WorldWideScience

Sample records for network trust amanet

  1. Trust in Anonymity Networks

    Science.gov (United States)

    Sassone, Vladimiro; Hamadou, Sardaouna; Yang, Mu

    Anonymity is a security property of paramount importance, as we move steadily towards a wired, online community. Its import touches upon subjects as different as eGovernance, eBusiness and eLeisure, as well as personal freedom of speech in authoritarian societies. Trust metrics are used in anonymity networks to support and enhance reliability in the absence of verifiable identities, and a variety of security attacks currently focus on degrading a user's trustworthiness in the eyes of the other users. In this paper, we analyse the privacy guarantees of the Crowds anonymity protocol, with and without onion forwarding, for standard and adaptive attacks against the trust level of honest users.

  2. Trust Transitivity in Social Networks

    Science.gov (United States)

    Richters, Oliver; Peixoto, Tiago P.

    2011-01-01

    Non-centralized recommendation-based decision making is a central feature of several social and technological processes, such as market dynamics, peer-to-peer file-sharing and the web of trust of digital certification. We investigate the properties of trust propagation on networks, based on a simple metric of trust transitivity. We investigate analytically the percolation properties of trust transitivity in random networks with arbitrary in/out-degree distributions, and compare with numerical realizations. We find that the existence of a non-zero fraction of absolute trust (i.e. entirely confident trust) is a requirement for the viability of global trust propagation in large systems: The average pair-wise trust is marked by a discontinuous transition at a specific fraction of absolute trust, below which it vanishes. Furthermore, we perform an extensive analysis of the Pretty Good Privacy (PGP) web of trust, in view of the concepts introduced. We compare different scenarios of trust distribution: community- and authority-centered. We find that these scenarios lead to sharply different patterns of trust propagation, due to the segregation of authority hubs and densely-connected communities. While the authority-centered scenario is more efficient, and leads to higher average trust values, it favours weakly-connected “fringe” nodes, which are directly trusted by authorities. The community-centered scheme, on the other hand, favours nodes with intermediate in/out-degrees, in detriment of the authorities and its “fringe” peers. PMID:21483683

  3. Trust transitivity in social networks.

    Directory of Open Access Journals (Sweden)

    Oliver Richters

    Full Text Available Non-centralized recommendation-based decision making is a central feature of several social and technological processes, such as market dynamics, peer-to-peer file-sharing and the web of trust of digital certification. We investigate the properties of trust propagation on networks, based on a simple metric of trust transitivity. We investigate analytically the percolation properties of trust transitivity in random networks with arbitrary in/out-degree distributions, and compare with numerical realizations. We find that the existence of a non-zero fraction of absolute trust (i.e. entirely confident trust is a requirement for the viability of global trust propagation in large systems: The average pair-wise trust is marked by a discontinuous transition at a specific fraction of absolute trust, below which it vanishes. Furthermore, we perform an extensive analysis of the Pretty Good Privacy (PGP web of trust, in view of the concepts introduced. We compare different scenarios of trust distribution: community- and authority-centered. We find that these scenarios lead to sharply different patterns of trust propagation, due to the segregation of authority hubs and densely-connected communities. While the authority-centered scenario is more efficient, and leads to higher average trust values, it favours weakly-connected "fringe" nodes, which are directly trusted by authorities. The community-centered scheme, on the other hand, favours nodes with intermediate in/out-degrees, in detriment of the authorities and its "fringe" peers.

  4. Modeling trust context in networks

    CERN Document Server

    Adali, Sibel

    2013-01-01

    We make complex decisions every day, requiring trust in many different entities for different reasons. These decisions are not made by combining many isolated trust evaluations. Many interlocking factors play a role, each dynamically impacting the others.? In this brief, 'trust context' is defined as the system level description of how the trust evaluation process unfolds.Networks today are part of almost all human activity, supporting and shaping it. Applications increasingly incorporate new interdependencies and new trust contexts. Social networks connect people and organizations throughout

  5. Quantifying and Qualifying Trust: Spectral Decomposition of Trust Networks

    NARCIS (Netherlands)

    Pavlovic, Dusko

    In a previous FAST paper, I presented a quantitative model of the process of trust building, and showed that trust is accumulated like wealth: the rich get richer. This explained the pervasive phenomenon of adverse selection of trust certificates, as well as the fragility of trust networks in

  6. Collaborative Trust Networks in Engineering Design Adaptation

    DEFF Research Database (Denmark)

    Atkinson, Simon Reay; Maier, Anja; Caldwell, Nicholas

    2011-01-01

    ); applying the Change Prediction Method (CPM) tool. It posits the idea of the ‘Networks-in-Being’ with varying individual and collective characteristics. [Social] networks are considered to facilitate information exchange between actors. At the same time, networks failing to provide trusted-information can...... collaboration and decision-making by using the change prediction method as a way of scoping information propagation between actors within a network....... hinder effective communication and collaboration. Different combinations of trust may therefore improve or impair the likelihood of information flow, transfer and subsequent action (cause and effect). This paper investigates how analysing different types of network-structures-in-being can support...

  7. Dynamic Trust Management for Mobile Networks and Its Applications

    Science.gov (United States)

    Bao, Fenye

    2013-01-01

    Trust management in mobile networks is challenging due to dynamically changing network environments and the lack of a centralized trusted authority. In this dissertation research, we "design" and "validate" a class of dynamic trust management protocols for mobile networks, and demonstrate the utility of dynamic trust management…

  8. Modelling Users` Trust in Online Social Networks

    Directory of Open Access Journals (Sweden)

    Iacob Cătoiu

    2014-02-01

    Full Text Available Previous studies (McKnight, Lankton and Tripp, 2011; Liao, Lui and Chen, 2011 have shown the crucial role of trust when choosing to disclose sensitive information online. This is the case of online social networks users, who must disclose a certain amount of personal data in order to gain access to these online services. Taking into account privacy calculus model and the risk/benefit ratio, we propose a model of users’ trust in online social networks with four variables. We have adapted metrics for the purpose of our study and we have assessed their reliability and validity. We use a Partial Least Squares (PLS based structural equation modelling analysis, which validated all our initial assumptions, indicating that our three predictors (privacy concerns, perceived benefits and perceived risks explain 48% of the variation of users’ trust in online social networks, the resulting variable of our study. We also discuss the implications and further research opportunities of our study.

  9. Learning to trust : network effects through time.

    NARCIS (Netherlands)

    Barrera, D.; Bunt, G. van de

    2009-01-01

    This article investigates the effects of information originating from social networks on the development of interpersonal trust relations in the context of a dialysis department of a Dutch medium-sized hospital. Hypotheses on learning effects are developed from existing theories and tested using

  10. Learning to trust: network effects through time

    NARCIS (Netherlands)

    Barrera, D.; van de Bunt, G

    2009-01-01

    This article investigates the effects of information originating from social networks on the development of interpersonal trust relations in the context of a dialysis department of a Dutch medium-sized hospital. Hypotheses on learning effects are developed from existing theories and tested using

  11. An Efficient Dynamic Trust Evaluation Model for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Zhengwang Ye

    2017-01-01

    Full Text Available Trust evaluation is an effective method to detect malicious nodes and ensure security in wireless sensor networks (WSNs. In this paper, an efficient dynamic trust evaluation model (DTEM for WSNs is proposed, which implements accurate, efficient, and dynamic trust evaluation by dynamically adjusting the weights of direct trust and indirect trust and the parameters of the update mechanism. To achieve accurate trust evaluation, the direct trust is calculated considering multitrust including communication trust, data trust, and energy trust with the punishment factor and regulating function. The indirect trust is evaluated conditionally by the trusted recommendations from a third party. Moreover, the integrated trust is measured by assigning dynamic weights for direct trust and indirect trust and combining them. Finally, we propose an update mechanism by a sliding window based on induced ordered weighted averaging operator to enhance flexibility. We can dynamically adapt the parameters and the interactive history windows number according to the actual needs of the network to realize dynamic update of direct trust value. Simulation results indicate that the proposed dynamic trust model is an efficient dynamic and attack-resistant trust evaluation model. Compared with existing approaches, the proposed dynamic trust model performs better in defending multiple malicious attacks.

  12. Trust and Manipulation in Social Networks

    OpenAIRE

    Forster, Manuel; Mauleon, Ana; Vannetelbosch, Vincent

    2013-01-01

    URL des Documents de travail : http://centredeconomiesorbonne.univ-paris1.fr/bandeau-haut/document-de-travail/; Documents de travail du Centre d'Economie de la Sorbonne 2013.65 - ISSN : 1955-611X; We investigate the role of manipulation in a model of opinion formation where agents have opinions about some common question of interest. Agents repeatedly communicate with their neighbors in the social network, can exert some effort to manipulate the trust of others, and update their opinions taki...

  13. Trust framework for a secured routing in wireless sensor network

    OpenAIRE

    Ouassila Hoceini; Saïd Talbi; Rachida Aoudjit

    2015-01-01

    Traditional techniques to eliminate insider attacks developed for wired and wireless ad hoc networks are not well suited for wireless sensors networks due to their resource constraints nature. In order to protect WSNs against malicious and selfish behavior, some trust-based systems have recently been modeled. The resource efficiency and dependability of a trust system are the most fundamental requirements for any wireless sensor network (WSN). In this paper, we propose a Trust Framework for a...

  14. Wireless next generation networks a virtue-based trust model

    CERN Document Server

    Harvey, Melissa

    2014-01-01

    This SpringerBrief proposes a trust model motivated by virtue epistemology, addressing the need for a more efficient and flexible trust model for wireless next generation networks. This theory of trust simplifies the computation and communication overhead of strictly cognitive-computational models of trust. Both the advantages and the challenges of virtue-based trust models are discussed. This brief offers new research and a general theory of rationality that enables users to interpret trust and reason as complementary mechanisms that guide our rational conduct at two different epistemic level

  15. ReTrust: attack-resistant and lightweight trust management for medical sensor networks.

    Science.gov (United States)

    He, Daojing; Chen, Chun; Chan, Sammy; Bu, Jiajun; Vasilakos, Athanasios V

    2012-07-01

    Wireless medical sensor networks (MSNs) enable ubiquitous health monitoring of users during their everyday lives, at health sites, without restricting their freedom. Establishing trust among distributed network entities has been recognized as a powerful tool to improve the security and performance of distributed networks such as mobile ad hoc networks and sensor networks. However, most existing trust systems are not well suited for MSNs due to the unique operational and security requirements of MSNs. Moreover, similar to most security schemes, trust management methods themselves can be vulnerable to attacks. Unfortunately, this issue is often ignored in existing trust systems. In this paper, we identify the security and performance challenges facing a sensor network for wireless medical monitoring and suggest it should follow a two-tier architecture. Based on such an architecture, we develop an attack-resistant and lightweight trust management scheme named ReTrust. This paper also reports the experimental results of the Collection Tree Protocol using our proposed system in a network of TelosB motes, which show that ReTrust not only can efficiently detect malicious/faulty behaviors, but can also significantly improve the network performance in practice.

  16. On the Optimality of Trust Network Analysis with Subjective Logic

    Directory of Open Access Journals (Sweden)

    PARK, Y.

    2014-08-01

    Full Text Available Building and measuring trust is one of crucial aspects in e-commerce, social networking and computer security. Trust networks are widely used to formalize trust relationships and to conduct formal reasoning of trust values. Diverse trust network analysis methods have been developed so far and one of the most widely used schemes is TNA-SL (Trust Network Analysis with Subjective Logic. Recent papers claimed that TNA-SL always finds the optimal solution by producing the least uncertainty. In this paper, we present some counter-examples, which imply that TNA-SL is not an optimal algorithm. Furthermore, we present a probabilistic algorithm in edge splitting to minimize uncertainty.

  17. Trust framework for a secured routing in wireless sensor network

    Directory of Open Access Journals (Sweden)

    Ouassila Hoceini

    2015-11-01

    Full Text Available Traditional techniques to eliminate insider attacks developed for wired and wireless ad hoc networks are not well suited for wireless sensors networks due to their resource constraints nature. In order to protect WSNs against malicious and selfish behavior, some trust-based systems have recently been modeled. The resource efficiency and dependability of a trust system are the most fundamental requirements for any wireless sensor network (WSN. In this paper, we propose a Trust Framework for a Secured Routing in Wireless Sensor Network (TSR scheme, which works with clustered networks. This approach can effectively reduce the cost of trust evaluation and guarantee a better selection of safest paths that lead to the base station. Theoretical as well as simulation results show that our scheme requires less communication overheads and consumes less energy as compared to the current typical trust systems for WSNs. Moreover, it detects selfish and defective nodes and prevents us of insider attacks

  18. Trust Networks on the Semantic Web

    National Research Council Canada - National Science Library

    Golbeck, Jennifer; Parisa, Bijan; Hendler, James

    2006-01-01

    The so-called "Web of Trust" is one of the ultimate goals of the Semantic Web. Research on the topic of trust in this domain has focused largely on digital signatures, certificates, and authentication...

  19. Producing Videotape Programs for Computer Training: An Example with AMA/NET

    OpenAIRE

    Novey, Donald W.

    1990-01-01

    To facilitate user proficiency with AMA/Net, an 80-minute training videotape has been produced. The production was designed to use videotape's advantages, where information and emotion are combined; and to accommodate its chief disadvantage, lack of resolution for fine text, with close-ups and graphics. Content of the videotape was conceived, outlined, demonstrated with simultaneous text capture, edited into script form, narration added, and scripts marked for videotaping and narrating. Video...

  20. Producing Videotape Programs for Computer Training: An Example with AMA/NET

    OpenAIRE

    Novey, Donald W.

    1990-01-01

    To facilitate user proficiency with AMA/Net, an 80-minute training videotape has been produced. The production was designed to use videotape's advantages, where information and emotion are combined; and to accommodate its chief disadvantage, lack of resolution for fine text, with close-ups and graphics. Content of the videotape was conceived, out-lined, demonstrated with simultaneous text capture, edited into script form, narration added, and scripts marked for videotaping and narrating. Vide...

  1. A Robust Trust Establishment Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Farruh Ishmanov

    2015-03-01

    Full Text Available Security techniques like cryptography and authentication can fail to protect a network once a node is compromised. Hence, trust establishment continuously monitors and evaluates node behavior to detect malicious and compromised nodes. However, just like other security schemes, trust establishment is also vulnerable to attack. Moreover, malicious nodes might misbehave intelligently to trick trust establishment schemes. Unfortunately, attack-resistance and robustness issues with trust establishment schemes have not received much attention from the research community. Considering the vulnerability of trust establishment to different attacks and the unique features of sensor nodes in wireless sensor networks, we propose a lightweight and robust trust establishment scheme. The proposed trust scheme is lightweight thanks to a simple trust estimation method. The comprehensiveness and flexibility of the proposed trust estimation scheme make it robust against different types of attack and misbehavior. Performance evaluation under different types of misbehavior and on-off attacks shows that the detection rate of the proposed trust mechanism is higher and more stable compared to other trust mechanisms.

  2. A survey of trust, control and information in networks

    DEFF Research Database (Denmark)

    Jakobsen, Morten

    This paper focuses on which characteristics managers take into account when they choose and evaluate business partners, and the interrelationship between the constructs trust, control and information. The paper is based on a survey which includes 101 small and middle-sized manufacturing companies...... in Denmark. The results show that managers frequently express that trust is an important aspect of a good relationship. Also product-related attributes and relational attributes have a bearing in a network setting. On the other hand, no significant correlation between neither trust and control nor trust...

  3. A Secure Trust Establishment Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Farruh Ishmanov

    2014-01-01

    Full Text Available Trust establishment is an important tool to improve cooperation and enhance security in wireless sensor networks. The core of trust establishment is trust estimation. If a trust estimation method is not robust against attack and misbehavior, the trust values produced will be meaningless, and system performance will be degraded. We present a novel trust estimation method that is robust against on-off attacks and persistent malicious behavior. Moreover, in order to aggregate recommendations securely, we propose using a modified one-step M-estimator scheme. The novelty of the proposed scheme arises from combining past misbehavior with current status in a comprehensive way. Specifically, we introduce an aggregated misbehavior component in trust estimation, which assists in detecting an on-off attack and persistent malicious behavior. In order to determine the current status of the node, we employ previous trust values and current measured misbehavior components. These components are combined to obtain a robust trust value. Theoretical analyses and evaluation results show that our scheme performs better than other trust schemes in terms of detecting an on-off attack and persistent misbehavior.

  4. Building Trust-Based Sustainable Networks

    Science.gov (United States)

    2013-06-05

    influence relationships among entities? ■ What behaviors affect trust and sustainability (e.g., altruism , reciprocation, cooperation)? Based on these...addition, altruistic behavior can trigger the reciprocal altruistic relationship, the so called “reciprocal altruism .” In this rela- tionship, some... Prosocial Behavior , r. A. Hinde and J. Groebel, Eds. Cambridge univ. Press, 1991, pp. 27–48. [4] C. Castelfranchi and r. Falcone, TrustThe- ory: A

  5. Protru: Leveraging Provenance to Enhance Network Trust in a Wireless Sensor Network

    Science.gov (United States)

    Dogan, Gulustan

    2013-01-01

    Trust can be an important component of wireless sensor networks for believability of the produced data and historical value is a crucial asset in deciding trust of the data. A node's trust can change over time after its initial deployment due to various reasons such as energy loss, environmental conditions or exhausting sources. Provenance can…

  6. Security management based on trust determination in cognitive radio networks

    Science.gov (United States)

    Li, Jianwu; Feng, Zebing; Wei, Zhiqing; Feng, Zhiyong; Zhang, Ping

    2014-12-01

    Security has played a major role in cognitive radio networks. Numerous researches have mainly focused on attacking detection based on source localization and detection probability. However, few of them took the penalty of attackers into consideration and neglected how to implement effective punitive measures against attackers. To address this issue, this article proposes a novel penalty mechanism based on cognitive trust value. The main feature of this mechanism has been realized by six functions: authentication, interactive, configuration, trust value collection, storage and update, and punishment. Data fusion center (FC) and cluster heads (CHs) have been put forward as a hierarchical architecture to manage trust value of cognitive users. Misbehaving users would be punished by FC by declining their trust value; thus, guaranteeing network security via distinguishing attack users is of great necessity. Simulation results verify the rationality and effectiveness of our proposed mechanism.

  7. Generating Predictive Movie Recommendations from Trust in Social Networks

    National Research Council Canada - National Science Library

    Golbeck, Jennifer

    2006-01-01

    .... Using the FilmTrust system as a foundation, they show that these recommendations are more accurate than other techniques when the user's opinions about a film are divergent from the average. They discuss this technique both as an application of social network analysis and how it suggests other analyses that can be performed to help improve collaborative filtering algorithms of all types.

  8. Generating private recommendations in a social trust network

    NARCIS (Netherlands)

    Erkin, Z.; Veugen, P.J.M.; Lagendijk, R.L.

    2011-01-01

    Recommender systems have become increasingly important in e-commerce as they can guide customers with finding personalized services and products. A variant of recommender systems that generates recommendations from a set of trusted people is recently getting more attention in social networks.

  9. TruSDN: Bootstrapping Trust in Cloud Network Infrastructure

    OpenAIRE

    Paladi, Nicolae; Gehrmann, Christian

    2016-01-01

    Software-Defined Networking (SDN) is a novel architectural model for cloud network infrastructure, improving resource utilization, scalability and administration. SDN deployments increasingly rely on virtual switches executing on commodity operating systems with large code bases, which are prime targets for adversaries attacking the net- work infrastructure. We describe and implement TruSDN, a framework for bootstrapping trust in SDN infrastructure using Intel Software Guard Extensions (SGX),...

  10. Proximity-Based Trust Inference for Mobile Social Networking

    OpenAIRE

    Seyedi A.; Saadi R.; Issarny V.

    2011-01-01

    Part 3: Short Papers; International audience; The growing trend to social networking and increased preva- lence of new mobile devices lead to the emergence of mobile social networking applications where users are able to share experience in an impromptu way as they move. However, this is at risk for mobile users since they may not have any knowledge about the users they socially connect with. Trust management then appears as a promising decision support for mobile users in establishing social...

  11. Leveraging Social Links for Trust and Privacy in Networks

    Science.gov (United States)

    Cutillo, Leucio Antonio; Molva, Refik; Strufe, Thorsten

    Existing on-line social networks (OSN) such as Facebook suffer from several weaknesses regarding privacy and security due to their inherent handling of personal data. As pointed out in [4], a preliminary analysis of existing OSNs shows that they are subject to a number of vulnerabilities, ranging from cloning legitimate users to sybil attacks through privacy violations. Starting from these OSN vulnerabilities as the first step of a broader research activity, we came up with a new approach that is very promising in re-visiting security and privacy problems in distributed systems and networks. We suggest a solution that both aims at avoiding any centralized control and leverages on the real life trust between users, that is part of the social network application itself. An anonymization technique based on multi-hop routing among trusted nodes guarantees privacy in data access and, generally speaking, in all the OSN operations.

  12. Improved Recommendations Based on Trust Relationships in Social Networks

    Directory of Open Access Journals (Sweden)

    Hao Tian

    2017-03-01

    Full Text Available In order to alleviate the pressure of information overload and enhance consumer satisfaction, personalization recommendation has become increasingly popular in recent years. As a result, various approaches for recommendation have been proposed in the past few years. However, traditional recommendation methods are still troubled with typical issues such as cold start, sparsity, and low accuracy. To address these problems, this paper proposed an improved recommendation method based on trust relationships in social networks to improve the performance of recommendations. In particular, we define trust relationship afresh and consider several representative factors in the formalization of trust relationships. To verify the proposed approach comprehensively, this paper conducted experiments in three ways. The experimental results show that our proposed approach leads to a substantial increase in prediction accuracy and is very helpful in dealing with cold start and sparsity.

  13. Modelling trading networks and the role of trust

    Science.gov (United States)

    Barrio, Rafael A.; Govezensky, Tzipe; Ruiz-Gutiérrez, Élfego; Kaski, Kimmo K.

    2017-04-01

    We present a simple dynamical model for describing trading interactions between agents in a social network by considering only two dynamical variables, namely money and goods or services, that are assumed conserved over the whole time span of the agents' trading transactions. A key feature of the model is that agent-to-agent transactions are governed by the price in units of money per goods, which is dynamically changing, and by a trust variable, which is related to the trading history of each agent. All agents are able to sell or buy, and the decision to do either has to do with the level of trust the buyer has in the seller, the price of the goods and the amount of money and goods at the disposal of the buyer. Here we show the results of extensive numerical calculations under various initial conditions in a random network of agents and compare the results with the available related data. In most cases the agreement between the model results and real data turns out to be fairly good, which allow us to draw some general conclusions as how different trading strategies could affect the distribution of wealth in different kinds of societies. Our calculations reveal the striking effects of trust in commercial relations, namely that trust makes trading links more robust and the wealth distribution more even as well as allows for the existence of a healthy middle class.

  14. Security and trust in online social networks

    CERN Document Server

    Carminati, Barbara; Viviani, Marco; Viviani, Marco; Carminati, Barbara

    2013-01-01

    The enormous success and diffusion that online social networks (OSNs) are encountering nowadays is vastly apparent. Users' social interactions now occur using online social media as communication channels; personal information and activities are easily exchanged both for recreational and business purposes in order to obtain social or economic advantages. In this scenario, OSNs are considered critical applications with respect to the security of users and their resources, for their characteristics alone: the large amount of personal information they manage, big economic upturn connected to thei

  15. Dynamic Trust Models between Users over Social Networks

    Science.gov (United States)

    2016-03-30

    and a set of user activities from Epinions, which is a social media site of product reviews and consumer reports. In Epinions, a user u can create a...mediators, and 4) to analyze activities among users based on a non- negative matrix factorization (NMF) method. By using the datasets of item review scores...analyzed evolution of trust networks in social media sites from a perspective of mediators. To this end, we proposed two stochastic models that

  16. TANDEM: A Trust-Based Agent Framework for Networked Decision Making

    Science.gov (United States)

    2015-09-10

    TANDEM: a trust -based agent framework for networked decision making Sibel Adalı1 • Kevin Chan2 • Jin-Hee Cho2 Published online: 10 September 2015...nodes and links in the net- work can have differing capacity, modeled by agents’ ability to accomplish tasks and their trust for each other. The trust ...offs in team performance and interaction between different parameters. Keywords Agent based modeling Networks Decision making Trust 1

  17. ABS-TrustSDN: An Agent-Based Simulator of Trust Strategies in Software-Defined Networks

    Directory of Open Access Journals (Sweden)

    Iván García-Magariño

    2017-01-01

    Full Text Available Software-defined networks (SDNs have become a mechanism to separate the control plane and the data plane in the communication in networks. SDNs involve several challenges around their security and their confidentiality. Ideally, SDNs should incorporate autonomous and adaptive systems for controlling the routing to be able to isolate network resources that may be malfunctioning or whose security has been compromised with malware. The current work introduces a novel agent-based framework that simulates SDN isolation protocols by means of trust and reputation models. This way, SDN programmers may estimate the repercussions of certain isolation protocols based on trust models before actually deploying the protocol into the network.

  18. Modelling of A Trust and Reputation Model in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Saurabh Mishra

    2015-09-01

    Full Text Available Security is the major challenge for Wireless Sensor Networks (WSNs. The sensor nodes are deployed in non controlled environment, facing the danger of information leakage, adversary attacks and other threats. Trust and Reputation models are solutions for this problem and to identify malicious, selfish and compromised nodes. This paper aims to evaluate varying collusion effect with respect to static (SW, dynamic (DW, static with collusion (SWC, dynamic with collusion (DWC and oscillating wireless sensor networks to derive the joint resultant of Eigen Trust Model. An attempt has been made for the same by comparing aforementioned networks that are purely dedicated to protect the WSNs from adversary attacks and maintain the security issues. The comparison has been made with respect to accuracy and path length and founded that, collusion for wireless sensor networks seems intractable with the static and dynamic WSNs when varied with specified number of fraudulent nodes in the scenario. Additionally, it consumes more energy and resources in oscillating and collusive environments.

  19. Trust recovery model of Ad Hoc network based on identity authentication scheme

    Science.gov (United States)

    Liu, Jie; Huan, Shuiyuan

    2017-05-01

    Mobile Ad Hoc network trust model is widely used to solve mobile Ad Hoc network security issues. Aiming at the problem of reducing the network availability caused by the processing of malicious nodes and selfish nodes in mobile Ad Hoc network routing based on trust model, an authentication mechanism based on identity authentication mobile Ad Hoc network is proposed, which uses identity authentication to identify malicious nodes, And trust the recovery of selfish nodes in order to achieve the purpose of reducing network congestion and improving network quality. The simulation results show that the implementation of the mechanism can effectively improve the network availability and security.

  20. Producing Videotape Programs for Computer Training: An Example with AMA/NET

    Science.gov (United States)

    Novey, Donald W.

    1990-01-01

    To facilitate user proficiency with AMA/Net, an 80-minute training videotape has been produced. The production was designed to use videotape's advantages, where information and emotion are combined; and to accommodate its chief disadvantage, lack of resolution for fine text, with close-ups and graphics. Content of the videotape was conceived, outlined, demonstrated with simultaneous text capture, edited into script form, narration added, and scripts marked for videotaping and narrating. Videotaping was performed with actual keyboard sounds for realism. The recording was divided into four areas: office mock-up, keyboard close-ups, scan-conversion and screen close-ups. Once the footage was recorded, it was logged and rough-edited. Care was taken to balance the pace of the program with visual stimulation and amount of narration. The final edit was performed as a culmination of all scripts, video materials and rough edit, with graphics and steady change of visual information offsetting the static nature of the screen display. Carefully planned video programs can be a useful and economical adjunct in the training process for online services.

  1. Trust Model of Wireless Sensor Networks and Its Application in Data Fusion.

    Science.gov (United States)

    Chen, Zhenguo; Tian, Liqin; Lin, Chuang

    2017-03-28

    In order to ensure the reliability and credibility of the data in wireless sensor networks (WSNs), this paper proposes a trust evaluation model and data fusion mechanism based on trust. First of all, it gives the model structure. Then, the calculation rules of trust are given. In the trust evaluation model, comprehensive trust consists of three parts: behavior trust, data trust, and historical trust. Data trust can be calculated by processing the sensor data. Based on the behavior of nodes in sensing and forwarding, the behavior trust is obtained. The initial value of historical trust is set to the maximum and updated with comprehensive trust. Comprehensive trust can be obtained by weighted calculation, and then the model is used to construct the trust list and guide the process of data fusion. Using the trust model, simulation results indicate that energy consumption can be reduced by an average of 15%. The detection rate of abnormal nodes is at least 10% higher than that of the lightweight and dependable trust system (LDTS) model. Therefore, this model has good performance in ensuring the reliability and credibility of the data. Moreover, the energy consumption of transmitting was greatly reduced.

  2. From Subjective Trust to Objective Trustworthiness in On-line Social Networks: Overview and Challenges

    Directory of Open Access Journals (Sweden)

    David Zejda

    2010-04-01

    Full Text Available Nowadays dozens of people share their content in the current Web 2.0 space, talk with friends in social networking sites such as Facebook and live on the Net in many other ways. They do all this quite naturally, forgetting the healthy cautiousness sometimes. In real life we rely on trusted people. Do we know how to reflect real-world trust mechanisms into on-line social software? In the article we focused to bring overview on state of the art in main ideas behind a trust processing in online social networking systems. What are common sources of subjective trust, how the trust emerges and what are the sources of trust dynamics? How can be trust captured into the systems, how can be explicit trust processed to infer indirect trust, the trust between users who do not know each other? And what are the ways to infer objective metrics of trust, the reputation or trustworthiness? Finally, we point out selected challenges related to the trust in current highly dynamic social networks.

  3. A Formal Model for Trust in Dynamic Networks

    DEFF Research Database (Denmark)

    Carbone, Marco; Nielsen, Mogens; Sassone, Vladimiro

    2003-01-01

    We propose a formal model of trust informed by the Global Computing scenario and focusing on the aspects of trust formation, evolution, and propagation. The model is based on a novel notion of trust structures which, building on concepts from trust management and domain theory, feature at the same...

  4. Towards Trust-based Cognitive Networks: A Survey of Trust Management for Mobile Ad Hoc Networks

    Science.gov (United States)

    2009-06-01

    destination.  Wormhole attack: A group of cooperating malicious nodes can pretend to connect two distant points in the network with a low-latency...communication link called wormhole link, causing disruptions in normal traffic load and flow.  Black hole attack: A malicious node, the so called

  5. A Cloud Theory-Based Trust Computing Model in Social Networks

    Directory of Open Access Journals (Sweden)

    Fengming Liu

    2016-12-01

    Full Text Available How to develop a trust management model and then to efficiently control and manage nodes is an important issue in the scope of social network security. In this paper, a trust management model based on a cloud model is proposed. The cloud model uses a specific computation operator to achieve the transformation from qualitative concepts to quantitative computation. Additionally, this can also be used to effectively express the fuzziness, randomness and the relationship between them of the subjective trust. The node trust is divided into reputation trust and transaction trust. In addition, evaluation methods are designed, respectively. Firstly, the two-dimension trust cloud evaluation model is designed based on node’s comprehensive and trading experience to determine the reputation trust. The expected value reflects the average trust status of nodes. Then, entropy and hyper-entropy are used to describe the uncertainty of trust. Secondly, the calculation methods of the proposed direct transaction trust and the recommendation transaction trust involve comprehensively computation of the transaction trust of each node. Then, the choosing strategies were designed for node to trade based on trust cloud. Finally, the results of a simulation experiment in P2P network file sharing on an experimental platform directly reflect the objectivity, accuracy and robustness of the proposed model, and could also effectively identify the malicious or unreliable service nodes in the system. In addition, this can be used to promote the service reliability of the nodes with high credibility, by which the stability of the whole network is improved.

  6. A context-sensitive trust model for online social networking

    CSIR Research Space (South Africa)

    Danny, MN

    2016-11-01

    Full Text Available of privacy attacks. In the quest to address this problem, this paper proposes a context-sensitive trust model. The proposed trust model was designed using fuzzy logic theory and implemented using MATLAB. Contrary to existing trust models, the context...

  7. The transformation of trust in China's alternative food networks: disruption, reconstruction, and development

    Directory of Open Access Journals (Sweden)

    Raymond Yu. Wang

    2015-06-01

    Full Text Available Food safety issues in China have received much scholarly attention, yet few studies systematically examined this matter through the lens of trust. More importantly, little is known about the transformation of different types of trust in the dynamic process of food production, provision, and consumption. We consider trust as an evolving interdependent relationship between different actors. We used the Beijing County Fair, a prominent ecological farmers' market in China, as an example to examine the transformation of trust in China's alternative food networks. We argue that although there has been a disruption of institutional trust among the general public since 2008 when the melamine-tainted milk scandal broke out, reconstruction of individual trust and development of organizational trust have been observed, along with the emergence and increasing popularity of alternative food networks. Based on more than six months of fieldwork on the emerging ecological agriculture sector in 13 provinces across China as well as monitoring of online discussions and posts, we analyze how various social factors - including but not limited to direct and indirect reciprocity, information, endogenous institutions, and altruism - have simultaneously contributed to the transformation of trust in China's alternative food networks. The findings not only complement current social theories of trust, but also highlight an important yet understudied phenomenon whereby informal social mechanisms have been partially substituting for formal institutions and gradually have been building trust against the backdrop of the food safety crisis in China.

  8. Using Trust to Establish a Secure Routing Model in Cognitive Radio Network.

    Science.gov (United States)

    Zhang, Guanghua; Chen, Zhenguo; Tian, Liqin; Zhang, Dongwen

    2015-01-01

    Specific to the selective forwarding attack on routing in cognitive radio network, this paper proposes a trust-based secure routing model. Through monitoring nodes' forwarding behaviors, trusts of nodes are constructed to identify malicious nodes. In consideration of that routing selection-based model must be closely collaborative with spectrum allocation, a route request piggybacking available spectrum opportunities is sent to non-malicious nodes. In the routing decision phase, nodes' trusts are used to construct available path trusts and delay measurement is combined for making routing decisions. At the same time, according to the trust classification, different responses are made specific to their service requests. By adopting stricter punishment on malicious behaviors from non-trusted nodes, the cooperation of nodes in routing can be stimulated. Simulation results and analysis indicate that this model has good performance in network throughput and end-to-end delay under the selective forwarding attack.

  9. On Tradeoffs between Trust Accuracy and Resource Consumption in Communications and Social Networks

    Science.gov (United States)

    2016-04-11

    sociological effects is a very complex problem. Elements of trust relationship dynamics in the communication network context can be adapted to...On Tradeoffs between Trust Accuracy and Resource Consumption in Communications and Social Networks Jin-Hee Cho, Kevin Chan, Ananthram Swami, Brian...effectively is critical in tactical networks in order to facilitate cooperation and decision making tasks as well as to meet system goals such as

  10. Networking for conservation: social capital and perceptions of organizational success among land trust boards

    Directory of Open Access Journals (Sweden)

    Tatyana B. Ruseva

    2016-06-01

    Full Text Available As an important component in collaborative natural resource management and nonprofit governance, social capital is expected to be related to variations in the performance of land trusts. Land trusts are charitable organizations that work to conserve private land locally, regionally, or nationally. The purpose of this paper is to identify the level of structural and cognitive social capital among local land trusts, and how these two types of social capital relate to the perceived success of land trusts. The analysis integrates data for land trusts operating in the U.S. south-central Appalachian region, which includes western North Carolina, southwest Virginia, and east Tennessee. We use factor analysis to elicit different dimensions of cognitive social capital, including cooperation among board members, shared values, common norms, and communication effectiveness. Measures of structural social capital include the size and diversity of organizational networks of both land trusts and their board members. Finally, a hierarchical linear regression model is employed to estimate how cognitive and structural social capital measures, along with other organizational and individual-level attributes, relate to perceptions of land trust success, defined here as achievement of the land trusts' mission, conservation, and financial goals. Results show that the diversity of organizational partnerships, cooperation, and shared values among land trust board members are associated with higher levels of perceived success. Organizational capacity, land trust accreditation, volunteerism, and financial support are also important factors influencing perceptions of success among local, nonprofit land trusts.

  11. Networks, Norms, and Trust: The Social Psychology of Social Capital. 2004 Cooley Mead Award Address

    Science.gov (United States)

    Cook, Karen Schweers

    2005-01-01

    Networks of trust relations often emerge under conditions of uncertainty or risk to facilitate social exchange. Under some conditions, such networks represent a form of social capital that can be mobilized in support of general social cooperation in the society. Under other conditions, however, such networks may have negative effects on the degree…

  12. Exploring the Combination of Dempster-Shafer Theory and Neural Network for Predicting Trust and Distrust.

    Science.gov (United States)

    Wang, Xin; Wang, Ying; Sun, Hongbin

    2016-01-01

    In social media, trust and distrust among users are important factors in helping users make decisions, dissect information, and receive recommendations. However, the sparsity and imbalance of social relations bring great difficulties and challenges in predicting trust and distrust. Meanwhile, there are numerous inducing factors to determine trust and distrust relations. The relationship among inducing factors may be dependency, independence, and conflicting. Dempster-Shafer theory and neural network are effective and efficient strategies to deal with these difficulties and challenges. In this paper, we study trust and distrust prediction based on the combination of Dempster-Shafer theory and neural network. We firstly analyze the inducing factors about trust and distrust, namely, homophily, status theory, and emotion tendency. Then, we quantify inducing factors of trust and distrust, take these features as evidences, and construct evidence prototype as input nodes of multilayer neural network. Finally, we propose a framework of predicting trust and distrust which uses multilayer neural network to model the implementing process of Dempster-Shafer theory in different hidden layers, aiming to overcome the disadvantage of Dempster-Shafer theory without optimization method. Experimental results on a real-world dataset demonstrate the effectiveness of the proposed framework.

  13. Exploring the Combination of Dempster-Shafer Theory and Neural Network for Predicting Trust and Distrust

    Directory of Open Access Journals (Sweden)

    Xin Wang

    2016-01-01

    Full Text Available In social media, trust and distrust among users are important factors in helping users make decisions, dissect information, and receive recommendations. However, the sparsity and imbalance of social relations bring great difficulties and challenges in predicting trust and distrust. Meanwhile, there are numerous inducing factors to determine trust and distrust relations. The relationship among inducing factors may be dependency, independence, and conflicting. Dempster-Shafer theory and neural network are effective and efficient strategies to deal with these difficulties and challenges. In this paper, we study trust and distrust prediction based on the combination of Dempster-Shafer theory and neural network. We firstly analyze the inducing factors about trust and distrust, namely, homophily, status theory, and emotion tendency. Then, we quantify inducing factors of trust and distrust, take these features as evidences, and construct evidence prototype as input nodes of multilayer neural network. Finally, we propose a framework of predicting trust and distrust which uses multilayer neural network to model the implementing process of Dempster-Shafer theory in different hidden layers, aiming to overcome the disadvantage of Dempster-Shafer theory without optimization method. Experimental results on a real-world dataset demonstrate the effectiveness of the proposed framework.

  14. A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jian Wang

    2017-05-01

    Full Text Available This article proposes a protocol layer trust-based intrusion detection scheme for wireless sensor networks. Unlike existing work, the trust value of a sensor node is evaluated according to the deviations of key parameters at each protocol layer considering the attacks initiated at different protocol layers will inevitably have impacts on the parameters of the corresponding protocol layers. For simplicity, the paper mainly considers three aspects of trustworthiness, namely physical layer trust, media access control layer trust and network layer trust. The per-layer trust metrics are then combined to determine the overall trust metric of a sensor node. The performance of the proposed intrusion detection mechanism is then analyzed using the t-distribution to derive analytical results of false positive and false negative probabilities. Numerical analytical results, validated by simulation results, are presented in different attack scenarios. It is shown that the proposed protocol layer trust-based intrusion detection scheme outperforms a state-of-the-art scheme in terms of detection probability and false probability, demonstrating its usefulness for detecting cross-layer attacks.

  15. A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks.

    Science.gov (United States)

    Wang, Jian; Jiang, Shuai; Fapojuwo, Abraham O

    2017-05-27

    This article proposes a protocol layer trust-based intrusion detection scheme for wireless sensor networks. Unlike existing work, the trust value of a sensor node is evaluated according to the deviations of key parameters at each protocol layer considering the attacks initiated at different protocol layers will inevitably have impacts on the parameters of the corresponding protocol layers. For simplicity, the paper mainly considers three aspects of trustworthiness, namely physical layer trust, media access control layer trust and network layer trust. The per-layer trust metrics are then combined to determine the overall trust metric of a sensor node. The performance of the proposed intrusion detection mechanism is then analyzed using the t-distribution to derive analytical results of false positive and false negative probabilities. Numerical analytical results, validated by simulation results, are presented in different attack scenarios. It is shown that the proposed protocol layer trust-based intrusion detection scheme outperforms a state-of-the-art scheme in terms of detection probability and false probability, demonstrating its usefulness for detecting cross-layer attacks.

  16. Modeling cascading failures with the crisis of trust in social networks

    Science.gov (United States)

    Yi, Chengqi; Bao, Yuanyuan; Jiang, Jingchi; Xue, Yibo

    2015-10-01

    In social networks, some friends often post or disseminate malicious information, such as advertising messages, informal overseas purchasing messages, illegal messages, or rumors. Too much malicious information may cause a feeling of intense annoyance. When the feeling exceeds a certain threshold, it will lead social network users to distrust these friends, which we call the crisis of trust. The crisis of trust in social networks has already become a universal concern and an urgent unsolved problem. As a result of the crisis of trust, users will cut off their relationships with some of their untrustworthy friends. Once a few of these relationships are made unavailable, it is likely that other friends will decline trust, and a large portion of the social network will be influenced. The phenomenon in which the unavailability of a few relationships will trigger the failure of successive relationships is known as cascading failure dynamics. To our best knowledge, no one has formally proposed cascading failures dynamics with the crisis of trust in social networks. In this paper, we address this potential issue, quantify the trust between two users based on user similarity, and model the minimum tolerance with a nonlinear equation. Furthermore, we construct the processes of cascading failures dynamics by considering the unique features of social networks. Based on real social network datasets (Sina Weibo, Facebook and Twitter), we adopt two attack strategies (the highest trust attack (HT) and the lowest trust attack (LT)) to evaluate the proposed dynamics and to further analyze the changes of the topology, connectivity, cascading time and cascade effect under the above attacks. We numerically find that the sparse and inhomogeneous network structure in our cascading model can better improve the robustness of social networks than the dense and homogeneous structure. However, the network structure that seems like ripples is more vulnerable than the other two network

  17. IRLT: Integrating Reputation and Local Trust for Trustworthy Service Recommendation in Service-Oriented Social Networks.

    Directory of Open Access Journals (Sweden)

    Zhiquan Liu

    Full Text Available With the prevalence of Social Networks (SNs and services, plenty of trust models for Trustworthy Service Recommendation (TSR in Service-oriented SNs (S-SNs have been proposed. The reputation-based schemes usually do not contain user preferences and are vulnerable to unfair rating attacks. Meanwhile, the local trust-based schemes generally have low reliability or even fail to work when the trust path is too long or does not exist. Thus it is beneficial to integrate them for TSR in S-SNs. This work improves the state-of-the-art Combining Global and Local Trust (CGLT scheme and proposes a novel Integrating Reputation and Local Trust (IRLT model which mainly includes four modules, namely Service Recommendation Interface (SRI module, Local Trust-based Trust Evaluation (LTTE module, Reputation-based Trust Evaluation (RTE module and Aggregation Trust Evaluation (ATE module. Besides, a synthetic S-SN based on the famous Advogato dataset is deployed and the well-known Discount Cumulative Gain (DCG metric is employed to measure the service recommendation performance of our IRLT model with comparing to that of the excellent CGLT model. The results illustrate that our IRLT model is slightly superior to the CGLT model in honest environment and significantly outperforms the CGLT model in terms of the robustness against unfair rating attacks.

