products online. Online grocery shopping is an increasing trend in many countries, and several studies on trust have been conducted in the context of online grocery shopping. However, knowledge of how to improve trust and reduce risks is rather limited in this context. Through design, prototyping and user ...

  14. Consumer Trust in E-commerce

    OpenAIRE

    Gustavsson, Malin; Johansson, Anne-Marie

    2006-01-01

    An often mentioned reason for consumers not purchasing from Internet vendors, is the lack of trust. The lack of physical clues and physical interaction in the online environment make it more difficult to establish trust with the consumers. So, it is important for companies to learn how to manage consumers’ trust in e-commerce. Although, building consumer trust on the Internet is a challenge for online vendors. The purpose with this dissertation was to get a better understanding of consumer t...

  15. Culture and Consumer Trust in Online Businesses

    OpenAIRE

    Robert Greenberg; Bernard Wong-On-Wing; Gladie Lui

    2008-01-01

    The importance of consumer trust to the success of online businesses is well documented in the literature. Given the global nature of online transactions, an important question is whether trust and trust formation differ across cultures. This study compared Hong Kong and U.S. consumer trust in online businesses. Specifically, the study examined security and privacy risks related to the purchase of products as well as services. The results show that significant differences exist between consum...

  16. Inferring Trust Based on Similarity with TILLIT

    Science.gov (United States)

    Tavakolifard, Mozhgan; Herrmann, Peter; Knapskog, Svein J.

    A network of people having established trust relations and a model for propagation of related trust scores are fundamental building blocks in many of today’s most successful e-commerce and recommendation systems. However, the web of trust is often too sparse to predict trust values between non-familiar people with high accuracy. Trust inferences are transitive associations among users in the context of an underlying social network and may provide additional information to alleviate the consequences of the sparsity and possible cold-start problems. Such approaches are helpful, provided that a complete trust path exists between the two users. An alternative approach to the problem is advocated in this paper. Based on collaborative filtering one can exploit the like-mindedness resp. similarity of individuals to infer trust to yet unknown parties which increases the trust relations in the web. For instance, if one knows that with respect to a specific property, two parties are trusted alike by a large number of different trusters, one can assume that they are similar. Thus, if one has a certain degree of trust to the one party, one can safely assume a very similar trustworthiness of the other one. In an attempt to provide high quality recommendations and proper initial trust values even when no complete trust propagation path or user profile exists, we propose TILLIT — a model based on combination of trust inferences and user similarity. The similarity is derived from the structure of the trust graph and users’ trust behavior as opposed to other collaborative-filtering based approaches which use ratings of items or user’s profile. We describe an algorithm realizing the approach based on a combination of trust inferences and user similarity, and validate the algorithm using a real large-scale data-set.

  17. PROBLEM OF TRUST TO POWER IN RUSSIA

    Directory of Open Access Journals (Sweden)

    Alexander V. Tsarev

    2014-01-01

    Full Text Available Currently the topic of trust is very important. The most important problem of our country at the present stage performs low level of trust relationships between people, business, government. Generally trust is an integral part of society and is manifested in all its spheres. Directly, this paper analyzes the trust in the political sphere. Mostly, the task is to assess the level of public confidence in the existing government in our country.

  18. Validation and verification of agent models for trust: Independent compared to relative trust

    NARCIS (Netherlands)

    Hoogendoorn, M.; Jaffry, S.W.; Maanen, P.P. van

    2011-01-01

    In this paper, the results of a validation experiment for two existing computational trust models describing human trust are reported. One model uses experiences of performance in order to estimate the trust in different trustees. The second model in addition carries the notion of relative trust.

  19. Trust and School Life: The Role of Trust for Learning, Teaching, Leading, and Bridging

    Science.gov (United States)

    Van Maele, Dimitri, Ed.; Forsyth, Patrick B., Ed.; Van Houtte, Miek, Ed.

    2014-01-01

    This book samples recent and emerging trust research in education including an array of conceptual approaches, measurement innovations, and explored determinants and outcomes of trust. The collection of pathways explores the phenomenon of trust and establishes the significance of trust relationships in school life. It emboldens the claim that…

  20. Public trust: expectancies, beliefs, and behavior

    NARCIS (Netherlands)

    Alink, D.

    2014-01-01

    Most people think of trust as the bonding force between people in romantic, professional, and family relationships. Of growing importance however is public trust: trust in organizations that are not represented by a single person, such as companies, non-profit organizations and governmental

  1. Trust and Relationship Building in Electronic Commerce.

    Science.gov (United States)

    Papadopoulou, Panagiota; Andreou, Andreas; Kanellis, Panagiotis; Martakos, Drakoulis

    2001-01-01

    Discussion of the need for trust in electronic commerce to build customer relationships focuses on a model drawn from established theoretical work on trust and relationship marketing that highlights differences between traditional and electronic commerce. Considers how trust can be built into virtual environments. (Contains 50 references.)…

  2. Trust and innovativeness in virtual organisations

    NARCIS (Netherlands)

    Pournaras, E.; Lazakidou, A.

    2008-01-01

    This paper discusses trust and control in a virtualised environment. An extensive use of information and communication technology, and virtualisation of organisations put trust into the core of management challenges. Trust is a glue that bonds individuals and groups together to form virtual teams

  3. 26 CFR 301.7701-4 - Trusts.

    Science.gov (United States)

    2010-04-01

    ..., therefore, are not associates in a joint enterprise for the conduct of business for profit. (b) Business... remediation trust if the organization is organized under state law as a trust; the primary purpose of the... federal, state, or local environmental laws; all contributors to the trust have (at the time of...

  4. Trusted Truck(R) II (phase A).

    Science.gov (United States)

    2009-01-01

    The Trusted Truck Program was initiated in 2003 as a joint effort by NTRCI, Volvo and UT. The vision of the Trusted Truck program is to develop a secure and "trusted" transport solution from pickup to delivery. The program's objective is to incre...

  5. 46 CFR 67.36 - Trust.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 2 2010-10-01 2010-10-01 false Trust. 67.36 Section 67.36 Shipping COAST GUARD... Citizenship Requirements for Vessel Documentation § 67.36 Trust. (a) For the purpose of obtaining a registry or recreational endorsement, a trust arrangement meets citizenship requirements if: (1) Each of its...

  6. 40 CFR 280.102 - Trust fund.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 26 2010-07-01 2010-07-01 false Trust fund. 280.102 Section 280.102...) Financial Responsibility § 280.102 Trust fund. (a) An owner or operator may satisfy the requirements of § 280.93 by establishing a trust fund that conforms to the requirements of this section. The trustee...

  7. 75 FR 66977 - Housing Trust Fund

    Science.gov (United States)

    2010-10-29

    ... Housing and Urban Development 24 CFR Parts 91 and 92 Housing Trust Fund; Proposed Rule #0;#0;Federal... URBAN DEVELOPMENT 24 CFR Parts 91 and 92 RIN 2506-AC30 Housing Trust Fund AGENCY: Office of the... and Economic Recovery Act of 2008 establishes a Housing Trust Fund (HTF) to be administered by HUD...

  8. 7 CFR 46.46 - Statutory trust.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Statutory trust. 46.46 Section 46.46 Agriculture... THAN RULES OF PRACTICE) UNDER THE PERISHABLE AGRICULTURAL COMMODITIES ACT, 1930 Statutory Trust § 46.46 Statutory trust. (a) Definitions. (1) “Received” means the time when the buyer, receiver, or agent gains...

  9. Animal Behaviour: Friendship Enhances Trust in Chimpanzees.

    Science.gov (United States)

    Silk, Joan

    2016-01-25

    Individuals that participate in exchanges with delayed rewards can be exploited if their partners don't reciprocate. In humans, friendships are built on trust, and trust enhances cooperation. New evidence suggests that close social bonds also enhance trust in chimpanzees. Copyright © 2016 Elsevier Ltd. All rights reserved.

  10. Temperament Constructs Related to Betrayal of Trust

    Science.gov (United States)

    1991-12-01

    disintegrate. The interrelatedness between system trust and interpersonal trust has been noted by Durkheim (1933), who predicted a loss of trust in others...and suspicion. Journal of Conflict Resolution, 2, 265-279. Durkheim , E. (1933). The division of labor in societ’. New York: Free Press of Glencoe

  11. Control Is Good, But Trust Is Cheaper

    DEFF Research Database (Denmark)

    Jensen, Keld; Svendsen, Gert Tinggaard

    2014-01-01

    Trust or Control? Trust-Based Management and the Thriving Workplace Lenin once said, “Trust is good, but control is better” – and many a modern manager seems to agree. One sees precious time and resources plowed into paper-pushing, form-filling, and the drafting of voluminous, hyper-detailed cont...

  12. Trust in Client-Vendor Relations

    DEFF Research Database (Denmark)

    Tøth, Thomas

    2014-01-01

    and organizational boundaries within the field of IT offshore outsourcing. The article concludes that trust is primarily established when the teams are meeting face-to-face and in order to establish trust at a distance they are dependent on technology being readily available and on engaging in active trust building...

  13. The edge of trust : An introduction

    NARCIS (Netherlands)

    Evans, A.M.; Krueger, J.I.

    2015-01-01

    The dynamics of interpersonal trust are an essential part of understanding how people think and act in social interactions. Trust enables human beings to form meaningful personal relationships (Simpson, 2007) and engage in mutually profitable social and economic exchanges (Kohn, 2008). Yet, trust is

  14. Heuritic Trust in IoT

    DEFF Research Database (Denmark)

    Kaur, Bipjeet; Tange, Henrik

    2015-01-01

    Increasing use of Internet of things in diverse fields has demanding association in security and trust of such services. The trust on the services cannot exist independent. It is greatly depended on the security of system at each layer. In this paper we analyze different existing trust algorithms...

  15. The Effects of Trust Transference, Mobile Attributes and Enjoyment on Mobile Trust

    Directory of Open Access Journals (Sweden)

    Cristiane Junqueira Giovannini

    2015-01-01

    Full Text Available Trust is essential in building relationships. In mobile commerce, as in electronic commerce, trust is even more valuable given the absence of human contact and direct observation of the service provider. Despite the importance of trust for mobile commerce, there has been little academic effort to study the relationships between mobile devices unique components of interactivity and customer trust, or the relationship between offline, online and mobile trust. This study proposes a trust-mediated model for customer attitude and transaction intentions in mobile commerce contexts that incorporates trust transference and unique factors present in mobile commerce. Data were collected in an online survey and analyzed via structural equations modeling. Results suggest that trust transferred from online contexts and ease of use have significant effects on mobile trust formation, while also indicating that mobile trust influences consumers’ attitudes and intentions to purchase using mobile devices.

  16. Interaction between non-executive and executive directors in English National Health Service trust boards: an observational study.

    Science.gov (United States)

    Sheaff, Rod; Endacott, Ruth; Jones, Ray; Woodward, Val

    2015-10-15

    National Health Service (NHS) trusts, which provide the majority of hospital and community health services to the English NHS, are increasingly adopting a 'public firm' model with a board consisting of executive directors who are trust employees and external non-executives chosen for their experience in a range of areas such as finance, health care and management. In this paper we compare the non-executive directors' roles and interests in, and contributions to, NHS trust boards' governance activities with those of executive directors; and examine non-executive directors' approach to their role in board meetings. Non-participant observations of three successive trust board meetings in eight NHS trusts (primary care trusts, foundation trusts and self-governing (non-foundation) trusts) in England in 2008-9. The observational data were analysed inductively to yield categories of behaviour reflecting the perlocutionary types of intervention which non-executive directors made in trust meetings. The observational data revealed six main perlocutionary types of questioning tactic used by non-executive directors to executive directors: supportive; lesson-seeking; diagnostic; options assessment; strategy seeking; and requesting further work. Non-executive board members' behaviours in holding the executive team to account at board meetings were variable. Non-executive directors were likely to contribute to finance-related discussions which suggests that they did see financial challenge as a key component of their role. The pattern of behaviours was more indicative of an active, strategic approach to governance than of passive monitoring or 'rubber-stamping'. Nevertheless, additional means of maintaining public accountability of NHS trusts may also be required.

  17. Leader trustworthy behavior and organizational trust: The role of the immediate manager for cultivating trust

    OpenAIRE

    Thomas, Geoff; Legood, A; Sacramento, C

    2016-01-01

    Drawing from both trust-building theory and interpersonal trust literature, we investigate how trust between a leader and follower may be leveraged to influence organizational trust. We also explore the mediating mechanisms of this link and test a potential moderator. A cross-sectional, multi-foci design was adopted and participants were 201 employees within a public sector organization. Leader trustworthy behavior was found to predict organizational trust, mediated by trustworthiness percept...

  18. Investing in Low-Trust Countries: Trust in the Global Mutual Fund Industry

    OpenAIRE

    Massa, Massimo; Wang, Chengwei; Zhang, Hong; Zhang, Jian

    2015-01-01

    We hypothesize that trust plays an important role in affecting the activeness and effectiveness of the global mutual fund industry. Empirically, trust is positively associated with the activeness of domestic funds, whereas for internationals mutual funds conducting cross-border investments activeness is bounded by the trust of low-trust countries. In both cases, trust-related active share delivers superior performance, whereas the economic magnitude is larger for cross-border investments (aro...

  19. Toward a generic model of trust for electronic commerce

    NARCIS (Netherlands)

    Tan, YH; Thoen, W

    2000-01-01

    The authors present a generic model of trust for electronic commerce consisting of two basic components, party trust and control trust, based on the concept that trust in a transaction with another party combines trust in the other parry and trust in the control mechanisms that ensure the successful

  20. Lessons Learned

    Science.gov (United States)

    Davis, Michaela

    2015-01-01

    The public health nurses’ scope of practice explicitly includes child protection within their role, which places them in a prime position to identify child protection concerns. This role compliments that of other professions and voluntary agenices who work with children. Public health nurses are in a privileged position as they form a relationship with the child’s parent(s)/guardian(s) and are able to see the child in its own environment, which many professionals cannot. Child protection in Ireland, while influenced by other countries, has progressed through a distinct pathway that streamlined protocols and procedures. However, despite the above serious failures have occurred in the Irish system, and inquiries over the past 20 years persistently present similar contributing factors, namely, the lack of standardized and comprehensive service responses. Moreover, poor practice is compounded by the lack of recognition of the various interactional processes taking place within and between the different agencies of child protection, leading to psychological barriers in communication. This article will explore the lessons learned for public health nurses practice in safeguarding children in the Republic of Ireland. PMID:27335944

  1. Lessons Learned

    Directory of Open Access Journals (Sweden)

    Amanda Phelan BNS, MSc, PhD

    2015-03-01

    Full Text Available The public health nurses’ scope of practice explicitly includes child protection within their role, which places them in a prime position to identify child protection concerns. This role compliments that of other professions and voluntary agenices who work with children. Public health nurses are in a privileged position as they form a relationship with the child’s parent(s/guardian(s and are able to see the child in its own environment, which many professionals cannot. Child protection in Ireland, while influenced by other countries, has progressed through a distinct pathway that streamlined protocols and procedures. However, despite the above serious failures have occurred in the Irish system, and inquiries over the past 20 years persistently present similar contributing factors, namely, the lack of standardized and comprehensive service responses. Moreover, poor practice is compounded by the lack of recognition of the various interactional processes taking place within and between the different agencies of child protection, leading to psychological barriers in communication. This article will explore the lessons learned for public health nurses practice in safeguarding children in the Republic of Ireland.

  2. Predators and the public trust.

    Science.gov (United States)

    Treves, Adrian; Chapron, Guillaume; López-Bao, Jose V; Shoemaker, Chase; Goeckner, Apollonia R; Bruskotter, Jeremy T

    2017-02-01

    Many democratic governments recognize a duty to conserve environmental resources, including wild animals, as a public trust for current and future citizens. These public trust principles have informed two centuries of U.S.A. Supreme Court decisions and environmental laws worldwide. Nevertheless numerous populations of large-bodied, mammalian carnivores (predators) were eradicated in the 20th century. Environmental movements and strict legal protections have fostered predator recoveries across the U.S.A. and Europe since the 1970s. Now subnational jurisdictions are regaining management authority from central governments for their predator subpopulations. Will the history of local eradication repeat or will these jurisdictions adopt public trust thinking and their obligation to broad public interests over narrower ones? We review the role of public trust principles in the restoration and preservation of controversial species. In so doing we argue for the essential roles of scientists from many disciplines concerned with biological diversity and its conservation. We look beyond species endangerment to future generations' interests in sustainability, particularly non-consumptive uses. Although our conclusions apply to all wild organisms, we focus on predators because of the particular challenges they pose for government trustees, trust managers, and society. Gray wolves Canis lupus L. deserve particular attention, because detailed information and abundant policy debates across regions have exposed four important challenges for preserving predators in the face of interest group hostility. One challenge is uncertainty and varied interpretations about public trustees' responsibilities for wildlife, which have created a mosaic of policies across jurisdictions. We explore how such mosaics have merits and drawbacks for biodiversity. The other three challenges to conserving wildlife as public trust assets are illuminated by the biology of predators and the interacting

  3. Multiple Trust Model in Online Transaction by Trusted Third Party

    OpenAIRE

    R. Suganya; C. Merlin Pauliester

    2016-01-01

    the information fortune and the connectivity are provided by the universe of E-commerce over an enormous distance at all time. In an open and distributed environment the buyers or providers will not act in a mutually understood or agreed manner by which the incomplete practices and fraudulent activities happen. So in any online transaction the security and trust are two important factors that are to be considered. In Ecommerce markets the above mentioned problems are criticized as the most im...

