WorldWideScience

Sample records for subenergy tunneling trust

  1. Singularities in four-body final-state amplitudes

    International Nuclear Information System (INIS)

    Adhikari, S.K.

    1978-01-01

    Like three-body amplitudes, four-body amplitudes have subenergy threshold singularities over and above total-energy singularities. In the four-body problem we encounter a new type of subenergy singularity besides the usual two- and three-body subenergy threshold singularities. This singularity will be referred to as ''independent-pair threshold singularity'' and involves pair-subenergy threshold singularities in each of the two independent pair subenergies in four-body final states. We also study the particularly interesting case of resonant two- and three-body interactions in the four-body isobar model and the rapid (singular) dependence of the isobar amplitudes they generate in the four-body phase space. All these singularities are analyzed in the multiple-scattering formalism and it is shown that they arise from the ''next-to-last'' rescattering and hence may be represented correctly by an approximate amplitude which has that rescattering

  2. Spin-filtering effect and proximity effect in normal metal/ferromagnetic insulator/normal metal/superconductor junctions

    International Nuclear Information System (INIS)

    Li Hong; Yang Wei; Yang Xinjian; Qin Minghui; Xu Yihong

    2007-01-01

    Taking into account the thickness of the ferromagnetic insulator (FI), the spin-filtering effect and proximity effect in normal metal/ferromagnetic insulator/normal metal/superconductor (NM/FI/NM/SC) junctions are studied based on an extended Blonder-Tinkham-Klapwijk (BTK) theory. It is shown that a spin-dependent energy shift during the tunneling process induces splitting of the sub-energy gap conductance peaks and the spin polarization in the ferromagnetic insulator causes an imbalance of the peak heights. Different from the ferromagnet the spin-filtering effect of the FI cannot cause the reversion of the normalized conductance in NM/FI/NM/SC junctions

  3. Trust Trust Me (The Additivity)

    OpenAIRE

    Mano , Ken; Sakurada , Hideki; Tsukada , Yasuyuki

    2017-01-01

    Part 4: Trust Metrics; International audience; We present a mathematical formulation of a trust metric using a quality and quantity pair. Under a certain assumption, we regard trust as an additive value and define the soundness of a trust computation as not to exceed the total sum. Moreover, we point out the importance of not only soundness of each computed trust but also the stability of the trust computation procedure against changes in trust value assignment. In this setting, we define tru...

  4. Trusting the state, trusting each other?

    DEFF Research Database (Denmark)

    Sønderskov, Kim Mannemar; Dinesen, Peter Thisted

    2016-01-01

    Trust in state institutions is a prominent explanation of social trust. However, previous—mainly cross-sectional—analyses provide limited causal evidence regarding the relationship between institutional trust and social trust and it is thus essentially unknown whether an observed relationship...... reflects reverse causality (social trust forming institutional trust), or both forms of trust reflecting deep-seated dispositions (common confounding). Against the backdrop of the shortcomings of previous cross-sectional analyses, this paper utilizes two Danish panel surveys containing measures of both...... types of trust for the same individuals surveyed at multiple points in time over a long time-span (up to 18 years) to address the potentially reverse and/or spurious relationship. Using individual fixed effects and cross-lagged panel models, the results provide strong evidence of trust in state...

  5. Do you trust? Whom do you trust? When do you trust?

    NARCIS (Netherlands)

    Snijders, C.C.P.; Keren, G.; Thye, S.R.; Lawler, E.J.; Macy, M.W.; Walker, H.A.

    2001-01-01

    We try to provide a broader view on the factors that infiuence the decision to trust and honor trust. Using the "Trust Game" as our experimental paradigm, we consider three classes offactors that may he related to trust issues. The first one considers individual differences with regard to the

  6. Experimental study on the location of energy windows for scatter correction by the TEW method in 201Tl imaging

    International Nuclear Information System (INIS)

    Kojima, Akihiro; Matsumoto, Masanori; Ohyama, Yoichi; Tomiguchi, Seiji; Kira, Mitsuko; Takahashi, Mutsumasa.

    1997-01-01

    To investigate validity of scatter correction by the TEW method in 201 Tl imaging, we performed an experimental study using the gamma camera with the capability to perform the TEW method and a plate source with a defect. Images were acquired with the triple energy window which is recommended by the gamma camera manufacturer. The result of the energy spectrum showed that backscattered photons were included within the lower sub-energy window and main energy window, and the spectral shapes in the upper half region of the photopeak (70 keV) were not changed greatly by the source shape and the thickness of scattering materials. The scatter fraction calculated using energy spectra and, visual observation and the contrast values measured at the defect using planar images also showed that substantial primary photons were included in the upper sub-energy window. In TEW method (for scatter correction), two sub-energy windows are expected to be defined on the part of energy region in which total counts mainly consist of scattered photons. Therefore, it is necessary to investigate the use of the upper sub-energy window on scatter correction by the TEW method in 201 Tl imaging. (author)

  7. Tunnel magnetoresistance in alumina, magnesia and composite tunnel barrier magnetic tunnel junctions

    International Nuclear Information System (INIS)

    Schebaum, Oliver; Drewello, Volker; Auge, Alexander; Reiss, Guenter; Muenzenberg, Markus; Schuhmann, Henning; Seibt, Michael; Thomas, Andy

    2011-01-01

    Using magnetron sputtering, we have prepared Co-Fe-B/tunnel barrier/Co-Fe-B magnetic tunnel junctions with tunnel barriers consisting of alumina, magnesia, and magnesia-alumina bilayer systems. The highest tunnel magnetoresistance ratios we found were 73% for alumina and 323% for magnesia-based tunnel junctions. Additionally, tunnel junctions with a unified layer stack were prepared for the three different barriers. In these systems, the tunnel magnetoresistance ratios at optimum annealing temperatures were found to be 65% for alumina, 173% for magnesia, and 78% for the composite tunnel barriers. The similar tunnel magnetoresistance ratios of the tunnel junctions containing alumina provide evidence that coherent tunneling is suppressed by the alumina layer in the composite tunnel barrier. - Research highlights: → Transport properties of Co-Fe-B/tunnel barrier/Co-Fe-B magnetic tunnel junctions. → Tunnel barrier consists of MgO, Al-Ox, or MgO/Al-Ox bilayer systems. → Limitation of TMR-ratio in composite barrier tunnel junctions to Al-Ox values. → Limitation indicates that Al-Ox layer is causing incoherent tunneling.

  8. Measuring Trust

    OpenAIRE

    Glaeser, Edward Ludwig; Laibson, David I.; Scheinkman, Jose A.; Soutter, Christine L.

    2000-01-01

    We combine two experiments and a survey to measure trust and trustworthiness—two key components of social capital. Standard attitudinal survey questions about trust predict trustworthy behavior in our experiments much better than they predict trusting behavior. Trusting behavior in the experiments is predicted by past trusting behavior outside of the experiments. When individuals are closer socially, both trust and trustworthiness rise. Trustworthiness declines when partners are of differen...

  9. Trust

    OpenAIRE

    Fojtů, Dominik

    2015-01-01

    This rigorous thesis is focused on a status of trust in an application practise in a Czech legislation with a context of historical aspects of institutes similar to trusts as well as actual legislation. The thesis includes also analyses of more difficult provisions concerning the trust, including economic impacts representing accounting and tax consequences. Also comparison with established modifications trusts in Europe and their possible utilization of the Czech point of view of the settlor...

  10. Trust

    OpenAIRE

    Söllner, Matthias; Benbasat, Izak; Gefen, David; Leimeister, Jan Marco; Pavlou, Paul A.

    2016-01-01

    Trust is the enabler of social interaction. Although the origins of research on trust traditionally lie outside the Information Systems (IS) domain, the importance of trust for IS research rapidly grew in the late 1990s, and it is still growing with the increasing ubiquity and advancement of technology in organizations, virtual teams, online markets, and user-technology interactions. Theoretically, the central role of trust is tied to the growing social change that Information and Communicati...

  11. The Beginner's Guide to Wind Tunnels with TunnelSim and TunnelSys

    Science.gov (United States)

    Benson, Thomas J.; Galica, Carol A.; Vila, Anthony J.

    2010-01-01

    The Beginner's Guide to Wind Tunnels is a Web-based, on-line textbook that explains and demonstrates the history, physics, and mathematics involved with wind tunnels and wind tunnel testing. The Web site contains several interactive computer programs to demonstrate scientific principles. TunnelSim is an interactive, educational computer program that demonstrates basic wind tunnel design and operation. TunnelSim is a Java (Sun Microsystems Inc.) applet that solves the continuity and Bernoulli equations to determine the velocity and pressure throughout a tunnel design. TunnelSys is a group of Java applications that mimic wind tunnel testing techniques. Using TunnelSys, a team of students designs, tests, and post-processes the data for a virtual, low speed, and aircraft wing.

  12. 'Trust my doctor, trust my pancreas': trust as an emergent quality of social practice.

    Science.gov (United States)

    Cohn, Simon

    2015-06-11

    Growing attention is being paid to the importance of trust, and its corollaries such as mistrust and distrust, in health service and the central place they have in assessments of quality of care. Although initially focussing on doctor-patient relationships, more recent literature has broadened its remit to include trust held in more abstract entities, such as organisations and institutions. There has consequently been growing interest to develop rigorous and universal measures of trust. Drawing on illustrative ethnographic material from observational research in a UK diabetes clinic, this paper supports an approach that foregrounds social practice and resists conceiving trust as solely a psychological state that can be divorced from its context. Beyond exploring the less-than-conscious nature of trust, the interpretations attend to the extent to which trust practices are distributed across a range of actors. Data from clinical encounters reveal the extent to which matters of trust can emerge from the relationships between people, and sometimes people and things, as a result of a wide range of pragmatic concerns, and hence can usefully be conceived of as an extended property of a situation rather than a person. Trust is rarely explicitly articulated, but remains a subtle feature of experience that is frequently ineffable. A practice approach highlights some of the problems with adopting a general psychological or intellectualist conception of trust. In particular, assuming it is a sufficiently stable internal state that can be stored or measured not only transforms a diffuse and often ephemeral quality into a durable thing, but ultimately presents it as a generic state that has meaning independent of the specific relationships and context that achieve it. Emphasising the context-specific nature of trust practices does not dismiss the potential of matters of trust, when they emerge, to be transposed to other contexts. But it does highlight how, on each occasion

  13. TrustBuilder2: A Reconfigurable Framework for Trust Negotiation

    Science.gov (United States)

    Lee, Adam J.; Winslett, Marianne; Perano, Kenneth J.

    To date, research in trust negotiation has focused mainly on the theoretical aspects of the trust negotiation process, and the development of proof of concept implementations. These theoretical works and proofs of concept have been quite successful from a research perspective, and thus researchers must now begin to address the systems constraints that act as barriers to the deployment of these systems. To this end, we present TrustBuilder2, a fully-configurable and extensible framework for prototyping and evaluating trust negotiation systems. TrustBuilder2 leverages a plug-in based architecture, extensible data type hierarchy, and flexible communication protocol to provide a framework within which numerous trust negotiation protocols and system configurations can be quantitatively analyzed. In this paper, we discuss the design and implementation of TrustBuilder2, study its performance, examine the costs associated with flexible authorization systems, and leverage this knowledge to identify potential topics for future research, as well as a novel method for attacking trust negotiation systems.

  14. Quantifying and Qualifying Trust: Spectral Decomposition of Trust Networks

    NARCIS (Netherlands)

    Pavlovic, Dusko; Degano, Pierpaolo; Etalle, Sandro; Guttman, Joshua

    In a previous FAST paper, I presented a quantitative model of the process of trust building, and showed that trust is accumulated like wealth: the rich get richer. This explained the pervasive phenomenon of adverse selection of trust certificates, as well as the fragility of trust networks in

  15. Rethinking trust.

    Science.gov (United States)

    Kramer, Roderick M

    2009-06-01

    Will we ever learn? We'd barely recovered from Enron and WorldCom before we faced the subprime mortgage meltdown and more scandals that shook our trust in businesspeople. Which raises the question: Do we trust too much? In this article, Stanford professor and social psychologist Kramer explores the reasons we trust so easily--and, often, so unwisely. He explains that genetics and childhood learning make us predisposed to trust and that it's been a good survival mechanism. That said, our willingness to trust makes us vulnerable. Our sense of trust kicks in on remarkably simple cues, such as when people look like us or are part of our social group. We also rely on third parties to verify the character of others, sometimes to our detriment (as the victims of Bernard Madoff learned). Add in our illusions of invulnerability and our tendencies to see what we want to see and to overestimate our own judgment, and the bottom line is that we're often easily fooled. We need to develop tempered trust. For those who trust too much, that means reading cues better; for the distrustful, it means developing more receptive behaviors. Everyone should start with small acts of trust that encourage reciprocity and build up. Having a hedge against potential abuses also helps. Hollywood scriptwriters, for instance, register their treatments with the Writers Guild of America to prevent their ideas from being stolen by the executives they pitch. To attract the right relationships, people must strongly signal their own honesty, proactively allay concerns, and, if their trust is abused, retaliate. Trusting individuals in certain roles, which essentially means trusting the system that selects and trains them, also works but isn't foolproof. And don't count on due diligence alone for protection; constant vigilance is needed to make sure the landscape hasn't changed.

  16. 26 CFR 26.2654-1 - Certain trusts treated as separate trusts.

    Science.gov (United States)

    2010-04-01

    ... trusts under local law, treatment of a single trust as separate trusts under this paragraph (a)(1) does... applicable state law, then each resulting trust is treated as a separate trust for purposes of Chapter 13... Internal Revenue Code, if those portions are not treated as separate trusts under local law. Also...

  17. The Need to Trust and to Trust More Wisely in Academe

    Science.gov (United States)

    Bowman, Richard F.

    2012-01-01

    Where trust is an issue, there is no trust. Trust in diverse organizations has never been lower. A shadow of doubt stalks one's every decision to trust collegially and institutionally. Still, colleagues sense intuitively that institutions cannot function optimally without a bedrock level of trust. In academic life, trust is a form of social…

  18. Trust in automation: integrating empirical evidence on factors that influence trust.

    Science.gov (United States)

    Hoff, Kevin Anthony; Bashir, Masooda

    2015-05-01

    We systematically review recent empirical research on factors that influence trust in automation to present a three-layered trust model that synthesizes existing knowledge. Much of the existing research on factors that guide human-automation interaction is centered around trust, a variable that often determines the willingness of human operators to rely on automation. Studies have utilized a variety of different automated systems in diverse experimental paradigms to identify factors that impact operators' trust. We performed a systematic review of empirical research on trust in automation from January 2002 to June 2013. Papers were deemed eligible only if they reported the results of a human-subjects experiment in which humans interacted with an automated system in order to achieve a goal. Additionally, a relationship between trust (or a trust-related behavior) and another variable had to be measured. All together, 101 total papers, containing 127 eligible studies, were included in the review. Our analysis revealed three layers of variability in human-automation trust (dispositional trust, situational trust, and learned trust), which we organize into a model. We propose design recommendations for creating trustworthy automation and identify environmental conditions that can affect the strength of the relationship between trust and reliance. Future research directions are also discussed for each layer of trust. Our three-layered trust model provides a new lens for conceptualizing the variability of trust in automation. Its structure can be applied to help guide future research and develop training interventions and design procedures that encourage appropriate trust. © 2014, Human Factors and Ergonomics Society.

  19. Calculativeness and trust

    DEFF Research Database (Denmark)

    Frederiksen, Morten

    2014-01-01

    Williamson’s characterisation of calculativeness as inimical to trust contradicts most sociological trust research. However, a similar argument is found within trust phenomenology. This paper re-investigates Williamson’s argument from the perspective of Løgstrup’s phenomenological theory of trust....... Contrary to Williamson, however, Løgstrup’s contention is that trust, not calculativeness, is the default attitude and only when suspicion is awoken does trust falter. The paper argues that while Williamson’s distinction between calculativeness and trust is supported by phenomenology, the analysis needs...... to take actual subjective experience into consideration. It points out that, first, Løgstrup places trust alongside calculativeness as a different mode of engaging in social interaction, rather conceiving of trust as a state or the outcome of a decision-making process. Secondly, the analysis must take...

  20. Banking system trust, bank trust, and bank loyalty

    NARCIS (Netherlands)

    van Esterik-Plasmeijer, P.; van Raaij, W.F.

    2017-01-01

    Purpose The purpose of this paper is to test a model of banking system trust as an antecedent of bank trust and bank loyalty. Six determinants of trust and loyalty are included: competence, stability, integrity, customer orientation, transparency, and value congruence. The study provides insights

  1. Trust and Leadership

    DEFF Research Database (Denmark)

    Bordum, Anders

    2005-01-01

    The concept and phenomenon of trust and its relation to leadership has recently come into focus. What role does trust play? Can trust be created strategically? Questions like these are often raised. How we conceive of and conceptualize trust is not as often discussed. Among those conceptualizations...... flexibility of form for example, the idea that one with leadership tools can consciously bring forth trust. In the conclusion, the question about trust communication is addressed. In this section I argue that trust is positively value-laden, becausesincerity is a functional and pragmatic condition...

  2. Dimensions of trust

    DEFF Research Database (Denmark)

    Frederiksen, Morten

    2012-01-01

    Georg Simmel is the seminal author on trust within sociology, but though inspired by Simmel, subsequent studies of intersubjective trust have failed to address Simmel’s suggestion that trust is as differentiated as the social relations of which it is part. Rather, trust has been studied within...... limited sets of exchange or work relations. This article revisits Simmel’s concept of trust as social form in order to investigate this differentiation. From an interview study, the differentiation and limits of trust are analysed within different types of social relations. Trust is found to vary greatly...... in scope and mode influenced by the intersecting dimensions of relations, objects and situations. Furthermore, trust exists between an outer threshold of expected deceit and an inner threshold of confident reliance. The findings from the qualitative study contribute new knowledge on the diversity of trust...

  3. Exploring the Change from Low-Trust to High-Trust Organizations

    DEFF Research Database (Denmark)

    Jagd, Søren

    what the notion of high-trust organization actually means, and that the change process in the direction of high trust organizations involves not only a quantitative growth in trust, but may involve important qualitative changes in the organization, especially concerning the relations between management......A growing body of literature point to the increasing importance of trust for organizations and for the explicit use of trust as a management tool. The explicit or implicit message in both management literature and research literature on trust as a management tool is that managers should pursue...... projects of personal and organizational change leading to high-trust organizations. In this paper I explore how we may understand this change towards high-trust organizations: What does it mean, what is the content of such a change, and what may be the consequences. I show that it is still rather unclear...

  4. Learning to Trust

    NARCIS (Netherlands)

    Nooteboom, B.

    2005-01-01

    Trust is full of puzzle and paradox.Trust is both rational and emotional. Trust can go beyond calculative self-interest, but has its limits.People may want to trust, while they may also feel threatened by it.If trust is not in place prior to a relationship, on the basis of institutions, prior

  5. Adequate trust avails, mistaken trust matters: on the moral responsibility of doctors as proxies for patients' trust in biobank research.

    Science.gov (United States)

    Johnsson, Linus; Helgesson, Gert; Hansson, Mats G; Eriksson, Stefan

    2013-11-01

    In Sweden, most patients are recruited into biobank research by non-researcher doctors. Patients' trust in doctors may therefore be important to their willingness to participate. We suggest a model of trust that makes sense of such transitions of trust between domains and distinguishes adequate trust from mistaken trust. The unique position of doctors implies, we argue, a Kantian imperfect duty to compensate for patients' mistaken trust. There are at least three kinds of mistaken trust, each of which requires a different set of countermeasures. First, trust is mistaken when necessary competence is lacking; the competence must be developed or the illusion dispelled. Second, trust is irrational whenever the patient is mistaken about his actual reasons for trusting. Care must therefore be taken to support the patient's reasoning and moral agency. Third, some patients inappropriately trust doctors to recommend only research that will benefit them directly. Such trust should be counteracted by nurturing a culture where patients expect to be asked occasionally to contribute to the common good. © 2012 John Wiley & Sons Ltd.

  6. Can we trust robots?

    NARCIS (Netherlands)

    Coeckelbergh, Mark

    2011-01-01

    Can we trust robots? Responding to the literature on trust and e-trust, this paper asks if the question of trust is applicable to robots, discusses different approaches to trust, and analyses some preconditions for trust. In the course of the paper a phenomenological-social approach to trust is

  7. From the general to the specific: How social trust motivates relational trust.

    Science.gov (United States)

    Robbins, Blaine G

    2016-01-01

    When people form beliefs about the trustworthiness of others with respect to particular matters (i.e., when individuals trust), theory suggests that they rely on preexistent cognitive schemas regarding the general cooperativeness of individuals and organizations (i.e., social trust). In spite of prior work, the impact of social trust on relational trust-or what Russell Hardin (2002) calls trust as a three-part relation where actor A trusts actor B with reference to matter Y-is not well established. Four vignette experiments were administered to Amazon.com Mechanical Turk workers (N = 1388 and N = 1419) and to public university undergraduate students (N = 995 and N = 956) in order to investigate the relationship between social trust and relational trust. Measures of general social trust and particular social trust produced statistically equivalent effects that were positively associated with relational trust. Political trust, however, was statistically unrelated to relational trust. These results support the idea that people rely on schemas and stereotypes concerned with the general cooperativeness and helpfulness of others when forming beliefs about another person's trustworthiness with respect to a particular matter at hand. Copyright © 2015 Elsevier Inc. All rights reserved.

  8. Tunneling technologies for the collider ring tunnels

    International Nuclear Information System (INIS)

    Frobenius, P.

    1989-01-01

    The Texas site chosen for the Superconducting Super Collider has been studied, and it has been determined that proven, conventional technology and accepted engineering practice are suitable for constructing the collider tunnels. The Texas National Research Laboratory Commission report recommended that two types of tunneling machines be used for construction of the tunnels: a conventional hard rock tunnel boring machine (TBM) for the Austin chalk and a double shielded, rotary TBM for the Taylor marl. Since the tunneling machines usually set the pace for the project, efficient planning, operation, and coordination of the tunneling system components will be critical to the schedule and cost of the project. During design, tunneling rate prediction should be refined by focusing on the development of an effective tunneling system and evaluating its capacity to meet or exceed the required schedules. 8 refs., 13 figs

  9. To Trust or Not to Trust? What Drives Public Trust in Science in Social Media Engagement

    Science.gov (United States)

    Hwong, Y. L.; Oliver, C.; Van Kranendonk, M. J.

    2017-12-01

    The erosion of public trust in science is a serious concern today. This climate of distrust has real consequences, from the anti-vaccination movement to climate change denials. The age of social media promises opportunities for improved interactivity between scientists and the public, which experts hope will help improve public confidence in science. However, evidence linking social media engagement and public attitude towards science is scarce. Our study aimed to help fill this gap. We examined Twitter engagement and its impact on public trust in science, focusing on two related science issues: space science and climate change. Our datasets comprised of 10,000 randomly sampled tweets over a month's period in 2016. We used human annotation and machine learning to analyse the tweets. Results revealed the level of distrust was significantly higher in the climate change tweets. However, in the climate change network, people who engaged with science personalities trust science more than those who did not. This difference in trust levels was not present in the space science network. There the two clusters of people displayed similar levels of trust in science. Additionally, we used machine learning to predict the trust labels of tweets and conducted feature analysis to find the properties of trust-inspiring tweets. Our supervised learning algorithm was able to predict trust in science in our sample tweets with 84% accuracy. The strongest predictors of trust in science (as conveyed by tweets) were similarity, presence of URL and authenticity. Contrast this with the findings of our previous study investigating the features of highly engaging space science related social media messages, authenticity is the only feature that also inspires trust. This indicates that what works to promote engagement (e.g. `retweets', `Likes') does not necessarily build trust in science. Social media science communication is not as simple as `we engage, therefore they trust'. We suggest that

  10. The Effects of Trust Transference, Mobile Attributes and Enjoyment on Mobile Trust

    Directory of Open Access Journals (Sweden)

    Cristiane Junqueira Giovannini

    2015-01-01

    Full Text Available Trust is essential in building relationships. In mobile commerce, as in electronic commerce, trust is even more valuable given the absence of human contact and direct observation of the service provider. Despite the importance of trust for mobile commerce, there has been little academic effort to study the relationships between mobile devices unique components of interactivity and customer trust, or the relationship between offline, online and mobile trust. This study proposes a trust-mediated model for customer attitude and transaction intentions in mobile commerce contexts that incorporates trust transference and unique factors present in mobile commerce. Data were collected in an online survey and analyzed via structural equations modeling. Results suggest that trust transferred from online contexts and ease of use have significant effects on mobile trust formation, while also indicating that mobile trust influences consumers’ attitudes and intentions to purchase using mobile devices.

  11. Looking for Trust

    DEFF Research Database (Denmark)

    Bøge, Ask Risom; Lauritsen, Peter

    Trust and surveillance are often seen as opposites. Trust is regularly characterized as the glue that holds society together, while surveillance is seen as corrosive. However, in Scandinavia high levels of trust and surveillance coexist. It is therefore interesting to investigate...... if there is a connection between these phenomena and ask what is the role of trust in the spread of surveillance in Scandinavia? The aim of this paper is: 1) to investigate the role of trust in the history of the Danish DNA database and 2) to experiment with Actor-Network-Theory (ANT) as an ap-proach in studies of trust....

  12. Interpersonal Trust across Six Asia-Pacific Countries: Testing and Extending the ‘High Trust Society’ and ‘Low Trust Society’ Theory

    Science.gov (United States)

    Ward, Paul R.; Mamerow, Loreen; Meyer, Samantha B.

    2014-01-01

    Background Trust is regarded as a necessary component for the smooth running of society, although societal and political modernising processes have been linked to an increase in mistrust, potentially signalling social and economic problems. Fukuyama developed the notion of ‘high trust’ and ‘low trust’ societies, as a way of understanding trust within different societies. The purpose of this paper is to empirically test and extend Fukuyama’s theory utilising data on interpersonal trust in Taiwan, Hong Kong, South Korea, Japan, Australia and Thailand. This paper focuses on trust in family, neighbours, strangers, foreigners and people with a different religion. Methods Cross-sectional surveys were undertaken in 2009–10, with an overall sample of 6331. Analyses of differences in overall levels of trust between countries were undertaken using Chi square analyses. Multivariate binomial logistic regression analysis was undertaken to identify socio-demographic predictors of trust in each country. Results Our data indicate a tripartite trust model: ‘high trust’ in Australia and Hong Kong; ‘medium trust’ in Japan and Taiwan; and ‘low trust’ in South Korea and Thailand. Trust in family and neighbours were very high across all countries, although trust in people with a different religion, trust in strangers and trust in foreigners varied considerably between countries. The regression models found a consistent group of subpopulations with low trust across the countries: people on low incomes, younger people and people with poor self-rated health. The results were conflicting for gender: females had lower trust in Thailand and Hong Kong, although in Australia, males had lower trust in strangers, whereas females had lower trust in foreigners. Conclusion This paper identifies high, medium and low trust societies, in addition to high and low trusting population subgroups. Our analyses extend the seminal work of Fukuyama, providing both corroboration and

  13. Balancing Trust and Control

    DEFF Research Database (Denmark)

    Jagd, Søren

    This paper focuses on the leadership challenge of balancing trust and control. The relation between trust and control has for a long time been a puzzling issue for management researchers. In the paper I first show that there has been a dramatic change in the way the relation between trust...... and control has been conceptualized in trust research. While the relation between trust and control earlier was conceptualized as a more or less stable balance between trust and control, more recent research conceptualizes the relation between trust and control more as a dynamical process that involves...... an ongoing process of balancing the relation between trust and control. Second, taking the departure in the recent conceptualization of the balance between trust and control as an interactive process I discuss the challenges for management in handling this more subtle balancing of trust and control...

  14. Public Trust in Health Information Sharing: A Measure of System Trust.

    Science.gov (United States)

    Platt, Jodyn E; Jacobson, Peter D; Kardia, Sharon L R

    2018-04-01

    To measure public trust in a health information sharing in a broadly defined health system (system trust), inclusive of health care, public health, and research; to identify individual characteristics that predict system trust; and to consider these findings in the context of national health initiatives (e.g., learning health systems and precision medicine) that will expand the scope of data sharing. Survey data (n = 1,011) were collected in February 2014. We constructed a composite index of four dimensions of system trust-competency, fidelity, integrity, and trustworthiness. The index was used in linear regression evaluating demographic and psychosocial predictors of system trust. Data were collected by GfK Custom using a nationally representative sample and analyzed in Stata 13.0. Our findings suggest the public's trust may not meet the needs of health systems as they enter an era of expanded data sharing. We found that a majority of the U.S. public does not trust the organizations that have health information and share it (i.e., the health system) in one or more dimensions. Together, demographic and psychosocial factors accounted for ~18 percent of the observed variability in system trust. Future research should consider additional predictors of system trust such as knowledge, attitudes, and beliefs to inform policies and practices for health data sharing. © Health Research and Educational Trust.

  15. Dimensionality of trust: An analysis of the relations between propensity, trustworthiness and trust

    Directory of Open Access Journals (Sweden)

    Marita Heyns

    2015-05-01

    Research purpose: This study examined the dynamic interplay between trust propensity, trustworthiness beliefs and the decision to trust, as perceived within dyadic workplace relationships. Motivation for the study: No studies, as far as the authors are aware, have ever attempted to use a combination of Mayer and Davis’s well-known assessment of trustworthiness and Gillespie’s measure of behavioural trust within the same study. By including measures of main antecedents and the actual decision to trust in the same study, the multidimensionality of trust can be established more concretely. Research approach, design and method: A cross-sectional survey design with a convenience sample (N = 539 was used. The Behavioural Trust Inventory and the Organisational Trust Instrument were administered. Main findings: Results confirmed the distinctness of propensity, trustworthiness and trust as separate main constructs. Trust was strongly associated with trustworthiness beliefs. Trustworthiness beliefs fully mediated the relationship between propensity and trust. The observed relations between propensity and trustworthiness suggest that individuals with a natural predisposition to trust others will be more inclined to perceive a specific trust referent as trustworthy. Practical/managerial implications: Leaders should realise that their attitudes and behaviour have a decisive impact on trust formation processes: if they are being perceived as trustworthy, followers will be likely to respond by engaging in trusting behaviours towards them. Tools to assess followers’ perceptions of the trustworthiness of the leader may provide useful feedback that can guide leaders. Contribution/value-add: This study contributes to scientific knowledge regarding the influence of propensity to trust and trustworthiness on trust of leaders.

  16. Online trust building through third party trust transfer and third party protection

    Science.gov (United States)

    Wandoko, Wanda; Saleh Abbas, Bahtiar; Budiastuti, Dyah; Kosala, Raymond

    2017-03-01

    The primary objective of this research is to develop an online trust building mechanism for SME (Small Medium Enterprise). Trust is very important in e-commerce. The nature of online shopping has a greater uncertainty than offline shopping. Seeing as there is an uncertainty that can produce risks, a prospective buyer’s trust is needed. A lot of people’s unwillingness to shop online is caused by their lack of trust toward e-commerce. E-commerce is said to be one of the ways for SME to compete with bigger companies. However, building trust requires immense time and cost. SME with limited resources may experience difficulties in building trust just with their own resources. Base on literature research that needs to be validated in next research, we found that trust can be built through trust transfer from the reputable and well-known trust-mark issuer, and third party protection such as escrow account service and credit card issuer.

  17. [Crises of trust].

    Science.gov (United States)

    Chen, Thai-Form; Tseng, Hsing-Chau

    2006-02-01

    Extensive media coverage is warning of a crisis of trust that has emerged as a serious issue in our society. This article explores the meaning of "crisis," concepts of crisis management, mechanisms for building trust, and the underlying significance of trust and distrust. Evidence is adduced to testify to the erosion of trust and factors in our society that reflect the potential for crises of trust. Organizational decision makers, including hospital managers, are urged to identify and reflect upon weaknesses in their organizations in order that remedial action can be taken to preempt such crises.

  18. Trust makers, breakers and brokers: building trust in the Australian food system

    OpenAIRE

    Wilson, Annabelle; Coveney, John; Henderson, Julie; Meyer, Samantha; Calnan, Michael; Caraher, Martin; Webb, Trevor; Elliott, Anthony; Ward, Paul

    2013-01-01

    Background The importance of consumer trust in the food supply has previously been identified, and dimensions of consumer trust in food?who they trust and the type of trust that they exhibit?has been explored. However, there is a lack of research about the mechanisms through which consumer trust in the food supply is developed, maintained, broken and repaired. This study seeks to address this gap by exploring if, and how, consumer trust in the food supply is considered by the media, food indu...

  19. Social trust, interpersonal trust and self-rated health in China: a multi-level study.

    Science.gov (United States)

    Feng, Zhixin; Vlachantoni, Athina; Liu, Xiaoting; Jones, Kelvyn

    2016-11-08

    Trust is important for health at both the individual and societal level. Previous research using Western concepts of trust has shown that a high level of trust in society can positively affect individuals' health; however, it has been found that the concepts and culture of trust in China are different from those in Western countries and research on the relationship between trust and health in China is scarce. The analyses use data from the national scale China General Social Survey (CGSS) on adults aged above 18 in 2005 and 2010. Two concepts of trust ("out-group" and "in-group" trust) are used to examine the relationship between trust and self-rated health in China. Multilevel logistical models are applied, examining the trust at the individual and societal level on individuals' self-rated health. In terms of interpersonal trust, both "out-group" and "in-group" trust are positively associated with good health in 2005 and 2010. At the societal level, the relationships between the two concepts of trust and health are different. In 2005, higher "out-group" social trust (derived from trust in strangers) is positively associated with better health; however, higher "in-group" social trust (derived from trust in most people) is negatively associated with good health in 2010. The cross-level interactions show that lower educated individuals (no education or only primary level), rural residents and those on lower incomes are the most affected groups in societies with higher "out-group" social trust; whereas people with lower levels of educational attainment, a lower income, and those who think that most people can be trusted are the most affected groups in societies with higher "in-group" social trust. High levels of interpersonal trust are of benefit to health. Higher "out-group" social trust is positively associated with better health; while higher "in-group" social trust is negatively associated with good health. Individuals with different levels of educational

  20. Emergent Trust and Work Life Relationships: How to Approach the Relational Moment of Trust

    Directory of Open Access Journals (Sweden)

    Tone Bergljot Eikeland

    2015-10-01

    Full Text Available How do we trust? What does the basic mechanism of trust look like? These questions define the starting point for a comparison of the classic ideas of how trust works by Mayer et al. (1995, Möllering’s (2006 re-adaption of Giddens’, Simmel’s, and James’ classic ideas of trust, and a phenomenological approach focusing on “emergent trust.” Introducing the concept of emergent trust, the idea is to suggest a phenomenological approach to studies of trust in work-life relationships in professional organizations, as an alternative to trust as a cognitive attitude, where trust becomes a stable, individual possession. The term “emergent” demonstrates a trust that emerges in meetings between persons, it has an immediate, unconditional quality, and shows itself in situations of life where there is a potential for trust to appear. Trust’s basic relationality makes the person morally responsible for the other. Trust appears between persons, as an event, constituting risk and uncertainty as a natural and positive part of our lives. Still, in larger social settings, the responsibility of trust also disperses on to the work itself, and our wider social networks.

  1. Trust and controlling

    OpenAIRE

    Bieńkowska Agnieszka; Zabłocka-Kluczka Anna

    2016-01-01

    The purpose of this study is to discuss the trust within and towards an organisation in the context of implementation of controlling therein. In this context the essence of trust and its importance in organisation management was presented, as well as trust in the contemporary management methods and concepts. Controlling as a trust-building factor inside an organisation was pointed out. Especially controlling and control were described. Moreover management by considering deviations in controll...

  2. Balancing Trust and Control

    DEFF Research Database (Denmark)

    Jagd, Søren

    2010-01-01

    of balancing trust and control becomes an issue that deserve ongoing attention. This paper adds to the discussion on the relation between trust and control by showing that the process perspective reframes the problem of balancing trust and control. More generally, by demonstrating the importance of the process......The purpose of this paper is to show that conceptualizing trust and control as interactively related processes, as opposed to more static conceptualizations of the two concepts and the relations between them, adds importantly towards understanding the challenges involved in balancing of trust...... on trust and control made the problem of finding a balance between trust and control a once and for all decision the process perspective introduced here implies that balancing trust and control is an ongoing process of balancing and rebalancing. The implication for management is that the problem...

  3. Trust and Society: Suggestions for Further Development of Niklas Luhmann's Theory of Trust.

    Science.gov (United States)

    Morgner, Christian

    2018-05-01

    This paper addresses an apparent gap in the work of Niklas Luhmann. While the issue of trust continues to receive widespread attention in the social sciences, Luhmann's interest in this topic declined following the development of his systems theory. It is argued that this decline does not reflect any diminished relevance of trust for systems theory, but rather that the architectural remodeling of theory cannot easily be applied to the issue of trust. Here, the issue of trust is reconceptualized as a connection medium. This entails a reconstruction of Luhmann's early theory of trust, especially with regard to function and social positioning. In this context, trust can in turn be linked to the concept of medium in Luhmann's late work. As a connection medium, trust mediates between the different levels of sociality-interaction, organization, and society. These theoretical considerations are employed to develop a more applied framework for empirical research, with a brief case study from southern Italy. From this perspective, the idea of trust as society's glue is seen to be overly simplistic. The common ethical understanding that more trust leads to a better society is also questioned on the grounds that social cooperation can also lead to social sclerosis. Finally, risk and trust are shown to accommodate the formation of different cultures of trust. The paper shows how Luhmann's updated version of trust can inspire current research and enhance our understanding of how trust operates in contemporary society. © 2018 Canadian Sociological Association/La Société canadienne de sociologie.