  18. The dynamics of socio-connective trust within support networks accessed by informal caregivers.

    Science.gov (United States)

    Ray, Robin A; Street, Annette F

    2011-03-01

    This article introduces the concept of socio-connective trust, the synapse between the social structures and processes that underpin relationships in supportive care networks. Data from an ethnographic case study of 18 informal caregivers providing in-home care for people with life-limiting illness were analysed drawing on theoretical concepts from the work of Giddens and writings on social capital, as well as the construction of trust in the caregiving literature. While conceptions of trust were found to contribute to understanding supportive care relationships, they did not account for the dynamic nature of the availability and use of support networks. Instead, informal caregivers undertook ongoing reflexive negotiation of relationship boundaries in response to their own conception of the current situation and their perception of trust in their relationships with the various members of the support network. The concept of socio-connective trust describes the movement and flow of the flexible bonds that influence relationships among care networks and determine the type and range of support accessed by informal caregivers. Understanding the complexities of socio-connective trust in caregiving relationships will assist health and social care workers to mobilize relevant resources to support informal caregivers.

  19. AST: Activity-Security-Trust driven modeling of time varying networks.

    Science.gov (United States)

    Wang, Jian; Xu, Jiake; Liu, Yanheng; Deng, Weiwen

    2016-02-18

    Network modeling is a flexible mathematical structure that enables to identify statistical regularities and structural principles hidden in complex systems. The majority of recent driving forces in modeling complex networks are originated from activity, in which an activity potential of a time invariant function is introduced to identify agents' interactions and to construct an activity-driven model. However, the new-emerging network evolutions are already deeply coupled with not only the explicit factors (e.g. activity) but also the implicit considerations (e.g. security and trust), so more intrinsic driving forces behind should be integrated into the modeling of time varying networks. The agents undoubtedly seek to build a time-dependent trade-off among activity, security, and trust in generating a new connection to another. Thus, we reasonably propose the Activity-Security-Trust (AST) driven model through synthetically considering the explicit and implicit driving forces (e.g. activity, security, and trust) underlying the decision process. AST-driven model facilitates to more accurately capture highly dynamical network behaviors and figure out the complex evolution process, allowing a profound understanding of the effects of security and trust in driving network evolution, and improving the biases induced by only involving activity representations in analyzing the dynamical processes.

  20. A Sentiment Delivering Estimate Scheme Based on Trust Chain in Mobile Social Network

    Directory of Open Access Journals (Sweden)

    Meizi Li

    2015-01-01

    Full Text Available User sentiment analysis has become a flourishing frontier in data mining mobile social network platform since the mobile social network plays a significant role in users’ daily communication and sentiment interaction. This study studies the scheme of sentiment estimate by using the users’ trustworthy relationships for evaluating sentiment delivering. First, we address an overview of sentiment delivering estimate scheme and propose its related definitions, that is, trust chain among users, sentiment semantics, and sentiment ontology. Second, this study proposes the trust chain model and its evaluation method, which is composed of evaluation of atomic, serial, parallel, and combined trust chains. Then, we propose sentiment modeling method by presenting its modeling rules. Further, we propose the sentiment delivering estimate scheme from two aspects: explicit and implicit sentiment delivering estimate schemes, based on trust chain and sentiment modeling method. Finally, examinations and results are given to further explain effectiveness and feasibility of our scheme.

  1. Credibility of organics - knowledge, values and trust in Danish organic food networks

    OpenAIRE

    Thorsøe, Martin H.

    2014-01-01

    The sale of organic food is growing in Denmark as well as globally, and consumers’ expectations of organics continuously evolve. Knowledge, values and trust are often seen as important concepts to understand the development of organic food networks, since organic food production is an alternative agricultural practice founded on a different set of values. Knowing about this difference is considered important for consumers to choose organically produced food. Furthermore, trust is an important...

  2. On Deep Learning for Trust-Aware Recommendations in Social Networks.

    Science.gov (United States)

    Deng, Shuiguang; Huang, Longtao; Xu, Guandong; Wu, Xindong; Wu, Zhaohui

    2017-05-01

    With the emergence of online social networks, the social network-based recommendation approach is popularly used. The major benefit of this approach is the ability of dealing with the problems with cold-start users. In addition to social networks, user trust information also plays an important role to obtain reliable recommendations. Although matrix factorization (MF) becomes dominant in recommender systems, the recommendation largely relies on the initialization of the user and item latent feature vectors. Aiming at addressing these challenges, we develop a novel trust-based approach for recommendation in social networks. In particular, we attempt to leverage deep learning to determinate the initialization in MF for trust-aware social recommendations and to differentiate the community effect in user's trusted friendships. A two-phase recommendation process is proposed to utilize deep learning in initialization and to synthesize the users' interests and their trusted friends' interests together with the impact of community effect for recommendations. We perform extensive experiments on real-world social network data to demonstrate the accuracy and effectiveness of our proposed approach in comparison with other state-of-the-art methods.

  3. A Survey on Trust Management for Mobile Ad Hoc Networks

    Science.gov (United States)

    2011-11-01

    2005. [80] C. Zouridaki, B. L. Mark, M. Hejmo, and R. K. Thomas, “Robust Cooperative Trust Establishment for MANETs,” Proc. 4th ACM Work- shop on...Committee on Sensor Array and Multichannel systems and serves on the Senior Editorial Board of the IEEE Journal on Selected Topics in Signal Processing. He

  4. A Collaborative Secure Localization Algorithm Based on Trust Model in Underwater Wireless Sensor Networks.

    Science.gov (United States)

    Han, Guangjie; Liu, Li; Jiang, Jinfang; Shu, Lei; Rodrigues, Joel J P C

    2016-02-16

    Localization is one of the hottest research topics in Underwater Wireless Sensor Networks (UWSNs), since many important applications of UWSNs, e.g., event sensing, target tracking and monitoring, require location information of sensor nodes. Nowadays, a large number of localization algorithms have been proposed for UWSNs. How to improve location accuracy are well studied. However, few of them take location reliability or security into consideration. In this paper, we propose a Collaborative Secure Localization algorithm based on Trust model (CSLT) for UWSNs to ensure location security. Based on the trust model, the secure localization process can be divided into the following five sub-processes: trust evaluation of anchor nodes, initial localization of unknown nodes, trust evaluation of reference nodes, selection of reference node, and secondary localization of unknown node. Simulation results demonstrate that the proposed CSLT algorithm performs better than the compared related works in terms of location security, average localization accuracy and localization ratio.

  5. A Collaborative Secure Localization Algorithm Based on Trust Model in Underwater Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Guangjie Han

    2016-02-01

    Full Text Available Localization is one of the hottest research topics in Underwater Wireless Sensor Networks (UWSNs, since many important applications of UWSNs, e.g., event sensing, target tracking and monitoring, require location information of sensor nodes. Nowadays, a large number of localization algorithms have been proposed for UWSNs. How to improve location accuracy are well studied. However, few of them take location reliability or security into consideration. In this paper, we propose a Collaborative Secure Localization algorithm based on Trust model (CSLT for UWSNs to ensure location security. Based on the trust model, the secure localization process can be divided into the following five sub-processes: trust evaluation of anchor nodes, initial localization of unknown nodes, trust evaluation of reference nodes, selection of reference node, and secondary localization of unknown node. Simulation results demonstrate that the proposed CSLT algorithm performs better than the compared related works in terms of location security, average localization accuracy and localization ratio.

  6. User-friendly Establishment of Trust in Distributed Home Automation Networks

    DEFF Research Database (Denmark)

    Solberg Hjorth, Theis; Torbensen, Rune; Madsen, Per Printz

    2014-01-01

    these relationships can lead to misconfiguration or breaches of security. We outline a security system for Home Automation called Trusted Domain that can establish and maintain cryptographically secure relationships between devices connected via IP-based networks and the Internet. Trust establishment is presented......Current wireless technologies use a variety of methods to locally exchange and verify credentials between devices to establish trusted relationships. Scenarios in home automation networks also require this capability over the Internet, but the necessary involvement of non-expert users to setup...... in a simple and meaningful way that allows non-expert users to make the correct security decisions when enrolling new devices. We propose a social remote mutual authentication method called the PictogramDB Hash designed to easily and accurately verify certificate hash values by visualizing them with sequences...

  7. User-friendly establishment of trust in distributed home automation networks

    DEFF Research Database (Denmark)

    Solberg Hjorth, Theis; Madsen, Per Printz; Torbensen, Rune Sonnich

    2012-01-01

    Current wireless technologies use a variety of methods to locally exchange and verify credentials between devices to establish trusted relationships. Scenarios in home automation networks also require this capability over the Internet, but the necessary involvement of non-expert users to setup...... these relationships can lead to misconfiguration or breaches of security. We outline a security system for Home Automation called Trusted Domain that can establish and maintain cryptographically secure relationships between devices connected via IP-based networks and the Internet. Trust establishment is presented...... of predefined pictograms. This method is designed to scale from smart-phones and tablets down to low-resource embedded systems. The presented approach is supported by an extensive literature study, and the ease of use and feasibility of the method has been indicated through a preliminary user study...

  8. Concept for trusted personal devices in a mobile and networked environment

    NARCIS (Netherlands)

    Bormann, Frank C.; Manteau, Laurent; Linke, Andreas; Pailles, Jean C.; van Dijk, Johannes A.G.M.

    2006-01-01

    In this article we present a concept for Trusted Personal Devices, which are intended to be the common platform for the next generation of Smart Cards and other secure devices in mobile and networked environments. The concept is based on a classification of technical profiles for different potential

  9. Enhanced Secure Trusted AODV (ESTA Protocol to Mitigate Blackhole Attack in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Dilraj Singh

    2015-09-01

    Full Text Available The self-organizing nature of the Mobile Ad hoc Networks (MANETs provide a communication channel anywhere, anytime without any pre-existing network infrastructure. However, it is exposed to various vulnerabilities that may be exploited by the malicious nodes. One such malicious behavior is introduced by blackhole nodes, which can be easily introduced in the network and, in turn, such nodes try to crumble the working of the network by dropping the maximum data under transmission. In this paper, a new protocol is proposed which is based on the widely used Ad hoc On-Demand Distance Vector (AODV protocol, Enhanced Secure Trusted AODV (ESTA, which makes use of multiple paths along with use of trust and asymmetric cryptography to ensure data security. The results, based on NS-3 simulation, reveal that the proposed protocol is effectively able to counter the blackhole nodes in three different scenarios.

  10. Trust in social computing. The case of peer-to-peer file sharing networks

    Directory of Open Access Journals (Sweden)

    Heng Xu

    2011-09-01

    Full Text Available Social computing and online communities are changing the fundamental way people share information and communicate with each other. Social computing focuses on how users may have more autonomy to express their ideas and participate in social exchanges in various ways, one of which may be peer-to-peer (P2P file sharing. Given the greater risk of opportunistic behavior by malicious or criminal communities in P2P networks, it is crucial to understand the factors that affect individual’s use of P2P file sharing software. In this paper, we develop and empirically test a research model that includes trust beliefs and perceived risks as two major antecedent beliefs to the usage intention. Six trust antecedents are assessed including knowledge-based trust, cognitive trust, and both organizational and peer-network factors of institutional trust. Our preliminary results show general support for the model and offer some important implications for software vendors in P2P sharing industry and regulatory bodies.

  11. HealthTrust: a social network approach for retrieving online health videos.

    Science.gov (United States)

    Fernandez-Luque, Luis; Karlsen, Randi; Melton, Genevieve B

    2012-01-31

    significance with health consumers (r₇ = .65, P = .06) with videos on hemoglobinA(1c), but it did not perform as well with diabetic foot videos. The trust-based metric HealthTrust showed promising results when used to retrieve diabetes content from YouTube. Our research indicates that social network analysis may be used to identify trustworthy social media in health communities.

  12. B-iTRS: A Bio-Inspired Trusted Routing Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mingchuan Zhang

    2015-01-01

    Full Text Available In WSNs, routing algorithms need to handle dynamical changes of network topology, extra overhead, energy saving, and other requirements. Therefore, routing in WSNs is an extremely interesting and challenging issue. In this paper, we present a novel bio-inspired trusted routing scheme (B-iTRS based on ant colony optimization (ACO and Physarum autonomic optimization (PAO. For trust assessment, B-iTRS monitors neighbors’ behavior in real time, receives feedback from Sink, and then assesses neighbors’ trusts based on the acquired information. For routing scheme, each node finds routes to the Sink based on ACO and PAO. In the process of path finding, B-iTRS senses the load and trust value of each node and then calculates the link load and link trust of the found routes to support the route selection. Moreover, B-iTRS also assesses the route based on PAO to maintain the route table. Simulation results show how B-iTRS can achieve the effective performance compared to existing state-of-the-art algorithms.

  13. A trust evaluation algorithm for wireless sensor networks based on node behaviors and D-S evidence theory.

    Science.gov (United States)

    Feng, Renjian; Xu, Xiaofeng; Zhou, Xiang; Wan, Jiangwen

    2011-01-01

    For wireless sensor networks (WSNs), many factors, such as mutual interference of wireless links, battlefield applications and nodes exposed to the environment without good physical protection, result in the sensor nodes being more vulnerable to be attacked and compromised. In order to address this network security problem, a novel trust evaluation algorithm defined as NBBTE (Node Behavioral Strategies Banding Belief Theory of the Trust Evaluation Algorithm) is proposed, which integrates the approach of nodes behavioral strategies and modified evidence theory. According to the behaviors of sensor nodes, a variety of trust factors and coefficients related to the network application are established to obtain direct and indirect trust values through calculating weighted average of trust factors. Meanwhile, the fuzzy set method is applied to form the basic input vector of evidence. On this basis, the evidence difference is calculated between the indirect and direct trust values, which link the revised D-S evidence combination rule to finally synthesize integrated trust value of nodes. The simulation results show that NBBTE can effectively identify malicious nodes and reflects the characteristic of trust value that 'hard to acquire and easy to lose'. Furthermore, it is obvious that the proposed scheme has an outstanding advantage in terms of illustrating the real contribution of different nodes to trust evaluation.

  14. Trust-Based Collaborative Control for Teams on Communication Networks

    Science.gov (United States)

    2012-02-11

    year only [1] S. Ferrari, S. Jagannathan , and F.L. Lewis, “Special Issue on Approximate Dynamic Programming and Reinforcement Learning,” Journal of...to appear, 2012. [17] H. Xu, S. Jagannathan , and F.L. Lewis, “Stochastic Optimal Control of Unknown Linear Networked Control System in the Presence

  15. On Trust Establishment in Mobile Ad-Hoc Networks

    Science.gov (United States)

    2002-01-01

    protocols, such as Napster (which uses a centralized index) and Gnutella (which uses request flooding) to more elaborate ones, such as Freenet (which...Proceedings of the 2002 Network and Distributed System Security conference (NDSS02), San Diego, February 2002. [25] Napster , http://www.napster.com [26

  16. CENTERA: A Centralized Trust-Based Efficient Routing Protocol with Authentication for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ayman Tajeddine

    2015-02-01

    Full Text Available In this paper, we present CENTERA, a CENtralized Trust-based Efficient Routing protocol with an appropriate authentication scheme for wireless sensor networks (WSN. CENTERA utilizes the more powerful base station (BS to gather minimal neighbor trust information from nodes and calculate the best routes after isolating different types of “bad” nodes. By periodically accumulating these simple local observations and approximating the nodes’ battery lives, the BS draws a global view of the network, calculates three quality metrics—maliciousness, cooperation, and compatibility—and evaluates the Data Trust and Forwarding Trust values of each node. Based on these metrics, the BS isolates “bad”, “misbehaving” or malicious nodes for a certain period, and put some nodes on probation. CENTERA increases the node’s bad/probation level with repeated “bad” behavior, and decreases it otherwise. Then it uses a very efficient method to distribute the routing information to “good” nodes. Based on its target environment, and if required, CENTERA uses an authentication scheme suitable for severely constrained nodes, ranging from the symmetric RC5 for safe environments under close administration, to pairing-based cryptography (PBC for hostile environments with a strong attacker model. We simulate CENTERA using TOSSIM and verify its correctness and show some energy calculations.

  17. CENTERA: a centralized trust-based efficient routing protocol with authentication for wireless sensor networks.

    Science.gov (United States)

    Tajeddine, Ayman; Kayssi, Ayman; Chehab, Ali; Elhajj, Imad; Itani, Wassim

    2015-02-02

    In this paper, we present CENTERA, a CENtralized Trust-based Efficient Routing protocol with an appropriate authentication scheme for wireless sensor networks (WSN). CENTERA utilizes the more powerful base station (BS) to gather minimal neighbor trust information from nodes and calculate the best routes after isolating different types of "bad" nodes. By periodically accumulating these simple local observations and approximating the nodes' battery lives, the BS draws a global view of the network, calculates three quality metrics-maliciousness, cooperation, and compatibility-and evaluates the Data Trust and Forwarding Trust values of each node. Based on these metrics, the BS isolates "bad", "misbehaving" or malicious nodes for a certain period, and put some nodes on probation. CENTERA increases the node's bad/probation level with repeated "bad" behavior, and decreases it otherwise. Then it uses a very efficient method to distribute the routing information to "good" nodes. Based on its target environment, and if required, CENTERA uses an authentication scheme suitable for severely constrained nodes, ranging from the symmetric RC5 for safe environments under close administration, to pairing-based cryptography (PBC) for hostile environments with a strong attacker model. We simulate CENTERA using TOSSIM and verify its correctness and show some energy calculations.

  18. CENTERA: A Centralized Trust-Based Efficient Routing Protocol with Authentication for Wireless Sensor Networks

    Science.gov (United States)

    Tajeddine, Ayman; Kayssi, Ayman; Chehab, Ali; Elhajj, Imad; Itani, Wassim

    2015-01-01

    In this paper, we present CENTERA, a CENtralized Trust-based Efficient Routing protocol with an appropriate authentication scheme for wireless sensor networks (WSN). CENTERA utilizes the more powerful base station (BS) to gather minimal neighbor trust information from nodes and calculate the best routes after isolating different types of “bad” nodes. By periodically accumulating these simple local observations and approximating the nodes' battery lives, the BS draws a global view of the network, calculates three quality metrics—maliciousness, cooperation, and compatibility—and evaluates the Data Trust and Forwarding Trust values of each node. Based on these metrics, the BS isolates “bad”, “misbehaving” or malicious nodes for a certain period, and put some nodes on probation. CENTERA increases the node's bad/probation level with repeated “bad” behavior, and decreases it otherwise. Then it uses a very efficient method to distribute the routing information to “good” nodes. Based on its target environment, and if required, CENTERA uses an authentication scheme suitable for severely constrained nodes, ranging from the symmetric RC5 for safe environments under close administration, to pairing-based cryptography (PBC) for hostile environments with a strong attacker model. We simulate CENTERA using TOSSIM and verify its correctness and show some energy calculations. PMID:25648712

  19. Representing Network Trust and Using It to Improve Anonymous Communication

    Science.gov (United States)

    2014-07-01

    gitweb. torproject.org/torspec.git/blob_plain/HEAD:/path-spec.txt (February 2014) 9. Elahi, T., Goldberg, I.: Cordon–a taxonomy of Internet censorship ...Motivated by the effectiveness of correlation attacks against Tor, the censorship arms race, and observations of malicious relays in Tor, we propose that...adversary that controls some network infrastructure or Tor relays. Such adversaries are a real and growing threat, as demonstrated by the ongoing censorship

  20. Social Networks and Health Among Older Adults in Lebanon: The Mediating Role of Support and Trust

    Science.gov (United States)

    Antonucci, Toni C.; Ajrouch, Kristine J.; Abdulrahim, Sawsan

    2015-01-01

    Objectives. Despite a growing body of literature documenting the influence of social networks on health, less is known in other parts of the world. The current study investigates this link by clustering characteristics of network members nominated by older adults in Lebanon. We then identify the degree to which various types of people exist within the networks. This study further examines how network composition as measured by the proportion of each type (i.e., type proportions) is related to health; and the mediating role of positive support and trust in this process. Method. Data are from the Family Ties and Aging Study (2009). Respondents aged ≥60 were selected (N = 195) for analysis. Results. Three types of people within the networks were identified: Geographically Distant Male Youth, Geographically Close/Emotionally Distant Family, and Close Family. Having more Geographically Distant Male Youth in one’s network was associated with health limitations, whereas more Close Family was associated with no health limitations. Positive support mediated the link between type proportions and health limitations, whereas trust mediated the link between type proportions and depressive symptoms. Discussion. Results document links between the social networks and health of older adults in Lebanon within the context of ongoing demographic transitions. PMID:25324295

  1. Social networks and health among older adults in Lebanon: the mediating role of support and trust.

    Science.gov (United States)

    Webster, Noah J; Antonucci, Toni C; Ajrouch, Kristine J; Abdulrahim, Sawsan

    2015-01-01

    Despite a growing body of literature documenting the influence of social networks on health, less is known in other parts of the world. The current study investigates this link by clustering characteristics of network members nominated by older adults in Lebanon. We then identify the degree to which various types of people exist within the networks. This study further examines how network composition as measured by the proportion of each type (i.e., type proportions) is related to health; and the mediating role of positive support and trust in this process. Data are from the Family Ties and Aging Study (2009). Respondents aged ≥60 were selected (N = 195) for analysis. Three types of people within the networks were identified: Geographically Distant Male Youth, Geographically Close/Emotionally Distant Family, and Close Family. Having more Geographically Distant Male Youth in one's network was associated with health limitations, whereas more Close Family was associated with no health limitations. Positive support mediated the link between type proportions and health limitations, whereas trust mediated the link between type proportions and depressive symptoms. Results document links between the social networks and health of older adults in Lebanon within the context of ongoing demographic transitions. © The Author 2014. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  2. State of the Art in Trust and Reputation Models in P2P networks

    Science.gov (United States)

    Mármol, Félix Gómez; Pérez, Gregorio Martínez

    Ensuring security in a distributed environment such as P2P networks is a critical issue nowadays. Nevertheless, it is in those kind of scenarios in which entities can enter or leave the community whenever they want, where traditional mboxsecurity schemes can not always be applied. Specifically, the use of a PKI (Public Key Infrastructure) may be unacceptable within highly distributed systems. Therefore, modeling concepts like trust and reputation may result very helpful and useful when trying to gain a certain level of security and confidence among inter-operating entities. Thus, this chapter presents a review of some of the most representative trust and reputation models for P2P networks, discussing their main characteristics and also their weaknesses and deficiencies. Open issues and challenges associated with them will be also covered.

  3. Towards Effective Trust-Based Packet Filtering in Collaborative Network Environments

    DEFF Research Database (Denmark)

    Meng, Weizhi; Li, Wenjuan; Kwok, Lam-For

    2017-01-01

    Overhead network packets are a big challenge for intrusion detection systems (IDSs), which may increase system burden, degrade system performance, and even cause the whole system collapse, when the number of incoming packets exceeds the maximum handling capability. To address this issue, packet...... filtration is considered as a promising solution, and our previous research efforts have proven that designing a trust-based packet filter was able to refine unwanted network packets and reduce the workload of a local IDS. With the development of Internet cooperation, collaborative intrusion detection...

  4. Trust across Distance: A network approach to the development, distribution and maintenance of trust in distributed work groups

    OpenAIRE

    Julsrud, Tom Erik

    2008-01-01

    Work groups that consist of members localized in different geographical places, but maintain contact via electronic media, have become a widespread phenomenon within modern organizations. These are generally referred to as distributed work groups. Trust is increasingly considered to be a key characteristic for distributed groups, which can help improve the quality of the work, increase the effectiveness of the group, and prevent conflicts. At the same time, trust is a characteristic that can ...

  5. Towards Assisted Moderation in Online Healthcare Social Networks: Improving Trust in YouTube Searches.

    Science.gov (United States)

    Cañon, Daniel E; Lopez, Diego M; Blobel, Bernd

    2014-01-01

    Moderation of content in online Health Social Networks (HSN) is critical because information is not only published and produced by experts or health professionals, but also by users of that information. The objective of this paper is to propose a semi-automatic moderation Web Service for assessing the quality (trustworthiness) of health-related videos published on the YouTube social network. The service is relevant for moderators or community managers, who get enabled to control the quality of videos published on their online HSN sites. The HealthTrust metric was selected as the metric to be implemented in the service in order to support the assessment of trustworthiness of videos in Online HSN. The service is a RESTful service which can be integrated into open source Virtual Social Network Platforms, therefore improving trust in the process of searching and publishing content extracted from YouTube. A preliminary pilot evaluation in a simple use case demonstrated that the relevance of videos retrieved using the moderation service was higher compared to the relevance of the videos retrieved using the YouTube search engine.

  6. Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment

    Science.gov (United States)

    Kim, Seungjoo

    2014-01-01

    There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information. PMID:25374943

  7. Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment

    Directory of Open Access Journals (Sweden)

    Seungsoo Baek

    2014-01-01

    Full Text Available There has been an explosive increase in the population of the OSN (online social network in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information.

  8. Channel Selection Based on Trust and Multiarmed Bandit in Multiuser, Multichannel Cognitive Radio Networks

    Directory of Open Access Journals (Sweden)

    Fanzi Zeng

    2014-01-01

    Full Text Available This paper proposes a channel selection scheme for the multiuser, multichannel cognitive radio networks. This scheme formulates the channel selection as the multiarmed bandit problem, where cognitive radio users are compared to the players and channels to the arms. By simulation negotiation we can achieve the potential reward on each channel after it is selected for transmission; then the channel with the maximum accumulated rewards is formally chosen. To further improve the performance, the trust model is proposed and combined with multi-armed bandit to address the channel selection problem. Simulation results validate the proposed scheme.

  9. Channel selection based on trust and multiarmed bandit in multiuser, multichannel cognitive radio networks.

    Science.gov (United States)

    Zeng, Fanzi; Shen, Xinwang

    2014-01-01

    This paper proposes a channel selection scheme for the multiuser, multichannel cognitive radio networks. This scheme formulates the channel selection as the multiarmed bandit problem, where cognitive radio users are compared to the players and channels to the arms. By simulation negotiation we can achieve the potential reward on each channel after it is selected for transmission; then the channel with the maximum accumulated rewards is formally chosen. To further improve the performance, the trust model is proposed and combined with multi-armed bandit to address the channel selection problem. Simulation results validate the proposed scheme.

  10. Testing knowledge sharing effectiveness: trust, motivation, leadership style, workplace spirituality and social network embedded model

    Directory of Open Access Journals (Sweden)

    Rahman Muhammad Sabbir

    2015-12-01

    Full Text Available The aim of this inquiry is to investigate the relationships among the antecedents of knowledge sharing effectiveness under the position of non-academic staff of higher learning institutions through an empirical test of a conceptual model consisting of trust, extrinsic and intrinsic motivation, leadership style, workplace spirituality and online social network. This study used the respondents from the non-academic staff of higher learning institutions in Malaysia (n = 200, utilizing a self-administered survey questionnaire. The structural equation modeling approach was used to test the proposed hypotheses. The outcomes indicate that all the antecedents play a substantial function in knowledge sharing effectiveness. In addition, perceived risk plays a mediating role between trust and knowledge sharing effectiveness. On the other hand, this research also proved the communication skill also plays a mediating role between leadership style and knowledge sharing effectiveness. This study contributes to pioneering empirical findings on knowledge sharing literature under the scope of the non-academic staff perspective.

  11. ETARP: An Energy Efficient Trust-Aware Routing Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Pu Gong

    2015-01-01

    Full Text Available This paper presents a new routing protocol called Secure and Energy Aware Routing Protocol (ETARP designed for energy efficiency and security for wireless sensor networks (WSNs. ETARP attempts to deal with WSN applications operating in extreme environments such as the battlefield. The key part of the routing protocol is route selection based on utility theory. The concept of utility is a novel approach to simultaneously factor energy efficiency and trustworthiness of routes in the routing protocol. ETARP discovers and selects routes on the basis of maximum utility with incurring additional cost in overhead compared to the common AODV (Ad Hoc On Demand Distance Vector routing protocol. Simulation results show that, in comparison to previously proposed routing protocols, namely, AODV-EHA and LTB-AODV (Light-Weight Trust-Based Routing Protocol, the proposed ETARP can keep the same security level while achieving more energy efficiency for data packet delivery.

  12. Network strength, transaction-specific investments, inter-personal trust, and relationship satisfaction in Chinese agrifood SMEs

    NARCIS (Netherlands)

    Lu Hualiang,; Feng, S.; Trienekens, J.H.; Omta, S.W.F.

    2012-01-01

    Purpose - The purpose of this paper is to investigate the effects of network strength, transaction-specific investments and inter-personal trust on business relationship satisfaction for small-and-medium-sized enterprises (SMEs) involved in agri-food processing and exporting in China.

  13. The Handicap Principle for Trust in Computer Security, the Semantic Web and Social Networking

    Science.gov (United States)

    Ma, Zhanshan (Sam); Krings, Axel W.; Hung, Chih-Cheng

    Communication is a fundamental function of life, and it exists in almost all living things: from single-cell bacteria to human beings. Communication, together with competition and cooperation,arethree fundamental processes in nature. Computer scientists are familiar with the study of competition or 'struggle for life' through Darwin's evolutionary theory, or even evolutionary computing. They may be equally familiar with the study of cooperation or altruism through the Prisoner's Dilemma (PD) game. However, they are likely to be less familiar with the theory of animal communication. The objective of this article is three-fold: (i) To suggest that the study of animal communication, especially the honesty (reliability) of animal communication, in which some significant advances in behavioral biology have been achieved in the last three decades, should be on the verge to spawn important cross-disciplinary research similar to that generated by the study of cooperation with the PD game. One of the far-reaching advances in the field is marked by the publication of "The Handicap Principle: a Missing Piece of Darwin's Puzzle" by Zahavi (1997). The 'Handicap' principle [34][35], which states that communication signals must be costly in some proper way to be reliable (honest), is best elucidated with evolutionary games, e.g., Sir Philip Sidney (SPS) game [23]. Accordingly, we suggest that the Handicap principle may serve as a fundamental paradigm for trust research in computer science. (ii) To suggest to computer scientists that their expertise in modeling computer networks may help behavioral biologists in their study of the reliability of animal communication networks. This is largely due to the historical reason that, until the last decade, animal communication was studied with the dyadic paradigm (sender-receiver) rather than with the network paradigm. (iii) To pose several open questions, the answers to which may bear some refreshing insights to trust research in

  14. A Novel Iterative and Dynamic Trust Computing Model for Large Scaled P2P Networks

    Directory of Open Access Journals (Sweden)

    Zhenhua Tan

    2016-01-01

    Full Text Available Trust management has been emerging as an essential complementary part to security mechanisms of P2P systems, and trustworthiness is one of the most important concepts driving decision making and establishing reliable relationships. Collusion attack is a main challenge to distributed P2P trust model. Large scaled P2P systems have typical features, such as large scaled data with rapid speed, and this paper presented an iterative and dynamic trust computation model named IDTrust (Iterative and Dynamic Trust model according to these properties. First of all, a three-layered distributed trust communication architecture was presented in IDTrust so as to separate evidence collector and trust decision from P2P service. Then an iterative and dynamic trust computation method was presented to improve efficiency, where only latest evidences were enrolled during one iterative computation. On the basis of these, direct trust model, indirect trust model, and global trust model were presented with both explicit and implicit evidences. We consider multifactors in IDTrust model according to different malicious behaviors, such as similarity, successful transaction rate, and time decay factors. Simulations and analysis proved the rightness and efficiency of IDTrust against attacks with quick respond and sensitiveness during trust decision.

  15. Thematic Research network for emergency and UnScheduled Treatment (TRUST: scoping the potential

    Directory of Open Access Journals (Sweden)

    Edwards Adrian

    2008-01-01

    Full Text Available Abstract Background To identify the benefits of a network in emergency and unscheduled care research, a six week scoping study was undertaken. Objectives were to: draw together stakeholders; identify and prioritise research topics; identify sites for recruitment to studies; and agree a research strategy for a network. Methods A workshop was held to discuss and agree a research strategy based on results from four activities: visits to established research centres in emergency and unscheduled care; a literature overview; interviews with stakeholders in a GP out-of-hours service; and an exploration of the potential for routine data to support research in emergency care. Results Participants attended the workshop from user groups, primary care, the ambulance service, social care, the national telephone based health helpline, the Welsh Assembly Government and the academic sector. Site visits identified opportunities for collaboration. Gaps in knowledge were identified concerning the effectiveness of alternative models of emergency care delivery. Interview data highlighted a lack of evidence related to the quality of out-of-hours provision of primary care. The All Wales Injury Surveillance System (AWISS was found to offer the potential to use routine data to support quantitative studies in emergency care. Three key issues emerged across all activities: working across boundaries; patient involvement; and triage. Conclusion The study included views from patient, provider, policy and academic perspectives and built the case for a research network in emergency care. Now funded, TRUST (Thematic Research network for emergency and UnScheduled Treatment will allow the development of research proposals, building of research teams and recruitment of sites and patients both in Wales and across the UK. It aims to address the imbalance between investment and research in this area and help support provision of 'the right care to the right people at the right time'.

  16. A Topic Space Oriented User Group Discovering Scheme in Social Network: A Trust Chain Based Interest Measuring Perspective

    Directory of Open Access Journals (Sweden)

    Wang Dong

    2016-01-01

    Full Text Available Currently, user group has become an effective platform for information sharing and communicating among users in social network sites. In present work, we propose a single topic user group discovering scheme, which includes three phases: topic impact evaluation, interest degree measurement, and trust chain based discovering, to enable selecting influential topic and discovering users into a topic oriented group. Our main works include (1 an overview of proposed scheme and its related definitions; (2 topic space construction method based on topic relatedness clustering and its impact (influence degree and popularity degree evaluation; (3 a trust chain model to take user relation network topological information into account with a strength classification perspective; (4 an interest degree (user explicit and implicit interest degree evaluation method based on trust chain among users; and (5 a topic space oriented user group discovering method to group core users according to their explicit interest degrees and to predict ordinary users under implicit interest and user trust chain. Finally, experimental results are given to explain effectiveness and feasibility of our scheme.

  17. Trust Management V

    DEFF Research Database (Denmark)

    2011-01-01

    from 42 submissions. The papers feature both theoretical research and real-world case studies from academia, business and government focusing on areas such as: trust models, social and behavioral aspects of trust, trust in networks, mobile systems and cloud computation, privacy, reputation systems...

  18. TRUSTED DATA COMMUNICATION AND SECURITY ISSUES IN GNSS NETWORK OF TURKEY

    Directory of Open Access Journals (Sweden)

    S. Bakici

    2017-11-01

    Full Text Available There are three main activities of General Directorate of Land Registry and Cadastre. These are Mapping, Land Registry and Cadastre. Geomatic Department is responsible for mapping activities. The most important projects like TUSAGA-Aktif (CORS-Tr, Metadata Geoportal, Orthophoto Production and orthophoto web services and preparation of Turkish NSDI Feasibility Report have been conducted and completed by this department’s specialists since 2005. TUSAGA-Aktif (CORS-Tr System, serves location information at cm level accuracy in Turkey and TR Nortern Cyprus in few seconds, where adequate numbers of GNSS satellites are observed and communication possibilities are present. No ground control points and benchmarks are necessary. There are 146 permanent GNSS stations within the CORS-Tr System. Station data are transferred online to the main control center located in the Mapping Department of the General Directorate of Land Registry and Cadastre and to the control center located in the General Command of Mapping. Currently CORS-Tr has more than 9000 users. Most of them are private companies working for governmental organization. Providing data communication between control center and both GNSS station and users via trusted and good substructure is important. Additionally, protection of the system and data against cyber attacks from domestic and foreign sources is important. This paper focuses on data communication and security issues of GNSS network named TUSAGA-Aktif.

  19. Trusted Data Communication and Security Issues in Gnss Network of Turkey

    Science.gov (United States)

    Bakici, S.; Erkek, B.; Manti, V.; Altekin, A.

    2017-11-01

    There are three main activities of General Directorate of Land Registry and Cadastre. These are Mapping, Land Registry and Cadastre. Geomatic Department is responsible for mapping activities. The most important projects like TUSAGA-Aktif (CORS-Tr), Metadata Geoportal, Orthophoto Production and orthophoto web services and preparation of Turkish NSDI Feasibility Report have been conducted and completed by this department's specialists since 2005. TUSAGA-Aktif (CORS-Tr) System, serves location information at cm level accuracy in Turkey and TR Nortern Cyprus in few seconds, where adequate numbers of GNSS satellites are observed and communication possibilities are present. No ground control points and benchmarks are necessary. There are 146 permanent GNSS stations within the CORS-Tr System. Station data are transferred online to the main control center located in the Mapping Department of the General Directorate of Land Registry and Cadastre and to the control center located in the General Command of Mapping. Currently CORS-Tr has more than 9000 users. Most of them are private companies working for governmental organization. Providing data communication between control center and both GNSS station and users via trusted and good substructure is important. Additionally, protection of the system and data against cyber attacks from domestic and foreign sources is important. This paper focuses on data communication and security issues of GNSS network named TUSAGA-Aktif.

  20. Relationship between trusting behaviors and psychometrics associated with social network and depression among young generation: a pilot study.

    Directory of Open Access Journals (Sweden)

    Motoki Watabe

    Full Text Available Maladaptive social interaction and its related psychopathology have been highlighted in psychiatry especially among younger generations. In Japan, novel expressive forms of psychiatric phenomena such as "modern-type depression" and "hikikomori" (a syndrome of severe social withdrawal lasting for at least six months have been reported especially among young people. Economic games such as the trust game have been utilized to evaluate real-world interpersonal relationships as a novel candidate for psychiatric evaluations. To investigate the relationship between trusting behaviors and various psychometric scales, we conducted a trust game experiment with eighty-one Japanese university students as a pilot study. Participants made a risky financial decision about whether to trust each of 40 photographed partners. Participants then answered a set of questionnaires with seven scales including the Lubben Social Network Scale (LSNS-6 and the Patient Health Questionnaire (PHQ-9. Consistent with previous research, male participants trusted partners more than female participants. Regression analysis revealed that LSNS-family (perceived support from family for male participants, and item 8 of PHQ-9 (subjective agitation and/or retardation for female participants were associated with participants' trusting behaviors. Consistent with claims by social scientists, our data suggest that, for males, support from family was negatively associated with cooperative behavior toward non-family members. Females with higher subjective agitation (and/or retardation gave less money toward males and high attractive females, but not toward low attractive females in interpersonal relationships. We believe that our data indicate the possible impact of economic games in psychiatric research and clinical practice, and validation in clinical samples including modern-type depression and hikikomori should be investigated.

  1. Relationship between trusting behaviors and psychometrics associated with social network and depression among young generation: a pilot study.

    Science.gov (United States)

    Watabe, Motoki; Kato, Takahiro A; Teo, Alan R; Horikawa, Hideki; Tateno, Masaru; Hayakawa, Kohei; Shimokawa, Norihiro; Kanba, Shigenobu

    2015-01-01

    Maladaptive social interaction and its related psychopathology have been highlighted in psychiatry especially among younger generations. In Japan, novel expressive forms of psychiatric phenomena such as "modern-type depression" and "hikikomori" (a syndrome of severe social withdrawal lasting for at least six months) have been reported especially among young people. Economic games such as the trust game have been utilized to evaluate real-world interpersonal relationships as a novel candidate for psychiatric evaluations. To investigate the relationship between trusting behaviors and various psychometric scales, we conducted a trust game experiment with eighty-one Japanese university students as a pilot study. Participants made a risky financial decision about whether to trust each of 40 photographed partners. Participants then answered a set of questionnaires with seven scales including the Lubben Social Network Scale (LSNS)-6 and the Patient Health Questionnaire (PHQ)-9. Consistent with previous research, male participants trusted partners more than female participants. Regression analysis revealed that LSNS-family (perceived support from family) for male participants, and item 8 of PHQ-9 (subjective agitation and/or retardation) for female participants were associated with participants' trusting behaviors. Consistent with claims by social scientists, our data suggest that, for males, support from family was negatively associated with cooperative behavior toward non-family members. Females with higher subjective agitation (and/or retardation) gave less money toward males and high attractive females, but not toward low attractive females in interpersonal relationships. We believe that our data indicate the possible impact of economic games in psychiatric research and clinical practice, and validation in clinical samples including modern-type depression and hikikomori should be investigated.

  2. Government Agency and Trust in the Formation and Transformation of Interorganizational Entrepreneurial Networks

    DEFF Research Database (Denmark)

    Neergaard, Helle; Ulhøi, John Parm

    2006-01-01

    This article examines the role of trust and government agency in the creation and evolution of interoganizational cooperation among entrepreneurial ventures in general and the influence of trust on development trajectories in particular. The multiple-case approach used draws on five in-depth case...

  3. Composite Trust-Based Public Key Management in Mobile Ad Hoc Networks

    Science.gov (United States)

    2013-01-01

    and static over time. Huang and Wu [10] proposed a certificate path discovery algorithm for MANETs based on the hierarchical PKI structure using...characteristics of MANETs. These challenges include no centralized trusted entities , resource constraints, and high security vulnerabilities. This...CTPKM) with no centralized trust entity with the goal of maximizing performance (e.g., service availability or efficiency) while mitigating security

  4. Trusted Objects

    Energy Technology Data Exchange (ETDEWEB)

    CAMPBELL,PHILIP L.; PIERSON,LYNDON G.; WITZKE,EDWARD L.

    1999-10-27

    In the world of computers a trusted object is a collection of possibly-sensitive data and programs that can be allowed to reside and execute on a computer, even on an adversary's machine. Beyond the scope of one computer we believe that network-based agents in high-consequence and highly reliable applications will depend on this approach, and that the basis for such objects is what we call ''faithful execution.''

  5. Trust Threshold Based Public Key Management in Mobile Ad Hoc Networks

    Science.gov (United States)

    2016-03-05

    434 435 436 437 438 439 440 441 442 443 4 4 4 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463...1062 is 1063 fr 1064 P H Fig. 2. Effect of trust threshold ection 3.4 . In Fig. 2 , we compare the performance of three ust-based approaches

  6. Trusted Domain

    DEFF Research Database (Denmark)

    Hjorth, Theis Solberg; Torbensen, Rune

    2012-01-01

    In the digital age of home automation and with the proliferation of mobile Internet access, the intelligent home and its devices should be accessible at any time from anywhere. There are many challenges such as security, privacy, ease of configuration, incompatible legacy devices, a wealth...... of wireless standards, limited resources of embedded systems, etc. Taking these challenges into account, we present a Trusted Domain home automation platform, which dynamically and securely connects heterogeneous networks of Short-Range Wireless devices via simple non-expert user. interactions, and allows...... remote access via IP-based devices such as smartphones. The Trusted Domain platform fits existing legacy technologies by managing their interoperability and access controls, and it seeks to avoid the security issues of relying on third-party servers outside the home. It is a distributed system...

  7. Community-directed mass drug administration is undermined by status seeking in friendship networks and inadequate trust in health advice networks.

    Science.gov (United States)

    Chami, Goylette F; Kontoleon, Andreas A; Bulte, Erwin; Fenwick, Alan; Kabatereine, Narcis B; Tukahebwa, Edridah M; Dunne, David W

    2017-06-01

    Over 1.9 billion individuals require preventive chemotherapy through mass drug administration (MDA). Community-directed MDA relies on volunteer community medicine distributors (CMDs) and their achievement of high coverage and compliance. Yet, it is unknown if village social networks influence effective MDA implementation by CMDs. In Mayuge District, Uganda, census-style surveys were conducted for 16,357 individuals from 3,491 households in 17 villages. Praziquantel, albendazole, and ivermectin were administered for one month in community-directed MDA to treat Schistosoma mansoni, hookworm, and lymphatic filariasis. Self-reported treatment outcomes, socioeconomic characteristics, friendship networks, and health advice networks were collected. We investigated systematically missed coverage and noncompliance. Coverage was defined as an eligible person being offered at least one drug by CMDs; compliance included ingesting at least one of the offered drugs. These outcomes were analyzed as a two-stage process using a Heckman selection model. To further assess if MDA through CMDs was working as intended, we examined the probability of accurate drug administration of 1) praziquantel, 2) both albendazole and ivermectin, and 3) all drugs. This analysis was conducted using bivariate Probit regression. Four indicators from each social network were examined: degree, betweenness centrality, closeness centrality, and the presence of a direct connection to CMDs. All models accounted for nested household and village standard errors. CMDs were more likely to offer medicines, and to accurately administer the drugs as trained by the national control programme, to individuals with high friendship degree (many connections) and high friendship closeness centrality (households that were only a short number of steps away from all other households in the network). Though high (88.59%), additional compliance was associated with directly trusting CMDs for health advice. Effective treatment

  8. Trust and Influence in the Information Age: Operational Requirements for Network Centric Warfare

    Science.gov (United States)

    2004-12-01

    cafe for breakfast, receives good services, and then does not tip the waitress , there is a possibility that she will remember him next time and...Motorola Talkabout radios. One marine’s mother, a waitress in Texas, collected $8000 from patrons and went to RadioShack to buy the Talkabout radios...provide bad service. In this case, the waitress placed trust that Bob would follow custom if he received good service. The likelihood of a future

  9. Operational Trust: A New Look at the Human Requirement in Network Centric Warfare

    Science.gov (United States)

    2004-05-21

    favorable manner. For example, if Bob stops at a his hometown cafe for breakfast, receives good services, and then does not tip the waitress , there is a...possibility that she will remember him next time and provide bad service. In this case, the waitress placed trust that Bob would follow custom if...he received good service. The likelihood of a future interaction between Bob and the waitress ensures that Bob will meet her prediction. On the

  10. Trust repertoires for collaboration

    DEFF Research Database (Denmark)

    Fuglsang, Lars

    This case study analyses the role of trust in a public private innovation network that involved a private consultancy company as a facilitator. We know that collaboration is a important for innovation, and that collaboration across organizational boundaries is not a trivial issue. But we know very...... little about how such processes develop and how trust, understood as “confident positive expectations” (Lewicki et al. 1998) to collaborative activities, arises out of collaboration. The paper contributes by showing how trust and collaboration are intertwined. The main finding is that a facilitator can...... mediate trust in such a context by drawing on cultural repertoires of justification...