  4. Economic and Other Determinants of Political Trust

    Directory of Open Access Journals (Sweden)

    William R. DiPietro

    2016-01-01

    Full Text Available Political trust is important for the effective functioning of government. This paper uses cross country regression analysis to see whether three different measures of economic performance matter for political trust. The results lend support to the hypothesis that political trust is influenced by economic growth, the standard of living, and the appropriate use of government spending. In addition, the paper considers two institutional variables, perceived independence of the judiciary and the degree of democracy to assess their effect on political trust. It finds that perceived judicial independence has a positive effect on political trust, but democracy has a negative effect.

  5. Of Money And Trust In Biomedical Care

    OpenAIRE

    Joel Lexchin

    2007-01-01

    Over the past few years we have been repeatedly told that we now live in an evidence-based medical world. That should be good news since evidence comes from science. But on a deeper level doctors' and the public's faith in science rests on trust; trust that the right questions have been asked, trust that the clinical trials have been done correctly, trust that the results of the trials have been interpreted in the proper manner and trust that what finally appears in medical journals and clini...

  6. Going global: Trust research and international relations

    DEFF Research Database (Denmark)

    Ruzicka, Jan; Keating, Vincent Charles

    2015-01-01

    In this review article we explore the growing body of literature on the subject of trust in the field of international relations. We argue that the international level represents a unique challenge for trust research. This is so because some of the most pressing problems facing the world today...... require the development of trusting relationships internationally. In addition, the international environment is structurally different from domestic or personal relations on which much of the trust literature has focused so far. We identify three main strands of trust literature in international...

  7. Trust, Welfare States and Income Equality

    DEFF Research Database (Denmark)

    Bergh, Andreas; Bjørnskov, Christian

    2014-01-01

    The cross-country correlation between social trust and income equality is well documented, but few studies examine the direction of causality. We show theoretically that by facilitating cooperation, trust may lead to more equal outcomes, while the feedback from inequality to trust is ambiguous....... Using a structural equation model estimated on a large country sample, we find that trust has a positive effect on both market and net income equality. Larger welfare states lead to higher net equality but neither net income equality nor welfare state size seems to have a causal effect on trust. We...

  8. Corn replacement by broken rice in meat-type quail diets

    Directory of Open Access Journals (Sweden)

    TMB Filgueira

    2014-12-01

    Full Text Available An experiment was conducted to evaluate the effects of broken rice inclusion as substitute for corn in the diet on the performance, carcass yield, and economic viability of meat-type quails between 7 and 49 days of age. A number of 288 quails was distributed according to a completely randomized design into six treatments with six replicates of eight birds each. Treatments consisted of increasing levels of broken rice (0, 20, 40, 60, 80 and 100% in replacement of corn. Increasing levels of corn substitution by broken rice in the diet of 7- to 49-day-old meat-type quails did not affect feed intake, weight gain or feed conversion ratio (p>0.05. Relative to carcass traits, the inclusion of broken rice in the diets did not influence (p>0.05 dressing percentage or breast, leg (thigh+drumstick, liver, and gizzard yields. Moreover, feed cost per kilogram of live weight gain, cost index, and economic efficiency index were not influenced by the replacement of corn by broken rice in the diets. The performance, carcass traits and economic viability of broilers fed the different levels of broken rice inclusion were not different from the control group (p>0.05. These results indicate the economic viability of total replacement of corn by broken rice in the feeding of meat-type quails.

  9. Public knowledge and public trust.

    Science.gov (United States)

    Cunningham-Burley, Sarah

    2006-01-01

    As health care applications derived from human genetics research are likely to move increasingly from 'clinic to community', there is growing interest not just in how patients understand and take up health-related genetic information but also in the views of the wider population, as well as a range of professional groups. In this paper, issues relating public knowledge and public trust are raised and discussed in an attempt to move forward debates about public involvement in genomic research and the role of sociologists within interdisciplinary teams. As the field of public understanding of science has developed, we have seen a shift from a focus on the lack of scientific literacy as problem to a recognition of the range of different knowledges that people have and use as they confront science and technology in their everyday lives. As a mood for dialogue pervades many institutions in their relations with 'publics', attention must now be paid to the way in which knowledge and expertise is expressed, heard and acted upon in dialogic encounters. There is increasing concern about public trust in science and calls to increase public confidence, particularly through more open engagement with a range of publics. However, lack of trust or loss of confidence may be constructed as problems rather than reflecting empirical reality, where more complex relationships and attitudes prevail. Lack of trust is often privatized, deeply rooted in lived experience and routinely managed. Trust relations are generally characterized by ambivalence, uncertainty and risk, and are always provisional. Drawing on selected literature and empirical research to review and illustrate this field, this paper argues that scepticism or ambivalence on the part of publics are not necessarily problems to be overcome in the interest of scientific progress, but rather should be mobilized to enhance open and public debates about the nature and direction of genomics research, medicine, and the related

  10. Political Trust and Sophistication: Taking Measurement Seriously.

    Science.gov (United States)

    Turper, Sedef; Aarts, Kees

    2017-01-01

    Political trust is an important indicator of political legitimacy. Hence, seemingly decreasing levels of political trust in Western democracies have stimulated a growing body of research on the causes and consequences of political trust. However, the neglect of potential measurement problems of political trust raises doubts about the findings of earlier studies. The current study revisits the measurement of political trust and re-examines the relationship between political trust and sophistication in the Netherlands by utilizing European Social Survey (ESS) data across five time points and four-wave panel data from the Panel Component of ESS. Our findings illustrate that high and low political sophistication groups display different levels of political trust even when measurement characteristics of political trust are taken into consideration. However, the relationship between political sophistication and political trust is weaker than it is often suggested by earlier research. Our findings also provide partial support for the argument that the gap between sophistication groups is widening over time. Furthermore, we demonstrate that, although the between-method differences between the latent means and the composite score means of political trust for high- and low sophistication groups are relatively minor, it is important to analyze the measurement characteristics of the political trust construct.

  11. Antecedents of coworker trust: leaders' blessings.

    Science.gov (United States)

    Lau, Dora C; Liden, Robert C

    2008-09-01

    Although employee trust in leaders has garnered substantial empirical research, trust between coworkers has been virtually ignored. Extending the work of D. L. Ferrin, K. T. Dirks, and P. P. Shah (2006), the authors examined the role of group leaders, an influential third party in the workplace, on coworker trust formation. The correlates of the extent to which coworkers trust one another were examined in an investigation of 146 members of 32 work groups representing 4 diverse organizations. In this study, which utilized full network data, coworker trust was operationalized as in-degree centrality in the trust network. Controlling for relational demography and coworker helping behaviors, the authors found, as hypothesized, that coworkers tended to place more trust in fellow coworkers who were also trusted by the teams' formal leaders than in coworkers who were less trusted by leaders. In addition, consistent with the social information processing theory, support was found for the hypothesis that the relationship between leaders' trust and coworker trust is stronger when group performance is poor.

  12. Exploring trust relationships during times of change

    Directory of Open Access Journals (Sweden)

    Hartmut Von der Ohe

    2010-03-01

    Full Text Available Orientation: In the current economic climate and the resulting fast-changing global business and political environment, trust among different role players in organisations has become critical for survival.Research purpose: The objective of this study was to explore the impact of different variables such as demographics on trust relationships in South African organisations.Motivation for the study: Anecdotal evidence and preliminary data collected for a national trust indicator seemed to suggest a shift in trust levels in organisations.Research design: A trust questionnaire was administered to a convenience sample of 307 respondents in all economic sectors. Parametric and nonparametric analyses were used to determine significant differences among economic sectors, job levels and sample periods.Main findings: No significant differences were found for job levels or the different sample periods. However, significant differences were found for the economic sectors and, specifically, between government participants and other sectors for the dimensions of change, team management, organisational trust, information sharing and credibility.Practical implications: In times of change, leadership in organisations need to be aware of the impact on trust levels. It is therefore important that leaders in government focus more on trust-enhancing behaviours needed to repair mistrust in organisations.Contribution: Although the effect of time on trust levels is inconclusive, the clearly differing levels of trust in various economic sectors point to the importance of appropriate and fitting approaches to building trust and not a ‘one-size-fits-all’ attitude.

  13. Making sense of institutional trust in organizations

    DEFF Research Database (Denmark)

    Fuglsang, Lars; Jagd, Søren

    2015-01-01

    Institutional-based approaches to trust can explain how trust logics can exist in a societal context as compared to logics of distrust. Strong institutions in the form of regulative, normative and cognitive structures can enable and inspire trust-relations among people at the interpersonal......, 1997: 398). While Fligstein refers to actors who engage in ‘robust or local action’ we argue that actors who engage in (robust, local) sensemaking activities are better at (re)producing institutional-based trust. Particularly in situations when institutions are relatively unstable, unfamiliar...... to the actors and ambiguous, sensemaking strategies directed towards exploring the institutional foundations of trust at a local level can be an important basis of interpersonal trust-relations. First, based on a summary of studies of institutional-based trust we argue that an unresolved issue is how...

  14. The Relationship between Teamwork and Organizational Trust

    Directory of Open Access Journals (Sweden)

    Musab Isik

    2016-01-01

    Full Text Available The aim of this study is to investigate the relationship between teamwork and organizational trust. In the implementation section the data from the survey of 250 workers is employed in call centers in Erzurum by using relevant statistical  methods. Consequently, it is found that there is a positive and significant relationship between teamwork and organizational trust. Thus, the hypothesis of the study is supported as it was expected. Besides, it is found that there are positive and significant relationships between communication, openness to innovation, participation-trust in teamwork and organizational trust, trust in management, trust in co-workers, and trust in workplace.

  15. Trusting the other or taking a chance?

    DEFF Research Database (Denmark)

    Frederiksen, Morten; Heinskou, Marie Bruvik

    2016-01-01

    , respectively, reside. Secondly, the issue of temporality is traced in Luhmann’s work on trust and it is demonstrated how his dichotomous treatment of social time conflates markedly different temporal experiences. As a solution to this, the article presents the notion of a third temporal mode of the process......Theories of modernity and risk society argue that increasing levels of risk fundamentally alter or lower the level of trust in society. In this article we argue that this assumption is based in a fallacious theoretical link between trust and risk. Rather than calculative assessment of risk...... and specific events, trust directs anticipation towards process. First, we outline dominant approaches to trust as a question of actions and uncertainty of outcomes, arguing that these approaches treat trust and chance as interchangeable, conflating the different socio-temporalities within which risk and trust...

  16. Using informed consent to save trust.

    Science.gov (United States)

    Eyal, Nir

    2014-07-01

    Increasingly, bioethicists defend informed consent as a safeguard for trust in caretakers and medical institutions.This paper discusses an ‘ideal type’ of that move. What I call the trust-promotion argument for informed consent states:1. Social trust, especially trust in caretakers and medical institutions, is necessary so that, for example,people seek medical advice, comply with it, and participate in medical research.2. Therefore, it is usually wrong to jeopardise that trust.3. Coercion, deception, manipulation and other violations of standard informed consent requirements seriously jeopardise that trust.4. Thus, standard informed consent requirements are justified.This article describes the initial promise of this argument, then identifies challenges to it. As I show, the value of trust fails to account for some common sense intuitions about informed consent. We should revise the argument, common sense morality, or both.

  17. Why European Subordinates Trust their Managers

    Directory of Open Access Journals (Sweden)

    Andersen Jon Aarum

    2012-11-01

    Full Text Available This article addresses the problem of why subordinates trust their managers based on the responses from 108 subordinates of seven Slovenian managers and from 138 subordinates of eight Swedish managers. The subordinates of these managers responded to a 20-item instrument tested for reliability and validity. In both samples the managers enjoyed different degrees of trust. The level of trust vested in Slovenian managers was higher than in Swedish ones. The kinds of managers’ actions that enhanced trust were similar amongst Swedish and Slovenian subordinates. Different socio-cultural contexts may theoretically explain why some other kinds of actions had contrasting effects between the samples. On the whole, the actions of managers explain trust in both countries. Subordinates’ trust in managers declines with the increasing hierarchical distance in both national samples. Managers need to show in action that they trust their subordinates, promote their interests, demonstrate appreciation of their subordinates, and solve problems.

  18. For a civilisation of trust

    Directory of Open Access Journals (Sweden)

    Burhan Ghalioun

    2003-06-01

    Full Text Available For the author, the world in disarray is the origin of mistrust: disarray in the social, political and economic aspect. Nevertheless, he sees a possibility for restoring trust through becoming aware of the importance of the concept of immaterial capital and its decisiverole in the reproduction of the social and international system. A second element is the emergence, outside of the process of globalising integration, of a real, supportive world society. The failure of the system of international relations in the face of the challenges of globalisation, even if it means worsening the deficit of trust, gives rise to a hope of a better world and favours the development of a common, collective, transnational consciousnesswith supportive impulses and convergences of increasingly powerful interests.

  19. Trust and Traditions in Transitions

    DEFF Research Database (Denmark)

    McQuaid, Sara Dybris

    and the state and more recently, trust in the peace process. As the contest over meaning is always determined by the context of articulation, this paper examines the role of parades in the current ‘post-conflict’ phase of the peace process. Using theories of cultural and collective memory (Assman 2011, Olick......On New Year’s Eve 2013, months of talks on ‘Dealing with the past’, ‘Flags’ and ‘Parades’ ended without agreement on how to move towards a reconciliation of positions in Northern Ireland. The failure of the talks illustrates the importance of culture and (mis)trust in divided societies, where...... politics often pivot around whose culture shall be official and whose subordinated, whose history shall be remembered and whose forgotten (Jordan and Weedon 1995). These struggles are particularly intense in times of transition where traditions, power relations and frames of relevant remembrance...

  20. Mobile Lessons: Lessons Based on Geo-Referenced Information.

    Science.gov (United States)

    Giroux, Sylvain; Moulin, Claude; Sanna, Raffaella; Pintus, Antonio

    The term "mobile lessons" is coined for lessons held outside of "artificial" environments, such as classrooms. During these lessons, all actors are mobile and must move to do the required tasks. Themes tackled in such lessons may be as varied as geography, history, ecology, and linguistics. The use of mobile lessons is not a…

  1. BRI: Cyber Trust and Suspicion

    Science.gov (United States)

    2017-06-06

    psychiatric ratings, including the Snaith-Hamilton Anhedonia/Pleasure Scale (SHAPS), the Anhedonia rating scale, and the Hamilton Depression & Anxiety...Inventories (HAM-D; HAM-A; respectively) which are 21 item multi-choice questionnaires designed to assess the current level of depression and anxiety...429, 2006. [30] R. Riedl and A. Javor, “The biology of trust: integrating evidence from genetics , endocrinology, and functional brain imaging.,” J

  2. Building Trust Through Servant Leadership

    Science.gov (United States)

    2016-06-10

    Army Leadership (Washington, DC: Government Printing Office, August 2012), 1-5. The category of “Leads” includes five sub- skills : Leads others...opposition of formal military education, Puller’s ability to develop leadership skills in junior officers had pronounced effects. In a speech...BUILDING TRUST THROUGH SERVANT LEADERSHIP A thesis presented to the Faculty of the U.S. Army Command and General Staff

  3. Specifika Real Estate Investment Trust

    OpenAIRE

    Nenadál, Petr

    2012-01-01

    The thesis is aimed to describe and approach the REIT practice that is, especially in the U. S. very enhanced. In the first part, general parameters of real estate investment trusts are introduced and understated in connection with the depiction of the advantages and disadvantages of this issue. In chronological sequence, the development and progress of the U. S. real estate market is approached. The thesis further undertakes the current subject of the global financial crisis with a special f...

  4. Trust Assessment Using Cloud Broker

    OpenAIRE

    P.S.Pawar; Rajarajan, M.; Dimitrakos, T.; Zisman, A.

    2014-01-01

    Part 3: Short Papers; International audience; Despite the advantages and rapid growth of Cloud computing, the cloud environments are still not sufficiently trustworthy from a customer’s perspective. Several challenges such as specification of service level agreements, standards, security measures, selection of service providers and computation of trust still persists, that concerns the customer. To deal with these challenges and provide a trustworthy environment, a mediation layer may be esse...