  4. Trust Management V

    DEFF Research Database (Denmark)

    2011-01-01

    from 42 submissions. The papers feature both theoretical research and real-world case studies from academia, business and government focusing on areas such as: trust models, social and behavioral aspects of trust, trust in networks, mobile systems and cloud computation, privacy, reputation systems...

  5. Trust and controlling

    Directory of Open Access Journals (Sweden)

    Bieńkowska Agnieszka

    2016-12-01

    Full Text Available The purpose of this study is to discuss the trust within and towards an organisation in the context of implementation of controlling therein. In this context the essence of trust and its importance in organisation management was presented, as well as trust in the contemporary management methods and concepts. Controlling as a trust-building factor inside an organisation was pointed out. Especially controlling and control were described. Moreover management by considering deviations in controlling and the teamwork in controlling were described. The role of controlling in process of trust-building to an organisation was presented. Establishing relations with the environment and systems of measurement of organisation’s achievements were presented, too.

  6. Trust in Scientific Publishing

    NARCIS (Netherlands)

    Hummels, Harry; Roosendaal, Hans E.

    2001-01-01

    Trust is an important phenomenon to reduce organisational complexity and uncertainty. In the literature many types of trust are distinguished. An important framework to understand the variety and development of trust in organisations is provided by Zucker. She distinguishes three types of trust:

  7. HMM-based Trust Model

    DEFF Research Database (Denmark)

    ElSalamouny, Ehab; Nielsen, Mogens; Sassone, Vladimiro

    2010-01-01

    Probabilistic trust has been adopted as an approach to taking security sensitive decisions in modern global computing environments. Existing probabilistic trust frameworks either assume fixed behaviour for the principals or incorporate the notion of ‘decay' as an ad hoc approach to cope...... with their dynamic behaviour. Using Hidden Markov Models (HMMs) for both modelling and approximating the behaviours of principals, we introduce the HMM-based trust model as a new approach to evaluating trust in systems exhibiting dynamic behaviour. This model avoids the fixed behaviour assumption which is considered...... the major limitation of existing Beta trust model. We show the consistency of the HMM-based trust model and contrast it against the well known Beta trust model with the decay principle in terms of the estimation precision....

  8. Overview of royalty trusts

    International Nuclear Information System (INIS)

    Panarites, P.

    1996-01-01

    The nature of royalty trusts as a means of financing exploration, development, production, and refining of oil sand and heavy oil to produce competitively marketable petroleum products, was reviewed. Attributes of the two distinct classes of royalty trusts - reflexive class and the fundamental class royalty trusts - and the considerations underlying each one, were summarized. The overall conclusion was that the future performance of conventional oil and gas royalty trusts (reflexive class) will depend heavily on interest rate levels and management's ability to complete acquisitions financed with new trust unit issues. Fundamental class royalty trusts also offer long term pure exposure to the underlying business, in addition to yield

  9. Trust makers, breakers and brokers: building trust in the Australian food system.

    Science.gov (United States)

    Wilson, Annabelle; Coveney, John; Henderson, Julie; Meyer, Samantha; Calnan, Michael; Caraher, Martin; Webb, Trevor; Elliott, Anthony; Ward, Paul

    2013-03-15

    The importance of consumer trust in the food supply has previously been identified, and dimensions of consumer trust in food-who they trust and the type of trust that they exhibit-has been explored. However, there is a lack of research about the mechanisms through which consumer trust in the food supply is developed, maintained, broken and repaired. This study seeks to address this gap by exploring if, and how, consumer trust in the food supply is considered by the media, food industry and governments when responding to food scares. The aim of the research is to develop models of trust building that can be implemented following food scares. Semi-structured interviews will be undertaken with media, public relations officials and policy makers in Australia, New Zealand and the United Kingdom. Participants will be recruited through purposive sampling and will be asked to discuss a hypothetical case study outlining a food incident, and any experiences of specific food scares. Models of trust development, maintenance and repair will be developed from interview data. Comment on these models will be sought from experts in food-related organizations through a Delphi study, where participants will be asked to consider the usefulness of the models. Participants' comments will be used to revise the models until consensus is reached on the suitability and usability of the models. This study will contribute to the literature about systems-based trust, and explore trust as a social and regulatory process. The protocol and results will be of interest and use to the food industry, food regulators, consumer advocate groups, media seeking to report food-related issues and policy makers concerned with public health and consumer health and well-being. This research represents an important contribution to the translation of the theoretical conceptualizations of trust into practical use in the context of food.

  10. Tunnel - history of

    International Nuclear Information System (INIS)

    1998-11-01

    This book introduces history of tunnel in ancient times, the middle ages and modern times, survey of tunnel and classification of bedrock like environment survey of position, survey of the ground, design of tunnel on basic thing of the design, and design of tunnel of bedrock, analysis of stability of tunnel and application of the data, construction of tunnel like lattice girder and steel fiber reinforced shot crete, and maintenance control and repair of tunnel.

  11. Trust in vehicle technology

    OpenAIRE

    Walker, Guy, H.; Stanton, Neville, A.; Salmon, Paul

    2016-01-01

    Driver trust has potentially important implications for how vehicle technology is used and interacted with. In this paper it will be seen how driver trust functions and how it can be understood and manipulated by insightful vehicle design. It will review the theoretical literature to define steps that can be taken establish trust in vehicle technology in the first place, maintain trust in the long term, and even re-establish trust that has been lost along the way. The implication throughout i...

  12. TRUST AND DISTRUST: TWO NECESSARY FACTORS FOR THE DEVELOPMENT OF THE SOCIAL TRUST

    Directory of Open Access Journals (Sweden)

    RODRIGO YÁÑEZ GALLARDO

    2006-01-01

    Full Text Available Recent investigations argue that distrust is the absence of trust and it would be assumed that bothattitudes are independent; that would allow to distinguish between the naïve attitude and the wise attitudein the trust. It has been built a scale to measure the disposition to trust and the relationship has beenexamined among naïve and wise attitude when trusting. The sample was constituted by 575 universitystudents of both sexes, of four faculties and of different years of study. Through a factorial analysis itwas found that trust and distrust correspond to different factors. It was discussed the importance ofincrease an optimal trust in order to develop social abilities and to stimulate the social participation. Itwas questioned the validity of traditional surveys that measure the social trust.

  13. The Trust Project - Symbiotic Human Machine Teams: Social Cueing for Trust and Reliance

    Science.gov (United States)

    2016-06-30

    AFRL-RH-WP-TR-2016-0096 THE TRUST PROJECT - SYMBIOTIC HUMAN-MACHINE TEAMS: SOCIAL CUEING FOR TRUST & RELIANCE Susan Rivers, Monika Lohani, Marissa...30 JUN 2012 – 30 JUN 2016 4. TITLE AND SUBTITLE THE TRUST PROJECT - SYMBIOTIC HUMAN-MACHINE TEAMS: SOCIAL CUEING FOR TRUST & RELIANCE 5a. CONTRACT

  14. Trustful societies, trustful individuals, and health: An analysis of self-rated health and social trust using the World Value Survey.

    Science.gov (United States)

    Jen, Min Hua; Sund, Erik R; Johnston, Ron; Jones, Kelvyn

    2010-09-01

    This study analyses the relationships between self-rated health and both individual and mean national social trust, focusing on a variant of Wilkinson's hypothesis that individuals will be less healthy the greater the lack of social cohesion in a country. It employs multilevel modelling on World Values Survey data across 69 countries with a total sample of 160,436 individuals. The results show that self-rated health are positively linked to social trust at both country and individual levels after controlling for individual socio-demographic and income variables plus individual social trust; increased trust is associated with better health. Moreover, this analysis of social trust gives some insight into distinctive results for the former Soviet Bloc countries, which have high reported levels of poor health, alongside the Scandinavian countries which have high levels of trust and better health situations. Our results support and extend the Wilkinson hypothesis that the level of trust, an indicator of social cohesion, is predictive of individuals' health. Copyright 2010 Elsevier Ltd. All rights reserved.

  15. Trust and automation: the influence of automation malfunctions and system feedback on operator trust

    International Nuclear Information System (INIS)

    Strand, Stine

    2001-10-01

    Level of operator trust in an automatic system, which is not in accordance with the reliability of the system, might impose serious threats concerning issues of safety, productivity and the well being of the operator. Operator trust is therefore regarded as an important variable in man-machine interaction. The focus of this study was the influence of automatic malfunctions and amount of feedback provided by the automatic system on level of operator trust. The study was conducted in conjunction with the Human Centred Automation 2000-experiment. Two questionnaires attempting to measure operator trust were developed, designed to reflect the dimensions of predictability, dependability and faith. Analysis of the questionnaires demonstrated that they were reliable tools for measurement of operator trust. Factor analysis did not completely confirm the theoretical dimensions of trust, but indicated partial support. Operator trust correlated negatively with workload across situations, and positively with performance in complex situations. The results of the hypotheses tests demonstrated that operator trust gradually decreased after introduction of malfunctions. The effect of different malfunctions was however the opposite of what was expected, with obvious malfunctions reducing trust more than more camouflaged and safety critical malfunctions. Trust in the automatic system in general was lower than trust in specific malfunctioning components. Different interfaces providing different amount of feedback to the operator did not significantly influence level of operator trust. (Author)

  16. Typical Underwater Tunnels in the Mainland of China and Related Tunneling Technologies

    Directory of Open Access Journals (Sweden)

    Kairong Hong

    2017-12-01

    Full Text Available In the past decades, many underwater tunnels have been constructed in the mainland of China, and great progress has been made in related tunneling technologies. This paper presents the history and state of the art of underwater tunnels in the mainland of China in terms of shield-bored tunnels, drill-and-blast tunnels, and immersed tunnels. Typical underwater tunnels of these types in the mainland of China are described, along with innovative technologies regarding comprehensive geological prediction, grouting-based consolidation, the design and construction of large cross-sectional tunnels with shallow cover in weak strata, cutting tool replacement under limited drainage and reduced pressure conditions, the detection and treatment of boulders, the construction of underwater tunnels in areas with high seismic intensity, and the treatment of serious sedimentation in a foundation channel of immersed tunnels. Some suggestions are made regarding the three potential great strait-crossing tunnels—the Qiongzhou Strait-Crossing Tunnel, Bohai Strait-Crossing Tunnel, and Taiwan Strait-Crossing Tunnel—and issues related to these great strait-crossing tunnels that need further study are proposed. Keywords: Underwater tunnel, Strait-crossing tunnel, Shield-bored tunnel, Immersed tunnel, Drill and blast

  17. Trust matters

    DEFF Research Database (Denmark)

    Østergaard, Lise Rosendal

    2015-01-01

    This article makes a contribution to the debate about health service utilisation and the role of trust in fostering demand for health services in sub-Saharan Africa. It is framed as a narrative literature review based on a thematic analysis of nine empirical, qualitative studies. For the purposes...... of this article trust is defined as a voluntary course of action, which involves the optimistic expectation that the trustee will do no harm to the trustor and is increasingly perceived as an important influence on health system functioning. The article looks at trust issues in interpersonal, intergroup...... and institutional situations. The findings of the review point to four elements that are important for trust to develop in health sector relationships: the sensitive use of discretionary power by health workers, perceived empathy by patients of the health workers, the quality of medical care and workplace...

  18. Trust in Strategic Alliances

    DEFF Research Database (Denmark)

    Nielsen, Bo

    2011-01-01

    This article examines the dynamic and multi-dimensional nature of trust in strategic alliances. Adopting a co-evolutionary approach, I developed a framework to show how trust, conceptualised in different forms, plays distinct roles at various evolutionary stages of the alliance relationship....... Emphasising the multi-dimensional and dynamic role of trust, the framework illustrates how initial levels of a particular type of trust may co-evolve with the alliance and influence subsequent phases of the relationship – either on its own or in combination with other types or dimensions of trust....... The theoretical distinction between trust as antecedent, moderator and outcome during the evolution of the alliance relationship leads to research questions that may guide future empirical research....

  19. Trust-Building in Electronic Markets: Relative Importance and Interaction Effects of Trust-Building Mechanisms

    Science.gov (United States)

    Tams, Stefan

    We examine the relative and complementary effectiveness of trust-building strategies in online environments. While prior research has examined various antecedents to trust, we investigated two trust-building mechanisms more in depth: Web site trust and vendor reputation. We tried to understand the relative effectiveness of these two important mechanisms to provide online businesses with a clear recommendation of how to establish trust in an effective and efficient manner. Drawing from the literature on trust, we proposed vendor reputation to be more effective than Web site trust. Moreover, we examined a potential complementary effect of these mechanisms so as to provide online businesses with a deeper understanding of how to derive superior trust. We hypothesize a small such effect. The study proposes a laboratory experiment to test the model.

  20. Trust transitivity in social networks.

    Directory of Open Access Journals (Sweden)

    Oliver Richters

    Full Text Available Non-centralized recommendation-based decision making is a central feature of several social and technological processes, such as market dynamics, peer-to-peer file-sharing and the web of trust of digital certification. We investigate the properties of trust propagation on networks, based on a simple metric of trust transitivity. We investigate analytically the percolation properties of trust transitivity in random networks with arbitrary in/out-degree distributions, and compare with numerical realizations. We find that the existence of a non-zero fraction of absolute trust (i.e. entirely confident trust is a requirement for the viability of global trust propagation in large systems: The average pair-wise trust is marked by a discontinuous transition at a specific fraction of absolute trust, below which it vanishes. Furthermore, we perform an extensive analysis of the Pretty Good Privacy (PGP web of trust, in view of the concepts introduced. We compare different scenarios of trust distribution: community- and authority-centered. We find that these scenarios lead to sharply different patterns of trust propagation, due to the segregation of authority hubs and densely-connected communities. While the authority-centered scenario is more efficient, and leads to higher average trust values, it favours weakly-connected "fringe" nodes, which are directly trusted by authorities. The community-centered scheme, on the other hand, favours nodes with intermediate in/out-degrees, in detriment of the authorities and its "fringe" peers.

  1. Trust Transitivity in Social Networks

    Science.gov (United States)

    Richters, Oliver; Peixoto, Tiago P.

    2011-01-01

    Non-centralized recommendation-based decision making is a central feature of several social and technological processes, such as market dynamics, peer-to-peer file-sharing and the web of trust of digital certification. We investigate the properties of trust propagation on networks, based on a simple metric of trust transitivity. We investigate analytically the percolation properties of trust transitivity in random networks with arbitrary in/out-degree distributions, and compare with numerical realizations. We find that the existence of a non-zero fraction of absolute trust (i.e. entirely confident trust) is a requirement for the viability of global trust propagation in large systems: The average pair-wise trust is marked by a discontinuous transition at a specific fraction of absolute trust, below which it vanishes. Furthermore, we perform an extensive analysis of the Pretty Good Privacy (PGP) web of trust, in view of the concepts introduced. We compare different scenarios of trust distribution: community- and authority-centered. We find that these scenarios lead to sharply different patterns of trust propagation, due to the segregation of authority hubs and densely-connected communities. While the authority-centered scenario is more efficient, and leads to higher average trust values, it favours weakly-connected “fringe” nodes, which are directly trusted by authorities. The community-centered scheme, on the other hand, favours nodes with intermediate in/out-degrees, in detriment of the authorities and its “fringe” peers. PMID:21483683

  2. Trust is a must: What is involved in trusting those who manage forest fires?

    Science.gov (United States)

    Adam Liljeblad; Bill Borrie; Alan Watson

    2010-01-01

    Trust is a complicated emotion. In the past, many social scientists have studied trust. They discovered that trust involves a number of beliefs and emotions. The scientists in this study were interested in learning more about trust. They believed that forest managers can do a better job if people trust them to do what is best for citizens and the environment (figure 1...

  3. Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker

    Directory of Open Access Journals (Sweden)

    Ahmad Samer Wazan

    2017-01-01

    Full Text Available A Public Key Infrastructure (PKI is considered one of the most important techniques used to propagate trust in authentication over the Internet. This technology is based on a trust model defined by the original X.509 (1988 standard and is composed of three entities: the certification authority (CA, the certificate holder (or subject, and the Relying Party (RP. The CA plays the role of a trusted third party between the certificate holder and the RP. In many use cases, this trust model has worked successfully. However, we argue that the application of this model on the Internet implies that web users need to depend on almost anyone in the world in order to use PKI technology. Thus, we believe that the current TLS system is not fit for purpose and must be revisited as a whole. In response, the latest draft edition of X.509 has proposed a new trust model by adding new entity called the Trust Broker (TB. In this paper, we present an implementation approach that a Trust Broker could follow in order to give RPs trust information about a CA by assessing the quality of its issued certificates. This is related to the quality of the CA’s policies and procedures and its commitment to them. Finally, we present our Trust Broker implementation that demonstrates how RPs can make informed decisions about certificate holders in the context of the global web, without requiring large processing resources themselves.

  4. Direct, coherent and incoherent intermediate state tunneling and scanning tunnel microscopy (STM)

    International Nuclear Information System (INIS)

    Halbritter, J.

    1997-01-01

    Theory and experiment in tunneling are still qualitative in nature, which hold true also for the latest developments in direct-, resonant-, coherent- and incoherent-tunneling. Those tunnel processes have recently branched out of the field of ''solid state tunnel junctions'' into the fields of scanning tunnel microscopy (STM), single electron tunneling (SET) and semiconducting resonant tunnel structures (RTS). All these fields have promoted the understanding of tunneling in different ways reaching from the effect of coherence, of incoherence and of charging in tunneling, to spin flip or inelastic effects. STM allows not only the accurate measurements of the tunnel current and its voltage dependence but, more importantly, the easy quantification via the (quantum) tunnel channel conductance and the distance dependence. This new degree of freedom entering exponentially the tunnel current allows an unique identification of individual tunnel channels and their quantification. In STM measurements large tunnel currents are observed for large distances d > 1 nm explainable by intermediate state tunneling. Direct tunneling with its reduced tunnel time and reduced off-site Coulomb charging bridges distances below 1 nm, only. The effective charge transfer process with its larger off-site and on-site charging at intermediate states dominates tunnel transfer in STM, biology and chemistry over distances in the nm-range. Intermediates state tunneling becomes variable range hopping conduction for distances larger than d > 2 nm, for larger densities of intermediate states n 1 (ε) and for larger temperatures T or voltages U, still allowing high resolution imaging

  5. Social Trust and Fractionalization:

    DEFF Research Database (Denmark)

    Bjørnskov, Christian

    2008-01-01

    This paper takes a closer look at the importance of fractionalization for the creation of social trust. It first argues that the determinants of trust can be divided into two categories: those affecting individuals' trust radii and those affecting social polarization. A series of estimates using...... a much larger country sample than in previous literature confirms that fractionalization in the form of income inequality and political diversity adversely affects social trust while ethnic diversity does not. However, these effects differ systematically across countries, questioning standard...... interpretations of the influence of fractionalization on trust....

  6. The Process of Trust Development

    DEFF Research Database (Denmark)

    Jagd, Søren; Højland, Jeppe

    in management among employees. Trust is found to be higher among employees interacting regularly with managers, as in the project coordination group. It is found that personal relations are very important for the development of trust. The success of the project may be explained by the involvement of an ‘elite...... and discuss with colleagues from other departments and develop personal knowledge of each other....... by high trust and co-operation? In this paper we explore the process of trust development during an organisational change project in a Danish SME by looking at two kinds of trust relations: employee trust in management and trust relations among employees. We find substantial differences in trust...

  7. Trust Discovery in Online Communities

    Science.gov (United States)

    Piorkowski, John

    2014-01-01

    This research aims to discover interpersonal trust in online communities. Two novel trust models are built to explain interpersonal trust in online communities drawing theories and models from multiple relevant areas, including organizational trust models, trust in virtual settings, speech act theory, identity theory, and common bond theory. In…

  8. Building trusted national identity management systems: Presenting the privacy concern-trust (PCT) model

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    This paper discusses the effect of trust and information privacy concerns on citizens’ attitude towards national identity management systems. We introduce the privacyconcerns- trust model, which shows the role of trust in mediating and moderating citizens’ attitude towards identity management...... systems. We adopted a qualitative research approach in our analysis of data that was gathered through a series of interviews and a stakeholder workshop in Ghana. Our findings indicate that, beyond the threshold level of trust, societal information privacy concern is low; hence, trust is high, thereby...

  9. Understanding Trust in Financial Services

    DEFF Research Database (Denmark)

    Hansen, Torben

    2012-01-01

    Although the financial crisis has elevated the interest for factors such as consumer financial healthiness, broad-scope trust, financial knowledge, and consumer relationship satisfaction, no existing model describes how these factors may influence consumer financial relationship trust...... healthiness, broad-scope trust, knowledge, and satisfaction positively affect narrow-scope trust in financial services. Furthermore, it is found that broad-scope trust negatively moderates the relationships between financial healthiness and narrow-scope trust and between satisfaction and narrow-scope trust....... This research extends prior research by developing a conceptual framework explaining how these constructs affect consumers' trust in their financial service provider. Based on two surveys comprising 764 pension consumers and 892 mortgage consumers, respectively, the results of this study indicate that financial...

  10. The Condition for Generous Trust.

    Directory of Open Access Journals (Sweden)

    Obayashi Shinya

    Full Text Available Trust has been considered the "cement" of a society and is much studied in sociology and other social sciences. Most studies, however, have neglected one important aspect of trust: it involves an act of forgiving and showing tolerance toward another's failure. In this study, we refer to this concept as "generous trust" and examine the conditions under which generous trust becomes a more viable option when compared to other types of trust. We investigate two settings. First, we introduce two types of uncertainties: uncertainty as to whether trustees have the intention to cooperate, and uncertainty as to whether trustees have enough competence to accomplish the entrusted tasks. Second, we examine the manner in which trust functions in a broader social context, one that involves matching and commitment processes. Since we expect generosity or forgiveness to work differently in the matching and commitment processes, we must differentiate trust strategies into generous trust in the matching process and that in the commitment process. Our analytical strategy is two-fold. First, we analyze the "modified" trust game that incorporates the two types of uncertainties without the matching process. This simplified setting enables us to derive mathematical results using game theory, thereby giving basic insight into the trust mechanism. Second, we investigate socially embedded trust relationships in contexts involving the matching and commitment processes, using agent-based simulation. Results show that uncertainty about partner's intention and competence makes generous trust a viable option. In contrast, too much uncertainty undermines the possibility of generous trust. Furthermore, a strategy that is too generous cannot stand alone. Generosity should be accompanied with moderate punishment. As for socially embedded trust relationships, generosity functions differently in the matching process versus the commitment process. Indeed, these two types of generous

  11. ReTrust: attack-resistant and lightweight trust management for medical sensor networks.

    Science.gov (United States)

    He, Daojing; Chen, Chun; Chan, Sammy; Bu, Jiajun; Vasilakos, Athanasios V

    2012-07-01

    Wireless medical sensor networks (MSNs) enable ubiquitous health monitoring of users during their everyday lives, at health sites, without restricting their freedom. Establishing trust among distributed network entities has been recognized as a powerful tool to improve the security and performance of distributed networks such as mobile ad hoc networks and sensor networks. However, most existing trust systems are not well suited for MSNs due to the unique operational and security requirements of MSNs. Moreover, similar to most security schemes, trust management methods themselves can be vulnerable to attacks. Unfortunately, this issue is often ignored in existing trust systems. In this paper, we identify the security and performance challenges facing a sensor network for wireless medical monitoring and suggest it should follow a two-tier architecture. Based on such an architecture, we develop an attack-resistant and lightweight trust management scheme named ReTrust. This paper also reports the experimental results of the Collection Tree Protocol using our proposed system in a network of TelosB motes, which show that ReTrust not only can efficiently detect malicious/faulty behaviors, but can also significantly improve the network performance in practice.

  12. Social Trust and Value Similarity: the Relationship between Social Trust and Human Values in Europe

    Directory of Open Access Journals (Sweden)

    Mai Beilmann

    2015-12-01

    Full Text Available The purpose of the current paper is to test whether value similarity may foster social trust in society and whether people have higher levels of social trust when they emphasise the same values that prevail in their country. The relationship between social trust and human values was examined in a sample of 51,308 people across 29 European countries using data from the European Social Survey round 6. Results suggest that value similarity is more important in generating individual level social trust in countries where the overall levels of social trust are higher. There is a stronger positive relationship between value similarity and social trust in Scandinavian countries, which have high social trust levels, while in countries with a low level of social trust, congruity of the personal value structure with the country level value structure tends to decrease the individuals trustfulness

  13. DualTrust: A Trust Management Model for Swarm-Based Autonomic Computing Systems

    Energy Technology Data Exchange (ETDEWEB)

    Maiden, Wendy M. [Washington State Univ., Pullman, WA (United States)

    2010-05-01

    Trust management techniques must be adapted to the unique needs of the application architectures and problem domains to which they are applied. For autonomic computing systems that utilize mobile agents and ant colony algorithms for their sensor layer, certain characteristics of the mobile agent ant swarm -- their lightweight, ephemeral nature and indirect communication -- make this adaptation especially challenging. This thesis looks at the trust issues and opportunities in swarm-based autonomic computing systems and finds that by monitoring the trustworthiness of the autonomic managers rather than the swarming sensors, the trust management problem becomes much more scalable and still serves to protect the swarm. After analyzing the applicability of trust management research as it has been applied to architectures with similar characteristics, this thesis specifies the required characteristics for trust management mechanisms used to monitor the trustworthiness of entities in a swarm-based autonomic computing system and describes a trust model that meets these requirements.

  14. Trust and School Life: The Role of Trust for Learning, Teaching, Leading, and Bridging

    Science.gov (United States)

    Van Maele, Dimitri, Ed.; Forsyth, Patrick B., Ed.; Van Houtte, Miek, Ed.

    2014-01-01

    This book samples recent and emerging trust research in education including an array of conceptual approaches, measurement innovations, and explored determinants and outcomes of trust. The collection of pathways explores the phenomenon of trust and establishes the significance of trust relationships in school life. It emboldens the claim that…

  15. Trust matters: Patients' and providers' accounts of the role of trust in ...

    African Journals Online (AJOL)

    Also, trust was considered as potentially contributing to trusted doctors' behaviour changes such as excessive self-pride, faking being busy and sluggishness in care provision as well as increasing their work load. Conclusion: The findings suggest that trust in patient-doctor relationship matters for hypertension care in rural ...

  16. A healthy dose of trust: the relationship between interpersonal trust and health

    NARCIS (Netherlands)

    Schneider, I.K.; Konijn, E.A.; Righetti, F.; Rusbult, C.E.

    2011-01-01

    The positive effects of trust are manifold. Recent research has shown that trust levels may even influence physical health. The current work explores this issue and aims to shed light on the mechanisms underlying the relationship between trust and health in a 5-wave longitudinal data set. Results

  17. A Model of Trusted Measurement Model

    OpenAIRE

    Ma Zhili; Wang Zhihao; Dai Liang; Zhu Xiaoqin

    2017-01-01

    A model of Trusted Measurement supporting behavior measurement based on trusted connection architecture (TCA) with three entities and three levels is proposed, and a frame to illustrate the model is given. The model synthesizes three trusted measurement dimensions including trusted identity, trusted status and trusted behavior, satisfies the essential requirements of trusted measurement, and unified the TCA with three entities and three levels.

  18. Terrorism, Trust and Tourism

    DEFF Research Database (Denmark)

    Jensen, Susanne; Svendsen, Gert Tinggaard

    2017-01-01

    How does terrorism affect social trust and tourism? The rising number of terrorist attacks in Western Europe has caused safety problems not only for local citizens but also for tourists. In fact, terrorists challenge the formal violence monopoly of the state thus creating a sense of anarchy...... and distrust. Social trust is about trusting strangers, so when less predictable behaviour occurs in, a given country, people become more careful as they tend to trust most other people less. An interesting case for future research is Scandinavia as the level of terrorism is still low and, at the same time......, Scandinavia can record most social trust in the world meaning a competitive advantage when attracting tourists. Arguably, a double dividend is created from fighting terrorism, namely more social trust accumulated and more tourists attracted. Future research should therefore try to further test our model...

  19. Trust and Influence

    Science.gov (United States)

    2013-03-06

    the behavior or attitudes of others). LIST SUB-AREAS IN PORTFOLIO: Science of Reliance • Trust in Autonomous Systems/ Autonomy – identify the...error •Humans have trust biases (Lyons & Stokes, 2012) •Little is known about how human trust principles apply to autonomy /robotics...for the model in western context (Colquitt et al., 2007) • Some evidence that benevolence is favored by collectivist culture (Branzei et al., 2007

  20. Trust Models in Ubiquitous Computing

    DEFF Research Database (Denmark)

    Nielsen, Mogens; Krukow, Karl; Sassone, Vladimiro

    2008-01-01

    We recapture some of the arguments for trust-based technologies in ubiquitous computing, followed by a brief survey of some of the models of trust that have been introduced in this respect. Based on this, we argue for the need of more formal and foundational trust models.......We recapture some of the arguments for trust-based technologies in ubiquitous computing, followed by a brief survey of some of the models of trust that have been introduced in this respect. Based on this, we argue for the need of more formal and foundational trust models....

  1. An Operational Semantics for Trust Policies

    DEFF Research Database (Denmark)

    Krukow, Karl

    2006-01-01

    In the trust-structure framework for trust management, principals specify their trusting relationships in terms of trust policies. In their paper on trust structures, Carbone et al. present a language for such policies, and provide a suitable denotational semantics. The semantics ensures that for......In the trust-structure framework for trust management, principals specify their trusting relationships in terms of trust policies. In their paper on trust structures, Carbone et al. present a language for such policies, and provide a suitable denotational semantics. The semantics ensures...... that for any collection of policies, there is always a unique global trust-state, compatible with all the policies, specifying everyone's degree of trust in everyone else. However, as the authors themselves point out, the language lacks an operational model: the global trust-state is a well......-defined mathematical object, but it is not clear how principals can actually compute it. This becomes even more apparent when one considers the intended application environment: vast numbers of autonomous principals, distributed and possibly mobile. We provide a compositional operational semantics for a language...

  2. Monitoring pilot projects on bored tunnelling : The Second Heinenoord Tunnel and the Botlek Rail Tunnel

    NARCIS (Netherlands)

    Bakker, K.J.; De Boer, F.; Admiraal, J.B.M.; Van Jaarsveld, E.P.

    1999-01-01

    Two pilot projects for bored tunnelling in soft soil have been undertaken in the Netherlands. The monitoring was commissioned under the authority of the Centre for Underground Construction (COB). A description of the research related to the Second Heinenoord Tunnel and the Botlek Rail Tunnel will be

  3. Reliable Design Versus Trust

    Science.gov (United States)

    Berg, Melanie; LaBel, Kenneth A.

    2016-01-01

    This presentation focuses on reliability and trust for the users portion of the FPGA design flow. It is assumed that the manufacturer prior to hand-off to the user tests FPGA internal components. The objective is to present the challenges of creating reliable and trusted designs. The following will be addressed: What makes a design vulnerable to functional flaws (reliability) or attackers (trust)? What are the challenges for verifying a reliable design versus a trusted design?

  4. Four Essential Practices for Building Trust

    Science.gov (United States)

    Combs, Julie Peterson; Harris, Sandra; Edmonson, Stacey

    2015-01-01

    The presence of trust can enhance an organization's efforts to fulfill its mission, and the lack of trust can constrict those efforts. The authors offer four essential guidelines to help school leaders communicate in a way that builds trust. Build trust by understanding trust. Trusted leaders demonstrate care, character, and competence in their…

  5. Trust, trustworthiness and health.

    Science.gov (United States)

    Dawson, Angus

    2015-01-01

    Trust is an essential component of good healthcare. If patients trust their physicians, then the relationship between them can be a richer and more meaningful one. The patient is more likely to feel confident and able to disclose symptoms, helping diagnosis and future care. If public health and community workers are trusted, not only is it likely that their work will be easier, in that their actions will be respected and accepted, but their advice will also be sought spontaneously. Trust, can, therefore, be thought of as something that is of benefit to all: healthcare workers, individuals and communities. Trust is, generally, something to be prized and we need to do anything we can to strengthen it.

  6. Trust, values and false consensus

    OpenAIRE

    Butler, Jeffrey V.; Giuliano, Paola; Guiso, Luigi

    2012-01-01

    Trust beliefs are heterogeneous across individuals and, at the same time, persistent across generations. We investigate one mechanism yielding these dual patterns: false consensus. In the context of a trust game experiment, we show that individuals extrapolate from their own type when forming trust beliefs about the same pool of potential partners – i.e., more (less) trustworthy individuals form more optimistic (pessimistic) trust beliefs - and that this tendency continues to color trust beli...

  7. A formalization of computational trust

    NARCIS (Netherlands)

    Güven - Ozcelebi, C.; Holenderski, M.J.; Ozcelebi, T.; Lukkien, J.J.

    2018-01-01

    Computational trust aims to quantify trust and is studied by many disciplines including computer science, social sciences and business science. We propose a formal computational trust model, including its parameters and operations on these parameters, as well as a step by step guide to compute trust

  8. Autonomy, Trust, and Respect.

    Science.gov (United States)

    Nys, Thomas

    2016-02-01

    This article seeks to explore and analyze the relationship between autonomy and trust, and to show how these findings could be relevant to medical ethics. First, I will argue that the way in which so-called "relational autonomy theories" tie the notions of autonomy and trust together is not entirely satisfying Then, I will introduce the so-called Encapsulated Interest Account as developed by Russell Hardin. This will bring out the importance of the reasons for trust. What good reasons do we have for trusting someone? I will criticize Hardin's business model as insufficiently robust, especially in the context of health care, and then turn to another source of trust, namely, love. It may seem that trust-through-love is much better suited for the vulnerability that is often involved in health care, but I will also show that it has its own deficiencies. Good health care should therefore pay attention to both models of trust, and I will offer some tentative remarks on how to do this. © The Author 2015. Published by Oxford University Press, on behalf of the Journal of Medicine and Philosophy Inc. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  9. Fording Canadian Coal Trust

    Energy Technology Data Exchange (ETDEWEB)

    Popowich, J.; Millos, R. [Elk Valley Coal Corporation, Calgary, AB (Canada)

    2004-07-01

    This is the first of five slide/overhead presentations presented at the Fording Canadian Coal Trust and Tech Cominco Ltd. investor day and mine tour. The Fording Canadian Coal Trust is described. The Trust's assets comprise six Elk Valley metallurgical coal mines and six wollastonite operations (in the NYCO Group). Trust structure, corporate responsibility, organizational structure, reserves and resources, management philosophy, operating strategies, steel market dynamics, coal market, production expansion, sales and distribution are outlined. 15 figs., 5 tabs.

  10. Trust metrics in information fusion

    Science.gov (United States)

    Blasch, Erik

    2014-05-01

    Trust is an important concept for machine intelligence and is not consistent across many applications. In this paper, we seek to understand trust from a variety of factors: humans, sensors, communications, intelligence processing algorithms and human-machine displays of information. In modeling the various aspects of trust, we provide an example from machine intelligence that supports the various attributes of measuring trust such as sensor accuracy, communication timeliness, machine processing confidence, and display throughput to convey the various attributes that support user acceptance of machine intelligence results. The example used is fusing video and text whereby an analyst needs trust information in the identified imagery track. We use the proportional conflict redistribution rule as an information fusion technique that handles conflicting data from trusted and mistrusted sources. The discussion of the many forms of trust explored in the paper seeks to provide a systems-level design perspective for information fusion trust quantification.

  11. The social context of trust relations

    Directory of Open Access Journals (Sweden)

    Kojić Milena

    2017-01-01

    Full Text Available In the widest sense, this paper focuses on the problematization (and operationalization of the concept of trust and its social context, with a special emphasis on its multiple meanings, the ways of establishing trust, as well as its functions. After pointing to the various definitions of trust that highlight its cognitive, behavioral, and relational groundings, we proceed to examine the aspects of 'social embeddedness' of trust. In this context, we highlight the structural aspect of trust relations, their institutional embeddedness, mediation through cultural meanings, as well as the wider context of social circumstances and limitations. We place a special emphasis on the concept of 'trust culture', its morphogenesis and functions, as well as the significance of trust culture in the context of diminishing the social uncertainty that arises in the situations when trust is demonstrated. Finally, we point to the social functions of trust on the macro level, the functional substitutes for trust, as well as the relationship between trust and social capital.