  11. Self-Management of Hybrid Networks: Can We Trust NetFlow Data?

    NARCIS (Netherlands)

    Fioreze, Tiago; Granville, Lisandro Zambenedetti; Granville, L.; Pras, Aiko; Sperotto, Anna; Sadre, R.

    2009-01-01

    Network measurement provides vital information on the health of managed networks. The collection of network information can be used for several reasons (e.g., accounting or security) depending on the purpose the collected data will be used for. At the University of Twente (UT), an automatic decision

  12. Towards Statistical Trust Computation for Medical Smartphone Networks Based on Behavioral Profiling

    DEFF Research Database (Denmark)

    Meng, Weizhi; Au, Man Ho

    2017-01-01

    Due to the popularity of mobile devices, medical smartphone networks (MSNs) have been evolved, which become an emerging network architecture in healthcare domain to improve the quality of service. There is no debate among security experts that the security of Internet-enabled medical devices...

  13. Evaluating challenge-based trust mechanism in medical smartphone networks: an empirical study

    DEFF Research Database (Denmark)

    Meng, Weizhi; Fei, Fei; Li, Wenjuan

    2017-01-01

    threats. With the popularity of mobile devices, medical smartphone networks (MSNs) have become an emerging network architecture for healthcare organizations to improve the quality of medical services. Due to the sensitivity, there is a great need to defend MSNs against insider attacks. In this work, we...

  14. Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing

    Science.gov (United States)

    2012-09-28

    Levine, “Maxprop: Routing for Vehicle-Based Disruption-Tolerant Networking,” in IEEE Conference on Computer Communications, Barcelona, Spain , April...pp. 2428-2436. [13] N. Li, and S. K. Das, “ RADON : Reputation-Assisted Data Forwarding in Opportunistic Networks,” in 2nd ACM International

  15. Trust Propagation in Small Worlds

    DEFF Research Database (Denmark)

    Gray, Elizabeth; Seigneur, Jean-Marc; Chen, Yong

    2003-01-01

    do not scale well. We aim to develop trust-based security mechanisms using small world concepts to optimise formation and propagation of trust amongst entities in these vast networks. In this regard, we surmise that in a very large mobile ad hoc network, trust, risk, and recommendations can...... be propagated through relatively short paths connecting entities. Our work describes the design of trust-formation and risk-assessment systems, as well as that of an entity recognition scheme, within the context of the small world network topology....

  16. Mitigating Malicious Attacks Using Trust Based Secure-BEFORE Routing Strategy in Mobile Ad Hoc Networks

    National Research Council Canada - National Science Library

    Shah, Rutuja; Subramaniam, Sumathy; Lekala Dasarathan, Dhinesh Babu

    2016-01-01

    Mobile ad hoc Networks (MANET), being infrastructureless and dynamic in nature, are predominantly susceptible to attacks such as black hole, worm hole, cunning gray hole attack at source or destination...

  17. Research and application of ARP protocol vulnerability attack and defense technology based on trusted network

    Science.gov (United States)

    Xi, Huixing

    2017-03-01

    With the continuous development of network technology and the rapid spread of the Internet, computer networks have been around the world every corner. However, the network attacks frequently occur. The ARP protocol vulnerability is one of the most common vulnerabilities in the TCP / IP four-layer architecture. The network protocol vulnerabilities can lead to the intrusion and attack of the information system, and disable or disable the normal defense function of the system [1]. At present, ARP spoofing Trojans spread widely in the LAN, the network security to run a huge hidden danger, is the primary threat to LAN security. In this paper, the author summarizes the research status and the key technologies involved in ARP protocol, analyzes the formation mechanism of ARP protocol vulnerability, and analyzes the feasibility of the attack technique. Based on the summary of the common defensive methods, the advantages and disadvantages of each defense method. At the same time, the current defense method is improved, and the advantage of the improved defense algorithm is given. At the end of this paper, the appropriate test method is selected and the test environment is set up. Experiment and test are carried out for each proposed improved defense algorithm.

  18. The primacy of trust in the social networks and livelihoods of women ...

    African Journals Online (AJOL)

    The objective of the study was to identify opportunities for developing innovative cellphone-based applications that link smallscale farmers and other entrepreneurs to markets, thus enabling these entrepreneurs to utilize, strengthen and expand their social and economic networks. A complementary goal was to identify the ...

  19. Personal Trust Increases Cooperation beyond General Trust

    Science.gov (United States)

    Acedo-Carmona, Cristina; Gomila, Antoni

    2014-01-01

    In this paper we present a new methodology which, while allowing for anonymous interaction, it also makes possible to compare decisions of cooperating or defecting when playing games within a group, according to whether or not players personally trust each other. The design thus goes beyond standard approaches to the role of trust in fostering cooperation, which is restricted to general trust. It also allows considering the role of the topology of the social network involved may play in the level of cooperation found. The results of this work support the idea that personal trust promotes cooperation beyond the level of general trust. We also found that this effect carries over to the whole group, making it more cohesive, but that higher levels of cohesion rely on a particular topology. As a conclusion, we hypothesize that personal trust is a psychological mechanism evolved to make human social life possible in the small groups our ancestors lived in, and that this mechanism persists and plays a role in sustaining cooperation and social cohesion. PMID:25144539

  20. Are maternal social networks and perceptions of trust associated with suspected autism spectrum disorder in offspring? A population-based study in Japan.

    Directory of Open Access Journals (Sweden)

    Takeo Fujiwara

    Full Text Available To investigate the associations of maternal social networks and perceptions of trust with the prevalence of suspected autism spectrum disorders in 18-month-old offspring in Japan.Questionnaires included measurements of maternal social networks (number of relatives or friends they could call upon for assistance, maternal perceptions of trust, mutual assistance (i.e. individual measures of "cognitive social capital", and social participation (i.e. individual measures of "structural social capital" as well as the Modified Checklist for Autism in Toddlers to detect suspected autism spectrum disorder (ASD. These tools were mailed to all families with 18-month-old toddlers in Chiba, a city near Tokyo (N = 6061; response rate: 64%. The association between social capital or social network indicators and suspected ASD were analyzed, adjusted for covariates by logistic regression analysis.Low maternal social trust was found to be significantly positively associated with suspected ASD in toddlers compared with high maternal social trust (adjusted odds ratio [OR]: 1.82, 95% confidence interval [CI]: 1.38 to 2.40; mutual aid was also significantly positively related (low vs. high: OR, 2.08, 95% CI: 1.59 to 2.73 [corrected]. However, maternal community participation showed U-shape association with suspected ASD of offspring. Maternal social network showed consistent inverse associations with suspected ASD of offspring, regardless of the type of social connection (e.g., relatives, neighbors, or friends living outside of their neighborhood.Mothers' cognitive social capital and social networks, but not structural social capital, might be associated with suspected ASD in offspring.

  1. Trust based Fusion over Noisy Channels through Anomaly Detection in Cognitive Radio Networks

    Science.gov (United States)

    2011-11-01

    of Systems ]: Fault Tolerance General Terms Algorithms, Performance, Security, Theory Keywords Cognitive radio networks, attacks, anomaly detection...Lang Tong, “ Distributed Detection in Presence of of Byzantine Attacks in Large Wireless Sensor Networks”, In proc. of MilCom, 2006. [9] S. Marti, T.J...Kevin Kwait Air Force Research Laboratory Information Directorate Rome, NY-13441, USA kevin.kwiat@rl.af.mil ABSTRACT Byzantine attacks have been

  2. Online identity: constructing interpersonal trust and openness through participating in hospitality social networks

    Directory of Open Access Journals (Sweden)

    Alexander Ronzhyn

    2013-06-01

    Full Text Available The present article describes the results of research on online identity construction during the participation in the hospitality social networks. Specifically the user references are analysed to understand patterns that form the image of a member. CouchSurfing service (couchsurfing.org allows users to leave short texts where the experience of hosting/being hosted by a CS member is described, is an evaluation of the CS members of each other’s personal traits, skills and common experience. Therefore references can become a good instrument for portraying a CouchSurfing member and understanding his or her particular traits. References form an important part of a user’s virtual identity in the network. Using a sample of references of Spanish CouchSurfing users, the research established main characteristics of the references, which are the openness, readiness to share ideas and experiences and trustworthiness. These concepts illustrate the typical traits associated with a user of the network and also shed light on the activities common during offl ine CS meetings

  3. "Doing Trust".

    Science.gov (United States)

    Guillemin, Marilys; Gillam, Lynn; Barnard, Emma; Stewart, Paul; Walker, Hannah; Rosenthal, Doreen

    2016-10-01

    Trust in research is important but not well understood. We examine the ways that researchers understand and practice trust in research. Using a qualitative research design, we interviewed 19 researchers, including eight researchers involved in Australian Indigenous research. The project design focused on sensitive research including research involving vulnerable participants and sensitive research topics. Thematic analysis was used to analyze the data. We found that researchers' understanding of trust integrates both the conceptual and concrete; researchers understand trust in terms of how it relates to other similar concepts and how they practice trust in research. This provides a sound basis to better understand trust in research, as well as identifying mechanisms to regain trust when it is lost in research.

  4. Social Trust of Virtual Identities

    Science.gov (United States)

    Seigneur, Jean-Marc

    Most other chapters of this book discuss computational models of trust in broader terms, giving definitions of trust, explaining how trust should evolve over time, surveying the different facets of trust .On the other hand, this chapter has a clear focus on the important element of identity in computational trust mechanisms. Trust and reputation are easier to form in face-to-face situations than in situations involving the use of computers and networks because the identity of the trustee is more difficult to verify. In this chapter, the different means to recognise virtual identities are surveyed. Next, their integration into computational trust engines is discussed, especially according to four main requirements: Adaptability, Security, Usability and Privacy (ASUP).

  5. Academy Trust

    Indian Academy of Sciences (India)

    The Academy Trust (tAcT) was set up in August 2014 as a non-governmental entity under the auspices of the Indian Academy of Sciences (IASc), Bengaluru. Working closely with some of the most distinguished scientific minds in the country through the Fellowship of the IASc, the Trust hopes to bring about a tangible ...

  6. A Strategic Model of Trust Management in Web Services

    Science.gov (United States)

    Sun, Junqing; Sun, Zhaohao; Li, Yuanzhe; Zhao, Shuliang

    This article examines trust and trust management in web services and proposes a multiagent model of trust relationship in web services. It looks at the hierarchical structure of trust management in web services and proposes a strategic model of trust management in web services. The proposed approach in this article will facilitate research and development of trust management in e-commerce, web services and social networking.

  7. Trusted Computing Technologies, Intel Trusted Execution Technology.

    Energy Technology Data Exchange (ETDEWEB)

    Guise, Max Joseph; Wendt, Jeremy Daniel

    2011-01-01

    We describe the current state-of-the-art in Trusted Computing Technologies - focusing mainly on Intel's Trusted Execution Technology (TXT). This document is based on existing documentation and tests of two existing TXT-based systems: Intel's Trusted Boot and Invisible Things Lab's Qubes OS. We describe what features are lacking in current implementations, describe what a mature system could provide, and present a list of developments to watch. Critical systems perform operation-critical computations on high importance data. In such systems, the inputs, computation steps, and outputs may be highly sensitive. Sensitive components must be protected from both unauthorized release, and unauthorized alteration: Unauthorized users should not access the sensitive input and sensitive output data, nor be able to alter them; the computation contains intermediate data with the same requirements, and executes algorithms that the unauthorized should not be able to know or alter. Due to various system requirements, such critical systems are frequently built from commercial hardware, employ commercial software, and require network access. These hardware, software, and network system components increase the risk that sensitive input data, computation, and output data may be compromised.

  8. A Model of Trusted Connection Architecture

    OpenAIRE

    Zhang Xun; Wang Zhihao; Zhi Yong; Yuan Hui

    2017-01-01

    According to that traditional trusted network connection architecture (TNC) has limitations on dynamic network environment and the user behavior support, we develop TCA to propose a trusted connection architecture supporting behavior measurement (TCA-SBM), besides, the structure diagram of network architecture is given. Through introducing user behavior measure elements, TCA-SBM can conduct measurement on the whole network in time dimension periodically, and refine the measurement on network ...

  9. Can we trust robots?

    NARCIS (Netherlands)

    Coeckelbergh, Mark

    2011-01-01

    Can we trust robots? Responding to the literature on trust and e-trust, this paper asks if the question of trust is applicable to robots, discusses different approaches to trust, and analyses some preconditions for trust. In the course of the paper a phenomenological-social approach to trust is

  10. It's better to give than to receive: the role of social support, trust, and participation on health-related social networking sites.

    Science.gov (United States)

    Hether, Heather J; Murphy, Sheila T; Valente, Thomas W

    2014-12-01

    Nearly 60% of American adults and 80% of Internet users have sought health information online. Moreover, Internet users are no longer solely passive consumers of online health content; they are active producers as well. Social media, such as social networking sites, are increasingly being used as online venues for the exchange of health-related information and advice. However, little is known about how participation on health-related social networking sites affects users. Research has shown that women participate more on social networking sites and social networks are more influential among same-sex members. Therefore, this study examined how participation on a social networking site about pregnancy influenced members' health-related attitudes and behaviors. The authors surveyed 114 pregnant members of 8 popular pregnancy-related sites. Analyses revealed that time spent on the sites was less predictive of health-related outcomes than more qualitative assessments such as trust in the sites. Furthermore, providing support was associated with the most outcomes, including seeking more information from additional sources and following recommendations posted on the sites. The implications of these findings, as well as directions for future research, are discussed.

  11. Trust matters

    DEFF Research Database (Denmark)

    Østergaard, Lise Rosendal

    2015-01-01

    This article makes a contribution to the debate about health service utilisation and the role of trust in fostering demand for health services in sub-Saharan Africa. It is framed as a narrative literature review based on a thematic analysis of nine empirical, qualitative studies. For the purposes...... and institutional situations. The findings of the review point to four elements that are important for trust to develop in health sector relationships: the sensitive use of discretionary power by health workers, perceived empathy by patients of the health workers, the quality of medical care and workplace......-workers and managers, will improve health sector collaboration and stimulate demand for health care services....

  12. Inferring Trust Based on Similarity with TILLIT

    Science.gov (United States)

    Tavakolifard, Mozhgan; Herrmann, Peter; Knapskog, Svein J.

    A network of people having established trust relations and a model for propagation of related trust scores are fundamental building blocks in many of today’s most successful e-commerce and recommendation systems. However, the web of trust is often too sparse to predict trust values between non-familiar people with high accuracy. Trust inferences are transitive associations among users in the context of an underlying social network and may provide additional information to alleviate the consequences of the sparsity and possible cold-start problems. Such approaches are helpful, provided that a complete trust path exists between the two users. An alternative approach to the problem is advocated in this paper. Based on collaborative filtering one can exploit the like-mindedness resp. similarity of individuals to infer trust to yet unknown parties which increases the trust relations in the web. For instance, if one knows that with respect to a specific property, two parties are trusted alike by a large number of different trusters, one can assume that they are similar. Thus, if one has a certain degree of trust to the one party, one can safely assume a very similar trustworthiness of the other one. In an attempt to provide high quality recommendations and proper initial trust values even when no complete trust propagation path or user profile exists, we propose TILLIT — a model based on combination of trust inferences and user similarity. The similarity is derived from the structure of the trust graph and users’ trust behavior as opposed to other collaborative-filtering based approaches which use ratings of items or user’s profile. We describe an algorithm realizing the approach based on a combination of trust inferences and user similarity, and validate the algorithm using a real large-scale data-set.

  13. Personal trust increases cooperation beyond general trust

    National Research Council Canada - National Science Library

    Acedo-Carmona, Cristina; Gomila, Antoni

    2014-01-01

    ..., according to whether or not players personally trust each other. The design thus goes beyond standard approaches to the role of trust in fostering cooperation, which is restricted to general trust...

  14. A Model of Trusted Connection Architecture

    Directory of Open Access Journals (Sweden)

    Zhang Xun

    2017-01-01

    Full Text Available According to that traditional trusted network connection architecture (TNC has limitations on dynamic network environment and the user behavior support, we develop TCA to propose a trusted connection architecture supporting behavior measurement (TCA-SBM, besides, the structure diagram of network architecture is given. Through introducing user behavior measure elements, TCA-SBM can conduct measurement on the whole network in time dimension periodically, and refine the measurement on network behavior in measure dimension to conduct fine-grained dynamic trusted measurement. As a result, TCA-SBM enhances the TCA’s ability to adapt to the dynamic change of network and makes up the deficiency of trusted computing framework in the network connection.

  15. Antecedents of coworker trust: leaders' blessings.

    Science.gov (United States)

    Lau, Dora C; Liden, Robert C

    2008-09-01

    Although employee trust in leaders has garnered substantial empirical research, trust between coworkers has been virtually ignored. Extending the work of D. L. Ferrin, K. T. Dirks, and P. P. Shah (2006), the authors examined the role of group leaders, an influential third party in the workplace, on coworker trust formation. The correlates of the extent to which coworkers trust one another were examined in an investigation of 146 members of 32 work groups representing 4 diverse organizations. In this study, which utilized full network data, coworker trust was operationalized as in-degree centrality in the trust network. Controlling for relational demography and coworker helping behaviors, the authors found, as hypothesized, that coworkers tended to place more trust in fellow coworkers who were also trusted by the teams' formal leaders than in coworkers who were less trusted by leaders. In addition, consistent with the social information processing theory, support was found for the hypothesis that the relationship between leaders' trust and coworker trust is stronger when group performance is poor.

  16. Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model

    DEFF Research Database (Denmark)

    Li, Wenjuan; Meng, Weizhi; Kwok, Lam-For

    2017-01-01

    To defend against complex attacks, collaborative intrusion detection networks (CIDNs) have been developed to enhance the detection accuracy, which enable an IDS to collect information and learn experience from others. However, this kind of networks is vulnerable to malicious nodes which are utili...

  17. Analysing Trust Transitivity and The Effects of Unknown Dependence

    Directory of Open Access Journals (Sweden)

    Touhid Bhuiyan

    2010-03-01

    Full Text Available Trust can be used to improve online automated recommendation within a given domain. Trust transitivity is used to make it successful. But trust transitivity has different interpretations. Trust and trust transitivity; both are the human mental phenomenon and for this reason, there is no such thing as objective transitivity. Trust transitivity and trust fusion both are important elements in computational trust. This paper analyses the parameter dependence problem in trust transitivity and proposes some definitions considering the effects of base rate. In addition, it also proposes belief functions based on subjective logic to analyse trust transitivity of three specified cases with sensitive and insensitive based rate. Then it presents a quantitative analysis of the effects of unknown dependence problem in an interconnected network environment; such Internet.

  18. Trusting the state, trusting each other?

    DEFF Research Database (Denmark)

    Sønderskov, Kim Mannemar; Dinesen, Peter Thisted

    2016-01-01

    reflects reverse causality (social trust forming institutional trust), or both forms of trust reflecting deep-seated dispositions (common confounding). Against the backdrop of the shortcomings of previous cross-sectional analyses, this paper utilizes two Danish panel surveys containing measures of both......Trust in state institutions is a prominent explanation of social trust. However, previous—mainly cross-sectional—analyses provide limited causal evidence regarding the relationship between institutional trust and social trust and it is thus essentially unknown whether an observed relationship...... types of trust for the same individuals surveyed at multiple points in time over a long time-span (up to 18 years) to address the potentially reverse and/or spurious relationship. Using individual fixed effects and cross-lagged panel models, the results provide strong evidence of trust in state...

  19. After Shaking his hand, start counting your fingers. Trust and Images in Indian business networks, East Africa 1900-2000

    NARCIS (Netherlands)

    G. Oonk (Gijsbert)

    2004-01-01

    textabstractIn this study I examine how ‘ethnic’ trading networks are created and recreated, but may also fracture and fall apart. This occurred among some Indian groups in East Africa, who initially strengthened their economic and cultural ties with India by maintaining intensive trade relations

  20. Is It a Trust Issue? Factors That Influence Trust for Persons Living With HIV/AIDS.

    Science.gov (United States)

    Krause, Denise D; May, Warren L

    2016-09-01

    Trust in one's health care provider, trust in the health care system in general, and even trust in one's community affects engagement in HIV-related health care. This article examines the issue of trust among a random sample of HIV-infected individuals residing in Mississippi, an area hard-hit by the HIV/AIDS epidemic. Five constructs based on survey responses from these individuals were developed: (1) trust in one's provider to offer the best possible medical care, (2) trust in one's provider to protect patient privacy, (3) willingness to disclose HIV status to one's provider, (4) trust in the health care system, and (5) trust in one's community. Findings suggest that interventions to improve trust in providers to deliver the highest quality of care should be targeted to young people, African Americans, and the more highly educated. Interventions to increase trust in providers to protect privacy should focus on creating and strengthening social support groups or networks that build relationships and foster trust. Interventions aimed to increase community trust also should be targeted to young people. This information is useful to researchers, policy makers, health care providers, and organizations interested in prioritizing interventions and strategies that have the greatest potential to reduce health disparities in HIV diagnosis and treatment in the Deep South. © 2016 Society for Public Health Education.

  1. Trust and Online Reputation Systems

    Science.gov (United States)

    Kwan, Ming; Ramachandran, Deepak

    Web 2.0 technologies provide organizations with unprecedented opportunities to expand and solidify relationships with their customers, partners, and employees—while empowering firms to define entirely new business models focused on sharing information in online collaborative environments. Yet, in and of themselves, these technologies cannot ensure productive online interactions. Leading enterprises that are experimenting with social networks and online communities are already discovering this fact and along with it, the importance of establishing trust as the foundation for online collaboration and transactions. Just as today's consumers must feel secure to bank, exchange personal information and purchase products and services online; participants in Web 2.0 initiatives will only accept the higher levels of risk and exposure inherent in e-commerce and Web collaboration in an environment of trust. Indeed, only by attending to the need to cultivate online trust with customers, partners and employees will enterprises ever fully exploit the expanded business potential posed by Web 2.0. But developing online trust is no easy feat. While various preliminary attempts have occurred, no definitive model for establishing or measuring it has yet been established. To that end, nGenera has identified three, distinct dimensions of online trust: reputation (quantitative-based); relationship (qualitative-based) and process (system-based). When considered together, they form a valuable model for understanding online trust and a toolbox for cultivating it to support Web 2.0 initiatives.

  2. LSOT: A Lightweight Self-Organized Trust Model in VANETs

    OpenAIRE

    Zhiquan Liu; Jianfeng Ma; Zhongyuan Jiang; Hui Zhu; Yinbin Miao

    2016-01-01

    With the advances in automobile industry and wireless communication technology, Vehicular Ad hoc Networks (VANETs) have attracted the attention of a large number of researchers. Trust management plays an important role in VANETs. However, it is still at the preliminary stage and the existing trust models cannot entirely conform to the characteristics of VANETs. This work proposes a novel Lightweight Self-Organized Trust (LSOT) model which contains trust certificate-based and recommendation-ba...

  3. Trust in Scientific Publishing

    NARCIS (Netherlands)

    Hummels, Harry; Roosendaal, Hans E.

    2001-01-01

    Trust is an important phenomenon to reduce organisational complexity and uncertainty. In the literature many types of trust are distinguished. An important framework to understand the variety and development of trust in organisations is provided by Zucker. She distinguishes three types of trust:

  4. The Academy Trust

    Indian Academy of Sciences (India)

    user

    The Academy Trust. Agenda. Date: 3rd November 2016. Time: 0900 hrs. Venue: Visitors' Hostel – Auditorium, IISER Bhopal. 0900 – 0930 hrs Welcome and Introduction to the Academy Trust (Chair Academy. Trust or Trustee). Remarks by Director, IISER, Bhopal. Remarks by: Eklavya Trust. 0930 – 1015 hrs Talk by Prof.

  5. Trust and Leadership

    DEFF Research Database (Denmark)

    Bordum, Anders

    2005-01-01

    The concept and phenomenon of trust and its relation to leadership has recently come into focus. What role does trust play? Can trust be created strategically? Questions like these are often raised. How we conceive of and conceptualize trust is not as often discussed. Among those conceptualizations...... flexibility of form for example, the idea that one with leadership tools can consciously bring forth trust. In the conclusion, the question about trust communication is addressed. In this section I argue that trust is positively value-laden, becausesincerity is a functional and pragmatic condition...

  6. LSOT: A Lightweight Self-Organized Trust Model in VANETs

    Directory of Open Access Journals (Sweden)

    Zhiquan Liu

    2016-01-01

    Full Text Available With the advances in automobile industry and wireless communication technology, Vehicular Ad hoc Networks (VANETs have attracted the attention of a large number of researchers. Trust management plays an important role in VANETs. However, it is still at the preliminary stage and the existing trust models cannot entirely conform to the characteristics of VANETs. This work proposes a novel Lightweight Self-Organized Trust (LSOT model which contains trust certificate-based and recommendation-based trust evaluations. Both the supernodes and trusted third parties are not needed in our model. In addition, we comprehensively consider three factor weights to ease the collusion attack in trust certificate-based trust evaluation, and we utilize the testing interaction method to build and maintain the trust network and propose a maximum local trust (MLT algorithm to identify trustworthy recommenders in recommendation-based trust evaluation. Furthermore, a fully distributed VANET scenario is deployed based on the famous Advogato dataset and a series of simulations and analysis are conducted. The results illustrate that our LSOT model significantly outperforms the excellent experience-based trust (EBT and Lightweight Cross-domain Trust (LCT models in terms of evaluation performance and robustness against the collusion attack.

  7. Trusting the State, Trusting Each Other? The Effect of Institutional Trust on Social Trust

    DEFF Research Database (Denmark)

    Sønderskov, Kim Mannemar; Dinesen, Peter Thisted

    2016-01-01

    Trust in state institutions is a prominent explanation of social trust. However, previous—mainly cross-sectional—analyses provide limited causal evidence regarding the relationship between institutional trust and social trust and it is thus essentially unknown whether an observed relationship...... reflects reverse causality (social trust forming institutional trust), or both forms of trust reflecting deep-seated dispositions (common confounding). Against the backdrop of the shortcomings of previous cross-sectional analyses, this paper utilizes two Danish panel surveys containing measures of both...... types of trust for the same individuals surveyed at multiple points in time over a long time-span (up to 18 years) to address the potentially reverse and/or spurious relationship. Using individual fixed effects and cross-lagged panel models, the results provide strong evidence of trust in state...

  8. Calculativeness and trust

    DEFF Research Database (Denmark)

    Frederiksen, Morten

    2014-01-01

    Williamson’s characterisation of calculativeness as inimical to trust contradicts most sociological trust research. However, a similar argument is found within trust phenomenology. This paper re-investigates Williamson’s argument from the perspective of Løgstrup’s phenomenological theory of trust....... Contrary to Williamson, however, Løgstrup’s contention is that trust, not calculativeness, is the default attitude and only when suspicion is awoken does trust falter. The paper argues that while Williamson’s distinction between calculativeness and trust is supported by phenomenology, the analysis needs...... to take actual subjective experience into consideration. It points out that, first, Løgstrup places trust alongside calculativeness as a different mode of engaging in social interaction, rather conceiving of trust as a state or the outcome of a decision-making process. Secondly, the analysis must take...

  9. Trust in motives, trust in competence

    Directory of Open Access Journals (Sweden)

    Matt Twyman

    2008-01-01

    Full Text Available According to Siegrist, Earle and Gutscher's (2003 model of risk communication, the effect of advice about risk on an agent's behavior depends on the agent's trust in the competence of the advisor and on their trust in the motives of the advisor. Trust in competence depends on how good the advice received from the source has been in the past. Trust in motives depends on how similar the agent assesses the advisor's values to be to their own. We show that past quality of advice and degree of similarity between advisors' and judges' values have separate (non-interacting effects on two types of agent behavior: the degree of trust expressed in a source (stated trust and the weight given to the source's advice (revealed trust. These findings support Siegrist et al.'s model. We also found that revealed trust was affected more than stated trust by differences in advisor quality. It is not clear how this finding should be accommodated within Siegrist et al.'s (2003 model.

  10. Trust as the Foundation of Resource Exchange in GENI

    Directory of Open Access Journals (Sweden)

    Marshall Brinn

    2015-08-01

    Full Text Available Researchers and educators in computer science and other domains are increasingly turning to distributed test beds that offer access to a variety of resources, including networking, computation, storage, sensing, and actuation. The provisioning of resources from their owners to interested experimenters requires establishing sufficient mutual trust between these parties. Building such trust directly between researchers and resource owners will not scale as the number of experimenters and resource owners grows. The NSF GENI (Global Environment for Network Innovation project has focused on establishing scalable mechanisms for maintaining such trust based on common approaches for authentication, authorization and accountability. Such trust reflects the actual trust relationships and agreements among humans or real-world organizations. We describe here GENI’s approaches for federated trust based on mutually trusted authorities, and implemented via cryptographically signed credentials and shared policies.

  11. Looking for Trust

    DEFF Research Database (Denmark)

    Bøge, Ask Risom; Lauritsen, Peter

    Trust and surveillance are often seen as opposites. Trust is regularly characterized as the glue that holds society together, while surveillance is seen as corrosive. However, in Scandinavia high levels of trust and surveillance coexist. It is therefore interesting to investigate if there is a co......Trust and surveillance are often seen as opposites. Trust is regularly characterized as the glue that holds society together, while surveillance is seen as corrosive. However, in Scandinavia high levels of trust and surveillance coexist. It is therefore interesting to investigate...

  12. Developing a Reference Framework for Cybercraft Trust Evaluation

    National Research Council Canada - National Science Library

    Hunt, Shannon E

    2008-01-01

    .... As a result, network defense remains a high priority for cyber warriors. On the technical side, trust issues for a comprehensive end-to-end network defense solution are abundant and involve multiple layers of complexity...

  13. Reliable Design Versus Trust

    Science.gov (United States)

    Berg, Melanie; LaBel, Kenneth A.

    2016-01-01

    This presentation focuses on reliability and trust for the users portion of the FPGA design flow. It is assumed that the manufacturer prior to hand-off to the user tests FPGA internal components. The objective is to present the challenges of creating reliable and trusted designs. The following will be addressed: What makes a design vulnerable to functional flaws (reliability) or attackers (trust)? What are the challenges for verifying a reliable design versus a trusted design?

  14. The productivity of trust

    DEFF Research Database (Denmark)

    Bjørnskov, Christian; Méon, Pierre-Guillaume

    This paper returns to one of the early questions of the literature on social trust, whether trust affects total factor productivity (TFP). Using both development and growth accounting, we find strong evidence of a causal effect of trust on the level and growth of TFP. Using a three-stage least...

  15. Balancing Trust and Control

    DEFF Research Database (Denmark)

    Jagd, Søren

    This paper focuses on the leadership challenge of balancing trust and control. The relation between trust and control has for a long time been a puzzling issue for management researchers. In the paper I first show that there has been a dramatic change in the way the relation between trust and con...

  16. Trust and innovation

    NARCIS (Netherlands)

    Nooteboom, B.; Bachmann, R.; Zaheer, A.

    2013-01-01

    In innovation, trust is especially needed as well as especially problematic. One needs trust under uncertainty and in innovation uncertainty is high. If one were certain about conditions, conduct and outcomes one would no longer talk about trust. This is related to a paradox of information

  17. Trust and Credit

    DEFF Research Database (Denmark)

    Harste, Gorm

    The present paper is an answer to the question, how did trust and credit emerge. The systems of trust and credit reduce the environmental and contextual complexities in which trust and credit are embedded. The paper analyses the forms of this reduction in a number of stages in the evolution...

  18. Impact Through Trust

    DEFF Research Database (Denmark)

    Mayoral, Juan A.

    trust between judges as a new mechanism for enhancing the cooperation and compliance by national courts with the CJEU jurisprudence and EU legal mandates. The chapter describes the conditions under which national judges trust the CJEU to identify how the Court can promote trust in its role as a supreme...

  19. Trust Drives Internet Use

    DEFF Research Database (Denmark)

    Ljunge, Jan Martin

    This paper estimates the effect of trust on internet use by studying the general population as well as second generation immigrants in 29 European countries with ancestry in 87 nations. There is a significant positive effect of trust on internet use. The positive trust effect is not universal...

  20. The Dimensionality of Trust

    Science.gov (United States)

    2005-06-30

    REMPEL , J.K. (1989). Trust in close relationships . In C. Hendrick (Ed.). Close Relationships . Newbury Park...conduct behaviour research? Journal of Marketing Research, 33, 1-8. REMPEL , J., HOLMES, J., & ZANNA, M. (1985). Trust in Close Relationships ... closeness but was less in close relationships . Moreover, in relationships with more than two parties, having a third party amplified both trust

  1. Trust Dynamics in WSNs: An Evolutionary Game-Theoretic Approach

    Directory of Open Access Journals (Sweden)

    Shigen Shen

    2016-01-01

    Full Text Available A sensor node (SN in Wireless Sensor Networks (WSNs can decide whether to collaborate with others based on a trust management system (TMS by making a trust decision. In this paper, we study the trust decision and its dynamics that play a key role to stabilize the whole network using evolutionary game theory. When SNs are making their decisions to select action Trust or Mistrust, a WSNs trust game is created to reflect their utilities. An incentive mechanism bound with one SN’s trust degree is incorporated into this trust game and effectively promotes SNs to select action Trust. The replicator dynamics of SNs’ trust evolution, illustrating the evolutionary process of SNs selecting their actions, are given. We then propose and prove the theorems indicating that evolutionarily stable strategies can be attained under different parameter values, which supply theoretical foundations to devise a TMS for WSNs. Moreover, we can find out the conditions that will lead SNs to choose action Trust as their final behavior. In this manner, we can assure WSNs’ security and stability by introducing a trust mechanism to satisfy these conditions. Experimental results have confirmed the proposed theorems and the effects of the incentive mechanism.

  2. Determinants of public trust in complementary and alternative medicine.

    Science.gov (United States)

    van der Schee, Evelien; Groenewegen, Peter P

    2010-03-12

    In the Netherlands, public trust in conventional medicine is relatively high. There is reason to believe that public trust in complementary and alternative medicine (CAM) is rated lower. The aim of this study is to gain insight into public trust in CAM and the determinants that lie at the root of it. We hypothesized that public trust in CAM is related to (perceived) institutional guarantees, media information on CAM, information from people's social network, personal experiences, the role of general practitioners (GPs) and trust in conventional medicine. A postal questionnaire on public trust in CAM was mailed to 1358 members of the Health Care Consumer Panel. 65% of the questionnaires were returned. Data were analysed using frequencies, ANOVA, post hoc testing and linear regression analyses. In the total sample, the level of public trust in CAM was a 5.05 on average on a scale of 1-10. 40.7% was CAM user (current or past) and displayed significantly higher levels of trust toward CAM than CAM non users. In the total sample, public trust in CAM was related to institutional guarantees, negative media information, positive and negative information reported by their social network and people's personal experiences with CAM. For non users, trust is mostly associated with institutional guarantees. For users, personal experiences are most important. For both users and non users, trust levels in CAM are affected by negative media information. Public trust in CAM is for CAM users related to positive information and for non users to negative information from their network. In the Netherlands, CAM is trusted less than conventional medicine. The hypotheses on institutional guarantees, media information, information from the network and people's personal experiences are confirmed by our study for the total sample, CAM non users and users. The other hypotheses are rejected.

  3. Social Trust and Fractionalization:

    DEFF Research Database (Denmark)

    Bjørnskov, Christian

    2008-01-01

    This paper takes a closer look at the importance of fractionalization for the creation of social trust. It first argues that the determinants of trust can be divided into two categories: those affecting individuals' trust radii and those affecting social polarization. A series of estimates using...... a much larger country sample than in previous literature confirms that fractionalization in the form of income inequality and political diversity adversely affects social trust while ethnic diversity does not. However, these effects differ systematically across countries, questioning standard...... interpretations of the influence of fractionalization on trust....

  4. Dimensions of trust

    DEFF Research Database (Denmark)

    Frederiksen, Morten

    2012-01-01

    limited sets of exchange or work relations. This article revisits Simmel’s concept of trust as social form in order to investigate this differentiation. From an interview study, the differentiation and limits of trust are analysed within different types of social relations. Trust is found to vary greatly...... in scope and mode influenced by the intersecting dimensions of relations, objects and situations. Furthermore, trust exists between an outer threshold of expected deceit and an inner threshold of confident reliance. The findings from the qualitative study contribute new knowledge on the diversity of trust...

  5. Trust Management: Literature Review

    Directory of Open Access Journals (Sweden)

    Joanna Olga Paliszkiewicz

    2011-12-01

    Full Text Available The concept of trust has become popular in public debate andacademic analysis. In high income countries this interest is associatedwith concern for the decline of trust in governments andprofessionals, and in developing countries has been promptedby debates around the motion of social capital. Trust has beenidentified as a major factor influencing such things as capital investment,relationship marketing, cross-cultural communication,learning and various types of cooperation. Trust management isbecoming also very important inside the organization. The studywill review empirical research on organizational trust. The purposeof the study will be also evaluation of the advancements andsetbacks in current empirical research in terms of managementorganizational trust. This paper will analyze the theoretical approach,the conceptualization and the measurement issues coveredin studies on management organizational trust. Althoughtrust has emerged as an important factor in organizational relationships,there are still major conceptual and methodologicalchallenges to be met when studying this complex concept.

  6. Trust and social capital in the design and evolution of institutions for collective action

    National Research Council Canada - National Science Library

    Six, Benjamin; Van Zimmeren, Esther; Popa, Florin; Frison, Christine

    2015-01-01

    .... Our theoretical framework for studying trust is based on the social capital theory. Social capital is defined as the features of social organization, such as trust, networks and norms that facilitate coordination and cooperation for mutual benefit...

  7. Trust in Strategic Alliances

    DEFF Research Database (Denmark)

    Nielsen, Bo

    2011-01-01

    This article examines the dynamic and multi-dimensional nature of trust in strategic alliances. Adopting a co-evolutionary approach, I developed a framework to show how trust, conceptualised in different forms, plays distinct roles at various evolutionary stages of the alliance relationship....... Emphasising the multi-dimensional and dynamic role of trust, the framework illustrates how initial levels of a particular type of trust may co-evolve with the alliance and influence subsequent phases of the relationship – either on its own or in combination with other types or dimensions of trust....... The theoretical distinction between trust as antecedent, moderator and outcome during the evolution of the alliance relationship leads to research questions that may guide future empirical research....

  8. Neither Trust nor Distrust

    DEFF Research Database (Denmark)

    Jensen, Tina Gudrun

    2016-01-01

    This article deals with the politicised notions of trust and social cohesion in urban spaces through a focus on practices of everyday relations in a mixed neighbourhood. Quantitative studies maintain that ethnically diverse neighbourhoods lack in trust and solidarity. However, the very meaning...... and effect of concepts such as `diversity`, `contact` and `trust´ are often unclear. This article challenges both the politicised assumptions and methodological basis for statements on trust as a condition for coexistence. Drawing on fieldwork in a multi-ethnic social housing estate in Copenhagen......, this article explores residents´ understandings of diversity, contact and trust. The article argues that trust and strong ties may not be the prerequisite for coexistence in neighbourhoods, where the micro-politics of everyday contacts predominate....

  9. Terrorism, Trust and Tourism

    DEFF Research Database (Denmark)

    Jensen, Susanne; Svendsen, Gert Tinggaard

    2017-01-01

    How does terrorism affect social trust and tourism? The rising number of terrorist attacks in Western Europe has caused safety problems not only for local citizens but also for tourists. In fact, terrorists challenge the formal violence monopoly of the state thus creating a sense of anarchy...... and distrust. Social trust is about trusting strangers, so when less predictable behaviour occurs in, a given country, people become more careful as they tend to trust most other people less. An interesting case for future research is Scandinavia as the level of terrorism is still low and, at the same time......, Scandinavia can record most social trust in the world meaning a competitive advantage when attracting tourists. Arguably, a double dividend is created from fighting terrorism, namely more social trust accumulated and more tourists attracted. Future research should therefore try to further test our model...

  10. The geography of trust.

    Science.gov (United States)

    Joni, Saj-nicole A

    2004-03-01

    Leaders who rely forever on the same internal advisers, entrusting them with issues of ever greater sensitivity and consequence, run the risk of being sold short and possibly betrayed. Alternatively, lone-wolf leaders who trust no one may make enormous, yet preventable, mistakes when trying to sort through difficult decisions. A sophisticated understanding of trust can protect leaders from both fates. During the past decade, author and consultant Saj-nicole Joni studied leadership in more than 150 European and North American companies. Her research reveals three fundamental types of trustpersonal trust, expertise trust, and structural trust. Executives may persevere in relationships that are based on personal trust, no matter how exalted their leadership roles become. But such relationships are unlikely to remain static. They also probably won't provide the kinds of deep, often specialized knowledge leaders need. In circumstances where advisers' competence matters as much as their character, expertise trust--reliance on an adviser's ability in a specific subject--enters the picture. In organizations, leaders develop expertise trust by working closely with people who consistently demonstrate their mastery of particular subjects or processes. Structural trust refers to how roles and ambitions influence advisers' perspectives and candor. It shifts constantly as people rise through organizations. High-level structural trust can provide leaders with pure insight and information--but advisers in positions of the highest structural trust generally reside outside organizations. These advisers provide leaders with insights that their organizations cannot. High-performing leaders' most enduring--and most valuable--relationships are characterized by enormous levels of all three kinds of trust.

  11. Trust and Influence

    Science.gov (United States)

    2012-03-05

    strikes, messaging, developmental activities) •Understanding the cognitive mechanisms that drive influence effects – identify the avenues of influence...competencies – trust building AF Tech Horizon‟s 2010 “In the near to mid-term, developing methods for establishing „certifiable trust in...Stokes – Dynamic Trust Model PI: Charlene Stokes (AFRL) Lab Task Drs. Lin ( Sunway U) and Chen (NICTA) Objective: Examine contextual factors

  12. In regulation we trust.

    Science.gov (United States)

    Wiig, Siri; Tharaldsen, Jorunn Elise

    2012-01-01

    The role of trust has been argued to play an increasingly important role in modern, complex, and ambivalent risk societies. Trust within organizational research is anticipated to have a general strategic impact on aspects such as organizational performance, communication and knowledge exchange, and learning from accidents. Trust is also an important aspect related to regulation of risk. Diverse regulatory regimes, their contexts and risks influence regulators use of trust and distrust in regulatory practice. The aim of this paper is to discuss the relationship between risk regulation and trust across diverse risk regulation regimes. By drawing from studies of risk regulation, risk perception, and trust the purpose is to discuss how regulation and trust are linked and used in practice to control risk across system levels in socio-technical systems in high risk industries. This paper provides new knowledge on 1) how functional and dysfunctional trust and distrust are grounded in the empirical realities of high risk industries, 2) how different perspectives on trust and distrust act together and bring new knowledge on how society control risk.