  5. Money and trust among strangers.

    Science.gov (United States)

    Camera, Gabriele; Casari, Marco; Bigoni, Maria

    2013-09-10

    What makes money essential for the functioning of modern society? Through an experiment, we present evidence for the existence of a relevant behavioral dimension in addition to the standard theoretical arguments. Subjects faced repeated opportunities to help an anonymous counterpart who changed over time. Cooperation required trusting that help given to a stranger today would be returned by a stranger in the future. Cooperation levels declined when going from small to large groups of strangers, even if monitoring and payoffs from cooperation were invariant to group size. We then introduced intrinsically worthless tokens. Tokens endogenously became money: subjects took to reward help with a token and to demand a token in exchange for help. Subjects trusted that strangers would return help for a token. Cooperation levels remained stable as the groups grew larger. In all conditions, full cooperation was possible through a social norm of decentralized enforcement, without using tokens. This turned out to be especially demanding in large groups. Lack of trust among strangers thus made money behaviorally essential. To explain these results, we developed an evolutionary model. When behavior in society is heterogeneous, cooperation collapses without tokens. In contrast, the use of tokens makes cooperation evolutionarily stable.

  6. Social Collaborative Filtering by Trust.

    Science.gov (United States)

    Yang, Bo; Lei, Yu; Liu, Jiming; Li, Wenjie

    2017-08-01

    Recommender systems are used to accurately and actively provide users with potentially interesting information or services. Collaborative filtering is a widely adopted approach to recommendation, but sparse data and cold-start users are often barriers to providing high quality recommendations. To address such issues, we propose a novel method that works to improve the performance of collaborative filtering recommendations by integrating sparse rating data given by users and sparse social trust network among these same users. This is a model-based method that adopts matrix factorization technique that maps users into low-dimensional latent feature spaces in terms of their trust relationship, and aims to more accurately reflect the users reciprocal influence on the formation of their own opinions and to learn better preferential patterns of users for high-quality recommendations. We use four large-scale datasets to show that the proposed method performs much better, especially for cold start users, than state-of-the-art recommendation algorithms for social collaborative filtering based on trust.

  7. Exploring the Change from Low-Trust to High-Trust Organizations

    DEFF Research Database (Denmark)

    Jagd, Søren

    what the notion of high-trust organization actually means, and that the change process in the direction of high trust organizations involves not only a quantitative growth in trust, but may involve important qualitative changes in the organization, especially concerning the relations between management...... and employees. An especially important issue is the trust/self-control nexus. Following this analysis it may be argued that the distinction low versus high-trust is much more complex and involves radical changes in organizational culture and identity than assumed by most management literature on trust a new......A growing body of literature point to the increasing importance of trust for organizations and for the explicit use of trust as a management tool. The explicit or implicit message in both management literature and research literature on trust as a management tool is that managers should pursue...

  8. Renormalizations in softly broken N = 1 theories: Slavnov-Taylor identities

    Science.gov (United States)

    Kondrashuk, Igor

    2000-09-01

    Slavnov-Taylor identities have been applied to perform explicitly the renormalization procedure for the softly broken N = 1 SYM. The result is in accordance with the previous results obtained at the level of the supergraph technique.

  9. Renormalizations in softly broken N=1 theories: Slavnov-Taylor identities

    OpenAIRE

    Kondrashuk, Igor

    2000-01-01

    Slavnov-Taylor identities have been applied to perform explicitly the renormalization procedure for the softly broken N=1 SYM. The result is in accordance with the previous results obtained at the level of supergraph technique.

  10. Renormalizations in softly broken N=1 theories: Slavnov-Taylor identities

    Energy Technology Data Exchange (ETDEWEB)

    Kondrashuk, Igor [SISSA-ISAS and INFN, Sezione di Trieste, Trieste (Italy)]. E-mail: ikond@sissa.it

    2000-09-15

    Slavnov-Taylor identities have been applied to perform explicitly the renormalization procedure for the softly broken N=1 SYM. The result is in accordance with the previous results obtained at the level of the supergraph technique. (author)

  11. Strategies for building trust with farmers: the case of Bt maize in South Africa

    Directory of Open Access Journals (Sweden)

    Ezezika Obidimma C

    2012-11-01

    Full Text Available Abstract Background In 1999, South Africa became the first African country to approve commercial production of subsistence genetically modified (GM maize. The introduction of GM crop technology is often met with skepticism by stakeholders including farmers. The involvement of the private sector in this process can further breed mistrust or misperceptions. To examine these issues more closely, the objective of this case study was to understand the role of trust in the public-private partnership (PPP arrangement involved in the development of Bacillus thuringiensis (Bt maize in South Africa. Methods We conducted semi-structured, face-to-face interviews to obtain stakeholders’ understanding of trust in general as well as in the context of agricultural biotechnology (agbiotech PPPs. A thematic analysis of the interview transcripts, documents, reports and research articles was conducted to generate insights into the challenges to, and practices for, building trust among the partners and with the public. Results The findings of this study are organized into four main lessons on trust building. First, as the end users of GM technology, farmers must be engaged from the start of the project through field demonstrations and educational activities. Second, an effective technology (i.e., the seed is key to the success of an agbiotech PPP. Third, open communication and full disclosure between private sector companies and government regulatory bodies will build trust and facilitate the regulatory processes. Fourth, enforcing good agronomic practices, including appropriate management of the refuge areas, will serve the interests of both the farmers and the seed companies. Conclusions Trust has proven to be a critical factor determining the success of the Bt maize project in South Africa. Distrust of the private sector and of GM technology were cited as major barriers to building trust. The trust-building practices described in this case study have often

  12. Proposed fault diagnostics of a broken rotor bar induction motor fed from PWM inverter

    Directory of Open Access Journals (Sweden)

    Faeka M.H. Khater

    2016-12-01

    Full Text Available This paper presents a fault diagnostics technique for a three-phase squirrel cage induction motor. The method is developed using a simplified model affected by bar resistance variation. Based on 3-phase time domain model, the rotor broken bar with different conditions has been simulated to investigate the resulting torque speed characteristic in each condition. The developed fault diagnostics system is capable of identifying the type of the broken-bar faults in the squirrel cage induction machines.

  13. On the covariant description of spontaneously broken symmetry in general field theory

    CERN Document Server

    Joos, H

    1976-01-01

    Reducible fields A(x) with degenerate vacuum which allow the unitary- symmetry transformation U/sup -1/(c)A(x)U(c)=A(x)+c are analysed. The mathematical properties of the 'charge integral' related to the conserved current of this spontaneously broken symmetry are described. The structure of the S-matrix theory is discussed in such a generalized field theory as a guide-line for the treatment of more complex examples of spontaneously broken symmetries. (42 refs).

  14. Lessons Learned in Engineering

    Science.gov (United States)

    Blair, J. C.; Ryan, R. S.; Schutzenhofer, L. A.

    2011-01-01

    This Contractor Report (CR) is a compilation of Lessons Learned in approximately 55 years of engineering experience by each James C. Blair, Robert S. Ryan, and Luke A. Schutzenhofer. The lessons are the basis of a course on Lessons Learned that has been taught at Marshall Space Flight Center. The lessons are drawn from NASA space projects and are characterized in terms of generic lessons learned from the project experience, which are further distilled into overarching principles that can be applied to future projects. Included are discussions of the overarching principles followed by a listing of the lessons associated with that principle. The lesson with sub-lessons are stated along with a listing of the project problems the lesson is drawn from, then each problem is illustrated and discussed, with conclusions drawn in terms of Lessons Learned. The purpose of this CR is to provide principles learned from past aerospace experience to help achieve greater success in future programs, and identify application of these principles to space systems design. The problems experienced provide insight into the engineering process and are examples of the subtleties one experiences performing engineering design, manufacturing, and operations.

  15. Distinction of broken cellular wall Ganoderma lucidum spores and G. lucidum spores using FTIR microspectroscopy

    Science.gov (United States)

    Chen, Xianliang; Liu, Xingcun; Sheng, Daping; Huang, Dake; Li, Weizu; Wang, Xin

    2012-11-01

    In this paper, FTIR microspectroscopy was used to identify broken cellular wall Ganoderma lucidum spores and G. lucidum spores. For IR spectra, broken cellular wall G. lucidum spores and G. lucidum spores were mainly different in the regions of 3000-2800, 1660-1600, 1400-1200 and 1100-1000 cm-1. For curve fitting, the results showed the differences in the protein secondary structures and the polysaccharide structures/content between broken cellular wall G. lucidum spores and G. lucidum spores. Moreover, the value of A1078/A1741 might be a potentially useful factor to distinguish broken cellular wall G. lucidum spores from G. lucidum spores. Additionally, FTIR microspectroscopy could identify broken cellular wall G. lucidum spores and G. lucidum spores accurately when it was combined with hierarchical cluster analysis. The result suggests FTIR microspectroscopy is very simple and efficient for distinction of broken cellular wall G. lucidum spores and G. lucidum spores. The result also indicates FTIR microspectroscopy may be useful for TCM identification.

  16. Trust me, I'm a researcher!: The role of trust in biomedical research.

    Science.gov (United States)

    Kerasidou, Angeliki

    2017-03-01

    In biomedical research lack of trust is seen as a great threat that can severely jeopardise the whole biomedical research enterprise. Practices, such as informed consent, and also the administrative and regulatory oversight of research in the form of research ethics committees and Institutional Review Boards, are established to ensure the protection of future research subjects and, at the same time, restore public trust in biomedical research. Empirical research also testifies to the role of trust as one of the decisive factors in research participation and lack of trust as a barrier for consenting to research. However, what is often missing is a clear definition of trust. This paper seeks to address this gap. It starts with a conceptual analysis of the term trust. It compares trust with two other related terms, those of reliance and trustworthiness, and offers a defence of Baier's attribute of 'good will' a basic characteristic of trust. It, then, proceeds to consider trust in the context of biomedical research by examining two questions: First, is trust necessary in biomedical research?; and second, do increases in regulatory oversight of biomedical research also increase trust in the field? This paper argues that regulatory oversight is important for increasing reliance in biomedical research, but it does not improve trust, which remains important for biomedical research. It finishes by pointing at professional integrity as a way of promoting trust and trustworthiness in this field.

  17. From the general to the specific: How social trust motivates relational trust.

    Science.gov (United States)

    Robbins, Blaine G

    2016-01-01

    When people form beliefs about the trustworthiness of others with respect to particular matters (i.e., when individuals trust), theory suggests that they rely on preexistent cognitive schemas regarding the general cooperativeness of individuals and organizations (i.e., social trust). In spite of prior work, the impact of social trust on relational trust-or what Russell Hardin (2002) calls trust as a three-part relation where actor A trusts actor B with reference to matter Y-is not well established. Four vignette experiments were administered to Amazon.com Mechanical Turk workers (N = 1388 and N = 1419) and to public university undergraduate students (N = 995 and N = 956) in order to investigate the relationship between social trust and relational trust. Measures of general social trust and particular social trust produced statistically equivalent effects that were positively associated with relational trust. Political trust, however, was statistically unrelated to relational trust. These results support the idea that people rely on schemas and stereotypes concerned with the general cooperativeness and helpfulness of others when forming beliefs about another person's trustworthiness with respect to a particular matter at hand. Copyright © 2015 Elsevier Inc. All rights reserved.

  18. Consumer trust in the Australian food system - The everyday erosive impact of food labelling.

    Science.gov (United States)

    Tonkin, Emma; Webb, Trevor; Coveney, John; Meyer, Samantha B; Wilson, Annabelle M

    2016-08-01

    Consumer trust in food system actors is foundational for ensuring consumer confidence in food safety. As food labelling is a direct communication between consumers and food system actors, it may influence consumer perceptions of actor trustworthiness. This study explores the judgements formed about the trustworthiness of the food system and its actors through labelling, and the expectations these judgements are based on. In-depth, semi-structured interviews with 24 Australian consumers were conducted. Theoretical sampling focussed on shopping location, dietary requirements, rurality, gender, age and educational background. The methodological approach used (adaptive theory) enabled emerging data to be examined through the lens of a set of guiding theoretical concepts, and theory reconsidered in light of emerging data. Food labelling acted as a surrogate for personal interaction with industry and government for participants. Judgements about the trustworthiness of these actors and the broader food system were formed through interaction with food labelling and were based on expectations of both competence and goodwill. Interaction with labelling primarily reduced trust in actors within the food system, undermining trust in the system as a whole. Labelling has a role as an access point to the food system. Access points are points of vulnerability for systems, where trust can be developed, reinforced or broken down. For the participants in this study, in general labelling demonstrates food system actors lack goodwill and violate their fiduciary responsibility. This paper provides crucial insights for industry and policy actors to use this access point to build, rather than undermine, trust in food systems. Copyright © 2016 Elsevier Ltd. All rights reserved.

  19. Trust in a Time of Increasing Diversity

    DEFF Research Database (Denmark)

    Dinesen, Peter Thisted; Sønderskov, Kim Mannemar

    2012-01-01

    in the period from 1979 to 2009 coupled with diversity at the municipality level. Individual-level measures of trust over time enable us to estimate the impact on social trust of changes in ethnic diversity within municipalities and, we argue, thereby obtain a more precise estimate of the effect of ethnic......In this study, we examine the impact of ethnic diversity in Danish municipalities on citizens’ social trust over the last three decades. During this period, Danish society has grown increasingly ethnically diverse, and this begs the question whether this has influenced trust in others negatively....... Existing evidence from the Anglo-Saxon countries would suggest that this is the case, whereas evidence from the European continent mainly suggests that no link exists between ethnic diversity and social trust. The empirical analysis uses individual-level data on social trust from several surveys in Denmark...

  20. The multileveled division of trust labour

    DEFF Research Database (Denmark)

    Frederiksen, Morten

    The trust concept is inherently linked to institutional issues. Trust, according to contemporary research, may be directed at both people and institutions and the influence of institutions may affect both trust in other people and trust in other institutions. This conceptual stretching takes place...... at the expense of accuracy and may block our understanding of the intricacies of the multiple levels involved in trusting. This paper suggests a conceptual clarification of this issue by employing a phenomenological approach to the perspective of the trustor, differentiating the types of uncertainty involved...... at the intersubjective and institutional levels. I argue that confidence in institutions define the playing field of uncertainty in intersubjective relations, thus underpinning both the possibility and scope of intersubjective trust. However, once confidence in the institutional setting is brought into question...

  1. The Volatile Nature of Social Trust

    DEFF Research Database (Denmark)

    Kjærsgård, Andreas Pihl; Anhøj, Anne Iversen

    undertakes. The article conducts a comparative study of the development of social trust in Croatia and Slovenia. In spite these countries’ common Yugoslavian heritage they show a remarkably diversified development in social trust over a rather short timespan (1996-2007). The two cases thus provide good cases......The countries in Central and Eastern Europe (CEE) have to varying degrees been struggling in their transition to market economies and democracy. Social trust is often argued to be a crucial lubricant in solving collective action problems and thus building and maintaining well......-functioning institutions. Therefore building and maintaining social trust seems crucial for the countries in CEE struggling with transition. Existing research on social trust is mainly conducted in a western context, and there is a clear need for research to focus on social trust in CEE - an endeavour which this article...

  2. The Value of Trust to Nursing.

    Science.gov (United States)

    Rutherford, Marcella M

    2014-01-01

    Trust, one of nursing's intangible assets, impacts nurses' ability to form meaningful relationships with patients and this connection positively impacts health outcomes. Linking trust to the fabric of nursing and investing in its measurement will become essential to nursing's valuation and the resulting investment in nursing. Trust, as nursing's core value, should be fostered by nurse educators as they prepare the next generation of nurses. Nurse administrators should connect the trust a patient has for his or her nurse and patient cooperation and honest transparent communication between providers and the patient. Banking trust as a valuable nursing asset will substantiate nursing's marketing and support its worth. Nursing's trustworthiness is an intangible asset that warrants protection, as trust once lost is hard to recapture.

  3. Trust Dynamics in a Large System Implementation

    DEFF Research Database (Denmark)

    Schlichter, Bjarne Rerup; Rose, Jeremy

    2013-01-01

    A large information systems implementation (such as ERP systems) relies on the trust of its stakeholders to suc-ceed. Such projects impact diverse groups of stakeholders, each with their legitimate interests and expectations. Levels of stakeholder trust can be expected to vary in large scale...... Integrated Hospi-tal System implementation for the Faroe Islands. Trust relationships suffered a serious breakdown, but the project was able to recover and meet its goals. We develop six theoretical propositions theorising the relationship between trust and project outcomes, the maintenance, breakdown...... implementations (which can take several years), and cannot be taken for granted. Previous studies have largely focused on the taxonomic deconstruction of the trust construct, through point-in-time variance studies. They have identified the relationship between trust and project outcomes, but largely ignored...

  4. Explaining the emergence of social trust

    DEFF Research Database (Denmark)

    Svendsen, Gunnar Lind Haase; Tinggaard Svendsen, Gert; Graeff, Peter

    2012-01-01

    How does social trust emerge in a country? By comparing the cases of Denmark and Germany through six historical phases, we suggest that a plausible explanation is long run political stability. In Denmark, social trust was arguably allowed to accumulate slowly over time and was probably not destro......How does social trust emerge in a country? By comparing the cases of Denmark and Germany through six historical phases, we suggest that a plausible explanation is long run political stability. In Denmark, social trust was arguably allowed to accumulate slowly over time and was probably...... not destroyed up till the universal welfare state of the 20th century. In Germany, however, political instability since the first German state building hampered the emergence and maintenance of social trust, which is why social trust was never allowed to grow in this country....