  12. An Operational Semantics for Trust Policies

    DEFF Research Database (Denmark)

    Krukow, Karl Kristian

    2005-01-01

    In the trust-structure model of trust management, principals specify their trusting relationships with other principals in terms of trust policies. In their paper on trust structures, Carbone et al. present a language for trust policies, and provide a suitable denotational semantics. The semantics...... ensures that for any collection of trust policies, there is always a unique global trust-state, compatible with all the policies, specifying everyone's degree of trust in everyone else. However, as the authors themselves point out, the language lacks an operational model: the global trust-state is a well......-defined mathematical object, but it is not clear how principals can actually compute it. This becomes even more apparent when one considers the intended application environment: vast numbers of autonomous principals, distributed and possibly mobile. We provide a compositional operational semantics for a language...

  13. Generalized Trust and Trust in Institutions in Confucian Asia

    Science.gov (United States)

    Tan, Soo Jiuan; Tambyah, Siok Kuan

    2011-01-01

    This study examines generalized trust and trust in institutions in Confucian Asia, covering six countries namely, China, Japan, Singapore, South Korea, Taiwan and Vietnam, and one dependent region, Hong Kong. Using data from the 2006 AsiaBarometer Survey, our study affirms the reliability and validity of using a two-item scale to measure…

  14. Trust Drives Internet Use

    DEFF Research Database (Denmark)

    Ljunge, Jan Martin

    This paper estimates the effect of trust on internet use by studying the general population as well as second generation immigrants in 29 European countries with ancestry in 87 nations. There is a significant positive effect of trust on internet use. The positive trust effect is not universal...

  15. Trust and Distrust in E-Commerce

    Directory of Open Access Journals (Sweden)

    Suk-Joo Lee

    2018-03-01

    Full Text Available Trust is the key ingredient for sustainable transactions. In the concept of trust, the trustor trusts the trustees. In e-commerce, the trustor is the buyer and the trustees are the intermediaries and the seller. Intermediaries provide the web-based infrastructure that enables buyers and sellers to make transactions. Trust is the buyer’s judgment and comprises two distinct concepts; both trust and distrust reside in the trustor. The purpose of this study was to examine the complicated effects of trust and distrust on a buyer’s purchase intentions. Previous studies have provided theoretical frameworks illustrating co-existent trust and distrust, trust transfers from one to another, and trust in buyer-intermediary-seller relationships. Based on these frameworks, this study (i presented a holistic model that contained the judgment of buyers resulting in trust or distrust in the intermediary and the seller; (ii investigated trust and distrust transfer from the intermediary to the seller, and (iii explored the effects of various antecedents that affect trust and distrust. To validate the proposed model, we employed Partial Least Squares (PLS. A summary of key findings are as follows. First, buyer’s trust in an intermediary positively affected his or her trust in the seller, positively influencing purchase intention. In other words, we found the trust transfer from an intermediary to its seller. Second, distrust in an intermediary directly impacted on the buyer’s perceived risk, negatively influencing his or her purchase intentions. Third, structural assurance and perceived website quality of an intermediary gave a positive impact on buyer’s trust in the intermediary. The results of this study shed light on the necessity of managing both trust and distrust to facilitate sales in e-commerce.

  16. A general definition of trust

    OpenAIRE

    O'Hara, Kieron

    2012-01-01

    In this paper a definition and conceptual analysis of trust is given in terms of trustworthiness. Its focus will be as wide as possible, and will not be restricted to any particular type of trust. The aim is to show the key parameters that enable us to investigate and understand trust, thereby facilitating the development of systems, institutions and technologies to support, model or mimic trust. The paper will also show the strong connection between trust and trustworthiness, showing how the...

  17. Trust and Sensemaking in Organizations

    DEFF Research Database (Denmark)

    Fuglsang, Lars; Jagd, Søren; Olsen, Poul Bitsch

    The literature on trust and the literature on sensemaking constitute two separate streams of literature that are both seen as highly relevant to understanding organisational processes in modern complex high-trust organisations. However, though a few studies have argued for the relevance of linkin...... help furthering the understanding of trust processes in organizations. The variety of links between sensemaking and trust processes is illustrated by the intertwining of trust and four processes of sensemaking: arguing, expecting, committing and manipulation identified by Karl Weick....

  18. The productivity of trust

    DEFF Research Database (Denmark)

    Bjørnskov, Christian; Méon, Pierre-Guillaume

    This paper returns to one of the early questions of the literature on social trust, whether trust affects total factor productivity (TFP). Using both development and growth accounting, we find strong evidence of a causal effect of trust on the level and growth of TFP. Using a three-stage least...

  19. Tunnel magnetoresistance in asymmetric double-barrier magnetic tunnel junctions

    International Nuclear Information System (INIS)

    Useinov, N.Kh.; Petukhov, D.A.; Tagirov, L.R.

    2015-01-01

    The spin-polarized tunnel conductance and tunnel magnetoresistance (TMR) through a planar asymmetric double-barrier magnetic tunnel junction (DBMTJ) have been calculated using quasi-classical model. In DBMTJ nanostructure the magnetization of middle ferromagnetic metal layer can be aligned parallel or antiparallel with respect to the fixed magnetizations of the top and bottom ferromagnetic electrodes. The transmission coefficients of an electron to pass through the barriers have been calculated in terms of quantum mechanics. The dependencies of tunnel conductance and TMR on the applied voltage have been calculated in case of non-resonant transmission. Estimated in the framework of our model, the difference between the spin-channels conductances at low voltages was found relatively large. This gives rise to very high magnitude of TMR. - Highlights: • The spin-polarized conductance through the junction is calculated. • Dependencies of the tunnel conductance vs applied bias are shown. • Bias voltage dependence of tunnel magnetoresistance for the structure is shown

  20. A question of trust

    Science.gov (United States)

    2010-04-01

    Trust lies at the heart of modern science. As scientists, we trust that the papers we read are honest and correct as far as the data, results, techniques and theories in them are concerned. We trust that our colleagues and collaborators are acting properly and ethically - and not being devious, secretive or sloppy. But perhaps even more important is the public's trust in science. After all, much research is funded by taxpayers, who, quite rightly, want to know that the work will not harm them and, preferably, do them some good.

  1. 25 CFR 1000.360 - Is the trust evaluation standard or process different when the trust asset is held in trust for...

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false Is the trust evaluation standard or process different when the trust asset is held in trust for an individual Indian or Indian allottee? 1000.360 Section 1000.360 Indians OFFICE OF THE ASSISTANT SECRETARY, INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR ANNUAL FUNDING AGREEMENTS UNDER THE TRIBAL SELF-GOVERNMEN...

  2. Social Trust: Croatia 1995-2003.

    Directory of Open Access Journals (Sweden)

    Berto Šalaj

    2005-01-01

    Full Text Available In this paper the author deals with the concept of social trust. It is the author’s view that this concept has been neglected in past political science research in Croatia; consequently, he wishes to present it to the academic and professional political science public, thus creating a basis for its future use. Moreover, through application of a secondary dana analysis the author describes the state of social trust in Croatia. First, he contextualises the concept of social trust with regard to the dominant research approaches in political science; then he points to the distinctiveness of social trust in relation to other types of trust; fi nally, he provides an overview of the most relevant works on the importance and functions of social trust. In the concluding part of the paper, an analysis of the levels of social trust is conducted, revealing that Croatia is a society with markedly low levels of social trust. In the author’s opinion, this could present an obstacle to further political and economic development.

  3. Cancer patients’ trust in their oncologist

    OpenAIRE

    Hillen, M.A.

    2013-01-01

    In this thesis we aimed to unravel cancer patients’ trust in their oncologist. We investigated patients’ explanations of trust in-depth, and developed an oncology-specific questionnaire to assess trust. Using the resulting Trust in Oncologist Scale, we experimentally established the influence of oncologist communication on trust. Specifically, patients report stronger trust if the oncologist expresses medical competence, communicates in an open and honest manner, and conveys involvement and c...

  4. 25 CFR 115.815 - How does a tribe request trust funds from a tribal trust account?

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false How does a tribe request trust funds from a tribal trust account? 115.815 Section 115.815 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR FINANCIAL ACTIVITIES TRUST FUNDS FOR TRIBES AND INDIVIDUAL INDIANS Tribal Accounts Withdrawing Tribal Trust Funds § 115.815 How does a tribe request trust...

  5. Modeling trust context in networks

    CERN Document Server

    Adali, Sibel

    2013-01-01

    We make complex decisions every day, requiring trust in many different entities for different reasons. These decisions are not made by combining many isolated trust evaluations. Many interlocking factors play a role, each dynamically impacting the others.? In this brief, 'trust context' is defined as the system level description of how the trust evaluation process unfolds.Networks today are part of almost all human activity, supporting and shaping it. Applications increasingly incorporate new interdependencies and new trust contexts. Social networks connect people and organizations throughout

  6. Assess and enhance public trust

    Science.gov (United States)

    Patricia Winter; James Absher; Alan Watson

    2007-01-01

    Trust is a form of social capital, facilitating effective land management, communication and collaboration. Although trust in the Forest Service is at least moderately high for most publics, evidence of a lack of trust and outright distrust has been found in some communities. However, the amount, types, and conditions of trust necessary for effective management to...

  7. Competition Fosters Trust

    DEFF Research Database (Denmark)

    Huck, Steffen; Lünser, Gabriele; Tyran, Jean-Robert Karl

    2012-01-01

    We study the effects of reputation and competition in a trust game. If trustees are anonymous, outcomes are poor: trustees are not trustworthy, and trustors do not trust. If trustees are identifiable and can, hence, build a reputation, efficiency quadruples but is still at only a third of the first...... best. Adding more information by granting trustors access to all trustees' complete history has, somewhat surprisingly, no effect. On the other hand, we find that competition, coupled with some minimal information, eliminates the trust problem almost completely...

  8. An intervention to increase patients' trust in their physicians. Stanford Trust Study Physician Group.

    Science.gov (United States)

    Thom, D H; Bloch, D A; Segal, E S

    1999-02-01

    To investigate the effect of a one-day workshop in which physicians were taught trust-building behaviors on their patients' levels of trust and on outcomes of care. In 1994, the study recruited 20 community-based family physicians and enrolled 412 consecutive adult patients from those physicians' practices. Ten of the physicians (the intervention group) were randomly assigned to receive a one-day training course in building and maintaining patients' trust. Outcomes were patients' trust in their physicians, patients' and physicians' satisfaction with the office visit, continuity in the patient-physician relationship, patients' adherence to their treatment plans, and the numbers of diagnostic tests and referrals. Physicians and patients in the intervention and control groups were similar in demographic and other data. There was no significant difference in any outcome. Although their overall ratings were not statistically significantly different, the patients of physicians in the intervention group reported more positive physician behaviors than did the patients of physicians in the control group. The trust-building workshop had no measurable effect on patients' trust or on outcomes hypothesized to be related to trust.

  9. Development-based Trust: Proposing and Validating a New Trust Measurement Model for Buyer-Seller Relationships

    Directory of Open Access Journals (Sweden)

    José Mauro da Costa Hernandez

    2010-04-01

    Full Text Available This study proposes and validates a trust measurement model for buyer-seller relationships. Baptized as development-based trust, the model encompasses three dimensions of trust: calculus-based, knowledge-based and identification-based. In addition to recognizing that trust is a multidimensional construct, the model also assumes that trust can evolve to take on a different character depending on the stage of the relationship. In order to test the proposed model and compare it to the characteristic-based trust measurement model, the measure most frequently used in the buyer-seller relationship literature, data were collected from 238 clients of an IT product wholesaler. The results show that the scales are valid and reliable and the proposed development-based trust measurement model is superior to the characteristic-based trust measurement model in terms of its ability to explain certain variables of interest in buyer-seller relationships (long-term relationship orientation, information sharing, behavioral loyalty and future intentions. Implications for practice, limitations and suggestions for future studies are discussed.

  10. Homo economicus belief inhibits trust.

    Directory of Open Access Journals (Sweden)

    Ziqiang Xin

    Full Text Available As a foundational concept in economics, the homo economicus assumption regards humans as rational and self-interested actors. In contrast, trust requires individuals to believe partners' benevolence and unselfishness. Thus, the homo economicus belief may inhibit trust. The present three experiments demonstrated that the direct exposure to homo economicus belief can weaken trust. And economic situations like profit calculation can also activate individuals' homo economicus belief and inhibit their trust. It seems that people's increasing homo economicus belief may serve as one cause of the worldwide decline of trust.

  11. Homo Economicus Belief Inhibits Trust

    Science.gov (United States)

    Xin, Ziqiang; Liu, Guofang

    2013-01-01

    As a foundational concept in economics, the homo economicus assumption regards humans as rational and self-interested actors. In contrast, trust requires individuals to believe partners’ benevolence and unselfishness. Thus, the homo economicus belief may inhibit trust. The present three experiments demonstrated that the direct exposure to homo economicus belief can weaken trust. And economic situations like profit calculation can also activate individuals’ homo economicus belief and inhibit their trust. It seems that people’s increasing homo economicus belief may serve as one cause of the worldwide decline of trust. PMID:24146907

  12. Attack-Resistant Trust Metrics

    Science.gov (United States)

    Levien, Raph

    The Internet is an amazingly powerful tool for connecting people together, unmatched in human history. Yet, with that power comes great potential for spam and abuse. Trust metrics are an attempt to compute the set of which people are trustworthy and which are likely attackers. This chapter presents two specific trust metrics developed and deployed on the Advogato Website, which is a community blog for free software developers. This real-world experience demonstrates that the trust metrics fulfilled their goals, but that for good results, it is important to match the assumptions of the abstract trust metric computation to the real-world implementation.

  13. Designing High-Trust Organizations

    DEFF Research Database (Denmark)

    Jagd, Søren

    The specific problem considered in this paper is what are the key issues to consider for managers involved in designing high-trust organizations, a design problem still not properly explored. This paper intends to take the first step in filling this lacuna. In the paper, I first present...... the existing management and research literature on building high-trust organizations. Then I explore Alan Fox’s (1974) analysis of low-trust vs. high-trust dynamics which, I argue, may serve as a theoretically stronger basis for understanding the issues management have to consider when designing hightrust...... organizations...

  14. Trust vs. Crisis

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    2014-01-01

    The three social phenomena -- norms, trust, and crisis -- are in this paper combined into one model that illustrates their function and relationship. Crisis is seen as a reaction to serious violations of expectations that leave people disoriented, insecure about situational norms, and unable...... to judge whom to trust. One logical solution to a crisis is to rebuild a shared understanding of the norms involved in any given context. Banking is used as a case. Central concepts are borrowed from Niklas Luhmann Trust (1968), Alf Ross Directives and Norms (1967), and Arthur G. Neal National Trauma...

  15. Magnetic tunnel junctions with monolayer hexagonal boron nitride tunnel barriers

    Energy Technology Data Exchange (ETDEWEB)

    Piquemal-Banci, M.; Galceran, R.; Bouzehouane, K.; Anane, A.; Petroff, F.; Fert, A.; Dlubak, B.; Seneor, P. [Unité Mixte de Physique, CNRS, Thales, Univ. Paris-Sud, Université Paris-Saclay, Palaiseau 91767 (France); Caneva, S.; Martin, M.-B.; Weatherup, R. S.; Kidambi, P. R.; Robertson, J.; Hofmann, S. [Department of Engineering, University of Cambridge, Cambridge CB21PZ (United Kingdom); Xavier, S. [Thales Research and Technology, 1 avenue Augustin Fresnel, Palaiseau 91767 (France)

    2016-03-07

    We report on the integration of atomically thin 2D insulating hexagonal boron nitride (h-BN) tunnel barriers into Co/h-BN/Fe magnetic tunnel junctions (MTJs). The h-BN monolayer is directly grown by chemical vapor deposition on Fe. The Conductive Tip Atomic Force Microscopy (CT-AFM) measurements reveal the homogeneity of the tunnel behavior of our h-BN layers. As expected for tunneling, the resistance depends exponentially on the number of h-BN layers. The h-BN monolayer properties are also characterized through integration into complete MTJ devices. A Tunnel Magnetoresistance of up to 6% is observed for a MTJ based on a single atomically thin h-BN layer.

  16. Forms, Sources and Processes of Trust

    NARCIS (Netherlands)

    Nooteboom, B.

    2006-01-01

    This chapter reviews some key points in the analysis of trust, based on Nooteboom (2002)i.The following questions are addressed.What can we have trust in?What is the relation between trust and control?What are the sources of trust? And what are its limits?By what process is trust built up and broken

  17. Variability in ACL tunnel placement: observational clinical study of surgeon ACL tunnel variability.

    Science.gov (United States)

    Wolf, Brian R; Ramme, Austin J; Wright, Rick W; Brophy, Robert H; McCarty, Eric C; Vidal, Armando R; Parker, Richard D; Andrish, Jack T; Amendola, Annunziato

    2013-06-01

    Multicenter and multisurgeon cohort studies on anterior cruciate ligament (ACL) reconstruction are becoming more common. Minimal information exists on intersurgeon and intrasurgeon variability in ACL tunnel placement. Purpose/ The purpose of this study was to analyze intersurgeon and intrasurgeon variability in ACL tunnel placement in a series of The Multicenter Orthopaedic Outcomes Network (MOON) ACL reconstruction patients and in a clinical cohort of ACL reconstruction patients. The hypothesis was that there would be minimal variability between surgeons in ACL tunnel placement. Cross-sectional study; Level of evidence, 3. Seventy-eight patients who underwent ACL reconstruction by 8 surgeons had postoperative imaging with computed tomography, and ACL tunnel location and angulation were analyzed using 3-dimensional surface processing and measurement. Intersurgeon and intrasurgeon variability in ACL tunnel placement was analyzed. For intersurgeon variability, the range in mean ACL femoral tunnel depth between surgeons was 22%. For femoral tunnel height, there was a 19% range. Tibial tunnel location from anterior to posterior on the plateau had a 16% range in mean results. There was only a small range of 4% for mean tibial tunnel location from the medial to lateral dimension. For intrasurgeon variability, femoral tunnel depth demonstrated the largest ranges, and tibial tunnel location from medial to lateral on the plateau demonstrated the least variability. Overall, surgeons were relatively consistent within their own cases. Using applied measurement criteria, 85% of femoral tunnels and 90% of tibial tunnels fell within applied literature-based guidelines. Ninety-one percent of the axes of the femoral tunnels fell within the boundaries of the femoral footprint. The data demonstrate that surgeons performing ACL reconstructions are relatively consistent between each other. There is, however, variability of average tunnel placement up to 22% of mean condylar depth

  18. Interaction between groundwater and TBM (Tunnel Boring Machine) excavated tunnels

    OpenAIRE

    Font Capó, Jordi

    2012-01-01

    A number of problems, e.g. sudden inflows are encountered during tunneling under the piezometric level, especially when the excavation crosses high transmissivity areas. These inflows may drag materials when the tunnel crosses low competent layers, resulting in subsidence, chimney formation and collapses. Moreover, inflows can lead to a decrease in head level because of aquifer drainage. Tunnels can be drilled by a tunnel boring machine (TBM) to minimize inflows and groundwater impacts, restr...

  19. Trust in prescription drug brand websites: website trust cues, attitude toward the website, and behavioral intentions.

    Science.gov (United States)

    Huh, Jisu; Shin, Wonsun

    2014-01-01

    Direct-to-consumer (DTC) prescription drug brand websites, as a form of DTC advertising, are receiving increasing attention due to the growing number and importance as an ad and a consumer information source. This study examined consumer trust in a DTC website as an important factor influencing consumers' attitude toward the website and behavioral intention. Applying the conceptual framework of website trust, the particular focus of investigation was the effect of the website trust cue factor on consumers' perceived DTC website trust and subsequent attitudinal and behavioral responses. Results show a significant relation between the website trust cue factor and consumers' perceived DTC website trust. Perceived DTC website trust, in turn, was found to be significantly associated with consumers' attitude toward the DTC website and behavioral intention.

  20. SERVANT LEADERSHIP AND ORGANIZATIONAL TRUST: THE MEDIATING EFFECT OF THE LEADER TRUST AND ORGANIZATIONAL COMMUNICATION

    Directory of Open Access Journals (Sweden)

    Morad Rezaei

    2012-01-01

    Full Text Available The purpose of this paper aims to clarify the relationship between servant leadership and organizational trust, and tries to demonstrate the mediator role of leader trust and organizational communication in this relationship. The study sample included 258 employees of Guilan province Tax Administration and for sampling we used cluster method. Previous studies have also focused on the positive impact of servant leadership in organizational trust and in this article the results show that there is a significant relationship between servant leadership, organizational trust, leader trust and organizational communication.

  1. Trust and control interrelatedness: New perspectives on the trust-control nexus in organizational relations

    NARCIS (Netherlands)

    Costa, A.C.; Bijlsma-Frankema, K.M.

    2007-01-01

    This article introduces the special issue on New Perspectives on the Trust-Control Nexus in Organizational Relations. Trust and control are interlinked processes commonly seen as key to reach effectiveness in inter- and intraorganizational relations. The relation between trust and control is,

  2. Analysis on trust influencing factors and trust model from multiple perspectives of online Auction

    Science.gov (United States)

    Yu, Wang

    2017-10-01

    Current reputation models lack the research on online auction trading completely so they cannot entirely reflect the reputation status of users and may cause problems on operability. To evaluate the user trust in online auction correctly, a trust computing model based on multiple influencing factors is established. It aims at overcoming the efficiency of current trust computing methods and the limitations of traditional theoretical trust models. The improved model comprehensively considers the trust degree evaluation factors of three types of participants according to different participation modes of online auctioneers, to improve the accuracy, effectiveness and robustness of the trust degree. The experiments test the efficiency and the performance of our model under different scale of malicious user, under environment like eBay and Sporas model. The experimental results analysis show the model proposed in this paper makes up the deficiency of existing model and it also has better feasibility.

  3. Constitutional Verbosity and Social Trust

    DEFF Research Database (Denmark)

    Bjørnskov, Christian; Voigt, Stefan

    2014-01-01

    A common argument in the trust literature is that high-trust cultures allow efficient commercial contracts to be shorter, covering fewer contingencies. We take this idea to the topic of social contracts. Specifically, we ask whether social trust affects the length and detail of constitutions. Cross......-country estimates suggest that national trust levels are indeed robustly and negatively associated with the length of countries’ constitutions....

  4. Online Consumer Trust: Trends in Research

    Directory of Open Access Journals (Sweden)

    Antonina Bauman

    2017-07-01

    Full Text Available This paper presents the literature review of studies published in 2004-2014 (Web 2.0 period in the area of consumer online trust. Based on the content analysis of 138 papers, this study highlights three major research themes: (1 trust models, (2 technological, and (3 social factors impacting online trust. It also explores topics in each major theme found in direct studies of online consumer trust. Since this literature review uses the concept-centric approach, it points out not only the major trends in research but also three understudied areas: (1 green trust, (2 trust recovery, and (3 the role of ethics in developing online trust.

  5. ITrace: An implicit trust inference method for trust-aware collaborative filtering

    Science.gov (United States)

    He, Xu; Liu, Bin; Chen, Kejia

    2018-04-01

    The growth of Internet commerce has stimulated the use of collaborative filtering (CF) algorithms as recommender systems. A CF algorithm recommends items of interest to the target user by leveraging the votes given by other similar users. In a standard CF framework, it is assumed that the credibility of every voting user is exactly the same with respect to the target user. This assumption is not satisfied and thus may lead to misleading recommendations in many practical applications. A natural countermeasure is to design a trust-aware CF (TaCF) algorithm, which can take account of the difference in the credibilities of the voting users when performing CF. To this end, this paper presents a trust inference approach, which can predict the implicit trust of the target user on every voting user from a sparse explicit trust matrix. Then an improved CF algorithm termed iTrace is proposed, which takes advantage of both the explicit and the predicted implicit trust to provide recommendations with the CF framework. An empirical evaluation on a public dataset demonstrates that the proposed algorithm provides a significant improvement in recommendation quality in terms of mean absolute error.

  6. Does Ideological Education in China Suppress Trust in Religion and Foster Trust in Government?

    Directory of Open Access Journals (Sweden)

    Ying Xie

    2017-05-01

    Full Text Available A major goal of ideological education in China is to promote loyalty to the party-state and to instill atheism among the people. How effective is this ideological education? This article examines the relationship between education and trust in government and trust in religion using data from the 2010 Chinese General Social Survey. We find that education is negatively associated with trust in government, while positively related to trust in religion. Our findings suggest that policies aimed at displacing religion in favor of the Communist ideology have largely failed to shape the public mindset; rather, the more educated, the more people tend to trust religion instead of the government.

  7. Towards trusted tradelanes

    NARCIS (Netherlands)

    Hulstijn, Joris; Hofman, W.; Zomer, G.; Tan, Yao-Hua; Scholl, H. J.; Glassey, O.; Janssen, M.

    Customs administrations are exploring system-based approaches to regulatory supervision, taking the entire set of controls in a process into account. In addition to Trusted Traders, which are recognized by a certification process, customs are considering to identify so called Trusted Trade Lanes:

  8. Trust us Trust Thorp Campaign

    International Nuclear Information System (INIS)

    Kane, John

    1995-01-01

    The history of the nuclear industry in the UK has been dominated by Sellafield reprocessing site in west Cumbria. The site, formerly owned by the United Kingdom Atomic Energy Authority was transferred to the newly-formed British Nuclear Fuels plc in 1971. Although trade union representation existed at Sellafield before the emergence of BNFL, it is only after this date that collective trade union activity began to emerge. In 1977, after a long running dispute with management about the issue of radiation dose uptake, the workforce went on strike, forcing the management to question their previous 'need to know' attitude and to improve industrial relations. In 1984, it was recognised that the lobbying influence of trade unions within politics, and especially the Labour party could be used to greater effect to challenge potentially -damaging influence of anti-nuclear campaigners. The National Campaign for the Nuclear Industry (NCNI) was born, combining nine industrial and non-industrial trade unions within the nuclear industry. Its task during the last ten years has been to put forward the interests of its members collectively and to secure the, role of nuclear power. within a balanced energy policy in the political arena. In dome so, it has gained a credible voice within both the trade union movement and the Labour party. The new Thermal Oxide Reprocessing Plant (THORP) received strong support from the NCNI during its construction and commissioning phases. When it became clear that the anti-nuclear lobby had gained the upper hand and were beginning to seriously delay the necessary legal instruments required to start the plant, the power of collective action was once again recognised, and the TRUST US campaign was born. The campaign was run and organised by a clerks committee and fronted by the Trade Unions at Sellafield., and turned out to be one of the most successful] trade union campaigns in recent history. The first task involved getting, the entire workforce on

  9. Frequency driven inversion of tunnel magnetoimpedance and observation of positive tunnel magnetocapacitance in magnetic tunnel junctions

    International Nuclear Information System (INIS)

    Parui, Subir; Ribeiro, Mário; Atxabal, Ainhoa; Llopis, Roger; Bedoya-Pinto, Amilcar; Sun, Xiangnan; Casanova, Fèlix; Hueso, Luis E.

    2016-01-01

    The relevance for modern computation of non-volatile high-frequency memories makes ac-transport measurements of magnetic tunnel junctions (MTJs) crucial for exploring this regime. Here, we demonstrate a frequency-mediated effect in which the tunnel magnetoimpedance reverses its sign in a classical Co/Al 2 O 3 /NiFe MTJ, whereas we only observe a gradual decrease in the tunnel magnetophase. Such effects are explained by the capacitive coupling of a parallel resistor and capacitor in the equivalent circuit model of the MTJ. Furthermore, we report a positive tunnel magnetocapacitance effect, suggesting the presence of a spin-capacitance at the two ferromagnet/tunnel-barrier interfaces. Our results are important for understanding spin transport phenomena at the high frequency regime in which the spin-polarized charge accumulation due to spin-dependent penetration depth at the two interfaces plays a crucial role.

  10. Frequency driven inversion of tunnel magnetoimpedance and observation of positive tunnel magnetocapacitance in magnetic tunnel junctions

    Energy Technology Data Exchange (ETDEWEB)

    Parui, Subir, E-mail: s.parui@nanogune.eu, E-mail: l.hueso@nanogune.eu; Ribeiro, Mário; Atxabal, Ainhoa; Llopis, Roger [CIC nanoGUNE, 20018 Donostia-San Sebastian (Spain); Bedoya-Pinto, Amilcar [CIC nanoGUNE, 20018 Donostia-San Sebastian (Spain); Max Planck Institute of Microstructure Physics, D-06120 Halle (Germany); Sun, Xiangnan [CIC nanoGUNE, 20018 Donostia-San Sebastian (Spain); National Center for Nanoscience and Technology, 100190 Beijing (China); Casanova, Fèlix; Hueso, Luis E., E-mail: s.parui@nanogune.eu, E-mail: l.hueso@nanogune.eu [CIC nanoGUNE, 20018 Donostia-San Sebastian (Spain); IKERBASQUE, Basque Foundation for Science, 48011 Bilbao (Spain)

    2016-08-01

    The relevance for modern computation of non-volatile high-frequency memories makes ac-transport measurements of magnetic tunnel junctions (MTJs) crucial for exploring this regime. Here, we demonstrate a frequency-mediated effect in which the tunnel magnetoimpedance reverses its sign in a classical Co/Al{sub 2}O{sub 3}/NiFe MTJ, whereas we only observe a gradual decrease in the tunnel magnetophase. Such effects are explained by the capacitive coupling of a parallel resistor and capacitor in the equivalent circuit model of the MTJ. Furthermore, we report a positive tunnel magnetocapacitance effect, suggesting the presence of a spin-capacitance at the two ferromagnet/tunnel-barrier interfaces. Our results are important for understanding spin transport phenomena at the high frequency regime in which the spin-polarized charge accumulation due to spin-dependent penetration depth at the two interfaces plays a crucial role.

  11. Towards Trust-based Cognitive Networks: A Survey of Trust Management for Mobile Ad Hoc Networks

    Science.gov (United States)

    2009-06-01

    of trust. First, social trust refers to properties derived from social relationships . Examples of social networks are strong social ... relationships such as colleagues or relatives or loose social relationships such as school alumni or friends with common interests [44]. Social trust may...also use social relationships in evaluating the trust metric among group members by employing the concept of social networks. Yu et al. [44] define

  12. Carpal Tunnel Syndrome

    Science.gov (United States)

    ... a passing cramp? It could be carpal tunnel syndrome. The carpal tunnel is a narrow passageway of ... three times more likely to have carpal tunnel syndrome than men. Early diagnosis and treatment are important ...

  13. Theory of superconducting tunneling without the tunneling Hamiltonian

    International Nuclear Information System (INIS)

    Arnold, G.B.

    1987-01-01

    When a tunneling barrier is nearly transparent, the standard tunneling (or transfer) Hamiltonian approximation fails. The author describes the theory which is necessary for calculating the tunneling current in these cases, and illustrate it by comparing theory and experiment on superconductor/insulator/superconductor (SIS) junctions have ultra-thin tunnel barriers. This theory accurately explains the subgap structure which appears in the dynamical resistance of such SIS junctions, including many observed details which no previous theory has reproduced. The expression for the current through an SIS junction with an ultrathin barrier is given by I(t) = Re{Sigma/sub n/ J/sub n/ (omega/sub o/)e/sup in omega/o/sup t/} where omega/sub o/ = 2eV/h is the Josephson frequency, V is the bias voltage, and the J/sub n/ are voltage dependent coefficients, one for each positive or negative integer, n, and n=0. The relative sign of the terms involving cos(n omega/sub o/t) and sin(n omega/sub o/t) agrees with experiment, in contrast to previous theories of Josephson tunneling

  14. Trust vs. Crisis

    Directory of Open Access Journals (Sweden)

    Kirsten Mogensen

    2014-06-01

    Full Text Available The three social phenomena -- norms, trust, and crisis -- are in this paper combined into one model that illustrates their function and relationship. Crisis is seen as a reaction to serious violations of expectations that leave people disoriented, insecure about situational norms, and unable to judge whom to trust. One logical solution to a crisis is to rebuild a shared understanding of the norms involved in any given context. Banking is used as a case. Central concepts are borrowed from Niklas Luhmann Trust (1968, Alf Ross Directives and Norms (1967, and Arthur G. Neal National Trauma & Collective Memory (1998.

  15. Trust and Credit

    DEFF Research Database (Denmark)

    Harste, Gorm

    The present paper is an answer to the question, how did trust and credit emerge. The systems of trust and credit reduce the environmental and contextual complexities in which trust and credit are embedded. The paper analyses the forms of this reduction in a number of stages in the evolution...... of history from the present risk of modern systems back to early modernity, the Reformation and the high medieval Revolutions in law, organization and theology. It is not a history of economics, but a history of the conditions of some communication codes used in economic systems....

  16. Trust Transitivity in Social Networks

    OpenAIRE

    Richters, Oliver; Peixoto, Tiago P.

    2011-01-01

    Non-centralized recommendation-based decision making is a central feature of several social and technological processes, such as market dynamics, peer-to-peer file-sharing and the web of trust of digital certification. We investigate the properties of trust propagation on networks, based on a simple metric of trust transitivity. We investigate analytically the percolation properties of trust transitivity in random networks with arbitrary in/out-degree distributions, and compare with numerical...

  17. Extending trust to immigrants: Generalized trust, cross-group friendship and anti-immigrant sentiments in 21 European societies.

    Directory of Open Access Journals (Sweden)

    Meta van der Linden

    Full Text Available The aim of this study is twofold. First, we expand on the literature by testing whether generalized trust is negatively related to anti-immigrant sentiments in Europe. Second, we examine to what extent the relation between generalized trust and anti-immigrant sentiments is dependent upon cross-group friendships. We apply multilevel linear regression modeling to representative survey data enriched with levels of ethnic diversity covering 21 European countries. Results show that both generalized trust and cross-group friendship are negatively related to anti-immigrant sentiments. However, there is a negligible positive relation between generalized trust and cross-group friendship (r = .10, and we can clearly observe that they operate independently from one another. Hence, trusting actors are not more likely to form more cross-group friendships, and cross-group friendship do not lead to the development of more generalized trust. Instead, the findings show that generalized trust leads immigrants too to be included in the radius of trusted others and, as a consequence, the benign effects of generalized trust apply to them as well. We conclude that the strength of generalized trust is a form of generalization, beyond the confines of individual variations in intergroup experiences.

  18. Cancer patients’ trust in their oncologist

    NARCIS (Netherlands)

    Hillen, M.A.

    2013-01-01

    In this thesis we aimed to unravel cancer patients’ trust in their oncologist. We investigated patients’ explanations of trust in-depth, and developed an oncology-specific questionnaire to assess trust. Using the resulting Trust in Oncologist Scale, we experimentally established the influence of

  19. The Determinants of Trust

    DEFF Research Database (Denmark)

    Bjørnskov, Christian

    , in particular emphasizing the role of social trust. This is in turn defined as the confidence people have that strangers, i.e. fellow citizens on whom they have no specific information, will not take advantage of them (Uslaner, 2002; Bjørnskov, 2006). Using the answers to the World Values Survey question “In...... general, do you think that most people can be trusted?”, the by now quite substantial literature has found that social trust is associated with a set of different macroeconomic outcomes: economic growth, the rule of law and overall quality of governance, corruption, education, the extent of violent crime...... and subjective well-being are all influenced by the propensity of people within any nation to trust each other. The questions are therefore where trust comes from and whether or not it can be affected by public policy. The answers to these questions seem to divide researchers into two camps: the optimists...

  20. Trust-Based Leadership in the Making

    DEFF Research Database (Denmark)

    Bentzen, Tina Øllgaard; Jagd, Søren

    I spite of the popularity of trust-based leadership in consultancy and popular management writings empirical research on the transformation from traditional top-down to trust-based leadership is still limited. In this paper we study the implementation of a trust-based leadership reform in the City...... of Copenhagen taking place since 2012. We focus on understanding the trust dynamics in this major transformation. We show that the implementation of trust-based leadership should be seen as an emergent process involving a variety of actors within the organization. The case study reveals that the Trust Reform...... indicates that the implementation of a radical management reform involves a complex interplay of trust relations between actors at multiple levels of the organization....

  1. Tunneling works. Tunnel koji

    Energy Technology Data Exchange (ETDEWEB)

    Higo, M [Hazam Gumi, Ltd., Tokyo (Japan)

    1991-10-25

    A mountain tunneling method for rock-beds used to be applied mainly to construction works in the mountains under few restrictions by environmental problems. However, construction works near residential sreas have been increasing. There are such enviromental problems due to tunneling works as vibration, noise, lowering of ground-water level, and influences on other structures. This report mainly describes the measurement examples of vibration and noise accompanied with blasting and the effects of the measures to lessen such influences. When the tunneling works for the railroad was carried out on the natural ground mainly composed of basalt, vibration of the test blasting was measured at three stations with piezoelectric accelerometers. Then, ordinary blasting, mutistage blasting, and ABM blasting methods were used properly besed on the above results, and only a few complaints were made. In the different works, normal noise and low-frequency sound were mesured at 22 stations around the pit mouth. As countermeasures for noise, sound-proof sheets, walls, and single and double doors were installed and foundto be effective. 1 ref., 6 figs., 1 tab.

  2. Do Reputation Systems Undermine Trust? Divergent Effects of Enforcement Type on Generalized Trust and Trustworthiness.