  13. The Determinants of Trust

    DEFF Research Database (Denmark)

    Bjørnskov, Christian

    general, do you think that most people can be trusted?”, the by now quite substantial literature has found that social trust is associated with a set of different macroeconomic outcomes: economic growth, the rule of law and overall quality of governance, corruption, education, the extent of violent crime...... that the empirical associations between social trust and e.g. education or rule of law reflect the reverse causal direction, i.e. that trust has caused part of the cross-country differences in these factors. The aim of this paper is to assess the impact of a number of the central factors proposed in the literature...

  14. ComTrustO: Composite Trust-Based Ontology Framework for Information and Decision Fusion

    Science.gov (United States)

    2015-07-06

    define trust ontology . Golbeck and Parsia [21] present an ontology - based approach to integrate semantic web based trust networks with provenance...information fusion framework implemented in OWL ( Ontology Web Language). We also show a concrete example that can be processed on the basis of our...information systems to enterprise modeling and knowledge learning. The most im- portant examples to date are the Semantic Web and semantic technologies

  15. Trust Discovery in Online Communities

    Science.gov (United States)

    Piorkowski, John

    2014-01-01

    This research aims to discover interpersonal trust in online communities. Two novel trust models are built to explain interpersonal trust in online communities drawing theories and models from multiple relevant areas, including organizational trust models, trust in virtual settings, speech act theory, identity theory, and common bond theory. In…

  16. The trust formula: Trust = fairness + leadership

    Energy Technology Data Exchange (ETDEWEB)

    Lovenheim, R. [Regulatory and Legislative Consultants, Inc., Rochester, NY (United States)

    1995-11-01

    Many state and compact LLW siting processes have been characterized by slippage and failure. The paper focuses on two major {open_quotes}lessons learned{close_quotes} regarding public interaction and trust, and how these lessons are being applied to current siting efforts. The relationship of environmental idealism and trust will be explored further in this paper. Supreme Court Justice Stephen Breyer concludes his 1994 book, Breaking the Vicious Circle by stating: {open_quotes}Finally, this book also reflects a belief that trust in institutions arises not simply as a result of openness in government, responses to local interest groups, or priorities emphasized in the press -- though these attitudes and actions play an important role -- but also from those institutions doing a difficult job well.{close_quotes}

  17. Trusted computing for embedded systems

    CERN Document Server

    Soudris, Dimitrios; Anagnostopoulos, Iraklis

    2015-01-01

    This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. Case studies are used to present new techniques designed as industrial security solutions. Coverage includes development of tamper resistant hardware and firmware mechanisms for lightweight embedded devices, as well as those serving as security anchors for embedded platforms required by applications such as smart power grids, smart networked and home appliances, environmental and infrastructure sensor networks, etc. ·         Enables readers to address a variety of security threats to embedded hardware and software; ·         Describes design of secure wireless sensor networks, to address secure authen...

  18. Social Collaborative Filtering by Trust.

    Science.gov (United States)

    Yang, Bo; Lei, Yu; Liu, Jiming; Li, Wenjie

    2017-08-01

    Recommender systems are used to accurately and actively provide users with potentially interesting information or services. Collaborative filtering is a widely adopted approach to recommendation, but sparse data and cold-start users are often barriers to providing high quality recommendations. To address such issues, we propose a novel method that works to improve the performance of collaborative filtering recommendations by integrating sparse rating data given by users and sparse social trust network among these same users. This is a model-based method that adopts matrix factorization technique that maps users into low-dimensional latent feature spaces in terms of their trust relationship, and aims to more accurately reflect the users reciprocal influence on the formation of their own opinions and to learn better preferential patterns of users for high-quality recommendations. We use four large-scale datasets to show that the proposed method performs much better, especially for cold start users, than state-of-the-art recommendation algorithms for social collaborative filtering based on trust.

  19. Balancing Trust and Control

    DEFF Research Database (Denmark)

    Jagd, Søren

    2010-01-01

    The purpose of this paper is to show that conceptualizing trust and control as interactively related processes, as opposed to more static conceptualizations of the two concepts and the relations between them, adds importantly towards understanding the challenges involved in balancing of trust and...

  20. Does trust pay off?

    NARCIS (Netherlands)

    R. de Bliek (Ruben)

    2012-01-01

    textabstractIt is believed that a society's level of trust in strangers, also known as generalized or interpersonal trust, is an accurate reflection of the quality of civil society and of the success of its accompanying economy. Two unresolved issues remain. The first issue concerns the

  1. National Education Trust Fund

    Science.gov (United States)

    Shapp, Milton J.

    1975-01-01

    A proposal from the governor of Pennsylvania for financing all levels of education through a National Education Trust Fund (NETF) that would operate as the present Federal Highway Trust Fund does on a revolving, self-liquidating basis with the cost of an individual's education repaid through a progressive education tax on income. (JT)

  2. Dimensionality of Organizational Trust

    Science.gov (United States)

    Adams, Samuel H.; Wiswell, Albert K.

    2007-01-01

    Trust facilitates individual and organizational learning, and is often misunderstood by organizations although they must continuously learn in order to attain organizational goals and survive. Leaders of organizations often view trust defensively and their reactions may impede organizational learning This paper builds on prior research concerning…

  3. On Representative Trust

    NARCIS (Netherlands)

    Bellemare, C.; Kroger, S.

    2003-01-01

    Because of its relation to economic growth, there is a policy interest in measuring social capital and average trust as its currently most important proxy.In this paper we measure societal trust and trustworthiness by combining the virtues of laboratory experiments and survey data and present

  4. Trust in agile teams

    DEFF Research Database (Denmark)

    Tjørnehøj, Gitte; Fransgård, Mette; Skalkam, Signe

    2012-01-01

    of the problems of DSD. However important incompatibilities between the challenges of DSD and the key tenets of agility exist and achieving a beneficially balanced agile practice in DSD can be difficult. Trust could be the key to this, since trust is crucial for the necessary corporate behavior that leads to team...... success. This article reports from a study of two agile DSD teams with very different organization and collaboration patterns. It addresses the role of trust and distrust in DSD by analyzing how the team members’ trust developed and erode through the lifetime of the two collaborations and how management...... actions influenced this. We see two important lessons from the analysis. First the agile practices of daily Scrum and self organizing team can empower DSD teams to manage their own development of trust and thereby alleviate the obstacles of DSD. Second if management fails to support the development...

  5. TrustRank: a Cold-Start tolerant recommender system

    Science.gov (United States)

    Zou, Haitao; Gong, Zhiguo; Zhang, Nan; Zhao, Wei; Guo, Jingzhi

    2015-02-01

    The explosive growth of the World Wide Web leads to the fast advancing development of e-commerce techniques. Recommender systems, which use personalised information filtering techniques to generate a set of items suitable to a given user, have received considerable attention. User- and item-based algorithms are two popular techniques for the design of recommender systems. These two algorithms are known to have Cold-Start problems, i.e., they are unable to effectively handle Cold-Start users who have an extremely limited number of purchase records. In this paper, we develop TrustRank, a novel recommender system which handles the Cold-Start problem by leveraging the user-trust networks which are commonly available for e-commerce applications. A user-trust network is formed by friendships or trust relationships that users specify among them. While it is straightforward to conjecture that a user-trust network is helpful for improving the accuracy of recommendations, a key challenge for using user-trust network to facilitate Cold-Start users is that these users also tend to have a very limited number of trust relationships. To address this challenge, we propose a pre-processing propagation of the Cold-Start users' trust network. In particular, by applying the personalised PageRank algorithm, we expand the friends of a given user to include others with similar purchase records to his/her original friends. To make this propagation algorithm scalable to a large amount of users, as required by real-world recommender systems, we devise an iterative computation algorithm of the original personalised TrustRank which can incrementally compute trust vectors for Cold-Start users. We conduct extensive experiments to demonstrate the consistently improvement provided by our proposed algorithm over the existing recommender algorithms on the accuracy of recommendations for Cold-Start users.

  6. Estimation of trust metrics for MANET using QoS parameter and source routing algorithms

    CSIR Research Space (South Africa)

    Umuhoza, D

    2007-08-01

    Full Text Available Estimation of trust in ad-hoc networks is an inevitable basis for hybrid networks to inter-operate. The contributions in this paper provide a framework for estimating the trust between nodes in an ad hoc network based on quality of service...

  7. Trying to trust: Brain activity during interpersonal social attitude change.

    Science.gov (United States)

    Filkowski, Megan M; Anderson, Ian W; Haas, Brian W

    2016-04-01

    Interpersonal trust and distrust are important components of human social interaction. Although several studies have shown that brain function is associated with either trusting or distrusting others, very little is known regarding brain function during the control of social attitudes, including trust and distrust. This study was designed to investigate the neural mechanisms involved when people attempt to control their attitudes of trust or distrust toward another person. We used a novel control-of-attitudes fMRI task, which involved explicit instructions to control attitudes of interpersonal trust and distrust. Control of trust or distrust was operationally defined as changes in trustworthiness evaluations of neutral faces before and after the control-of-attitudes fMRI task. Overall, participants (n = 60) evaluated faces paired with the distrust instruction as being less trustworthy than faces paired with the trust instruction following the control-of-distrust task. Within the brain, both the control-of-trust and control-of-distrust conditions were associated with increased temporoparietal junction, precuneus (PrC), inferior frontal gyrus (IFG), and medial prefrontal cortex activity. Individual differences in the control of trust were associated with PrC activity, and individual differences in the control of distrust were associated with IFG activity. Together, these findings identify a brain network involved in the explicit control of distrust and trust and indicate that the PrC and IFG may serve to consolidate interpersonal social attitudes.

  8. Trust and Wellbeing

    Directory of Open Access Journals (Sweden)

    John F. Helliwell

    2011-01-01

    Full Text Available

    This paper presents new evidence linking trust and subjective wellbeing, based primarily on data from the Gallup World Poll and cycle 17 of the Canadian General Social Survey (GSS17. Because several of the general explanations for subjective wellbeing examined here show large and significant linkages to both household income and various measures of trust, it is possible to estimate income-equivalent compensating differentials for different types of trust. Measures of trust studied include general social trust, trust in management, trust in co-workers, trust in neighbours, and trust in police. In addition, some Canadian surveys and the Gallup World Poll ask respondents to estimate the chances that a lost wallet would be returned to them if found by different individuals, including neighbours, police and strangers.

    Our results reveal strong linkages between several trust measures and subjective well-being, as well as strong linkages between social trust and two major global causes of death—suicides and traffic fatalities. This suggests the value of learning more about how trust can be built and maintained, or repaired where it has been damaged. We therefore use data from the Canadian GSS17 to analyze personal and neighbourhood characteristics, including education, migration history, and mobility, that help explain differences in trust

  9. Feasibility of Multi-agent Simulation for the Trust and Tracing Game

    NARCIS (Netherlands)

    Meijer, S.A.; Verwaart, D.

    2005-01-01

    Trust is an important issue in trade. For instance in food trade, market actors have to rely on their trade partner's quality statements. The roles of trust and deception in supply networks in various cultural and organisational settings are subject of research in social sciences. The Trust And

  10. Autonomy, Trust, and Respect.

    Science.gov (United States)

    Nys, Thomas

    2016-02-01

    This article seeks to explore and analyze the relationship between autonomy and trust, and to show how these findings could be relevant to medical ethics. First, I will argue that the way in which so-called "relational autonomy theories" tie the notions of autonomy and trust together is not entirely satisfying Then, I will introduce the so-called Encapsulated Interest Account as developed by Russell Hardin. This will bring out the importance of the reasons for trust. What good reasons do we have for trusting someone? I will criticize Hardin's business model as insufficiently robust, especially in the context of health care, and then turn to another source of trust, namely, love. It may seem that trust-through-love is much better suited for the vulnerability that is often involved in health care, but I will also show that it has its own deficiencies. Good health care should therefore pay attention to both models of trust, and I will offer some tentative remarks on how to do this. © The Author 2015. Published by Oxford University Press, on behalf of the Journal of Medicine and Philosophy Inc. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  11. Is the Web Marketing Mix Sustainable in China? The Mediation Effect of Dynamic Trust

    Directory of Open Access Journals (Sweden)

    Yongrok Choi

    2015-10-01

    Full Text Available Trust plays an important role between companies and customers in the online shopping environment because of the anonymous transaction environment and the advantage of virtual property. The most rapidly developing trend in Chinese e-business may come from Guanxi, a Chinese term for social trust. In this study, we define Guanxi as the dynamic trust process in the social decisions or activities of the Chinese. With increasing global attention on the outstanding development of Chinese e-business, it would be worthwhile to analyze the dynamic trust process of social e-commerce customers in close combination with the social network. The statistical results obtained using structural equation modeling (SEM show the importance of trust in a social e-commerce context. The direct positive relationship between the components of the web marketing mix and purchase intention is partially mediated by initial trust and ongoing trust, while initial trust only partially affects purchase intention through ongoing trust.

  12. Trust vs. Crisis

    Directory of Open Access Journals (Sweden)

    Kirsten Mogensen

    2014-06-01

    Full Text Available The three social phenomena -- norms, trust, and crisis -- are in this paper combined into one model that illustrates their function and relationship. Crisis is seen as a reaction to serious violations of expectations that leave people disoriented, insecure about situational norms, and unable to judge whom to trust. One logical solution to a crisis is to rebuild a shared understanding of the norms involved in any given context. Banking is used as a case. Central concepts are borrowed from Niklas Luhmann Trust (1968, Alf Ross Directives and Norms (1967, and Arthur G. Neal National Trauma & Collective Memory (1998.

  13. Trust vs. Crisis

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    2014-01-01

    The three social phenomena -- norms, trust, and crisis -- are in this paper combined into one model that illustrates their function and relationship. Crisis is seen as a reaction to serious violations of expectations that leave people disoriented, insecure about situational norms, and unable...... to judge whom to trust. One logical solution to a crisis is to rebuild a shared understanding of the norms involved in any given context. Banking is used as a case. Central concepts are borrowed from Niklas Luhmann Trust (1968), Alf Ross Directives and Norms (1967), and Arthur G. Neal National Trauma...

  14. Competition Fosters Trust

    DEFF Research Database (Denmark)

    Huck, Steffen; Lünser, Gabriele; Tyran, Jean-Robert Karl

    2012-01-01

    We study the effects of reputation and competition in a trust game. If trustees are anonymous, outcomes are poor: trustees are not trustworthy, and trustors do not trust. If trustees are identifiable and can, hence, build a reputation, efficiency quadruples but is still at only a third of the first...... best. Adding more information by granting trustors access to all trustees' complete history has, somewhat surprisingly, no effect. On the other hand, we find that competition, coupled with some minimal information, eliminates the trust problem almost completely...

  15. Trusting Crowdsourced Geospatial Semantics

    Science.gov (United States)

    Goodhue, P.; McNair, H.; Reitsma, F.

    2015-08-01

    The degree of trust one can place in information is one of the foremost limitations of crowdsourced geospatial information. As with the development of web technologies, the increased prevalence of semantics associated with geospatial information has increased accessibility and functionality. Semantics also provides an opportunity to extend indicators of trust for crowdsourced geospatial information that have largely focused on spatio-temporal and social aspects of that information. Comparing a feature's intrinsic and extrinsic properties to associated ontologies provides a means of semantically assessing the trustworthiness of crowdsourced geospatial information. The application of this approach to unconstrained semantic submissions then allows for a detailed assessment of the trust of these features whilst maintaining the descriptive thoroughness this mode of information submission affords. The resulting trust rating then becomes an attribute of the feature, providing not only an indication as to the trustworthiness of a specific feature but is able to be aggregated across multiple features to illustrate the overall trustworthiness of a dataset.

  16. Trusts and Financialization

    DEFF Research Database (Denmark)

    Harrington, Brooke

    2017-01-01

    This article identifies trusts as a legal structure associated with the global spread of financialization. Although trusts originated in Medieval England, they have acquired a new significance in contemporary finance by virtue of their advantages in terms of 10 profit maximization and capital...... mobility. As a result, trusts have become common in contemporary structured finance for corporations, in addition to their traditional functions as estate planning and asset protection vehicles for high-net-worth individuals. This article specifies three ways in which the trust structure has facilitated...... the global spread of financialization: by privileging the rentier–investor within the 15 world economy; by perpetuating a distinctively Anglo-American approach to finance internationally; and by increasing the autonomy of finance vis-a-vis the nation-state. This study shares the primarily descriptive...

  17. Balancing trust and power

    DEFF Research Database (Denmark)

    Broholm-Jørgensen, Marie; Guassora, Ann Dorrit; Reventlow, Susanne

    2017-01-01

    OBJECTIVE: Little is known about how strategies of retaining patients are acted out by general practitioners (GPs) in the clinical encounter. With this study, we apply Grimens' (2009) analytical connection between trust and power to explore how trust and power appear in preventive health checks...... from the GPs' perspectives, and in what way trust and power affect and/or challenge strategies towards retaining patients without formal education. DESIGN: Data in this study were obtained through semi-structured interviews with GPs participating in an intervention project, as well as observations...... of clinical encounters. RESULTS: From the empirical data, we identified three dimensions of respect: respect for the patient's autonomy, respect for professional authority and respect as a mutual exchange. A balance of respect influenced trust in the relationship between GP and patients and the transfer...

  18. Balancing trust and power

    DEFF Research Database (Denmark)

    Broholm-Jørgensen, Marie; Guassora, Ann Dorrit; Reventlow, Susanne

    2017-01-01

    from the GPs' perspectives, and in what way trust and power affect and/or challenge strategies towards retaining patients without formal education. DESIGN: Data in this study were obtained through semi-structured interviews with GPs participating in an intervention project, as well as observations......OBJECTIVE: Little is known about how strategies of retaining patients are acted out by general practitioners (GPs) in the clinical encounter. With this study, we apply Grimens' (2009) analytical connection between trust and power to explore how trust and power appear in preventive health checks...... of power in the encounter. The GPs articulated that a balance was needed in preventive health checks in order to establish trust and thus retain the patient in the clinic. One way this balance of respect was carried out was with the use of humour. CONCLUSIONS: To retain patients without formal education...

  19. Education and Social Trust

    DEFF Research Database (Denmark)

    Oskarsson, Sven; Dinesen, Peter Thisted; Dawes, Christopher

    2017-01-01

    One of the clearest results in previous studies on social trust is the robust positive relationship with educational attainment. The most common interpretation is that education has a causal effect on social trust. The theoretical argument and empirical results in this article suggest a different...... interpretation. We argue that common preadult factors such as cognitive abilities and personality traits rooted in genes and early-life family environment may confound the relationship between educational attainment and social trust. We provide new evidence on this question by utilizing the quasi......-experiment of twinning. By looking at the relationship between education and social trust within monozygotic (MZ) twin pairs, we are able to avoid potential confounders rooted in genetic factors and common environmental influences because the monozygotic twins share both. The results suggest that when controlling...

  20. Building trust-business essentials

    Science.gov (United States)

    Sandy MacIver

    2008-01-01

    (Please note: This paper only contains the abstract.) Trust is particularly vital in the leadership of organizations. Trust is built by working through "joy, fear, and vulnerability," especially as it relates to trust in others and in teams. Key is learning to trust the right people in the right way in the right circumstances. In addition...

  1. Trust and Influence

    Science.gov (United States)

    2013-03-06

    Influence effects • Psychological /Behavioral Effects of Novel Weaponry BRI •Cognitive mechanisms for influence •Socio-digital Influence BRI...Officer AFOSR/RTC Air Force Research Laboratory Trust and Influence Date:6 MAR 2013 Report Documentation Page Form ApprovedOMB No. 0704-0188 Public...00-2013 4. TITLE AND SUBTITLE Trust and Influence 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT

  2. Foundation trusts. Power sharing.

    Science.gov (United States)

    Jobanputra, Renu; Buchan, James

    2003-05-01

    Foundation trusts will in theory have greater freedoms over pay, non-pay rewards and recruitment, although details are still unclear. Foundations are likely to differ in their use of these powers, partly because of desire and partly because of practical limits. Taking advantage of new powers for short-term gain, at the expense of other trusts, will have negative effects if not part of a wider development of HR practice.

  3. Computationally modeling interpersonal trust

    OpenAIRE

    Lee, Jin Joo; Knox, W. Bradley; Wormwood, Jolie B.; Breazeal, Cynthia; DeSteno, David

    2013-01-01

    We present a computational model capable of predicting—above human accuracy—the degree of trust a person has toward their novel partner by observing the trust-related nonverbal cues expressed in their social interaction. We summarize our prior work, in which we identify nonverbal cues that signal untrustworthy behavior and also demonstrate the human mind’s readiness to interpret those cues to assess the trustworthiness of a social robot. We demonstrate that domain knowledge gained from our pr...

  4. Trust and virtual worlds

    DEFF Research Database (Denmark)

    Ess, Charles; Thorseth, May

    2011-01-01

    We collect diverse philosophical analyses of the issues and problems clustering around trust online with specific attention to establishing trust in virtual environments. The book moves forward important discussions of how virtual worlds and virtuality are to be defined and understood; the role...... by virtuality, such as virtual child pornography. The introduction further develops a philosophical anthropology, rooted in Kantian ethics, phenomenology, virtue ethics, and feminist perspectives, that grounds a specific approach to ethical issues in virtual environments....

  5. The Process of Trust Development

    DEFF Research Database (Denmark)

    Jagd, Søren; Højland, Jeppe

    by high trust and co-operation? In this paper we explore the process of trust development during an organisational change project in a Danish SME by looking at two kinds of trust relations: employee trust in management and trust relations among employees. We find substantial differences in trust......Trust is critical for the quality of social interaction especially in organisations based on employee cooperation and empowerment. An important question is how organisations pass from a situation with low trust between management and employees and among employees to a situation characterised...... in management among employees. Trust is found to be higher among employees interacting regularly with managers, as in the project coordination group. It is found that personal relations are very important for the development of trust. The success of the project may be explained by the involvement of an ‘elite...

  6. Shedding Light on Trust

    Directory of Open Access Journals (Sweden)

    Lesley Gill

    2013-01-01

    Full Text Available New Zealand Human Resource Development practitioners interviewed in earlier research indicates that building “trust” is necessary if training efforts in the area of Emotional Intelligence are to be successful.  Yet, trust is often not defined clearly by those working in the field of HRD.  To establish a definition of trust that provides HRD practitioners with direction in the design of training programs, a large group conversation utilizing the “World Café” process was undertaken, after which EI training practitioners wrote reflections on the nature of trust.  Experienced EI Trainers tended to define trust in terms of the outcome produced in training, which was the readiness of participants to talk.  Defining trust in this way has the advantage of involving a low level of inference.  Trainers also identified actions within their control that could stimulate greater readiness amongst training participants about their experiences to trainers and other learners. The aim of the article is to provide a practice-based definition of trust that can inform HRD practitioners working in the field of Emotional Intelligence.

  7. Computationally modeling interpersonal trust

    Science.gov (United States)

    Lee, Jin Joo; Knox, W. Bradley; Wormwood, Jolie B.; Breazeal, Cynthia; DeSteno, David

    2013-01-01

    We present a computational model capable of predicting—above human accuracy—the degree of trust a person has toward their novel partner by observing the trust-related nonverbal cues expressed in their social interaction. We summarize our prior work, in which we identify nonverbal cues that signal untrustworthy behavior and also demonstrate the human mind's readiness to interpret those cues to assess the trustworthiness of a social robot. We demonstrate that domain knowledge gained from our prior work using human-subjects experiments, when incorporated into the feature engineering process, permits a computational model to outperform both human predictions and a baseline model built in naiveté of this domain knowledge. We then present the construction of hidden Markov models to investigate temporal relationships among the trust-related nonverbal cues. By interpreting the resulting learned structure, we observe that models built to emulate different levels of trust exhibit different sequences of nonverbal cues. From this observation, we derived sequence-based temporal features that further improve the accuracy of our computational model. Our multi-step research process presented in this paper combines the strength of experimental manipulation and machine learning to not only design a computational trust model but also to further our understanding of the dynamics of interpersonal trust. PMID:24363649

  8. Computationally Modeling Interpersonal Trust

    Directory of Open Access Journals (Sweden)

    Jin Joo eLee

    2013-12-01

    Full Text Available We present a computational model capable of predicting—above human accuracy—the degree of trust a person has toward their novel partner by observing the trust-related nonverbal cues expressed in their social interaction. We summarize our prior work, in which we identify nonverbal cues that signal untrustworthy behavior and also demonstrate the human mind’s readiness to interpret those cues to assess the trustworthiness of a social robot. We demonstrate that domain knowledge gained from our prior work using human-subjects experiments, when incorporated into the feature engineering process, permits a computational model to outperform both human predictions and a baseline model built in naivete' of this domain knowledge. We then present the construction of hidden Markov models to incorporate temporal relationships among the trust-related nonverbal cues. By interpreting the resulting learned structure, we observe that models built to emulate different levels of trust exhibit different sequences of nonverbal cues. From this observation, we derived sequence-based temporal features that further improve the accuracy of our computational model. Our multi-step research process presented in this paper combines the strength of experimental manipulation and machine learning to not only design a computational trust model but also to further our understanding of the dynamics of interpersonal trust.

  9. Trust Revision for Conflicting Sources

    Science.gov (United States)

    2017-02-01

    analyst wants to include the realistic possibility that there can be rain and sunshine simultaneously, then the domain would need to include a...tative and idempotent; but it is not associative. IV. TRUST DISCOUNTING The general idea behind trust discounting is to express degrees of trust in an...A:C X is revised. Trust revision consists of increasing distrust at the cost of trust and uncertainty. The idea is that sources found to be unreliable

  10. Impact of signals and experience on trust and trusting behavior.

    Science.gov (United States)

    Chen, Ying-Hueih; Chien, Shu-Hua; Wu, Jyh-Jeng; Tsai, Pei-Yin

    2010-10-01

    Trust is an essential factor that drives virtual interaction and transactions on the Internet. Researchers have investigated the trust development process, and identified several important factors that form the basis for trust. This research combines the signal perspective and trust theory to examine the impact of market signals and past experience on trust formation and trusting behavior. Three market signals, including brand image, Web-site investment, and privacy policies, are identified and empirically tested to determine their impact on consumer trust. Based on 322 active Web users, the quantitative results suggest that brand image, Web-site investment, privacy policies, and past experience all positively impact trust formation. Furthermore, trust shows a positive effect on Web-site stickiness. Both theoretical and practical implications of the results are also offered.

  11. African migrant patients' trust in Chinese physicians: a social ecological approach to understanding patient-physician trust.

    Directory of Open Access Journals (Sweden)

    Megan M McLaughlin

    Full Text Available Patient trust in physicians is a critical determinant of health seeking behaviors, medication adherence, and health outcomes. A crisis of interpersonal trust exists in China, extending throughout multiple social spheres, including the healthcare system. At the same time, with increased migration from Africa to China in the last two decades, Chinese physicians must establish mutual trust with an increasingly diverse patient population. We undertook a qualitative study to identify factors affecting African migrants' trust in Chinese physicians and to identify potential mechanisms for promoting trust.We conducted semi-structured, in-depth interviews with 40 African migrants in Guangzhou, China. A modified version of the social ecological model was used as a theoretical framework. At the patient-physician level, interpersonal treatment, technical competence, perceived commitment and motive, and language concordance were associated with enhanced trust. At the health system level, two primary factors influenced African migrants' trust in their physicians: the fee-for-service payment system and lack of continuity with any one physician. Patients' social networks and the broader socio-cultural context of interactions between African migrants and Chinese locals also influenced patients' trust of their physicians.These findings demonstrate the importance of factors beyond the immediate patient-physician interaction and suggest opportunities to promote trust through health system interventions.

  12. African migrant patients' trust in Chinese physicians: a social ecological approach to understanding patient-physician trust.

    Science.gov (United States)

    McLaughlin, Megan M; Simonson, Louis; Zou, Xia; Ling, Li; Tucker, Joseph D

    2015-01-01

    Patient trust in physicians is a critical determinant of health seeking behaviors, medication adherence, and health outcomes. A crisis of interpersonal trust exists in China, extending throughout multiple social spheres, including the healthcare system. At the same time, with increased migration from Africa to China in the last two decades, Chinese physicians must establish mutual trust with an increasingly diverse patient population. We undertook a qualitative study to identify factors affecting African migrants' trust in Chinese physicians and to identify potential mechanisms for promoting trust. We conducted semi-structured, in-depth interviews with 40 African migrants in Guangzhou, China. A modified version of the social ecological model was used as a theoretical framework. At the patient-physician level, interpersonal treatment, technical competence, perceived commitment and motive, and language concordance were associated with enhanced trust. At the health system level, two primary factors influenced African migrants' trust in their physicians: the fee-for-service payment system and lack of continuity with any one physician. Patients' social networks and the broader socio-cultural context of interactions between African migrants and Chinese locals also influenced patients' trust of their physicians. These findings demonstrate the importance of factors beyond the immediate patient-physician interaction and suggest opportunities to promote trust through health system interventions.

  13. A Model of Trusted Measurement Model

    OpenAIRE

    Ma Zhili; Wang Zhihao; Dai Liang; Zhu Xiaoqin

    2017-01-01

    A model of Trusted Measurement supporting behavior measurement based on trusted connection architecture (TCA) with three entities and three levels is proposed, and a frame to illustrate the model is given. The model synthesizes three trusted measurement dimensions including trusted identity, trusted status and trusted behavior, satisfies the essential requirements of trusted measurement, and unified the TCA with three entities and three levels.

  14. Research on Trust Propagation Models in Reputation Management Systems

    Directory of Open Access Journals (Sweden)

    Zhiyuan Su

    2014-01-01

    Full Text Available Feedback based reputation systems continue to gain popularity in eCommerce and social media systems today and reputation management in large social networks needs to manage cold start and sparseness in terms of feedback. Trust propagation has been widely recognized as an effective mechanism to handle these problems. In this paper we study the characterization of trust propagation models in the context of attack resilience. We characterize trust propagation models along three dimensions: (i uniform propagation and conditional propagation, (ii jump strategies for breaking unwanted cliques, and (iii decay factors for differentiating recent trust history from remote past history. We formally and experimentally show that feedback similarity is a critical measure for countering colluding attacks in reputation systems. Without feedback similarity guided control, trust propagations are vulnerable to different types of colluding attacks.

  15. Social Web Identity Established upon Trust and Reputations

    Directory of Open Access Journals (Sweden)

    Rajni Goel

    2014-11-01

    Full Text Available Online social networks have become a seamless and critical online communication platform for personal interactions. They are a powerful tool that businesses are using to expand among domestic markets. The increase in participation in online social networking can and has caused damage to individuals and organizations, and the issuance of trust has become a concern on the social web. The factors determining the reputation of persons (customers in the real world may relate to the factors of reputation on the social web, though relative to how trust is established in the physical world, establishing trust on the social web can be fairly difficult. Determining how to trust another individual’s online social profile becomes critical in initiating any interaction on the social web. Rather than focusing on content on the social network page, this research proposes and examines the application of user reputations to determine whether the trust should be issued on the social web. A top-level framework to establish trust in an identity on the Social Network Sites (SNS as a function of the users’ associations, usage patterns and reputation on the social web is presented.

  16. Review of Interorganizational Trust Models

    Science.gov (United States)

    2010-09-01

    trust in the salesperson . For example: ‘‘Anyone who trusts him/her is asking for trouble.’’ And three items measuring trust in the company. For...and benevolence of a target of Credibility and benevolence Trust of the supplier firm was measured on eight items, and trust of the salesperson on...used in the evaluation. Plank et al. (1999) ‘‘Trust is a global belief on the part of the buyer that the salesperson , product, and company will

  17. Trust Models in Ubiquitous Computing

    DEFF Research Database (Denmark)

    Nielsen, Mogens; Krukow, Karl; Sassone, Vladimiro

    2008-01-01

    We recapture some of the arguments for trust-based technologies in ubiquitous computing, followed by a brief survey of some of the models of trust that have been introduced in this respect. Based on this, we argue for the need of more formal and foundational trust models.......We recapture some of the arguments for trust-based technologies in ubiquitous computing, followed by a brief survey of some of the models of trust that have been introduced in this respect. Based on this, we argue for the need of more formal and foundational trust models....

  18. Trust as a Critical Concept

    DEFF Research Database (Denmark)

    Bordum, Anders

    2004-01-01

    In this articlei I will argue that trust is a fundamental and critical concept because trust is the direct or transcendental constitutive ground of most social phenomena, as well as applicable as an operational method in critical theory. There are two different but overlapping positions on trust I...... where trust is treated as if it was a value-neutral system-internal decision, which presupposes that trust and mistrust are symmetrically interrelated functionally (Luhmann 1979). In his early book Trust and Power, Niklas Luhmann seems to agree with the vision guiding my general argument...

  19. Governance, Trust and Taxes

    DEFF Research Database (Denmark)

    Weihe, Guri; Joensen, E. Juanna Schröter

    This paper examines the role of social capital (trust) vis-à-vis the propensity of a country to be a tax haven. The empirical analysis corroborates that better governed countries have a higher ceteris paribus probability to be tax havens. However, social capital counteracts the effect of governance...... quality. This effect is so strong that the partial effect of governance quality is reversed for countries with the trust index in the top quartile – making these high trust countries less likely to be tax havens – even as governance quality is increased. Thus it is crucial to consider the interaction...... between institutions and social capital, since the same governance institutions have a different impact on the tax haven propensity for countries with different social capital....

  20. Trust in media information

    Directory of Open Access Journals (Sweden)

    Miquel Rodrigo

    2003-06-01

    Full Text Available For Miquel Rodrigo, cultural diversity places informative discourse in a crisis because it needs new categories to explain reality, and these categories are not always shared by journalists and by those who receive the information. Instead of gaining an easy trust drawnfrom stereotypes, he proposes, as a better way of overcoming the crisis, fostering the existence of sceptical readers. The media interprets social phenomena with its personal and professional limitations. The sceptical reader is one who knows why the media says what it says and understands that its truths are not absolute, since all ways of seeing are ways of concealing. The relationship between scepticism and trust is that which opposes a blind, acrylic and capitulating trust.

  1. Trust - Essential Requirement and Basis for pHealth Services.

    Science.gov (United States)

    Ruotsalainen, Pekka; Blobel, Bernd

    2017-01-01

    Trust is a social code and glue between persons and organizations in any business domain including health. pHealth is a complex concept that is built around health service providers, individuals and artefacts such as sensors, mobile devices, networks, computers, and software applications. It has many stakeholders such as organizations, persons, patients, customers, and tele-operators. pHealth services are increasingly offered in insecure information space, and used over organizational, geographical and jurisdictional borders. This all means that trust is an essential requirement for successful pHealth services. To make pHealth a successful business, organizations offering pHealth services should establish inter-organizational trust and trusted relationship between their customers. Before starting to use services, the pHealth user should have a possibility to define how much it trusts on the service provider and on the surrounding information infrastructure. The authors' analysis show that trust models used in today's health care and e-commerce are insufficient for networked pHealth. Calculated trust as proposed by the authors is stronger than the predefined dispositional trust model currently used in health care, other's recommendations used in e-commerce and risk assessment. Until now, caused by the lack of business incentive, lack of regulatory and political pressure, pHealth providers have not demonstrated meaningful interest in moving from the current unsatisfactory situation to trust calculation by making information necessary for this methodology available. To make pHealth successful, a combination of legal, political, organizational, technological and educational efforts is needed to initiate the paradigm change and start the era of trust-based pHealth services.

  2. Where is trust heading?

    Directory of Open Access Journals (Sweden)

    Edgard Weber

    2003-06-01

    Full Text Available Edgard Weber thinks of trust as a process which places the individual in a position which does not only take into account his or her group, his or her direct environment or that of his or her interest, but rather all humanity, regardless of origin, race or social class.In other words, a process that departs from that which is particular and takes an interest in that which is universal, like a horizon that retreats the more we approach it and as a process constructed with the Other. In this sense, three conditions underlie trust: hope, love, and faith.

  3. Trusted cloud computing

    CERN Document Server

    Krcmar, Helmut; Rumpe, Bernhard

    2014-01-01

    This book documents the scientific results of the projects related to the Trusted Cloud Program, covering fundamental aspects of trust, security, and quality of service for cloud-based services and applications. These results aim to allow trustworthy IT applications in the cloud by providing a reliable and secure technical and legal framework. In this domain, business models, legislative circumstances, technical possibilities, and realizable security are closely interwoven and thus are addressed jointly. The book is organized in four parts on "Security and Privacy", "Software Engineering and

  4. Competition Fosters Trust

    DEFF Research Database (Denmark)

    Huck, Steffen; Ruchala, Gabriele K.; Tyran, Jean-Robert

    We study the effects of reputation and competition in a stylized market for experience goods. If interaction is anonymous, such markets perform poorly: sellers are not trustworthy, and buyers do not trust sellers. If sellers are identifiable and can, hence, build a reputation, efficiency quadruples...... but is still at only a third of the first best. Adding more information by granting buyers access to all sellers’ complete history has, somewhat surprisingly, no effect. On the other hand, we find that competition, coupled with some minimal information, eliminates the trust problem almost completely...

  5. Pricing and Trust

    DEFF Research Database (Denmark)

    Huck, Steffen; Ruchala, Gabriele K.; Tyran, Jean-Robert

    We experimentally examine the effects of flexible and fixed prices in markets for experience goods in which demand is driven by trust. With flexible prices, we observe low prices and high quality in competitive (oligopolistic) markets, and high prices coupled with low quality in non-competitive (......We experimentally examine the effects of flexible and fixed prices in markets for experience goods in which demand is driven by trust. With flexible prices, we observe low prices and high quality in competitive (oligopolistic) markets, and high prices coupled with low quality in non...

  6. Free Riding or Trust?

    DEFF Research Database (Denmark)

    Svendsen, Gert Tinggaard; Nilsson, Jerker

    2011-01-01

    It is often observed that members have little interest in monitoring their cooperatives. One explanation is that the members are free-riders, hoping that others will perform the task. Another explanation is that the weak member interest is a consequence of members having trust in the leadership. ...... have a subset of members who trusts the leadership so they do not read the annual reports....... conditions rule. These propositions get support from five studies of members’ readership of their cooperatives’ annual reports. In large and heterogeneous memberships there is free-riding behavior, which explains the members’ low interest in governing their cooperatives. To a limited extent a membership may...

  7. Banking system trust, bank trust, and bank loyalty

    NARCIS (Netherlands)

    van Esterik-Plasmeijer, P.; van Raaij, W.F.

    2017-01-01

    Purpose The purpose of this paper is to test a model of banking system trust as an antecedent of bank trust and bank loyalty. Six determinants of trust and loyalty are included: competence, stability, integrity, customer orientation, transparency, and value congruence. The study provides insights

  8. Cultivating trust : how do public policies become trusted

    NARCIS (Netherlands)

    Breeman, Gerard Engelbert

    2006-01-01

    Trust research has become vitally important in the study of public administration. Many scholars emphasize the importance of trust for society, because it may improve co-operation. The relation between trust and policy making, however, has not yet been discussed very thoroughly. This is remarkable

  9. Information Hiding based Trusted Computing System Design

    Science.gov (United States)

    2014-07-18

    Seeing’ ENF: Power Signature Based Timestamp for Digital Multimedia via Optical Sensing and Signal Processing,” IEEE Trans. on Info. Forensics and...Design Automation Conference, pp. 1-4, June 2007. [23] S. Trimberger. “Trusted Design in FPGAs ”, ACM/ IEEE Design Automation Conference, pp. 5-8...random [8-10]. Meanwhile, we propose to use PUF for the protection of FPGA design intellectual properties [11,12]. Electrical network frequency (ENF

  10. Fostering interpersonal trust on social media: physicians' perspectives and experiences.

    Science.gov (United States)

    Panahi, Sirous; Watson, Jason; Partridge, Helen

    2016-02-01

    The problem of developing and sustaining mutual trust is one of the main barriers to knowledge sharing on social media platforms such as blogs, wikis, micro-blogs and social networking websites. While many studies argue that mutual trust is necessary for online communication and knowledge sharing, few have actually explored and demonstrated how physicians can establish and sustain trusted relationships on social media. To identify approaches through which physicians establish interpersonal trust on social media. Twenty-four physicians, who were active users of social media, were interviewed using a semi-structured approach between 2013 and 2014. Snowball sampling was employed for participant recruitment. The data were analysed using a thematic analysis approach. Physicians trust their peers on social media in a slightly different way than in face-to-face communication. The study found that the majority of participants established trust on social media mainly through previous personal interaction, authenticity and relevancy of voice, professional standing, consistency of communication, peer recommendation, and non-anonymous and moderated sites. Healthcare professionals need to approach social media carefully when using it for knowledge sharing, networking and developing trusted relations with like-minded peers. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  11. Understanding Trust in Financial Services

    DEFF Research Database (Denmark)

    Hansen, Torben

    2012-01-01

    . This research extends prior research by developing a conceptual framework explaining how these constructs affect consumers' trust in their financial service provider. Based on two surveys comprising 764 pension consumers and 892 mortgage consumers, respectively, the results of this study indicate that financial...... healthiness, broad-scope trust, knowledge, and satisfaction positively affect narrow-scope trust in financial services. Furthermore, it is found that broad-scope trust negatively moderates the relationships between financial healthiness and narrow-scope trust and between satisfaction and narrow-scope trust......, respectively. In addition, the results marginally indicate that broad-scope trust negatively moderates the relationship between consumer financial knowledge and narrow-scope trust. This study encourages public policy makers, consumer organizations, and financial service providers to continue, improve, and...

  12. Initial Formation of Trust

    DEFF Research Database (Denmark)

    Schärfe, Henrik; Dougerthery, Elizabeth Ann

    2011-01-01

    In this paper we present a study of how touch may be used as a way of inducing trust in the meeting with a teloperated android, the Geminoid-DK. The use of hapics with Gestalt-based 'Balance Theory' is used as a persuasive desing of the interaction between human and robot. Balance theory includes...

  13. Trust and Critical Thinking

    Science.gov (United States)

    Kleinig, John

    2018-01-01

    This article discusses the tension between trust, as an expression of interpersonal commitment, and critical thinking, which includes a demand for reasons. It explores the importance of each for individual flourishing, and then seeks to establish some ways in which they intersect, drawing on ideas of authority and trustworthiness. It argues that…

  14. Balancing trust and power

    DEFF Research Database (Denmark)

    Broholm-Jørgensen, Marie; Guassora, Ann Dorrit; Reventlow, Susanne

    2017-01-01

    of clinical encounters. Results: From the empirical data, we identified three dimensions of respect: respect for the patient’s autonomy, respect for professional authority and respect as a mutual exchange. A balance of respect influenced trust in the relationship between GP and patients and the transfer...

  15. TRUSTING CROWDSOURCED GEOSPATIAL SEMANTICS

    Directory of Open Access Journals (Sweden)

    P. Goodhue

    2015-08-01

    Full Text Available The degree of trust one can place in information is one of the foremost limitations of crowdsourced geospatial information. As with the development of web technologies, the increased prevalence of semantics associated with geospatial information has increased accessibility and functionality. Semantics also provides an opportunity to extend indicators of trust for crowdsourced geospatial information that have largely focused on spatio-temporal and social aspects of that information. Comparing a feature’s intrinsic and extrinsic properties to associated ontologies provides a means of semantically assessing the trustworthiness of crowdsourced geospatial information. The application of this approach to unconstrained semantic submissions then allows for a detailed assessment of the trust of these features whilst maintaining the descriptive thoroughness this mode of information submission affords. The resulting trust rating then becomes an attribute of the feature, providing not only an indication as to the trustworthiness of a specific feature but is able to be aggregated across multiple features to illustrate the overall trustworthiness of a dataset.

  16. Time and Trust

    DEFF Research Database (Denmark)

    Hansen, Annette Skovsted

    in Africa, we can map a territory, within which current stakeholders from Asia are bound to operate. In the case of Japan, a fifty year history of capacity development projects in Africa has established channels of communication and trust to compete with longer term European, Chinese, and Indian ties. One...

  17. Building Trust in Organic

    OpenAIRE

    Huber, Beate

    2007-01-01

    What are the basics for setting up an organic certification body? How is an efficient and service-oriented certification system implemented? How should the necessary documentation be developed? These are some questions that are explained thoroughly in the completely revised IFOAM publication "Building Trust in Organic".

  18. Social Capital, Institutions and Trust

    NARCIS (Netherlands)

    Nooteboom, B.