  5. Increasing interpersonal trust through divergent thinking

    Directory of Open Access Journals (Sweden)

    Roberta eSellaro

    2014-06-01

    Full Text Available Interpersonal trust is an essential ingredient of many social relationships but how stable is it actually, and how is it controlled? There is evidence that the degree of trust into others might be rather volatile and can be affected by manipulations like drawing attention to personal interdependence or independence. Here we investigated whether the degree of interpersonal trust can be biased by inducing either a more integrative or a more cognitive-control mode by means of a creativity task requiring divergent or convergent thinking, respectively. Participants then performed the Trust Game, which provides an index of interpersonal trust by assessing the money units one participant (the trustor transfers to another participant (the trustee. As expected, participants transferred significantly more money to the trustee after engaging in divergent thinking as compared to convergent thinking. This observation provides support for the idea that interpersonal trust is controlled by domain-general (i.e., not socially dedicated cognitive states.

  6. NASA Engineering Network Lessons Learned

    Data.gov (United States)

    National Aeronautics and Space Administration — The NASA Lessons Learned system provides access to official, reviewed lessons learned from NASA programs and projects. These lessons have been made available to the...

  7. TRANSFORMATIONAL LEADERSHIP AND TRUST: A CASE STUDY

    OpenAIRE

    Adriana Zaharia; Carmen-Aida Huţu

    2016-01-01

    According to previous research, an employee’s trust in his/her leader has been linked to: increased individual efficiency and commitment; increased organizational performance; effective team and organizational functioning where the tasks are complex and unstructured. Considering these findings concerning the positive influence of trust on various aspects of organizational performance, we used relevant theories in literature relating to trust in organizational settings and transformational lea...

  8. The impact of voice on trust attributions

    OpenAIRE

    Torre, Ilaria

    2017-01-01

    Trust and speech are both essential aspects of human interaction. On the one hand, trust is necessary for vocal communication to be meaningful. On the other hand, humans have developed a way to infer someone’s trustworthiness from their voice, as well as to signal their own. Yet, research on trustworthiness attributions to speakers is scarce and contradictory, and very often uses explicit data, which do not predict actual trusting behaviour. However, measuring behaviour is very...

  9. Increasing interpersonal trust through divergent thinking

    OpenAIRE

    Sellaro, Roberta; Hommel, Bernhard; De Kwaadsteniet, Erik W.; van de Groep, Suzanne; Colzato, Lorenza S.

    2014-01-01

    Interpersonal trust is an essential ingredient of many social relationships but how stable is it actually, and how is it controlled? There is evidence that the degree of trust into others might be rather volatile and can be affected by manipulations like drawing attention to personal interdependence or independence. Here we investigated whether the degree of interpersonal trust can be biased by inducing either a more integrative or a more focused/exclusive cognitive control mode by means of a...

  10. Representative trust in cognitive social simulations

    OpenAIRE

    Pollock, Shawnoah

    2011-01-01

    Approved for public release; distribution is unlimited. Trust plays a critical role in communications, strength of relationships, and information processing at the individual and group levels. Cognitive social simulations show promise in providing an experimental platform for the examination of social phenomena such as trust formation. This work is a novel attempt at trust representation in a cognitive social simulation using reinforcement learning algorithms. Initial algorithm development...

  11. Repertoires of trust : The practice of trust in a multinational organization amid political conflict

    NARCIS (Netherlands)

    Mizrachi, Nissim; Drori, Israel; Anspach, Renee R.

    Sociologists and other social scientists have recently renewed their interest in the concept of trust. Multidisciplinary studies have identified social psychological, economic, and structural determinants of trust; traced its development in interpersonal relationships; and explored its

  12. Trust reality-mining: evidencing the role of friendship for trust diffusion

    National Research Council Canada - National Science Library

    Farrahi, Katayoun; Zia, Kashif

    2017-01-01

    ... and computational models of those values. This paper, educated by trust theories and models from cognitive science, social sciences and artificial intelligence, proposes a novel stochastic computational model of trust, encapsulating...

  13. The Dyadic Trust Scale: Toward Understanding Interpersonal Trust in Close Relationships.

    Science.gov (United States)

    Larzelere, Robert E.; Huston, Ted L.

    1980-01-01

    Dyadic trust proved to be associated with love and with intimacy of self-disclosure, especially for longer married partners. It varied by level of commitment. Partners reciprocated trust more than either love or depth of self-disclosure. (Author)

  14. Can I Trust Your Findings?

    DEFF Research Database (Denmark)

    Cuervo-Cazurra, Alvaro; Andersson, Ulf; Yoko Brannen, Mary

    2016-01-01

    this complexity and ensure that readers can trust their findings. We provide suggestions for how to rule out alternative explanations, explaining key considerations not only in empirical analyses, but also in theory building and in research design. Our discussion covers both qualitative and quantitative studies......, because we believe that it is imperative to understand how trustworthiness is established in both traditions, even for international business researchers who self-identify with only one. This enables scholars to have a broader scope of knowledge when interpreting past research in the field and to be more...

  15. How Does Social Trust Affect Economic Growth?

    DEFF Research Database (Denmark)

    Bjørnskov, Christian

    Social capital in the form of generalized trust has been shown to be a determinant of economic growth in a number of studies. Other studies have explored other consequences of trust, such as its effects on governance, corruption, education and investment. This paper connects the two strands...... of literature by estimating the effects of trust on growth through a set of potential transmission mechanisms directly. It does so by modelling the process using a three-stage least squares estimator on a sample of countries for which a full data set is available. The results indicate that trust affects...

  16. Does Religiosity Promote or Discourage Social Trust?

    DEFF Research Database (Denmark)

    Berggren, Niclas; Bjørnskov, Christian

    -being. The effect of religiosity is theoretically unclear: while all major religions call for behaving well to others, religious groups may primarily trust people in their own groups and distrust others, as well as cause division in the broader population. We make use of new data from the Gallup World Poll for 105......We look at the effect of religiosity on social trust, defined as the share of a population that thinks that people in general can be trusted. This is important since social trust is related to many desired outcomes, such as growth, education, democratic stability and subjective well...

  17. Explaining the emergence of social trust

    DEFF Research Database (Denmark)

    Svendsen, Gunnar Lind Haase; Svendsen, Gert Tinggaard; Graeff, Peter

    2012-01-01

    How does social trust emerge in a country? By comparing the cases of Denmark and Germany through six historical phases, we suggest that a plausible explanation is long run political stability. In Denmark, social trust was arguably allowed to accumulate slowly over time and was probably...... not destroyed up till the universal welfare state of the 20th century. In Germany, however, political instability since the first German state building hampered the emergence and maintenance of social trust, which is why social trust was never allowed to grow in this country....

  18. Trust in automation: integrating empirical evidence on factors that influence trust.

    Science.gov (United States)

    Hoff, Kevin Anthony; Bashir, Masooda

    2015-05-01

    We systematically review recent empirical research on factors that influence trust in automation to present a three-layered trust model that synthesizes existing knowledge. Much of the existing research on factors that guide human-automation interaction is centered around trust, a variable that often determines the willingness of human operators to rely on automation. Studies have utilized a variety of different automated systems in diverse experimental paradigms to identify factors that impact operators' trust. We performed a systematic review of empirical research on trust in automation from January 2002 to June 2013. Papers were deemed eligible only if they reported the results of a human-subjects experiment in which humans interacted with an automated system in order to achieve a goal. Additionally, a relationship between trust (or a trust-related behavior) and another variable had to be measured. All together, 101 total papers, containing 127 eligible studies, were included in the review. Our analysis revealed three layers of variability in human-automation trust (dispositional trust, situational trust, and learned trust), which we organize into a model. We propose design recommendations for creating trustworthy automation and identify environmental conditions that can affect the strength of the relationship between trust and reliance. Future research directions are also discussed for each layer of trust. Our three-layered trust model provides a new lens for conceptualizing the variability of trust in automation. Its structure can be applied to help guide future research and develop training interventions and design procedures that encourage appropriate trust. © 2014, Human Factors and Ergonomics Society.

  19. Trust in Libraries and Trust in Most People: Social Capital Creation in the Public Library

    OpenAIRE

    Vårheim, Andreas

    2014-01-01

    Studies of the creation of social trust and social capital indicate that informal social contact has a positive effect. Some studies find that uncorrupt public institutions have positive effects on trust and social capital. Additionally, a number of papers show that public libraries have a similar effect. The mechanisms that generate trust, however, remain largely unspecified. Therefore, research describing micro-level processes is needed to uncover the mechanisms creating trust. ...

  20. Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker

    OpenAIRE

    Wazan, Ahmad Samer; LABORDE, Romain; Chadwick, David W.; Barrere, Francois; Benzekri, Abdelmalek; Habbal, Abid M.M.; Kaiiali, Mustafa

    2017-01-01

    A Public Key Infrastructure (PKI) is considered one of the most important techniques used to propagate trust in authentication over the Internet. This technology is based on a trust model defined by the original X.509 (1988) standard and is composed of three entities: the Certification Authority (CA), the certificate holder (or subject) and the Relying Party (RP). The CA plays the role of a trusted third party between the certificate holder and the RP. In many use cases, this trust model has ...

  1. Enhanced multi-attribute trust protocol for malicious node detection ...

    Indian Academy of Sciences (India)

    This paper proposes a trust-based intrusion detection that uses multi-attribute trust metrics to improve detection accuracy. It uses an enhanced distributive trust calculation algorithm that involves monitoring neighbouring nodes and trust calculation using the trust metrics message success rate (MSR), elapsed time at node ...

  2. Is It a Trust Issue? Factors That Influence Trust for Persons Living With HIV/AIDS.

    Science.gov (United States)

    Krause, Denise D; May, Warren L

    2016-09-01

    Trust in one's health care provider, trust in the health care system in general, and even trust in one's community affects engagement in HIV-related health care. This article examines the issue of trust among a random sample of HIV-infected individuals residing in Mississippi, an area hard-hit by the HIV/AIDS epidemic. Five constructs based on survey responses from these individuals were developed: (1) trust in one's provider to offer the best possible medical care, (2) trust in one's provider to protect patient privacy, (3) willingness to disclose HIV status to one's provider, (4) trust in the health care system, and (5) trust in one's community. Findings suggest that interventions to improve trust in providers to deliver the highest quality of care should be targeted to young people, African Americans, and the more highly educated. Interventions to increase trust in providers to protect privacy should focus on creating and strengthening social support groups or networks that build relationships and foster trust. Interventions aimed to increase community trust also should be targeted to young people. This information is useful to researchers, policy makers, health care providers, and organizations interested in prioritizing interventions and strategies that have the greatest potential to reduce health disparities in HIV diagnosis and treatment in the Deep South. © 2016 Society for Public Health Education.

  3. A healthy dose of trust: the relationship between interpersonal trust and health

    NARCIS (Netherlands)

    Schneider, I.K.; Konijn, E.A.; Righetti, F.; Rusbult, C.E.

    2011-01-01

    The positive effects of trust are manifold. Recent research has shown that trust levels may even influence physical health. The current work explores this issue and aims to shed light on the mechanisms underlying the relationship between trust and health in a 5-wave longitudinal data set. Results

  4. Does conflict shatter trust or does trust obliterate conflict? Revisiting the relationships between team diversity, conflict, and trust

    NARCIS (Netherlands)

    Curseu, P.; Schruijer, S.G.L.

    2010-01-01

    This article explores the interplay between trust and conflict as antecedents of team effectiveness. In the first cross-sectional study, two alternative path models are tested in a sample of 174 teams (897 participants) with the emergent states of task conflict, relationship conflict, and trust

  5. Price transparency: building community trust.

    Science.gov (United States)

    Clarke, Richard L

    2007-01-01

    With the push from policymakers, payers, and consumers for hospitals to make their prices public, healthcare executives need to recognize two central issues related to price transparency: 1) meaningful price transparency involves helping patients and consumers understand their financial obligation for an episode of care, and 2) price transparency is key to the most critical success strategy for healthcare providers: building trust. This article reviews the history of pricing and billing practices and explores why price transparency is not easily achieved in today's environment. Pricing is a mystery even to those of us who work in the field, yet despite its complexity, the call for price transparency is not going to go away. For transparency, the goal should be to establish a rational pricing system that is easily explainable and justified to all stakeholders. Healthcare executives must make pricing a priority, understand cost, develop a pricing philosophy, understand the overall revenue requirements, examine market conditions and prices, and set up systems for review. A rational process of price setting should enhance community trust. In this matter there is nothing less at stake than the hearts of our community members.

  6. Trusted computing for embedded systems

    CERN Document Server

    Soudris, Dimitrios; Anagnostopoulos, Iraklis

    2015-01-01

    This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. Case studies are used to present new techniques designed as industrial security solutions. Coverage includes development of tamper resistant hardware and firmware mechanisms for lightweight embedded devices, as well as those serving as security anchors for embedded platforms required by applications such as smart power grids, smart networked and home appliances, environmental and infrastructure sensor networks, etc. ·         Enables readers to address a variety of security threats to embedded hardware and software; ·         Describes design of secure wireless sensor networks, to address secure authen...

  7. Trust in African Americans' Healthcare Experiences.

    Science.gov (United States)

    Murray, Traci M

    2015-01-01

    The purpose of the study is to clarify the concept of trust, identify its defining attributes, antecedents, and consequences, and apply to the healthcare experiences of African Americans. For African Americans, mistrust in the healthcare system is the result of unequal treatment that began in slavery. Fear and negative experiences engender a reluctance to trust healthcare providers, which contributes to health disparities. Walker and Avant's method of concept analysis was used to clarify the concept of trust. The concept was applied to African Americans' healthcare experiences with discussion of opportunities for trust building. Data support for concept development was done using Cumulative Index to Nursing and Allied Health Literature (CINAHL), Medline, and online reference sources. Literature review was guided by using the keyword trust. Further contextual explication was done by adding a review of literature from sociology and history regarding the evolution of African American mistrust of the U.S. healthcare system. The defining attributes of trust are dependence, willingness, and met expectations. Antecedents to trust include a need requiring the help of another and prior knowledge or experience. The consequence of trust is an evaluation of the congruence between expected and actual behaviors of the trusted person or thing. Literature review of the African American culture adds a dynamic aspect for nurses to consider when developing relationships in minority communities. Trust is the willingness to enter a dependent relationship to have the needs addressed, and is maintained by met expectations. Rebuilding trusting relationships between providers and African American patients is a vital step toward reducing health disparities. Murray. © 2015 Wiley Periodicals, Inc.

  8. An Efficient Dynamic Trust Evaluation Model for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Zhengwang Ye

    2017-01-01

    Full Text Available Trust evaluation is an effective method to detect malicious nodes and ensure security in wireless sensor networks (WSNs. In this paper, an efficient dynamic trust evaluation model (DTEM for WSNs is proposed, which implements accurate, efficient, and dynamic trust evaluation by dynamically adjusting the weights of direct trust and indirect trust and the parameters of the update mechanism. To achieve accurate trust evaluation, the direct trust is calculated considering multitrust including communication trust, data trust, and energy trust with the punishment factor and regulating function. The indirect trust is evaluated conditionally by the trusted recommendations from a third party. Moreover, the integrated trust is measured by assigning dynamic weights for direct trust and indirect trust and combining them. Finally, we propose an update mechanism by a sliding window based on induced ordered weighted averaging operator to enhance flexibility. We can dynamically adapt the parameters and the interactive history windows number according to the actual needs of the network to realize dynamic update of direct trust value. Simulation results indicate that the proposed dynamic trust model is an efficient dynamic and attack-resistant trust evaluation model. Compared with existing approaches, the proposed dynamic trust model performs better in defending multiple malicious attacks.

  9. SERVANT LEADERSHIP AND ORGANIZATIONAL TRUST: THE MEDIATING EFFECT OF THE LEADER TRUST AND ORGANIZATIONAL COMMUNICATION

    Directory of Open Access Journals (Sweden)

    Morad Rezaei

    2012-01-01

    Full Text Available The purpose of this paper aims to clarify the relationship between servant leadership and organizational trust, and tries to demonstrate the mediator role of leader trust and organizational communication in this relationship. The study sample included 258 employees of Guilan province Tax Administration and for sampling we used cluster method. Previous studies have also focused on the positive impact of servant leadership in organizational trust and in this article the results show that there is a significant relationship between servant leadership, organizational trust, leader trust and organizational communication.

  10. Building trusted national identity management systems: Presenting the privacy concern-trust (PCT) model

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    This paper discusses the effect of trust and information privacy concerns on citizens’ attitude towards national identity management systems. We introduce the privacyconcerns- trust model, which shows the role of trust in mediating and moderating citizens’ attitude towards identity management...... systems. We adopted a qualitative research approach in our analysis of data that was gathered through a series of interviews and a stakeholder workshop in Ghana. Our findings indicate that, beyond the threshold level of trust, societal information privacy concern is low; hence, trust is high, thereby...... encouraging further institutional collaboration and acceptance of citizens’ informational self-determination....