    Science.gov (United States)

    Kuwabara, Ko

    2015-03-01

    Research shows that enforcing cooperation using contracts or tangible sanctions can backfire, undermining people's intrinsic motivation to cooperate: when the enforcement is removed, people are less trusting or trustworthy than when there is no enforcement to begin with. The author examines whether reputation systems have similar consequences for generalized trust and trustworthiness. Using a web-based experiment simulating online market transactions (studies 1 and 2), he shows that reputation systems can reinforce generalized trust and trustworthiness, unlike contractual enforcement or relational enforcement based on repeated interactions. In a survey experiment (study 3), he finds that recalling their eBay feedback scores made participants more trusting and trustworthy. These results are predicated on the diffuse nature of reputational enforcement to reinforce perceptions of trust and trustworthiness. These results have implications for understanding how different forms of governance affect generalized trust and trustworthiness.

  3. Trust It or Trash It?

    Science.gov (United States)

    Trust It or Trash It? About | Contact | Español Tab 1 Tab 2 What is Trust It or Trash It? This is a tool ... be true, it may be. (See the second “Trust it” statement above). Click on each element below ...

  4. Modelling biased human trust dynamics

    NARCIS (Netherlands)

    Hoogendoorn, M.; Jaffry, S.W.; Maanen, P.P. van; Treur, J.

    2013-01-01

    Abstract. Within human trust related behaviour, according to the literature from the domains of Psychology and Social Sciences often non-rational behaviour can be observed. Current trust models that have been developed typically do not incorporate non-rational elements in the trust formation

  5. Trusting Relationships in International Politics

    DEFF Research Database (Denmark)

    Keating, Vincent Charles; Ruzicka, Jan

    2014-01-01

    How can trusting relationships be identified in international politics? The recent wave of scholarship on trust in International Relations answers this question by looking for one or the combination of three indicators – the incidence of cooperation; discourses expressing trust; or the calculated...

  6. Racial and Religious Discrimination in Charitable Trusts: A Current Analysis of Constitutional and Trust Law Solutions

    Science.gov (United States)

    Adams, Roy M.

    1976-01-01

    The process by which constitutional and trust law have blended together in the charitable trust field is examined. Focus is on whether a settlor can expect racial and religious restrictions in a charitable trust to be allowed, how to deal with them if they are, and what happens to the trust property if they are not. (LBH)

  7. African migrant patients' trust in Chinese physicians: a social ecological approach to understanding patient-physician trust.

    Science.gov (United States)

    McLaughlin, Megan M; Simonson, Louis; Zou, Xia; Ling, Li; Tucker, Joseph D

    2015-01-01

    Patient trust in physicians is a critical determinant of health seeking behaviors, medication adherence, and health outcomes. A crisis of interpersonal trust exists in China, extending throughout multiple social spheres, including the healthcare system. At the same time, with increased migration from Africa to China in the last two decades, Chinese physicians must establish mutual trust with an increasingly diverse patient population. We undertook a qualitative study to identify factors affecting African migrants' trust in Chinese physicians and to identify potential mechanisms for promoting trust. We conducted semi-structured, in-depth interviews with 40 African migrants in Guangzhou, China. A modified version of the social ecological model was used as a theoretical framework. At the patient-physician level, interpersonal treatment, technical competence, perceived commitment and motive, and language concordance were associated with enhanced trust. At the health system level, two primary factors influenced African migrants' trust in their physicians: the fee-for-service payment system and lack of continuity with any one physician. Patients' social networks and the broader socio-cultural context of interactions between African migrants and Chinese locals also influenced patients' trust of their physicians. These findings demonstrate the importance of factors beyond the immediate patient-physician interaction and suggest opportunities to promote trust through health system interventions.

  8. African migrant patients' trust in Chinese physicians: a social ecological approach to understanding patient-physician trust.

    Directory of Open Access Journals (Sweden)

    Megan M McLaughlin

    Full Text Available Patient trust in physicians is a critical determinant of health seeking behaviors, medication adherence, and health outcomes. A crisis of interpersonal trust exists in China, extending throughout multiple social spheres, including the healthcare system. At the same time, with increased migration from Africa to China in the last two decades, Chinese physicians must establish mutual trust with an increasingly diverse patient population. We undertook a qualitative study to identify factors affecting African migrants' trust in Chinese physicians and to identify potential mechanisms for promoting trust.We conducted semi-structured, in-depth interviews with 40 African migrants in Guangzhou, China. A modified version of the social ecological model was used as a theoretical framework. At the patient-physician level, interpersonal treatment, technical competence, perceived commitment and motive, and language concordance were associated with enhanced trust. At the health system level, two primary factors influenced African migrants' trust in their physicians: the fee-for-service payment system and lack of continuity with any one physician. Patients' social networks and the broader socio-cultural context of interactions between African migrants and Chinese locals also influenced patients' trust of their physicians.These findings demonstrate the importance of factors beyond the immediate patient-physician interaction and suggest opportunities to promote trust through health system interventions.

  9. Trust matters: Patients' and providers' accounts of the role of trust in ...

    African Journals Online (AJOL)

    Kahabi Isangula

    Conclusion: The findings suggest that trust in patient-doctor relationship ... Improving trust in the patient - doctor relationship may be one of the important lenses ...... World Bank. (2015) Country and Lending Groups. (Internet). Available at.

  10. Towards Trust Engineering for Opportunistic Cloud Services

    DEFF Research Database (Denmark)

    Kuada, Eric

    2014-01-01

    The systematic review methodology has been employed to review trust related studies in cloud computing. It was observed that trusted computing technologies and reputation based approaches are the main approaches to trust engineering in cloud computing. Also, trusted third party approaches...... and the deployment model play a significant role in enhancing trust between service providers and consumers. It was observed that the concept of trust is used loosely without any formal specification in cloud computing discussions and trust engineering in general. As a first step towards addressing this problem, we...... have contextualized the formal trust specification in multi-agent environments for cloud computing....

  11. Computationally Modeling Interpersonal Trust

    Directory of Open Access Journals (Sweden)

    Jin Joo eLee

    2013-12-01

    Full Text Available We present a computational model capable of predicting—above human accuracy—the degree of trust a person has toward their novel partner by observing the trust-related nonverbal cues expressed in their social interaction. We summarize our prior work, in which we identify nonverbal cues that signal untrustworthy behavior and also demonstrate the human mind’s readiness to interpret those cues to assess the trustworthiness of a social robot. We demonstrate that domain knowledge gained from our prior work using human-subjects experiments, when incorporated into the feature engineering process, permits a computational model to outperform both human predictions and a baseline model built in naivete' of this domain knowledge. We then present the construction of hidden Markov models to incorporate temporal relationships among the trust-related nonverbal cues. By interpreting the resulting learned structure, we observe that models built to emulate different levels of trust exhibit different sequences of nonverbal cues. From this observation, we derived sequence-based temporal features that further improve the accuracy of our computational model. Our multi-step research process presented in this paper combines the strength of experimental manipulation and machine learning to not only design a computational trust model but also to further our understanding of the dynamics of interpersonal trust.

  12. Tunneling junction as an open system. Normal tunneling

    International Nuclear Information System (INIS)

    Ono, Y.

    1978-01-01

    The method of the tunneling Hamiltonian is reformulated in the case of normal tunneling by introducing two independent particle baths. Due to the baths, it becomes possible to realize a final stationary state where the electron numbers of the two electrodes in the tunneling system are maintained constant and where there exists a stationary current. The effect of the bath-system couplings on the current-voltage characteristics of the junction is discussed in relation to the usual expression of the current as a function of voltage. (Auth.)

  13. Organizational trust or beyond appearances

    Directory of Open Access Journals (Sweden)

    Maria Dromereschi

    2010-12-01

    Full Text Available People and organizations to whom I am giving life to have an enormous need to trust and be trustworthy. Trust represents a fragile asset who needs to be invested in, which is difficult to obtain and takes time to obtain it, but which can be easily broken. Paradoxically, it is a universal trade currency, world-widely understood and appreciated. The relations based on trust are those which determine a company to grow and create a competitive advantage. Trust generates trust. It is the one that inspires and motivates, requires the preservation of a certain set of values, mainly sincerity, fairness, perseverance and a real preoccupation for meeting the needs of other people.

  14. Trust in health information websites: A systematic literature review on the antecedents of trust.

    Science.gov (United States)

    Kim, Yeolib

    2016-06-01

    Health websites are important sources of information for consumers. In choosing websites, trust in websites largely determines which website to access and how to best utilize the information. Thus, it is critical to understand why consumers trust certain websites and distrust others. A systematic literature review was conducted with the goal of identifying the antecedents of trust in health information websites. After four rounds of screening process, 20 articles between 2000 and 2013 were harvested. Factors that determine trust are classified into individual difference antecedents, website-related antecedents, and consumer-to-website interaction-related antecedents. The most frequently studied antecedents were socio-demographics, information quality, appearance, and perceived reputation of the website. Each antecedent of trust are discussed in detail and future research directions are proposed. © The Author(s) 2014.

  15. Social Capital, Institutions and Trust

    NARCIS (Netherlands)

    Nooteboom, B.

    2006-01-01

    This paper analyzes the relations between social capital, institutions and trust.These concepts are full of ambiguity and confusion.This paper attempts to dissolve some of the confusion, by distinguishing trust and control, and analyzing institutional and relational conditions of trust.It presents a

  16. Trust and Social Commerce

    OpenAIRE

    Julia Y. Lee

    2016-01-01

    Internet commerce has transformed the marketing of goods and services. The separation between point of sale and seller, and the presence of geographically dispersed sellers who do not engage in repeated transactions with the same customers challenge traditional mechanisms for building the trust required for commercial exchanges. In this changing environment, legal rules and institutions play a diminished role in building trust. Instead, new systems and methods are emerging to foster trust in ...

  17. Tunneling time, exit time and exit momentum in strong field tunnel ionization

    International Nuclear Information System (INIS)

    Teeny, Nicolas

    2016-01-01

    Tunnel ionization belongs to the fundamental processes of atomic physics. It is still an open question when does the electron tunnel ionize and how long is the duration of tunneling. In this work we solve the time-dependent Schroedinger equation in one and two dimensions and use ab initio quantum calculations in order to answer these questions. Additionally, we determine the exit momentum of the tunnel ionized electron from first principles. We find out results that are different from the assumptions of the commonly employed two-step model, which assumes that the electron ionizes at the instant of electric field maximum with a zero momentum. After determining the quantum final momentum distribution of tunnel ionized electrons we show that the two-step model fails to predict the correct final momentum. Accordingly we suggest how to correct the two-step model. Furthermore, we determine the instant at which tunnel ionization starts, which turns out to be different from the instant usually assumed. From determining the instant at which it is most probable for the electron to enter the tunneling barrier and the instant at which it exits we determine the most probable time spent under the barrier. Moreover, we apply a quantum clock approach in order to determine the duration of tunnel ionization. From the quantum clock we determine an average tunneling time which is different in magnitude and origin with respect to the most probable tunneling time. By defining a probability distribution of tunneling times using virtual detectors we relate both methods and explain the apparent discrepancy. The results found have in general an effect on the interpretation of experiments that measure the spectra of tunnel ionized electrons, and specifically on the calibration of the so called attoclock experiments, because models with imprecise assumptions are usually employed in order to interpret experimental results.

  18. Tunneling time, exit time and exit momentum in strong field tunnel ionization

    Energy Technology Data Exchange (ETDEWEB)

    Teeny, Nicolas

    2016-10-18

    Tunnel ionization belongs to the fundamental processes of atomic physics. It is still an open question when does the electron tunnel ionize and how long is the duration of tunneling. In this work we solve the time-dependent Schroedinger equation in one and two dimensions and use ab initio quantum calculations in order to answer these questions. Additionally, we determine the exit momentum of the tunnel ionized electron from first principles. We find out results that are different from the assumptions of the commonly employed two-step model, which assumes that the electron ionizes at the instant of electric field maximum with a zero momentum. After determining the quantum final momentum distribution of tunnel ionized electrons we show that the two-step model fails to predict the correct final momentum. Accordingly we suggest how to correct the two-step model. Furthermore, we determine the instant at which tunnel ionization starts, which turns out to be different from the instant usually assumed. From determining the instant at which it is most probable for the electron to enter the tunneling barrier and the instant at which it exits we determine the most probable time spent under the barrier. Moreover, we apply a quantum clock approach in order to determine the duration of tunnel ionization. From the quantum clock we determine an average tunneling time which is different in magnitude and origin with respect to the most probable tunneling time. By defining a probability distribution of tunneling times using virtual detectors we relate both methods and explain the apparent discrepancy. The results found have in general an effect on the interpretation of experiments that measure the spectra of tunnel ionized electrons, and specifically on the calibration of the so called attoclock experiments, because models with imprecise assumptions are usually employed in order to interpret experimental results.

  19. Consumer Trust in E-commerce

    OpenAIRE

    Gustavsson, Malin; Johansson, Anne-Marie

    2006-01-01

    An often mentioned reason for consumers not purchasing from Internet vendors, is the lack of trust. The lack of physical clues and physical interaction in the online environment make it more difficult to establish trust with the consumers. So, it is important for companies to learn how to manage consumers’ trust in e-commerce. Although, building consumer trust on the Internet is a challenge for online vendors. The purpose with this dissertation was to get a better understanding of consumer t...

  20. Quantum theory of tunneling

    CERN Document Server

    Razavy, Mohsen

    2014-01-01

    In this revised and expanded edition, in addition to a comprehensible introduction to the theoretical foundations of quantum tunneling based on different methods of formulating and solving tunneling problems, different semiclassical approximations for multidimensional systems are presented. Particular attention is given to the tunneling of composite systems, with examples taken from molecular tunneling and also from nuclear reactions. The interesting and puzzling features of tunneling times are given extensive coverage, and the possibility of measurement of these times with quantum clocks are critically examined. In addition by considering the analogy between evanescent waves in waveguides and in quantum tunneling, the times related to electromagnetic wave propagation have been used to explain certain aspects of quantum tunneling times. These topics are treated in both non-relativistic as well as relativistic regimes. Finally, a large number of examples of tunneling in atomic, molecular, condensed matter and ...

  1. Trusted Computing Technologies, Intel Trusted Execution Technology.

    Energy Technology Data Exchange (ETDEWEB)

    Guise, Max Joseph; Wendt, Jeremy Daniel

    2011-01-01

    We describe the current state-of-the-art in Trusted Computing Technologies - focusing mainly on Intel's Trusted Execution Technology (TXT). This document is based on existing documentation and tests of two existing TXT-based systems: Intel's Trusted Boot and Invisible Things Lab's Qubes OS. We describe what features are lacking in current implementations, describe what a mature system could provide, and present a list of developments to watch. Critical systems perform operation-critical computations on high importance data. In such systems, the inputs, computation steps, and outputs may be highly sensitive. Sensitive components must be protected from both unauthorized release, and unauthorized alteration: Unauthorized users should not access the sensitive input and sensitive output data, nor be able to alter them; the computation contains intermediate data with the same requirements, and executes algorithms that the unauthorized should not be able to know or alter. Due to various system requirements, such critical systems are frequently built from commercial hardware, employ commercial software, and require network access. These hardware, software, and network system components increase the risk that sensitive input data, computation, and output data may be compromised.

  2. Trust models in ubiquitous computing.

    Science.gov (United States)

    Krukow, Karl; Nielsen, Mogens; Sassone, Vladimiro

    2008-10-28

    We recapture some of the arguments for trust-based technologies in ubiquitous computing, followed by a brief survey of some of the models of trust that have been introduced in this respect. Based on this, we argue for the need of more formal and foundational trust models.

  3. Incremental Trust in Grid Computing

    DEFF Research Database (Denmark)

    Brinkløv, Michael Hvalsøe; Sharp, Robin

    2007-01-01

    This paper describes a comparative simulation study of some incremental trust and reputation algorithms for handling behavioural trust in large distributed systems. Two types of reputation algorithm (based on discrete and Bayesian evaluation of ratings) and two ways of combining direct trust and ...... of Grid computing systems....

  4. 26 CFR 301.7701-4 - Trusts.

    Science.gov (United States)

    2010-04-01

    ... remediation trust if the organization is organized under state law as a trust; the primary purpose of the... federal, state, or local environmental laws; all contributors to the trust have (at the time of... federal, state, or local environmental laws for environmental remediation of the waste site; and the trust...

  5. Trust Management - Building Trust for International Cross Disciplinary Collaboration on Climate Change

    Science.gov (United States)

    Oakley, K. V.; Gurney, R. J.

    2014-12-01

    Successful communication and collaboration entails mutual understanding, and transfer, of information. The risk of misunderstanding and/or miscommunication between collaborating groups is tackled in different ways around the globe; some are well documented whereas others may be unknown outside particular groups, whether defined geographically or by specialism. For example; in some countries legally binding contracts define the terms of collaboration. Some regions place greater emphasis on developing trust relationships, and sometimes an official agreement is implied, such as many electronic data transfers on the web. International collaboration on climate change increasingly involves electronic data exchange (e.g. open access publications, shared documents, data repositories etc.) and with this increased reliance on electronic data a need has arisen for scientists to collaborate both internationally and cross-disciplinarily particularly with information technology and data management specialists. Trust of data and metadata on the internet (e.g. privacy, legitimacy etc.) varies, possibly due to a lack of internationally agreed standards for data governance and management, leaving many national, regional and institutional practices tailored to the needs of that group only. It is proposed that building trust relationships between cross-disciplinary and international groups could help facilitate further communication, understanding and benefits from the relationship, while still maintaining independence as separate groups. Complex international cross-disciplinary group relationship dynamics are not easily mapped and producing a set of trust building rules that can be applied to any current and future collaboration with equal validity may be unfeasible. An alternative to such a set of rules may be found in a Trust Manager, whose role is to improve mutually beneficial knowledge exchange between groups, build trust and increase future collaborative potential. This

  6. The Idea of Dialogue, Trust and Reconciliation in the Pilgrimage of Trust on Earth

    Directory of Open Access Journals (Sweden)

    Katarzyńska Agnieszka

    2016-12-01

    Full Text Available The purpose of this article is to present the Pilgrimage of Trust on Earth organized by the brothers of Taizé Community as an event building a relationship of dialogue, trust and reconciliation between nations and cultures. The article features an in-depth discussion of the elements of youth meetings and their impact on developing an attitude of dialogue and trust. We will briefly discuss the means used by the brothers to develop a dialogue between people, as well as the methods of spreading the idea of dialogue, trust and solidarity in interpersonal and international relations.

  7. A Hybrid Artificial Reputation Model Involving Interaction Trust, Witness Information and the Trust Model to Calculate the Trust Value of Service Providers

    Directory of Open Access Journals (Sweden)

    Gurdeep Singh Ransi

    2014-02-01

    Full Text Available Agent interaction in a community, such as the online buyer-seller scenario, is often uncertain, as when an agent comes in contact with other agents they initially know nothing about each other. Currently, many reputation models are developed that help service consumers select better service providers. Reputation models also help agents to make a decision on who they should trust and transact with in the future. These reputation models are either built on interaction trust that involves direct experience as a source of information or they are built upon witness information also known as word-of-mouth that involves the reports provided by others. Neither the interaction trust nor the witness information models alone succeed in such uncertain interactions. In this paper we propose a hybrid reputation model involving both interaction trust and witness information to address the shortcomings of existing reputation models when taken separately. A sample simulation is built to setup buyer-seller services and uncertain interactions. Experiments reveal that the hybrid approach leads to better selection of trustworthy agents where consumers select more reputable service providers, eventually helping consumers obtain more gains. Furthermore, the trust model developed is used in calculating trust values of service providers.

  8. Suspicion, Trust, and Automation

    Science.gov (United States)

    2017-01-08

    Pool (IPIP; Goldberg et al., 2006; 87). A sample item is “I trust others.” Each propensity to trust item was assessed on a 7-point scale from 1...1754-6 Goldberg , L. R., Johnson, J. A., Eber, H. W., Hogan, R., Ashton, M. C., Cloninger, C. R., & Gough, H. C. (2006). The International...trust decision. When examining software inspections, Porter, et al. [6] identified one of the causes of variation in the outcome of the inspection

  9. Trust, Behavior, and High School Outcomes

    Science.gov (United States)

    Romero, Lisa S.

    2015-01-01

    Purpose: The purpose of this paper is to contribute to the literature on student trust and to examine the relationship between student trust, behavior, and academic outcomes in high school. It asks, first, does trust have a positive effect on high school outcomes? Second, does trust influence student behavior, exerting an indirect effect on…

  10. Trust, Endangerment and Divine Vulnerability

    DEFF Research Database (Denmark)

    Christoffersen, Mikkel Gabriel

    2017-01-01

    Faith is trusting God in the midst of endangerment. Yet, human experience of excessive suffering has challenged any spontaneous trust in God. In this article, I reconsider the idea of faith as trust in God, adding an emphasis on the divine vulnerability in the incarnation, and I develop a more...

  11. Spin-dependent tunnelling in magnetic tunnel junctions

    International Nuclear Information System (INIS)

    Tsymbal, Evgeny Y; Mryasov, Oleg N; LeClair, Patrick R

    2003-01-01

    The phenomenon of electron tunnelling has been known since the advent of quantum mechanics, but continues to enrich our understanding of many fields of physics, as well as creating sub-fields on its own. Spin-dependent tunnelling (SDT) in magnetic tunnel junctions (MTJs) has recently aroused enormous interest and has developed in a vigorous field of research. The large tunnelling magnetoresistance (TMR) observed in MTJs garnered much attention due to possible applications in non-volatile random-access memories and next-generation magnetic field sensors. This led to a number of fundamental questions regarding the phenomenon of SDT. In this review article we present an overview of this field of research. We discuss various factors that control the spin polarization and magnetoresistance in MTJs. Starting from early experiments on SDT and their interpretation, we consider thereafter recent experiments and models which highlight the role of the electronic structure of the ferromagnets, the insulating layer, and the ferromagnet/insulator interfaces. We also discuss the role of disorder in the barrier and in the ferromagnetic electrodes and their influence on TMR. (topical review)

  12. 12 CFR 7.2022 - Voting trusts.

    Science.gov (United States)

    2010-01-01

    ... Practices § 7.2022 Voting trusts. The shareholders of a national bank may establish a voting trust under the applicable law of a state selected by the participants and designated in the trust agreement, provided the... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Voting trusts. 7.2022 Section 7.2022 Banks and...

  13. Heuritic Trust in IoT

    DEFF Research Database (Denmark)

    Kaur, Bipjeet; Tange, Henrik

    2015-01-01

    Increasing use of Internet of things in diverse fields has demanding association in security and trust of such services. The trust on the services cannot exist independent. It is greatly depended on the security of system at each layer. In this paper we analyze different existing trust algorithms...... to develop a combined reputation and trust algorithm. This algorithm is developed in view of developing trustworthy services in the agriculture field where the end users are cautious about their sensitive data but keen in trustworthy services to improve the efficiency of the product....

  14. Mediating Trust in Terrorism Coverage

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    crisis. While the framework is presented in the context of television coverage of a terror-related crisis situation, it can equally be used in connection with all other forms of mediated trust. Key words: National crisis, risk communication, crisis management, television coverage, mediated trust.......Mass mediated risk communication can contribute to perceptions of threats and fear of “others” and/or to perceptions of trust in fellow citizens and society to overcome problems. This paper outlines a cross-disciplinary holistic framework for research in mediated trust building during an acute...

  15. Governance, Trust, and Taxes

    OpenAIRE

    Schrøter Joensen, Juanna; Weihe, Guðrið

    2013-01-01

    This paper examines the role of social capital (trust) vis-à-vis the propensity of a country to be a tax haven. The empirical analysis corroborates that better governed countries have a higher ceteris paribus probability to be tax havens. However, social capital counteracts the effect of governance quality. This effect is so strong that the partial effect of governance quality is reversed for countries with the trust index in the top quartile – making these high trust countries le...

  16. Analyzing Trust Perceptions in System Implementations

    DEFF Research Database (Denmark)

    Schlichter, Bjarne Rerup; Rose, Jeremy

    2009-01-01

    ' perceptions of trust relations influence future actions, and in this way have both negative and positive consequences. We also conclude that Giddens' theories of trust provide a promising insight into the dynamic aspects of trust relations in implementation projects, which go further than trust theories...... a framework based on Giddens´ theory of modernity. The framework theorizes dynamic elements of the evolution of trust, not previously investigated in this context. The data collection involves 4 actors interviewed twice in 2006 and 2007; and the data analysis strategy is content analysis using Nvivo software...

  17. Trust and the sociology of the professions.

    OpenAIRE

    Groenewegen, P.P.

    2006-01-01

    There is a fast-growing literature on trust in health care, especially interpersonal trust, reflecting the growing awareness in both the research and policy communities of the importance of trust. At a general level, trust as part of the broader concept of social capital is related to people's health and well-being. Trust within provider-patient relations is important for its non-specific treatment effects. Finally, trust is also important for the snooth functioning of societal institutions.(...

  18. Obtaining corporate information from NHS foundation trusts.

    Science.gov (United States)

    Woodward, Valerie; Endacott, Ruth; Sheaff, Rod; Jones, Ray

    Foundation trusts have boards of directors that are responsible for the day-to-day running of the organisation, planning services and developing strategy. Unlike non-foundation trusts and primary care trusts (PCTs), foundation trusts are not obliged to hold directors' board meetings in public. This article describes the online availability and accessibility of the minutes of such meetings in a number of foundation trusts, non-foundation trusts and PCTs. The implications for transparency in the NHS are also discussed.

  19. Education and Social Trust

    DEFF Research Database (Denmark)

    Oskarsson, Sven; Dinesen, Peter Thisted; Dawes, Christopher

    2017-01-01

    One of the clearest results in previous studies on social trust is the robust positive relationship with educational attainment. The most common interpretation is that education has a causal effect on social trust. The theoretical argument and empirical results in this article suggest a different...... interpretation. We argue that common preadult factors such as cognitive abilities and personality traits rooted in genes and early-life family environment may confound the relationship between educational attainment and social trust. We provide new evidence on this question by utilizing the quasi......-experiment of twinning. By looking at the relationship between education and social trust within monozygotic (MZ) twin pairs, we are able to avoid potential confounders rooted in genetic factors and common environmental influences because the monozygotic twins share both. The results suggest that when controlling...

  20. Regulatory focus and generalized trust: the impact of prevention-focused self-regulation on trusting others.

    Science.gov (United States)

    Keller, Johannes; Mayo, Ruth; Greifeneder, Rainer; Pfattheicher, Stefan

    2015-01-01

    The current research suggests that taking self-regulatory mechanisms into account provides insights regarding individuals' responses to threats in social interactions. In general, based on the notion that a prevention-focused orientation of self-regulation is associated with a need for security and a vigilant tendency to avoid losses and other types of negative events we advocate that a prevention-focused orientation, both as a disposition as well as a situationally induced state, lowers generalized trust, thus hindering cooperation within social interactions that entail threats. Specifically, we found that the more individuals' habitual self-regulatory orientation is dominated by a prevention focus, the less likely they are to score high on a self-report measure of generalized trust (Study 1), and to express trust in a trust game paradigm as manifested in lower sums of transferred money (Studies 2 and 3). Similar findings were found when prevention focus was situationally manipulated (Study 4). Finally, one possible factor underlying the impact of prevention-focused self-regulation on generalized trust was demonstrated as individuals with a special sensitivity to negative information were significantly affected by a subtle prevention focus manipulation (versus control condition) in that they reacted with reduced trust in the trust game (Study 5). In sum, the current findings document the crucial relevance of self-regulatory orientations as conceptualized in regulatory focus theory regarding generalized trust and responses to threats within a social interaction. The theoretical and applied implications of the findings are discussed.

  1. Regulatory Focus and Generalized Trust: The Impact of Prevention-focused Self-regulation on Trusting Others

    Directory of Open Access Journals (Sweden)

    Johannes eKeller

    2015-03-01

    Full Text Available The current research suggests that taking self-regulatory mechanisms into account provides insights regarding individuals’ responses to threats in social interactions. In general, based on the notion that a prevention-focused orientation of self-regulation is associated with a need for security and a vigilant tendency to avoid losses and other types of negative events we advocate that a prevention-focused orientation, both as a disposition as well as a situationally induced state, lowers generalized trust, thus hindering cooperation within social interactions that entail threats. Specifically, we found that the more individuals’ habitual self-regulatory orientation is dominated by a prevention focus, the less likely they are to score high on a self-report measure of generalized trust (Study 1, and to express trust in a trust game paradigm as manifested in lower sums of transferred money (Studies 2 and 3. Similar findings were found when prevention focus was situationally manipulated (Study 4. Finally, one possible factor underlying the impact of prevention-focused self-regulation on generalized trust was demonstrated as individuals with a special sensitivity to negative information were significantly affected by a subtle prevention focus manipulation (vs. control condition in that they reacted with reduced trust in the trust game (Study 5. In sum, the current findings document the crucial relevance of self-regulatory orientations as conceptualized in regulatory focus theory regarding generalized trust and responses to threats within a social interaction. The theoretical and applied implications of the findings are discussed.

  2. Can centralized sanctioning promote trust in social dilemmas? A two-level trust game with incomplete information.

    Science.gov (United States)

    Wang, Raymond Yu; Ng, Cho Nam

    2015-01-01

    The problem of trust is a paradigmatic social dilemma. Previous literature has paid much academic attention on effects of peer punishment and altruistic third-party punishment on trust and human cooperation in dyadic interactions. However, the effects of centralized sanctioning institutions on decentralized reciprocity in hierarchical interactions remain to be further explored. This paper presents a formal two-level trust game with incomplete information which adds an authority as a strategic purposive actor into the traditional trust game. This model allows scholars to examine the problem of trust in more complex game theoretic configurations. The analysis demonstrates how the centralized institutions might change the dynamics of reciprocity between the trustor and the trustee. Findings suggest that the sequential equilibria of the newly proposed two-level model simultaneously include the risk of placing trust for the trustor and the temptation of short-term defection for the trustee. Moreover, they have shown that even a slight uncertainty about the type of the newly introduced authority might facilitate the establishment of trust and reciprocity in social dilemmas.

  3. Can centralized sanctioning promote trust in social dilemmas? A two-level trust game with incomplete information.

    Directory of Open Access Journals (Sweden)

    Raymond Yu Wang

    Full Text Available The problem of trust is a paradigmatic social dilemma. Previous literature has paid much academic attention on effects of peer punishment and altruistic third-party punishment on trust and human cooperation in dyadic interactions. However, the effects of centralized sanctioning institutions on decentralized reciprocity in hierarchical interactions remain to be further explored. This paper presents a formal two-level trust game with incomplete information which adds an authority as a strategic purposive actor into the traditional trust game. This model allows scholars to examine the problem of trust in more complex game theoretic configurations. The analysis demonstrates how the centralized institutions might change the dynamics of reciprocity between the trustor and the trustee. Findings suggest that the sequential equilibria of the newly proposed two-level model simultaneously include the risk of placing trust for the trustor and the temptation of short-term defection for the trustee. Moreover, they have shown that even a slight uncertainty about the type of the newly introduced authority might facilitate the establishment of trust and reciprocity in social dilemmas.

  4. The Value of Trust to Nursing.

    Science.gov (United States)

    Rutherford, Marcella M

    2014-01-01

    Trust, one of nursing's intangible assets, impacts nurses' ability to form meaningful relationships with patients and this connection positively impacts health outcomes. Linking trust to the fabric of nursing and investing in its measurement will become essential to nursing's valuation and the resulting investment in nursing. Trust, as nursing's core value, should be fostered by nurse educators as they prepare the next generation of nurses. Nurse administrators should connect the trust a patient has for his or her nurse and patient cooperation and honest transparent communication between providers and the patient. Banking trust as a valuable nursing asset will substantiate nursing's marketing and support its worth. Nursing's trustworthiness is an intangible asset that warrants protection, as trust once lost is hard to recapture.

  5. Trust: the sublime duty in health care leadership.

    Science.gov (United States)

    Piper, Llewellyn E

    2010-01-01

    Trust is the essence of human social existence. From the moment of birth, trust is the basic component in any human relationship and interaction. Trust is the Holy Grail for human confidence in others. From human survival to organizational survival, trust is the primordial bond. No organization is more dependent on trust than health care. This article views trust as the most basic fundamental quality for leadership. Trust is a sublime duty of a leader and the leadership of an organization. Leadership sets the culture of trust. Trust is the one quality that is essential for guiding an organization toward serving others. This article addresses trust from many perspectives. Trust is viewed from our subordinates, our peers, our superiors, and the public we serve. This article postulates how trust in an organization is the sublime duty of leadership that unites all human understanding and without it destroys all human relationships.

  6. Hype and public trust in science.

    Science.gov (United States)

    Master, Zubin; Resnik, David B

    2013-06-01

    Social scientists have begun elucidating the variables that influence public trust in science, yet little is known about hype in biotechnology and its effects on public trust. Many scholars claim that hyping biotechnology results in a loss of public trust, and possibly public enthusiasm or support for science, because public expectations of the biotechnological promises will be unmet. We argue for the need for empirical research that examines the relationships between hype, public trust, and public enthusiasm/support. We discuss the complexities in designing empirical studies that provide evidence for a causal link between hype, public trust, and public enthusiasm/support, but also illustrate how this may be remedied. Further empirical research on hype and public trust is needed in order to improve public communication of science and to design evidence-based education on the responsible conduct of research for scientists. We conclude that conceptual arguments made on hype and public trust must be nuanced to reflect our current understanding of this relationship.

  7. Recommendation based on trust diffusion model.

    Science.gov (United States)

    Yuan, Jinfeng; Li, Li

    2014-01-01

    Recommender system is emerging as a powerful and popular tool for online information relevant to a given user. The traditional recommendation system suffers from the cold start problem and the data sparsity problem. Many methods have been proposed to solve these problems, but few can achieve satisfactory efficiency. In this paper, we present a method which combines the trust diffusion (DiffTrust) algorithm and the probabilistic matrix factorization (PMF). DiffTrust is first used to study the possible diffusions of trust between various users. It is able to make use of the implicit relationship of the trust network, thus alleviating the data sparsity problem. The probabilistic matrix factorization (PMF) is then employed to combine the users' tastes with their trusted friends' interests. We evaluate the algorithm on Flixster, Moviedata, and Epinions datasets, respectively. The experimental results show that the recommendation based on our proposed DiffTrust + PMF model achieves high performance in terms of the root mean square error (RMSE), Recall, and F Measure.

  8. Tunnel fire dynamics

    CERN Document Server

    Ingason, Haukur; Lönnermark, Anders

    2015-01-01

    This book covers a wide range of issues in fire safety engineering in tunnels, describes the phenomena related to tunnel fire dynamics, presents state-of-the-art research, and gives detailed solutions to these major issues. Examples for calculations are provided. The aim is to significantly improve the understanding of fire safety engineering in tunnels. Chapters on fuel and ventilation control, combustion products, gas temperatures, heat fluxes, smoke stratification, visibility, tenability, design fire curves, heat release, fire suppression and detection, CFD modeling, and scaling techniques all equip readers to create their own fire safety plans for tunnels. This book should be purchased by any engineer or public official with responsibility for tunnels. It would also be of interest to many fire protection engineers as an application of evolving technical principles of fire safety.

  9. The Relationship between Teamwork and Organizational Trust

    Directory of Open Access Journals (Sweden)

    Musab Işık

    2015-04-01

    Full Text Available The aim of this study is to investigate the relationship between teamwork and organizational trust. In the implementation section the data from the survey of 250 workers is employed in call centers in Erzurum by using relevant statistical methods. Consequently, it is found that there is a positive and significant relationship between teamwork and organizational trust. Thus, the hypothesis of the study is supported as it was expected. Besides, it is found that there are positive and significant relationships between communication, openness to innovation, participation-trust in teamwork and organizational trust, trust in management, trust in co-workers, and trust in workplace.

  10. In Money we Trust? Trust Repair and the Psychology of Financial Compensations

    NARCIS (Netherlands)

    P.T.M. Desmet (Pieter)

    2011-01-01

    textabstractDespite the importance of trust in economic relations, people often engage in behavior that may violate their interaction partner’s trust. Given that transgressions in economic relations often result in distributive harm for the victim (i.e. loss of economic resources), a common approach

  11. Proton tunneling in solids

    Energy Technology Data Exchange (ETDEWEB)

    Kondo, J.

    1998-10-01

    The tunneling rate of the proton and its isotopes between interstitial sites in solids is studied theoretically. The phonons and/or the electrons in the solid have two effects on the tunneling phenomenon. First, they suppress the transfer integral between two neighbouring states. Second, they give rise to a finite lifetime of the proton state. Usually the second effect is large and the tunneling probability per unit time (tunneling rate) can be defined. In some cases, however, a coherent tunneling is expected and actually observed. (author)

  12. Proton tunneling in solids

    International Nuclear Information System (INIS)

    Kondo, J.