    2006-01-01

    This paper analyzes the relations between social capital, institutions and trust.These concepts are full of ambiguity and confusion.This paper attempts to dissolve some of the confusion, by distinguishing trust and control, and analyzing institutional and relational conditions of trust.It presents a

  19. Trust-based belief change

    OpenAIRE

    Lorini, Emiliano; Jiang, Guifei; Perrussel, Laurent

    2014-01-01

    International audience; We propose a modal logic that supports reasoning about trust-based belief change. The term trust-based belief change refers to belief change that depends on the degree of trust the receiver has in the source of information.

  20. Trust It or Trash It?

    Science.gov (United States)

    Trust It or Trash It? About | Contact | Español Tab 1 Tab 2 What is Trust It or Trash It? This is a tool ... be true, it may be. (See the second “Trust it” statement above). Click on each element below ...

  1. Creating trust through narrative strategy

    NARCIS (Netherlands)

    Gabbay, SM; Leenders, RTAJ

    2003-01-01

    In the rational model of trust, an actor's level of trust is a function of the expected gain and loss involved. As a consequence, if A can influence the gain and loss perceived by B, A can influence B's level of trust. In this article we study how A can do this through the strategic use of

  2. Trust, Endangerment and Divine Vulnerability

    DEFF Research Database (Denmark)

    Christoffersen, Mikkel Gabriel

    2017-01-01

    Faith is trusting God in the midst of endangerment. Yet, human experience of excessive suffering has challenged any spontaneous trust in God. In this article, I reconsider the idea of faith as trust in God, adding an emphasis on the divine vulnerability in the incarnation, and I develop a more...

  3. Four Essential Practices for Building Trust

    Science.gov (United States)

    Combs, Julie Peterson; Harris, Sandra; Edmonson, Stacey

    2015-01-01

    The presence of trust can enhance an organization's efforts to fulfill its mission, and the lack of trust can constrict those efforts. The authors offer four essential guidelines to help school leaders communicate in a way that builds trust. Build trust by understanding trust. Trusted leaders demonstrate care, character, and competence in their…

  4. The Condition for Generous Trust.

    Science.gov (United States)

    Shinya, Obayashi; Yusuke, Inagaki; Hiroki, Takikawa

    2016-01-01

    Trust has been considered the "cement" of a society and is much studied in sociology and other social sciences. Most studies, however, have neglected one important aspect of trust: it involves an act of forgiving and showing tolerance toward another's failure. In this study, we refer to this concept as "generous trust" and examine the conditions under which generous trust becomes a more viable option when compared to other types of trust. We investigate two settings. First, we introduce two types of uncertainties: uncertainty as to whether trustees have the intention to cooperate, and uncertainty as to whether trustees have enough competence to accomplish the entrusted tasks. Second, we examine the manner in which trust functions in a broader social context, one that involves matching and commitment processes. Since we expect generosity or forgiveness to work differently in the matching and commitment processes, we must differentiate trust strategies into generous trust in the matching process and that in the commitment process. Our analytical strategy is two-fold. First, we analyze the "modified" trust game that incorporates the two types of uncertainties without the matching process. This simplified setting enables us to derive mathematical results using game theory, thereby giving basic insight into the trust mechanism. Second, we investigate socially embedded trust relationships in contexts involving the matching and commitment processes, using agent-based simulation. Results show that uncertainty about partner's intention and competence makes generous trust a viable option. In contrast, too much uncertainty undermines the possibility of generous trust. Furthermore, a strategy that is too generous cannot stand alone. Generosity should be accompanied with moderate punishment. As for socially embedded trust relationships, generosity functions differently in the matching process versus the commitment process. Indeed, these two types of generous trust coexist, and

  5. Trust and Sensemaking in Organizations

    DEFF Research Database (Denmark)

    Fuglsang, Lars; Jagd, Søren; Olsen, Poul Bitsch

    The literature on trust and the literature on sensemaking constitute two separate streams of literature that are both seen as highly relevant to understanding organisational processes in modern complex high-trust organisations. However, though a few studies have argued for the relevance of linkin...... help furthering the understanding of trust processes in organizations. The variety of links between sensemaking and trust processes is illustrated by the intertwining of trust and four processes of sensemaking: arguing, expecting, committing and manipulation identified by Karl Weick....

  6. HMM-based Trust Model

    DEFF Research Database (Denmark)

    ElSalamouny, Ehab; Nielsen, Mogens; Sassone, Vladimiro

    2010-01-01

    Probabilistic trust has been adopted as an approach to taking security sensitive decisions in modern global computing environments. Existing probabilistic trust frameworks either assume fixed behaviour for the principals or incorporate the notion of ‘decay' as an ad hoc approach to cope with thei...... the major limitation of existing Beta trust model. We show the consistency of the HMM-based trust model and contrast it against the well known Beta trust model with the decay principle in terms of the estimation precision....

  7. Determinants of Network Outcomes

    DEFF Research Database (Denmark)

    Ysa, Tamyko; Sierra, Vicenta; Esteve, Marc

    2014-01-01

    The literature on network management is extensive. However, it generally explores network structures, neglecting the impact of management strategies. In this article we assess the effect of management strategies on network outcomes, providing empirical evidence from 119 urban revitalization...... networks. We go beyond current work by testing a path model for the determinants of network outcomes and considering the interactions between the constructs: management strategies, trust, complexity, and facilitative leadership. Our results suggest that management strategies have a strong effect on network...... outcomes and that they enhance the level of trust. We also found that facilitative leadership has a positive impact on network management as well as on trust in the network. Our findings also show that complexity has a negative impact on trust. A key finding of our research is that managers may wield more...

  8. Managing business networks and buyer-supplier relationships. How information obtained from the business network affects trust, transaction specific investments, collaboration and performance in the Dutch Potted Plant and Flower Industry

    NARCIS (Netherlands)

    Claro, D.P.

    2004-01-01

    Managing networks and buyer-supplier relationships " attempt to provide scientific sound discussion for problems faced in business linkages. Business networks, supply chains and buyer-supplier relationships all refer to business linkages, from a web of connected relationships to a dyadic

  9. A Matter of Trust

    DEFF Research Database (Denmark)

    Blach-Ørsten, Mark; Hartley, Jannie Møller; Wittchen, Maria Bendix

    In 2015 two major journalistic scandals hit the Danish news media. One was a plagiarism scandal in which a freelance foreign correspondent was found to have plagiarized parts of the stories she had filed from other international news media. The other scandal involved a sports journalist who...... was found to have invented a large number of the sources that were quoted in his stories and had made up false co-bylines. In a time of diminishing trust in the news media (Blach-Ørsten & Burkal, 2013; Reuters, 2016) these scandals represented a significant and acute credibility problem for the news media...... that were affected. Using paradigm repair theory this paper analyses which strategies the affected news media employed to re-instore trust in their journalism, and thus in the traditional news paradigm, as quickly as possible. Like previous studies on paradigm repair (Bennet et al, 1975; Hackett, 1984...

  10. Trust in Internet Election

    DEFF Research Database (Denmark)

    Markussen, Randi; Ronquillo, Lorena; Schürmann, Carsten

    2014-01-01

    This paper discusses the Decryption and Counting Ceremony held in conjunction with the internet voting trial on election day in the Ministry of Local Government and Regional Development of Norway in 2013. We examine the organizers' ambition of making the decryption and counting of electronic votes...... public in order to sustain trust in internet voting. We introduce a pragmatic approach to trust that emphasises the inseparability of truth from witnessing it. Based on this and on a description of how the event was made observable and how the complexities in the counting process were disclosed, we...... discuss what we term economy of truth from the perspective of the IT community involved in the ceremony. We claim that broadening the economy of truth by including more explicitly social and political perspectives in the ceremony, and in internet elections in general, and how witnessing is brought about...

  11. Problems of judiciary trust

    Directory of Open Access Journals (Sweden)

    Vuković Slobodan

    2007-01-01

    Full Text Available Topic of the article is problem of trust in judiciary as a most important part of legal system. For all empirical researches so far have shown very law degree of this trust many authors were searching for the causes of this phenomenon. Among multifold causes some are special worth while to be mentioned here: historical inheritance, political pressures, delaying of judiciary decisions, respect of the laws, transferring of responsibility from political power to the judiciary, public comments of judiciary decisions, media pressures, efficiency of judiciary and police. Among inner factors author pays attention to competency of judges, modes of penal policy, modes of judges’ entitlement, problems of communication, involvement into criminal and corruptional affairs, etc.

  12. Trust and Corruption

    DEFF Research Database (Denmark)

    Graeff, Peter; Svendsen, Gert Tinggaard

    2013-01-01

    Why are the Scandinavian countries in the European Union significantly richer than South-ern/Eastern European countries? We try to answer this question from an empirical social capital perspective. In particular, we are interested in the interplay of social trust as a positive and corruption...... capital by applying a path model that accounts for Granger-like causal effects. Our empirical results, referring to a sample of up to 25 EU countries, show that corruption might harm poor European countries but is not able to affect social trust. However, corruption in itself means that resources end up...... in the wrong places and not in socioeconomically optimal investments. There is, therefore, a direct damaging effect of corruption on wealth. This implies that economic actors have to invest higher transaction and control costs which will bind resources to non-productive purposes and thus destroy economic...

  13. Learning to trust: trust and attachment in early psychosis.

    Science.gov (United States)

    Fett, A-K J; Shergill, S S; Korver-Nieberg, N; Yakub, F; Gromann, P M; Krabbendam, L

    2016-05-01

    Distrust and social dysfunction are characteristic in psychosis and may arise from attachment insecurity, which is elevated in the disorder. The relationship between trust and attachment in the early stages of psychosis is unknown, yet could help to understand interpersonal difficulties and disease progression. This study aimed to investigate whether trust is reduced in patients with early psychosis and whether this is accounted for by attachment avoidance and attachment anxiety. We used two trust games with a cooperative and unfair partner in a sample of 39 adolescents with early psychosis and 100 healthy controls. Patients had higher levels of attachment anxiety, but the groups did not differ in attachment avoidance. Basic trust was lower in patients than controls, as indicated by lower initial investments. During cooperation patients increased their trust towards levels of controls, i.e. they were able to learn and to override initial suspiciousness. Patients decreased their trust less than controls during unfair interactions. Anxious attachment was associated with higher basic trust and higher trust during unfair interactions and predicted trust independent of group status. Discussion Patients showed decreased basic trust but were able to learn from the trustworthy behaviour of their counterpart. Worries about the acceptance by others and low self-esteem are associated with psychosis and attachment anxiety and may explain behaviour that is focused on conciliation, rather than self-protection.

  14. On the influence of trust in the spreading of information

    CERN Document Server

    Wu, Hongrun; Gómez, Sergio

    2016-01-01

    The understanding and prediction of information diffusion processes on networks is a major challenge in network theory with many implications in social sciences. Many theoretical advances came at the hand of stochastic spreading models. Nevertheless, these stochastic models overlooked the influence of rational decision on the outcome of the process. For instance, different levels of trust on acquaintances do play a role in the information spreading, and actors may change their spreading decisions during the information diffusion process accordingly. Here, we study an information spreading model where the decision to transmit or not is based on trust. We explore the interplay between the propagation of information and the trust dynamics happening on a two layer multiplex network. Actors' trustable or untrustable states are assimilated as accumulated cooperation or defection behaviors, respectively, in a prisoners' dilemma set up, and controlled by a memory span. The propagation of the information is abstracted...

  15. Trust and Estate Planning

    DEFF Research Database (Denmark)

    Harrington, Brooke

    2012-01-01

    , these professionals keep a significant portion of the world’s private wealth beyond the reach of the state. Trust and estate planning thus contributes to creating and maintaining socioeconomic inequality on a global scale. The significance of the profession has grown as wealth itself has become more fungible......, spurring innovation in legal, organizational, and financial strategies, and thwarting a myriad of laws and policies designed to limit enduring inequality in modern, democratic societies....

  16. Trust in Digital Repositories

    Directory of Open Access Journals (Sweden)

    Elizabeth Yakel

    2013-06-01

    Full Text Available ISO 16363:2012, Space Data and Information Transfer Systems - Audit and Certification of Trustworthy Digital Repositories (ISO TRAC, outlines actions a repository can take to be considered trustworthy, but research examining whether the repository’s designated community of users associates such actions with trustworthiness has been limited. Drawing from this ISO document and the management and information systems literatures, this paper discusses findings from interviews with 66 archaeologists and quantitative social scientists. We found similarities and differences across the disciplines and among the social scientists. Both disciplinary communities associated trust with a repository’s transparency. However, archaeologists mentioned guarantees of preservation and sustainability more frequently than the social scientists, who talked about institutional reputation. Repository processes were also linked to trust, with archaeologists more frequently citing metadata issues and social scientists discussing data selection and cleaning processes. Among the social scientists, novices mentioned the influence of colleagues on their trust in repositories almost twice as much as the experts. We discuss the implications our findings have for identifying trustworthy repositories and how they extend the models presented in the management and information systems literatures.

  17. Using trust to secure geographic and energy aware routing against multiple attacks.

    Science.gov (United States)

    Zhang, Guanghua; Zhang, Yuqing; Chen, Zhenguo

    2013-01-01

    To address the vulnerability of geographic routing to multiple security threats such as false routing information, selective forwarding and the Sybil attack in wireless sensor networks, this paper proposes a trust-based defending model against above-mentioned multiple attacks. Considering the characteristics of resource-constrained sensor nodes, trust values of neighboring nodes on the routing path can be calculated through the Dirichlet distribution function, which is based on data packets' acknowledgements in a certain period instead of energy-consuming monitoring. Trust is combined with the cost of geographic and energy aware routing for selecting the next hop of routing. At the same time, the initial trust is dynamically determined, service requests are restricted for malicious nodes in accordance with trust values, and the impact of node mobility is weakened by the trust evolution. The simulation results and analysis show that the proposed model under multiple attacks has advantages in packet delivery ratio and network lifetime over the existing models.

  18. Methods for reliability evaluation of trust and reputation systems

    Science.gov (United States)

    Janiszewski, Marek B.

    2016-09-01

    Trust and reputation systems are a systematic approach to build security on the basis of observations of node's behaviour. Exchange of node's opinions about other nodes is very useful to indicate nodes which act selfishly or maliciously. The idea behind trust and reputation systems gets significance because of the fact that conventional security measures (based on cryptography) are often not sufficient. Trust and reputation systems can be used in various types of networks such as WSN, MANET, P2P and also in e-commerce applications. Trust and reputation systems give not only benefits but also could be a thread itself. Many attacks aim at trust and reputation systems exist, but such attacks still have not gain enough attention of research teams. Moreover, joint effects of many of known attacks have been determined as a very interesting field of research. Lack of an acknowledged methodology of evaluation of trust and reputation systems is a serious problem. This paper aims at presenting various approaches of evaluation such systems. This work also contains a description of generalization of many trust and reputation systems which can be used to evaluate reliability of such systems in the context of preventing various attacks.

  19. Achieving Optimal Privacy in Trust-Aware Social Recommender Systems

    Science.gov (United States)

    Dokoohaki, Nima; Kaleli, Cihan; Polat, Huseyin; Matskin, Mihhail

    Collaborative filtering (CF) recommenders are subject to numerous shortcomings such as centralized processing, vulnerability to shilling attacks, and most important of all privacy. To overcome these obstacles, researchers proposed for utilization of interpersonal trust between users, to alleviate many of these crucial shortcomings. Till now, attention has been mainly paid to strong points about trust-aware recommenders such as alleviating profile sparsity or calculation cost efficiency, while least attention has been paid on investigating the notion of privacy surrounding the disclosure of individual ratings and most importantly protection of trust computation across social networks forming the backbone of these systems. To contribute to addressing problem of privacy in trust-aware recommenders, within this paper, first we introduce a framework for enabling privacy-preserving trust-aware recommendation generation. While trust mechanism aims at elevating recommender's accuracy, to preserve privacy, accuracy of the system needs to be decreased. Since within this context, privacy and accuracy are conflicting goals we show that a Pareto set can be found as an optimal setting for both privacy-preserving and trust-enabling mechanisms. We show that this Pareto set, when used as the configuration for measuring the accuracy of base collaborative filtering engine, yields an optimized tradeoff between conflicting goals of privacy and accuracy. We prove this concept along with applicability of our framework by experimenting with accuracy and privacy factors, and we show through experiment how such optimal set can be inferred.

  20. Do people trust dentists? Development of the Dentist Trust Scale.

    Science.gov (United States)

    Armfield, J M; Ketting, M; Chrisopoulos, S; Baker, S R

    2017-09-01

    This study aimed to adapt a measure of trust in physicians to trust in dentists and to assess the reliability and validity of the measure. Questionnaire data were collected from a simple random sample of 596 Australian adults. The 11-item General Trust in Physicians Scale was modified to apply to dentists. The Dentist Trust Scale (DTS) had good internal consistency (α = 0.92) and exploratory factor analysis revealed a single-factor solution. Lower DTS scores were associated with less trust in the dentist last visited, having previously changed dentists due to unhappiness with the care received, currently having dental pain, usual visiting frequency, dental avoidance, and with past experiences of discomfort, gagging, fainting, embarrassment and personal problems with the dentist. The majority of people appear to exhibit trust in dentists. The DTS shows promising reliability and validity evidence. © 2017 Australian Dental Association.

  1. A Model of Trusted Measurement Model

    Directory of Open Access Journals (Sweden)

    Ma Zhili

    2017-01-01

    Full Text Available A model of Trusted Measurement supporting behavior measurement based on trusted connection architecture (TCA with three entities and three levels is proposed, and a frame to illustrate the model is given. The model synthesizes three trusted measurement dimensions including trusted identity, trusted status and trusted behavior, satisfies the essential requirements of trusted measurement, and unified the TCA with three entities and three levels.

  2. Quantum key distribution using card, base station and trusted authority

    Energy Technology Data Exchange (ETDEWEB)

    Nordholt, Jane E.; Hughes, Richard John; Newell, Raymond Thorson; Peterson, Charles Glen; Rosenberg, Danna; McCabe, Kevin Peter; Tyagi, Kush T.; Dallmann, Nicholas

    2017-06-14

    Techniques and tools for quantum key distribution ("QKD") between a quantum communication ("QC") card, base station and trusted authority are described herein. In example implementations, a QC card contains a miniaturized QC transmitter and couples with a base station. The base station provides a network connection with the trusted authority and can also provide electric power to the QC card. When coupled to the base station, after authentication by the trusted authority, the QC card acquires keys through QKD with a trust authority. The keys can be used to set up secure communication, for authentication, for access control, or for other purposes. The QC card can be implemented as part of a smart phone or other mobile computing device, or the QC card can be used as a fillgun for distribution of the keys.

  3. Quantum key distribution using card, base station and trusted authority

    Science.gov (United States)

    Nordholt, Jane Elizabeth; Hughes, Richard John; Newell, Raymond Thorson; Peterson, Charles Glen; Rosenberg, Danna; McCabe, Kevin Peter; Tyagi, Kush T; Dallman, Nicholas

    2015-04-07

    Techniques and tools for quantum key distribution ("QKD") between a quantum communication ("QC") card, base station and trusted authority are described herein. In example implementations, a QC card contains a miniaturized QC transmitter and couples with a base station. The base station provides a network connection with the trusted authority and can also provide electric power to the QC card. When coupled to the base station, after authentication by the trusted authority, the QC card acquires keys through QKD with a trusted authority. The keys can be used to set up secure communication, for authentication, for access control, or for other purposes. The QC card can be implemented as part of a smart phone or other mobile computing device, or the QC card can be used as a fillgun for distribution of the keys.

  4. Sociology of Trust Towards a Sociology of `E-trust'

    OpenAIRE

    Rutter, Jason

    2001-01-01

    This paper focuses on the importance of trust in business-to-consumer e-commerce.Divided into three sections the paper first asks the question of why trust is important to the development and implementation of e-commerce and suggests some of the areas where user trust is specifically important. The second offers a view of trust developed using sociological theory and interactionism and looks at how this can inform our understanding of e-commerce users. Finally, the paper suggests a number of ...

  5. Dynamical Trust and Reputation Computation Model for B2C E-Commerce

    Directory of Open Access Journals (Sweden)

    Bo Tian

    2015-10-01

    Full Text Available Trust is one of the most important factors that influence the successful application of network service environments, such as e-commerce, wireless sensor networks, and online social networks. Computation models associated with trust and reputation have been paid special attention in both computer societies and service science in recent years. In this paper, a dynamical computation model of reputation for B2C e-commerce is proposed. Firstly, conceptions associated with trust and reputation are introduced, and the mathematical formula of trust for B2C e-commerce is given. Then a dynamical computation model of reputation is further proposed based on the conception of trust and the relationship between trust and reputation. In the proposed model, classical varying processes of reputation of B2C e-commerce are discussed. Furthermore, the iterative trust and reputation computation models are formulated via a set of difference equations based on the closed-loop feedback mechanism. Finally, a group of numerical simulation experiments are performed to illustrate the proposed model of trust and reputation. Experimental results show that the proposed model is effective in simulating the dynamical processes of trust and reputation for B2C e-commerce.

  6. Securing Trust on the Market

    OpenAIRE

    Vurušić, Gordan

    2004-01-01

    The purpose of this paper is twofold: first, on the normative level, the author compares three main ways of securing trust on imperfectly competitive markets – informal social enforcement, formal-third party enforcement, and conditional internal commitment to the cultural norm of trust, in terms of the standard criteria of allocative and adaptive efficiency. Admittedly, the three ways of securing trust in reality rarely exist separately and as ideal types, but the author separates them for th...

  7. Trust in Social Computing

    Science.gov (United States)

    2014-04-07

    Computing Arizona State University Data Mining and Machine Learning Lab WWW2014 52 PageRank [Page et al., 1999]  PageRank is a global metric... Pagerank is from trustees’ perspective  The trustworthiness of a trustee is aggregated from her trustors ─Trustors’ trustworthiness ─Trust values...Frontiers, 7(4-5):337–358, 2005. [Page et al., 1999] L. Page, S. Brin, R. Motwani, and T. Winograd. The pagerank citation ranking: Bringing order to the web

  8. Trust is other people

    DEFF Research Database (Denmark)

    Luckner, Naemi; Werner, Katharina; Subasi, Özge

    , the Internet is often experienced as a place of anonymity, and people are scared of the ’figurative creep’ lurking behind every dark corner. This view on online environments can be a reason for potential sharers not to use sharing platforms. To explore how people view such issues, we conducted an open...... concerning the interaction with strangers through the platform. Putting trust in an online sharing community seems to be the biggest obstacle that influences whether people draw away rather than move closer together and start collaborating in the sharing community. Here, we report on the main issues...

  9. Trust for intelligent recommendation

    CERN Document Server

    Bhuiyan, Touhid

    2013-01-01

    Recommender systems are one of the recent inventions to deal with the ever-growing information overload in relation to the selection of goods and services in a global economy. Collaborative Filtering (CF) is one of the most popular techniques in recommender systems. The CF recommends items to a target user based on the preferences of a set of similar users known as the neighbors, generated from a database made up of the preferences of past users. In the absence of these ratings, trust between the users could be used to choose the neighbor for recommendation making. Better recommendations can b

  10. Trust in Diverse Teams

    DEFF Research Database (Denmark)

    Clausen, Lisbeth

    Multicultural membership and diversity in teams are important to maintain effectiveness in organizations in a global business environment. Multicultural teams offer great potential in international collaboration just as top management teams are becoming increasingly diversified. However......, maintaining team cohesiveness in multicultural teams to collaborate effectively presents a number of challenges. The present study employs the concept of trust to explore influences on team collaboration in high performing teams. The study is based on observation of teams in seven multinational corporations...... as nationalities, gender, functional expertise and international experience. The study contributes insights to diverse teams through a processual study of micro-processes in global organizational contexts crossing multicultural boundaries....

  11. Consumer Trust in Information Sources

    Directory of Open Access Journals (Sweden)

    Brad Love

    2013-06-01

    Full Text Available Trust is essential to understanding public reaction to innovative issues. This research focuses on trust in information sources by explicating the construct of trust and testing a comprehensive model on several information sources about genetically modified foods. Results from a survey of 369 participants reveal the significance of projecting competence and the role of the environment in which a target public receives information. Perceptions of regulatory, social, business, and technical environments affect how likely individuals are to follow advice from institutions like the Food and Drug Administration and the news media. Future research should incorporate knowledge levels and personal relevance as variables likely to influence trusting relationships.

  12. Designing High-Trust Organizations

    DEFF Research Database (Denmark)

    Jagd, Søren

    The specific problem considered in this paper is what are the key issues to consider for managers involved in designing high-trust organizations, a design problem still not properly explored. This paper intends to take the first step in filling this lacuna. In the paper, I first present...... the existing management and research literature on building high-trust organizations. Then I explore Alan Fox’s (1974) analysis of low-trust vs. high-trust dynamics which, I argue, may serve as a theoretically stronger basis for understanding the issues management have to consider when designing hightrust...

  13. Trusting Relationships in International Politics

    DEFF Research Database (Denmark)

    Keating, Vincent Charles; Ruzicka, Jan

    2014-01-01

    How can trusting relationships be identified in international politics? The recent wave of scholarship on trust in International Relations answers this question by looking for one or the combination of three indicators – the incidence of cooperation; discourses expressing trust; or the calculated...... acceptance of vulnerability. These methods are inadequate both theoretically and empirically. Distinguishing between the concepts of trust and confidence, we instead propose an approach that focuses on the actors’ hedging strategies. We argue that actors either declining to adopt or removing hedging...

  14. Forms, Sources and Processes of Trust

    NARCIS (Netherlands)

    Nooteboom, B.

    2006-01-01

    This chapter reviews some key points in the analysis of trust, based on Nooteboom (2002)i.The following questions are addressed.What can we have trust in?What is the relation between trust and control?What are the sources of trust? And what are its limits?By what process is trust built up and broken

  15. Generalized Trust and Trust in Institutions in Confucian Asia

    Science.gov (United States)

    Tan, Soo Jiuan; Tambyah, Siok Kuan

    2011-01-01

    This study examines generalized trust and trust in institutions in Confucian Asia, covering six countries namely, China, Japan, Singapore, South Korea, Taiwan and Vietnam, and one dependent region, Hong Kong. Using data from the 2006 AsiaBarometer Survey, our study affirms the reliability and validity of using a two-item scale to measure…

  16. The Need to Trust and to Trust More Wisely in Academe

    Science.gov (United States)

    Bowman, Richard F.

    2012-01-01

    Where trust is an issue, there is no trust. Trust in diverse organizations has never been lower. A shadow of doubt stalks one's every decision to trust collegially and institutionally. Still, colleagues sense intuitively that institutions cannot function optimally without a bedrock level of trust. In academic life, trust is a form of social…

  17. Understanding the Role of Trust in Virtual Communities of Practice: Perspectives from Members and Businesses

    DEFF Research Database (Denmark)

    Thu Pho, Hang; Saustrup, Nina; Tambo, Torben

    2012-01-01

    on trust taxonomy by researchers’ past studies. Facebook and LinkedIn are known as social networking sites (SNSs) but they comprise different VCoPs while Experts-Exchange is a sole virtual community of practitioners in IT. Firstly, this paper adopts the trust dimensions conceptualized by Usoro et al. (2006...... and experience. This paper is qualitative based on literature studies and employs a comparative methodology in studying trust, trust perception and psycho-social relations to VCoPs. This paper investigates three case studies of virtual community providers (VCPs) (Facebook, LinkedIn and Experts-Exchange) grounded...

  18. InDependent Diabetes Trust.

    Science.gov (United States)

    Evans, Roger

    2014-10-21

    The InDependent Diabetes Trust is a UK-based charity run by people with diabetes for others living with the condition. It was set up in 1994 as the Insulin Dependent Diabetes Trust (IDDT), a registered charity. It is run entirely by voluntary donations and does not accept funding from pharmaceutical companies.

  19. Mediating Trust in Terrorism Coverage

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    crisis. While the framework is presented in the context of television coverage of a terror-related crisis situation, it can equally be used in connection with all other forms of mediated trust. Key words: National crisis, risk communication, crisis management, television coverage, mediated trust....

  20. Towards trusted trade-lanes

    NARCIS (Netherlands)

    Hulstijn, J.; Hofman, W.; Zomer, G.; Tan, Y.H.

    2016-01-01

    Customs administrations are exploring system-based approaches to regulatory supervision, taking the entire set of controls in a process into account. In addition to Trusted Traders, which are recognized by a certification process, customs are considering to identify so called Trusted Trade Lanes:

  1. Context-Aware Trust Domains

    NARCIS (Netherlands)

    Neisse, R.; van Sinderen, Marten J.; Havinga, P.J.M.; Havinga, Paul J.M.; Lijding, M.E.M.; Meratnia, Nirvana; Meratnia, N.; Wegdam, M.

    Context-aware service platforms need to establish and manage trust relationships for users to know if the user’s privacy policies are being enforced and for service providers to control access to their services. Current trust solutions are not suitable for this because they do not address in an

  2. Trust and New Communication Technologies

    DEFF Research Database (Denmark)

    Ess, Charles

    2010-01-01

    I approach the philosophical analyses of the phenomenon of trust vis-à-vis online communication beginning with an overview from within the framework of computer-mediated communication (CMC) of concerns and paradigmatic failures of trust in the history of online communication. I turn to the more...

  3. In the CJEU Judges Trust

    DEFF Research Database (Denmark)

    Mayoral, Juan A.

    2016-01-01

    This article aims to highlight the relevance of judicial trust in international courts, focusing on national judges' trust in the Court of Justice of the European Union (CJEU). EU scholars have put a great deal of effort into explaining how legal and political factors affect the use of preliminar...

  4. Integrity Constraints in Trust Management

    NARCIS (Netherlands)

    Etalle, Sandro; Winsborough, William H.

    We introduce the use, monitoring, and enforcement of integrity constraints in trust managementstyle authorization systems. We consider what portions of the policy state must be monitored to detect violations of integrity constraints. Then we address the fact that not all participants in a trust

  5. riences from REACH Trust, Malawi

    African Journals Online (AJOL)

    Drawing on the experiences of REACH Trust, this paper highlights practical lessons of using research processes and outcomes to promote equity in health policy and practice. The REACH '11'ust is first introduced. Case studies are then used to highlight how REACH Trust has worked in a par- ticipatory manner with key ...

  6. Trusted computing strengthens cloud authentication.

    Science.gov (United States)

    Ghazizadeh, Eghbal; Zamani, Mazdak; Ab Manan, Jamalul-lail; Alizadeh, Mojtaba

    2014-01-01

    Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM). Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM) are great technologies for solving the trust and security concerns in the cloud identity environment. Single sign-on (SSO) and OpenID have been released to solve security and privacy problems for cloud identity. This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in .Net environment. Security analyzing, simulation, and BLP confidential model are three ways to evaluate and analyze our proposed model.

  7. Trusted Computing Strengthens Cloud Authentication

    Science.gov (United States)

    2014-01-01

    Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM). Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM) are great technologies for solving the trust and security concerns in the cloud identity environment. Single sign-on (SSO) and OpenID have been released to solve security and privacy problems for cloud identity. This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in .Net environment. Security analyzing, simulation, and BLP confidential model are three ways to evaluate and analyze our proposed model. PMID:24701149

  8. Trusted Computing Strengthens Cloud Authentication

    Directory of Open Access Journals (Sweden)

    Eghbal Ghazizadeh

    2014-01-01

    Full Text Available Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM. Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM are great technologies for solving the trust and security concerns in the cloud identity environment. Single sign-on (SSO and OpenID have been released to solve security and privacy problems for cloud identity. This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in .Net environment. Security analyzing, simulation, and BLP confidential model are three ways to evaluate and analyze our proposed model.

  9. Towards a Formal Notion of Trust

    DEFF Research Database (Denmark)

    Nielsen, Mogens; Krukow, Karl Kristian

    2003-01-01

    Trust management systems have been proposed as an alternative to traditional security mechanisms in Global Computing. We present some challenges in establishing a formal foundation for the notion of trust, and some preliminary ideas towards a category of trust models.......Trust management systems have been proposed as an alternative to traditional security mechanisms in Global Computing. We present some challenges in establishing a formal foundation for the notion of trust, and some preliminary ideas towards a category of trust models....

  10. Trusted intermediating agents in electronic trade networks

    NARCIS (Netherlands)

    T.B. Klos (Tomas); F. Alkemade (Floortje)

    2005-01-01

    htmlabstract Electronic commerce and trading of information goods significantly impact the role of intermediaries: consumers can bypass intermediating agents by forming direct links to producers. One reason that traditional intermediaries can still make a profit, is that they have more knowledge of

  11. Trust-based environmental regulation.

    Science.gov (United States)

    Lange, Bettina; Gouldson, Andy

    2010-10-15

    Within this paper, we examine the contribution that trust-based relationships can make to achieving better-and particularly more effective, efficient and equitable-environmental regulation. While levels of trust in regulators, regulatory processes and outcomes are often discussed, the influence of trust on different actors and on different measures of regulatory performance is poorly understood. Within this paper, we define trust-based environmental regulation as a specific regulatory style that involves openness and cooperation in interaction between regulated, regulators and third-party stakeholders in order to achieve environmental protection objectives. We then discuss the pros and cons of trust relationships between regulators, regulated businesses and citizens for achieving behavioural change towards greater environmental protection. To illustrate the significance of these issues, we then examine three forms of contractual regulatory style where trust relationships are critically important: responsive regulation, self-regulation and environmental agreements. Based on this analysis, we highlight the importance of trust-based relationships, and we argue that one of the greatest contributions of trust-based environmental regulation is to challenge how we think about regulation. Trust is often understood as enabling existing regulatory relationships or in the case of self-regulation as a complement to regulation. However, we argue that the real potential of trust is to open up new ways for participants in regulatory regimes to engage in collective action, to go beyond a perception of regulation as driven by the competing interests of individual actors, and thus, to open up new channels of influence for behavioural change towards greater environmental protection. Our analysis therefore has great relevance for future research and for on-going debates on the future of regulation. Copyright © 2010. Published by Elsevier B.V.

  12. Towards Trust Engineering for Opportunistic Cloud Services

    DEFF Research Database (Denmark)

    Kuada, Eric

    2014-01-01

    The systematic review methodology has been employed to review trust related studies in cloud computing. It was observed that trusted computing technologies and reputation based approaches are the main approaches to trust engineering in cloud computing. Also, trusted third party approaches...... and the deployment model play a significant role in enhancing trust between service providers and consumers. It was observed that the concept of trust is used loosely without any formal specification in cloud computing discussions and trust engineering in general. As a first step towards addressing this problem, we...... have contextualized the formal trust specification in multi-agent environments for cloud computing....

  13. Trust dynamics in a large system implementation

    DEFF Research Database (Denmark)

    Schlichter, Bjarne Rerup; Rose, Jeremy

    2013-01-01

    A large information systems implementation (such as Enterprise Resource Planning systems) relies on the trust of its stakeholders to succeed. Such projects impact diverse groups of stakeholders, each with their legitimate interests and expectations. Levels of stakeholder trust can be expected...... outcomes, but largely ignored the dynamics of trust relations. Giddens, as part of his study of modernity, theorises trust dynamics in relation to abstract social systems, though without focusing on information systems. We use Giddens’ concepts to investigate evolving trust relationships in a longitudinal......, the maintenance, breakdown and restoration of trust, the role of the information system in restoring trust, and the emergent and reciprocal nature of trust and project outcomes....

  14. Trust and Social Capital Research in Hungarian Economic Sociology, 1995-2000

    National Research Council Canada - National Science Library

    Dén-Nagy, Ildikó

    2013-01-01

    The concepts of social networks, social capital and trust and their impact on the economic arrangements and performance of nascent capitalist economies have raised many research questions in the post...

  15. Interpersonal trust across six Asia-Pacific countries: testing and extending the 'high trust society' and 'low trust society' theory.

    Directory of Open Access Journals (Sweden)

    Paul R Ward

    Full Text Available BACKGROUND: Trust is regarded as a necessary component for the smooth running of society, although societal and political modernising processes have been linked to an increase in mistrust, potentially signalling social and economic problems. Fukuyama developed the notion of 'high trust' and 'low trust' societies, as a way of understanding trust within different societies. The purpose of this paper is to empirically test and extend Fukuyama's theory utilising data on interpersonal trust in Taiwan, Hong Kong, South Korea, Japan, Australia and Thailand. This paper focuses on trust in family, neighbours, strangers, foreigners and people with a different religion. METHODS: Cross-sectional surveys were undertaken in 2009-10, with an overall sample of 6331. Analyses of differences in overall levels of trust between countries were undertaken using Chi square analyses. Multivariate binomial logistic regression analysis was undertaken to identify socio-demographic predictors of trust in each country. RESULTS: Our data indicate a tripartite trust model: 'high trust' in Australia and Hong Kong; 'medium trust' in Japan and Taiwan; and 'low trust' in South Korea and Thailand. Trust in family and neighbours were very high across all countries, although trust in people with a different religion, trust in strangers and trust in foreigners varied considerably between countries. The regression models found a consistent group of subpopulations with low trust across the countries: people on low incomes, younger people and people with poor self-rated health. The results were conflicting for gender: females had lower trust in Thailand and Hong Kong, although in Australia, males had lower trust in strangers, whereas females had lower trust in foreigners. CONCLUSION: This paper identifies high, medium and low trust societies, in addition to high and low trusting population subgroups. Our analyses extend the seminal work of Fukuyama, providing both corroboration and

  16. Information Security and Open Source Dual Use Security Software: Trust Paradox

    OpenAIRE

    Silic, Mario; Back, Andrea

    2013-01-01

    Part 1: Full Papers - Security and Open Standards; International audience; Nmap, free open source utility for network exploration or security auditing, today counts for thirteen million lines of code representing four thousand years of programming effort. Hackers can use it to conduct illegal activities, and information security professionals can use it to safeguard their network. In this dual-use context, question of trust is raised. Can we trust programmers developing open source dual use s...

  17. Incremental Trust in Grid Computing

    DEFF Research Database (Denmark)

    Brinkløv, Michael Hvalsøe; Sharp, Robin

    2007-01-01

    This paper describes a comparative simulation study of some incremental trust and reputation algorithms for handling behavioural trust in large distributed systems. Two types of reputation algorithm (based on discrete and Bayesian evaluation of ratings) and two ways of combining direct trust...... and reputation (discrete combination and combination based on fuzzy logic) are considered. The various combinations of these methods are evaluated from the point of view of their ability to respond to changes in behaviour and the ease with which suitable parameters for the algorithms can be found in the context...

  18. Trust management in cloud services

    CERN Document Server

    Noor, Talal H; Bouguettaya, Athman

    2014-01-01

    This book describes the design and implementation of Cloud Armor, a novel approach for credibility-based trust management and automatic discovery of cloud services in distributed and highly dynamic environments. This book also helps cloud users to understand the difficulties of establishing trust in cloud computing and the best criteria for selecting a service cloud. The techniques have been validated by a prototype system implementation and experimental studies using a collection of real world trust feedbacks on cloud services.The authors present the design and implementation of a novel pro

  19. Trusted counsellor retires

    CERN Multimedia

    2006-01-01

    His astute counsel, knowing smile and distinguished eloquence will be missed by many. With a pang of regret, the man himself admits that 'CERN was like a drug for me'. Last week, Jean-Daniel Mandica retired, after 40 years of loyal service. He was the trusted counsellor of every Director of the Administration and Director-General for eighteen years, from 1986 to 2003. Head of the planning unit for the Directorate and the Administration from 1986 to 1996, he was then named Head of the Directorate Services Unit in 1996, a position he held until the end of 2003. Throughout that time, he conducted key tasks for the Organization, such as restructuring the Administration and carrying out audits. His role in the creation of Microcosm and his commitment to CERN's participation in the Universal Exposition at Seville in 1992 contributed in no small part to the spread of the Laboratory's fame. Jean-Daniel Mandica's incomparable knowledge of the Administration, sense of diplomacy and great ability to listen made him a v...

  20. Ethnic Diversity and Social Trust

    DEFF Research Database (Denmark)

    Dinesen, Peter Thisted; Sønderskov, Kim Mannemar

    2015-01-01

    diversity. In contrast, we analyze how ethnic diversity of the immediate micro-context—where interethnic exposure is inevitable—affects trust. We do this using Danish survey data linked with register-based data, which enables us to obtain precise measures of the ethnic diversity of each individual......We argue that residential exposure to ethnic diversity reduces social trust. Previous within-country analyses of the relationship between contextual ethnic diversity and trust have been conducted at higher levels of aggregation, thus ignoring substantial variation in actual exposure to ethnic......’s residential surroundings. We focus on contextual diversity within a radius of 80 meters of a given individual, but we also compare the effect in the micro-context to the impact of diversity in more aggregate contexts. Our results show that ethnic diversity in the micro-context affects trust negatively...

  1. Trust me, I am Robot!

    DEFF Research Database (Denmark)

    Stoyanova, Angelina; Drefeld, Jonas; Tanev, Stoyan

    /developers to further refine their product design. The paper will conclude with a more detailed conceptual analysis of interpersonal trust in human-technology interactions. The personalization of technological artifacts or assigning personality to active objects has been considered as natural to human beings (Gombrich...... on multiple case studies. The investigation so far suggests that it will be necessary to conceptualize three types of trust – interpersonal, social trust and trust in automation. This knowledge is incorporated in a descriptive model that could be used by technology and application designers......, 1972). The analysis will use some of the insights of Byzantine philosophy (Kapriev, 2005) regarding the distinction between the terms hypostasis (unique actualization of an essence) and prosopon (persona or person) to suggest a more general notion of interpersonality that could provide some additional...

  2. Ethnic Diversity and Social Trust

    DEFF Research Database (Denmark)

    Dinesen, Peter Thisted; Sønderskov, Kim Mannemar

    2017-01-01

    Due to its wide-ranging implications for social cohesion in diversifying Western countries, the question of the potential negative consequences of ethnic diversity for social trust is arguably the most contentious question in the literature on social trust. In this chapter we critically review...... the empirical evidence for a negative relationship between contextual ethnic diversity (measured locally within countries) and social trust. We cautiously conclude that there are indications of a negative relationship, although with important variations across study characteristics including national setting......, context unit analyzed, and conditioning on moderating influences. Building on the review, we highlight a number of paths for theoretical and methodological advances, which we argue would advance the literature on the relationship between ethnic diversity and social trust....

  3. International Trust and Public Diplomacy

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    as described by Brewer, Gross, Aday and Willnat (2004). The paper is based on case studies of five Public Diplomacy activities: Iranian President Hassan Rouhani’s letter in The Washington Post (2013); Denmark’s trust-building effort in Pakistan following the so-called “Muhammad crisis” (from 2010); The British...... Council’s strategy for trust-building in China (2012); Russian President Vladimir Putin’s letter in The New York Times (2013), and the USA’s trust-building effort in Turkey (from 2006). The best results have been obtained where Public Diplomacy has been linked to successful traditional diplomacy at state...... for a Public Diplomacy initiative to succeed. From a social responsible perspective journalists may have a role to play in creating international trust, and Public Diplomacy staffs consider it already important...

  4. Trust, dependence and interorganizational systems

    NARCIS (Netherlands)

    Ibrahim, M.K.M.

    2006-01-01

    Organizations form interorganizational relationships and utilize information technology to improve performance. This thesis discusses the influences of dependence and different types of trust on the use of interorganizational systems and subsequently the attainment of strategic benefits. The

  5. Metadata trust in a personal video recorder

    NARCIS (Netherlands)

    Boertjes, E.M.

    2004-01-01

    Trust is the belief or confidence in someone that their recommendations will work for you, i.e. that you will like the TV-programs (or other content) that they recommend. Many systems incorporate some notion of trust. Trust is more than similarity in taste, which makes trust a broader concept than

  6. 7 CFR 1400.100 - Revocable trust.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Revocable trust. 1400.100 Section 1400.100... AND SUBSEQUENT CROP, PROGRAM, OR FISCAL YEARS Payment Limitation § 1400.100 Revocable trust. A revocable trust and the grantor of the trust will be considered to be the same person. ...

  7. Trust, Behavior, and High School Outcomes

    Science.gov (United States)

    Romero, Lisa S.

    2015-01-01

    Purpose: The purpose of this paper is to contribute to the literature on student trust and to examine the relationship between student trust, behavior, and academic outcomes in high school. It asks, first, does trust have a positive effect on high school outcomes? Second, does trust influence student behavior, exerting an indirect effect on…

  8. A Formal Model for Trust Lifecycle Management

    DEFF Research Database (Denmark)

    Wagealla, Waleed; Carbone, Marco; English, Colin

    2003-01-01

    We propose a formal model of trust informed by the Global Computing scenario and focusing on the aspects of trust formation, evolution, and propagation. The model is based on a novel notion of trust structures which, building on concepts from trust management and domain theory, feature at the same...