  11. Does Ideological Education in China Suppress Trust in Religion and Foster Trust in Government?

    Directory of Open Access Journals (Sweden)

    Ying Xie

    2017-05-01

    Full Text Available A major goal of ideological education in China is to promote loyalty to the party-state and to instill atheism among the people. How effective is this ideological education? This article examines the relationship between education and trust in government and trust in religion using data from the 2010 Chinese General Social Survey. We find that education is negatively associated with trust in government, while positively related to trust in religion. Our findings suggest that policies aimed at displacing religion in favor of the Communist ideology have largely failed to shape the public mindset; rather, the more educated, the more people tend to trust religion instead of the government.

  12. Broken Time Translation Symmetry as a Model for Quantum State Reduction

    Directory of Open Access Journals (Sweden)

    Jasper van Wezel

    2010-04-01

    Full Text Available The symmetries that govern the laws of nature can be spontaneously broken, enabling the occurrence of ordered states. Crystals arise from the breaking of translation symmetry, magnets from broken spin rotation symmetry and massive particles break a phase rotation symmetry. Time translation symmetry can be spontaneously broken in exactly the same way. The order associated with this form of spontaneous symmetry breaking is characterised by the emergence of quantum state reduction: systems which spontaneously break time translation symmetry act as ideal measurement machines. In this review the breaking of time translation symmetry is first compared to that of other symmetries such as spatial translations and rotations. It is then discussed how broken time translation symmetry gives rise to the process of quantum state reduction and how it generates a pointer basis, Born’s rule, etc. After a comparison between this model and alternative approaches to the problem of quantum state reduction, the experimental implications and possible tests of broken time translation symmetry in realistic experimental settings are discussed.

  13. The Importance of Trust in Electronic Commerce.

    Science.gov (United States)

    Ratnasingham, Pauline

    1998-01-01

    Introduces the new concept of trust and how it influences the process of managing the security of an organization operating in an electronic commerce environment. Theoretically, the study aims to develop a framework of trust and security to provide a set of guidelines for secure electronic commerce. (Author/LRW)

  14. Expectations as a key element in trusting

    DEFF Research Database (Denmark)

    Rasmussen, Mette Apollo; Hansen, Uffe Kjærgaard; Conradsen, Maria Bosse

    Considering the need for a tangible focus for qualitative research on trusting, we propose that expectations to the behavior of others can provide that. By focusing on expectations, researchers can produce narrative descriptions that explains how trusting develops and changes. Then the key theore...

  15. Interpersonal Trust and Experiential Education Leadership.

    Science.gov (United States)

    Honchalk, Dave

    1982-01-01

    All factors influencing trust (cooperative relationships, communication, credibility of the leader) are important to successful growth of participants in outdoor experience and are necessary prerequisites for meaningful learning experiences. Outdoor education programs should strive to create an atmosphere of trust. (ERB)

  16. Integrity Constraints in Trust Management (Extended Abstract)

    NARCIS (Netherlands)

    Etalle, Sandro; Winsborough, William H.; Ahn, G-J.

    We introduce the use, monitoring, and enforcement of integrity constraints in trust managementstyle authorization systems. We consider what portions of the policy state must be monitored to detect violations of integrity constraints. Then we address the fact that not all participants in a trust

  17. Physical pain increases interpersonal trust in females.

    Science.gov (United States)

    Wang, C; Gao, J; Ma, Y; Zhu, C; Dong, X-W

    2017-09-14

    People behave and interact with others differently when experiencing physical pain. Pain has dramatic effects on one's emotional responses, cognitive functions and social interaction. However, little has been known about whether and how physical pain influences interpersonal trust in social interaction. In the present study, we examined the influence of physical pain on trusting behaviour. A total of 112 healthy participants were recruited and assigned to physical pain condition (induced by Capsaicin) and control condition (with hand cream), respectively. Thirty minutes after pain induction, three decision-making tasks were conducted to measure behaviours in social interaction, including trust and trustworthiness (trust game), non-social risk-taking (risk game) and altruism (dictator game). Results showed that physical pain increased interpersonal trust among females, but not among males. Pain did not influence non-social risk-taking, altruism or trustworthiness, as evaluated by monetary transfers in those tasks. Moreover, the effect of physical pain on interpersonal trust was fully mediated by expectation of monetary profit. These findings demonstrate an effect of pain on interpersonal trust and suggest a reciprocity mechanism that the effect may be driven by self-interest rather than altruistic motivation. The pain effect on trust was evident only in females, implying distinct pain coping strategies used by both genders. The present work highlights the social component of pain and extends our understanding of mutual interactions between pain and social cognition. © 2017 European Pain Federation - EFIC®.

  18. Trust Building in PPPs for Service Delivery

    DEFF Research Database (Denmark)

    Schulze, Christiane

    for service delivery in Denmark leads to two main findings. First, despite the existence of rather formalized procedures trust based on the perception of the other managers’ competence is already important before the contract is entered. Second, this trust is not automatically transferred onto the next...

  19. Corruption, Trust and their Public Sector Consequences

    DEFF Research Database (Denmark)

    Fritzen, Scott A.; Serritzlew, Søren; Svendsen, Gert Tinggaard

    2014-01-01

    Corruption and trust are two important determinants of the quality of public sectors. Empirical studies in different literatures suggest that corruption and trust have effects on factors such as economic growth, the quality of democratic institutions, life quality, the size and effectiveness of t...

  20. Playing Attack and Defense with Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe; Bouganim, Luc

    2014-01-01

    provide trusted storage? This is the question we tackle in this demonstration. We describe how secure devices, equipped with a trusted execution environment, differ from general purpose devices. We illustrate with our demonstration scenario, that it is much more difficult to attack a storage service...... running on a secure device, than to attack the same service running on a general purpose device....

  1. Web Trust Principles And Mechanisms Guiding Sustainable ...

    African Journals Online (AJOL)

    Trust is one of the mainstay of business, whether traditionally or electronically transacted. But as more and more individuals and businesses participate in electronic business, it would appear that much of what supports trust in the traditional business setting is unavailable online (the Web). It is against the backdrop that this ...

  2. The Neurobiology of Trust and Schooling

    Science.gov (United States)

    Sankey, Derek

    2018-01-01

    Are there neurobiological reasons why we are willing to trust other people and why "trust" and moral values such as "care" play a quite pivotal role in our social lives and the judgements we make, including our social interactions and judgements made in the context of schooling? In pursuing this question, this paper largely…

  3. Building Trust in High-Performing Teams

    Directory of Open Access Journals (Sweden)

    Aki Soudunsaari

    2012-06-01

    Full Text Available Facilitation of growth is more about good, trustworthy contacts than capital. Trust is a driving force for business creation, and to create a global business you need to build a team that is capable of meeting the challenge. Trust is a key factor in team building and a needed enabler for cooperation. In general, trust building is a slow process, but it can be accelerated with open interaction and good communication skills. The fast-growing and ever-changing nature of global business sets demands for cooperation and team building, especially for startup companies. Trust building needs personal knowledge and regular face-to-face interaction, but it also requires empathy, respect, and genuine listening. Trust increases communication, and rich and open communication is essential for the building of high-performing teams. Other building materials are a shared vision, clear roles and responsibilities, willingness for cooperation, and supporting and encouraging leadership. This study focuses on trust in high-performing teams. It asks whether it is possible to manage trust and which tools and operation models should be used to speed up the building of trust. In this article, preliminary results from the authors’ research are presented to highlight the importance of sharing critical information and having a high level of communication through constant interaction.

  4. Does Education Lead to Higher Generalized Trust?

    DEFF Research Database (Denmark)

    Charron, Nicholas; Rothstein, Bo

    2016-01-01

    to ‘trust others'. We hypothesize that higher levels of education will lead to higher social trust in individuals, given that the context (country or regions within countries) in which they reside has a sufficiently impartial and non-corrupt institutional setting. However, the positive effect of education...

  5. The Winston Churchill Memorial Trust of Australia

    Science.gov (United States)

    Hilton, Nicolette

    2013-01-01

    The Churchill Trust was established in 1965 to honour the memory of Sir Winston Churchill by awarding overseas research Fellowships known as "Churchill Fellowships". Since its inception, The Churchill Trust has awarded Churchill Fellowships to more than 3,700 Australians who, like Churchill, are innovative, filled with a spirit of…

  6. Trust Factors Affecting Cooperation in Construction

    DEFF Research Database (Denmark)

    Ditlev Bohnstedt, Kristian; Haugbølle, Kim; Bejder, Erik

    2013-01-01

    -productivity sector. By applying the theory that insufficient cooperation is the result of low trust the aim was to investigate how conditions for formation of positive and lasting trustful relationships can be created. A questionnaire survey including clients, contractors, architects, engineers and client design...

  7. Physical trust-based persistent authentication

    DEFF Research Database (Denmark)

    Fujita, Masahiro; Jensen, Christian D.; Arimura, Shiori

    2015-01-01

    propose a new type of persistent authentication, called Persistent Authentication Based On physical Trust (PABOT). PABOT uses a context of “physical trust relationship” that is built by visual contact between users, and thus can offer a persistent authentication mechanism with better usability and higher...

  8. Institutional and social trust: Is there a causal relationship?

    DEFF Research Database (Denmark)

    Dinesen, Peter Thisted; Sønderskov, Kim Mannemar

    affecting both types of trust. Therefore, conventional analyses using cross-sectional data are ill-suited to determine whether institutional trust actually cause social trust. In contrast to previous analyses, this paper utilizes two Danish panel surveys containing measures of the two types of trust......In the literature on social trust, institutional trust is prominent explanations of why people trust the generalized other. However, while institutional trust is a plausible cause of social trust, it is also likely to be consequences of trust or a consequence of deep-rooted personality traits...... as regressors), the results provide strong evidence of trust in state institutions exercising an impact on social trust whereas the evidence for a reverse relationship is mixed....

  9. Lesson study i Danmark?

    DEFF Research Database (Denmark)

    Mogensen, Arne

    2009-01-01

    Der beskrives et japansk lesson study forløb, og det diskuteres i hvilket omfang, de gode japanske erfaringer kan overføres til dansk matematikundervisning.......Der beskrives et japansk lesson study forløb, og det diskuteres i hvilket omfang, de gode japanske erfaringer kan overføres til dansk matematikundervisning....

  10. Mini Lessons from FDA.

    Science.gov (United States)

    Food and Drug Administration (DHEW), Washington, DC.

    Eight self-contained lessons present information about topics of current interest in the Food and Drug Administration. Multidisciplinary in nature, the lessons can be integrated into ongoing activities in elementary or secondary level reading, math, language arts, social studies, science, art, health, consumer education, and home economics. The…

  11. Great Expectations. [Lesson Plan].

    Science.gov (United States)

    Devine, Kelley

    Based on Charles Dickens' novel "Great Expectations," this lesson plan presents activities designed to help students understand the differences between totalitarianism and democracy; and a that a writer of a story considers theme, plot, characters, setting, and point of view. The main activity of the lesson involves students working in groups to…

  12. Lessons in Everyday Leadership

    Science.gov (United States)

    Boesch, Kit

    2009-01-01

    In this article, the author presents and discusses some of the lessons she has learned in everyday leadership. It's the kind of leadership one learns when he or she doesn't expect it--and the kind of lessons one teaches when he or she doesn't even know he or she is doing it.

  13. Soybean Production Lesson Plan.

    Science.gov (United States)

    Carlson, Keith R.

    These lesson plans for teaching soybean production in a secondary or postsecondary vocational agriculture class are organized in nine units and cover the following topics: raising soybeans, optimum tillage, fertilizer and lime, seed selection, pest management, planting, troubleshooting, double cropping, and harvesting. Each lesson plan contains…

  14. Explaining the justice-performance relationship: trust as exchange deepener or trust as uncertainty reducer?

    Science.gov (United States)

    Colquitt, Jason A; Lepine, Jeffery A; Piccolo, Ronald F; Zapata, Cindy P; Rich, Bruce L

    2012-01-01

    Past research has revealed significant relationships between organizational justice dimensions and job performance, and trust is thought to be one mediator of those relationships. However, trust has been positioned in justice theorizing in 2 different ways, either as an indicator of the depth of an exchange relationship or as a variable that reflects levels of work-related uncertainty. Moreover, trust scholars distinguish between multiple forms of trust, including affect- and cognition-based trust, and it remains unclear which form is most relevant to justice effects. To explore these issues, we built and tested a more comprehensive model of trust mediation in which procedural, interpersonal, and distributive justice predicted affect- and cognition-based trust, with those trust forms predicting both exchange- and uncertainty-based mechanisms. The results of a field study in a hospital system revealed that the trust variables did indeed mediate the relationships between the organizational justice dimensions and job performance, with affect-based trust driving exchange-based mediation and cognition-based trust driving uncertainty-based mediation.

  15. Framing Trust at the Street-Level

    DEFF Research Database (Denmark)

    Perry, Kevin Anthony

    such as injustice and justice to create both distrust and trust frames around individual employees. The last analytical chapter reports finding four: negotiating cultural frames. The last part of the chapter looks closer at the relationship between the young men with minority ethnic backgrounds, the job consultant......This thesis deals with the phenomenon of distrust and trust between young men with minority ethnic backgrounds and public sector employees at the face-to-face level of interaction. The focus is on trust and distrust which can be understood as cultural resources – a valuable approach to researching...... trust and distrust largely under-represented in the trust literature. A common source of conflict is often a lack of confidence or distrust in the authorities; therefore, winning the confidence of minority ethnic groups in these communities is essential to easing tensions, along with reducing civil...

  16. TRUST AND DISTRUST: TWO NECESSARY FACTORS FOR THE DEVELOPMENT OF THE SOCIAL TRUST

    Directory of Open Access Journals (Sweden)

    RODRIGO YÁÑEZ GALLARDO

    2006-01-01

    Full Text Available Recent investigations argue that distrust is the absence of trust and it would be assumed that bothattitudes are independent; that would allow to distinguish between the naïve attitude and the wise attitudein the trust. It has been built a scale to measure the disposition to trust and the relationship has beenexamined among naïve and wise attitude when trusting. The sample was constituted by 575 universitystudents of both sexes, of four faculties and of different years of study. Through a factorial analysis itwas found that trust and distrust correspond to different factors. It was discussed the importance ofincrease an optimal trust in order to develop social abilities and to stimulate the social participation. Itwas questioned the validity of traditional surveys that measure the social trust.

  17. Trusting Facebook in Crisis Situations: The Role of General Use and General Trust Toward Facebook.

    Science.gov (United States)

    Szymczak, Hermann; Kücükbalaban, Pinar; Lemanski, Sandra; Knuth, Daniela; Schmidt, Silke

    2016-01-01

    An important concept that has been rather neglected in research on social media is the concept of trust. Although there is a considerable amount of research on online trust in general, little has been done in the area of social media. As a situation of risk is necessary for trust, the perceived trustworthiness of Facebook in crisis situations was examined in this study. A sample of 340 European Facebook users were questioned as part of a large European study about social media in the context of emergency situations. We found that participants' general trust toward Facebook as a medium predicted to a significant degree how much they would trust Facebook in a crisis situation. General use of Facebook and dispositional trust were also significantly associated with trust toward Facebook in a crisis situation.

  18. Partnering for bioregionalism in England: a case study of the Westcountry Rivers Trust

    Directory of Open Access Journals (Sweden)

    Hadrian Cook

    2016-06-01

    Full Text Available The adoption of bioregionalism by institutions that are instrumental in river basin management has significant potential to resolve complex water resource management problems. The Westcountry Rivers Trust (WRT in England provides an example of how localized bioregional institutionalization of adaptive comanagement, consensus decision making, local participation, indigenous technical and social knowledge, and "win-win" outcomes can potentially lead to resilient partnership working. Our analysis of the WRT's effectiveness in confronting nonpoint source water pollution, previously impervious to centralized agency responses, provides scope for lesson-drawing on institutional design, public engagement, and effective operation, although some evident issues remain.

  19. A Strategic Model of Trust Management in Web Services

    Science.gov (United States)

    Sun, Junqing; Sun, Zhaohao; Li, Yuanzhe; Zhao, Shuliang

    This article examines trust and trust management in web services and proposes a multiagent model of trust relationship in web services. It looks at the hierarchical structure of trust management in web services and proposes a strategic model of trust management in web services. The proposed approach in this article will facilitate research and development of trust management in e-commerce, web services and social networking.

  20. Beyond Trust: Plagiarism and Truth.

    Science.gov (United States)

    Penders, Bart

    2017-12-12

    Academic misconduct distorts the relationship between scientific practice and the knowledge it produces. The relationship between science and the knowledge it produces is, however, not something universally agreed upon. In this paper I will critically discuss the moral status of an act of research misconduct, namely plagiarism, in the context of different epistemological positions. While from a positivist view of science, plagiarism only influences trust in science but not the content of the scientific corpus, from a constructivist point of view both are at stake. Consequently, I argue that discussions of research misconduct and responsible research ought to be explicitly informed by the authors' views on the relationship between science and the knowledge it produces.