    1998-01-01

    The tunneling rate of the proton and its isotopes between interstitial sites in solids is studied theoretically. The phonons and/or the electrons in the solid have two effects on the tunneling phenomenon. First, they suppress the transfer integral between two neighbouring states. Second, they give rise to a finite lifetime of the proton state. Usually the second effect is large and the tunneling probability per unit time (tunneling rate) can be defined. In some cases, however, a coherent tunneling is expected and actually observed. (author)

  13. Creating trust through narrative strategy

    NARCIS (Netherlands)

    Gabbay, SM; Leenders, RTAJ

    2003-01-01

    In the rational model of trust, an actor's level of trust is a function of the expected gain and loss involved. As a consequence, if A can influence the gain and loss perceived by B, A can influence B's level of trust. In this article we study how A can do this through the strategic use of

  14. Creating trust through narrative strategy

    NARCIS (Netherlands)

    Gabbay, SM; Leenders, RTAJ

    In the rational model of trust, an actor's level of trust is a function of the expected gain and loss involved. As a consequence, if A can influence the gain and loss perceived by B, A can influence B's level of trust. In this article we study how A can do this through the strategic use of

  15. Trust that binds: the impact of collective felt trust on organizational performance.

    Science.gov (United States)

    Salamon, Sabrina Deutsch; Robinson, Sandra L

    2008-05-01

    The impact of employees' collective perceptions of being trusted by management was examined with a longitudinal study involving 88 retail stores. Drawing on the appropriateness framework (March, 1994; Weber, Kopelman, & Messick, 2004), the authors develop and test a model showing that when employees in an organization perceive they are trusted by management, increases in the presence of responsibility norms, as well as in the sales performance and customer service performance of the organization, are observed. Moreover, the relationship between perceptions of being trusted and sales performance is fully mediated by responsibility norms. PsycINFO Database Record (c) 2008 APA, all rights reserved.

  16. Trust in initial encounters : a motivational, cognitive theory

    OpenAIRE

    Johansen, Svein Tvedt

    2007-01-01

    In this dissertation I develop a theoretical model on the effects of risk on the formation of trust in the initial stages of a relationship. Risk is proposed to influence trust in two ways: First, risk exerts a direct influence on trust. Risk may decrease trust, increase trust, or increase trust under specific conditions. Second, risk may affect the level of trust indirectly by influencing the effect of social stimuli on the formation of trust. In this second indirect effect of risk, ri...

  17. Effects of cognitive load on trusting behavior--an experiment using the trust game.

    Directory of Open Access Journals (Sweden)

    Katarzyna Samson

    Full Text Available Last decades have witnessed a progressing decline of social trust, which has been predominantly linked to worsening economic conditions and increasing social inequality. In the present research we propose a different type of explanation for the observed decline - cognitive load related to technological development and the accelerating pace of modern life. In an experimental study participants played the trust game while performing one of two different secondary tasks - listening to a disturbing noise or memorizing a sequence of characters - or with no additional task in the control condition. Results show that in both cognitive load conditions participants expressed significantly less trust in the trust game than in case of no cognitive load. Additionally, when cognitive resources were limited, participants' behavior was more impulsive than when their resources were fully available.

  18. Trust as a Critical Concept

    DEFF Research Database (Denmark)

    Bordum, Anders

    2004-01-01

    In this articlei I will argue that trust is a fundamental and critical concept because trust is the direct or transcendental constitutive ground of most social phenomena, as well as applicable as an operational method in critical theory. There are two different but overlapping positions on trust I...... address in this article. One is the standpoint we find in business strategy, that trust is naïve to show, and control or contracts are presumed better. In the strategy game the idealistic good guys seems to lose (Arrow 1974), (Williamson 1975). The other position is the position taken by systems theory...

  19. We Engage, Therefore They Trust? A Study of Social Media Engagement and Public Trust in Science

    Science.gov (United States)

    Hwong, Y. L.; Oliver, C.; Van Kranendonk, M. J.

    2017-12-01

    Our society relies heavily on the trust that the public places in science to work. Given science's importance, the growing distrust in science is a cause for concern. Thanks to their participatory nature, social media have been touted as the promising tool for public engagement to restore public trust in science. These digital platforms have transformed the landscape of science communication yet little is known about their impact on public trust in science. This study probed several aspects of public trust in science as expressed on Twitter, focusing on two related science issues: space science and climate change. Our datasets comprised of 10,000 randomly sampled tweets over a month's period in 2016. We used human annotation and machine learning as our approach. Results indicated that the perceived contentiousness of a science issue has a significant impact on public trust. The level of distrust is higher in the climate change tweets than in the space science tweets, despite climate scientists being almost four times as active as space scientists in engaging with sceptics. However, people who engaged with scientists in the climate change network displayed a higher level of trust in science compared with those who did not. This effect was not observed in the space science network - in this network, there is no significant difference in trust levels between people who engaged with scientists and those who did not. Additionally, our machine learning study revealed that trust in science (as conveyed by tweets) can be predicted. The supervised learning algorithm that we developed was able to predict the trust labels of tweets in our sample with an accuracy of 84%. A further feature analysis indicated that similarity, presence of URL and authenticity are the properties of trust-inspiring tweets. Based on these findings, we argue that social media science communication is not as straightforward as `we engage, therefore they trust'. Public attitude towards science is often

  20. Love Thy Neighbor: Bonding versus Bridging Trust

    OpenAIRE

    Poulsen, Odile; Svendsen, Gert Tinggaard

    2005-01-01

    We study how trust is generated in society. In a two-sector model, we analyze two communities. In the bonding community people do not trust people outside their regular networks. In the bridging community people choose to trust strangers when they meet them. The hypothesis is that when trust is only bonding, it cannot accumulate. Our theoretical contribution is to show that when trust is only bonding then the economy’s level of trust moves to an unstable equilibrium that may under certain con...

  1. Trust, Welfare States and Income Equality

    DEFF Research Database (Denmark)

    Bergh, Andreas; Bjørnskov, Christian

    2014-01-01

    The cross-country correlation between social trust and income equality is well documented, but few studies examine the direction of causality. We show theoretically that by facilitating cooperation, trust may lead to more equal outcomes, while the feedback from inequality to trust is ambiguous....... Using a structural equation model estimated on a large country sample, we find that trust has a positive effect on both market and net income equality. Larger welfare states lead to higher net equality but neither net income equality nor welfare state size seems to have a causal effect on trust. We...

  2. The multileveled division of trust labour

    DEFF Research Database (Denmark)

    Frederiksen, Morten

    at the intersubjective and institutional levels. I argue that confidence in institutions define the playing field of uncertainty in intersubjective relations, thus underpinning both the possibility and scope of intersubjective trust. However, once confidence in the institutional setting is brought into question......The trust concept is inherently linked to institutional issues. Trust, according to contemporary research, may be directed at both people and institutions and the influence of institutions may affect both trust in other people and trust in other institutions. This conceptual stretching takes place...... at the expense of accuracy and may block our understanding of the intricacies of the multiple levels involved in trusting. This paper suggests a conceptual clarification of this issue by employing a phenomenological approach to the perspective of the trustor, differentiating the types of uncertainty involved...

  3. Balancing trust and power

    DEFF Research Database (Denmark)

    Broholm-Jørgensen, Marie; Guassora, Ann Dorrit; Reventlow, Susanne

    2017-01-01

    Objective: Little is known about how strategies of retaining patients are acted out by general practitioners (GPs) in the clinical encounter. With this study, we apply Grimens’ (2009) analytical connection between trust and power to explore how trust and power appear in preventive health checks...... of clinical encounters. Results: From the empirical data, we identified three dimensions of respect: respect for the patient’s autonomy, respect for professional authority and respect as a mutual exchange. A balance of respect influenced trust in the relationship between GP and patients and the transfer...... of power in the encounter. The GPs articulated that a balance was needed in preventive health checks in order to establish trust and thus retain the patient in the clinic. One way this balance of respect was carried out was with the use of humour. Conclusions: To retain patients without formal education...

  4. Learning to trust: social feedback normalizes trust behavior in first-episode psychosis and clinical high risk.

    Science.gov (United States)

    Lemmers-Jansen, Imke L J; Fett, Anne-Kathrin J; Hanssen, Esther; Veltman, Dick J; Krabbendam, Lydia

    2018-06-13

    Psychosis is characterized by problems in social functioning that exist well before illness onset, and in individuals at clinical high risk (CHR) for psychosis. Trust is an essential element for social interactions that is impaired in psychosis. In the trust game, chronic patients showed reduced baseline trust, impaired response to positive social feedback, and attenuated brain activation in reward and mentalizing areas. We investigated whether first-episode psychosis patients (FEP) and CHR show similar abnormalities in the neural and behavioral mechanisms underlying trust. Twenty-two FEP, 17 CHR, and 43 healthy controls performed two trust games, with a cooperative and an unfair partner in the fMRI scanner. Region of interest analyses were performed on mentalizing and reward processing areas, during the investment and outcome phases of the games. Compared with healthy controls, FEP and CHR showed reduced baseline trust, but like controls, learned to trust in response to cooperative and unfair feedback. Symptom severity was not associated with baseline trust, however in FEP associated with reduced response to feedback. The only group differences in brain activation were that CHR recruited the temporo-parietal junction (TPJ) more than FEP and controls during investment in the unfair condition. This hyper-activation in CHR was associated with greater symptom severity. Reduced baseline trust may be associated with risk for psychotic illness, or generally with poor mental health. Feedback learning is still intact in CHR and FEP, as opposed to chronic patients. CHR however show distinct neural activation patterns of hyper-activation of the TPJ.

  5. Fluctuation Dominated Josephson Tunneling with a Scanning Tunneling Microscope

    International Nuclear Information System (INIS)

    Naaman, O.; Teizer, W.; Dynes, R. C.

    2001-01-01

    We demonstrate Josephson tunneling in vacuum tunnel junctions formed between a superconducting scanning tunneling microscope tip and a Pb film, for junction resistances in the range 50--300 k Omega. We show that the superconducting phase dynamics is dominated by thermal fluctuations, and that the Josephson current appears as a peak centered at small finite voltage. In the presence of microwave fields (f=15.0 GHz) the peak decreases in magnitude and shifts to higher voltages with increasing rf power, in agreement with theory

  6. Trust repertoires for collaboration

    DEFF Research Database (Denmark)

    Fuglsang, Lars

    This case study analyses the role of trust in a public private innovation network that involved a private consultancy company as a facilitator. We know that collaboration is a important for innovation, and that collaboration across organizational boundaries is not a trivial issue. But we know very...... little about how such processes develop and how trust, understood as “confident positive expectations” (Lewicki et al. 1998) to collaborative activities, arises out of collaboration. The paper contributes by showing how trust and collaboration are intertwined. The main finding is that a facilitator can...

  7. Trust and Estate Planning

    DEFF Research Database (Denmark)

    Harrington, Brooke

    2012-01-01

    looks at the ways professionals participate in the creation of stratification regimes. Trust and estate planners do this by sheltering their clients' assets from taxation, thereby preserving private wealth for future generations. Using tools such as trusts, offshore banks, and shell corporations......, these professionals keep a significant portion of the world’s private wealth beyond the reach of the state. Trust and estate planning thus contributes to creating and maintaining socioeconomic inequality on a global scale. The significance of the profession has grown as wealth itself has become more fungible...

  8. The ISI Tunnel

    Science.gov (United States)

    1993-10-01

    DP /etc/tunnelvisa p zephyr dark -star TCP /etc/tunnelvisa p zephyr dak’star ICMP /etc/tunnelvisa p zephyr quark MDP /etc/tunnelvisa p zephyr quark ...drax-net-yp 128.9.32.2 1 route add quark -net-yp 128.9.32.3 1 route add vlsi-net-yp 128.9.32.4 1 route add darkstar-net-yp 128.9.32.3 1 route add rocky...TCP /etc/tunnel-visa p zephyr quark ICMP /etc/tunnel-visa p zephyr drax tTI)P /etc/tunnel-visa p zephyr drax TCP /etc/tunnel_visa p zephyr drax ICMP

  9. The Relationship between Teamwork and Organizational Trust

    Directory of Open Access Journals (Sweden)

    Musab Isik

    2016-01-01

    Full Text Available The aim of this study is to investigate the relationship between teamwork and organizational trust. In the implementation section the data from the survey of 250 workers is employed in call centers in Erzurum by using relevant statistical  methods. Consequently, it is found that there is a positive and significant relationship between teamwork and organizational trust. Thus, the hypothesis of the study is supported as it was expected. Besides, it is found that there are positive and significant relationships between communication, openness to innovation, participation-trust in teamwork and organizational trust, trust in management, trust in co-workers, and trust in workplace.

  10. Resonant tunnel magnetoresistance in a double magnetic tunnel junction

    KAUST Repository

    Useinov, Arthur; Useinov, Niazbeck Kh H; Tagirov, Lenar R.; Kosel, Jü rgen

    2011-01-01

    We present quasi-classical approach to calculate a spin-dependent current and tunnel magnetoresistance (TMR) in double magnetic tunnel junctions (DMTJ) FML/I/FMW/I/FMR, where the magnetization of the middle ferromagnetic metal layer FMW can

  11. Trust Management System for Opportunistic Cloud Services

    DEFF Research Database (Denmark)

    Kuada, Eric

    2013-01-01

    We have over the past three years been working on the feasibility of Opportunistic Cloud Services (OCS) for enterprises. OCS is about enterprises strategically contributing and utilizing spare IT resources as cloud services. One of the major challenges that such a platform faces is data security...... and trust management issues. This paper presents a trust management system for OCS platforms. It models the concept of trust and applies it to OCS platforms. The trust model and the trust management system are verified through the simulation of the computation of the trust values with Infrastructure...

  12. Trust in regulatory regimes

    NARCIS (Netherlands)

    Six, Frédérique; Verhoest, Koen

    2017-01-01

    Within political and administrative sciences generally, trust as a concept is contested, especially in the field of regulatory governance. This groundbreaking book is the first to systematically explore the role and dynamics of trust within regulatory regimes. Conceptualizing, mapping and analyzing

  13. Tunneling through landsliding zone; Jisuberi chitainai no tunnel seko

    Energy Technology Data Exchange (ETDEWEB)

    Konbu, A; Hatabu, K; Kano, T [Tekken Corp., Tokyo (Japan)

    1994-08-01

    At the new tunnel construction site of the Shirakata tunnel on the Obama line in Yamaguchi Prefecture, a landsliding occurred at about 60 meters to the upper portion obliquely to the right hand side of the shaft when the excavation progressed to about 10 meters from the starting side. The landslide caused displacement at the shaft opening and change in the supports. As a result of the re-investigation, it was confirmed that the slide face went through the tunnel cross section. The measures taken were removal of the upper soil and an adoption of the all ground fastening (AGF) method (injection type long tip fastening method) as an auxiliary construction to stop loosening of the natural ground associated with the tunnel excavation. The result was a completion of tunneling the landsliding zone without a problem. This paper reports the AGF method adopted in the above construction, together with the construction works and natural ground conditions. The AGF method is about the same as the pipe roof method with regard to the natural ground accepting mechanism and the materials used. The difference is building an improved body in a limited area in the natural ground around the steel pipes by injecting the fixing material. The use of this method caused no problems in subsidence and displacement in the surrounding ground, and completed the tunneling construction without an unusual event. 1 ref., 7 figs., 2 tabs.

  14. On Propagating Interpersonal Trust in Social Networks

    Science.gov (United States)

    Ziegler, Cai-Nicolas

    The age of information glut has fostered the proliferation of data and documents on the Web, created by man and machine alike. Hence, there is an enormous wealth of minable knowledge that is yet to be extracted, in particular, on the Semantic Web. However, besides understanding information stated by subjects, knowing about their credibility becomes equally crucial. Hence, trust and trust metrics, conceived as computational means to evaluate trust relationships between individuals, come into play. Our major contribution to Semantic Web trust management through this work is twofold. First, we introduce a classification scheme for trust metrics along various axes and discuss advantages and drawbacks of existing approaches for Semantic Web scenarios. Hereby, we devise an advocacy for local group trust metrics, guiding us to the second part, which presents Appleseed, our novel proposal for local group trust computation. Compelling in its simplicity, Appleseed borrows many ideas from spreading activation models in psychology and relates their concepts to trust evaluation in an intuitive fashion. Moreover, we provide extensions for the Appleseed nucleus that make our trust metric handle distrust statements.

  15. Does Short-Term Hunger Increase Trust and Trustworthiness in a High Trust Society?

    Directory of Open Access Journals (Sweden)

    Elias Rantapuska

    2017-11-01

    Full Text Available We build on the social heuristics hypothesis, the literature on the glucose model of self-control, and recent challenges on these hypotheses to investigate whether individuals exhibit a change in degree of trust and reciprocation after consumption of a meal. We induce short-term manipulation of hunger followed by the trust game and a decision on whether to leave personal belongings in an unlocked and unsupervised room. Our results are inconclusive. While, we report hungry individuals trusting and reciprocating more than those who have just consumed a meal in a high trust society, we fail to reject the null with small number of observations (N = 101 and experimental sessions (N = 8. In addition, we find no evidence of short-term hunger having an impact on charitable giving or decisions in public good game.

  16. Building Trust in High-Performing Teams

    Directory of Open Access Journals (Sweden)

    Aki Soudunsaari

    2012-06-01

    Full Text Available Facilitation of growth is more about good, trustworthy contacts than capital. Trust is a driving force for business creation, and to create a global business you need to build a team that is capable of meeting the challenge. Trust is a key factor in team building and a needed enabler for cooperation. In general, trust building is a slow process, but it can be accelerated with open interaction and good communication skills. The fast-growing and ever-changing nature of global business sets demands for cooperation and team building, especially for startup companies. Trust building needs personal knowledge and regular face-to-face interaction, but it also requires empathy, respect, and genuine listening. Trust increases communication, and rich and open communication is essential for the building of high-performing teams. Other building materials are a shared vision, clear roles and responsibilities, willingness for cooperation, and supporting and encouraging leadership. This study focuses on trust in high-performing teams. It asks whether it is possible to manage trust and which tools and operation models should be used to speed up the building of trust. In this article, preliminary results from the authors’ research are presented to highlight the importance of sharing critical information and having a high level of communication through constant interaction.

  17. Explaining the emergence of social trust

    DEFF Research Database (Denmark)

    Svendsen, Gunnar Lind Haase; Tinggaard Svendsen, Gert; Graeff, Peter

    2012-01-01

    How does social trust emerge in a country? By comparing the cases of Denmark and Germany through six historical phases, we suggest that a plausible explanation is long run political stability. In Denmark, social trust was arguably allowed to accumulate slowly over time and was probably not destro......How does social trust emerge in a country? By comparing the cases of Denmark and Germany through six historical phases, we suggest that a plausible explanation is long run political stability. In Denmark, social trust was arguably allowed to accumulate slowly over time and was probably...... not destroyed up till the universal welfare state of the 20th century. In Germany, however, political instability since the first German state building hampered the emergence and maintenance of social trust, which is why social trust was never allowed to grow in this country....

  18. Trust in Client-Vendor Relations

    DEFF Research Database (Denmark)

    Tøth, Thomas

    2014-01-01

    In an ever more globalized world we are faced with the challenges of collaborating across geographical distance. This article examines how trust is established in an offshore outsourcing engagement of IT operations between a leading Danish media company and an Indian IT-service provider. The find......, by imitating the way they communicate face-to-face, when collaborating virtually....... and organizational boundaries within the field of IT offshore outsourcing. The article concludes that trust is primarily established when the teams are meeting face-to-face and in order to establish trust at a distance they are dependent on technology being readily available and on engaging in active trust building...

  19. Consumer Trust in Information Sources

    Directory of Open Access Journals (Sweden)

    Brad Love

    2013-06-01

    Full Text Available Trust is essential to understanding public reaction to innovative issues. This research focuses on trust in information sources by explicating the construct of trust and testing a comprehensive model on several information sources about genetically modified foods. Results from a survey of 369 participants reveal the significance of projecting competence and the role of the environment in which a target public receives information. Perceptions of regulatory, social, business, and technical environments affect how likely individuals are to follow advice from institutions like the Food and Drug Administration and the news media. Future research should incorporate knowledge levels and personal relevance as variables likely to influence trusting relationships.

  20. Development of the tunneling junction simulation environment for scanning tunneling microscope evaluation

    International Nuclear Information System (INIS)

    Gajewski, Krzysztof; Piasecki, Tomasz; Kopiec, Daniel; Gotszalk, Teodor

    2017-01-01

    Proper configuration of scanning tunneling microscope electronics plays an important role in the atomic scale resolution surface imaging. Device evaluation in the tunneling contact between scanning tip and sample may be prone to the surface quality or mechanical disturbances. Thus the use of tunneling junction simulator makes electronics testing more reliable and increases its repeatability. Here, we present the theoretical background enabling the proper selection of electronic components circuitry used as a tunneling junction simulator. We also show how to simulate mechanics related to the piezoelectric scanner, which is applied in real experiments. Practical use of the proposed simulator and its application in metrological characterization of the developed scanning tunneling microscope is also shown. (paper)

  1. Towards trusted trade-lanes

    NARCIS (Netherlands)

    Hulstijn, J.; Hofman, W.; Zomer, G.; Tan, Y.H.

    2016-01-01

    Customs administrations are exploring system-based approaches to regulatory supervision, taking the entire set of controls in a process into account. In addition to Trusted Traders, which are recognized by a certification process, customs are considering to identify so called Trusted Trade Lanes:

  2. The Impact of Consumer Knowledge Bias on Narrow-Scope Trust, Broad-Scope Trust, and Relationship Satisfaction

    DEFF Research Database (Denmark)

    Hansen, Torben; Grønholdt, Lars; Josiassen, Alexander

    2016-01-01

    This study investigates how consumer knowledge bias - defined as knowledge over/underconfidence (O/U) - influences two types of trust (broad-scope trust and narrow-scope trust) and consumer relationship satisfaction. Based on a survey comprising 756 mutual fund investors, the contribution...... of this study to the marketing literature is twofold. First, taking a marketing relationship approach this study suggests and demonstrates that knowledge O/U positively influences relationship satisfaction and narrow-scope trust such that the more knowledge O/U a customer becomes, the higher/lower the level...... is low compared to high. Notably, the study findings strongly suggest that marketing managers should carry out their relationship satisfaction and trust improvement efforts relative to the combination of customers‟ subjective and objective knowledge....

  3. TEE-Based Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe

    Today, it is safe to assume that any program or data can be compromised, if they are not protected by hardware within a secure area. Systems based on crypto-processors (e.g., a trusted platform module, a smart card or a hardware security module) rely on the properties of tamper resistant hardware...... to establish a tight security parameter around a reduced set of predefined functionalities. Such systems are very secure, but they impose strong constraints on the functionalities, the connectivity or the resources available within the secure area. They have not proven versatile enough to provide mainstream...... trusted storage for personal data. We believe that this role can be taken over by systems equipped with Trusted Execution Environments (TEE), such as ARM’s TrustZone. Indeed, even if TEEs provide weaker security guarantees than crypto-processors, they already provide a secure area on many personal devices...

  4. Social trust and ionizing radiation

    Energy Technology Data Exchange (ETDEWEB)

    Meadd, E. [Faculty of Environmental Studies, York University, Toronto, Ontario (Canada)

    2002-07-01

    The linkages that exist between the environmental risks associated with nuclear energy production (both perceived and real) and the myriad of social and political issues and processes that influence social trust are a current issue in literature, but are not well explored, particularly for the Canadian context. This paper will examine one particular issue and its relationship with social trust: ionizing radiation and public health. Social trust is defined for this paper as including interpersonal trust, but having a much broader focus, extending to public trust in governments, institutions, corporations, and the power elite, and across whole societies. Of particular interest for the nuclear energy issue is how waning social trust may impact the functioning of democratic decision-making processes, particularly those associated with the siting of waste facilities. Social trust is a central issue in the management of environmental risks, particularly those related to high technology; its absence is seen as a major cause of intractable conflict in decisions related to nuclear power generation and waste disposal. Understanding the dynamics of social trust is important if a resolution is to be found to the nuclear waste management debate in Canada, that is, one that involves broad public, or social, support. For instance, what factors cause distrust to emerge, and when distrust emerges, what authorities do members of affected communities seek out for information and support? This paper begins to examine social trust in relation to human health and ionizing radiation, particularly low dose radiation from radioactive wastes resulting from uranium and radium processing activities in Port Hope, Ontario. These activities date back to the 1930s and are of great concern to community members. This paper looks at some of the roots of public concern, for example, scientific uncertainty around whether or not human health is compromised by exposure to low dose ionizing radiation

  5. Social trust and ionizing radiation

    International Nuclear Information System (INIS)

    Meadd, E.

    2002-01-01

    The linkages that exist between the environmental risks associated with nuclear energy production (both perceived and real) and the myriad of social and political issues and processes that influence social trust are a current issue in literature, but are not well explored, particularly for the Canadian context. This paper will examine one particular issue and its relationship with social trust: ionizing radiation and public health. Social trust is defined for this paper as including interpersonal trust, but having a much broader focus, extending to public trust in governments, institutions, corporations, and the power elite, and across whole societies. Of particular interest for the nuclear energy issue is how waning social trust may impact the functioning of democratic decision-making processes, particularly those associated with the siting of waste facilities. Social trust is a central issue in the management of environmental risks, particularly those related to high technology; its absence is seen as a major cause of intractable conflict in decisions related to nuclear power generation and waste disposal. Understanding the dynamics of social trust is important if a resolution is to be found to the nuclear waste management debate in Canada, that is, one that involves broad public, or social, support. For instance, what factors cause distrust to emerge, and when distrust emerges, what authorities do members of affected communities seek out for information and support? This paper begins to examine social trust in relation to human health and ionizing radiation, particularly low dose radiation from radioactive wastes resulting from uranium and radium processing activities in Port Hope, Ontario. These activities date back to the 1930s and are of great concern to community members. This paper looks at some of the roots of public concern, for example, scientific uncertainty around whether or not human health is compromised by exposure to low dose ionizing radiation

  6. Exploring trust relationships during times of change

    Directory of Open Access Journals (Sweden)

    Hartmut Von der Ohe

    2010-10-01

    Research purpose: The objective of this study was to explore the impact of different variables such as demographics on trust relationships in South African organisations. Motivation for the study: Anecdotal evidence and preliminary data collected for a national trust indicator seemed to suggest a shift in trust levels in organisations. Research design: A trust questionnaire was administered to a convenience sample of 307 respondents in all economic sectors. Parametric and nonparametric analyses were used to determine significant differences among economic sectors, job levels and sample periods. Main findings: No significant differences were found for job levels or the different sample periods. However, significant differences were found for the economic sectors and, specifically, between government participants and other sectors for the dimensions of change, team management, organisational trust, information sharing and credibility. Practical implications: In times of change, leadership in organisations need to be aware of the impact on trust levels. It is therefore important that leaders in government focus more on trust-enhancing behaviours needed to repair mistrust in organisations. Contribution: Although the effect of time on trust levels is inconclusive, the clearly differing levels of trust in various economic sectors point to the importance of appropriate and fitting approaches to building trust and not a ‘one-size-fits-all’ attitude.

  7. Fabrication of magnetic tunnel junctions with a single-crystalline LiF tunnel barrier

    Science.gov (United States)

    Krishna Narayananellore, Sai; Doko, Naoki; Matsuo, Norihiro; Saito, Hidekazu; Yuasa, Shinji

    2018-04-01

    We fabricated Fe/LiF/Fe magnetic tunnel junctions (MTJs) by molecular beam epitaxy on a MgO(001) substrate, where LiF is an insulating tunnel barrier with the same crystal structure as MgO (rock-salt type). Crystallographical studies such as transmission electron microscopy and nanobeam electron diffraction observations revealed that the LiF tunnel barrier is single-crystalline and has a LiF(001)[100] ∥ bottom Fe(001)[110] crystal orientation, which is constructed in the same manner as MgO(001) on Fe(001). Also, the in-plane lattice mismatch between the LiF tunnel barrier and the Fe bottom electrode was estimated to be small (about 0.5%). Despite such advantages for the tunnel barrier of the MTJ, the observed tunnel magnetoresistance (MR) ratio was low (˜6% at 20 K) and showed a significant decrease with increasing temperature (˜1% at room temperature). The results imply that indirect tunneling and/or thermally excited carriers in the LiF tunnel barrier, in which the current basically is not spin-polarized, play a major role in electrical transport in the MTJ.

  8. Trusts and Financialization

    DEFF Research Database (Denmark)

    Harrington, Brooke

    2017-01-01

    the global spread of financialization: by privileging the rentier–investor within the 15 world economy; by perpetuating a distinctively Anglo-American approach to finance internationally; and by increasing the autonomy of finance vis-a-vis the nation-state. This study shares the primarily descriptive......This article identifies trusts as a legal structure associated with the global spread of financialization. Although trusts originated in Medieval England, they have acquired a new significance in contemporary finance by virtue of their advantages in terms of 10 profit maximization and capital...... and conceptual intent of Krippner’s work on financialization, but extends it in two ways: by comparing trusts to the better- known corporate form of organizing financial activity, and by showing how private 20 capital is implicated in the financialized economy alongside corporate wealth....

  9. Institutional and social trust: Is there a causal relationship?

    DEFF Research Database (Denmark)

    Dinesen, Peter Thisted; Sønderskov, Kim Mannemar

    In the literature on social trust, institutional trust is prominent explanations of why people trust the generalized other. However, while institutional trust is a plausible cause of social trust, it is also likely to be consequences of trust or a consequence of deep-rooted personality traits...... affecting both types of trust. Therefore, conventional analyses using cross-sectional data are ill-suited to determine whether institutional trust actually cause social trust. In contrast to previous analyses, this paper utilizes two Danish panel surveys containing measures of the two types of trust...... as regressors), the results provide strong evidence of trust in state institutions exercising an impact on social trust whereas the evidence for a reverse relationship is mixed....

  10. How Much Do You Trust Me? Learning a Case-Based Model of Inverse Trust

    Science.gov (United States)

    2014-10-01

    metric does not take into account factors of the robot’s behavior that increase trust. The inverse trust metric we use is based on the number of times the...sets contain identical behav- iors. To account for this, the similarity function looks at the overlap between the two sets and ignores behaviors that...155–156 5. Jian, J.Y., Bisantz, A.M., Drury , C.G.: Foundations for an empirically determined scale of trust in automated systems. International

  11. 25 CFR 15.3 - Who can make a will disposing of trust or restricted land or trust personalty?

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Who can make a will disposing of trust or restricted land or trust personalty? 15.3 Section 15.3 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR... Introduction § 15.3 Who can make a will disposing of trust or restricted land or trust personalty? Any person...

  12. Trust and memory: organizational strategies, institutional conditions and trust negotiations in specialty clinics for Alzheimer's disease.

    Science.gov (United States)

    Beard, Renée L

    2008-03-01

    Clinicians aim to establish trust during medical encounters because, without it, health consumers may not seek medical care, consider their diagnoses legitimate, or adhere to treatment regimens. This paper examines the identification and treatment of memory loss within two specialty clinics to understand how cultural dynamics, such as organizational ethos and work practices, influence the social fabric of cognitive evaluations. Ethnographic data suggest important historical and cultural differences in the approaches to Alzheimer's disease (AD). Organizational routines, however, support a common goal, that of moving individuals from "potential patients" to patients, and ultimately research subjects, through establishing trust. Although the processes through which trust is potentially achieved, or the social conditions of trust, were similar at the sites, the object of trust was different. Whereas one clinic encouraged trust in collective medical expertise, the other focused on trust in specific clinicians. These conditions affect the clinical consequences of trust, particularly how and when the diagnosis is delivered, use of the AD label and other terminology, and the level of standardization. The individual consequences include perceptions of patients and depictions of the prognosis. Whether cognitive impairment is viewed as a scientific puzzle to be solved or is seen as a chronic illness significantly shapes the organizational processes of clinical evaluation. Alzheimer's disease, as a cultural object, is a particularly salient exemplar of the clinical negotiation of ambiguous diagnostic categorizations and the unpredictable patient in daily biomedical practice.

  13. Resonant tunneling via spin-polarized barrier states in a magnetic tunnel junction

    NARCIS (Netherlands)

    Jansen, R.; Lodder, J.C.

    2000-01-01

    Resonant tunneling through states in the barrier of a magnetic tunnel junction has been analyzed theoretically for the case of a spin-polarized density of barrier states. It is shown that for highly spin-polarized barrier states, the magnetoresistance due to resonant tunneling is enhanced compared

  14. Quantum tunneling time

    International Nuclear Information System (INIS)

    Wang, Z.S.; Lai, C.H.; Oh, C.H.; Kwek, L.C.

    2004-01-01

    We present a calculation of quantum tunneling time based on the transition duration of wave peak from one side of a barrier to the other. In our formulation, the tunneling time comprises a real and an imaginary part. The real part is an extension of the phase tunneling time with quantum corrections whereas the imaginary time is associated with energy derivatives of the probability amplitudes

  15. Neither Trust nor Distrust

    DEFF Research Database (Denmark)

    Jensen, Tina Gudrun

    2016-01-01

    This article deals with the politicised notions of trust and social cohesion in urban spaces through a focus on practices of everyday relations in a mixed neighbourhood. Quantitative studies maintain that ethnically diverse neighbourhoods lack in trust and solidarity. However, the very meaning an...

  16. Trust and Fiduciary Relationships in Education: What Happens When Trust Is Breached?

    Science.gov (United States)

    Grierson, Elizabeth Mary

    2018-01-01

    This paper examines trust as a fundamental aspect of fiduciary relationships in education. The specific relationship under examination is that of academic employee and university employer. Both have the value of trust assigned to them as an implicit part of their social and professional contract. The setting is Australia, but the principles apply…

  17. Do Group Decision Rules Affect Trust? A Laboratory Experiment on Group Decision Rules and Trust

    DEFF Research Database (Denmark)

    Nielsen, Julie Hassing

    2016-01-01

    Enhanced participation has been prescribed as the way forward for improving democratic decision making while generating positive attributes like trust. Yet we do not know the extent to which rules affect the outcome of decision making. This article investigates how different group decision rules......-hierarchical decision-making procedures enhance trust vis-à-vis other more hierarchical decision-making procedures....... affect group trust by testing three ideal types of decision rules (i.e., a Unilateral rule, a Representative rule and a 'Non-rule') in a laboratory experiment. The article shows significant differences between the three decision rules on trust after deliberation. Interestingly, however, it finds...

  18. I trust it, but I don't know why: effects of implicit attitudes toward automation on trust in an automated system.

    Science.gov (United States)

    Merritt, Stephanie M; Heimbaugh, Heather; LaChapell, Jennifer; Lee, Deborah

    2013-06-01

    This study is the first to examine the influence of implicit attitudes toward automation on users' trust in automation. Past empirical work has examined explicit (conscious) influences on user level of trust in automation but has not yet measured implicit influences. We examine concurrent effects of explicit propensity to trust machines and implicit attitudes toward automation on trust in an automated system. We examine differential impacts of each under varying automation performance conditions (clearly good, ambiguous, clearly poor). Participants completed both a self-report measure of propensity to trust and an Implicit Association Test measuring implicit attitude toward automation, then performed an X-ray screening task. Automation performance was manipulated within-subjects by varying the number and obviousness of errors. Explicit propensity to trust and implicit attitude toward automation did not significantly correlate. When the automation's performance was ambiguous, implicit attitude significantly affected automation trust, and its relationship with propensity to trust was additive: Increments in either were related to increases in trust. When errors were obvious, a significant interaction between the implicit and explicit measures was found, with those high in both having higher trust. Implicit attitudes have important implications for automation trust. Users may not be able to accurately report why they experience a given level of trust. To understand why users trust or fail to trust automation, measurements of implicit and explicit predictors may be necessary. Furthermore, implicit attitude toward automation might be used as a lever to effectively calibrate trust.

  19. Mining Trust Relationships from Online Social Networks

    Institute of Scientific and Technical Information of China (English)

    Yu Zhang; Tong Yu

    2012-01-01

    With the growing popularity of online social network,trust plays a more and more important role in connecting people to each other.We rely on our personal trust to accept recommendations,to make purchase decisions and to select transaction partners in the online community.Therefore,how to obtain trust relationships through mining online social networks becomes an important research topic.There are several shortcomings of existing trust mining methods.First,trust is category-dependent.However,most of the methods overlook the category attribute of trust relationships,which leads to low accuracy in trust calculation.Second,since the data in online social networks cannot be understood and processed by machines directly,traditional mining methods require much human effort and are not easily applied to other applications.To solve the above problems,we propose a semantic-based trust reasoning mechanism to mine trust relationships from online social networks automatically.We emphasize the category attribute of pairwise relationships and utilize Semantic Web technologies to build a domain ontology for data communication and knowledge sharing.We exploit role-based and behavior-based reasoning functions to infer implicit trust relationships and category-specific trust relationships.We make use of path expressions to extend reasoning rules so that the mining process can be done directly without much human effort.We perform experiments on real-life data extracted from Epinions.The experimental results verify the effectiveness and wide application use of our proposed method.

  20. Public trust: expectancies, beliefs, and behavior

    NARCIS (Netherlands)

    Alink, D.