  9. The Complex Relationship between Cyberbullying and Trust

    Science.gov (United States)

    Pieschl, Stephanie; Porsch, Torsten

    2017-01-01

    Theoretically, there are strong arguments for a relationship between cyberbullying and trust. On the one hand, trust is built on experiences; thus, experiences of malevolence such as cyberbullying might contribute to low trust. On the other hand, high trust may lead to risky online behavior such as self-disclosures that could increase the risk of…

  10. Building and Understanding Trust Relationships

    Science.gov (United States)

    2012-03-17

    to create cultures in new groups, but also to manage cultural issues in mature organizations.”57 Senior military leaders face the challenge of...no different . It requires military leaders to adhere to responsibilities, remain politically neutral, and provide viable military alternatives when... debate and formulation process.82 As trust goes, so does influence. Without trust, even the most highly decorated senior military leader increase the

  11. The Relationship between Teamwork and Organizational Trust

    Directory of Open Access Journals (Sweden)

    Musab Işık

    2015-04-01

    Full Text Available The aim of this study is to investigate the relationship between teamwork and organizational trust. In the implementation section the data from the survey of 250 workers is employed in call centers in Erzurum by using relevant statistical methods. Consequently, it is found that there is a positive and significant relationship between teamwork and organizational trust. Thus, the hypothesis of the study is supported as it was expected. Besides, it is found that there are positive and significant relationships between communication, openness to innovation, participation-trust in teamwork and organizational trust, trust in management, trust in co-workers, and trust in workplace.

  12. Trust is a must: What is involved in trusting those who manage forest fires?

    Science.gov (United States)

    Adam Liljeblad; Bill Borrie; Alan Watson

    2010-01-01

    Trust is a complicated emotion. In the past, many social scientists have studied trust. They discovered that trust involves a number of beliefs and emotions. The scientists in this study were interested in learning more about trust. They believed that forest managers can do a better job if people trust them to do what is best for citizens and the environment (figure 1...

  13. Influence of trust in the spreading of information

    Science.gov (United States)

    Wu, Hongrun; Arenas, Alex; Gómez, Sergio

    2017-01-01

    The understanding and prediction of information diffusion processes on networks is a major challenge in network theory with many implications in social sciences. Many theoretical advances occurred due to stochastic spreading models. Nevertheless, these stochastic models overlooked the influence of rational decisions on the outcome of the process. For instance, different levels of trust in acquaintances do play a role in information spreading, and actors may change their spreading decisions during the information diffusion process accordingly. Here, we study an information-spreading model in which the decision to transmit or not is based on trust. We explore the interplay between the propagation of information and the trust dynamics happening on a two-layer multiplex network. Actors' trustable or untrustable states are defined as accumulated cooperation or defection behaviors, respectively, in a Prisoner's Dilemma setup, and they are controlled by a memory span. The propagation of information is abstracted as a threshold model on the information-spreading layer, where the threshold depends on the trustability of agents. The analysis of the model is performed using a tree approximation and validated on homogeneous and heterogeneous networks. The results show that the memory of previous actions has a significant effect on the spreading of information. For example, the less memory that is considered, the higher is the diffusion. Information is highly promoted by the emergence of trustable acquaintances. These results provide insight into the effect of plausible biases on spreading dynamics in a multilevel networked system.

  14. An Operational Semantics for Trust Policies

    DEFF Research Database (Denmark)

    Krukow, Karl Kristian

    2005-01-01

    In the trust-structure model of trust management, principals specify their trusting relationships with other principals in terms of trust policies. In their paper on trust structures, Carbone et al. present a language for trust policies, and provide a suitable denotational semantics. The semantics...... ensures that for any collection of trust policies, there is always a unique global trust-state, compatible with all the policies, specifying everyone's degree of trust in everyone else. However, as the authors themselves point out, the language lacks an operational model: the global trust-state is a well......-defined mathematical object, but it is not clear how principals can actually compute it. This becomes even more apparent when one considers the intended application environment: vast numbers of autonomous principals, distributed and possibly mobile. We provide a compositional operational semantics for a language...

  15. Clustering recommenders in collaborative filtering using explicit trust information

    KAUST Repository

    Pitsilis, Georgios

    2011-01-01

    In this work, we explore the benefits of combining clustering and social trust information for Recommender Systems. We demonstrate the performance advantages of traditional clustering algorithms like k-Means and we explore the use of new ones like Affinity Propagation (AP). Contrary to what has been used before, we investigate possible ways that social-oriented information like explicit trust could be exploited with AP for forming clusters of high quality. We conducted a series of evaluation tests using data from a real Recommender system Epinions.com from which we derived conclusions about the usefulness of trust information in forming clusters of Recommenders. Moreover, from our results we conclude that the potential advantages in using clustering can be enlarged by making use of the information that Social Networks can provide. © 2011 International Federation for Information Processing.

  16. Trust information-based privacy architecture for ubiquitous health.

    Science.gov (United States)

    Ruotsalainen, Pekka Sakari; Blobel, Bernd; Seppälä, Antto; Nykänen, Pirkko

    2013-10-08

    Ubiquitous health is defined as a dynamic network of interconnected systems that offers health services independent of time and location to a data subject (DS). The network takes place in open and unsecure information space. It is created and managed by the DS who sets rules that regulate the way personal health information is collected and used. Compared to health care, it is impossible in ubiquitous health to assume the existence of a priori trust between the DS and service providers and to produce privacy using static security services. In ubiquitous health features, business goals and regulations systems followed often remain unknown. Furthermore, health care-specific regulations do not rule the ways health data is processed and shared. To be successful, ubiquitous health requires novel privacy architecture. The goal of this study was to develop a privacy management architecture that helps the DS to create and dynamically manage the network and to maintain information privacy. The architecture should enable the DS to dynamically define service and system-specific rules that regulate the way subject data is processed. The architecture should provide to the DS reliable trust information about systems and assist in the formulation of privacy policies. Furthermore, the architecture should give feedback upon how systems follow the policies of DS and offer protection against privacy and trust threats existing in ubiquitous environments. A sequential method that combines methodologies used in system theory, systems engineering, requirement analysis, and system design was used in the study. In the first phase, principles, trust and privacy models, and viewpoints were selected. Thereafter, functional requirements and services were developed on the basis of a careful analysis of existing research published in journals and conference proceedings. Based on principles, models, and requirements, architectural components and their interconnections were developed using system

  17. Research on Linux Trusted Boot Method Based on Reverse Integrity Verification

    Directory of Open Access Journals (Sweden)

    Chenlin Huang

    2016-01-01

    Full Text Available Trusted computing aims to build a trusted computing environment for information systems with the help of secure hardware TPM, which has been proved to be an effective way against network security threats. However, the TPM chips are not yet widely deployed in most computing devices so far, thus limiting the applied scope of trusted computing technology. To solve the problem of lacking trusted hardware in existing computing platform, an alternative security hardware USBKey is introduced in this paper to simulate the basic functions of TPM and a new reverse USBKey-based integrity verification model is proposed to implement the reverse integrity verification of the operating system boot process, which can achieve the effect of trusted boot of the operating system in end systems without TPMs. A Linux operating system booting method based on reverse integrity verification is designed and implemented in this paper, with which the integrity of data and executable files in the operating system are verified and protected during the trusted boot process phase by phase. It implements the trusted boot of operation system without TPM and supports remote attestation of the platform. Enhanced by our method, the flexibility of the trusted computing technology is greatly improved and it is possible for trusted computing to be applied in large-scale computing environment.

  18. Young entrepreneurs’ trust during the recession: Evidence from Serbia

    Directory of Open Access Journals (Sweden)

    Babić Vojislav

    2015-01-01

    Full Text Available This paper deals with the influence of positive trust on business activities, entrepreneurship development, and economic growth. During the global recession, institutions make numerous decisions to find answers to the crisis that influence the behaviour of entrepreneurs. In such situations, significant stocks of trust are of great importance for economy stability and the motivation of future entrepreneurs. In the first section the terms, functions, and types of trust are defined. The second section presents the results of measuring the interpersonal and institutional trust of young entrepreneurs, representatives of future entrepreneurship and business and bearers of networking ideas in Serbia. The results show that young entrepreneurs have a serious trust deficit, which is worrying in people who are potential future business leaders. Only one fifth of the respondents intends to start their own firm when they have finished studying. The reasons most often given are that government economic policy and monopolies hamper starting a business. Most of the respondents thought that the government should be more involved in providing a better environment for medium and small business. Most respondents believed that the Serbian recession was caused foremost by wrong governmental economic policy, followed by corruption.

  19. Inter-organizational networks

    DEFF Research Database (Denmark)

    Bergenholtz, Carsten

    2012-01-01

    Strong and trust-based ties are usually related to homogeneous and complex knowledge, while weak ties are associated with heterogeneous and simple knowledge. Interfirm communities have been shown to depend on trust-based ties, while also relying on getting access to heterogeneous knowledge. These...... goes beyond a mere structural approach to the organization of social networks and hence proposes a tighter integration between research on social networks and organizational design....

  20. On what bases? The role of trust cues in longitudinal trust development during newcomer socialisation

    OpenAIRE

    van der Werff, Lisa

    2014-01-01

    Despite recent theoretical advances, the pattern of trust development between coworkers is a topic of dispute and many basic trust processes remain unclear. Increasingly, trust researchers are recognising that trust development is a context specific process that requires more nuanced empirical investigation of trust changes over time and in specific situations. Furthermore, theory suggests that employees attend to an array of independent trust cues but it fails to identify which cues are impo...

  1. The Process Perspective on Trust in Organizations

    DEFF Research Database (Denmark)

    Jagd, Søren

    Several trust researchers have pointed to the relevance of the process perspective for understanding trust in organizations. In this paper I review the attempts to apply the process perspective in trust research distinguishing between a soft and a strong process perspective. It appears that nearly......’s history? A few examples of studies applying a strong process perspective to trust in organizations is discussed.  Summarising, I argue that the process perspective, in general, may contribute furthering the understanding of the complexities of the development of trust over time and that the strong process...... all process oriented trust researchers have applied the weak process perspective having studied questions like: how trust processes get started; how the trust process may grow and develop over time; and how to understand the qualitative transformations of trust in the course of a relationship...

  2. 25 CFR 115.815 - How does a tribe request trust funds from a tribal trust account?

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false How does a tribe request trust funds from a tribal trust... ACTIVITIES TRUST FUNDS FOR TRIBES AND INDIVIDUAL INDIANS Tribal Accounts Withdrawing Tribal Trust Funds § 115.815 How does a tribe request trust funds from a tribal trust account? To request trust funds from a...

  3. Trust Management System for Opportunistic Cloud Services

    DEFF Research Database (Denmark)

    Kuada, Eric

    2013-01-01

    We have over the past three years been working on the feasibility of Opportunistic Cloud Services (OCS) for enterprises. OCS is about enterprises strategically contributing and utilizing spare IT resources as cloud services. One of the major challenges that such a platform faces is data security...... and trust management issues. This paper presents a trust management system for OCS platforms. It models the concept of trust and applies it to OCS platforms. The trust model and the trust management system are verified through the simulation of the computation of the trust values with Infrastructure...

  4. Trust-Based Leadership in the Making

    DEFF Research Database (Denmark)

    Bentzen, Tina Øllgaard; Jagd, Søren

    I spite of the popularity of trust-based leadership in consultancy and popular management writings empirical research on the transformation from traditional top-down to trust-based leadership is still limited. In this paper we study the implementation of a trust-based leadership reform in the City...... of Copenhagen taking place since 2012. We focus on understanding the trust dynamics in this major transformation. We show that the implementation of trust-based leadership should be seen as an emergent process involving a variety of actors within the organization. The case study reveals that the Trust Reform...

  5. Disaggregating ethnoracial disparities in physician trust.

    Science.gov (United States)

    Sewell, Abigail A

    2015-11-01

    Past research yields mixed evidence regarding whether ethnoracial minorities trust physicians less than Whites. Using the 2002 and 2006 General Social Surveys, variegated ethnoracial differences in trust in physicians are identified by disaggregating a multidimensional physician trust scale. Compared to Whites, Blacks are less likely to trust the technical judgment and interpersonal competence of doctors. Latinos are less likely than Whites to trust the fiduciary ethic, technical judgment, and interpersonal competence of doctors. Black-Latino differences in physician trust are a function of ethnoracial differences in parental nativity. The ways ethnoracial hierarchies are inscribed into power-imbalanced clinical exchanges are discussed. Copyright © 2015 Elsevier Inc. All rights reserved.

  6. Analyzing Trust Perceptions in System Implementations

    DEFF Research Database (Denmark)

    Schlichter, Bjarne Rerup; Rose, Jeremy

    2009-01-01

    mount, trust relations become strained, leading to a circle of suspicion and disbelief which is both destructive and hard to break out of. This case study analyses trust relations during a problematic period of time in the implementation of the Faroese integrated healthcare information system, using......' perceptions of trust relations influence future actions, and in this way have both negative and positive consequences. We also conclude that Giddens' theories of trust provide a promising insight into the dynamic aspects of trust relations in implementation projects, which go further than trust theories...

  7. A Trusted Portable Computing Device

    Science.gov (United States)

    Ming-wei, Fang; Jun-jun, Wu; Peng-fei, Yu; Xin-fang, Zhang

    A trusted portable computing device and its security mechanism were presented to solve the security issues, such as the attack of virus and Trojan horse, the lost and stolen of storage device, in mobile office. It used smart card to build a trusted portable security base, virtualization to create a secure virtual execution environment, two-factor authentication mechanism to identify legitimate users, and dynamic encryption to protect data privacy. The security environment described in this paper is characteristic of portability, security and reliability. It can meet the security requirement of mobile office.

  8. A Calculus for Trust Management

    DEFF Research Database (Denmark)

    Carbone, Marco; Nielsen, Mogens; Sassone, Vladimiro

    2004-01-01

    We introduce ctm, a process calculus which embodies a notion of trust for global computing systems. In ctm each principal (location) is equipped with a policy, which determines its legal behaviour, and with a protocol, which allows interactions between principals and the flow of information from...... principals to policies. We elect to formalise policies using a Datalog-like logic, and to express protocols in the process algebra style. This yields an expressive calculus very suitable for the global computing scenarios, and provides a formalisation of notions such as trust evolution. For ctm we define...

  9. Learning to trust: trust and attachment in early psychosis

    NARCIS (Netherlands)

    Fett, A.J.; Shergill, S.; Korver-Nieberg, N.; Yakub, F.; Gromann, P.; Krabbendam, L.

    2016-01-01

    Background Distrust and social dysfunction are characteristic in psychosis and may arise from attachment insecurity, which is elevated in the disorder. The relationship between trust and attachment in the early stages of psychosis is unknown, yet could help to understand interpersonal difficulties

  10. Maintaining control while delegating trust: Integrity constraints in trust management

    NARCIS (Netherlands)

    Etalle, Sandro; Winsborough, William H.

    2009-01-01

    We introduce the use, monitoring, and enforcement of integrity constraints in trust management-style authorization systems. We consider what portions of the policy state must be monitored to detect violations of integrity constraints. Then, we address the fact that not all participants in a

  11. An Operational Semantics for Trust Policies

    DEFF Research Database (Denmark)

    Krukow, Karl

    2006-01-01

    In the trust-structure framework for trust management, principals specify their trusting relationships in terms of trust policies. In their paper on trust structures, Carbone et al. present a language for such policies, and provide a suitable denotational semantics. The semantics ensures that for......In the trust-structure framework for trust management, principals specify their trusting relationships in terms of trust policies. In their paper on trust structures, Carbone et al. present a language for such policies, and provide a suitable denotational semantics. The semantics ensures...... that for any collection of policies, there is always a unique global trust-state, compatible with all the policies, specifying everyone's degree of trust in everyone else. However, as the authors themselves point out, the language lacks an operational model: the global trust-state is a well......-defined mathematical object, but it is not clear how principals can actually compute it. This becomes even more apparent when one considers the intended application environment: vast numbers of autonomous principals, distributed and possibly mobile. We provide a compositional operational semantics for a language...

  12. Design Considerations for a Cognitive Radio Trust and Security Framework

    DEFF Research Database (Denmark)

    Mihovska, Albena D.; Prasad, Ramjee; Tragos, Elias Z.

    2012-01-01

    towards pushing further the attainable spectral efficiency gains. Taking a step back, our work looks into the critical challenges with respect to reliability, robustness and security, which hinder operators from investing in this new technology. We propose a new conceptual framework for trust and security...... to be integrated with the performance architecture and protocols for CR networks (CRNs). Our target is increasing trustworthiness from users and operators perspective in support of their successful deployment....

  13. Relationship marketing: Trust as a strategy for service industry

    OpenAIRE

    Parawansa, Dian Anggraece Sigit; AbdulTalib, Asmat Nizam; AbuBakar, Abdul Rahim

    2013-01-01

    Relationship marketing comprise of relationships, networks and interactions. Commitment and trust however may lead directly to cooperative behaviors that are conducive to the success of relationship marketing. This paper is based on a study that overall customer satisfaction is a better predictor of intentions to repurchase than inferred service quality. The customer???s propensity to switch service providers can cost a firm future revenue and decrease the market share and profitability of a...

  14. Cloud Multidomain Access Control Model Based on Role and Trust-Degree

    Directory of Open Access Journals (Sweden)

    Lixia Xie

    2016-01-01

    Full Text Available In order to solve the problem of access control among different security domains in cloud networks, this paper presents an access control model based on role and trust-degree. The model combines role-based access control and trust-based access control. The role assessment weights are defined based on the user’s role classes, and the trust-degree is calculated according to the role assessment weights and the role’s behavior. In order to increase the accuracy of access control, the model gives the concept and calculation methods of feedback trust-degree. To achieve fine-grained access control, the model introduces direct trust-degree, recommendation trust-degree, and feedback trust-degree, all of which participate in comprehensive trust-degree by adjusting their weights. A simulation experiment was conducted in the LAN environment, and a web system was used to construct an access control model with multisecurity domains in the experiment. The experimental results demonstrate that our model has higher security, expansibility, and flexibility.

  15. Trusted Product Evaluations. A Guide for Vendors

    National Research Council Canada - National Science Library

    1990-01-01

    Trusted Product Evaluations: A Guide for Vendors describes procedures for conducting business with the Information Systems Security Organization within the National Security Agency using the Trusted Product Evaluation Program...

  16. 77 FR 39143 - Executive Branch Qualified Trusts

    Science.gov (United States)

    2012-07-02

    ... executive branch qualified trust, an entity must meet the strict requirements for independence set forth in... this subpart. A parent or guardian may execute the umbrella trust agreement on behalf of a required...

  17. Does Trust Matter for Entrepreneurship: Evidence from a Cross-Section of Countries

    Directory of Open Access Journals (Sweden)

    Oasis Kodila-Tedika

    2016-03-01

    Full Text Available Differences in trust levels between countries explain the observed discrepancies in entrepreneurial spirit amongst them. We test this hypothesis with a cross-section of 60 countries in 2010. Our findings suggest that about half of the variation in entrepreneurial spirit across countries in the world is driven by trust considerations. This result is robust to regional clustering, outliers and alternative conditioning variables. The findings of the study indicate that while formal incentives to nurture entrepreneurship must be maintained, policy makers should also seek to pay attention to the role of trust cultivated through informal networks.

  18. Mechanizing Social Trust-Aware Recommenders with T-index Augmented Trustworthiness

    NARCIS (Netherlands)

    Fazeli, Soude; Zarghami, Alireza; Dokoohaki, Nima; Matskin, Mihhail

    2010-01-01

    Social Networks have dominated growth and popularity of the Web to an extent which has never been witnessed before. Such popularity puts forward issue of trust to the participants of Social Networks. Collaborative Filtering Recommenders have been among many systems which have begun taking full

  19. Social Capital. Trust and Ideology

    Directory of Open Access Journals (Sweden)

    Jacek TITTENBRUN

    2013-06-01

    Full Text Available The paper offers a critical analysis of the central concept around which the popular construct of social capital is organised, i.e. trust. To this end the views of Fukuyama, the leading exponent of the said concept are considered. As a result, the concept in question is found to be ideologically charged and substantively weak in many respects.

  20. TEE-Based Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe

    Today, it is safe to assume that any program or data can be compromised, if they are not protected by hardware within a secure area. Systems based on crypto-processors (e.g., a trusted platform module, a smart card or a hardware security module) rely on the properties of tamper resistant hardware...

  1. International trust and public diplomacy

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    2015-01-01

    descriptions of public diplomacy activities, public polls, and scholarly literature. Public diplomacy ideas discussed include lightshow, hand-on cooperation, win-win projects, and the creation of frameworks for self-expression. A central concept is international trust as described by Brewer, Gross, Aday...

  2. INNOVATION - THE ROLE OF TRUST

    Directory of Open Access Journals (Sweden)

    Kornélia Lazányi

    2017-11-01

    Full Text Available Innovations and constant change are inevitable parts of our everyday lives. It is not only because advanced technologies are more effective, but mostly because in the 21st century more and more realise that scarce resources – among them the safe and clean environment as such - necessitate a paradigm change and intense innovation. This revolution is easily trackable in the organisational and (supranational policies. However, innovation, and its necessary prerequisites are seldom investigated from the individuals’ point of view. It is easy to understand that inter-organisational trust is inevitable on both the consumers’ and the providers’ (innovators’ side, however, it has to be made clear that an innovative organisation has to create a trusting environment within the company, in order to foster collaboration, the generation of new ideas, creativity and finally innovation. The present paper endeavours to call attention to the notion of trust and its antecedents and consequences in relation to innovations. The aim is to provide assistance in understanding how to develop trust in each other and hence foster further innovations and development.

  3. Ombud's Corner: tried and trusted

    CERN Multimedia

    Sudeshna Datta-Cockerill

    2014-01-01

    Trust is an essential ingredient in all working relationships. When trust breaks down, conflicts may arise and teams may stop working in harmony. The Ombud is there to help you to find your way out before the point of no return is reached.   Reliability, integrity, expertise and good will: these are the four pillars on which trust is built. Trust between colleagues may break down for many different reasons, including misunderstandings, and the way to restoring the relationship is through working on these four pillars. For instance, if we assume that we do indeed have the expertise to deal with a particular task assigned to us, we may need to improve our reliability by making sure that we meet deadlines and expectations or demonstrate our integrity by acknowledging and accepting accountability for this, all the while showing that we are doing our best to do whatever it takes to achieve the common goals and restore our colleagues’ faith in us. All four of these pillars need to be in...

  4. Secure Hardware Design for Trust

    Science.gov (United States)

    2014-03-01

    benchmarks as the algorithm takes the fault propagation and masking effects into account. In these types of encryption, a fault is always excited on...Multiplier with incorrect key. 6.3. Grain using Sequential XOR Logic Encryption Cryptographic algorithms are a key feature in secure and trusted...10 6.1.1 AES Algorithm Details

  5. Design for Trust - Online Grocery Shopping

    OpenAIRE

    Karahasanovic, Amela; Holm, Kristoffer T.; Nejad, Aria

    2017-01-01

    This paper presents our ongoing research into trust and the risks related to online grocery shopping. More specifically, we investigate how to increase customer trust when buying perishable products online. Online grocery shopping is an increasing trend in many countries, and several studies on trust have been conducted in the context of online grocery shopping. However, knowledge of how to improve trust and reduce risks is rather limited in this context. Through design, prototyping and user ...

  6. Consumer Trust in E-commerce

    OpenAIRE

    Gustavsson, Malin; Johansson, Anne-Marie

    2006-01-01

    An often mentioned reason for consumers not purchasing from Internet vendors, is the lack of trust. The lack of physical clues and physical interaction in the online environment make it more difficult to establish trust with the consumers. So, it is important for companies to learn how to manage consumers’ trust in e-commerce. Although, building consumer trust on the Internet is a challenge for online vendors. The purpose with this dissertation was to get a better understanding of consumer t...

  7. Culture and Consumer Trust in Online Businesses

    OpenAIRE

    Robert Greenberg; Bernard Wong-On-Wing; Gladie Lui

    2008-01-01

    The importance of consumer trust to the success of online businesses is well documented in the literature. Given the global nature of online transactions, an important question is whether trust and trust formation differ across cultures. This study compared Hong Kong and U.S. consumer trust in online businesses. Specifically, the study examined security and privacy risks related to the purchase of products as well as services. The results show that significant differences exist between consum...

  8. PROBLEM OF TRUST TO POWER IN RUSSIA

    Directory of Open Access Journals (Sweden)

    Alexander V. Tsarev

    2014-01-01

    Full Text Available Currently the topic of trust is very important. The most important problem of our country at the present stage performs low level of trust relationships between people, business, government. Generally trust is an integral part of society and is manifested in all its spheres. Directly, this paper analyzes the trust in the political sphere. Mostly, the task is to assess the level of public confidence in the existing government in our country.

  9. Validation and verification of agent models for trust: Independent compared to relative trust

    NARCIS (Netherlands)

    Hoogendoorn, M.; Jaffry, S.W.; Maanen, P.P. van

    2011-01-01

    In this paper, the results of a validation experiment for two existing computational trust models describing human trust are reported. One model uses experiences of performance in order to estimate the trust in different trustees. The second model in addition carries the notion of relative trust.

  10. Trust and School Life: The Role of Trust for Learning, Teaching, Leading, and Bridging

    Science.gov (United States)

    Van Maele, Dimitri, Ed.; Forsyth, Patrick B., Ed.; Van Houtte, Miek, Ed.

    2014-01-01

    This book samples recent and emerging trust research in education including an array of conceptual approaches, measurement innovations, and explored determinants and outcomes of trust. The collection of pathways explores the phenomenon of trust and establishes the significance of trust relationships in school life. It emboldens the claim that…

  11. Public trust: expectancies, beliefs, and behavior

    NARCIS (Netherlands)

    Alink, D.

    2014-01-01

    Most people think of trust as the bonding force between people in romantic, professional, and family relationships. Of growing importance however is public trust: trust in organizations that are not represented by a single person, such as companies, non-profit organizations and governmental

  12. Trust and Relationship Building in Electronic Commerce.

    Science.gov (United States)

    Papadopoulou, Panagiota; Andreou, Andreas; Kanellis, Panagiotis; Martakos, Drakoulis

    2001-01-01

    Discussion of the need for trust in electronic commerce to build customer relationships focuses on a model drawn from established theoretical work on trust and relationship marketing that highlights differences between traditional and electronic commerce. Considers how trust can be built into virtual environments. (Contains 50 references.)…

  13. Trust and innovativeness in virtual organisations

    NARCIS (Netherlands)

    Pournaras, E.; Lazakidou, A.

    2008-01-01

    This paper discusses trust and control in a virtualised environment. An extensive use of information and communication technology, and virtualisation of organisations put trust into the core of management challenges. Trust is a glue that bonds individuals and groups together to form virtual teams

  14. 26 CFR 301.7701-4 - Trusts.

    Science.gov (United States)

    2010-04-01

    ..., therefore, are not associates in a joint enterprise for the conduct of business for profit. (b) Business... remediation trust if the organization is organized under state law as a trust; the primary purpose of the... federal, state, or local environmental laws; all contributors to the trust have (at the time of...

  15. Trusted Truck(R) II (phase A).

    Science.gov (United States)

    2009-01-01

    The Trusted Truck Program was initiated in 2003 as a joint effort by NTRCI, Volvo and UT. The vision of the Trusted Truck program is to develop a secure and "trusted" transport solution from pickup to delivery. The program's objective is to incre...

  16. 46 CFR 67.36 - Trust.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 2 2010-10-01 2010-10-01 false Trust. 67.36 Section 67.36 Shipping COAST GUARD... Citizenship Requirements for Vessel Documentation § 67.36 Trust. (a) For the purpose of obtaining a registry or recreational endorsement, a trust arrangement meets citizenship requirements if: (1) Each of its...

  17. 40 CFR 280.102 - Trust fund.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 26 2010-07-01 2010-07-01 false Trust fund. 280.102 Section 280.102...) Financial Responsibility § 280.102 Trust fund. (a) An owner or operator may satisfy the requirements of § 280.93 by establishing a trust fund that conforms to the requirements of this section. The trustee...

  18. 75 FR 66977 - Housing Trust Fund

    Science.gov (United States)

    2010-10-29

    ... Housing and Urban Development 24 CFR Parts 91 and 92 Housing Trust Fund; Proposed Rule #0;#0;Federal... URBAN DEVELOPMENT 24 CFR Parts 91 and 92 RIN 2506-AC30 Housing Trust Fund AGENCY: Office of the... and Economic Recovery Act of 2008 establishes a Housing Trust Fund (HTF) to be administered by HUD...

  19. 7 CFR 46.46 - Statutory trust.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Statutory trust. 46.46 Section 46.46 Agriculture... THAN RULES OF PRACTICE) UNDER THE PERISHABLE AGRICULTURAL COMMODITIES ACT, 1930 Statutory Trust § 46.46 Statutory trust. (a) Definitions. (1) “Received” means the time when the buyer, receiver, or agent gains...

  20. Animal Behaviour: Friendship Enhances Trust in Chimpanzees.

    Science.gov (United States)

    Silk, Joan

    2016-01-25

    Individuals that participate in exchanges with delayed rewards can be exploited if their partners don't reciprocate. In humans, friendships are built on trust, and trust enhances cooperation. New evidence suggests that close social bonds also enhance trust in chimpanzees. Copyright © 2016 Elsevier Ltd. All rights reserved.

  1. Temperament Constructs Related to Betrayal of Trust

    Science.gov (United States)

    1991-12-01

    disintegrate. The interrelatedness between system trust and interpersonal trust has been noted by Durkheim (1933), who predicted a loss of trust in others...and suspicion. Journal of Conflict Resolution, 2, 265-279. Durkheim , E. (1933). The division of labor in societ’. New York: Free Press of Glencoe

  2. Control Is Good, But Trust Is Cheaper

    DEFF Research Database (Denmark)

    Jensen, Keld; Svendsen, Gert Tinggaard

    2014-01-01

    Trust or Control? Trust-Based Management and the Thriving Workplace Lenin once said, “Trust is good, but control is better” – and many a modern manager seems to agree. One sees precious time and resources plowed into paper-pushing, form-filling, and the drafting of voluminous, hyper-detailed cont...

  3. Trust in Client-Vendor Relations

    DEFF Research Database (Denmark)

    Tøth, Thomas

    2014-01-01

    and organizational boundaries within the field of IT offshore outsourcing. The article concludes that trust is primarily established when the teams are meeting face-to-face and in order to establish trust at a distance they are dependent on technology being readily available and on engaging in active trust building...

  4. The edge of trust : An introduction

    NARCIS (Netherlands)

    Evans, A.M.; Krueger, J.I.

    2015-01-01

    The dynamics of interpersonal trust are an essential part of understanding how people think and act in social interactions. Trust enables human beings to form meaningful personal relationships (Simpson, 2007) and engage in mutually profitable social and economic exchanges (Kohn, 2008). Yet, trust is

  5. Heuritic Trust in IoT

    DEFF Research Database (Denmark)

    Kaur, Bipjeet; Tange, Henrik

    2015-01-01

    Increasing use of Internet of things in diverse fields has demanding association in security and trust of such services. The trust on the services cannot exist independent. It is greatly depended on the security of system at each layer. In this paper we analyze different existing trust algorithms...

  6. The Effects of Trust Transference, Mobile Attributes and Enjoyment on Mobile Trust

    Directory of Open Access Journals (Sweden)

    Cristiane Junqueira Giovannini

    2015-01-01

    Full Text Available Trust is essential in building relationships. In mobile commerce, as in electronic commerce, trust is even more valuable given the absence of human contact and direct observation of the service provider. Despite the importance of trust for mobile commerce, there has been little academic effort to study the relationships between mobile devices unique components of interactivity and customer trust, or the relationship between offline, online and mobile trust. This study proposes a trust-mediated model for customer attitude and transaction intentions in mobile commerce contexts that incorporates trust transference and unique factors present in mobile commerce. Data were collected in an online survey and analyzed via structural equations modeling. Results suggest that trust transferred from online contexts and ease of use have significant effects on mobile trust formation, while also indicating that mobile trust influences consumers’ attitudes and intentions to purchase using mobile devices.

  7. Why a Central Network Position Isn't Enough

    DEFF Research Database (Denmark)

    Reinholt, Mia; Pedersen, Torben; Foss, Nicolai Juul

    2011-01-01

    Contrasting views exist on how network characteristics predict knowledge sharing. While large, open egocentric networks foster network positions that provide access to non-redundant knowledge, critics highlight that they impair knowledge sharing, because trust and reciprocity do not thrive...

  8. Factors influencing trust in media: exploring the association between media consumption and news about the 15M Movement

    OpenAIRE

    Ariadna Fernández-Planells

    2015-01-01

    Debate over consumer trust in traditional media has intensified due to theappearance of networked social movements, particularly considering media coverage ofthe protests, the emergence of alternative media and social media as informationsources. A survey was created for this study to provide insight into the associationbetween media exposure, trust and political participation in networked socialmovements, specifically among 15M Movement activists. Data is presented to show towhat extent do ...

  9. Leader trustworthy behavior and organizational trust: The role of the immediate manager for cultivating trust

    OpenAIRE

    Thomas, Geoff; Legood, A; Sacramento, C

    2016-01-01

    Drawing from both trust-building theory and interpersonal trust literature, we investigate how trust between a leader and follower may be leveraged to influence organizational trust. We also explore the mediating mechanisms of this link and test a potential moderator. A cross-sectional, multi-foci design was adopted and participants were 201 employees within a public sector organization. Leader trustworthy behavior was found to predict organizational trust, mediated by trustworthiness percept...

  10. Investing in Low-Trust Countries: Trust in the Global Mutual Fund Industry

    OpenAIRE

    Massa, Massimo; Wang, Chengwei; Zhang, Hong; Zhang, Jian

    2015-01-01

    We hypothesize that trust plays an important role in affecting the activeness and effectiveness of the global mutual fund industry. Empirically, trust is positively associated with the activeness of domestic funds, whereas for internationals mutual funds conducting cross-border investments activeness is bounded by the trust of low-trust countries. In both cases, trust-related active share delivers superior performance, whereas the economic magnitude is larger for cross-border investments (aro...

  11. Toward a generic model of trust for electronic commerce

    NARCIS (Netherlands)

    Tan, YH; Thoen, W

    2000-01-01

    The authors present a generic model of trust for electronic commerce consisting of two basic components, party trust and control trust, based on the concept that trust in a transaction with another party combines trust in the other parry and trust in the control mechanisms that ensure the successful

  12. Trust Levels Definition On Virtual Learning Platforms Through Semantic Languages

    Directory of Open Access Journals (Sweden)

    Carlos E. Montenegro-Marin

    2010-12-01

    Full Text Available Trust level concept is a topic that has opened a knowledge area about the profile evaluation and the people participation in Social Networks. These have presented a high knowledge profit, but at the same time it is necessary to analyze a group of variables to determine the trust participants’ degree.In addition, this is a topic that from some years ago has been presenting a big expectation to settle some alternatives to generate confidence in an activer community on internet. To establish these parameters it is important to define a model to abstract some variables that are involved in this process. For this, it is relevant to take into account the semantic languages as one of the alternatives that allow these kinds of activities. The purpose of this article is to analyze the Trust Levels definition in the contents that are shared on Open Source Virtual learning Platforms through the use of a model of representation of semantic languages. The last ones allow determining the trust in the use of learning objects that are shared in this kind of platforms

  13. Predators and the public trust.

    Science.gov (United States)

    Treves, Adrian; Chapron, Guillaume; López-Bao, Jose V; Shoemaker, Chase; Goeckner, Apollonia R; Bruskotter, Jeremy T

    2017-02-01

    Many democratic governments recognize a duty to conserve environmental resources, including wild animals, as a public trust for current and future citizens. These public trust principles have informed two centuries of U.S.A. Supreme Court decisions and environmental laws worldwide. Nevertheless numerous populations of large-bodied, mammalian carnivores (predators) were eradicated in the 20th century. Environmental movements and strict legal protections have fostered predator recoveries across the U.S.A. and Europe since the 1970s. Now subnational jurisdictions are regaining management authority from central governments for their predator subpopulations. Will the history of local eradication repeat or will these jurisdictions adopt public trust thinking and their obligation to broad public interests over narrower ones? We review the role of public trust principles in the restoration and preservation of controversial species. In so doing we argue for the essential roles of scientists from many disciplines concerned with biological diversity and its conservation. We look beyond species endangerment to future generations' interests in sustainability, particularly non-consumptive uses. Although our conclusions apply to all wild organisms, we focus on predators because of the particular challenges they pose for government trustees, trust managers, and society. Gray wolves Canis lupus L. deserve particular attention, because detailed information and abundant policy debates across regions have exposed four important challenges for preserving predators in the face of interest group hostility. One challenge is uncertainty and varied interpretations about public trustees' responsibilities for wildlife, which have created a mosaic of policies across jurisdictions. We explore how such mosaics have merits and drawbacks for biodiversity. The other three challenges to conserving wildlife as public trust assets are illuminated by the biology of predators and the interacting

  14. Multiple Trust Model in Online Transaction by Trusted Third Party

    OpenAIRE

    R. Suganya; C. Merlin Pauliester

    2016-01-01

    the information fortune and the connectivity are provided by the universe of E-commerce over an enormous distance at all time. In an open and distributed environment the buyers or providers will not act in a mutually understood or agreed manner by which the incomplete practices and fraudulent activities happen. So in any online transaction the security and trust are two important factors that are to be considered. In Ecommerce markets the above mentioned problems are criticized as the most im...

  15. Economic and Other Determinants of Political Trust

    Directory of Open Access Journals (Sweden)

    William R. DiPietro

    2016-01-01

    Full Text Available Political trust is important for the effective functioning of government. This paper uses cross country regression analysis to see whether three different measures of economic performance matter for political trust. The results lend support to the hypothesis that political trust is influenced by economic growth, the standard of living, and the appropriate use of government spending. In addition, the paper considers two institutional variables, perceived independence of the judiciary and the degree of democracy to assess their effect on political trust. It finds that perceived judicial independence has a positive effect on political trust, but democracy has a negative effect.

  16. Of Money And Trust In Biomedical Care

    OpenAIRE

    Joel Lexchin

    2007-01-01

    Over the past few years we have been repeatedly told that we now live in an evidence-based medical world. That should be good news since evidence comes from science. But on a deeper level doctors' and the public's faith in science rests on trust; trust that the right questions have been asked, trust that the clinical trials have been done correctly, trust that the results of the trials have been interpreted in the proper manner and trust that what finally appears in medical journals and clini...

  17. Going global: Trust research and international relations

    DEFF Research Database (Denmark)

    Ruzicka, Jan; Keating, Vincent Charles

    2015-01-01

    In this review article we explore the growing body of literature on the subject of trust in the field of international relations. We argue that the international level represents a unique challenge for trust research. This is so because some of the most pressing problems facing the world today...... require the development of trusting relationships internationally. In addition, the international environment is structurally different from domestic or personal relations on which much of the trust literature has focused so far. We identify three main strands of trust literature in international...

  18. Trust, Welfare States and Income Equality

    DEFF Research Database (Denmark)

    Bergh, Andreas; Bjørnskov, Christian

    2014-01-01

    The cross-country correlation between social trust and income equality is well documented, but few studies examine the direction of causality. We show theoretically that by facilitating cooperation, trust may lead to more equal outcomes, while the feedback from inequality to trust is ambiguous....... Using a structural equation model estimated on a large country sample, we find that trust has a positive effect on both market and net income equality. Larger welfare states lead to higher net equality but neither net income equality nor welfare state size seems to have a causal effect on trust. We...

  19. Public knowledge and public trust.

    Science.gov (United States)

    Cunningham-Burley, Sarah

    2006-01-01

    As health care applications derived from human genetics research are likely to move increasingly from 'clinic to community', there is growing interest not just in how patients understand and take up health-related genetic information but also in the views of the wider population, as well as a range of professional groups. In this paper, issues relating public knowledge and public trust are raised and discussed in an attempt to move forward debates about public involvement in genomic research and the role of sociologists within interdisciplinary teams. As the field of public understanding of science has developed, we have seen a shift from a focus on the lack of scientific literacy as problem to a recognition of the range of different knowledges that people have and use as they confront science and technology in their everyday lives. As a mood for dialogue pervades many institutions in their relations with 'publics', attention must now be paid to the way in which knowledge and expertise is expressed, heard and acted upon in dialogic encounters. There is increasing concern about public trust in science and calls to increase public confidence, particularly through more open engagement with a range of publics. However, lack of trust or loss of confidence may be constructed as problems rather than reflecting empirical reality, where more complex relationships and attitudes prevail. Lack of trust is often privatized, deeply rooted in lived experience and routinely managed. Trust relations are generally characterized by ambivalence, uncertainty and risk, and are always provisional. Drawing on selected literature and empirical research to review and illustrate this field, this paper argues that scepticism or ambivalence on the part of publics are not necessarily problems to be overcome in the interest of scientific progress, but rather should be mobilized to enhance open and public debates about the nature and direction of genomics research, medicine, and the related

  20. Political Trust and Sophistication: Taking Measurement Seriously.

    Science.gov (United States)

    Turper, Sedef; Aarts, Kees

    2017-01-01

    Political trust is an important indicator of political legitimacy. Hence, seemingly decreasing levels of political trust in Western democracies have stimulated a growing body of research on the causes and consequences of political trust. However, the neglect of potential measurement problems of political trust raises doubts about the findings of earlier studies. The current study revisits the measurement of political trust and re-examines the relationship between political trust and sophistication in the Netherlands by utilizing European Social Survey (ESS) data across five time points and four-wave panel data from the Panel Component of ESS. Our findings illustrate that high and low political sophistication groups display different levels of political trust even when measurement characteristics of political trust are taken into consideration. However, the relationship between political sophistication and political trust is weaker than it is often suggested by earlier research. Our findings also provide partial support for the argument that the gap between sophistication groups is widening over time. Furthermore, we demonstrate that, although the between-method differences between the latent means and the composite score means of political trust for high- and low sophistication groups are relatively minor, it is important to analyze the measurement characteristics of the political trust construct.

  1. Exploring trust relationships during times of change

    Directory of Open Access Journals (Sweden)

    Hartmut Von der Ohe

    2010-03-01

    Full Text Available Orientation: In the current economic climate and the resulting fast-changing global business and political environment, trust among different role players in organisations has become critical for survival.Research purpose: The objective of this study was to explore the impact of different variables such as demographics on trust relationships in South African organisations.Motivation for the study: Anecdotal evidence and preliminary data collected for a national trust indicator seemed to suggest a shift in trust levels in organisations.Research design: A trust questionnaire was administered to a convenience sample of 307 respondents in all economic sectors. Parametric and nonparametric analyses were used to determine significant differences among economic sectors, job levels and sample periods.Main findings: No significant differences were found for job levels or the different sample periods. However, significant differences were found for the economic sectors and, specifically, between government participants and other sectors for the dimensions of change, team management, organisational trust, information sharing and credibility.Practical implications: In times of change, leadership in organisations need to be aware of the impact on trust levels. It is therefore important that leaders in government focus more on trust-enhancing behaviours needed to repair mistrust in organisations.Contribution: Although the effect of time on trust levels is inconclusive, the clearly differing levels of trust in various economic sectors point to the importance of appropriate and fitting approaches to building trust and not a ‘one-size-fits-all’ attitude.