  1. Hardware IP security and trust

    CERN Document Server

    Bhunia, Swarup; Tehranipoor, Mark

    2017-01-01

    This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle. Readers will gain a comprehensive understanding of the security vulnerabilities of different types of IPs. This book would enable readers to overcome these vulnerabilities through an efficient combination of proactive countermeasures and design-for-security solutions, as well as a wide variety of IP security and trust assessment and validation techniques. This book serves as a single-source of reference for system designers and practitioners for designing secure, reliable and trustworthy SoCs.

  2. The advanced eccentricity and broken cage diagnostic method for medium voltage induction motors

    Directory of Open Access Journals (Sweden)

    Janda Žarko

    2012-01-01

    Full Text Available In the paper the comparative diagnostics of medium voltage induction motors has been presented. The methods employed are the motor current signature analysis (MCSA and the axial leakage flux spectral analysis. All presented test procedures have been conducted on partially loaded motors, one without fault and the other with fault. Rated parameters of case study motors are 6 kV and 3.15 MW, and both motors are installed in one combined steam power plant. The reliable broken rotor bars detection and existence of static eccentricity have been demonstrated. The new method for combined fault detection has also been announced. The combined fault under scope is the simultaneous existence of broken rotor bars and static eccentricity. The proposed combined fault detection method is based upon axial leakage flux spectral analysis, especially in the vicinity of the double fundamental frequency. The existence of three broken rotor bars has been confirmed after physical rotor cage examination.

  3. Algorithm for detection of the broken phase conductor in the radial networks

    Directory of Open Access Journals (Sweden)

    Ostojić Mladen M.

    2016-01-01

    Full Text Available The paper presents an algorithm for a directional relay to be used for a detection of the broken phase conductor in the radial networks. The algorithm would use synchronized voltages, measured at the beginning and at the end of the line, as input signals. During the process, the measured voltages would be phase-compared. On the basis of the normalized energy, the direction of the phase conductor, with a broken point, would be detected. Software tool Matlab/Simulink package has developed a radial network model which simulates the broken phase conductor. The simulations generated required input signals by which the algorithm was tested. Development of the algorithm along with the formation of the simulation model and the test results of the proposed algorithm are presented in this paper.

  4. Broken bodies and present ghosts: Ubuntu and African women’s theology

    Directory of Open Access Journals (Sweden)

    Isabella F. Ras

    2017-02-01

    Full Text Available In this article, the notion of broken bodies is explored in relation to the African body and the history of colonialism in South Africa. This exploration will be rooted in a retelling of the story of the woman, Saartjie Baartman. In this retelling, the product of colonialism comes to the fore in a haunting. Jacques Derrida’s use of the concept of Hauntology is employed to investigate the ethical demand the spectre makes of us. With the help of the African concept of ubuntu and African women’s theologies, we then seek to find healing and restoration for the broken bodies.

  5. Cementing Material From Rice Husk-Broken Bricks-Spent Bleaching Earth-Dried Calcium Carbide Residue

    OpenAIRE

    Muthengia Jackson Washira

    2012-01-01

    A cementious material, coded CSBR (Carbide residue Spent bleaching earth Broken bricks and Rice husks), was made from dried calcium carbide residue (DCCR) and an incinerated mix of rice husks (RH), broken bricks (BB) and spent bleaching earth (SBE). Another material, coded SBR (Spent bleaching earth Broken bricks and Rice husk ash), was made from mixing separately incinerated RH, SBE and ground BB in the same ash ratio as in CSBR. When CSBR was inter-ground with Ordinary Portland Cement (OPC)...

  6. Expandable Micro-motor Bur, design of a new device for least invasive extraction of broken teeth roots

    OpenAIRE

    Shahidi Bonjar, Amir Hashem

    2013-01-01

    Background Extraction of a broken tooth root is often a traumatic experience for both the practitioner and the patient. To extract broken roots, generally invasive approaches as open window surgeries or mucoperiosteal flap and/or removal of buccal bone are performed. Presentation of the hypothesis Expandable micro-motor bur (EMB) is a hypothetical design of a dental instrument proposed for removal of broken teeth roots that cannot be extracted by the routine closed methods and in which common...

  7. Genetic influences are virtually absent for trust.

    Directory of Open Access Journals (Sweden)

    Paul A M Van Lange

    Full Text Available Over the past decades, numerous twin studies have revealed moderate to high heritability estimates for individual differences in a wide range of human traits, including cognitive ability, psychiatric disorders, and personality traits. Even factors that are generally believed to be environmental in nature have been shown to be under genetic control, albeit modest. Is such heritability also present in social traits that are conceptualized as causes and consequences of social interactions or in other ways strongly shaped by behavior of other people? Here we examine a population-based sample of 1,012 twins and relatives. We show that the genetic influence on generalized trust in other people (trust-in-others: h2 = 5%, ns, and beliefs regarding other people's trust in the self (trust-in-self: h2 = 13%, ns, is virtually absent. As test-retest reliability for both scales were found to be moderate or high (r = .76 and r = .53, respectively in an independent sample, we conclude that all variance in trust is likely to be accounted for by non-shared environmental influences. We show that, relative to cognitive abilities, psychiatric disorders, and classic personality variables, genetic influences are smaller for trust, and propose that experiences with or observations of the behavior of other people shape trust more strongly than other traits.

  8. Sharing Lessons Learned

    Energy Technology Data Exchange (ETDEWEB)

    Mohler, Bryan L.

    2004-09-01

    Workplace safety is inextricably tied to the culture – the leadership, management and organization – of the entire company. Nor is a safety lesson fundamentally different from any other business lesson. With these points in mind, Pacific Northwest National Laboratory recast its lessons learned program in 2000. The laboratory retained elements of a traditional lessons learned program, such as tracking and trending safety metrics, and added a best practices element to increase staff involvement in creating a safer, healthier work environment. Today, the Lessons Learned/Best Practices program offers the latest business thinking summarized from current external publications and shares better ways PNNL staff have discovered for doing things. According to PNNL strategic planning director Marilyn Quadrel, the goal is to sharpen the business acumen, project management ability and leadership skills of all staff and to capture the benefits of practices that emerge from lessons learned. A key tool in the PNNL effort to accelerate learning from past mistakes is one that can be easily implemented by other firms and tailored to their specific needs. It is the weekly placement of Lessons Learned/Best Practices articles in the lab’s internal electronic newsletter. The program is equally applicable in highly regulated environments, such as the national laboratories, and in enterprises that may have fewer external requirements imposed on their operations. And it is cost effective, using less than the equivalent of one fulltime person to administer.

  9. Communicating Trust Between Parents and Their Children

    DEFF Research Database (Denmark)

    Demant, Jakob Johan; Ravn, Signe

    2013-01-01

    This article discusses how Danish parents and their children communicate trust. Based on Niklas Luhmann’s sociological theory, the article explores new aspects of communication about alcohol-related rules. The analysis shows how the parents emphasize the importance of communicating trust, while...... the adolescents, on the other hand, observe the parents’ communication on the basis of their own, more instrumental, logic. Trust becomes a functional solution to the parents’ paradoxical situation, because it enables them to balance between a democratic family ideal, emphasizing the adolescents’ independence...

  10. Trust Based Evaluation of Wikipedia's Contributors

    Science.gov (United States)

    Krupa, Yann; Vercouter, Laurent; Hübner, Jomi Fred; Herzig, Andreas

    Wikipedia is an encyclopedia on which anybody can change its content. Some users, self-proclaimed "patrollers", regularly check recent changes in order to delete or correct those which are ruining articles integrity. The huge quantity of updates leads some articles to remain polluted a certain time before being corrected. In this work, we show how a multiagent trust model can help patrollers in their task of controlling the Wikipedia. To direct the patrollers verification towards suspicious contributors, our work relies on a formalisation of Castelfranchi & Falcone's social trust theory to assist them by representing their trust model in a cognitive way.

  11. How Does Social Trust Affect Economic Growth?

    DEFF Research Database (Denmark)

    Bjørnskov, Christian

    This paper connects two strands of the literature on social trust by estimating the effects of trust on growth through a set of potential transmission mechanisms directly. It does so by modelling the process using a three-stage least squares estimator on a sample of countries for which a full data...... set is available. The results indicate that trust affects schooling and the rule of law directly. These variables in turn affect the investment rate (schooling) and provide a direct effect (rule of law) on the growth rate. The paper closes with a short discussion of the relevance of the findings....

  12. Analysis on trust influencing factors and trust model from multiple perspectives of online Auction

    Science.gov (United States)

    Yu, Wang

    2017-10-01

    Current reputation models lack the research on online auction trading completely so they cannot entirely reflect the reputation status of users and may cause problems on operability. To evaluate the user trust in online auction correctly, a trust computing model based on multiple influencing factors is established. It aims at overcoming the efficiency of current trust computing methods and the limitations of traditional theoretical trust models. The improved model comprehensively considers the trust degree evaluation factors of three types of participants according to different participation modes of online auctioneers, to improve the accuracy, effectiveness and robustness of the trust degree. The experiments test the efficiency and the performance of our model under different scale of malicious user, under environment like eBay and Sporas model. The experimental results analysis show the model proposed in this paper makes up the deficiency of existing model and it also has better feasibility.

  13. DualTrust: A Trust Management Model for Swarm-Based Autonomic Computing Systems

    Energy Technology Data Exchange (ETDEWEB)

    Maiden, Wendy M. [Washington State Univ., Pullman, WA (United States)

    2010-05-01

    Trust management techniques must be adapted to the unique needs of the application architectures and problem domains to which they are applied. For autonomic computing systems that utilize mobile agents and ant colony algorithms for their sensor layer, certain characteristics of the mobile agent ant swarm -- their lightweight, ephemeral nature and indirect communication -- make this adaptation especially challenging. This thesis looks at the trust issues and opportunities in swarm-based autonomic computing systems and finds that by monitoring the trustworthiness of the autonomic managers rather than the swarming sensors, the trust management problem becomes much more scalable and still serves to protect the swarm. After analyzing the applicability of trust management research as it has been applied to architectures with similar characteristics, this thesis specifies the required characteristics for trust management mechanisms used to monitor the trustworthiness of entities in a swarm-based autonomic computing system and describes a trust model that meets these requirements.

  14. Analysis on trust influencing factors and trust model from multiple perspectives of online Auction

    Directory of Open Access Journals (Sweden)

    Yu Wang

    2017-10-01

    Full Text Available Current reputation models lack the research on online auction trading completely so they cannot entirely reflect the reputation status of users and may cause problems on operability. To evaluate the user trust in online auction correctly, a trust computing model based on multiple influencing factors is established. It aims at overcoming the efficiency of current trust computing methods and the limitations of traditional theoretical trust models. The improved model comprehensively considers the trust degree evaluation factors of three types of participants according to different participation modes of online auctioneers, to improve the accuracy, effectiveness and robustness of the trust degree. The experiments test the efficiency and the performance of our model under different scale of malicious user, under environment like eBay and Sporas model. The experimental results analysis show the model proposed in this paper makes up the deficiency of existing model and it also has better feasibility.

  15. California's Schooling Is "Broken": Studies Call for Overhaul of Finance, Governance

    Science.gov (United States)

    Jacobson, Linda

    2007-01-01

    This article reports the findings of 22 studies which document "how broken California's system is." The project, called "Getting Down to Facts," was requested during the 2005-2006 school year by the Republican governor's Advisory Committee on Education Excellence, as well as by Democratic leaders, to reassess California's…

  16. Correlation and disorder-enhanced nematic spin response in superconductors with weakly broken rotational symmetry

    DEFF Research Database (Denmark)

    Andersen, Brian Møller; Graser, S.; Hirschfeld, P. J.

    2012-01-01

    Recent experimental and theoretical studies have highlighted the possible role of an electronic nematic liquid in underdoped cuprate superconductors. We calculate, within a model of d-wave superconductor with Hubbard correlations, the spin susceptibility in the case of a small explicitly broken...

  17. Machine-vision-based identification of broken inserts in edge profile milling heads

    NARCIS (Netherlands)

    Fernandez Robles, Laura; Azzopardi, George; Alegre, Enrique; Petkov, Nicolai

    This paper presents a reliable machine vision system to automatically detect inserts and determine if they are broken. Unlike the machining operations studied in the literature, we are dealing with edge milling head tools for aggressive machining of thick plates (up to 12 centimetres) in a single

  18. Broken symmetries at high temperatures and the problem of baryon excess of the universe

    CERN Document Server

    Mohapatra, Rabindra N

    1979-01-01

    We discuss a class of gauge theories, where spontan- eously broken symmetries, instead of being restored, persist as the temperature is increased. Applying these ideas to the specific case of the soft CP- viola tion in grand unified theories, we discuss a mechanism to generate the baryon to entropy ratio of the universe.

  19. Broken wing display in an unfledged Indian Eagle Owl Bubo bengalensis

    Directory of Open Access Journals (Sweden)

    M.E. Ramanujam

    2014-05-01

    Full Text Available A young Bubo bengalensis was encountered in a ravine near Ousteri Lake. It was monitored for a period of 6 months. During this period it showed the broken wing display only once, which is considered to be exclusive to adults in defense of their nests, eggs, or young.

  20. Lactic acid production from submerged fermentation of broken rice using undefined mixed culture.

    Science.gov (United States)

    Nunes, Luiza Varela; de Barros Correa, Fabiane Fernanda; de Oliva Neto, Pedro; Mayer, Cassia Roberta Malacrida; Escaramboni, Bruna; Campioni, Tania Sila; de Barros, Natan Roberto; Herculano, Rondinelli Donizetti; Fernández Núñez, Eutimio Gustavo

    2017-04-01

    The present work aimed to characterize and optimize the submerged fermentation of broken rice for lactic acid (LA) production using undefined mixed culture from dewatered activated sludge. A microorganism with amylolytic activity, which also produces LA, Lactobacillus amylovorus, was used as a control to assess the extent of mixed culture on LA yield. Three level full factorial designs were performed to optimize and define the influence of fermentation temperature (20-50 °C), gelatinization time (30-60 min) and broken rice concentration in culture medium (40-80 g L-1) on LA production in pure and undefined mixed culture. LA production in mixed culture (9.76 g L-1) increased in sixfold respect to pure culture in optimal assessed experimental conditions. The optimal conditions for maximizing LA yield in mixed culture bioprocess were 31 °C temperature, 45 min gelatinization time and 79 g L-1 broken rice concentration in culture medium. This study demonstrated the positive effect of undefined mixed culture from dewatered activated sludge to produce LA from culture medium formulated with broken rice. In addition, this work establishes the basis for an efficient and low-cost bioprocess to manufacture LA from this booming agro-industrial by-product.

  1. Broken needle in the penis as a complication of intracavernous injection therapy

    National Research Council Canada - National Science Library

    BAYKAL, Kadir; İŞERİ, Cüneyt; ŞENKUL, Temuçin; ADAYENER, Cüneyt; AKYOL, İlker; KARADEMİR, Kenan

    2007-01-01

    ... önerilen hastaların el becerileri dikkatlice değerlendirilmeli ve doğru enjeksiyon tekniğinin önemi vurgulanmalıdır A 74-year-old male applied to the emergency room having a broken needle in his penis...

  2. 76 FR 65717 - City of Broken Bow, OK; Notice of Availability of Final Environmental Assessment

    Science.gov (United States)

    2011-10-24

    ... Energy Regulatory Commission City of Broken Bow, OK; Notice of Availability of Final Environmental Assessment In accordance with the National Environmental Policy Act of 1969 and the Federal Energy Regulatory... Forest. Staff prepared a final environmental assessment (EA), which analyzes the potential environmental...

  3. Framing Trust at the Street-Level

    DEFF Research Database (Denmark)

    Perry, Kevin Anthony

    This thesis deals with the phenomenon of distrust and trust between young men with minority ethnic backgrounds and public sector employees at the face-to-face level of interaction. The focus is on trust and distrust which can be understood as cultural resources – a valuable approach to researching...... trust and distrust largely under-represented in the trust literature. A common source of conflict is often a lack of confidence or distrust in the authorities; therefore, winning the confidence of minority ethnic groups in these communities is essential to easing tensions, along with reducing civil...... processes between public sector employees and young men with minority ethnic backgrounds, an under-researched and often misunderstood area. The central focus is on the relationship between the young men with minority ethnic backgrounds, a team of youth workers, a job consultant and a police officer...

  4. A Model of Trusted Connection Architecture

    Directory of Open Access Journals (Sweden)

    Zhang Xun

    2017-01-01

    Full Text Available According to that traditional trusted network connection architecture (TNC has limitations on dynamic network environment and the user behavior support, we develop TCA to propose a trusted connection architecture supporting behavior measurement (TCA-SBM, besides, the structure diagram of network architecture is given. Through introducing user behavior measure elements, TCA-SBM can conduct measurement on the whole network in time dimension periodically, and refine the measurement on network behavior in measure dimension to conduct fine-grained dynamic trusted measurement. As a result, TCA-SBM enhances the TCA’s ability to adapt to the dynamic change of network and makes up the deficiency of trusted computing framework in the network connection.