    2014-01-01

    Most people think of trust as the bonding force between people in romantic, professional, and family relationships. Of growing importance however is public trust: trust in organizations that are not represented by a single person, such as companies, non-profit organizations and governmental

  1. Trusted Truck(R) II (phase A).

    Science.gov (United States)

    2009-01-01

    The Trusted Truck Program was initiated in 2003 as a joint effort by NTRCI, Volvo and UT. The vision of the Trusted Truck program is to develop a secure and "trusted" transport solution from pickup to delivery. The program's objective is to incre...

  2. Governance, Trust and Taxes

    DEFF Research Database (Denmark)

    Weihe, Guri; Joensen, E. Juanna Schröter

    This paper examines the role of social capital (trust) vis-à-vis the propensity of a country to be a tax haven. The empirical analysis corroborates that better governed countries have a higher ceteris paribus probability to be tax havens. However, social capital counteracts the effect of governance...... quality. This effect is so strong that the partial effect of governance quality is reversed for countries with the trust index in the top quartile – making these high trust countries less likely to be tax havens – even as governance quality is increased. Thus it is crucial to consider the interaction...

  3. Trusted computing strengthens cloud authentication.

    Science.gov (United States)

    Ghazizadeh, Eghbal; Zamani, Mazdak; Ab Manan, Jamalul-lail; Alizadeh, Mojtaba

    2014-01-01

    Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM). Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM) are great technologies for solving the trust and security concerns in the cloud identity environment. Single sign-on (SSO) and OpenID have been released to solve security and privacy problems for cloud identity. This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in .Net environment. Security analyzing, simulation, and BLP confidential model are three ways to evaluate and analyze our proposed model.

  4. Trusted Computing Strengthens Cloud Authentication

    Directory of Open Access Journals (Sweden)

    Eghbal Ghazizadeh

    2014-01-01

    Full Text Available Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM. Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM are great technologies for solving the trust and security concerns in the cloud identity environment. Single sign-on (SSO and OpenID have been released to solve security and privacy problems for cloud identity. This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in .Net environment. Security analyzing, simulation, and BLP confidential model are three ways to evaluate and analyze our proposed model.

  5. Trusted Computing Strengthens Cloud Authentication

    Science.gov (United States)

    2014-01-01

    Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM). Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM) are great technologies for solving the trust and security concerns in the cloud identity environment. Single sign-on (SSO) and OpenID have been released to solve security and privacy problems for cloud identity. This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in .Net environment. Security analyzing, simulation, and BLP confidential model are three ways to evaluate and analyze our proposed model. PMID:24701149

  6. Trust dynamics in a large system implementation

    DEFF Research Database (Denmark)

    Schlichter, Bjarne Rerup; Rose, Jeremy

    2013-01-01

    outcomes, but largely ignored the dynamics of trust relations. Giddens, as part of his study of modernity, theorises trust dynamics in relation to abstract social systems, though without focusing on information systems. We use Giddens’ concepts to investigate evolving trust relationships in a longitudinal......A large information systems implementation (such as Enterprise Resource Planning systems) relies on the trust of its stakeholders to succeed. Such projects impact diverse groups of stakeholders, each with their legitimate interests and expectations. Levels of stakeholder trust can be expected...... case analysis of a large Integrated Hospital System implementation for the Faroe Islands. Trust relationships suffered a serious breakdown, but the project was able to recover and meet its goals. We develop six theoretical propositions theorising the relationship between trust and project outcomes...

  7. Trust and the sociology of the professions.

    NARCIS (Netherlands)

    Groenewegen, P.P.

    2006-01-01

    There is a fast-growing literature on trust in health care, especially interpersonal trust, reflecting the growing awareness in both the research and policy communities of the importance of trust. At a general level, trust as part of the broader concept of social capital is related to people's

  8. Trust, conflict and cooperation: A meta-analysis

    NARCIS (Netherlands)

    Balliet, D.P.; van Lange, P. A. M.

    2013-01-01

    Many theories of trust emphasize that trust is most relevant to behavior in situations involving a conflict of interests. However, it is not clear how trust relates to behavior across situations that differ in the degree of conflicting interest: Does trust matter more when the conflict of interest

  9. Loss of Trust as Disconnection in John Updike’s Trust Me

    Directory of Open Access Journals (Sweden)

    Brian DUFFY

    2012-03-01

    Full Text Available Tandis que le titre du recueil de nouvelles de John Updike, Trust Me (1987, et le thème de la confiance trahie dans la première nouvelle, éponyme, donnent au recueil sa cohérence thématique, une lecture des textes qui se limiterait au seul sujet de la confiance trahie menant à l’affaiblissement des liens humains serait restrictive. Le recueil donne une expression plus large au thème de la confiance, celle d’un mode de rapport des êtres humains au monde, à leur vie et aux autres. Les protagonistes des nouvelles “The City” and “The Wallet” subissent la perte de confiance comme la perte d’un tel rapport, ce qui engendre, dans les deux cas, un malaise existentiel. Cet article étudie la nature de ces crises existentielles dans le cadre de l’utilisation par Updike du motif de la chute. L’article examine ensuite la manière dont le malaise existentiel récurrent chez John Updike lui-même influence le thème de la crise existentielle dans ces deux nouvelles, une démarche qui se justifie par la dimension autobiographique avouée des nouvelles d’Updike.   While the title of John Updike’s short-story collection, Trust Me (1987, and the theme of betrayed trust of the first story (“Trust Me” offer a thematic coherence to the collection, it would be restrictive to read the stories through the simple thematic filter of betrayed trust leading to weakened human attachments. Trust is given a wider articulation in the collection, that of a mode of connection for human beings to their world, their lives, and to others. The loss of trust for the protagonists in the stories, “The City” and “The Wallet,” is undergone as just such a loss of connection, engendering in both cases an existential disquiet. The article explores the nature of these existential crises, situating them within Updike’s wider deployment of the motif of the fall in his collection. The article goes on to consider the manner in which the existential

  10. The edge of trust : An introduction

    NARCIS (Netherlands)

    Evans, A.M.; Krueger, J.I.

    2015-01-01

    The dynamics of interpersonal trust are an essential part of understanding how people think and act in social interactions. Trust enables human beings to form meaningful personal relationships (Simpson, 2007) and engage in mutually profitable social and economic exchanges (Kohn, 2008). Yet, trust is

  11. The fair factor in matters of trust.

    Science.gov (United States)

    Williams, Lauren L

    2006-01-01

    Communities are bound together by trust among their members. Trust thrives when a pervasive sense of fairness exists. Evidence suggests that trust has social, professional, and economic value for today's organizations, making it worthy of attention. Matters of trust and justice are important and timely for nurse leaders to consider given the challenge to improve practice settings in a manner that enhances nurse satisfaction. The aim of this article is to make explicit the value in building organizational justice and trust within an organization's nursing community. Nursing leadership strategies are integrated, thus offering practical guidance in creating a culture of justice, making trust explicit, and establishing trustworthiness.

  12. Ethnic Diversity and Social Trust

    DEFF Research Database (Denmark)

    Dinesen, Peter Thisted; Sønderskov, Kim Mannemar

    2015-01-01

    We argue that residential exposure to ethnic diversity reduces social trust. Previous within-country analyses of the relationship between contextual ethnic diversity and trust have been conducted at higher levels of aggregation, thus ignoring substantial variation in actual exposure to ethnic......, whereas the effect vanishes in larger contextual units. This supports the conjecture that interethnic exposure underlies the negative relationship between ethnic diversity in residential contexts and social trust....... diversity. In contrast, we analyze how ethnic diversity of the immediate micro-context—where interethnic exposure is inevitable—affects trust. We do this using Danish survey data linked with register-based data, which enables us to obtain precise measures of the ethnic diversity of each individual...

  13. Metadata trust in a personal video recorder

    NARCIS (Netherlands)

    Boertjes, E.M.

    2004-01-01

    Trust is the belief or confidence in someone that their recommendations will work for you, i.e. that you will like the TV-programs (or other content) that they recommend. Many systems incorporate some notion of trust. Trust is more than similarity in taste, which makes trust a broader concept than

  14. Measuring fire size in tunnels

    International Nuclear Information System (INIS)

    Guo, Xiaoping; Zhang, Qihui

    2013-01-01

    A new measure of fire size Q′ has been introduced in longitudinally ventilated tunnel as the ratio of flame height to the height of tunnel. The analysis in this article has shown that Q′ controls both the critical velocity and the maximum ceiling temperature in the tunnel. Before the fire flame reaches tunnel ceiling (Q′ 1.0), Fr approaches a constant value. This is also a well-known phenomenon in large tunnel fires. Tunnel ceiling temperature shows the opposite trend. Before the fire flame reaches the ceiling, it increases very slowly with the fire size. Once the flame has hit the ceiling of tunnel, temperature rises rapidly with Q′. The good agreement between the current prediction and three different sets of experimental data has demonstrated that the theory has correctly modelled the relation among the heat release rate of fire, ventilation flow and the height of tunnel. From design point of view, the theoretical maximum of critical velocity for a given tunnel can help to prevent oversized ventilation system. -- Highlights: • Fire sizing is an important safety measure in tunnel design. • New measure of fire size a function of HRR of fire, tunnel height and ventilation. • The measure can identify large and small fires. • The characteristics of different fire are consistent with observation in real fires

  15. Microwave-induced co-tunneling in single electron tunneling transistors

    DEFF Research Database (Denmark)

    Ejrnaes, M.; Savolainen, M.; Manscher, M.

    2002-01-01

    on rubber bellows. Cross-talk was minimized by using individual coaxial lines between the sample and the room temperature electronics: The co-tunneling experiments were performed at zero DC bias current by measuring the voltage response to a very small amplitude 2 Hz current modulation with the gate voltage......The influence of microwaves on the co-tunneling in single electron tunneling transistors has been investigated as function of frequency and power in the temperature range from 150 to 500 mK. All 20 low frequency connections and the RF line were filtered, and the whole cryostat was suspended...

  16. The Volatile Nature of Social Trust

    DEFF Research Database (Denmark)

    Kjærsgård, Andreas Pihl; Anhøj, Anne Iversen

    The countries in Central and Eastern Europe (CEE) have to varying degrees been struggling in their transition to market economies and democracy. Social trust is often argued to be a crucial lubricant in solving collective action problems and thus building and maintaining well-functioning institut......The countries in Central and Eastern Europe (CEE) have to varying degrees been struggling in their transition to market economies and democracy. Social trust is often argued to be a crucial lubricant in solving collective action problems and thus building and maintaining well......-functioning institutions. Therefore building and maintaining social trust seems crucial for the countries in CEE struggling with transition. Existing research on social trust is mainly conducted in a western context, and there is a clear need for research to focus on social trust in CEE - an endeavour which this article...... by the development of public sentiment in a given context. The development of social trust in Croatia and Slovenia thus correlate with factors as the sense of trust and corruption among politicians, public officials and public institutions, the general economic and social development in the country as well...

  17. Social capital and trust in providers.

    Science.gov (United States)

    Ahern, Melissa M; Hendryx, Michael S

    2003-10-01

    Trust in providers has been in decline in recent decades. This study attempts to identify sources of trust in characteristics of health care systems and the wider community. The design is cross-sectional. Data are from (1) the 1996 Household Survey of the Community Tracking Study, drawn from 24 Metropolitan Statistical Areas; (2) a 1996 multi-city broadcast media marketing database including key social capital indicators; (3) Interstudy; (4) the American Hospital Association; and (5) the American Medical Association. Independent variables include individual socio-demographic variables, HMO enrollment, community-level health sector variables, and social capital. The dependent variable is self-reported trust in physicians. Data are merged from the various sources and analyzed using SUDAAN. Subjects include adults in the Household Survey who responded to the items on trust in physicians (N=17,653). Trust in physicians is independently predicted by community social capital (pSocial capital plays a role in how health care is perceived by citizens, and how health care is delivered by providers. Efforts to build trust and collaboration in a community may improve trust in physicians, health care quality, access, and preserve local health care control.

  18. Trust in regulatory relations: how new insights from trust research improve regulation theory

    NARCIS (Netherlands)

    Six, F.E.

    2013-01-01

    Regulatory oversight is a key feature of public governance. This study argues - based on recent trust research - that the way in which the relation between trust and control is conceptualized in the dominant responsive regulation theory (RRT) may be improved using self determination theory (SDT).

  19. Technology Trust in Internet-Based Interorganizational Electronic Commerce

    OpenAIRE

    Pauline Ratnasingam; Paul A. Pavlou

    2003-01-01

    Trust in Internet-based Business-to-Business (B2B) e-commerce is an important issue for both practicioners and academicians. Whereas the traditional notion of dyadic interfirm trust primarily focuses on trust in a trading partner firm, trust in e-commerce also implicitly incorporates the notion of trust in the transaction infrastructure and underlying control mechanisms (technology trust), which deals with transaction integrity, authentication, confidentliality, non-repudiation, and best busi...

  20. Influence of trap-assisted tunneling on trap-assisted tunneling current in double gate tunnel field-effect transistor

    International Nuclear Information System (INIS)

    Jiang Zhi; Zhuang Yi-Qi; Li Cong; Wang Ping; Liu Yu-Qi

    2016-01-01

    Trap-assisted tunneling (TAT) has attracted more and more attention, because it seriously affects the sub-threshold characteristic of tunnel field-effect transistor (TFET). In this paper, we assess subthreshold performance of double gate TFET (DG-TFET) through a band-to-band tunneling (BTBT) model, including phonon-assisted scattering and acoustic surface phonons scattering. Interface state density profile (D it ) and the trap level are included in the simulation to analyze their effects on TAT current and the mechanism of gate leakage current. (paper)

  1. We trust in government, just not in yours: race, partisanship, and political trust, 1958-2012.

    Science.gov (United States)

    Wilkes, Rima

    2015-01-01

    Although it is generally accepted that political trust is reflective of satisfaction with the performance of the incumbent administration, this is only considered true for White Americans. Because their trust reflects a larger discontent with the political system, Black Americans, it is held, do not respond in the same way in the short term. This argument has yet to be tested with over-time data. Time matters. Not only does the race gap in trust change over time but the impact of partisanship and political winning is, by definition, time-dependent. The results of an analysis of the 1958-2012 American National Election Studies data show that Black Americans and White Americans are equally likely to tie short-term performance to trust in government. However, the relationship between partisanship and political trust and, therefore, system discontent, clearly differs for the two groups. Aggregate models that do not take race-partisan sub-group differences into account will therefore be misleading. Copyright © 2014 Elsevier Inc. All rights reserved.

  2. Viewpoint : Trust and the sociology of the professions

    NARCIS (Netherlands)

    Groenewegen, Peter P.

    2006-01-01

    There is a fast-growing literature on trust in health care, especially interpersonal trust, but also public or institutional trust, reflecting the growing awareness in both the research and policy communities of the importance of trust. At a general level, trust as part of the broader concept of

  3. Trusting the other or taking a chance?

    DEFF Research Database (Denmark)

    Frederiksen, Morten; Heinskou, Marie Bruvik

    2016-01-01

    Theories of modernity and risk society argue that increasing levels of risk fundamentally alter or lower the level of trust in society. In this article we argue that this assumption is based in a fallacious theoretical link between trust and risk. Rather than calculative assessment of risk...... and specific events, trust directs anticipation towards process. First, we outline dominant approaches to trust as a question of actions and uncertainty of outcomes, arguing that these approaches treat trust and chance as interchangeable, conflating the different socio-temporalities within which risk and trust......, respectively, reside. Secondly, the issue of temporality is traced in Luhmann’s work on trust and it is demonstrated how his dichotomous treatment of social time conflates markedly different temporal experiences. As a solution to this, the article presents the notion of a third temporal mode of the process...

  4. 25 CFR 1000.354 - What is a trust evaluation?

    Science.gov (United States)

    2010-04-01

    ... that the functions are performed in accordance with trust standards as defined by Federal law. Trust... 25 Indians 2 2010-04-01 2010-04-01 false What is a trust evaluation? 1000.354 Section 1000.354... Trust Evaluation Review Annual Trust Evaluations § 1000.354 What is a trust evaluation? A trust...

  5. Increasing interpersonal trust through divergent thinking

    Directory of Open Access Journals (Sweden)

    Roberta eSellaro

    2014-06-01

    Full Text Available Interpersonal trust is an essential ingredient of many social relationships but how stable is it actually, and how is it controlled? There is evidence that the degree of trust into others might be rather volatile and can be affected by manipulations like drawing attention to personal interdependence or independence. Here we investigated whether the degree of interpersonal trust can be biased by inducing either a more integrative or a more cognitive-control mode by means of a creativity task requiring divergent or convergent thinking, respectively. Participants then performed the Trust Game, which provides an index of interpersonal trust by assessing the money units one participant (the trustor transfers to another participant (the trustee. As expected, participants transferred significantly more money to the trustee after engaging in divergent thinking as compared to convergent thinking. This observation provides support for the idea that interpersonal trust is controlled by domain-general (i.e., not socially dedicated cognitive states.

  6. Principals, Trust, and Cultivating Vibrant Schools

    Directory of Open Access Journals (Sweden)

    Megan Tschannen-Moran

    2015-03-01

    Full Text Available Although principals are ultimately held accountable to student learning in their buildings, the most consistent research results have suggested that their impact on student achievement is largely indirect. Leithwood, Patten, and Jantzi proposed four paths through which this indirect influence would flow, and the purpose of this special issue is to examine in greater depth these mediating variables. Among mediating variables, we assert that trust is key. In this paper, we explore the evidence that points to the role that faculty trust in the principal plays in student learning and how principals can cultivate trust by attending to the five facets of trust, as well as the correlates of trust that mediate student learning, including academic press, collective teacher efficacy, and teacher professionalism. We argue that trust plays a role in each of the four paths identified by Leithwood, Patten, and Jantzi. Finally, we explore possible new directions for future research.

  7. Developing Trusting Relationships Through Communication

    OpenAIRE

    YOKOYAMA, Izumi; OBARA, Takuya

    2015-01-01

    In this paper, we analyze the formation of trusting relationships between people through communication. To foster trusting relationships, individuals should disclose private and personal information. However, disclosing such information has both costs and benefits; therefore, both parties must decide on the optimal level of self-disclosure based on a variety of factors, such as the existing level of relationship and the benefits of deepening the trust level. We construct an economics model th...

  8. A Matter of Trust

    Science.gov (United States)

    Berg, Jill Harrison; Connolly, Christine; Lee, Abda; Fairley, Emmanuel

    2018-01-01

    Educators at a turnaround school in Boston describe how they built a foundation for achievement gains by building and safeguarding relational trust among staff. The school, Henry Grew Elementary, focused in particular on fostering educators' readiness to trust, clarifying roles, and solidifying routines to support connection and risk-taking.

  9. Thermovoltages in vacuum tunneling investigated by scanning tunneling microscopy

    OpenAIRE

    Hoffmann, D. H.; Rettenberger, Armin; Grand, Jean Yves; Läuger, K.; Leiderer, Paul; Dransfeld, Klaus; Möller, Rolf

    1995-01-01

    By heating the tunneling tip of a scanning tunneling microscope the thermoelectric properties of a variable vacuum barrier have been investigated. The lateral variation of the observed thermovoltage will be discussed for polycrystalline gold, stepped surfaces of silver, as well as for copper islands on silver.

  10. The Complex Relationship between Cyberbullying and Trust

    Science.gov (United States)

    Pieschl, Stephanie; Porsch, Torsten

    2017-01-01

    Theoretically, there are strong arguments for a relationship between cyberbullying and trust. On the one hand, trust is built on experiences; thus, experiences of malevolence such as cyberbullying might contribute to low trust. On the other hand, high trust may lead to risky online behavior such as self-disclosures that could increase the risk of…

  11. Application of Fuzzy Comprehensive Evaluation Method in Trust Quantification

    Directory of Open Access Journals (Sweden)

    Shunan Ma

    2011-10-01

    Full Text Available Trust can play an important role for the sharing of resources and information in open network environments. Trust quantification is thus an important issue in dynamic trust management. By considering the fuzziness and uncertainty of trust, in this paper, we propose a fuzzy comprehensive evaluation method to quantify trust along with a trust quantification algorithm. Simulation results show that the trust quantification algorithm that we propose can effectively quantify trust and the quantified value of an entity's trust is consistent with the behavior of the entity.

  12. Macroscopic quantum tunneling in Josephson tunnel junctions and Coulomb blockade in single small tunnel junctions

    International Nuclear Information System (INIS)

    Cleland, A.N.

    1991-04-01

    Experiments investigating the process of macroscopic quantum tunneling in a moderately-damped, resistively shunted, Josephson junction are described, followed by a discussion of experiments performed on very small capacitance normal-metal tunnel junctions. The experiments on the resistively-shunted Josephson junction were designed to investigate a quantum process, that of the tunneling of the Josephson phase variable under a potential barrier, in a system in which dissipation plays a major role in the dynamics of motion. All the parameters of the junction were measured using the classical phenomena of thermal activation and resonant activation. Theoretical predictions are compared with the experimental results, showing good agreement with no adjustable parameters; the tunneling rate in the moderately damped (Q ∼ 1) junction is seen to be reduced by a factor of 300 from that predicted for an undamped junction. The phase is seen to be a good quantum-mechanical variable. The experiments on small capacitance tunnel junctions extend the measurements on the larger-area Josephson junctions from the region in which the phase variable has a fairly well-defined value, i.e. its wavefunction has a narrow width, to the region where its value is almost completely unknown. The charge on the junction becomes well-defined and is predicted to quantize the current through the junction, giving rise to the Coulomb blockade at low bias. I present the first clear observation of the Coulomb blockade in single junctions. The electrical environment of the tunnel junction, however, strongly affects the behavior of the junction: higher resistance leads are observed to greatly sharpen the Coulomb blockade over that seen with lower resistance leads. I present theoretical descriptions of how the environment influences the junctions; comparisons with the experimental results are in reasonable agreement

  13. Trust and Reciprocity: Are Effort and Money Equivalent?

    Science.gov (United States)

    Vilares, Iris; Dam, Gregory; Kording, Konrad

    2011-01-01

    Trust and reciprocity facilitate cooperation and are relevant to virtually all human interactions. They are typically studied using trust games: one subject gives (entrusts) money to another subject, which may return some of the proceeds (reciprocate). Currently, however, it is unclear whether trust and reciprocity in monetary transactions are similar in other settings, such as physical effort. Trust and reciprocity of physical effort are important as many everyday decisions imply an exchange of physical effort, and such exchange is central to labor relations. Here we studied a trust game based on physical effort and compared the results with those of a computationally equivalent monetary trust game. We found no significant difference between effort and money conditions in both the amount trusted and the quantity reciprocated. Moreover, there is a high positive correlation in subjects' behavior across conditions. This suggests that trust and reciprocity may be character traits: subjects that are trustful/trustworthy in monetary settings behave similarly during exchanges of physical effort. Our results validate the use of trust games to study exchanges in physical effort and to characterize inter-subject differences in trust and reciprocity, and also suggest a new behavioral paradigm to study these differences. PMID:21364931

  14. About tunnelling times

    International Nuclear Information System (INIS)

    Olkhovsky, V.S.; Recami, E.

    1991-08-01

    In this paper, first we critically analyse the main theoretical definitions and calculations of the sub-barrier tunnelling and reflection times. Secondly, we propose a new, physically sensible definition of such durations, on the basis of a recent general formalism (already tested for other types of quantum collisions). At last, we discuss some results regarding temporal evolution of the tunnelling processes, and in particular the ''particle'' speed during tunnelling. (author). 36 refs, 1 fig

  15. In what we trust? A multi-level study into political trust as an evaluation of state characteristics

    NARCIS (Netherlands)

    van der Meer, T.

    2010-01-01

    A basic level of trust in the political system is considered to be the cornerstone of modern-day democracy. Consequently, scholars and politicians have been concerned with low or declining levels of trust in political institutions. This article focuses on trust in parliament. Many theories have been

  16. Trust to mass-media: micro- and macrolevel

    Directory of Open Access Journals (Sweden)

    A. S. Kavyerina

    2014-11-01

    Full Text Available Trust is the basic element of civil society.For the last decades Ukrainian social institutions, including mass media, suffering of the crisis of trust. Public informing, socialization, formation of public opinion are the main functions of mass media. Mass media takes part in a lot of social processes and spheres of society. Accuracy of the information, compliance with standards,objectivity and trust of the audience are very important because of the influence of the mass media. The paper deals with various interpretations of trust and theories of N.Luhmann, P. Sztompka and A. Seligmen, thatemphasize the importance of trust during the transformation of society. Also author considers the approaches to defining levels of trust. Attention was focused on two levels – the micro-level which represents personal trust and the macro-level with institutional trust. Author analyzes mass media as a social institution and considers social media as a type of mass media, which has its own unique characteristics such as high level of the informational participation, lack of the law regulation and the organizational structure. These characteristics bring to the foreground figure of the author. So the social media covers both levels of forming a trusting relationship with audience – micro and macrolevel.

  17. Being pragmatic about trust

    NARCIS (Netherlands)

    Nickel, P.J.; Faulkner, P.; Simpson, T.

    2017-01-01

    Trust remains an ambiguous and contested concept. A way to help settle some of the disagreements about it is to appeal to an Explanatory Constraint, according to which trust should (a) be explained as the outcome of central concerns or interests of the relevant actors, and (b) explain the emergence

  18. Ethnic Diversity and Social Trust

    DEFF Research Database (Denmark)

    Dinesen, Peter Thisted; Sønderskov, Kim Mannemar

    2018-01-01

    Due to its wide-ranging implications for social cohesion in diversifying Western countries, the question of the potential negative consequences of ethnic diversity for social trust is arguably the most contentious question in the literature on social trust. In this chapter we critically review...... the empirical evidence for a negative relationship between contextual ethnic diversity (measured locally within countries) and social trust. We cautiously conclude that there are indications of a negative relationship, although with important variations across study characteristics including national setting......, context unit analyzed, and conditioning on moderating influences. Building on the review, we highlight a number of paths for theoretical and methodological advances, which we argue would advance the literature on the relationship between ethnic diversity and social trust....

  19. Does transparent government agencies strengthen trust?

    NARCIS (Netherlands)

    Grimmelikhuijsen, S.G.

    2009-01-01

    Trust in government has been shown to be volatile in recent years and Internet transparency is seen as a solution to strengthen trust. However, critics argue that transparency will only lead to less trust, and sceptics say that it has no effect at all. This debate on transparency is lacking

  20. Facilitating a just and trusting culture.

    Science.gov (United States)

    Pattison, Jill; Kline, Theresa

    2015-01-01

    The purpose of this paper is to identify managerial and organizational characteristics and behaviors that facilitate the fostering of a just and trusting culture within the healthcare system. Two studies were conducted. The initial qualitative one was used to identify themes based on interviews with health care workers that facilitate a just and trusting culture. The quantitative one used a policy-capturing design to determine which factors were most likely to predict outcomes of manager and organizational trust. The factors of violation type (ability vs integrity), providing an explanation or not, blame vs no blame by manager, and blame vs no blame by organization were all significant predictors of perceptions of trust. Limitations to the generalizability of findings included both a small and non-representative sample from one health care region. The present findings can be useful in developing training systems for managers and organizational executive teams for managing medical error events in a manner that will help develop a just and trusting culture. A just and trusting culture should enhance the likelihood of reporting medical errors. Improved reporting, in turn, should enhance patient safety. This is the first field study experimentally manipulating aspects of organizational trust within the health care sector. The use of policy-capturing is a unique feature that sheds light into the decision-making of health care workers as to the efficaciousness of particular managerial and organizational characteristics that impact a just and trusting culture.

  1. Tunneling current between graphene layers

    OpenAIRE

    Poklonski, Nikolai A.; Siahlo, Andrei I.; Vyrko, Sergey A.; Popov, Andrey M.; Lozovik, Yurii E.

    2013-01-01

    The physical model that allows to calculate the values of the tunneling current be-tween graphene layers is proposed. The tunneling current according to the pro-posed model is proportional to the area of tunneling transition. The calculated value of tunneling conductivity is in qualitative agreement with experimental data.

  2. Transparency and trust. An experimental study of online disclosure and trust in government

    NARCIS (Netherlands)

    Grimmelikhuijsen, S.G.

    2012-01-01

    Transparency has been trumpeted by many as the key to trust in government. The assumption is that if government organisations open up and show the public what decisions are made, how they are made and what the results are, people will automatically have more trust in government. But does

  3. How to Trust? The Importance of Self-Efficacy and Social Trust in Public Responses to Industrial Risks

    NARCIS (Netherlands)

    ter Huurne, E.F.J.; Gutteling, Jan M.

    2009-01-01

    Although a great deal of research has linked both self‐efficacy and social trust to risk responses, one overlooked question concerns the association between self‐efficacy and institutional trust. The purpose of this study was to investigate the main and combined effects of trust in the self and

  4. Explaining the emergence of social trust

    DEFF Research Database (Denmark)

    Svendsen, Gunnar Lind Haase; Svendsen, Gert Tinggaard; Graeff, Peter

    2012-01-01

    How does social trust emerge in a country? By comparing the cases of Denmark and Germany through six historical phases, we suggest that a plausible explanation is long run political stability. In Denmark, social trust was arguably allowed to accumulate slowly over time and was probably...... not destroyed up till the universal welfare state of the 20th century. In Germany, however, political instability since the first German state building hampered the emergence and maintenance of social trust, which is why social trust was never allowed to grow in this country....

  5. Does Generalized (Dis)trust Travel? Examining the Impact of Cultural Heritage and Destination Country Environment on Trust of Immigrants

    DEFF Research Database (Denmark)

    Dinesen, Peter Thisted

    2012-01-01

    perspective predicts that trust of immigrants will change according to the environment of the destination country. This article examines how first-generation immigrants from three low-trust countries of origin (Turkey, Poland, and Italy) are affected by migrating to high-trust countries in Northern Europe......, which hold qualities conducive to trust. In contrast to earlier studies examining trust of immigrants, I build on one data set containing data on both migrants and nonmigrants from the same country of origin as well as on a wide range of relevant covariates of trust. Using the method of matching...... the destination-country context to only one country (Germany) and comparing migrants and nonmigrants responding in the same language....

  6. The Process Perspective on Trust in Organizations

    DEFF Research Database (Denmark)

    Jagd, Søren

    Several trust researchers have pointed to the relevance of the process perspective for understanding trust in organizations. In this paper I review the attempts to apply the process perspective in trust research distinguishing between a soft and a strong process perspective. It appears that nearly......’s history? A few examples of studies applying a strong process perspective to trust in organizations is discussed.  Summarising, I argue that the process perspective, in general, may contribute furthering the understanding of the complexities of the development of trust over time and that the strong process...

  7. Is Trust for Sale? The Effectiveness of Financial Compensation for Repairing Competence- versus Integrity-Based Trust Violations

    Science.gov (United States)

    Haesevoets, Tessa; Reinders Folmer, Chris; Van Hiel, Alain

    2015-01-01

    Despite the popularity of financial compensation as a means for addressing trust violations, the question whether (more) money can indeed buy trust back remains largely unexplored. In the present research, we focus on the role of violation type and compensation size. The results of a scenario study and a laboratory experiment show that financial compensation can effectively promote the restoration of trust for transgressions that indicate a lack of competence. Conversely, for transgressions which signal a lack of integrity, financial compensation is not an effective tool to repair trust. Moreover, our findings indicate that for both violation types, overcompensation has no positive effects on top of the impact of equal compensation. These findings therefore show that when it comes to trust, money cannot buy everything. PMID:26714025

  8. Trust Measurement using Multimodal Behavioral Analysis and Uncertainty Aware Trust Calibration

    Science.gov (United States)

    2018-01-05

    From the study we have found that: 1) people can correctly perceive the accuracy of the system and adjust their trust accordingly; 2) there exists a...Mailing Address : Level 5, 13 Garden Street , Eveleigh NSW 2015, Australia - Phone : +61 2 9490 5601 Period of Performance: September/30/2016 – September...system accuracy, and human trust in predictive decision making. From the study we have found that: 1) people can correctly perceive the accuracy of the

  9. Single Electron Tunneling

    International Nuclear Information System (INIS)

    Ruggiero, Steven T.

    2005-01-01

    Financial support for this project has led to advances in the science of single-electron phenomena. Our group reported the first observation of the so-called ''Coulomb Staircase'', which was produced by tunneling into ultra-small metal particles. This work showed well-defined tunneling voltage steps of width e/C and height e/RC, demonstrating tunneling quantized on the single-electron level. This work was published in a now well-cited Physical Review Letter. Single-electron physics is now a major sub-field of condensed-matter physics, and fundamental work in the area continues to be conducted by tunneling in ultra-small metal particles. In addition, there are now single-electron transistors that add a controlling gate to modulate the charge on ultra-small photolithographically defined capacitive elements. Single-electron transistors are now at the heart of at least one experimental quantum-computer element, and single-electron transistor pumps may soon be used to define fundamental quantities such as the farad (capacitance) and the ampere (current). Novel computer technology based on single-electron quantum dots is also being developed. In related work, our group played the leading role in the explanation of experimental results observed during the initial phases of tunneling experiments with the high-temperature superconductors. When so-called ''multiple-gap'' tunneling was reported, the phenomenon was correctly identified by our group as single-electron tunneling in small grains in the material. The main focus throughout this project has been to explore single electron phenomena both in traditional tunneling formats of the type metal/insulator/particles/insulator/metal and using scanning tunneling microscopy to probe few-particle systems. This has been done under varying conditions of temperature, applied magnetic field, and with different materials systems. These have included metals, semi-metals, and superconductors. Amongst a number of results, we have

  10. Drill and blast tunnelling; Konvensjonell drift av tunneler

    Energy Technology Data Exchange (ETDEWEB)

    Roenn, Paal-Egil

    1997-12-31

    This thesis treats drill and blast tunnelling. The rapid technological advance necessitates revised and updated design criteria, quality requirements and quality control. In situ blast experiments were carried out in order to test new methods and improve the basis for calculation and design. The main topics of the experiments were (1) longer rounds and increased drillhole diameter, (2) emulsion slurry as explosives in tunnelling, and (3) electronic detonators in contour blasting. The experiments show that it is technically feasible to blast rounds of up to 8.6 m length. Using current technology, the economical optimum round length is substantially shorter. Dust, low visibility, noise and toxic fumes are occupational environmental strains for the tunnel workers. Several of the environmental factors are strongly influenced by the type of explosives used. For example, emulsion slurry resulted in 4 to 5 times better visibility than Anolit and the concentration of respirable dust and total dust was reduced by 30-50 %. Electronic detonators were tested and found to give a higher percentage of remaining drillholes in the contour than Nonel detonators. The thesis includes a chapter on economic design of hydropower tunnels. 42 refs., 83 figs., 45 tabs.

  11. Resonant tunnel magnetoresistance in double-barrier planar magnetic tunnel junctions

    KAUST Repository

    Useinov, A. N.

    2011-08-24

    We present a theoretical approach to calculate the spin-dependent current and tunnel magnetoresistance (TMR) in a double-barrier magnetic tunnel junction (DMTJ), in which the magnetization of the middle ferromagnetic metal layer can be aligned parallel or antiparallel in relation to the fixed magnetizations of the left and right ferromagnetic electrodes. The electron transport through the DMTJ is considered as a three-dimensional problem, taking into account all transmitting electron trajectories as well as the spin-dependent momentum conservation law. The dependence of the transmission coefficient and spin-polarized currents on the applied voltage is derived as an exact solution to the quantum-mechanical problem for the spin-polarized transport. In the range of the developed physical model, the resonant tunneling, nonresonant tunneling, and enhanced spin filtering can be explained; the simulation results are in good agreement with experimental data.

  12. Resonant tunnel magnetoresistance in double-barrier planar magnetic tunnel junctions

    KAUST Repository

    Useinov, A. N.; Kosel, Jü rgen; Useinov, N. Kh.; Tagirov, L. R.

    2011-01-01

    We present a theoretical approach to calculate the spin-dependent current and tunnel magnetoresistance (TMR) in a double-barrier magnetic tunnel junction (DMTJ), in which the magnetization of the middle ferromagnetic metal layer can be aligned parallel or antiparallel in relation to the fixed magnetizations of the left and right ferromagnetic electrodes. The electron transport through the DMTJ is considered as a three-dimensional problem, taking into account all transmitting electron trajectories as well as the spin-dependent momentum conservation law. The dependence of the transmission coefficient and spin-polarized currents on the applied voltage is derived as an exact solution to the quantum-mechanical problem for the spin-polarized transport. In the range of the developed physical model, the resonant tunneling, nonresonant tunneling, and enhanced spin filtering can be explained; the simulation results are in good agreement with experimental data.

  13. Trust and Online Reputation Systems

    Science.gov (United States)

    Kwan, Ming; Ramachandran, Deepak

    Web 2.0 technologies provide organizations with unprecedented opportunities to expand and solidify relationships with their customers, partners, and employees—while empowering firms to define entirely new business models focused on sharing information in online collaborative environments. Yet, in and of themselves, these technologies cannot ensure productive online interactions. Leading enterprises that are experimenting with social networks and online communities are already discovering this fact and along with it, the importance of establishing trust as the foundation for online collaboration and transactions. Just as today's consumers must feel secure to bank, exchange personal information and purchase products and services online; participants in Web 2.0 initiatives will only accept the higher levels of risk and exposure inherent in e-commerce and Web collaboration in an environment of trust. Indeed, only by attending to the need to cultivate online trust with customers, partners and employees will enterprises ever fully exploit the expanded business potential posed by Web 2.0. But developing online trust is no easy feat. While various preliminary attempts have occurred, no definitive model for establishing or measuring it has yet been established. To that end, nGenera has identified three, distinct dimensions of online trust: reputation (quantitative-based); relationship (qualitative-based) and process (system-based). When considered together, they form a valuable model for understanding online trust and a toolbox for cultivating it to support Web 2.0 initiatives.