  2. Trust During the Early Stages of the 2009 H1N1 Pandemic

    Science.gov (United States)

    FREIMUTH, VICKI S.; MUSA, DON; HILYARD, KAREN; QUINN, SANDRA CROUSE; KIM, KEVIN

    2013-01-01

    Distrust of the government often stands in the way of cooperation with public health recommendations in a crisis. The purpose of this paper is to describe the public’s trust in government recommendations during the early stages of the H1N1 pandemic and identify factors that might account for these trust levels. We surveyed 1543 respondents about their experiences and attitudes related to H1N1 influenza between June 3, 2009 and July 6, 2009, during the first wave of the pandemic using the Knowledge Networks (KN) online panel. This panel is representative of the US population, and uses a combination of random-digit dial and address-based probability sampling frames covering 99% of the US household population to recruit participants. To ensure participation of low-income individuals and those without Internet access, KN provides hardware and access to the Internet if needed. Measures included standard demographics, a trust scale, trust ratings for individual spokespersons, involvement with H1N1, experience with H1N1, and past discrimination in health care. We found that trust of government was low (2.3 out of 4) and varied across demographic groups. Blacks and Hispanics reported higher trust in government than did Whites. Of the spokespersons included, personal health professionals received the highest trust ratings and religious leaders the lowest. Attitudinal and experience variables predicted trust better than demographic characteristics. Closely following the news about the flu virus, having some self-reported knowledge about H1N1, self-reporting of local cases and previously experiencing discrimination were the significant attitudinal and experience predictors of trust. Using a second longitudinal survey, trust in the early stages of the pandemic did predict vaccine acceptance later but only for white, non-Hispanic individuals. PMID:24117390

  3. Making sense of institutional trust in organizations

    DEFF Research Database (Denmark)

    Fuglsang, Lars; Jagd, Søren

    2015-01-01

    Institutional-based approaches to trust can explain how trust logics can exist in a societal context as compared to logics of distrust. Strong institutions in the form of regulative, normative and cognitive structures can enable and inspire trust-relations among people at the interpersonal......, 1997: 398). While Fligstein refers to actors who engage in ‘robust or local action’ we argue that actors who engage in (robust, local) sensemaking activities are better at (re)producing institutional-based trust. Particularly in situations when institutions are relatively unstable, unfamiliar...... to the actors and ambiguous, sensemaking strategies directed towards exploring the institutional foundations of trust at a local level can be an important basis of interpersonal trust-relations. First, based on a summary of studies of institutional-based trust we argue that an unresolved issue is how...

  4. The Relationship between Teamwork and Organizational Trust

    Directory of Open Access Journals (Sweden)

    Musab Isik

    2016-01-01

    Full Text Available The aim of this study is to investigate the relationship between teamwork and organizational trust. In the implementation section the data from the survey of 250 workers is employed in call centers in Erzurum by using relevant statistical  methods. Consequently, it is found that there is a positive and significant relationship between teamwork and organizational trust. Thus, the hypothesis of the study is supported as it was expected. Besides, it is found that there are positive and significant relationships between communication, openness to innovation, participation-trust in teamwork and organizational trust, trust in management, trust in co-workers, and trust in workplace.

  5. Trusting the other or taking a chance?

    DEFF Research Database (Denmark)

    Frederiksen, Morten; Heinskou, Marie Bruvik

    2016-01-01

    , respectively, reside. Secondly, the issue of temporality is traced in Luhmann’s work on trust and it is demonstrated how his dichotomous treatment of social time conflates markedly different temporal experiences. As a solution to this, the article presents the notion of a third temporal mode of the process......Theories of modernity and risk society argue that increasing levels of risk fundamentally alter or lower the level of trust in society. In this article we argue that this assumption is based in a fallacious theoretical link between trust and risk. Rather than calculative assessment of risk...... and specific events, trust directs anticipation towards process. First, we outline dominant approaches to trust as a question of actions and uncertainty of outcomes, arguing that these approaches treat trust and chance as interchangeable, conflating the different socio-temporalities within which risk and trust...

  6. Using informed consent to save trust.

    Science.gov (United States)

    Eyal, Nir

    2014-07-01

    Increasingly, bioethicists defend informed consent as a safeguard for trust in caretakers and medical institutions.This paper discusses an ‘ideal type’ of that move. What I call the trust-promotion argument for informed consent states:1. Social trust, especially trust in caretakers and medical institutions, is necessary so that, for example,people seek medical advice, comply with it, and participate in medical research.2. Therefore, it is usually wrong to jeopardise that trust.3. Coercion, deception, manipulation and other violations of standard informed consent requirements seriously jeopardise that trust.4. Thus, standard informed consent requirements are justified.This article describes the initial promise of this argument, then identifies challenges to it. As I show, the value of trust fails to account for some common sense intuitions about informed consent. We should revise the argument, common sense morality, or both.

  7. Why European Subordinates Trust their Managers

    Directory of Open Access Journals (Sweden)

    Andersen Jon Aarum

    2012-11-01

    Full Text Available This article addresses the problem of why subordinates trust their managers based on the responses from 108 subordinates of seven Slovenian managers and from 138 subordinates of eight Swedish managers. The subordinates of these managers responded to a 20-item instrument tested for reliability and validity. In both samples the managers enjoyed different degrees of trust. The level of trust vested in Slovenian managers was higher than in Swedish ones. The kinds of managers’ actions that enhanced trust were similar amongst Swedish and Slovenian subordinates. Different socio-cultural contexts may theoretically explain why some other kinds of actions had contrasting effects between the samples. On the whole, the actions of managers explain trust in both countries. Subordinates’ trust in managers declines with the increasing hierarchical distance in both national samples. Managers need to show in action that they trust their subordinates, promote their interests, demonstrate appreciation of their subordinates, and solve problems.

  8. For a civilisation of trust

    Directory of Open Access Journals (Sweden)

    Burhan Ghalioun

    2003-06-01

    Full Text Available For the author, the world in disarray is the origin of mistrust: disarray in the social, political and economic aspect. Nevertheless, he sees a possibility for restoring trust through becoming aware of the importance of the concept of immaterial capital and its decisiverole in the reproduction of the social and international system. A second element is the emergence, outside of the process of globalising integration, of a real, supportive world society. The failure of the system of international relations in the face of the challenges of globalisation, even if it means worsening the deficit of trust, gives rise to a hope of a better world and favours the development of a common, collective, transnational consciousnesswith supportive impulses and convergences of increasingly powerful interests.

  9. Trust and Traditions in Transitions

    DEFF Research Database (Denmark)

    McQuaid, Sara Dybris

    and the state and more recently, trust in the peace process. As the contest over meaning is always determined by the context of articulation, this paper examines the role of parades in the current ‘post-conflict’ phase of the peace process. Using theories of cultural and collective memory (Assman 2011, Olick......On New Year’s Eve 2013, months of talks on ‘Dealing with the past’, ‘Flags’ and ‘Parades’ ended without agreement on how to move towards a reconciliation of positions in Northern Ireland. The failure of the talks illustrates the importance of culture and (mis)trust in divided societies, where...... politics often pivot around whose culture shall be official and whose subordinated, whose history shall be remembered and whose forgotten (Jordan and Weedon 1995). These struggles are particularly intense in times of transition where traditions, power relations and frames of relevant remembrance...

  10. TRUST MATTERS: A CROSS-CULTURAL COMPARISON OF NORTHERN GHANA AND OAXACA GROUPS

    Directory of Open Access Journals (Sweden)

    Cristina eAcedo-Carmona

    2015-05-01

    Full Text Available A cross-cultural analysis of trust and cooperation networks in Northern Ghana (NGHA and Oaxaca (OAX was carried out by means of ego networks and interviews. These regions were chosen because both are inhabited by several ethnic groups, thus providing a good opportunity to test the cultural group selection hypothesis. Against the predictions of this approach, we found that in both regions cooperation is grounded in personal trust groups, and that social cohesion depends on these emotional bonds. Moreover, in agreement with Fiske's notion of evolved proclivities, we also found two distinct kinds of trust networks, one for each region, which vary in terms of the degree of ethnic interrelation. This pattern suggests that social cohesion increases when environmental resources are scarce.

  11. Trust matters: a cross-cultural comparison of Northern Ghana and Oaxaca groups.

    Science.gov (United States)

    Acedo-Carmona, Cristina; Gomila, Antoni

    2015-01-01

    A cross-cultural analysis of trust and cooperation networks in Northern Ghana (NGHA) and Oaxaca (OAX) was carried out by means of ego networks and interviews. These regions were chosen because both are inhabited by several ethnic groups, thus providing a good opportunity to test the cultural group selection hypothesis. Against the predictions of this approach, we found that in both regions cooperation is grounded in personal trust groups, and that social cohesion depends on these emotional bonds. Moreover, in agreement with Fiske's notion of "evolved proclivities," we also found two distinct kinds of trust networks, one for each region, which vary in terms of the degree of ethnic interrelation. This pattern suggests that social cohesion increases when environmental resources are scarce.

  12. BRI: Cyber Trust and Suspicion

    Science.gov (United States)

    2017-06-06

    psychiatric ratings, including the Snaith-Hamilton Anhedonia/Pleasure Scale (SHAPS), the Anhedonia rating scale, and the Hamilton Depression & Anxiety...Inventories (HAM-D; HAM-A; respectively) which are 21 item multi-choice questionnaires designed to assess the current level of depression and anxiety...429, 2006. [30] R. Riedl and A. Javor, “The biology of trust: integrating evidence from genetics , endocrinology, and functional brain imaging.,” J

  13. Building Trust Through Servant Leadership

    Science.gov (United States)

    2016-06-10

    Army Leadership (Washington, DC: Government Printing Office, August 2012), 1-5. The category of “Leads” includes five sub- skills : Leads others...opposition of formal military education, Puller’s ability to develop leadership skills in junior officers had pronounced effects. In a speech...BUILDING TRUST THROUGH SERVANT LEADERSHIP A thesis presented to the Faculty of the U.S. Army Command and General Staff

  14. Specifika Real Estate Investment Trust

    OpenAIRE

    Nenadál, Petr

    2012-01-01

    The thesis is aimed to describe and approach the REIT practice that is, especially in the U. S. very enhanced. In the first part, general parameters of real estate investment trusts are introduced and understated in connection with the depiction of the advantages and disadvantages of this issue. In chronological sequence, the development and progress of the U. S. real estate market is approached. The thesis further undertakes the current subject of the global financial crisis with a special f...

  15. Trust Assessment Using Cloud Broker

    OpenAIRE

    P.S.Pawar; Rajarajan, M.; Dimitrakos, T.; Zisman, A.

    2014-01-01

    Part 3: Short Papers; International audience; Despite the advantages and rapid growth of Cloud computing, the cloud environments are still not sufficiently trustworthy from a customer’s perspective. Several challenges such as specification of service level agreements, standards, security measures, selection of service providers and computation of trust still persists, that concerns the customer. To deal with these challenges and provide a trustworthy environment, a mediation layer may be esse...

  16. Money and trust among strangers.

    Science.gov (United States)

    Camera, Gabriele; Casari, Marco; Bigoni, Maria

    2013-09-10

    What makes money essential for the functioning of modern society? Through an experiment, we present evidence for the existence of a relevant behavioral dimension in addition to the standard theoretical arguments. Subjects faced repeated opportunities to help an anonymous counterpart who changed over time. Cooperation required trusting that help given to a stranger today would be returned by a stranger in the future. Cooperation levels declined when going from small to large groups of strangers, even if monitoring and payoffs from cooperation were invariant to group size. We then introduced intrinsically worthless tokens. Tokens endogenously became money: subjects took to reward help with a token and to demand a token in exchange for help. Subjects trusted that strangers would return help for a token. Cooperation levels remained stable as the groups grew larger. In all conditions, full cooperation was possible through a social norm of decentralized enforcement, without using tokens. This turned out to be especially demanding in large groups. Lack of trust among strangers thus made money behaviorally essential. To explain these results, we developed an evolutionary model. When behavior in society is heterogeneous, cooperation collapses without tokens. In contrast, the use of tokens makes cooperation evolutionarily stable.

  17. Exploring the Change from Low-Trust to High-Trust Organizations

    DEFF Research Database (Denmark)

    Jagd, Søren

    what the notion of high-trust organization actually means, and that the change process in the direction of high trust organizations involves not only a quantitative growth in trust, but may involve important qualitative changes in the organization, especially concerning the relations between management...... and employees. An especially important issue is the trust/self-control nexus. Following this analysis it may be argued that the distinction low versus high-trust is much more complex and involves radical changes in organizational culture and identity than assumed by most management literature on trust a new......A growing body of literature point to the increasing importance of trust for organizations and for the explicit use of trust as a management tool. The explicit or implicit message in both management literature and research literature on trust as a management tool is that managers should pursue...

  18. TRUST AND MANAGEMENT CONTROL SYSTEM: A STUDY ON META-SINTHETIC INTERACTIONS

    Directory of Open Access Journals (Sweden)

    Patricia Villa Costa Vaz

    Full Text Available ABSTRACT Management accounting has been associated to the institutionalization of trust inside organizations. Trust allows the implementation of systems which grant freedom to choose without trying to process more information about the world than it ought to be done. (TOMKINS, 2001. Regarding such aspects, this paper questions: how have previous studies been relating trust and Management Control Systems (MCS towards reaching organizational objectives? To achieve this, we object to examine the role of trust in Management Control System, and its relation with organizational objectives, according to Hoon’s (2014 methodology, which allow the construction of a theory based on primary case studies. On developing the methodology four causal networks have been examined on selected studies: institutions, Management Control Systems, trust and organizational objectives. The institutions represent the effective background of the case studies, specially as a series of habits, rules, routines and procedures; the approaches regarding management control systems include budget and performance evaluation; in relation to trust, previous studies have primarily discussed it through contract, communication and competence approaches; and, as to organizational objectives, changes on current systems, focus on performance and business risk reduction are tackled. Feedback, however, was dealt with after achieving objectives, when management incorporates trust on personnel relationships – the primary step towards goals and objectives.

  19. Trust-Enhanced Cloud Service Selection Model Based on QoS Analysis.

    Directory of Open Access Journals (Sweden)

    Yuchen Pan

    Full Text Available Cloud computing technology plays a very important role in many areas, such as in the construction and development of the smart city. Meanwhile, numerous cloud services appear on the cloud-based platform. Therefore how to how to select trustworthy cloud services remains a significant problem in such platforms, and extensively investigated owing to the ever-growing needs of users. However, trust relationship in social network has not been taken into account in existing methods of cloud service selection and recommendation. In this paper, we propose a cloud service selection model based on the trust-enhanced similarity. Firstly, the direct, indirect, and hybrid trust degrees are measured based on the interaction frequencies among users. Secondly, we estimate the overall similarity by combining the experience usability measured based on Jaccard's Coefficient and the numerical distance computed by Pearson Correlation Coefficient. Then through using the trust degree to modify the basic similarity, we obtain a trust-enhanced similarity. Finally, we utilize the trust-enhanced similarity to find similar trusted neighbors and predict the missing QoS values as the basis of cloud service selection and recommendation. The experimental results show that our approach is able to obtain optimal results via adjusting parameters and exhibits high effectiveness. The cloud services ranking by our model also have better QoS properties than other methods in the comparison experiments.

  20. Trust and social capital in the design and evolution of institutions for collective action

    Directory of Open Access Journals (Sweden)

    Benjamin Six

    2015-03-01

    Full Text Available This paper aims at developing an original account of trust in the framework of large scale, international collective action institutions. Our research question focuses on the desired structures and mechanisms that are necessary to sustain the trust needed to uphold the effective operation of institutions for collective action. Our theoretical framework for studying trust is based on the social capital theory. Social capital is defined as the features of social organization, such as trust, networks and norms that facilitate coordination and cooperation for mutual benefit. We claim that in different sectors and contexts stakeholders encounter difficulties in collaborating in setting up experimental institutions for collective action. In order to generate more collaboration, stakeholders need to create structures that incite actors to find the optimal way to sustain trust, to organizationally acknowledge and learn that process, and to nourish it with the precise normative idea behind the institutional apparatus. In the areas of plant genetic resources and biomedicine, stakeholders have encountered these difficulties while experimenting with different coordination mechanisms for dealing with the increased appropriation of knowledge through patents. Our two case studies in plant genetic resources and biomedicine reflect the idea that institutions must be understood as complex pragmatic connectors of trust, i.e. social matrices of collective action that sustain individual commitment, where routine and reflexivity drive trust-based coordination mechanisms in interaction with their environment. From this theoretical framework we derive some recommendations that could be useful in deciding on how to implement this idea.

  1. Trust-Enhanced Cloud Service Selection Model Based on QoS Analysis

    Science.gov (United States)

    Pan, Yuchen; Ding, Shuai; Fan, Wenjuan; Li, Jing; Yang, Shanlin

    2015-01-01

    Cloud computing technology plays a very important role in many areas, such as in the construction and development of the smart city. Meanwhile, numerous cloud services appear on the cloud-based platform. Therefore how to how to select trustworthy cloud services remains a significant problem in such platforms, and extensively investigated owing to the ever-growing needs of users. However, trust relationship in social network has not been taken into account in existing methods of cloud service selection and recommendation. In this paper, we propose a cloud service selection model based on the trust-enhanced similarity. Firstly, the direct, indirect, and hybrid trust degrees are measured based on the interaction frequencies among users. Secondly, we estimate the overall similarity by combining the experience usability measured based on Jaccard’s Coefficient and the numerical distance computed by Pearson Correlation Coefficient. Then through using the trust degree to modify the basic similarity, we obtain a trust-enhanced similarity. Finally, we utilize the trust-enhanced similarity to find similar trusted neighbors and predict the missing QoS values as the basis of cloud service selection and recommendation. The experimental results show that our approach is able to obtain optimal results via adjusting parameters and exhibits high effectiveness. The cloud services ranking by our model also have better QoS properties than other methods in the comparison experiments. PMID:26606388

  2. Trust-Enhanced Cloud Service Selection Model Based on QoS Analysis.

    Science.gov (United States)

    Pan, Yuchen; Ding, Shuai; Fan, Wenjuan; Li, Jing; Yang, Shanlin

    2015-01-01

    Cloud computing technology plays a very important role in many areas, such as in the construction and development of the smart city. Meanwhile, numerous cloud services appear on the cloud-based platform. Therefore how to how to select trustworthy cloud services remains a significant problem in such platforms, and extensively investigated owing to the ever-growing needs of users. However, trust relationship in social network has not been taken into account in existing methods of cloud service selection and recommendation. In this paper, we propose a cloud service selection model based on the trust-enhanced similarity. Firstly, the direct, indirect, and hybrid trust degrees are measured based on the interaction frequencies among users. Secondly, we estimate the overall similarity by combining the experience usability measured based on Jaccard's Coefficient and the numerical distance computed by Pearson Correlation Coefficient. Then through using the trust degree to modify the basic similarity, we obtain a trust-enhanced similarity. Finally, we utilize the trust-enhanced similarity to find similar trusted neighbors and predict the missing QoS values as the basis of cloud service selection and recommendation. The experimental results show that our approach is able to obtain optimal results via adjusting parameters and exhibits high effectiveness. The cloud services ranking by our model also have better QoS properties than other methods in the comparison experiments.

  3. Paradoxes in virtual team knowledge communication and trust building

    DEFF Research Database (Denmark)

    Petersen, Nils Braad

    2012-01-01

    This thesis proposal presents paradoxes within current trust and knowledge management literatures as a lens for understanding challenges in virtual teams working across organisational and geographic boundaries. By exposing contradictions within current virtual team research, the author proposes...... a need for a different, multi-level, multi-theoretical approach to virtual team research in order to overcome the paradoxes. A moderate constructionist research position building on Critical Realism is proposed. To situate the project within current literatures, trust, knowledge management and virtual...... team literatures are reviewed. These are used to support the paradoxes used as a lens for understanding. A research design is presented building on interviews, documentary analysis and observations analysed using Social Network Analysis and James Gee’s framework for discourse analysis. Finally...

  4. A collaborative filtering recommendation algorithm based on weighted SimRank and social trust

    Science.gov (United States)

    Su, Chang; Zhang, Butao

    2017-05-01

    Collaborative filtering is one of the most widely used recommendation technologies, but the data sparsity and cold start problem of collaborative filtering algorithms are difficult to solve effectively. In order to alleviate the problem of data sparsity in collaborative filtering algorithm, firstly, a weighted improved SimRank algorithm is proposed to compute the rating similarity between users in rating data set. The improved SimRank can find more nearest neighbors for target users according to the transmissibility of rating similarity. Then, we build trust network and introduce the calculation of trust degree in the trust relationship data set. Finally, we combine rating similarity and trust to build a comprehensive similarity in order to find more appropriate nearest neighbors for target user. Experimental results show that the algorithm proposed in this paper improves the recommendation precision of the Collaborative algorithm effectively.

  5. Trust me, I'm a researcher!: The role of trust in biomedical research.

    Science.gov (United States)

    Kerasidou, Angeliki

    2017-03-01

    In biomedical research lack of trust is seen as a great threat that can severely jeopardise the whole biomedical research enterprise. Practices, such as informed consent, and also the administrative and regulatory oversight of research in the form of research ethics committees and Institutional Review Boards, are established to ensure the protection of future research subjects and, at the same time, restore public trust in biomedical research. Empirical research also testifies to the role of trust as one of the decisive factors in research participation and lack of trust as a barrier for consenting to research. However, what is often missing is a clear definition of trust. This paper seeks to address this gap. It starts with a conceptual analysis of the term trust. It compares trust with two other related terms, those of reliance and trustworthiness, and offers a defence of Baier's attribute of 'good will' a basic characteristic of trust. It, then, proceeds to consider trust in the context of biomedical research by examining two questions: First, is trust necessary in biomedical research?; and second, do increases in regulatory oversight of biomedical research also increase trust in the field? This paper argues that regulatory oversight is important for increasing reliance in biomedical research, but it does not improve trust, which remains important for biomedical research. It finishes by pointing at professional integrity as a way of promoting trust and trustworthiness in this field.

  6. From the general to the specific: How social trust motivates relational trust.

    Science.gov (United States)

    Robbins, Blaine G

    2016-01-01

    When people form beliefs about the trustworthiness of others with respect to particular matters (i.e., when individuals trust), theory suggests that they rely on preexistent cognitive schemas regarding the general cooperativeness of individuals and organizations (i.e., social trust). In spite of prior work, the impact of social trust on relational trust-or what Russell Hardin (2002) calls trust as a three-part relation where actor A trusts actor B with reference to matter Y-is not well established. Four vignette experiments were administered to Amazon.com Mechanical Turk workers (N = 1388 and N = 1419) and to public university undergraduate students (N = 995 and N = 956) in order to investigate the relationship between social trust and relational trust. Measures of general social trust and particular social trust produced statistically equivalent effects that were positively associated with relational trust. Political trust, however, was statistically unrelated to relational trust. These results support the idea that people rely on schemas and stereotypes concerned with the general cooperativeness and helpfulness of others when forming beliefs about another person's trustworthiness with respect to a particular matter at hand. Copyright © 2015 Elsevier Inc. All rights reserved.

  7. Trust in a Time of Increasing Diversity

    DEFF Research Database (Denmark)

    Dinesen, Peter Thisted; Sønderskov, Kim Mannemar

    2012-01-01

    in the period from 1979 to 2009 coupled with diversity at the municipality level. Individual-level measures of trust over time enable us to estimate the impact on social trust of changes in ethnic diversity within municipalities and, we argue, thereby obtain a more precise estimate of the effect of ethnic......In this study, we examine the impact of ethnic diversity in Danish municipalities on citizens’ social trust over the last three decades. During this period, Danish society has grown increasingly ethnically diverse, and this begs the question whether this has influenced trust in others negatively....... Existing evidence from the Anglo-Saxon countries would suggest that this is the case, whereas evidence from the European continent mainly suggests that no link exists between ethnic diversity and social trust. The empirical analysis uses individual-level data on social trust from several surveys in Denmark...

  8. The multileveled division of trust labour

    DEFF Research Database (Denmark)

    Frederiksen, Morten

    The trust concept is inherently linked to institutional issues. Trust, according to contemporary research, may be directed at both people and institutions and the influence of institutions may affect both trust in other people and trust in other institutions. This conceptual stretching takes place...... at the expense of accuracy and may block our understanding of the intricacies of the multiple levels involved in trusting. This paper suggests a conceptual clarification of this issue by employing a phenomenological approach to the perspective of the trustor, differentiating the types of uncertainty involved...... at the intersubjective and institutional levels. I argue that confidence in institutions define the playing field of uncertainty in intersubjective relations, thus underpinning both the possibility and scope of intersubjective trust. However, once confidence in the institutional setting is brought into question...

  9. The Volatile Nature of Social Trust

    DEFF Research Database (Denmark)

    Kjærsgård, Andreas Pihl; Anhøj, Anne Iversen

    undertakes. The article conducts a comparative study of the development of social trust in Croatia and Slovenia. In spite these countries’ common Yugoslavian heritage they show a remarkably diversified development in social trust over a rather short timespan (1996-2007). The two cases thus provide good cases......The countries in Central and Eastern Europe (CEE) have to varying degrees been struggling in their transition to market economies and democracy. Social trust is often argued to be a crucial lubricant in solving collective action problems and thus building and maintaining well......-functioning institutions. Therefore building and maintaining social trust seems crucial for the countries in CEE struggling with transition. Existing research on social trust is mainly conducted in a western context, and there is a clear need for research to focus on social trust in CEE - an endeavour which this article...

  10. The Value of Trust to Nursing.

    Science.gov (United States)

    Rutherford, Marcella M

    2014-01-01

    Trust, one of nursing's intangible assets, impacts nurses' ability to form meaningful relationships with patients and this connection positively impacts health outcomes. Linking trust to the fabric of nursing and investing in its measurement will become essential to nursing's valuation and the resulting investment in nursing. Trust, as nursing's core value, should be fostered by nurse educators as they prepare the next generation of nurses. Nurse administrators should connect the trust a patient has for his or her nurse and patient cooperation and honest transparent communication between providers and the patient. Banking trust as a valuable nursing asset will substantiate nursing's marketing and support its worth. Nursing's trustworthiness is an intangible asset that warrants protection, as trust once lost is hard to recapture.

  11. Trust Dynamics in a Large System Implementation

    DEFF Research Database (Denmark)

    Schlichter, Bjarne Rerup; Rose, Jeremy

    2013-01-01

    A large information systems implementation (such as ERP systems) relies on the trust of its stakeholders to suc-ceed. Such projects impact diverse groups of stakeholders, each with their legitimate interests and expectations. Levels of stakeholder trust can be expected to vary in large scale...... Integrated Hospi-tal System implementation for the Faroe Islands. Trust relationships suffered a serious breakdown, but the project was able to recover and meet its goals. We develop six theoretical propositions theorising the relationship between trust and project outcomes, the maintenance, breakdown...... implementations (which can take several years), and cannot be taken for granted. Previous studies have largely focused on the taxonomic deconstruction of the trust construct, through point-in-time variance studies. They have identified the relationship between trust and project outcomes, but largely ignored...

  12. Explaining the emergence of social trust

    DEFF Research Database (Denmark)

    Svendsen, Gunnar Lind Haase; Tinggaard Svendsen, Gert; Graeff, Peter

    2012-01-01

    How does social trust emerge in a country? By comparing the cases of Denmark and Germany through six historical phases, we suggest that a plausible explanation is long run political stability. In Denmark, social trust was arguably allowed to accumulate slowly over time and was probably not destro......How does social trust emerge in a country? By comparing the cases of Denmark and Germany through six historical phases, we suggest that a plausible explanation is long run political stability. In Denmark, social trust was arguably allowed to accumulate slowly over time and was probably...... not destroyed up till the universal welfare state of the 20th century. In Germany, however, political instability since the first German state building hampered the emergence and maintenance of social trust, which is why social trust was never allowed to grow in this country....

  13. Increasing interpersonal trust through divergent thinking

    Directory of Open Access Journals (Sweden)

    Roberta eSellaro

    2014-06-01

    Full Text Available Interpersonal trust is an essential ingredient of many social relationships but how stable is it actually, and how is it controlled? There is evidence that the degree of trust into others might be rather volatile and can be affected by manipulations like drawing attention to personal interdependence or independence. Here we investigated whether the degree of interpersonal trust can be biased by inducing either a more integrative or a more cognitive-control mode by means of a creativity task requiring divergent or convergent thinking, respectively. Participants then performed the Trust Game, which provides an index of interpersonal trust by assessing the money units one participant (the trustor transfers to another participant (the trustee. As expected, participants transferred significantly more money to the trustee after engaging in divergent thinking as compared to convergent thinking. This observation provides support for the idea that interpersonal trust is controlled by domain-general (i.e., not socially dedicated cognitive states.

  14. Organizational Culture and Network Embeddedness

    NARCIS (Netherlands)

    Noorderhaven, N.G.; Koen, C.I.; Beugelsdijk, S.

    2002-01-01

    A question that has been neglected in network research is where differences in network embeddedness come from.The network literature reveals that there are three key characteristics of embedded relationships: trust, open communication, and joint problem solving.On the basis of the sparse empirical

  15. TRANSFORMATIONAL LEADERSHIP AND TRUST: A CASE STUDY

    OpenAIRE

    Adriana Zaharia; Carmen-Aida Huţu

    2016-01-01

    According to previous research, an employee’s trust in his/her leader has been linked to: increased individual efficiency and commitment; increased organizational performance; effective team and organizational functioning where the tasks are complex and unstructured. Considering these findings concerning the positive influence of trust on various aspects of organizational performance, we used relevant theories in literature relating to trust in organizational settings and transformational lea...

  16. The impact of voice on trust attributions

    OpenAIRE

    Torre, Ilaria

    2017-01-01

    Trust and speech are both essential aspects of human interaction. On the one hand, trust is necessary for vocal communication to be meaningful. On the other hand, humans have developed a way to infer someone’s trustworthiness from their voice, as well as to signal their own. Yet, research on trustworthiness attributions to speakers is scarce and contradictory, and very often uses explicit data, which do not predict actual trusting behaviour. However, measuring behaviour is very...

  17. Increasing interpersonal trust through divergent thinking

    OpenAIRE

    Sellaro, Roberta; Hommel, Bernhard; De Kwaadsteniet, Erik W.; van de Groep, Suzanne; Colzato, Lorenza S.

    2014-01-01

    Interpersonal trust is an essential ingredient of many social relationships but how stable is it actually, and how is it controlled? There is evidence that the degree of trust into others might be rather volatile and can be affected by manipulations like drawing attention to personal interdependence or independence. Here we investigated whether the degree of interpersonal trust can be biased by inducing either a more integrative or a more focused/exclusive cognitive control mode by means of a...

  18. Representative trust in cognitive social simulations

    OpenAIRE

    Pollock, Shawnoah

    2011-01-01

    Approved for public release; distribution is unlimited. Trust plays a critical role in communications, strength of relationships, and information processing at the individual and group levels. Cognitive social simulations show promise in providing an experimental platform for the examination of social phenomena such as trust formation. This work is a novel attempt at trust representation in a cognitive social simulation using reinforcement learning algorithms. Initial algorithm development...

  19. Repertoires of trust : The practice of trust in a multinational organization amid political conflict

    NARCIS (Netherlands)

    Mizrachi, Nissim; Drori, Israel; Anspach, Renee R.

    Sociologists and other social scientists have recently renewed their interest in the concept of trust. Multidisciplinary studies have identified social psychological, economic, and structural determinants of trust; traced its development in interpersonal relationships; and explored its

  20. Trust reality-mining: evidencing the role of friendship for trust diffusion

    National Research Council Canada - National Science Library

    Farrahi, Katayoun; Zia, Kashif

    2017-01-01

    ... and computational models of those values. This paper, educated by trust theories and models from cognitive science, social sciences and artificial intelligence, proposes a novel stochastic computational model of trust, encapsulating...

  1. The Dyadic Trust Scale: Toward Understanding Interpersonal Trust in Close Relationships.

    Science.gov (United States)

    Larzelere, Robert E.; Huston, Ted L.

    1980-01-01

    Dyadic trust proved to be associated with love and with intimacy of self-disclosure, especially for longer married partners. It varied by level of commitment. Partners reciprocated trust more than either love or depth of self-disclosure. (Author)

  2. Can I Trust Your Findings?

    DEFF Research Database (Denmark)

    Cuervo-Cazurra, Alvaro; Andersson, Ulf; Yoko Brannen, Mary

    2016-01-01

    this complexity and ensure that readers can trust their findings. We provide suggestions for how to rule out alternative explanations, explaining key considerations not only in empirical analyses, but also in theory building and in research design. Our discussion covers both qualitative and quantitative studies......, because we believe that it is imperative to understand how trustworthiness is established in both traditions, even for international business researchers who self-identify with only one. This enables scholars to have a broader scope of knowledge when interpreting past research in the field and to be more...

  3. How Does Social Trust Affect Economic Growth?

    DEFF Research Database (Denmark)

    Bjørnskov, Christian

    Social capital in the form of generalized trust has been shown to be a determinant of economic growth in a number of studies. Other studies have explored other consequences of trust, such as its effects on governance, corruption, education and investment. This paper connects the two strands...... of literature by estimating the effects of trust on growth through a set of potential transmission mechanisms directly. It does so by modelling the process using a three-stage least squares estimator on a sample of countries for which a full data set is available. The results indicate that trust affects...

  4. Does Religiosity Promote or Discourage Social Trust?

    DEFF Research Database (Denmark)

    Berggren, Niclas; Bjørnskov, Christian

    -being. The effect of religiosity is theoretically unclear: while all major religions call for behaving well to others, religious groups may primarily trust people in their own groups and distrust others, as well as cause division in the broader population. We make use of new data from the Gallup World Poll for 105......We look at the effect of religiosity on social trust, defined as the share of a population that thinks that people in general can be trusted. This is important since social trust is related to many desired outcomes, such as growth, education, democratic stability and subjective well...

  5. Explaining the emergence of social trust

    DEFF Research Database (Denmark)

    Svendsen, Gunnar Lind Haase; Svendsen, Gert Tinggaard; Graeff, Peter

    2012-01-01

    How does social trust emerge in a country? By comparing the cases of Denmark and Germany through six historical phases, we suggest that a plausible explanation is long run political stability. In Denmark, social trust was arguably allowed to accumulate slowly over time and was probably...... not destroyed up till the universal welfare state of the 20th century. In Germany, however, political instability since the first German state building hampered the emergence and maintenance of social trust, which is why social trust was never allowed to grow in this country....

  6. Trust in automation: integrating empirical evidence on factors that influence trust.

    Science.gov (United States)

    Hoff, Kevin Anthony; Bashir, Masooda

    2015-05-01

    We systematically review recent empirical research on factors that influence trust in automation to present a three-layered trust model that synthesizes existing knowledge. Much of the existing research on factors that guide human-automation interaction is centered around trust, a variable that often determines the willingness of human operators to rely on automation. Studies have utilized a variety of different automated systems in diverse experimental paradigms to identify factors that impact operators' trust. We performed a systematic review of empirical research on trust in automation from January 2002 to June 2013. Papers were deemed eligible only if they reported the results of a human-subjects experiment in which humans interacted with an automated system in order to achieve a goal. Additionally, a relationship between trust (or a trust-related behavior) and another variable had to be measured. All together, 101 total papers, containing 127 eligible studies, were included in the review. Our analysis revealed three layers of variability in human-automation trust (dispositional trust, situational trust, and learned trust), which we organize into a model. We propose design recommendations for creating trustworthy automation and identify environmental conditions that can affect the strength of the relationship between trust and reliance. Future research directions are also discussed for each layer of trust. Our three-layered trust model provides a new lens for conceptualizing the variability of trust in automation. Its structure can be applied to help guide future research and develop training interventions and design procedures that encourage appropriate trust. © 2014, Human Factors and Ergonomics Society.

  7. Trust in Libraries and Trust in Most People: Social Capital Creation in the Public Library

    OpenAIRE

    Vårheim, Andreas

    2014-01-01

    Studies of the creation of social trust and social capital indicate that informal social contact has a positive effect. Some studies find that uncorrupt public institutions have positive effects on trust and social capital. Additionally, a number of papers show that public libraries have a similar effect. The mechanisms that generate trust, however, remain largely unspecified. Therefore, research describing micro-level processes is needed to uncover the mechanisms creating trust. ...

  8. Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker

    OpenAIRE

    Wazan, Ahmad Samer; LABORDE, Romain; Chadwick, David W.; Barrere, Francois; Benzekri, Abdelmalek; Habbal, Abid M.M.; Kaiiali, Mustafa

    2017-01-01

    A Public Key Infrastructure (PKI) is considered one of the most important techniques used to propagate trust in authentication over the Internet. This technology is based on a trust model defined by the original X.509 (1988) standard and is composed of three entities: the Certification Authority (CA), the certificate holder (or subject) and the Relying Party (RP). The CA plays the role of a trusted third party between the certificate holder and the RP. In many use cases, this trust model has ...

  9. Enhanced multi-attribute trust protocol for malicious node detection ...

    Indian Academy of Sciences (India)

    This paper proposes a trust-based intrusion detection that uses multi-attribute trust metrics to improve detection accuracy. It uses an enhanced distributive trust calculation algorithm that involves monitoring neighbouring nodes and trust calculation using the trust metrics message success rate (MSR), elapsed time at node ...

  10. A healthy dose of trust: the relationship between interpersonal trust and health

    NARCIS (Netherlands)

    Schneider, I.K.; Konijn, E.A.; Righetti, F.; Rusbult, C.E.

    2011-01-01

    The positive effects of trust are manifold. Recent research has shown that trust levels may even influence physical health. The current work explores this issue and aims to shed light on the mechanisms underlying the relationship between trust and health in a 5-wave longitudinal data set. Results

  11. Composition, training needs and independence of ethics review committees across Africa: are the gate-keepers rising to the emerging challenges?

    Science.gov (United States)

    Nyika, A; Kilama, W; Chilengi, R; Tangwa, G; Tindana, P; Ndebele, P; Ikingura, J

    2009-03-01

    The high disease burden of Africa, the emergence of new diseases and efforts to address the 10/90 gap have led to an unprecedented increase in health research activities in Africa. Consequently, there is an increase in the volume and complexity of protocols that ethics review committees in Africa have to review. With a grant from the Bill and Melinda Gates Foundation, the African Malaria Network Trust (AMANET) undertook a survey of 31 ethics review committees (ERCs) across sub-Saharan Africa as an initial step to a comprehensive capacity-strengthening programme. The number of members per committee ranged from 3 to 21, with an average of 11. Members of 10 institutional committees were all from the institution where the committees were based, raising prima facie questions as to whether independence and objectivity could be guaranteed in the review work of such committees. The majority of the committees (92%) cited scientific design of clinical trials as the area needing the most attention in terms of training, followed by determination of risks and benefits and monitoring of research. The survey showed that 38% of the ERC members did not receive any form of training. In the light of the increasing complexity and numbers of health research studies being conducted in Africa, this deficit requires immediate attention. The survey identified areas of weakness in the operations of ERCs in Africa. Consequently, AMANET is addressing the identified needs and weaknesses through a 4-year capacity-building project.

  12. Does conflict shatter trust or does trust obliterate conflict? Revisiting the relationships between team diversity, conflict, and trust

    NARCIS (Netherlands)

    Curseu, P.; Schruijer, S.G.L.

    2010-01-01

    This article explores the interplay between trust and conflict as antecedents of team effectiveness. In the first cross-sectional study, two alternative path models are tested in a sample of 174 teams (897 participants) with the emergent states of task conflict, relationship conflict, and trust

  13. Price transparency: building community trust.

    Science.gov (United States)

    Clarke, Richard L

    2007-01-01

    With the push from policymakers, payers, and consumers for hospitals to make their prices public, healthcare executives need to recognize two central issues related to price transparency: 1) meaningful price transparency involves helping patients and consumers understand their financial obligation for an episode of care, and 2) price transparency is key to the most critical success strategy for healthcare providers: building trust. This article reviews the history of pricing and billing practices and explores why price transparency is not easily achieved in today's environment. Pricing is a mystery even to those of us who work in the field, yet despite its complexity, the call for price transparency is not going to go away. For transparency, the goal should be to establish a rational pricing system that is easily explainable and justified to all stakeholders. Healthcare executives must make pricing a priority, understand cost, develop a pricing philosophy, understand the overall revenue requirements, examine market conditions and prices, and set up systems for review. A rational process of price setting should enhance community trust. In this matter there is nothing less at stake than the hearts of our community members.

  14. Trust in African Americans' Healthcare Experiences.

    Science.gov (United States)

    Murray, Traci M

    2015-01-01

    The purpose of the study is to clarify the concept of trust, identify its defining attributes, antecedents, and consequences, and apply to the healthcare experiences of African Americans. For African Americans, mistrust in the healthcare system is the result of unequal treatment that began in slavery. Fear and negative experiences engender a reluctance to trust healthcare providers, which contributes to health disparities. Walker and Avant's method of concept analysis was used to clarify the concept of trust. The concept was applied to African Americans' healthcare experiences with discussion of opportunities for trust building. Data support for concept development was done using Cumulative Index to Nursing and Allied Health Literature (CINAHL), Medline, and online reference sources. Literature review was guided by using the keyword trust. Further contextual explication was done by adding a review of literature from sociology and history regarding the evolution of African American mistrust of the U.S. healthcare system. The defining attributes of trust are dependence, willingness, and met expectations. Antecedents to trust include a need requiring the help of another and prior knowledge or experience. The consequence of trust is an evaluation of the congruence between expected and actual behaviors of the trusted person or thing. Literature review of the African American culture adds a dynamic aspect for nurses to consider when developing relationships in minority communities. Trust is the willingness to enter a dependent relationship to have the needs addressed, and is maintained by met expectations. Rebuilding trusting relationships between providers and African American patients is a vital step toward reducing health disparities. Murray. © 2015 Wiley Periodicals, Inc.

  15. Security policies and trust in ubiquitous computing.

    Science.gov (United States)

    Joshi, Anupam; Finin, Tim; Kagal, Lalana; Parker, Jim; Patwardhan, Anand

    2008-10-28

    Ubiquitous environments comprise resource-constrained mobile and wearable devices and computational elements embedded in everyday artefacts. These are connected to each other using both infrastructure-based as well as short-range ad hoc networks. Limited Internet connectivity limits the use of conventional security mechanisms such as public key infrastructures and other forms of server-centric authentication. Under these circumstances, peer-to-peer interactions are well suited for not just information interchange, but also managing security and privacy. However, practical solutions for protecting mobile devices, preserving privacy, evaluating trust and determining the reliability and accuracy of peer-provided data in such interactions are still in their infancy. Our research is directed towards providing stronger assurances of the reliability and trustworthiness of information and services, and the use of declarative policy-driven approaches to handle the open and dynamic nature of such systems. This paper provides an overview of some of the challenges and issues, and points out directions for progress.

  16. Exploring pathways for building trust in vaccination and strengthening health system resilience

    Directory of Open Access Journals (Sweden)

    Sachiko Ozawa

    2016-11-01

    Full Text Available Abstract Background Trust is critical to generate and maintain demand for vaccines in low and middle income countries. However, there is little documentation on how health system insufficiencies affect trust in vaccination and the process of re-building trust once it has been compromised. We reflect on how disruptions to immunizations systems can affect trust in vaccination and can compromise vaccine utilization. We then explore key pathways for overcoming system vulnerabilities in order to restore trust, to strengthen the resilience of health systems and communities, and to promote vaccine utilization. Methods Utilizing secondary data and a review of the literature, we developed a causal loop diagram (CLD to map the determinants of building trust in immunizations. Using the CLD, we devised three scenarios to illustrate common vulnerabilities that compromise trust and pathways to strengthen trust and utilization of vaccines, specifically looking at weak health systems, harmful communication channels, and role of social capital. Spill-over effects, interactions and other dynamics in the CLD were then examined to assess leverage points to counter these vulnerabilities. Results Trust in vaccination arises from the interactions among experiences with the health system, the various forms of communication and social capital – both external and internal to communities. When experiencing system-wide shocks such as the case in Ebola-affected countries, distrust is reinforced by feedback between the health and immunization systems where distrust often lingers even after systems are restored and spills over beyond vaccination in the broader health system. Vaccine myths or anti-vaccine movements reinforce distrust. Social capital – the collective value of social networks of community members – plays a central role in increasing levels of trust. Conclusions Trust is important, yet underexplored, in the context of vaccine utilization. Using a CLD to

  17. SERVANT LEADERSHIP AND ORGANIZATIONAL TRUST: THE MEDIATING EFFECT OF THE LEADER TRUST AND ORGANIZATIONAL COMMUNICATION

    Directory of Open Access Journals (Sweden)

    Morad Rezaei

    2012-01-01

    Full Text Available The purpose of this paper aims to clarify the relationship between servant leadership and organizational trust, and tries to demonstrate the mediator role of leader trust and organizational communication in this relationship. The study sample included 258 employees of Guilan province Tax Administration and for sampling we used cluster method. Previous studies have also focused on the positive impact of servant leadership in organizational trust and in this article the results show that there is a significant relationship between servant leadership, organizational trust, leader trust and organizational communication.