  5. Estate Planning: The Role of Trust Funds.

    Science.gov (United States)

    Neidermeyer, Ellen; Neidermeyer, Adolph

    1985-01-01

    The authors present estate planning suggestions that address concerns about lifetime care for the disabled children of aging parents. Aspects covered include disinheriting children, trust funds, and medical and legal assistance and food stamps. (CL)

  6. Trust region minimization of orbital localization functions

    DEFF Research Database (Denmark)

    Høyvik, Ida-Marie; Jansik, Branislav; Jørgensen, Poul

    2012-01-01

    The trust region method has been applied to the minimization of localization functions, and it is shown that both local occupied and local virtual Hartree–Fock (HF) orbitals can be obtained. Because step sizes are size extensive in the trust region method, large steps may be required when...... the method is applied to large molecular systems. For an exponential parametrization of the localization function only small steps are allowed, and the standard trust radius update therefore has been replaced by a scheme where the direction of the step is determined using a conservative estimate of the trust...... radius and the length of the step is determined from a line search along the obtained direction. Numerical results for large molecular systems have shown that large steps can then safely be taken, and a robust and nearly monotonic convergence is obtained....

  7. Trust and Coordination in Offshore Outsourcing

    DEFF Research Database (Denmark)

    Tøth, Thomas

    2013-01-01

    the implementation of handover meetings affected Danish employees' perception of their Indian counterparts in terms of work attitude, competence and reliability - and ultimately how these handover meetings increased the Danish employees' willingness and ability to trust their Indian counterparts. Contemporary...

  8. Personalized Service Recommendation Based on Trust Relationship

    Directory of Open Access Journals (Sweden)

    Hao Tian

    2017-01-01

    Full Text Available With the rapid development and extensive application of Web services, various approaches for Web service recommendation have been proposed in the past. However, the traditional methods only utilize the information of the user-service rating matrix but ignore the trust relations between users, so their recommendation precision is often unsatisfactory, and, furthermore, most of these methods lack the ability to distinguish the credibility of recommendation. To address the problems, we proposed a personalized service recommendation based on trust relationship. In particular, our approach takes into account user experience, interest background, recommendation effect, and evaluation tendency in the formalization of trust relationship, and moreover it can filter out useless or suspected services by exploiting trust relationships between users. To verify the proposed approach, we conducted experiments by using a real-world Web services set. The experimental results show that our proposed approach leads to a substantial increase in the precision and the credibility of service recommendations.

  9. Supporting collaboration with trust virtual organization

    NARCIS (Netherlands)

    Lin, A.; Vullings, E.; Dalziel, J.

    2008-01-01

    This chapter introduces the trust virtual organization as a means of facilitating authentication and authorization for sharing distributed and protected contents and services. It indicates that sharing institutional protected services and deliverables has proven a hurdle since user accounts are

  10. Leaking Underground Storage Tank (LUST) Trust Fund

    Science.gov (United States)

    In 1986, Congress created the Leaking Underground Storage Tank (LUST) Trust Fund to address releases from federally regulated underground storage tanks (USTs) by amending Subtitle I of the Solid Waste Disposal Act.

  11. The Contextual Antecedents of Organizational Trust

    DEFF Research Database (Denmark)

    Li, Peter Ping; Bai, Yuntao; Xi, Youmin

    2012-01-01

    , and cultural norm at the organizational level, on organizational trust directly, and their behavioural outcomes at the individual level indirectly, using organizational trust as a cross-level mediator. The empirical results, based on a hierarchical linear model with a sample of 444 employees from 82 firms......In this article we seek to explore the contextual antecedents of organizational trust. In light of the complex links between organizational contexts and organizational behaviours, we focus on the effects of the three most critical contextual antecedents, i.e., leadership role, structural rule...... in China, lent support for our multidimensional cross-level model of context–trust–behaviour link. We extend the research on organizational trust by treating it as a cross-level phenomenon and by specifying its core contextual antecedents and behavioural consequences....

  12. Leader Trust, Competence, LMX, and Member Performance.

    Science.gov (United States)

    Byun, Gukdo; Dai, Ye; Lee, Soojin; Kang, Seungwan

    2017-01-01

    Based on social exchange theory, this study examines the influence of leaders' trusting behavior and competence in in-role activities on members' perceived leader-member exchange (LMX) relationships. Our study proposes that a leader's trust in a member contributes to the member's perceived LMX, and that the leader's competence in in-role activities moderates this relationship. Furthermore, our study suggests that perceived LMX mediates the relationship between the leader's trust and members' task performance. Finally, the study proposes that the leader's competence moderates the mediating role of LMX in transmitting the effect of the leader's trust on members' task performance. Analyses of the data collected from soldiers and platoon leaders in the South Korean army support these hypotheses.

  13. Trust and communicated attributions in close relationships.

    Science.gov (United States)

    Rempel, J K; Ross, M; Holmes, J G

    2001-07-01

    The attributional statements intimate partners communicate to one another were examined as a function of trust. In discussions by 35 married couples, 850 attributions and corresponding events were coded on dimensions of valence, globality, and locus. Results of regression and contingency analyses indicate that attributional statements expressed in high-trust relationships emphasized positive aspects of the relationship. Medium-trust couples actively engaged issues but focused more on negative events and explanations. Low-trust couples expressed more specific, less affectively extreme attributional statements that minimized the potential for increased conflict. Results could not be accounted for by relationship satisfaction. These findings also highlight the importance of focusing on features of the events for which attributions are expressed.

  14. Trust Ownership of the Tata Group

    DEFF Research Database (Denmark)

    Thomsen, Steen

    structure is characterized by managerial distance between trusts and Group companies. The Trusts are almost exclusively concerned with philanthropy, and according to the Articles of Association of Tata Sons Limited, their governance role is limited to nominating two members to the Selection Committee which......The Indian Tata Group is one of the largest and most admired business groups in the world. It has 28 listed subsidiaries and more than 80 operating businesses. It has shown strong financial performance and social responsibility for decades. Interestingly, it has a unique ownership structure......: the main holding company Tata Sons Limited is majority-owned by charitable trusts. We examine the governance of this remarkable entity. The Trusts own 66% of Tata Sons, the main holding company of the Group, while members of the founding Tata family are very small minority shareholders. The governance...

  15. Trust in Co-sourced Software Development

    DEFF Research Database (Denmark)

    Schlichter, Bjarne Rerup; Persson, John Stouby

    2014-01-01

    Software development projects are increasingly geographical distributed with offshoring. Co-sourcing is a highly integrative and cohesive approach, seen successful, to software development offshoring. However, research of how dynamic aspects of trust are shaped in co-sourcing activities is limited....... We present a case study of how the co-sourcing relationship between a certified CMMI-level 5 Danish software company and an offshoring supplier can be conceptualized as an Abstract System. An Abstract System is a dis-embedded social system (such as banking) that is trusted despite lack of detailed...... understanding or personal trust relations. The paper suggests how certain work practices among developers and managers can be explained using a dynamic trust lens based on Abstract Systems, especially dis- and re-embedding mechanisms...

  16. 14 CFR 47.8 - Voting trusts.

    Science.gov (United States)

    2010-01-01

    ... prospective beneficiary, creditor, debtor, supplier or contractor of any other party to the trust agreement; (iv) That each voting trustee is not aware of any reason, situation, or relationship under which any...

  17. Disentangling cancer patients' trust in their oncologist: a qualitative study

    NARCIS (Netherlands)

    Hillen, Marij A.; Onderwater, Astrid T.; van Zwieten, Myra C. B.; de Haes, Hanneke C. J. M.; Smets, Ellen M. A.

    2012-01-01

    Objective: Patients' trust in their physician is crucial for an optimal treatment. Yet, among oncology patients, for whom trust might be especially important, research into trust is limited. A qualitative interview study was carried out to investigate (1) to what extent aspects of trust important to

  18. Cultural identity and patient trust among older American Indians.

    Science.gov (United States)

    Simonds, Vanessa W; Goins, R Turner; Krantz, Elizabeth M; Garroutte, Eva Marie

    2014-03-01

    Patients' trust in healthcare providers and institutions has been identified as a likely contributor to racial-ethnic health disparities. The likely influence of patients' cultural characteristics on trust is widely acknowledged but inadequately explored. To compare levels of patients' trust in primary care provider (interpersonal trust) with trust in healthcare organizations (institutional trust) among older American Indians (AIs), and determine associations with cultural identity. Patient survey administered following primary care visits. Two-hundred and nineteen American Indian patients ≥ 50 years receiving care for a non-acute condition at two clinics operated by the Cherokee Nation in northeastern Oklahoma. Self-reported sociodemographic and cultural characteristics. Trust was measured using three questions about interpersonal trust and one measure of institutional trust; responses ranged from strongly agree to strongly disagree. Finding substantial variation only in institutional trust, we used logistic generalized estimating equations to examine relationships of patient cultural identity with institutional trust. Ninety-five percent of patients reported trusting their individual provider, while only 46 % reported trusting their healthcare institution. Patients who strongly self-identified with an AI cultural identity had significantly lower institutional trust compared to those self-identifying less strongly (OR: 0.6, 95 % CI: 0.4, 0.9). Interpersonal and institutional trust represent distinct dimensions of patients' experience of care that may show important relationships to patients' cultural characteristics. Strategies for addressing low institutional trust may have special relevance for patients who identify strongly with AI culture.

  19. A Formal Model for Trust in Dynamic Networks

    DEFF Research Database (Denmark)

    Carbone, Marco; Nielsen, Mogens; Sassone, Vladimiro

    2003-01-01

    We propose a formal model of trust informed by the Global Computing scenario and focusing on the aspects of trust formation, evolution, and propagation. The model is based on a novel notion of trust structures which, building on concepts from trust management and domain theory, feature at the same...

  20. Teacher Trust in District Administration: A Promising Line of Inquiry

    Science.gov (United States)

    Adams, Curt M.; Miskell, Ryan C.

    2016-01-01

    Purpose: We set out in this study to establish a foundation for a line of inquiry around teacher trust in district administration by (1) describing the role of trust in capacity building, (2) conceptualizing trust in district administration, (3) developing a scale to measure teacher trust in district administration, and (4) testing the…

  1. Trust Matters: Leadership for Successful Schools, 2nd Edition

    Science.gov (United States)

    Tschannen-Moran, Megan

    2014-01-01

    Make your school soar by escalating trust between teachers, students, and families. Trust is an essential element in all healthy relationships, and the relationships that exist in your school are no different. How can your school leaders or teachers cultivate trust? How can your institution maintain trust once it is established? These are the…

  2. 24 CFR 92.500 - The HOME Investment Trust Fund.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false The HOME Investment Trust Fund. 92... Investment Trust Fund. (a) General. A HOME Investment Trust Fund consists of the accounts described in this... Investment Trust Fund United States Treasury account for each participating jurisdiction. Each participating...

  3. 26 CFR 1.664-2 - Charitable remainder annuity trust.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 8 2010-04-01 2010-04-01 false Charitable remainder annuity trust. 1.664-2... TAX (CONTINUED) INCOME TAXES Estates and Trusts Which May Accumulate Income Or Which Distribute Corpus § 1.664-2 Charitable remainder annuity trust. (a) Description. A charitable remainder annuity trust is...

  4. Design and validation of a relative trust model

    NARCIS (Netherlands)

    Hoogendoorn, M.; Jaffry, S.W.; Maanen, P.P. van; Treur, J.

    2014-01-01

    When considering intelligent agents that interact with humans, having an idea of the trust levels of the human, for example in other agents or services, can be of great importance. Most models of human trust that exist assume trust in one trustee is independent of trust in another trustee. The model

  5. Self-Efficacy Mediates the Association between Partner Trust and ...

    African Journals Online (AJOL)

    AJRH Managing Editor

    psychological resilience and partner trust to increase understanding of trust towards one's intercourse partner. Mediation analyses, stratified by gender, reveal that condom usage is predicted by self-efficacy and partner trust among females but not males. Higher psychological resilience predicts lower partner trust among ...

  6. Collective Trust: Why Schools Can't Improve without It

    Science.gov (United States)

    Forsyth, Patrick B.; Adams, Curt M.; Hoy, Wayne K.

    2011-01-01

    The culmination of nearly three decades of research, "Collective Trust" offers new insight and practical knowledge on the social construction of trust for school improvement. The authors argue that "collective trust" is not merely an average trust score for a group, but rather an independent concept with distinctive origins and consequences. The…

  7. Trust in food: a comparative and institutional analysis

    National Research Council Canada - National Science Library

    Kjærnes, Unni; Warde, Alan; Harvey, Mark

    2007-01-01

    ... and institutional performance 2.6 Institutionalized relationships of trust 2.7 Determinants of trust in institutionalized arrangements 2.8 Forms of institutionalization and forms of trust in contemporary food markets 18 19 21 23 25 27 29 34 37 3 Enquiring into Trust: Some Methodological Considerations 3.1 The project 3.2 The nature of the comparative inst...

  8. Analyzing user demographics and user behavior for trust assessment

    NARCIS (Netherlands)

    Ceolin, D.; Groth, P.T.; Nottamkandath, A.; Fokkink, W.J.; van Hage, W.R.

    2014-01-01

    In many systems, the determination of trust is reduced to reputation estimation. However, reputation is just one way of determining trust. The estimation of trust can be tackled from a variety of other perspectives. In this chapter, we model trust relying on user reputation, user demographics and

  9. Dynamic Trust Management for Mobile Networks and Its Applications

    Science.gov (United States)

    Bao, Fenye

    2013-01-01

    Trust management in mobile networks is challenging due to dynamically changing network environments and the lack of a centralized trusted authority. In this dissertation research, we "design" and "validate" a class of dynamic trust management protocols for mobile networks, and demonstrate the utility of dynamic trust management…

  10. Lessons of Educational Technology

    Directory of Open Access Journals (Sweden)

    Manuela Repetto

    2006-01-01

    Full Text Available Reception of the book "Lessons of Educational Technology." The book contains materials work in certain aspects relevant to the formation of a teacher who is able to meet the challenges of society 'knowledge.

  11. Music lessons enhance IQ.

    Science.gov (United States)

    Schellenberg, E Glenn

    2004-08-01

    The idea that music makes you smarter has received considerable attention from scholars and the media. The present report is the first to test this hypothesis directly with random assignment of a large sample of children (N = 144) to two different types of music lessons (keyboard or voice) or to control groups that received drama lessons or no lessons. IQ was measured before and after the lessons. Compared with children in the control groups, children in the music groups exhibited greater increases in full-scale IQ. The effect was relatively small, but it generalized across IQ subtests, index scores, and a standardized measure of academic achievement. Unexpectedly, children in the drama group exhibited substantial pre- to post-test improvements in adaptive social behavior that were not evident in the music groups.

  12. Lessons for Introductory Chemistry

    Science.gov (United States)

    Martin, John S.; Blackburn, Edward V.

    2000-07-01

    These twelve lessons, and an introductory lesson, are tutorials in basic topics of introductory chemistry. They are suitable for school use, individual study, or distance learning. They are particularly valuable as review material for students in more advanced courses who may have been away from the subject for some time. They contain a great variety of problems and exercises driven by random-number generators, so that the same problem never repeats exactly. The lessons are, for the most part, Socratic dialogues in which the student is required to answer questions and perform simulated experiments in order to discover chemical principles. They are organized in an intuitive chapter and page structure. One may move readily around each lesson. There are many on-screen facilities such as help, data tables, and a calculator.

  13. Trust in technology-mediated collaborative health encounters: constructing trust in passive user interactions with technologies.

    Science.gov (United States)

    Montague, Enid; Asan, Onur

    2012-01-01

    The present study investigated factors that explain patient trust in health technology and the relationship between patient trust in technology and trust in their care provider. Sociotechnical systems theory states that changes in one part of the system are likely related to other parts of the system. Therefore, attitudes about technologies, like trust, are likely related to other aspects of the system. Contributing to appropriate trust at the technological, interpersonal, and system levels can potentially lead to positive health outcomes. The study described in this manuscript used data collected from 101 patients with a Trust in Medical Technology instrument. The instrument measured patients' trust in (1) their providers, (2) the technology, and (3) how their providers used the technology. Measure 3 was positively associated with measures 1 and 2, while measures 1 and 2 were not positively or negatively associated with one another. These results may indicate that patient assessments of the trustworthiness of care providers and technologies are based on their observations of how providers use technologies. Though patients are not active users of technologies in health care, the results of this study show that their perceptions of how providers use technology are related to their trust in both technology and the care provider. Study findings have implications for how trust is conceptualised and measured in interpersonal relationships and in technologies.

  14. Trust in health care providers: factors predicting trust among homeless veterans over time.

    Science.gov (United States)

    van den Berk-Clark, Carissa; McGuire, James

    2014-08-01

    We examined whether a combination of predisposing, enabling, need, and primary care experience variables would predict trust in medical health care providers for homeless veterans over 18 months. Linear mixed model analysis indicated that, among these variables, race, social support, service-connected disability status, and satisfaction and continuity with providers predicted trust in provider over time. Trust in providers improved during the initial stages of the relationship between patient and provider and then declined to slightly below baseline levels over time. Further research is needed to determine generalizability and effects of provider trust on patient health care status over longer periods of time.