  14. Impact Through Trust

    DEFF Research Database (Denmark)

    Mayoral, Juan A.

    of its rulings and legal mandates in national judiciaries and legal systems? This question is crucial if we understand that national courts are the key decentralised enforcers of the European Union (EU) law responsible for ensuring the effectiveness of EU law and the rulings and mandates imposed...... by the Court. EU scholars have already offered several legalist and institutionalist responses to why national courts participate in this process of legal integration in the EU and, most importantly, why the follow the mandates and rulings from the CJEU. This chapter innovates in this regard by introducing...... trust between judges as a new mechanism for enhancing the cooperation and compliance by national courts with the CJEU jurisprudence and EU legal mandates. The chapter describes the conditions under which national judges trust the CJEU to identify how the Court can promote trust in its role as a supreme...

  15. Toward a generic model of trust for electronic commerce

    NARCIS (Netherlands)

    Tan, YH; Thoen, W

    2000-01-01

    The authors present a generic model of trust for electronic commerce consisting of two basic components, party trust and control trust, based on the concept that trust in a transaction with another party combines trust in the other parry and trust in the control mechanisms that ensure the successful

  16. Quantum size effects on spin-tunneling time in a magnetic resonant tunneling diode

    OpenAIRE

    Saffarzadeh, Alireza; Daqiq, Reza

    2009-01-01

    We study theoretically the quantum size effects of a magnetic resonant tunneling diode (RTD) with a (Zn,Mn)Se dilute magnetic semiconductor layer on the spin-tunneling time and the spin polarization of the electrons. The results show that the spin-tunneling times may oscillate and a great difference between the tunneling time of the electrons with opposite spin directions can be obtained depending on the system parameters. We also study the effect of structural asymmetry which is related to t...

  17. Cultural identity and patient trust among older American Indians.

    Science.gov (United States)

    Simonds, Vanessa W; Goins, R Turner; Krantz, Elizabeth M; Garroutte, Eva Marie

    2014-03-01

    Patients' trust in healthcare providers and institutions has been identified as a likely contributor to racial-ethnic health disparities. The likely influence of patients' cultural characteristics on trust is widely acknowledged but inadequately explored. To compare levels of patients' trust in primary care provider (interpersonal trust) with trust in healthcare organizations (institutional trust) among older American Indians (AIs), and determine associations with cultural identity. Patient survey administered following primary care visits. Two-hundred and nineteen American Indian patients ≥ 50 years receiving care for a non-acute condition at two clinics operated by the Cherokee Nation in northeastern Oklahoma. Self-reported sociodemographic and cultural characteristics. Trust was measured using three questions about interpersonal trust and one measure of institutional trust; responses ranged from strongly agree to strongly disagree. Finding substantial variation only in institutional trust, we used logistic generalized estimating equations to examine relationships of patient cultural identity with institutional trust. Ninety-five percent of patients reported trusting their individual provider, while only 46 % reported trusting their healthcare institution. Patients who strongly self-identified with an AI cultural identity had significantly lower institutional trust compared to those self-identifying less strongly (OR: 0.6, 95 % CI: 0.4, 0.9). Interpersonal and institutional trust represent distinct dimensions of patients' experience of care that may show important relationships to patients' cultural characteristics. Strategies for addressing low institutional trust may have special relevance for patients who identify strongly with AI culture.

  18. Research of Trust Chain of Operating System

    Science.gov (United States)

    Li, Hongjiao; Tian, Xiuxia

    Trust chain is one of the key technologies in designing secure operating system based on TC technology. Constructions of trust chain and trust models are analyzed. Future works in these directions are discussed.

  19. Being trusted: How team generational age diversity promotes and undermines trust in cross-boundary relationships.

    Science.gov (United States)

    Williams, Michele

    2016-04-01

    We examine how demographic context influences the trust that boundary spanners experience in their dyadic relationships with clients. Because of the salience of age as a demographic characteristic as well as the increasing prevalence of age diversity and intergenerational conflict in the workplace, we focus on team age diversity as a demographic social context that affects trust between boundary spanners and their clients. Using social categorization theory and theories of social capital, we develop and test our contextual argument that a boundary spanner's experience of being trusted is influenced by the social categorization processes that occur in dyadic interactions with a specific client and, simultaneously, by similar social categorization processes that influence the degree to which the client team as a whole serves as a cooperative resource for demographically similar versus dissimilar boundary spanner-client dyads. Using a sample of 168 senior boundary spanners from the consulting industry, we find that generational diversity among client team members from a client organization undermines the perception of being trusted within homogeneous boundary spanner-client dyads while it enhances the perception of being trusted within heterogeneous dyads. The perception of being trusted is an important aspect of cross-boundary relationships because it influences coordination and the costs associated with coordination. © 2015 The Author Journal of Organizational Behavior Published by John Wiley & Sons Ltd.

  20. Influence of trap-assisted tunneling on trap-assisted tunneling current in double gate tunnel field-effect transistor

    Science.gov (United States)

    Zhi, Jiang; Yi-Qi, Zhuang; Cong, Li; Ping, Wang; Yu-Qi, Liu

    2016-02-01

    Trap-assisted tunneling (TAT) has attracted more and more attention, because it seriously affects the sub-threshold characteristic of tunnel field-effect transistor (TFET). In this paper, we assess subthreshold performance of double gate TFET (DG-TFET) through a band-to-band tunneling (BTBT) model, including phonon-assisted scattering and acoustic surface phonons scattering. Interface state density profile (Dit) and the trap level are included in the simulation to analyze their effects on TAT current and the mechanism of gate leakage current. Project supported by the National Natural Science Foundation of China (Grant Nos. 61574109 and 61204092).

  1. Study of tunneling transport in Si-based tunnel field-effect transistors with ON current enhancement utilizing isoelectronic trap

    Science.gov (United States)

    Mori, Takahiro; Morita, Yukinori; Miyata, Noriyuki; Migita, Shinji; Fukuda, Koichi; Mizubayashi, Wataru; Masahara, Meishoku; Yasuda, Tetsuji; Ota, Hiroyuki

    2015-02-01

    The temperature dependence of the tunneling transport characteristics of Si diodes with an isoelectronic impurity has been investigated in order to clarify the mechanism of the ON-current enhancement in Si-based tunnel field-effect transistors (TFETs) utilizing an isoelectronic trap (IET). The Al-N complex impurity was utilized for IET formation. We observed three types of tunneling current components in the diodes: indirect band-to-band tunneling (BTBT), trap-assisted tunneling (TAT), and thermally inactive tunneling. The indirect BTBT and TAT current components can be distinguished with the plot described in this paper. The thermally inactive tunneling current probably originated from tunneling consisting of two paths: tunneling between the valence band and the IET trap and tunneling between the IET trap and the conduction band. The probability of thermally inactive tunneling with the Al-N IET state is higher than the others. Utilization of the thermally inactive tunneling current has a significant effect in enhancing the driving current of Si-based TFETs.

  2. Economic and Other Determinants of Political Trust

    Directory of Open Access Journals (Sweden)

    William R. DiPietro

    2016-01-01

    Full Text Available Political trust is important for the effective functioning of government. This paper uses cross country regression analysis to see whether three different measures of economic performance matter for political trust. The results lend support to the hypothesis that political trust is influenced by economic growth, the standard of living, and the appropriate use of government spending. In addition, the paper considers two institutional variables, perceived independence of the judiciary and the degree of democracy to assess their effect on political trust. It finds that perceived judicial independence has a positive effect on political trust, but democracy has a negative effect.

  3. LSOT: A Lightweight Self-Organized Trust Model in VANETs

    Directory of Open Access Journals (Sweden)

    Zhiquan Liu

    2016-01-01

    Full Text Available With the advances in automobile industry and wireless communication technology, Vehicular Ad hoc Networks (VANETs have attracted the attention of a large number of researchers. Trust management plays an important role in VANETs. However, it is still at the preliminary stage and the existing trust models cannot entirely conform to the characteristics of VANETs. This work proposes a novel Lightweight Self-Organized Trust (LSOT model which contains trust certificate-based and recommendation-based trust evaluations. Both the supernodes and trusted third parties are not needed in our model. In addition, we comprehensively consider three factor weights to ease the collusion attack in trust certificate-based trust evaluation, and we utilize the testing interaction method to build and maintain the trust network and propose a maximum local trust (MLT algorithm to identify trustworthy recommenders in recommendation-based trust evaluation. Furthermore, a fully distributed VANET scenario is deployed based on the famous Advogato dataset and a series of simulations and analysis are conducted. The results illustrate that our LSOT model significantly outperforms the excellent experience-based trust (EBT and Lightweight Cross-domain Trust (LCT models in terms of evaluation performance and robustness against the collusion attack.

  4. Analysing Trust Transitivity and The Effects of Unknown Dependence

    Directory of Open Access Journals (Sweden)

    Touhid Bhuiyan

    2010-03-01

    Full Text Available Trust can be used to improve online automated recommendation within a given domain. Trust transitivity is used to make it successful. But trust transitivity has different interpretations. Trust and trust transitivity; both are the human mental phenomenon and for this reason, there is no such thing as objective transitivity. Trust transitivity and trust fusion both are important elements in computational trust. This paper analyses the parameter dependence problem in trust transitivity and proposes some definitions considering the effects of base rate. In addition, it also proposes belief functions based on subjective logic to analyse trust transitivity of three specified cases with sensitive and insensitive based rate. Then it presents a quantitative analysis of the effects of unknown dependence problem in an interconnected network environment; such Internet.

  5. Trust at Work: A Study on Faith and Trust of Protestant Entrepreneurs in China

    Directory of Open Access Journals (Sweden)

    Joy K. C. Tong

    2016-12-01

    Full Text Available There is much talk about the trust crisis in China and the possible role of religion in rebuilding China’s moral order. This study is an attempt to examine religion’s impact on the emerging market economy in China, focusing on trust in business relations that might be generated by the Christian faith. Based on 43 in-depth interviews with Christian entrepreneurs in China, our study shows that the majority of our respondents tend to be: (1 more willing to be trustworthy after becoming Christians; (2 trusting people who share their faith more than others; (3 perceiving religious persons, regardless of what that religion is, as more trustworthy than the non-religious. Our study shows that religiosity is used by many Christian entrepreneurs as a category to guide their decision-making and that it is significant in stimulating and maintaining trust in and from others.

  6. An Efficient Dynamic Trust Evaluation Model for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Zhengwang Ye

    2017-01-01

    Full Text Available Trust evaluation is an effective method to detect malicious nodes and ensure security in wireless sensor networks (WSNs. In this paper, an efficient dynamic trust evaluation model (DTEM for WSNs is proposed, which implements accurate, efficient, and dynamic trust evaluation by dynamically adjusting the weights of direct trust and indirect trust and the parameters of the update mechanism. To achieve accurate trust evaluation, the direct trust is calculated considering multitrust including communication trust, data trust, and energy trust with the punishment factor and regulating function. The indirect trust is evaluated conditionally by the trusted recommendations from a third party. Moreover, the integrated trust is measured by assigning dynamic weights for direct trust and indirect trust and combining them. Finally, we propose an update mechanism by a sliding window based on induced ordered weighted averaging operator to enhance flexibility. We can dynamically adapt the parameters and the interactive history windows number according to the actual needs of the network to realize dynamic update of direct trust value. Simulation results indicate that the proposed dynamic trust model is an efficient dynamic and attack-resistant trust evaluation model. Compared with existing approaches, the proposed dynamic trust model performs better in defending multiple malicious attacks.

  7. Electrical installations of the Channel tunnel; Installations electriques du Tunnel sous la Manche

    Energy Technology Data Exchange (ETDEWEB)

    Kersabiec, G. de [Eurotunnel, Folkestone (United Kingdom)

    2002-08-01

    Like an underground factory, the railway and auxiliary equipments of the Channel tunnel between France and UK, need a reliable and redundant power supply with a high quality maintenance. This article presents: the design criteria of the power distribution systems, the installation itself and the organisation of its exploitation: 1 - transportation system of the Channel tunnel (loads to supply, exploitation imperatives, fundamental criteria); 2 - external power sources (connection to the UK and French grids, values used by the national grids); 3 - exploitation criteria, tunnel design; 4 - description (main UK and French power stations, 25 kV traction network, 21 kV distribution network, tunnels, lighting in railway tunnels, supply of terminals, earthing network); 5 - exploitation; 6 - maintenance and quality. (J.S.)

  8. Trust Me, Principal, or Burn Out! The Relationship between Principals' Burnout and Trust in Students and Parents

    Science.gov (United States)

    Ozer, Niyazi

    2013-01-01

    The purpose of this study was to determine the primary school principals' views on trust in students and parents and also, to explore the relationships between principals' levels of professional burnout and their trust in students and parents. To this end, Principal Trust Survey and Friedman Principal Burnout scales were administered on 119…

  9. NGOs, Trust, and the Accountability Agenda

    DEFF Research Database (Denmark)

    Keating, Vincent Charles; Thrandardottir, Erla

    2017-01-01

    NGOs are undergoing an alleged crisis of trustworthiness. The past decades have seen an increase in both academic and practitioner skepticism, particularly given the transformations many NGOs have undergone in size, professionalism, and political importance. The accountability agenda, which...... on theoretical innovations in trust research to put forward three arguments. First, the proponents of the accountability agenda are implicitly working with a rational model of trust. Second, this model does not reflect important social characteristics of trust between donors and NGOs. Third, this mismatch means...... that the accountability agenda might do more to harm trust in NGOs than to help it....

  10. Heavy-Atom Tunneling Calculations in Thirteen Organic Reactions: Tunneling Contributions are Substantial, and Bell's Formula Closely Approximates Multidimensional Tunneling at ≥250 K.

    Science.gov (United States)

    Doubleday, Charles; Armas, Randy; Walker, Dana; Cosgriff, Christopher V; Greer, Edyta M

    2017-10-09

    Multidimensional tunneling calculations are carried out for 13 reactions, to test the scope of heavy-atom tunneling in organic chemistry, and to check the accuracy of one-dimensional tunneling models. The reactions include pericyclic, cycloaromatization, radical cyclization and ring opening, and S N 2. When compared at the temperatures that give the same effective rate constant of 3×10 -5  s -1 , tunneling accounts for 25-95 % of the rate in 8 of the 13 reactions. Values of transmission coefficients predicted by Bell's formula, κ Bell  , agree well with multidimensional tunneling (canonical variational transition state theory with small curvature tunneling), κ SCT . Mean unsigned deviations of κ Bell vs. κ SCT are 0.08, 0.04, 0.02 at 250, 300 and 400 K. This suggests that κ Bell is a useful first choice for predicting transmission coefficients in heavy-atom tunnelling. © 2017 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  11. Trust and risk: a model for medical education.

    Science.gov (United States)

    Damodaran, Arvin; Shulruf, Boaz; Jones, Philip

    2017-09-01

    Health care delivery, and therefore medical education, is an inherently risky business. Although control mechanisms, such as external audit and accreditation, are designed to manage risk in clinical settings, another approach is 'trust'. The use of entrustable professional activities (EPAs) represents a deliberate way in which this is operationalised as a workplace-based assessment. Once engaged with the concept, clinical teachers and medical educators may have further questions about trust. This narrative overview of the trust literature explores how risk, trust and control intersect with current thinking in medical education, and makes suggestions for potential directions of enquiry. Beyond EPAs, the importance of trust in health care and medical education is reviewed, followed by a brief history of trust research in the wider literature. Interpersonal and organisational levels of trust and a model of trust from the management literature are used to provide the framework with which to decipher trust decisions in health care and medical education, in which risk and vulnerability are inherent. In workplace learning and assessment, the language of 'trust' may offer a more authentic and practical vocabulary than that of 'competency' because clinical and professional risks are explicitly considered. There are many other trust relationships in health care and medical education. At the most basic level, it is helpful to clearly delineate who is the trustor, the trustee, and for what task. Each relationship has interpersonal and organisational elements. Understanding and considered utilisation of trust and control mechanisms in health care and medical education may lead to systems that maturely manage risk while actively encouraging trust and empowerment. © 2017 John Wiley & Sons Ltd and The Association for the Study of Medical Education.

  12. Macroscopic quantum tunneling in Josephson tunnel junctions and Coulomb blockade in single small tunnel junctions

    International Nuclear Information System (INIS)

    Cleland, A.N.

    1991-01-01

    Experiments investigated the process of macroscopic quantum tunneling in a moderately-damped, resistively shunted, Josephson junction are described, followed by a discussion of experiments performed on very-small-capacitance normal-metal tunnel junctions. The experiments on the resistively-shunted Josephson junction were designed to investigate a quantum process, that of the tunneling of the Josephson-phase variable under a potential barrier, in a system in which dissipation plays a major role in the dynamics of motion. All the parameters of the junction were measured using the classical phenomena of thermal activation and resonant activation. Theoretical predictions are compared with the experimental results, showing good agreement with no adjustable parameters. The experiments on small-capacitance tunnel junctions extend the measurements on the large-area Josephson junctions from the region in which the phase variable has a fairly well-defined value, i.e. its wave function has a narrow width, to the region where its value is almost completely unknown. The charge on the junction becomes well-defined and is predicted to quantize the current through the junction, giving rise to the Coulomb blockade at low bias

  13. Social trust and grassroots governance in rural China.

    Science.gov (United States)

    Huhe, Narisong; Chen, Jie; Tang, Min

    2015-09-01

    The relationship between social trust and governance has been one of the focal points of the academic and policy-making communities. Empirical studies on this relationship, however, have focused mostly on democracies. The scarcity of such studies in authoritarian countries has left many important questions unanswered: Is social trust associated with effective governance only in democratic settings? Can social trust improve the quality of governance in non-democracies as well? Drawing on data from 2005 China General Social Survey-a representative survey conducted nationwide at both the individual- and village-level in rural China, this paper attempts to answer these questions empirically by examining the relationship between social trust and the quality of governance in rural China. The findings reveal that different types of social trust-particularized trust and generalized trust-correspond with different effects in rural governance: whereas villagers' trust in people whom they knew personally was positively and significantly associated with the provision of various public goods and services, their trust in strangers had virtually no impact on rural governance. Copyright © 2015 Elsevier Inc. All rights reserved.

  14. Tunneling rates in electron transport through double-barrier molecular junctions in a scanning tunneling microscope.

    Science.gov (United States)

    Nazin, G V; Wu, S W; Ho, W

    2005-06-21

    The scanning tunneling microscope enables atomic-scale measurements of electron transport through individual molecules. Copper phthalocyanine and magnesium porphine molecules adsorbed on a thin oxide film grown on the NiAl(110) surface were probed. The single-molecule junctions contained two tunneling barriers, vacuum gap, and oxide film. Differential conductance spectroscopy shows that electron transport occurs via vibronic states of the molecules. The intensity of spectral peaks corresponding to the individual vibronic states depends on the relative electron tunneling rates through the two barriers of the junction, as found by varying the vacuum gap tunneling rate by changing the height of the scanning tunneling microscope tip above the molecule. A simple, sequential tunneling model explains the observed trends.

  15. Familiarity Vs Trust: A Comparative Study of Domain Scientists' Trust in Visual Analytics and Conventional Analysis Methods.

    Science.gov (United States)

    Dasgupta, Aritra; Lee, Joon-Yong; Wilson, Ryan; Lafrance, Robert A; Cramer, Nick; Cook, Kristin; Payne, Samuel

    2017-01-01

    Combining interactive visualization with automated analytical methods like statistics and data mining facilitates data-driven discovery. These visual analytic methods are beginning to be instantiated within mixed-initiative systems, where humans and machines collaboratively influence evidence-gathering and decision-making. But an open research question is that, when domain experts analyze their data, can they completely trust the outputs and operations on the machine-side? Visualization potentially leads to a transparent analysis process, but do domain experts always trust what they see? To address these questions, we present results from the design and evaluation of a mixed-initiative, visual analytics system for biologists, focusing on analyzing the relationships between familiarity of an analysis medium and domain experts' trust. We propose a trust-augmented design of the visual analytics system, that explicitly takes into account domain-specific tasks, conventions, and preferences. For evaluating the system, we present the results of a controlled user study with 34 biologists where we compare the variation of the level of trust across conventional and visual analytic mediums and explore the influence of familiarity and task complexity on trust. We find that despite being unfamiliar with a visual analytic medium, scientists seem to have an average level of trust that is comparable with the same in conventional analysis medium. In fact, for complex sense-making tasks, we find that the visual analytic system is able to inspire greater trust than other mediums. We summarize the implications of our findings with directions for future research on trustworthiness of visual analytic systems.

  16. Vacuum phonon tunneling.

    Science.gov (United States)

    Altfeder, Igor; Voevodin, Andrey A; Roy, Ajit K

    2010-10-15

    Field-induced phonon tunneling, a previously unknown mechanism of interfacial thermal transport, has been revealed by ultrahigh vacuum inelastic scanning tunneling microscopy (STM). Using thermally broadened Fermi-Dirac distribution in the STM tip as in situ atomic-scale thermometer we found that thermal vibrations of the last tip atom are effectively transmitted to sample surface despite few angstroms wide vacuum gap. We show that phonon tunneling is driven by interfacial electric field and thermally vibrating image charges, and its rate is enhanced by surface electron-phonon interaction.

  17. Breaking through the tranfer tunnel

    CERN Document Server

    Laurent Guiraud

    2001-01-01

    This image shows the tunnel boring machine breaking through the transfer tunnel into the LHC tunnel. Proton beams will be transferred from the SPS pre-accelerator to the LHC at 450 GeV through two specially constructed transfer tunnels. From left to right: LHC Project Director, Lyn Evans; CERN Director-General (at the time), Luciano Maiani, and Director for Accelerators, Kurt Hubner.

  18. New Tunneling Features in Polar III-Nitride Resonant Tunneling Diodes

    Directory of Open Access Journals (Sweden)

    Jimy Encomendero

    2017-10-01

    Full Text Available For the past two decades, repeatable resonant tunneling transport of electrons in III-nitride double barrier heterostructures has remained elusive at room temperature. In this work we theoretically and experimentally study III-nitride double-barrier resonant tunneling diodes (RTDs, the quantum transport characteristics of which exhibit new features that are unexplainable using existing semiconductor theory. The repeatable and robust resonant transport in our devices enables us to track the origin of these features to the broken inversion symmetry in the uniaxial crystal structure, which generates built-in spontaneous and piezoelectric polarization fields. Resonant tunneling transport enabled by the ground state as well as by the first excited state is demonstrated for the first time over a wide temperature window in planar III-nitride RTDs. An analytical transport model for polar resonant tunneling heterostructures is introduced for the first time, showing a good quantitative agreement with experimental data. From this model we realize that tunneling transport is an extremely sensitive measure of the built-in polarization fields. Since such electric fields play a crucial role in the design of electronic and photonic devices, but are difficult to measure, our work provides a completely new method to accurately determine their magnitude for the entire class of polar heterostructures.

  19. The Impact of Trust on Job Performance in Organisations

    Directory of Open Access Journals (Sweden)

    Ana Nešić

    2016-04-01

    Full Text Available In circumstances governed by consistent change in all aspects of business, trust represents a significant factor in the behavioural patterns of organisations. Of great importance for a successful communication in organisations is understanding the levels of trust among staff, employees and their management, and trust in the organisation itself. Trust is a cohesive and motivating factor in work groups. Also, based on trust are identification and commitment to the organisation, as well as the relationships of employees. In successful organisations special attention is given to the problems of trust and mistrust. This work considers different theoretical concepts of how trust is created and maintained in organisations, different dimensions of organisational trust, as well as the effects of trust in organisational performance.

  20. Theoretical consideration of spin-polarized resonant tunneling in magnetic tunnel junctions

    International Nuclear Information System (INIS)

    Mu Haifeng; Zhu Zhengang; Zheng Qingrong; Jin Biao; Wang Zhengchuan; Su Gang

    2004-01-01

    A recent elegant experimental realization [S. Yuasa et al., Science 297 (2002) 234] of the spin-polarized resonant tunneling in magnetic tunnel junctions is interpreted in terms of a two-band model. It is shown that the tunnel magnetoresistance (TMR) decays oscillatorily with the thickness of the normal metal (NM) layer, being fairly in agreement with the experimental observation. The tunnel conductance is found to decay with slight oscillations with the increase of the NM layer thickness, which is also well consistent with the experiment. In addition, when the magnetizations of both ferromagnet electrodes are not collinearly aligned, TMR is found to exhibit sharp resonant peaks at some particular thickness of the NM layer. The peaked TMR obeys nicely a Gaussian distribution against the relative orientation of the magnetizations

  1. Histological Observation of Regions around Bone Tunnels after Compression of the Bone Tunnel Wall in Ligament Reconstruction

    International Nuclear Information System (INIS)

    Maeda, Shintaro; Ishikawa, Hiroki; Tanigawa, Naoaki; Miyazaki, Kyosuke; Shioda, Seiji

    2012-01-01

    The objectives of this study were to investigate the time-course of influence of compression of bone tunnel wall in ligament reconstruction on tissue around the bone tunnel and to histologically examine the mechanism of preventing the complication of bone tunnel dilation, using rabbit tibia. A model in which the femoral origin of the extensor digitorum longus tendon was cut and inserted into a bone tunnel made proximal to the tibia was prepared in the bilateral hind legs of 20 Japanese white rabbits. In each animal, a tunnel was made using a drill only in the right leg, while an undersized bone tunnel was made by drilling and then dilated by compression using a dilator to the same tunnel size as that in the right leg. Animals were sacrificed at 0, 2, 4, 8 and 12 weeks after surgery (4 animals at each time point). Observation of bone tunnels by X-ray radiography showed osteosclerosis in the 2- and 4-week dilation groups. Osteosclerosis appeared as white lines around the bone tunnel on X-ray radiography. This suggests that dilation promotes callus formation in the bone tunnel wall and prevents the complication of bone tunnel enlargement after ligament reconstruction

  2. 25 CFR 166.307 - Will the grazing capacity be increased if I graze adjacent trust or non-trust rangelands not...

    Science.gov (United States)

    2010-04-01

    ... § 166.307 Will the grazing capacity be increased if I graze adjacent trust or non-trust rangelands not... trust or non-trust rangeland in common with the permitted land. Grazing capacity will be established... 25 Indians 1 2010-04-01 2010-04-01 false Will the grazing capacity be increased if I graze...

  3. Trust management in cloud services

    CERN Document Server

    Noor, Talal H; Bouguettaya, Athman

    2014-01-01

    This book describes the design and implementation of Cloud Armor, a novel approach for credibility-based trust management and automatic discovery of cloud services in distributed and highly dynamic environments. This book also helps cloud users to understand the difficulties of establishing trust in cloud computing and the best criteria for selecting a service cloud. The techniques have been validated by a prototype system implementation and experimental studies using a collection of real world trust feedbacks on cloud services.The authors present the design and implementation of a novel pro

  4. Trusted cloud computing

    CERN Document Server

    Krcmar, Helmut; Rumpe, Bernhard

    2014-01-01

    This book documents the scientific results of the projects related to the Trusted Cloud Program, covering fundamental aspects of trust, security, and quality of service for cloud-based services and applications. These results aim to allow trustworthy IT applications in the cloud by providing a reliable and secure technical and legal framework. In this domain, business models, legislative circumstances, technical possibilities, and realizable security are closely interwoven and thus are addressed jointly. The book is organized in four parts on "Security and Privacy", "Software Engineering and

  5. Tunnel fire testing and modeling the Morgex North tunnel experiment

    CERN Document Server

    Borghetti, Fabio; Gandini, Paolo; Frassoldati, Alessio; Tavelli, Silvia

    2017-01-01

    This book aims to cast light on all aspects of tunnel fires, based on experimental activities and theoretical and computational fluid dynamics (CFD) analyses. In particular, the authors describe a transient full-scale fire test (~15 MW), explaining how they designed and performed the experimental activity inside the Morgex North tunnel in Italy. The entire organization of the experiment is described, from preliminary evaluations to the solutions found for management of operational difficulties and safety issues. This fire test allowed the collection of different measurements (temperature, air velocity, smoke composition, pollutant species) useful for validating and improving CFD codes and for testing the real behavior of the tunnel and its safety systems during a diesel oil fire with a significant heat release rate. Finally, the fire dynamics are compared with empirical correlations, CFD simulations, and literature measurements obtained in other similar tunnel fire tests. This book will be of interest to all ...

  6. A Chinese sky trust?

    Energy Technology Data Exchange (ETDEWEB)

    Brenner, Mark [Political Economy Research Institute, University of Massachusetts, Amherst (United States)]. E-mail: brenner@econs.umass.edu; Riddle, Matthew [Department of Economics, University of Massachusetts, Amherst (United States)]. E-mail: mriddle@econs.umass.edu; Boyce, James K. [Political Economy Research Institute and Department of Economics, University of Massachusetts, Amherst (United States)]. E-mail: boyce@econs.umass.edu

    2007-03-15

    The introduction of carbon charges on the use of fossil fuels in China would have a progressive impact on income distribution. This outcome, which contrasts to the regressive distributional impact found in most studies of carbon charges in industrialized countries, is driven primarily by differences between urban and rural expenditure patterns. If carbon revenues were recycled on an equal per capita basis via a 'sky trust,' the progressive impact would be further enhanced: low-income (mainly rural) households would receive more in sky-trust dividends than they pay in carbon charges, and high-income (mainly urban) households would pay more than they receive in dividends. Thus a Chinese sky trust would contribute to both lower fossil fuel consumption and greater income equality.

  7. A Chinese sky trust?

    International Nuclear Information System (INIS)

    Brenner, Mark; Riddle, Matthew; Boyce, James K.

    2007-01-01

    The introduction of carbon charges on the use of fossil fuels in China would have a progressive impact on income distribution. This outcome, which contrasts to the regressive distributional impact found in most studies of carbon charges in industrialized countries, is driven primarily by differences between urban and rural expenditure patterns. If carbon revenues were recycled on an equal per capita basis via a 'sky trust,' the progressive impact would be further enhanced: low-income (mainly rural) households would receive more in sky-trust dividends than they pay in carbon charges, and high-income (mainly urban) households would pay more than they receive in dividends. Thus a Chinese sky trust would contribute to both lower fossil fuel consumption and greater income equality

  8. Optimization of a tunneling barrier in magnetic tunneling junction by tilted-plasma oxidation

    International Nuclear Information System (INIS)

    Nam, C.H.; Shim, Heejae; Kim, K.S.; Cho, B.K.

    2004-01-01

    Oxidation of an AlO x insulating barrier in a magnetic tunneling junction (MTJ) was carried out by a tilted-plasma oxidation method. It was found that the tilted-plasma oxidation induced a gradual change in the extent of oxidation of an insulating layer, which consequently led to a gradual change in the tunneling magnetoresistance (TMR) and specific junction resistance (RA) of the MTJ. We found a linear relation in the TMR versus RA curve with positive and negative slopes for less- and overoxidized junctions, respectively, and a parabolic relation for optimally oxidized junctions. The crossover in the TMR versus RA curves provides an effective and useful way to optimize (and monitor) the oxidation condition of a tunneling barrier in MTJs especially of a tunneling barrier less than 10 A thick. The tunneling junctions were also investigated after thermal annealing at various temperatures. The observations after thermal annealing were found to be consistent with transmission electrons microscopy images and a scenario of the partial formation of an additional ultrathin tunneling barrier at the top surface of the bottom magnetic layer

  9. "That is why I have trust": unpacking what 'trust' means to participants in international genetic research in Pakistan and Denmark.

    Science.gov (United States)

    Sheikh, Zainab; Hoeyer, Klaus

    2018-06-01

    Trust features prominently in a number of policy documents that have been issued in recent years to facilitate data sharing and international collaboration in medical research. However, it often remains unclear what is meant by 'trust'. By exploring a concrete international collaboration between Denmark and Pakistan, we develop a way of unpacking trust that shifts focus from what trust 'is' to what people invest in relationships and what references to trust do for them in these relationships. Based on interviews in both Pakistan and Denmark with people who provide blood samples and health data for the same laboratory, we find that when participants discuss trust they are trying to shape their relationship to researchers while simultaneously communicating important hopes, fears and expectations. The types of trust people talk about are never unconditional, but involve awareness of uncertainties and risks. There are different things at stake for people in different contexts, and therefore it is not the same to trust researchers in Pakistan as it is in Denmark, even when participants donate to the same laboratory. We conclude that casual references to 'trust' in policy documents risk glossing over important local differences and contribute to a de-politicization of basic inequalities in access to healthcare.

  10. International trust and public diplomacy

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    2015-01-01

    National leaders struggle to communicate in ways that are perceived as trustworthy by citizens of other nations because trust is linked to efficiency, business opportunities, and political influence. In this article, four recent public diplomacy activities are analyzed from a trust...

  11. 26 CFR 1.401(a)-50 - Puerto Rican trusts; election to be treated as a domestic trust.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 5 2010-04-01 2010-04-01 false Puerto Rican trusts; election to be treated as a domestic trust. 1.401(a)-50 Section 1.401(a)-50 Internal Revenue INTERNAL REVENUE SERVICE, DEPARTMENT OF THE TREASURY (CONTINUED) INCOME TAX (CONTINUED) INCOME TAXES Pension, Profit-Sharing, Stock Bonus Plans, Etc. § 1.401(a)-50 Puerto Rican trusts...

  12. A robust trust establishment scheme for wireless sensor networks.

    Science.gov (United States)

    Ishmanov, Farruh; Kim, Sung Won; Nam, Seung Yeob

    2015-03-23

    Security techniques like cryptography and authentication can fail to protect a network once a node is compromised. Hence, trust establishment continuously monitors and evaluates node behavior to detect malicious and compromised nodes. However, just like other security schemes, trust establishment is also vulnerable to attack. Moreover, malicious nodes might misbehave intelligently to trick trust establishment schemes. Unfortunately, attack-resistance and robustness issues with trust establishment schemes have not received much attention from the research community. Considering the vulnerability of trust establishment to different attacks and the unique features of sensor nodes in wireless sensor networks, we propose a lightweight and robust trust establishment scheme. The proposed trust scheme is lightweight thanks to a simple trust estimation method. The comprehensiveness and flexibility of the proposed trust estimation scheme make it robust against different types of attack and misbehavior. Performance evaluation under different types of misbehavior and on-off attacks shows that the detection rate of the proposed trust mechanism is higher and more stable compared to other trust mechanisms.

  13. A Robust Trust Establishment Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Farruh Ishmanov

    2015-03-01

    Full Text Available Security techniques like cryptography and authentication can fail to protect a network once a node is compromised. Hence, trust establishment continuously monitors and evaluates node behavior to detect malicious and compromised nodes. However, just like other security schemes, trust establishment is also vulnerable to attack. Moreover, malicious nodes might misbehave intelligently to trick trust establishment schemes. Unfortunately, attack-resistance and robustness issues with trust establishment schemes have not received much attention from the research community. Considering the vulnerability of trust establishment to different attacks and the unique features of sensor nodes in wireless sensor networks, we propose a lightweight and robust trust establishment scheme. The proposed trust scheme is lightweight thanks to a simple trust estimation method. The comprehensiveness and flexibility of the proposed trust estimation scheme make it robust against different types of attack and misbehavior. Performance evaluation under different types of misbehavior and on-off attacks shows that the detection rate of the proposed trust mechanism is higher and more stable compared to other trust mechanisms.

  14. BIOS Security Analysis and a Kind of Trusted BIOS

    Science.gov (United States)

    Zhou, Zhenliu; Xu, Rongsheng

    The BIOS's security threats to computer system are analyzed and security requirements for firmware BIOS are summarized in this paper. Through discussion about TCG's trust transitivity, a new approach about CRTM implementation based on BIOS is developed. In this paper, we also put forward a new trusted BIOS architecture-UTBIOS which is built on Intel Framework for EFI/UEFI. The trustworthiness of UTBIOS is based on trusted hardware TPM. In UTBIOS, trust encapsulation and trust measurement are used to construct pre-OS trust chain. Performance of trust measurement is also analyzed in the end.

  15. Trust, accreditation and Philanthropy in the Netherlands

    NARCIS (Netherlands)

    Bekkers, R.H.F.P.