  18. Building trusted national identity management systems: Presenting the privacy concern-trust (PCT) model

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    This paper discusses the effect of trust and information privacy concerns on citizens’ attitude towards national identity management systems. We introduce the privacyconcerns- trust model, which shows the role of trust in mediating and moderating citizens’ attitude towards identity management...... systems. We adopted a qualitative research approach in our analysis of data that was gathered through a series of interviews and a stakeholder workshop in Ghana. Our findings indicate that, beyond the threshold level of trust, societal information privacy concern is low; hence, trust is high, thereby...... encouraging further institutional collaboration and acceptance of citizens’ informational self-determination....

  19. Does Ideological Education in China Suppress Trust in Religion and Foster Trust in Government?

    Directory of Open Access Journals (Sweden)

    Ying Xie

    2017-05-01

    Full Text Available A major goal of ideological education in China is to promote loyalty to the party-state and to instill atheism among the people. How effective is this ideological education? This article examines the relationship between education and trust in government and trust in religion using data from the 2010 Chinese General Social Survey. We find that education is negatively associated with trust in government, while positively related to trust in religion. Our findings suggest that policies aimed at displacing religion in favor of the Communist ideology have largely failed to shape the public mindset; rather, the more educated, the more people tend to trust religion instead of the government.

  20. The Importance of Trust in Electronic Commerce.

    Science.gov (United States)

    Ratnasingham, Pauline

    1998-01-01

    Introduces the new concept of trust and how it influences the process of managing the security of an organization operating in an electronic commerce environment. Theoretically, the study aims to develop a framework of trust and security to provide a set of guidelines for secure electronic commerce. (Author/LRW)

  1. Expectations as a key element in trusting

    DEFF Research Database (Denmark)

    Rasmussen, Mette Apollo; Hansen, Uffe Kjærgaard; Conradsen, Maria Bosse

    Considering the need for a tangible focus for qualitative research on trusting, we propose that expectations to the behavior of others can provide that. By focusing on expectations, researchers can produce narrative descriptions that explains how trusting develops and changes. Then the key theore...

  2. Interpersonal Trust and Experiential Education Leadership.

    Science.gov (United States)

    Honchalk, Dave

    1982-01-01

    All factors influencing trust (cooperative relationships, communication, credibility of the leader) are important to successful growth of participants in outdoor experience and are necessary prerequisites for meaningful learning experiences. Outdoor education programs should strive to create an atmosphere of trust. (ERB)

  3. Integrity Constraints in Trust Management (Extended Abstract)

    NARCIS (Netherlands)

    Etalle, Sandro; Winsborough, William H.; Ahn, G-J.

    We introduce the use, monitoring, and enforcement of integrity constraints in trust managementstyle authorization systems. We consider what portions of the policy state must be monitored to detect violations of integrity constraints. Then we address the fact that not all participants in a trust

  4. Physical pain increases interpersonal trust in females.

    Science.gov (United States)

    Wang, C; Gao, J; Ma, Y; Zhu, C; Dong, X-W

    2017-09-14

    People behave and interact with others differently when experiencing physical pain. Pain has dramatic effects on one's emotional responses, cognitive functions and social interaction. However, little has been known about whether and how physical pain influences interpersonal trust in social interaction. In the present study, we examined the influence of physical pain on trusting behaviour. A total of 112 healthy participants were recruited and assigned to physical pain condition (induced by Capsaicin) and control condition (with hand cream), respectively. Thirty minutes after pain induction, three decision-making tasks were conducted to measure behaviours in social interaction, including trust and trustworthiness (trust game), non-social risk-taking (risk game) and altruism (dictator game). Results showed that physical pain increased interpersonal trust among females, but not among males. Pain did not influence non-social risk-taking, altruism or trustworthiness, as evaluated by monetary transfers in those tasks. Moreover, the effect of physical pain on interpersonal trust was fully mediated by expectation of monetary profit. These findings demonstrate an effect of pain on interpersonal trust and suggest a reciprocity mechanism that the effect may be driven by self-interest rather than altruistic motivation. The pain effect on trust was evident only in females, implying distinct pain coping strategies used by both genders. The present work highlights the social component of pain and extends our understanding of mutual interactions between pain and social cognition. © 2017 European Pain Federation - EFIC®.

  5. Trust Building in PPPs for Service Delivery

    DEFF Research Database (Denmark)

    Schulze, Christiane

    for service delivery in Denmark leads to two main findings. First, despite the existence of rather formalized procedures trust based on the perception of the other managers’ competence is already important before the contract is entered. Second, this trust is not automatically transferred onto the next...

  6. Corruption, Trust and their Public Sector Consequences

    DEFF Research Database (Denmark)

    Fritzen, Scott A.; Serritzlew, Søren; Svendsen, Gert Tinggaard

    2014-01-01

    Corruption and trust are two important determinants of the quality of public sectors. Empirical studies in different literatures suggest that corruption and trust have effects on factors such as economic growth, the quality of democratic institutions, life quality, the size and effectiveness of t...

  7. Playing Attack and Defense with Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe; Bouganim, Luc

    2014-01-01

    provide trusted storage? This is the question we tackle in this demonstration. We describe how secure devices, equipped with a trusted execution environment, differ from general purpose devices. We illustrate with our demonstration scenario, that it is much more difficult to attack a storage service...... running on a secure device, than to attack the same service running on a general purpose device....

  8. Web Trust Principles And Mechanisms Guiding Sustainable ...

    African Journals Online (AJOL)

    Trust is one of the mainstay of business, whether traditionally or electronically transacted. But as more and more individuals and businesses participate in electronic business, it would appear that much of what supports trust in the traditional business setting is unavailable online (the Web). It is against the backdrop that this ...

  9. The Neurobiology of Trust and Schooling

    Science.gov (United States)

    Sankey, Derek

    2018-01-01

    Are there neurobiological reasons why we are willing to trust other people and why "trust" and moral values such as "care" play a quite pivotal role in our social lives and the judgements we make, including our social interactions and judgements made in the context of schooling? In pursuing this question, this paper largely…

  10. Building Trust in High-Performing Teams

    Directory of Open Access Journals (Sweden)

    Aki Soudunsaari

    2012-06-01

    Full Text Available Facilitation of growth is more about good, trustworthy contacts than capital. Trust is a driving force for business creation, and to create a global business you need to build a team that is capable of meeting the challenge. Trust is a key factor in team building and a needed enabler for cooperation. In general, trust building is a slow process, but it can be accelerated with open interaction and good communication skills. The fast-growing and ever-changing nature of global business sets demands for cooperation and team building, especially for startup companies. Trust building needs personal knowledge and regular face-to-face interaction, but it also requires empathy, respect, and genuine listening. Trust increases communication, and rich and open communication is essential for the building of high-performing teams. Other building materials are a shared vision, clear roles and responsibilities, willingness for cooperation, and supporting and encouraging leadership. This study focuses on trust in high-performing teams. It asks whether it is possible to manage trust and which tools and operation models should be used to speed up the building of trust. In this article, preliminary results from the authors’ research are presented to highlight the importance of sharing critical information and having a high level of communication through constant interaction.

  11. Does Education Lead to Higher Generalized Trust?

    DEFF Research Database (Denmark)

    Charron, Nicholas; Rothstein, Bo

    2016-01-01

    to ‘trust others'. We hypothesize that higher levels of education will lead to higher social trust in individuals, given that the context (country or regions within countries) in which they reside has a sufficiently impartial and non-corrupt institutional setting. However, the positive effect of education...

  12. The Winston Churchill Memorial Trust of Australia

    Science.gov (United States)

    Hilton, Nicolette

    2013-01-01

    The Churchill Trust was established in 1965 to honour the memory of Sir Winston Churchill by awarding overseas research Fellowships known as "Churchill Fellowships". Since its inception, The Churchill Trust has awarded Churchill Fellowships to more than 3,700 Australians who, like Churchill, are innovative, filled with a spirit of…

  13. Trust Factors Affecting Cooperation in Construction

    DEFF Research Database (Denmark)

    Ditlev Bohnstedt, Kristian; Haugbølle, Kim; Bejder, Erik

    2013-01-01

    -productivity sector. By applying the theory that insufficient cooperation is the result of low trust the aim was to investigate how conditions for formation of positive and lasting trustful relationships can be created. A questionnaire survey including clients, contractors, architects, engineers and client design...

  14. Physical trust-based persistent authentication

    DEFF Research Database (Denmark)

    Fujita, Masahiro; Jensen, Christian D.; Arimura, Shiori

    2015-01-01

    propose a new type of persistent authentication, called Persistent Authentication Based On physical Trust (PABOT). PABOT uses a context of “physical trust relationship” that is built by visual contact between users, and thus can offer a persistent authentication mechanism with better usability and higher...

  15. Institutional and social trust: Is there a causal relationship?

    DEFF Research Database (Denmark)

    Dinesen, Peter Thisted; Sønderskov, Kim Mannemar

    affecting both types of trust. Therefore, conventional analyses using cross-sectional data are ill-suited to determine whether institutional trust actually cause social trust. In contrast to previous analyses, this paper utilizes two Danish panel surveys containing measures of the two types of trust......In the literature on social trust, institutional trust is prominent explanations of why people trust the generalized other. However, while institutional trust is a plausible cause of social trust, it is also likely to be consequences of trust or a consequence of deep-rooted personality traits...... as regressors), the results provide strong evidence of trust in state institutions exercising an impact on social trust whereas the evidence for a reverse relationship is mixed....

  16. Explaining the justice-performance relationship: trust as exchange deepener or trust as uncertainty reducer?

    Science.gov (United States)

    Colquitt, Jason A; Lepine, Jeffery A; Piccolo, Ronald F; Zapata, Cindy P; Rich, Bruce L

    2012-01-01

    Past research has revealed significant relationships between organizational justice dimensions and job performance, and trust is thought to be one mediator of those relationships. However, trust has been positioned in justice theorizing in 2 different ways, either as an indicator of the depth of an exchange relationship or as a variable that reflects levels of work-related uncertainty. Moreover, trust scholars distinguish between multiple forms of trust, including affect- and cognition-based trust, and it remains unclear which form is most relevant to justice effects. To explore these issues, we built and tested a more comprehensive model of trust mediation in which procedural, interpersonal, and distributive justice predicted affect- and cognition-based trust, with those trust forms predicting both exchange- and uncertainty-based mechanisms. The results of a field study in a hospital system revealed that the trust variables did indeed mediate the relationships between the organizational justice dimensions and job performance, with affect-based trust driving exchange-based mediation and cognition-based trust driving uncertainty-based mediation.

  17. Factors influencing trust in media: exploring the association between media consumption and news about the 15M Movement

    Directory of Open Access Journals (Sweden)

    Ariadna Fernández-Planells

    2015-11-01

    Full Text Available Debate over consumer trust in traditional media has intensified due to theappearance of networked social movements, particularly considering media coverage ofthe protests, the emergence of alternative media and social media as informationsources. A survey was created for this study to provide insight into the associationbetween media exposure, trust and political participation in networked socialmovements, specifically among 15M Movement activists. Data is presented to show towhat extent do 15M activists view traditional and alternative media as trustworthy. Thearticle also looks at the causes of trust and mistrust in those media.Results indicate that politically-interested online users placed more trust in informationdisseminated by alternative media than by conventional media. Furthermore, exposure tosocial media is associated with trust in media, while age and gender are not. This meansthat the increased use of alternative and social media involves a decreased trust ininformation provided by traditional media. Instead, those who do not use social mediaand those who use traditional media are those who most trusted mass media the most. 

  18. Framing Trust at the Street-Level

    DEFF Research Database (Denmark)

    Perry, Kevin Anthony

    such as injustice and justice to create both distrust and trust frames around individual employees. The last analytical chapter reports finding four: negotiating cultural frames. The last part of the chapter looks closer at the relationship between the young men with minority ethnic backgrounds, the job consultant......This thesis deals with the phenomenon of distrust and trust between young men with minority ethnic backgrounds and public sector employees at the face-to-face level of interaction. The focus is on trust and distrust which can be understood as cultural resources – a valuable approach to researching...... trust and distrust largely under-represented in the trust literature. A common source of conflict is often a lack of confidence or distrust in the authorities; therefore, winning the confidence of minority ethnic groups in these communities is essential to easing tensions, along with reducing civil...

  19. TRUST AND DISTRUST: TWO NECESSARY FACTORS FOR THE DEVELOPMENT OF THE SOCIAL TRUST

    Directory of Open Access Journals (Sweden)

    RODRIGO YÁÑEZ GALLARDO

    2006-01-01

    Full Text Available Recent investigations argue that distrust is the absence of trust and it would be assumed that bothattitudes are independent; that would allow to distinguish between the naïve attitude and the wise attitudein the trust. It has been built a scale to measure the disposition to trust and the relationship has beenexamined among naïve and wise attitude when trusting. The sample was constituted by 575 universitystudents of both sexes, of four faculties and of different years of study. Through a factorial analysis itwas found that trust and distrust correspond to different factors. It was discussed the importance ofincrease an optimal trust in order to develop social abilities and to stimulate the social participation. Itwas questioned the validity of traditional surveys that measure the social trust.

  20. Trusting Facebook in Crisis Situations: The Role of General Use and General Trust Toward Facebook.

    Science.gov (United States)

    Szymczak, Hermann; Kücükbalaban, Pinar; Lemanski, Sandra; Knuth, Daniela; Schmidt, Silke

    2016-01-01

    An important concept that has been rather neglected in research on social media is the concept of trust. Although there is a considerable amount of research on online trust in general, little has been done in the area of social media. As a situation of risk is necessary for trust, the perceived trustworthiness of Facebook in crisis situations was examined in this study. A sample of 340 European Facebook users were questioned as part of a large European study about social media in the context of emergency situations. We found that participants' general trust toward Facebook as a medium predicted to a significant degree how much they would trust Facebook in a crisis situation. General use of Facebook and dispositional trust were also significantly associated with trust toward Facebook in a crisis situation.

  1. The Comparison of Distributed P2P Trust Models Based on Quantitative Parameters in the File Downloading Scenarios

    Directory of Open Access Journals (Sweden)

    Jingpei Wang

    2016-01-01

    Full Text Available Varied P2P trust models have been proposed recently; it is necessary to develop an effective method to evaluate these trust models to resolve the commonalities (guiding the newly generated trust models in theory and individuality (assisting a decision maker in choosing an optimal trust model to implement in specific context issues. A new method for analyzing and comparing P2P trust models based on hierarchical parameters quantization in the file downloading scenarios is proposed in this paper. Several parameters are extracted from the functional attributes and quality feature of trust relationship, as well as requirements from the specific network context and the evaluators. Several distributed P2P trust models are analyzed quantitatively with extracted parameters modeled into a hierarchical model. The fuzzy inferring method is applied to the hierarchical modeling of parameters to fuse the evaluated values of the candidate trust models, and then the relative optimal one is selected based on the sorted overall quantitative values. Finally, analyses and simulation are performed. The results show that the proposed method is reasonable and effective compared with the previous algorithms.

  2. Combinations of social participation and trust, and association with health status-an Australian perspective.

    Science.gov (United States)

    Williams, Susan L; Ronan, Kevin

    2014-12-01

    A limited number of studies have examined the 'miniaturization of community' model which is based on belief that 'new' individualistic, and narrower forms of social participation, do not promote generalized trust in others. Little is known about miniaturization of community and self-reported health, physical health and psychological health in Australia. Data from a 2009 computer-assisted-telephone-interview survey was used to investigate generalized trust, social participation and health-related quality of life in a regional Australian population (n = 1273; mean age 51.2 years). Logistic regression analyses were performed to investigate the associations between generalized trust, social participation and poor self-reported health (global self-rated, psychological and physical), and included four social participation/trust categories. A majority (67%) reported high generalized trust of others, 54% were categorized as high social participators. Miniaturization of community was a risk factor for poor self-rated psychological health across genders, and a risk factor for poor self-rated health for males. For women, low social participation (irrespective of trust level) was associated with poor self-reported health. Given current and previous findings, there is a need for further research in a range of contexts which explores the underlying concept of miniaturization of community, that is, the changes in social participation and social networks which may negatively impact community health. © The Author (2013). Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  3. Correlates of consumer trust in online health information: findings from the health information national trends survey.

    Science.gov (United States)

    Ye, Yinjiao

    2011-01-01

    The past few decades have witnessed a dramatic increase in consumers seeking health information online. However, the quality of such information remains questionable, and the trustworthiness of online health information has become a hot topic, whereas little attention has been paid to how consumers evaluate online health information credibility. This study builds on theoretical perspectives of trust such as personal-capital-based, social-capital-based, and transfer-based, and it examines various correlates of consumer trust in online health information. The author analyzed the 2007 Health Information National Trends Survey data (N = 7,674). Results showed that consumer trust in online health information did not correlate with personal capital such as income, education, and health status. Social capital indicated by visiting social networking Web sites was not associated with trust in online health information either. Nevertheless, trust in online health information transferred from traditional mass media and government health agencies to the Internet, and it varied by such information features as easiness to locate and to understand. Age appeared to be a key factor in understanding the correlates of trust in online health information. Theoretical and empirical implications of the results are discussed.

  4. Influencing Trust for Human-Automation Collaborative Scheduling of Multiple Unmanned Vehicles.

    Science.gov (United States)

    Clare, Andrew S; Cummings, Mary L; Repenning, Nelson P

    2015-11-01

    We examined the impact of priming on operator trust and system performance when supervising a decentralized network of heterogeneous unmanned vehicles (UVs). Advances in autonomy have enabled a future vision of single-operator control of multiple heterogeneous UVs. Real-time scheduling for multiple UVs in uncertain environments requires the computational ability of optimization algorithms combined with the judgment and adaptability of human supervisors. Because of system and environmental uncertainty, appropriate operator trust will be instrumental to maintain high system performance and prevent cognitive overload. Three groups of operators experienced different levels of trust priming prior to conducting simulated missions in an existing, multiple-UV simulation environment. Participants who play computer and video games frequently were found to have a higher propensity to overtrust automation. By priming gamers to lower their initial trust to a more appropriate level, system performance was improved by 10% as compared to gamers who were primed to have higher trust in the automation. Priming was successful at adjusting the operator's initial and dynamic trust in the automated scheduling algorithm, which had a substantial impact on system performance. These results have important implications for personnel selection and training for futuristic multi-UV systems under human supervision. Although gamers may bring valuable skills, they may also be potentially prone to automation bias. Priming during training and regular priming throughout missions may be one potential method for overcoming this propensity to overtrust automation. © 2015, Human Factors and Ergonomics Society.

  5. 5360 Volume 11 No. 6 October 2011 THE PRIMACY OF TRUST IN ...

    African Journals Online (AJOL)

    Khanjan Mehta

    2011-10-06

    Oct 6, 2011 ... Each participant was the proprietor of a stall selling agricultural products in one of the three town markets. ... trust in the dynamic interdependence of social networks, cell phones and entrepreneurial success [1]. ... and Agricultural Entrepreneurship in East Africa: A Dynamic Interdependence” provides the ...

  6. Repeated Interactions vs. Social Ties: Quantifying the Economic Value of Trust, Forgiveness, and Reputation Using a Field Experiment

    OpenAIRE

    Ravi Bapna; Liangfei Qiu; Sarah Rice

    2014-01-01

    The growing importance of online social networks makes it interesting to ask whether extant social capital can substitute for trust built through repeated interactions. It also provides fertile ground for researchers seeking to gain a deeper understanding of fundamental constructs of human behavior, such as trust, forgiveness, and their linkage to social ties. In both contexts, a challenge in the literature on repeated interactions and social ties is the econometric task of accounting for end...

  7. Beyond Trust: Plagiarism and Truth.

    Science.gov (United States)

    Penders, Bart

    2017-12-12

    Academic misconduct distorts the relationship between scientific practice and the knowledge it produces. The relationship between science and the knowledge it produces is, however, not something universally agreed upon. In this paper I will critically discuss the moral status of an act of research misconduct, namely plagiarism, in the context of different epistemological positions. While from a positivist view of science, plagiarism only influences trust in science but not the content of the scientific corpus, from a constructivist point of view both are at stake. Consequently, I argue that discussions of research misconduct and responsible research ought to be explicitly informed by the authors' views on the relationship between science and the knowledge it produces.

  8. Hardware IP security and trust

    CERN Document Server

    Bhunia, Swarup; Tehranipoor, Mark

    2017-01-01

    This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle. Readers will gain a comprehensive understanding of the security vulnerabilities of different types of IPs. This book would enable readers to overcome these vulnerabilities through an efficient combination of proactive countermeasures and design-for-security solutions, as well as a wide variety of IP security and trust assessment and validation techniques. This book serves as a single-source of reference for system designers and practitioners for designing secure, reliable and trustworthy SoCs.

  9. On Using TPM for Secure Identities in Future Home Networks

    Directory of Open Access Journals (Sweden)

    Georg Carle

    2011-01-01

    Full Text Available Security should be integrated into future networks from the beginning, not as an extension. Secure identities and authentication schemes are an important step to fulfill this quest. In this article, we argue that home networks are a natural trust anchor for such schemes. We describe our concept of home networks as a universal point of reference for authentication, trust and access control, and show that our scheme can be applied to any next generation network. As home networks are no safe place, we apply Trusted Computing technology to prevent the abuse of identities, i.e., identity theft.

  10. Neural signatures of trust in reciprocity: A coordinate-based meta-analysis.

    Science.gov (United States)

    Bellucci, Gabriele; Chernyak, Sergey V; Goodyear, Kimberly; Eickhoff, Simon B; Krueger, Frank

    2017-03-01

    Trust in reciprocity (TR) is defined as the risky decision to invest valued resources in another party with the hope of mutual benefit. Several fMRI studies have investigated the neural correlates of TR in one-shot and multiround versions of the investment game (IG). However, an overall characterization of the underlying neural networks remains elusive. Here, a coordinate-based meta-analysis was employed (activation likelihood estimation method, 30 articles) to investigate consistent brain activations in each of the IG stages (i.e., the trust, reciprocity and feedback stage). Results showed consistent activations in the anterior insula (AI) during trust decisions in the one-shot IG and decisions to reciprocate in the multiround IG, likely related to representations of aversive feelings. Moreover, decisions to reciprocate also consistently engaged the intraparietal sulcus, probably involved in evaluations of the reciprocity options. On the contrary, trust decisions in the multiround IG consistently activated the ventral striatum, likely associated with reward prediction error signals. Finally, the dorsal striatum was found consistently recruited during the feedback stage of the multiround IG, likely related to reinforcement learning. In conclusion, our results indicate different neural networks underlying trust, reciprocity, and feedback learning. These findings suggest that although decisions to trust and reciprocate may elicit aversive feelings likely evoked by the uncertainty about the decision outcomes and the pressing requirements of social standards, multiple interactions allow people to build interpersonal trust for cooperation via a learning mechanism by which they arguably learn to distinguish trustworthy from untrustworthy partners. Hum Brain Mapp 38:1233-1248, 2017. © 2016 Wiley Periodicals, Inc. © 2016 Wiley Periodicals, Inc.

  11. Trust into Collective Privacy? The Role of Subjective Theories for Self-Disclosure in Online Communication

    Directory of Open Access Journals (Sweden)

    Ricarda Moll

    2014-12-01

    Full Text Available In order to build and maintain social capital in their Online Social Networks, users need to disclose personal information, a behavior that at the same time leads to a lower level of privacy. In this conceptual paper, we offer a new theoretical perspective on the question of why people might regulate their privacy boundaries inadequately when communicating in Online Social Networks. We argue that people have developed a subjective theory about online privacy putting them into a processing mode of default trust. In this trusting mode people would (a discount the risk of a self-disclosure directly; and (b infer the risk from invalid cues which would then reinforce their trusting mode. As a consequence people might be more willing to self-disclose information than their actual privacy preferences would otherwise indicate. We exemplify the biasing potential of a trusting mode for memory and metacognitive accuracy and discuss the role of a default trust mode for the development of social capital.

  12. Genetic influences are virtually absent for trust.

    Directory of Open Access Journals (Sweden)

    Paul A M Van Lange

    Full Text Available Over the past decades, numerous twin studies have revealed moderate to high heritability estimates for individual differences in a wide range of human traits, including cognitive ability, psychiatric disorders, and personality traits. Even factors that are generally believed to be environmental in nature have been shown to be under genetic control, albeit modest. Is such heritability also present in social traits that are conceptualized as causes and consequences of social interactions or in other ways strongly shaped by behavior of other people? Here we examine a population-based sample of 1,012 twins and relatives. We show that the genetic influence on generalized trust in other people (trust-in-others: h2 = 5%, ns, and beliefs regarding other people's trust in the self (trust-in-self: h2 = 13%, ns, is virtually absent. As test-retest reliability for both scales were found to be moderate or high (r = .76 and r = .53, respectively in an independent sample, we conclude that all variance in trust is likely to be accounted for by non-shared environmental influences. We show that, relative to cognitive abilities, psychiatric disorders, and classic personality variables, genetic influences are smaller for trust, and propose that experiences with or observations of the behavior of other people shape trust more strongly than other traits.

  13. Communicating Trust Between Parents and Their Children

    DEFF Research Database (Denmark)

    Demant, Jakob Johan; Ravn, Signe

    2013-01-01

    This article discusses how Danish parents and their children communicate trust. Based on Niklas Luhmann’s sociological theory, the article explores new aspects of communication about alcohol-related rules. The analysis shows how the parents emphasize the importance of communicating trust, while...... the adolescents, on the other hand, observe the parents’ communication on the basis of their own, more instrumental, logic. Trust becomes a functional solution to the parents’ paradoxical situation, because it enables them to balance between a democratic family ideal, emphasizing the adolescents’ independence...

  14. Trust Based Evaluation of Wikipedia's Contributors

    Science.gov (United States)

    Krupa, Yann; Vercouter, Laurent; Hübner, Jomi Fred; Herzig, Andreas

    Wikipedia is an encyclopedia on which anybody can change its content. Some users, self-proclaimed "patrollers", regularly check recent changes in order to delete or correct those which are ruining articles integrity. The huge quantity of updates leads some articles to remain polluted a certain time before being corrected. In this work, we show how a multiagent trust model can help patrollers in their task of controlling the Wikipedia. To direct the patrollers verification towards suspicious contributors, our work relies on a formalisation of Castelfranchi & Falcone's social trust theory to assist them by representing their trust model in a cognitive way.

  15. How Does Social Trust Affect Economic Growth?

    DEFF Research Database (Denmark)

    Bjørnskov, Christian

    This paper connects two strands of the literature on social trust by estimating the effects of trust on growth through a set of potential transmission mechanisms directly. It does so by modelling the process using a three-stage least squares estimator on a sample of countries for which a full data...... set is available. The results indicate that trust affects schooling and the rule of law directly. These variables in turn affect the investment rate (schooling) and provide a direct effect (rule of law) on the growth rate. The paper closes with a short discussion of the relevance of the findings....

  16. The Online Construction of Personal Identity through Trust and Privacy

    Directory of Open Access Journals (Sweden)

    Massimo Durante

    2011-10-01

    Full Text Available Constructing a personal identity is an activity much more complex than elaborating a series of online profiles, which are only digital hints of the Self. The construction of our personal identity is a context-mediated activity. Our hypothesis is that young people are enabled, as digital natives and social network users, to co-construct the “context of communication” in which their narrative identities will be interpreted and understood. In particular, the aim of this paper is to show that such “context of communication”, which can be seen as the hermeneutical counterpart of the “networked publics” elaborated by Danah Boyd, emerges out of the tension between trust and privacy. In other terms, it is, on the one hand, the outcome of a web of trustful relations and, on the other, the framework in which the informational norms regulating teens’ expectations of privacy protection are set and evaluated. However, these expectations can be frustrated, since the information produced in such contexts can be disembedded and re-contextualized across time. The general and widespread use of information technology is, in fact, challenging our traditional way of thinking about the world and our identities in terms of stable and durable structures; they are reconstituted, instead, into novel forms.

  17. Analysis on trust influencing factors and trust model from multiple perspectives of online Auction

    Science.gov (United States)

    Yu, Wang

    2017-10-01

    Current reputation models lack the research on online auction trading completely so they cannot entirely reflect the reputation status of users and may cause problems on operability. To evaluate the user trust in online auction correctly, a trust computing model based on multiple influencing factors is established. It aims at overcoming the efficiency of current trust computing methods and the limitations of traditional theoretical trust models. The improved model comprehensively considers the trust degree evaluation factors of three types of participants according to different participation modes of online auctioneers, to improve the accuracy, effectiveness and robustness of the trust degree. The experiments test the efficiency and the performance of our model under different scale of malicious user, under environment like eBay and Sporas model. The experimental results analysis show the model proposed in this paper makes up the deficiency of existing model and it also has better feasibility.

  18. DualTrust: A Trust Management Model for Swarm-Based Autonomic Computing Systems

    Energy Technology Data Exchange (ETDEWEB)

    Maiden, Wendy M. [Washington State Univ., Pullman, WA (United States)

    2010-05-01

    Trust management techniques must be adapted to the unique needs of the application architectures and problem domains to which they are applied. For autonomic computing systems that utilize mobile agents and ant colony algorithms for their sensor layer, certain characteristics of the mobile agent ant swarm -- their lightweight, ephemeral nature and indirect communication -- make this adaptation especially challenging. This thesis looks at the trust issues and opportunities in swarm-based autonomic computing systems and finds that by monitoring the trustworthiness of the autonomic managers rather than the swarming sensors, the trust management problem becomes much more scalable and still serves to protect the swarm. After analyzing the applicability of trust management research as it has been applied to architectures with similar characteristics, this thesis specifies the required characteristics for trust management mechanisms used to monitor the trustworthiness of entities in a swarm-based autonomic computing system and describes a trust model that meets these requirements.

  19. Analysis on trust influencing factors and trust model from multiple perspectives of online Auction

    Directory of Open Access Journals (Sweden)

    Yu Wang

    2017-10-01

    Full Text Available Current reputation models lack the research on online auction trading completely so they cannot entirely reflect the reputation status of users and may cause problems on operability. To evaluate the user trust in online auction correctly, a trust computing model based on multiple influencing factors is established. It aims at overcoming the efficiency of current trust computing methods and the limitations of traditional theoretical trust models. The improved model comprehensively considers the trust degree evaluation factors of three types of participants according to different participation modes of online auctioneers, to improve the accuracy, effectiveness and robustness of the trust degree. The experiments test the efficiency and the performance of our model under different scale of malicious user, under environment like eBay and Sporas model. The experimental results analysis show the model proposed in this paper makes up the deficiency of existing model and it also has better feasibility.

  20. A social network model of investment behaviour in the stock market

    Science.gov (United States)

    Bakker, L.; Hare, W.; Khosravi, H.; Ramadanovic, B.

    2010-03-01

    To consider the psychological factors that impact market valuation, a model is formulated for investment behaviour of traders whose decisions are influenced by their trusted peers’ behaviour. The model is implemented and several different “trust networks” are tested. Simulation results demonstrate that real life trust networks can significantly delay the stabilisation of a market.

  1. Requirements Definition for ORNL Trusted Corridors Project

    Energy Technology Data Exchange (ETDEWEB)

    Walker, Randy M [ORNL; Hill, David E [ORNL; Smith, Cyrus M [ORNL; DeNap, Frank A [ORNL; White, James D [ORNL; Gross, Ian G [ORNL; Gorman, Bryan L [ORNL; Hively, Lee M [ORNL; Abercrombie, Robert K [ORNL

    2008-02-01

    The ORNL Trusted Corridors Project has several other names: SensorNet Transportation Pilot; Identification and Monitoring of Radiation (in commerce) Shipments (IMR(ic)S); and Southeastern Transportation Corridor Pilot (SETCP). The project involves acquisition and analysis of transportation data at two mobile and three fixed inspection stations in five states (Kentucky, Mississippi, South Carolina, Tennessee, and Washington DC). Collaborators include the State Police organizations that are responsible for highway safety, law enforcement, and incident response. The three states with fixed weigh-station deployments (KY, SC, TN) are interested in coordination of this effort for highway safety, law enforcement, and sorting/targeting/interdiction of potentially non-compliant vehicles/persons/cargo. The Domestic Nuclear Detection Office (DNDO) in the U.S. Department of Homeland Security (DHS) is interested in these deployments, as a Pilot test (SETCP) to identify Improvised Nuclear Devices (INDs) in highway transport. However, the level of DNDO integration among these state deployments is presently uncertain. Moreover, DHS issues are considered secondary by the states, which perceive this work as an opportunity to leverage these (new) dual-use technologies for state needs. In addition, present experience shows that radiation detectors alone cannot detect DHS-identified IND threats. Continued SETCP success depends on the level of integration of current state/local police operations with the new DHS task of detecting IND threats, in addition to emergency preparedness and homeland security. This document describes the enabling components for continued SETCP development and success, including: sensors and their use at existing deployments (Section 1); personnel training (Section 2); concept of operations (Section 3); knowledge discovery from the copious data (Section 4); smart data collection, integration and database development, advanced algorithms for multiple sensors, and

  2. Framing Trust at the Street-Level

    DEFF Research Database (Denmark)

    Perry, Kevin Anthony

    This thesis deals with the phenomenon of distrust and trust between young men with minority ethnic backgrounds and public sector employees at the face-to-face level of interaction. The focus is on trust and distrust which can be understood as cultural resources – a valuable approach to researching...... trust and distrust largely under-represented in the trust literature. A common source of conflict is often a lack of confidence or distrust in the authorities; therefore, winning the confidence of minority ethnic groups in these communities is essential to easing tensions, along with reducing civil...... processes between public sector employees and young men with minority ethnic backgrounds, an under-researched and often misunderstood area. The central focus is on the relationship between the young men with minority ethnic backgrounds, a team of youth workers, a job consultant and a police officer...

  3. Estate Planning: The Role of Trust Funds.

    Science.gov (United States)

    Neidermeyer, Ellen; Neidermeyer, Adolph

    1985-01-01

    The authors present estate planning suggestions that address concerns about lifetime care for the disabled children of aging parents. Aspects covered include disinheriting children, trust funds, and medical and legal assistance and food stamps. (CL)

  4. Trust region minimization of orbital localization functions

    DEFF Research Database (Denmark)

    Høyvik, Ida-Marie; Jansik, Branislav; Jørgensen, Poul

    2012-01-01

    The trust region method has been applied to the minimization of localization functions, and it is shown that both local occupied and local virtual Hartree–Fock (HF) orbitals can be obtained. Because step sizes are size extensive in the trust region method, large steps may be required when...... the method is applied to large molecular systems. For an exponential parametrization of the localization function only small steps are allowed, and the standard trust radius update therefore has been replaced by a scheme where the direction of the step is determined using a conservative estimate of the trust...... radius and the length of the step is determined from a line search along the obtained direction. Numerical results for large molecular systems have shown that large steps can then safely be taken, and a robust and nearly monotonic convergence is obtained....

  5. Trust and Coordination in Offshore Outsourcing

    DEFF Research Database (Denmark)

    Tøth, Thomas

    2013-01-01

    the implementation of handover meetings affected Danish employees' perception of their Indian counterparts in terms of work attitude, competence and reliability - and ultimately how these handover meetings increased the Danish employees' willingness and ability to trust their Indian counterparts. Contemporary...

  6. Personalized Service Recommendation Based on Trust Relationship

    Directory of Open Access Journals (Sweden)

    Hao Tian

    2017-01-01

    Full Text Available With the rapid development and extensive application of Web services, various approaches for Web service recommendation have been proposed in the past. However, the traditional methods only utilize the information of the user-service rating matrix but ignore the trust relations between users, so their recommendation precision is often unsatisfactory, and, furthermore, most of these methods lack the ability to distinguish the credibility of recommendation. To address the problems, we proposed a personalized service recommendation based on trust relationship. In particular, our approach takes into account user experience, interest background, recommendation effect, and evaluation tendency in the formalization of trust relationship, and moreover it can filter out useless or suspected services by exploiting trust relationships between users. To verify the proposed approach, we conducted experiments by using a real-world Web services set. The experimental results show that our proposed approach leads to a substantial increase in the precision and the credibility of service recommendations.

  7. Supporting collaboration with trust virtual organization

    NARCIS (Netherlands)

    Lin, A.; Vullings, E.; Dalziel, J.

    2008-01-01

    This chapter introduces the trust virtual organization as a means of facilitating authentication and authorization for sharing distributed and protected contents and services. It indicates that sharing institutional protected services and deliverables has proven a hurdle since user accounts are

  8. Leaking Underground Storage Tank (LUST) Trust Fund

    Science.gov (United States)

    In 1986, Congress created the Leaking Underground Storage Tank (LUST) Trust Fund to address releases from federally regulated underground storage tanks (USTs) by amending Subtitle I of the Solid Waste Disposal Act.

  9. The Contextual Antecedents of Organizational Trust

    DEFF Research Database (Denmark)

    Li, Peter Ping; Bai, Yuntao; Xi, Youmin

    2012-01-01

    , and cultural norm at the organizational level, on organizational trust directly, and their behavioural outcomes at the individual level indirectly, using organizational trust as a cross-level mediator. The empirical results, based on a hierarchical linear model with a sample of 444 employees from 82 firms......In this article we seek to explore the contextual antecedents of organizational trust. In light of the complex links between organizational contexts and organizational behaviours, we focus on the effects of the three most critical contextual antecedents, i.e., leadership role, structural rule...... in China, lent support for our multidimensional cross-level model of context–trust–behaviour link. We extend the research on organizational trust by treating it as a cross-level phenomenon and by specifying its core contextual antecedents and behavioural consequences....

  10. Leader Trust, Competence, LMX, and Member Performance.

    Science.gov (United States)

    Byun, Gukdo; Dai, Ye; Lee, Soojin; Kang, Seungwan

    2017-01-01

    Based on social exchange theory, this study examines the influence of leaders' trusting behavior and competence in in-role activities on members' perceived leader-member exchange (LMX) relationships. Our study proposes that a leader's trust in a member contributes to the member's perceived LMX, and that the leader's competence in in-role activities moderates this relationship. Furthermore, our study suggests that perceived LMX mediates the relationship between the leader's trust and members' task performance. Finally, the study proposes that the leader's competence moderates the mediating role of LMX in transmitting the effect of the leader's trust on members' task performance. Analyses of the data collected from soldiers and platoon leaders in the South Korean army support these hypotheses.

  11. Trust and communicated attributions in close relationships.

    Science.gov (United States)

    Rempel, J K; Ross, M; Holmes, J G

    2001-07-01

    The attributional statements intimate partners communicate to one another were examined as a function of trust. In discussions by 35 married couples, 850 attributions and corresponding events were coded on dimensions of valence, globality, and locus. Results of regression and contingency analyses indicate that attributional statements expressed in high-trust relationships emphasized positive aspects of the relationship. Medium-trust couples actively engaged issues but focused more on negative events and explanations. Low-trust couples expressed more specific, less affectively extreme attributional statements that minimized the potential for increased conflict. Results could not be accounted for by relationship satisfaction. These findings also highlight the importance of focusing on features of the events for which attributions are expressed.

  12. Trust Ownership of the Tata Group

    DEFF Research Database (Denmark)

    Thomsen, Steen

    structure is characterized by managerial distance between trusts and Group companies. The Trusts are almost exclusively concerned with philanthropy, and according to the Articles of Association of Tata Sons Limited, their governance role is limited to nominating two members to the Selection Committee which......The Indian Tata Group is one of the largest and most admired business groups in the world. It has 28 listed subsidiaries and more than 80 operating businesses. It has shown strong financial performance and social responsibility for decades. Interestingly, it has a unique ownership structure......: the main holding company Tata Sons Limited is majority-owned by charitable trusts. We examine the governance of this remarkable entity. The Trusts own 66% of Tata Sons, the main holding company of the Group, while members of the founding Tata family are very small minority shareholders. The governance...

  13. Trust in Co-sourced Software Development

    DEFF Research Database (Denmark)

    Schlichter, Bjarne Rerup; Persson, John Stouby

    2014-01-01

    Software development projects are increasingly geographical distributed with offshoring. Co-sourcing is a highly integrative and cohesive approach, seen successful, to software development offshoring. However, research of how dynamic aspects of trust are shaped in co-sourcing activities is limited....... We present a case study of how the co-sourcing relationship between a certified CMMI-level 5 Danish software company and an offshoring supplier can be conceptualized as an Abstract System. An Abstract System is a dis-embedded social system (such as banking) that is trusted despite lack of detailed...... understanding or personal trust relations. The paper suggests how certain work practices among developers and managers can be explained using a dynamic trust lens based on Abstract Systems, especially dis- and re-embedding mechanisms...

  14. 14 CFR 47.8 - Voting trusts.

    Science.gov (United States)

    2010-01-01

    ... prospective beneficiary, creditor, debtor, supplier or contractor of any other party to the trust agreement; (iv) That each voting trustee is not aware of any reason, situation, or relationship under which any...

  15. Disentangling cancer patients' trust in their oncologist: a qualitative study

    NARCIS (Netherlands)

    Hillen, Marij A.; Onderwater, Astrid T.; van Zwieten, Myra C. B.; de Haes, Hanneke C. J. M.; Smets, Ellen M. A.

    2012-01-01

    Objective: Patients' trust in their physician is crucial for an optimal treatment. Yet, among oncology patients, for whom trust might be especially important, research into trust is limited. A qualitative interview study was carried out to investigate (1) to what extent aspects of trust important to

  16. Cultural identity and patient trust among older American Indians.

    Science.gov (United States)

    Simonds, Vanessa W; Goins, R Turner; Krantz, Elizabeth M; Garroutte, Eva Marie

    2014-03-01

    Patients' trust in healthcare providers and institutions has been identified as a likely contributor to racial-ethnic health disparities. The likely influence of patients' cultural characteristics on trust is widely acknowledged but inadequately explored. To compare levels of patients' trust in primary care provider (interpersonal trust) with trust in healthcare organizations (institutional trust) among older American Indians (AIs), and determine associations with cultural identity. Patient survey administered following primary care visits. Two-hundred and nineteen American Indian patients ≥ 50 years receiving care for a non-acute condition at two clinics operated by the Cherokee Nation in northeastern Oklahoma. Self-reported sociodemographic and cultural characteristics. Trust was measured using three questions about interpersonal trust and one measure of institutional trust; responses ranged from strongly agree to strongly disagree. Finding substantial variation only in institutional trust, we used logistic generalized estimating equations to examine relationships of patient cultural identity with institutional trust. Ninety-five percent of patients reported trusting their individual provider, while only 46 % reported trusting their healthcare institution. Patients who strongly self-identified with an AI cultural identity had significantly lower institutional trust compared to those self-identifying less strongly (OR: 0.6, 95 % CI: 0.4, 0.9). Interpersonal and institutional trust represent distinct dimensions of patients' experience of care that may show important relationships to patients' cultural characteristics. Strategies for addressing low institutional trust may have special relevance for patients who identify strongly with AI culture.

  17. Teacher Trust in District Administration: A Promising Line of Inquiry

    Science.gov (United States)

    Adams, Curt M.; Miskell, Ryan C.

    2016-01-01

    Purpose: We set out in this study to establish a foundation for a line of inquiry around teacher trust in district administration by (1) describing the role of trust in capacity building, (2) conceptualizing trust in district administration, (3) developing a scale to measure teacher trust in district administration, and (4) testing the…

  18. Trust Matters: Leadership for Successful Schools, 2nd Edition

    Science.gov (United States)

    Tschannen-Moran, Megan

    2014-01-01

    Make your school soar by escalating trust between teachers, students, and families. Trust is an essential element in all healthy relationships, and the relationships that exist in your school are no different. How can your school leaders or teachers cultivate trust? How can your institution maintain trust once it is established? These are the…

  19. 24 CFR 92.500 - The HOME Investment Trust Fund.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false The HOME Investment Trust Fund. 92... Investment Trust Fund. (a) General. A HOME Investment Trust Fund consists of the accounts described in this... Investment Trust Fund United States Treasury account for each participating jurisdiction. Each participating...

  20. 26 CFR 1.664-2 - Charitable remainder annuity trust.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 8 2010-04-01 2010-04-01 false Charitable remainder annuity trust. 1.664-2... TAX (CONTINUED) INCOME TAXES Estates and Trusts Which May Accumulate Income Or Which Distribute Corpus § 1.664-2 Charitable remainder annuity trust. (a) Description. A charitable remainder annuity trust is...