  15. Can We Trust Measures of Political Trust? Assessing Measurement Equivalence in Diverse Regime Types.

    Science.gov (United States)

    Schneider, Irena

    2017-01-01

    Do standard "trust in government" survey questions deliver measures which are reliable and equivalent in meaning across diverse regime types? I test for the measurement equivalence of political trust in a sample of 35 former Soviet and European countries using the 2010 Life in Transition Survey II conducted by the World Bank and European Bank for Reconstruction and Development. Employing multiple group confirmatory factor analysis, I find that trust perceptions in central political institutions differ from (1) trust in regional and local political institutions, (2) trust in protective institutions like the armed forces and police and (3) trust in order institutions like the courts and police. Four measurement models achieve partial metric invariance and two reach partial scalar invariance in most countries, allowing for comparisons of correlates using latent factors from each model. I also found some clustering of measurement error and variation in the dimensionality of political trust between democratic and autocratic portions of the sample. On some measurement parameters, therefore, respondents in diverse cultures and regime types do not have equivalent understandings of political trust. The findings offer both optimism and a note of caution for researchers using political trust measures in cross-regime contexts.

  16. Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker

    Directory of Open Access Journals (Sweden)

    Ahmad Samer Wazan

    2017-01-01

    Full Text Available A Public Key Infrastructure (PKI is considered one of the most important techniques used to propagate trust in authentication over the Internet. This technology is based on a trust model defined by the original X.509 (1988 standard and is composed of three entities: the certification authority (CA, the certificate holder (or subject, and the Relying Party (RP. The CA plays the role of a trusted third party between the certificate holder and the RP. In many use cases, this trust model has worked successfully. However, we argue that the application of this model on the Internet implies that web users need to depend on almost anyone in the world in order to use PKI technology. Thus, we believe that the current TLS system is not fit for purpose and must be revisited as a whole. In response, the latest draft edition of X.509 has proposed a new trust model by adding new entity called the Trust Broker (TB. In this paper, we present an implementation approach that a Trust Broker could follow in order to give RPs trust information about a CA by assessing the quality of its issued certificates. This is related to the quality of the CA’s policies and procedures and its commitment to them. Finally, we present our Trust Broker implementation that demonstrates how RPs can make informed decisions about certificate holders in the context of the global web, without requiring large processing resources themselves.

  17. Online trust building through third party trust transfer and third party protection

    Science.gov (United States)

    Wandoko, Wanda; Saleh Abbas, Bahtiar; Budiastuti, Dyah; Kosala, Raymond

    2017-03-01

    The primary objective of this research is to develop an online trust building mechanism for SME (Small Medium Enterprise). Trust is very important in e-commerce. The nature of online shopping has a greater uncertainty than offline shopping. Seeing as there is an uncertainty that can produce risks, a prospective buyer’s trust is needed. A lot of people’s unwillingness to shop online is caused by their lack of trust toward e-commerce. E-commerce is said to be one of the ways for SME to compete with bigger companies. However, building trust requires immense time and cost. SME with limited resources may experience difficulties in building trust just with their own resources. Base on literature research that needs to be validated in next research, we found that trust can be built through trust transfer from the reputable and well-known trust-mark issuer, and third party protection such as escrow account service and credit card issuer.

  18. Statis Program Analysis for Reliable, Trusted Apps

    Science.gov (United States)

    2017-02-01

    devices. App stores also provide a tempting vector for an attacker. An attacker can take advantage of bugdoors (software defects that permit...STATIC PROGRAM ANALYSIS FOR RELIABLE, TRUSTED APPS UNIVERSITY OF WASHINGTON FEBRUARY 2017 FINAL TECHNICAL REPORT APPROVED FOR PUBLIC RELEASE...STATIC PROGRAM ANALYSIS FOR RELIABLE, TRUSTED APPS 5a. CONTRACT NUMBER 5b. GRANT NUMBER FA8750-12-2-0107 5c. PROGRAM ELEMENT NUMBER 61101E 6. AUTHOR

  19. Social Trust and the Growth of Schooling

    DEFF Research Database (Denmark)

    Bjørnskov, Christian

    The paper develops a simple model to exemplify how social trust might affect the growth of schooling through lowering transaction costs. In a sample of 52 countries, the paper thereafter provides empirical evidence that trust has indeed led to faster growth of schooling in the period 1960......-2000. The findings are robust to the inclusion of a set of control variables and being estimated using an instrumental variables approach...

  20. Social Trust and the Growth of Schooling

    DEFF Research Database (Denmark)

    Bjørnskov, Christian

    2009-01-01

    The paper develops a simple model to examine how social trust might affect the growth of schooling through lowering transaction costs associated with employing educated individuals. In a sample of 52 countries, the paper thereafter provides empirical evidence that trust has led to faster growth...... of schooling in the period 1960-2000. The findings are robust to the inclusion of a set of control variables and being estimated using an instrumental variables approach....

  1. Delaying gratification depends on social trust

    OpenAIRE

    Laura eMichaelson; Alejandro ede la Vega; Christopher eChatham; Yuko eMunakata

    2013-01-01

    Delaying gratification is hard, yet predictive of important life outcomes, such as academic achievement and physical health. Prominent theories focus on the role of self-control, hypersensitivity to immediate rewards, and the cost of time spent waiting. However, delaying gratification may also require trust in people delivering future rewards as promised. To test the role of social trust, participants were presented with character vignettes and faces that varied in trustworthiness, and the...

  2. Trust: Implications for the Army Profession

    Science.gov (United States)

    2013-10-01

    with the frameworks to understand trust and do not have the language to discuss it effec- tively. The lack of understanding is most acute when...members expressed less trust in elected or appointed civilian leaders.11 The Army Profession study concluded this sec- tion of the report, saying...mission at risk. Army culture lauds leadership and eschews management descrip- tors in the cultural idioms used in performance appraisals, awards

  3. Building Trust-Based Sustainable Networks

    Science.gov (United States)

    2013-06-05

    influence relationships among entities? ■ What behaviors affect trust and sustainability (e.g., altruism , reciprocation, cooperation)? Based on these...addition, altruistic behavior can trigger the reciprocal altruistic relationship, the so called “reciprocal altruism .” In this rela- tionship, some... Prosocial Behavior , r. A. Hinde and J. Groebel, Eds. Cambridge univ. Press, 1991, pp. 27–48. [4] C. Castelfranchi and r. Falcone, TrustThe- ory: A

  4. The Relationship between Teamwork and Organizational Trust

    OpenAIRE

    Musab Işık; Kürşad Timuroğlu; Yussuf Aliyev

    2015-01-01

    The aim of this study is to investigate the relationship between teamwork and organizational trust. In the implementation section the data from the survey of 250 workers is employed in call centers in Erzurum by using relevant statistical methods. Consequently, it is found that there is a positive and significant relationship between teamwork and organizational trust. Thus, the hypothesis of the study is supported as it was expected. Besides, it is found that there are positive and significan...

  5. A Model of Trusted Connection Architecture

    OpenAIRE

    Zhang Xun; Wang Zhihao; Zhi Yong; Yuan Hui

    2017-01-01

    According to that traditional trusted network connection architecture (TNC) has limitations on dynamic network environment and the user behavior support, we develop TCA to propose a trusted connection architecture supporting behavior measurement (TCA-SBM), besides, the structure diagram of network architecture is given. Through introducing user behavior measure elements, TCA-SBM can conduct measurement on the whole network in time dimension periodically, and refine the measurement on network ...

  6. The perfect maths lesson

    CERN Document Server

    Loynd, Ian

    2014-01-01

    The Perfect (Ofsted) Maths Lesson recognises that teaching is hard and that, although no teacher is perfect, their lessons can be. Drawing on his experience as a secondary maths teacher and assistant head teacher Ian Loynd provides practical ideas and common-sense methods that can help every teacher to be outstanding, and uncovers the essential strategies that help teachers appear to walk on water.

  7. Interpersonal trust and empathy in nurse-nurse relationships.

    Science.gov (United States)

    Northouse, P G

    1979-01-01

    The specific purpose of a study that examined interpersonal communication in ongoing nurse-nurse dyads was to ascertain the nature of the relationship between interpersonal trust and empathy in nurse-nurse interaction. Analysis of questionnaire data collected from a sample of 36 diploma school nursing instructors indicated slight correlations between specific trust and general trust and between general trust and empathy. A strong negative correlation was found between specific trust and empathy. Discussion centered on an explanation for the inverse relationship between specific trust and empathy and a proposed model for how trust functions in ongoing nurse-nurse dyads.

  8. Analysing Trust Transitivity and The Effects of Unknown Dependence

    Directory of Open Access Journals (Sweden)

    Touhid Bhuiyan

    2010-03-01

    Full Text Available Trust can be used to improve online automated recommendation within a given domain. Trust transitivity is used to make it successful. But trust transitivity has different interpretations. Trust and trust transitivity; both are the human mental phenomenon and for this reason, there is no such thing as objective transitivity. Trust transitivity and trust fusion both are important elements in computational trust. This paper analyses the parameter dependence problem in trust transitivity and proposes some definitions considering the effects of base rate. In addition, it also proposes belief functions based on subjective logic to analyse trust transitivity of three specified cases with sensitive and insensitive based rate. Then it presents a quantitative analysis of the effects of unknown dependence problem in an interconnected network environment; such Internet.

  9. Parochial trust and cooperation across 17 societies.

    Science.gov (United States)

    Romano, Angelo; Balliet, Daniel; Yamagishi, Toshio; Liu, James H

    2017-11-28

    International challenges such as climate change, poverty, and intergroup conflict require countries to cooperate to solve these complex problems. However, the political tide in many countries has shifted inward, with skepticism and reluctance to cooperate with other countries. Thus, cross-societal investigations are needed to test theory about trust and cooperation within and between groups. We conducted an experimental study in 17 countries designed to test several theories that explain why, who, and where people trust and cooperate more with ingroup members, compared with outgroup members. The experiment involved several interactions in the trust game, either as a trustor or trustee. We manipulated partner group membership in the trust game (ingroup, outgroup, or unknown) and if their reputation was at stake during the interaction. In addition to the standard finding that participants trust and cooperate more with ingroup than outgroup members, we obtained findings that reputational concerns play a decisive role for promoting trust and cooperation universally across societies. Furthermore, men discriminated more in favor of their ingroup than women. Individual differences in cooperative preferences, as measured by social value orientation, predicted cooperation with both ingroup and outgroup members. Finally, we did not find support for three theories about the cross-societal conditions that influence the degree of ingroup favoritism observed across societies (e.g., material security, religiosity, and pathogen stress). We discuss the implications for promoting cooperation within and between countries. Copyright © 2017 the Author(s). Published by PNAS.

  10. 40 CFR 261.39 - Conditional Exclusion for Used, Broken Cathode Ray Tubes (CRTs) and Processed CRT Glass...

    Science.gov (United States)

    2010-07-01

    ... Cathode Ray Tubes (CRTs) and Processed CRT Glass Undergoing Recycling. 261.39 Section 261.39 Protection of... (CRTs) and Processed CRT Glass Undergoing Recycling. Used, broken CRTs are not solid wastes if they meet... CRT glass (including fine solid materials). (2) Labeling. Each container in which the used, broken CRT...

  11. Relationship between Broken Homes and Academic Achievement of Secondary School Students in Oredo Local Government Area of Edo State, Nigeria

    Science.gov (United States)

    Alika, Henrietta Ijeoma; Edosa, Ogboro Samson

    2012-01-01

    The study investigated the relationship between broken homes and academic achievement of students. Three research hypotheses were formulated to guide the study. The study was correlational because the study sought to establish the extent of relationship between broken homes and academic achievement. The statistical method used in analyzing the…

  12. Specifics of interpersonal trust among people with different gender identities

    OpenAIRE

    Zinchenko, Yury P.; Olga Yu. Zotova; Lyudmila V. Tarasova

    2017-01-01

    Background. This study addresses a current problem relating to trust and the identification of gender differences in trust/mistrust manifestation. Gender identity is associated with cultural stereotypes and social roles, which facilitate the formation of trust in people. It acts as a significant integral meaning-based component of an individual’s “I”- conception, which contributes to the formation of trust in himself and the world around him. Objective. To study features of trust/mistrus...

  13. Interpersonal Trust across Six Asia-Pacific Countries: Testing and Extending the ‘High Trust Society’ and ‘Low Trust Society’ Theory

    Science.gov (United States)

    Ward, Paul R.; Mamerow, Loreen; Meyer, Samantha B.

    2014-01-01

    Background Trust is regarded as a necessary component for the smooth running of society, although societal and political modernising processes have been linked to an increase in mistrust, potentially signalling social and economic problems. Fukuyama developed the notion of ‘high trust’ and ‘low trust’ societies, as a way of understanding trust within different societies. The purpose of this paper is to empirically test and extend Fukuyama’s theory utilising data on interpersonal trust in Taiwan, Hong Kong, South Korea, Japan, Australia and Thailand. This paper focuses on trust in family, neighbours, strangers, foreigners and people with a different religion. Methods Cross-sectional surveys were undertaken in 2009–10, with an overall sample of 6331. Analyses of differences in overall levels of trust between countries were undertaken using Chi square analyses. Multivariate binomial logistic regression analysis was undertaken to identify socio-demographic predictors of trust in each country. Results Our data indicate a tripartite trust model: ‘high trust’ in Australia and Hong Kong; ‘medium trust’ in Japan and Taiwan; and ‘low trust’ in South Korea and Thailand. Trust in family and neighbours were very high across all countries, although trust in people with a different religion, trust in strangers and trust in foreigners varied considerably between countries. The regression models found a consistent group of subpopulations with low trust across the countries: people on low incomes, younger people and people with poor self-rated health. The results were conflicting for gender: females had lower trust in Thailand and Hong Kong, although in Australia, males had lower trust in strangers, whereas females had lower trust in foreigners. Conclusion This paper identifies high, medium and low trust societies, in addition to high and low trusting population subgroups. Our analyses extend the seminal work of Fukuyama, providing both corroboration and

  14. Perceptions of trust in physician-managers.

    Science.gov (United States)

    Cregård, Anna; Eriksson, Nomie

    2015-01-01

    The purpose of this paper is to explore the dual role of physician-managers through an examination of perceptions of trust and distrust in physician-managers. The healthcare sector needs physicians to lead. Physicians in part-time managerial positions who continue their medical practice are called part-time physician-managers. This paper explores this dual role through an examination of perceptions of trust and distrust in physician-managers. The study takes a qualitative research approach in which interviews and focus group discussions with physician-managers and nurse-managers provide the empirical data. An analytical model, with the three elements of ability, benevolence and integrity, was used in the analysis of trust and distrust in physician-managers. The respondents (physician-managers and nurse-managers) perceived both an increase and a decrease in physicians' trust in the physician-managers. Because elements of distrust were more numerous and more severe than elements of trust, the physician-managers received negative perceptions of their role. This paper's findings are based on perceptions of perceptions. The physicians were not interviewed on their trust and distrust of physician-managers. The healthcare sector must pay attention to the diverse expectations of the physician-manager role that is based on both managerial and medical logics. Hospital management should provide proper support to physician-managers in their dual role to ensure their willingness to continue to assume managerial responsibilities. The paper takes an original approach in its research into the dual role of physician-managers who work under two conflicting logics: the medical logic and the managerial logic. The focus on perceived trust and distrust in physician-managers is a new perspective on this complicated role.

  15. Broken Symmetry

    CERN Multimedia

    CERN. Geneva

    2011-01-01

    - The discovery of subatomic structures and of the concomitant weak and strong short-range forces raised the question of how to cope with short-range forces in relativistic quantum field theory. The Fermi theory of weak interactions, formulated in terms of point-like current-current interaction, was well-defined in lowest order perturbation theory and accounted for existing experimental data.However, it was inconsistent in higher orders because of uncontrollable divergent quant...

  16. Broken Leg

    Science.gov (United States)

    ... completely. This is particularly common in an open fracture of your tibia because of lower blood flow to this bone. ... home. Accessed March 10, 2014. Fields KB. Stress fractures of the tibia and fibula. http://www.uptodate.com/home. Accessed ...

  17. Broken Leg

    Science.gov (United States)

    ... been weakened by a condition such as osteoporosis. Risk factors Stress fractures are often the result of repetitive ... the joint and poor bone alignment can cause osteoarthritis years later. If your leg starts to hurt ...

  18. Broken bone

    Science.gov (United States)

    ... McCormack RG, Lopez CA. Commonly encountered fractures in sports medicine. In: Miller MD, Thompson SR, eds. DeLee and Drez's Orthopaedic Sports Medicine . 4th ed. Philadelphia, PA: Elsevier Saunders; 2015:chap ...

  19. Broken Arm

    Science.gov (United States)

    ... can cause arthritis there years later. Stiffness. The immobilization required to heal a fracture in the upper ... if you notice numbness or circulation problems. Compartment syndrome. Excessive swelling of the injured arm can cut ...

  20. Broken Nose

    Science.gov (United States)

    ... professional medical treatment. Your doctor may recommend simple self-care measures, such as using ice on the area and taking over-the-counter pain medications. Fixing displacements and breaks Your doctor may be ...