    2003-01-01

    Given the increasing numbers of scandals, the awareness among fund-raisers that the public's trust is crucial for the nonprofit sector is growing. This study investigates the relationship between trust and charitable giving. Charitable organizations can increase the public's trust by signaling their

  16. Patient-physician trust: an exploratory study.

    Science.gov (United States)

    Thom, D H; Campbell, B

    1997-02-01

    Patients' trust in their physicians has recently become a focus of concern, largely owing to the rise of managed care, yet the subject remains largely unstudied. We undertook a qualitative research study of patients' self-reported experiences with trust in a physician to gain further understanding of the components of trust in the context of the patient-physician relationship. Twenty-nine patients participants, aged 26 to 72, were recruited from three diverse practice sites. Four focus groups, each lasting 1.5 to 2 hours, were conducted to explore patients' experiences with trust. Focus groups were audio-recorded, transcribed, and coded by four readers, using principles of grounded theory. The resulting consensus codes were grouped into seven categories of physician behavior, two of which related primarily to technical competence (thoroughness in evaluation and providing appropriate and effective treatment) and five of which were interpersonal (understanding patient's individual experience, expressing caring, communicating clearly and completely, building partnership/sharing power and honesty/respect for patient). Two additional categories were predisposing factors and structural/staffing factors. Each major category had multiple subcategories. Specific examples from each major category are provided. These nine categories of physician behavior encompassed the trust experiences related by the 29 patients. These categories and the specific examples provided by patients provide insights into the process of trust formation and suggest ways in which physicians could be more effective in building and maintaining trust.

  17. Public trust in health care : Exploring the mechanisms

    NARCIS (Netherlands)

    van der Schee, E.

    2016-01-01

    The aim of this thesis is to investigate how public trust in health care is formed, by studying the mechanisms behind it, addressing the following research question: ‘Which mechanisms explain differences in public trust in health care?’. Public trust in health care is important. Low levels of trust

  18. Quantum mechanical tunneling in chemical physics

    CERN Document Server

    Nakamura, Hiroki

    2016-01-01

    Quantum mechanical tunneling plays important roles in a wide range of natural sciences, from nuclear and solid-state physics to proton transfer and chemical reactions in chemistry and biology. Responding to the need for further understanding of multidimensional tunneling, the authors have recently developed practical methods that can be applied to multidimensional systems. Quantum Mechanical Tunneling in Chemical Physics presents basic theories, as well as original ones developed by the authors. It also provides methodologies and numerical applications to real molecular systems. The book offers information so readers can understand the basic concepts and dynamics of multidimensional tunneling phenomena and use the described methods for various molecular spectroscopy and chemical dynamics problems. The text focuses on three tunneling phenomena: (1) energy splitting, or tunneling splitting, in symmetric double well potential, (2) decay of metastable state through tunneling, and (3) tunneling effects in chemical...

  19. TRUST MODEL FOR SOCIAL NETWORK USING SINGULAR VALUE DECOMPOSITION

    Directory of Open Access Journals (Sweden)

    Davis Bundi Ntwiga

    2016-06-01

    Full Text Available For effective interactions to take place in a social network, trust is important. We model trust of agents using the peer to peer reputation ratings in the network that forms a real valued matrix. Singular value decomposition discounts the reputation ratings to estimate the trust levels as trust is the subjective probability of future expectations based on current reputation ratings. Reputation and trust are closely related and singular value decomposition can estimate trust using the real valued matrix of the reputation ratings of the agents in the network. Singular value decomposition is an ideal technique in error elimination when estimating trust from reputation ratings. Reputation estimation of trust is optimal at the discounting of 20 %.

  20. ComTrustO: Composite Trust-Based Ontology Framework for Information and Decision Fusion

    Science.gov (United States)

    2015-07-06

    11] presents a methodological approach for ontology management allowing development of extensible ontologies and the mapping from ontologies to...ComTrustO: Composite Trust-based Ontology Framework for Information and Decision Fusion Alessandro Oltramari Carnegie Mellon University Pittsburgh... ontology -based framework for information fusion, as a support system for human decision makers. In particular, we build upon the concept of composite

  1. Tunneling into quantum wires: regularization of the tunneling Hamiltonian and consistency between free and bosonized fermions

    OpenAIRE

    Filippone, Michele; Brouwer, Piet

    2016-01-01

    Tunneling between a point contact and a one-dimensional wire is usually described with the help of a tunneling Hamiltonian that contains a delta function in position space. Whereas the leading order contribution to the tunneling current is independent of the way this delta function is regularized, higher-order corrections with respect to the tunneling amplitude are known to depend on the regularization. Instead of regularizing the delta function in the tunneling Hamiltonian, one may also obta...

  2. Competition Fosters Trust

    DEFF Research Database (Denmark)

    Huck, Steffen; Ruchala, Gabriele K.; Tyran, Jean-Robert

    We study the effects of reputation and competition in a stylized market for experience goods. If interaction is anonymous, such markets perform poorly: sellers are not trustworthy, and buyers do not trust sellers. If sellers are identifiable and can, hence, build a reputation, efficiency quadruples...... but is still at only a third of the first best. Adding more information by granting buyers access to all sellers’ complete history has, somewhat surprisingly, no effect. On the other hand, we find that competition, coupled with some minimal information, eliminates the trust problem almost completely...

  3. Trust, accreditation, and philanthropy in the Netherlands.

    NARCIS (Netherlands)

    Bekkers, Rene H.F.P.

    2003-01-01

    Given the increasing numbers of scandals, the awareness among fund-raisers that the public’s trust is crucial for the nonprofit sector is growing. This study investigates the relationship between trust and charitable giving. Charitable organizations can increase the public’s trust by signaling their

  4. 5 CFR 2634.405 - Certification of trusts.

    Science.gov (United States)

    2010-01-01

    ... FINANCIAL DISCLOSURE, QUALIFIED TRUSTS, AND CERTIFICATES OF DIVESTITURE Qualified Trusts § 2634.405... documents and responses to requests for information, including a statement that any interested party who will be a party to a certified trust instrument has read and understands the overview of executive...

  5. 25 CFR 115.813 - Is there a limit to the amount of trust funds OTFM will disburse from a tribal trust account?

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Is there a limit to the amount of trust funds OTFM will... Investing and Managing Tribal Trust Funds § 115.813 Is there a limit to the amount of trust funds OTFM will disburse from a tribal trust account? OTFM will only disburse the available balance of the trust funds in a...

  6. Tunnelling of a molecule

    International Nuclear Information System (INIS)

    Jarvis, P.D.; Bulte, D.P.

    1998-01-01

    A quantum-mechanical description of tunnelling is presented for a one-dimensional system with internal oscillator degrees of freedom. The 'charged diatomic molecule' is frustrated on encountering a barrier potential by its centre of charge not being coincident with its centre of mass, resulting in transitions amongst internal states. In an adiabatic limit, the tunnelling of semiclassical coherent-like oscillator states is shown to exhibit the Hartman and Bueuttiker-Landauer times t H and t BL , with the time dependence of the coherent state parameter for the tunnelled state given by α(t) = α e -iω(t+Δt) , Δt = t H - it BL . A perturbation formalism is developed, whereby the exact transfer matrix can be expanded to any desired accuracy in a suitable limit. An 'intrinsic' time, based on the oscillator transition rate during tunnelling, transmission or reflection, is introduced. In simple situations the resulting intrinsic tunnelling time is shown to vanish to lowest order. In the general case a particular (nonzero) parametrisation is inferred, and its properties discussed in comparison with the literature on tunnelling times for both wavepackets and internal clocks. Copyright (1998) CSIRO Australia

  7. Introduction to Hardware Security and Trust

    CERN Document Server

    Wang, Cliff

    2012-01-01

    The emergence of a globalized, horizontal semiconductor business model raises a set of concerns involving the security and trust of the information systems on which modern society is increasingly reliant for mission-critical functionality. Hardware-oriented security and trust issues span a broad range including threats related to the malicious insertion of Trojan circuits designed, e.g.,to act as a ‘kill switch’ to disable a chip, to integrated circuit (IC) piracy,and to attacks designed to extract encryption keys and IP from a chip. This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade.  Coverage includes security and trust issues in all types of electronic devices and systems such as ASICs, COTS, FPGAs, microprocessors/DSPs, and embedded systems.  This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of,and trust in, modern society�...

  8. Do professional boundaries limit trust?

    Science.gov (United States)

    Smythe, Elizabeth; Hennessy, Julia; Abbott, Max; Hughes, Frances

    2018-02-01

    The present study uses stories of mental health support workers talking about their relationship with clients to wonder about how trust might be limited by the professional boundaries of nursing. The writing arose out of an appreciative inquiry study looking at the role of mental health support workers. Participants talked about how they worked with their clients. As researchers, we were struck by the depth of trust that was built between worker and client. We have brought a phenomenological lens to wonder about the nature of trust, as shown in the data. The original research sought to identify what was working well for mental health support workers. The present study brings a phenomenological interpretive approach to four stories from the discovery phase of the study, with our thinking informed by Heidegger and van Manen. Interviews were conducted with 26 mental health support workers and six stakeholders in 2012-2103. For this paper, we drew from those transcripts stories of three mental health support workers and one stakeholder. Through a process of talking together, writing, and rewriting, we wondered about the meaning within these stories, with a strong focus on how trust was enacted. We saw that mental health support workers in this study, by not carrying the boundaries of being 'professional', seemed free to grow a stronger relationship of trust which was therapeutic. We ask: Is it time to rethink how professional boundaries limit the level of trust achieved with clients to the detriment of impactful care? © 2017 Australian College of Mental Health Nurses Inc.

  9. Influence of quasiparticle multi-tunneling on the energy flow through the superconducting tunnel junction

    International Nuclear Information System (INIS)

    Samedov, V. V.; Tulinov, B. M.

    2011-01-01

    Superconducting tunnel junction (STJ) detector consists of two layers of superconducting material separated by thin insulating barrier. An incident particle produces in superconductor excess nonequilibrium quasiparticles. Each quasiparticle in superconductor should be considered as quantum superposition of electron-like and hole-like excitations. This duality nature of quasiparticle leads to the effect of multi-tunneling. Quasiparticle starts to tunnel back and forth through the insulating barrier. After tunneling from biased electrode quasiparticle loses its energy via phonon emission. Eventually, the energy that equals to the difference in quasiparticle energy between two electrodes is deposited in the signal electrode. Because of the process of multi-tunneling, one quasiparticle can deposit energy more than once. In this work, the theory of branching cascade processes was applied to the process of energy deposition caused by the quasiparticle multi-tunneling. The formulae for the mean value and variance of the energy transferred by one quasiparticle into heat were derived. (authors)

  10. Trust-aware Privacy Control for Social Media

    OpenAIRE

    Li, Na; Najafian-Razavi, Maryam; Gillet, Denis

    2011-01-01

    Due to the huge exposure of personal information in social media, a challenge now is to design effective privacy mechanisms that protect against unauthorized access to social data. In this paper, a trust model for social media is first presented. Based on the trust model, a trust-aware privacy control protocol is proposed, that exploits the underlying inter-entity trust information. The objective is to design a fine-grained privacy scheme that ensures a user’s online information is disclosed ...

  11. Physical trust-based persistent authentication

    DEFF Research Database (Denmark)

    Fujita, Masahiro; Jensen, Christian D.; Arimura, Shiori

    2015-01-01

    propose a new type of persistent authentication, called Persistent Authentication Based On physical Trust (PABOT). PABOT uses a context of “physical trust relationship” that is built by visual contact between users, and thus can offer a persistent authentication mechanism with better usability and higher...

  12. Enhanced MRI in carpal tunnel syndrome

    International Nuclear Information System (INIS)

    Hayakawa, Katsuhiko; Nakane, Takashi; Kobayashi, Shigeru; Asai, Takahiro; Wada, Kunio; Yoshizawa, Hidezo

    1998-01-01

    In this study, we performed contrast-enhanced MRI in patients with idiopathic carpal tunnel syndrome and examined the morphologic change in the carpal tunnel. In the transverse section of the opening of carpal tunnel where scaphoid and pisiform bones are figured out, we measured and examined 4 items, viz. the soft carpal tunnel volume, flat rate of median nerve, position of median nerve and thickness of palmer ligaments composing the base of carpal tunnel, with an image analyzer attached to the MRI apparatus. Whereas the average carpal tunnel volume in 12 hands of normal controls was 166.8 mm 2 , that in 74 hands of carpal tunnel syndrome was 207.2 mm 2 , a significant increase compared with the normal controls. The flat rate of median nerve was 46% in the controls, but that was 37.5% in the carpal tunnel syndrome, a significant flattening was noted. We connected the peaks of the scaphoid node and pisiform bone with a line and named it standard line. When we observed the position of median nerve in the carpal tunnel, the nerve in 9 of 12 hands, 75%, lay below the standard line in the controls, but the nerve in 65 of 74 hands, 87.8%, lay above the standard line in the carpal tunnel syndrome, clearly showing that the median nerve had shifted to the palmar side. Regarding these morphologic changes of the carpal tunnel, the internal pressure of the carpal tunnel is considered to be raised with swelling of the soft tissues mainly composing the inside of carpal tunnel, thus the area of cross section of carpal tunnel to be increased, the median nerve to be shifted to the palmar side and the median nerve to be compressed by the transverse carpal ligament at that time. Although we can observe these morphological changes readily in MRI images, these images show only the results of carpal tunnel syndrome after all, and do not specify the direct causes. However, we believe that these facts are important factors in the manifestation of idiopathic carpal tunnel syndrome. (author)

  13. Josephson tunneling and nanosystems

    OpenAIRE

    Ovchinnikov, Yurii; Kresin, Vladimir

    2010-01-01

    Josephson tunneling between nanoclusters is analyzed. The discrete nature of the electronic energy spectra, including their shell ordering, is explicitly taken into account. The treatment considers the two distinct cases of resonant and non-resonant tunneling. It is demonstrated that the current density greatly exceeds the value discussed in the conventional theory. Nanoparticles are shown to be promising building blocks for nanomaterials-based tunneling networks.

  14. Trust and New Communication Technologies

    DEFF Research Database (Denmark)

    Ess, Charles

    2010-01-01

    I approach philosophical analyses of the phenomenon of trust vis-à-vis online communication, beginning with an overview from within the framework of computer-mediated communication (CMC) of concerns and paradigmatic failures of trust in the history of online communication. I turn to more directly...... the perspective of virtue ethics and phenomenological approaches to how we know and navigate the world as embodied beings - I then take up three major arguments in recent work in favor of the possibilities of trust online, followed by three vicious circles that run counter to more optimistic views. I close...

  15. In the CJEU Judges Trust

    DEFF Research Database (Denmark)

    Mayoral, Juan A.

    2016-01-01

    . A theory is offered in the article, which links national judges' trust in the CJEU to their corporatist identification and profile, to their attitudes towards the EU, and to their beliefs about the CJEU's ability to provide decisions that: 1) offer a clear guidance on European Union law, and 2......This article aims to highlight the relevance of judicial trust in international courts, focusing on national judges' trust in the Court of Justice of the European Union (CJEU). EU scholars have put a great deal of effort into explaining how legal and political factors affect the use of preliminary...

  16. A Model of Trusted Connection Architecture

    Directory of Open Access Journals (Sweden)

    Zhang Xun

    2017-01-01

    Full Text Available According to that traditional trusted network connection architecture (TNC has limitations on dynamic network environment and the user behavior support, we develop TCA to propose a trusted connection architecture supporting behavior measurement (TCA-SBM, besides, the structure diagram of network architecture is given. Through introducing user behavior measure elements, TCA-SBM can conduct measurement on the whole network in time dimension periodically, and refine the measurement on network behavior in measure dimension to conduct fine-grained dynamic trusted measurement. As a result, TCA-SBM enhances the TCA’s ability to adapt to the dynamic change of network and makes up the deficiency of trusted computing framework in the network connection.

  17. Trust in Co-sourced Software Development

    DEFF Research Database (Denmark)

    Schlichter, Bjarne Rerup; Persson, John Stouby

    2014-01-01

    Software development projects are increasingly geographical distributed with offshoring. Co-sourcing is a highly integrative and cohesive approach, seen successful, to software development offshoring. However, research of how dynamic aspects of trust are shaped in co-sourcing activities is limite...... understanding or personal trust relations. The paper suggests how certain work practices among developers and managers can be explained using a dynamic trust lens based on Abstract Systems, especially dis- and re-embedding mechanisms......Software development projects are increasingly geographical distributed with offshoring. Co-sourcing is a highly integrative and cohesive approach, seen successful, to software development offshoring. However, research of how dynamic aspects of trust are shaped in co-sourcing activities is limited...

  18. Probing spin-polarized tunneling at high bias and temperature with a magnetic tunnel transistor

    NARCIS (Netherlands)

    Park, B.G.; Banerjee, T.; Min, B.C.; Sanderink, Johannes G.M.; Lodder, J.C.; Jansen, R.

    2005-01-01

    The magnetic tunnel transistor (MTT) is a three terminal hybrid device that consists of a tunnel emitter, a ferromagnetic (FM) base, and a semiconductor collector. In the MTT with a FM emitter and a single FM base, spin-polarized hot electrons are injected into the base by tunneling. After

  19. Control of tunneling in heterostructures

    International Nuclear Information System (INIS)

    Volokhov, V M; Tovstun, C A; Ivlev, B

    2007-01-01

    A tunneling current between two rectangular potential wells can be effectively controlled by applying an external ac field. A variation of the ac frequency by 10% may lead to the suppression of the tunneling current by two orders of magnitude, which is a result of quantum interference under the action of the ac field. This effect of destruction of tunneling can be used as a sensitive control of tunneling current across nanosize heterostructures

  20. Generalized trust and intelligence in the United States.

    Directory of Open Access Journals (Sweden)

    Noah Carl

    Full Text Available Generalized trust refers to trust in other members of society; it may be distinguished from particularized trust, which corresponds to trust in the family and close friends. An extensive empirical literature has established that generalized trust is an important aspect of civic culture. It has been linked to a variety of positive outcomes at the individual level, such as entrepreneurship, volunteering, self-rated health, and happiness. However, two recent studies have found that it is highly correlated with intelligence, which raises the possibility that the other relationships in which it has been implicated may be spurious. Here we replicate the association between intelligence and generalized trust in a large, nationally representative sample of U.S. adults. We also show that, after adjusting for intelligence, generalized trust continues to be strongly associated with both self-rated health and happiness. In the context of substantial variation across countries, these results bolster the view that generalized trust is a valuable social resource, not only for the individual but for the wider society as well.

  1. A Secure Trust Establishment Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Farruh Ishmanov

    2014-01-01

    Full Text Available Trust establishment is an important tool to improve cooperation and enhance security in wireless sensor networks. The core of trust establishment is trust estimation. If a trust estimation method is not robust against attack and misbehavior, the trust values produced will be meaningless, and system performance will be degraded. We present a novel trust estimation method that is robust against on-off attacks and persistent malicious behavior. Moreover, in order to aggregate recommendations securely, we propose using a modified one-step M-estimator scheme. The novelty of the proposed scheme arises from combining past misbehavior with current status in a comprehensive way. Specifically, we introduce an aggregated misbehavior component in trust estimation, which assists in detecting an on-off attack and persistent malicious behavior. In order to determine the current status of the node, we employ previous trust values and current measured misbehavior components. These components are combined to obtain a robust trust value. Theoretical analyses and evaluation results show that our scheme performs better than other trust schemes in terms of detecting an on-off attack and persistent misbehavior.

  2. Trust in food: a comparative and institutional analysis

    National Research Council Canada - National Science Library

    Kjærnes, Unni; Warde, Alan; Harvey, Mark

    2007-01-01

    ... and institutional performance 2.6 Institutionalized relationships of trust 2.7 Determinants of trust in institutionalized arrangements 2.8 Forms of institutionalization and forms of trust in contemporary food markets 18 19 21 23 25 27 29 34 37 3 Enquiring into Trust: Some Methodological Considerations 3.1 The project 3.2 The nature of the comparative inst...

  3. Trust and Relationship Building in Electronic Commerce.

    Science.gov (United States)

    Papadopoulou, Panagiota; Andreou, Andreas; Kanellis, Panagiotis; Martakos, Drakoulis

    2001-01-01

    Discussion of the need for trust in electronic commerce to build customer relationships focuses on a model drawn from established theoretical work on trust and relationship marketing that highlights differences between traditional and electronic commerce. Considers how trust can be built into virtual environments. (Contains 50 references.)…

  4. Temperament Constructs Related to Betrayal of Trust

    Science.gov (United States)

    1991-12-01

    disintegrate. The interrelatedness between system trust and interpersonal trust has been noted by Durkheim (1933), who predicted a loss of trust in others...and suspicion. Journal of Conflict Resolution, 2, 265-279. Durkheim , E. (1933). The division of labor in societ’. New York: Free Press of Glencoe

  5. Tunnelling in Soft Soil : Tunnel Boring Machine Operation and Soil Response

    NARCIS (Netherlands)

    Festa, D.; Broere, W.; Bosch, J.W.

    2013-01-01

    Constructing tunnels in soft soil with the use of Tunnel Boring Machines may induce settlements including soil movements ahead of the face, soil relaxation into the tail void, possible heave due to grouting, long lasting consolidation processes, and potentially several other mechanisms. A

  6. Beyond Rule; Trust and Power as Capacities

    DEFF Research Database (Denmark)

    Raffnsøe, Sverre

    2013-01-01

    Taking an approach that avoids comprehending power and trust as entities to be studied apart, the article insists on elucidating trust and power as they are enacted in their intimate and delicate relationship to each other and to other human and social phenomena of similar importance......, such as knowledge and experience, gift-giving, hope, freedom and agency. To permit us to understand power and trust as interdependent dimensions, the article confronts the notions of power as command, coercion, control and calculation and develops a conception of power as a capacity. This permits us to consider...... trusting as an exercise of power and an anticipatory affect. Trust is a resolve to bear an experienced risk by confiding in the new and unknown....

  7. Seismic prediction ahead of tunnel constructions

    Science.gov (United States)

    Jetschny, S.; Bohlen, T.; Nil, D. D.; Giese, R.

    2007-12-01

    To increase safety and efficiency of tunnel constructions, online seismic exploration ahead of a tunnel can become a valuable tool. Within the \\it OnSite project founded by the BMBF (German Ministry of Education and Research) within \\it GeoTechnologien a new forward looking seismic imaging technique is developed to e.g. determine weak and water bearing zones ahead of the constructions. Our approach is based on the excitation and registration of \\it tunnel surface waves. These waves are excited at the tunnel face behind the cutter head of a tunnel boring machine and travel into drilling direction. Arriving at the front face they generate body waves (mainly S-waves) propagating further ahead. Reflected S-waves are back- converted into tunnel surface waves. For a theoretical description of the conversion process and for finding optimal acquisition geometries it is of importance to study the propagation characteristics of tunnel surface waves. 3D seismic finite difference modeling and analytic solutions of the wave equation in cylindric coordinates revealed that at higher frequencies, i.e. if the tunnel diameter is significantly larger than the wavelength of S-waves, these surface waves can be regarded as Rayleigh-waves circulating the tunnel. For smaller frequencies, i.e. when the S-wavelength approaches the tunnel diameter, the propagation characteristics of these surface waves are then similar to S- waves. Field measurements performed by the GeoForschungsZentrum Potsdam, Germany at the Gotthard Base Tunnel (Switzerland) show both effects, i.e. the propagation of Rayleigh- and body-wave like waves along the tunnel. To enhance our understanding of the excitation and propagation characteristics of tunnel surface waves the transition of Rayleigh to tube-waves waves is investigated both analytically and by numerical simulations.

  8. Trust Factors Affecting Cooperation in Construction

    DEFF Research Database (Denmark)

    Bohnstedt, Kristian Ditlev; Haugbølle, Kim; Bejder, Erik

    2013-01-01

    advisor was carried out. The analysis showed that the ability to be trustful can be developed through the experience of different factors (e.g. control mechanisms, mutual respect, repeated cooperation, shared understanding and communication). Furthermore, the ability to trust other parties depends...... on knowledge of others' skillsets. Interdisciplinary collaboration through education would limit the formation of negative stereotypes and the overall trust level increases, due to more and better knowledge of other disciplines....

  9. In Public Education Expenditures We Trust: Does Trust Increase Support for Public Education Expenditures?

    Science.gov (United States)

    Gur, Nurullah; Boyaci, Israfil; Ozcan, Yunus

    2015-01-01

    Trust is one crucial prerequisite for the welfare state. However, very few empirical studies exist that help us understand the mechanisms through which trust affects the welfare state. Influencing public support for developing friendly public policies might be one of these mechanisms. In this study, we use unique micro data from 34 countries to…

  10. Gap anisotropy and tunneling currents. [MPS3

    DEFF Research Database (Denmark)

    Lazarides, N.; Sørensen, Mads Peter

    1996-01-01

    The tunneling Hamiltonian formalism is applied to calculate the tunnelingcurrents through a small superconducting tunnel junction. The formalism isextended to nonconstant tunneling matrix elements. The electrodes of thejunction are assumed to......The tunneling Hamiltonian formalism is applied to calculate the tunnelingcurrents through a small superconducting tunnel junction. The formalism isextended to nonconstant tunneling matrix elements. The electrodes of thejunction are assumed to...

  11. Trust is other people

    DEFF Research Database (Denmark)

    Luckner, Naemi; Werner, Katharina; Subasi, Özge

    concerning the interaction with strangers through the platform. Putting trust in an online sharing community seems to be the biggest obstacle that influences whether people draw away rather than move closer together and start collaborating in the sharing community. Here, we report on the main issues...... involving other participants in the hope to find appropriate ways to create trustful sharing environments that reassure potential participants rather than play into their fears....

  12. System-wide versus component-specific trust using multiple aids.

    Science.gov (United States)

    Keller, David; Rice, Stephen

    2010-01-01

    Previous research in operator trust toward automated aids has focused primarily on single aids. The current study focuses on how operator trust is affected by the presence of multiple aids. Two competing theories of multiple-trust are presented. A component-specific trust theory predicts that operators will differentially place their trust in automated aids that vary in reliability. A system-wide trust theory predicts that operators will treat multiple imperfect aids as one "system" and merge their trust across aids despite differences in the aids' reliability. A simulated flight task was used to test these theories, whereby operators performed a pursuit tracking task while concurrently monitoring multiple system gauges that were augmented with perfect or imperfect automated aids. The data revealed that a system-wide trust theory best predicted the data; operators merged their trust across both aids, behaving toward a perfectly reliable aid in the same manner as they did towards unreliable aids.

  13. The Role of Trust in Computer Security

    DEFF Research Database (Denmark)

    Jensen, Christian D.

    2012-01-01

    technologies and show how many of them concern the placement of trust on human or system agents. We argue that making such assumptions about trust explicit is an essential requirement for the future of system security and argue why the formalisation of computational trust is necessary when we wish to reason...

  14. Physical pain increases interpersonal trust in females.

    Science.gov (United States)

    Wang, C; Gao, J; Ma, Y; Zhu, C; Dong, X-W

    2018-01-01

    People behave and interact with others differently when experiencing physical pain. Pain has dramatic effects on one's emotional responses, cognitive functions and social interaction. However, little has been known about whether and how physical pain influences interpersonal trust in social interaction. In the present study, we examined the influence of physical pain on trusting behaviour. A total of 112 healthy participants were recruited and assigned to physical pain condition (induced by Capsaicin) and control condition (with hand cream), respectively. Thirty minutes after pain induction, three decision-making tasks were conducted to measure behaviours in social interaction, including trust and trustworthiness (trust game), non-social risk-taking (risk game) and altruism (dictator game). Results showed that physical pain increased interpersonal trust among females, but not among males. Pain did not influence non-social risk-taking, altruism or trustworthiness, as evaluated by monetary transfers in those tasks. Moreover, the effect of physical pain on interpersonal trust was fully mediated by expectation of monetary profit. These findings demonstrate an effect of pain on interpersonal trust and suggest a reciprocity mechanism that the effect may be driven by self-interest rather than altruistic motivation. The pain effect on trust was evident only in females, implying distinct pain coping strategies used by both genders. The present work highlights the social component of pain and extends our understanding of mutual interactions between pain and social cognition. © 2017 European Pain Federation - EFIC®.

  15. Magnetic Fluxtube Tunneling

    Science.gov (United States)

    Dahlburg, Russell B.; Antiochos,, Spiro K.; Norton, D.

    1996-01-01

    We present numerical simulations of the collision and subsequent interaction of two initially orthogonal, twisted, force free field magnetic fluxtubes. The simulations were carried out using a new three dimensional explicit parallelized Fourier collocation algorithm for solving the viscoresistive equations of compressible magnetohydrodynamics. It is found that, under a wide range of conditions, the fluxtubes can 'tunnel' through each other. Two key conditions must be satisfied for tunneling to occur: the magnetic field must be highly twisted with a field line pitch much greater than 1, and the magnetic Lundquist number must be somewhat large, greater than or equal to 2880. This tunneling behavior has not been seen previously in studies of either vortex tube or magnetic fluxtube interactions. An examination of magnetic field lines shows that tunneling is due to a double reconnection mechanism. Initially orthogonal field lines reconnect at two specific locations, exchange interacting sections and 'pass' through each other. The implications of these results for solar and space plasmas are discussed.

  16. A mobile and portable trusted computing platform

    Directory of Open Access Journals (Sweden)

    Nepal Surya

    2011-01-01

    Full Text Available Abstract The mechanism of establishing trust in a computing platform is tightly coupled with the characteristics of a specific machine. This limits the portability and mobility of trust as demanded by many emerging applications that go beyond the organizational boundaries. In order to address this problem, we propose a mobile and portable trusted computing platform in a form of a USB device. First, we describe the design and implementation of the hardware and software architectures of the device. We then demonstrate the capabilities of the proposed device by developing a trusted application.

  17. SoundMeGood: A Trust Model Supporting Preliminary Trust Establishment Between Mutually Unknown Entities

    Czech Academy of Sciences Publication Activity Database

    Špánek, Roman; Tyl, P.

    2013-01-01

    Roč. 1, č. 1 (2013), s. 10-14 ISSN 2320-401X R&D Projects: GA ČR GAP202/10/0761 Grant - others:ČVUT(CZ) SGS 2011/7821 Institutional support: RVO:67985807 Keywords : trust * social network * trust management systems * distributed systems Subject RIV: IN - Informatics, Computer Science http://www.isaet.org/images/extraimages/IJCSEE%200101303.pdf

  18. Atomistic modeling trap-assisted tunneling in hole tunnel field effect transistors

    Science.gov (United States)

    Long, Pengyu; Huang, Jun Z.; Povolotskyi, Michael; Sarangapani, Prasad; Valencia-Zapata, Gustavo A.; Kubis, Tillmann; Rodwell, Mark J. W.; Klimeck, Gerhard

    2018-05-01

    Tunnel Field Effect Transistors (FETs) have the potential to achieve steep Subthreshold Swing (S.S.) below 60 mV/dec, but their S.S. could be limited by trap-assisted tunneling (TAT) due to interface traps. In this paper, the effect of trap energy and location on OFF-current (IOFF) of tunnel FETs is evaluated systematically using an atomistic trap level representation in a full quantum transport simulation. Trap energy levels close to band edges cause the highest leakage. Wave function penetration into the surrounding oxide increases the TAT current. To estimate the effects of multiple traps, we assume that the traps themselves do not interact with each other and as a whole do not modify the electrostatic potential dramatically. Within that model limitation, this numerical metrology study points to the critical importance of TAT in the IOFF in tunnel FETs. The model shows that for Dit higher than 1012/(cm2 eV) IO F F is critically increased with a degraded IO N/IO F F ratio of the tunnel FET. In order to have an IO N/IO F F ratio higher than 104, the acceptable Dit near Ev should be controlled to no larger than 1012/(cm2 eV) .

  19. Trust and the transformation of energy systems

    Energy Technology Data Exchange (ETDEWEB)

    Rayner, Steve [James Martin Institute for Science and Civilization, Said Business School, Park End Street, Oxford, OX1 1HP (United Kingdom)

    2010-06-15

    The author looks at diverse concepts and roles of trust in the challenge of decarbonising energy systems, drawing on 25 years of personal experience in the fields of energy and environmental policy research. The paper focuses on three issues-public trust in science, institutional trust in making technology choices, and the idea that high-trust societies are more sustainable than those exhibiting low-trust. While trust is a key concept in understanding the public acceptability of technology choices, it is only one of a suite of interrelated concepts that must be addressed, which also includes liability, consent, and fairness. Furthermore, rational distrust among competing institutional world views may be critical in understanding the role of social capital in socioeconomic and technological development. Thus the concept of trust has become a portmanteau, carrying a diverse range of ideas and conditions for sustainable energy systems. The paper concludes with three emphases for decision makers. First, the issue is the energy system, not particular generating technologies. Second, the energy system must be recognized to be as much a social system as it is a technical one. Third, the system requires incorporation of the minimum level of diversity of engineering technologies and social actors to be sustainable. (author)

  20. Trust and the transformation of energy systems

    International Nuclear Information System (INIS)

    Rayner, Steve

    2010-01-01

    The author looks at diverse concepts and roles of trust in the challenge of decarbonising energy systems, drawing on 25 years of personal experience in the fields of energy and environmental policy research. The paper focuses on three issues-public trust in science, institutional trust in making technology choices, and the idea that high-trust societies are more sustainable than those exhibiting low-trust. While trust is a key concept in understanding the public acceptability of technology choices, it is only one of a suite of interrelated concepts that must be addressed, which also includes liability, consent, and fairness. Furthermore, rational distrust among competing institutional world views may be critical in understanding the role of social capital in socioeconomic and technological development. Thus the concept of trust has become a portmanteau, carrying a diverse range of ideas and conditions for sustainable energy systems. The paper concludes with three emphases for decision makers. First, the issue is the energy system, not particular generating technologies. Second, the energy system must be recognized to be as much a social system as it is a technical one. Third, the system requires incorporation of the minimum level of diversity of engineering technologies and social actors to be sustainable.

  1. The Effects of Perceived Value, Website Trust and Hotel Trust on Online Hotel Booking Intention

    Directory of Open Access Journals (Sweden)

    Seo Yeon Kim

    2017-12-01

    Full Text Available With the rapid development of information technology in hotel booking context, it is no doubt that many hotels consequently enhance the needs of integrating information technologies into their overall business operations. In this study, we developed a research model which consists of perceived value, trust toward a third party online booking site, and trust toward hotels, and tested it by using partial least square techniques. Survey data were collected from 307 individuals who have prior experiences on making a reservation using third-party online booking sites. Based upon our findings, we found that the perceived value, which was affected by both price and quality, was positively related to individuals’ intention to book. We also found that both trust toward third-party online booking sites and trust toward hotels, which was influenced by online review, have positive impacts on individuals’ intention to book. The implications of these findings for both research and practice are discussed.

  2. Volitional Trust, Autonomy Satisfaction, and Engagement at Work.

    Science.gov (United States)

    Heyns, Marita; Rothmann, Sebastiaan

    2018-02-01

    This study tested a structural model that identifies the nature of relationships between trust, autonomy satisfaction, and personal engagement at work. A cross-sectional survey design with a convenience sample ( n = 252) was used. The Behavioral Trust Inventory, Work-Related Basic Need Satisfaction Scale, and Work Engagement Scale were administered. While reliance-based trust did not have a significant influence on engagement, disclosure-based trust in a focal leader was found to predict satisfaction of autonomy needs and employee engagement. Mediation analyses revealed that satisfaction of the need for autonomy facilitates the influence of trust on work outcomes. More specifically, disclosure (a dimension of trust) impacted engagement via autonomy satisfaction. Overall, the model explained 44% of total variance in engagement, to which the variables proportionately contributed as follows: autonomy satisfaction = 79.58%, disclosure = 18.22%, and reliance = 2.20%. The findings provide possible directions for how leaders can leverage trust to facilitate autonomy support and higher levels of engagement.

  3. Lowest order in inelastic tunneling approximation : efficient scheme for simulation of inelastic electron tunneling data

    NARCIS (Netherlands)

    Rossen, E.T.R.; Flipse, C.F.J.; Cerda, J.I.

    2013-01-01

    We have developed an efficient and accurate formalism which allows the simulation at the ab initio level of inelastic electron tunneling spectroscopy data under a scanning tunneling microscope setup. It exploits fully the tunneling regime by carrying out the structural optimization and vibrational

  4. Scanning tunneling microscopic images and scanning tunneling spectra for coupled rectangular quantum corrals

    International Nuclear Information System (INIS)

    Mitsuoka, Shigenori; Tamura, Akira

    2011-01-01

    Assuming that an electron confined by double δ-function barriers lies in a quasi-stationary state, we derived eigenstates and eigenenergies of the electron. Such an electron has a complex eigenenergy, and the imaginary part naturally leads to the lifetime of the electron associated with tunneling through barriers. We applied this point of view to the electron confined in a rectangular quantum corral (QC) on a noble metal surface, and obtained scanning tunneling microscopic images and a scanning tunneling spectrum consistent with experimental ones. We investigated the electron states confined in coupled QCs and obtained the coupled states constructed with bonding and anti-bonding states. Using those energy levels and wavefunctions we specified scanning tunneling microscope (STM) images and scanning tunneling spectra (STS) for the doubly and triply coupled QCs. In addition we pointed out the feature of resonant electron states associated with the same QCs at both ends of the triply coupled QCs.

  5. Time and Trust

    DEFF Research Database (Denmark)

    Hansen, Annette Skovsted

    current Africa strategies as part of a long history of a variety of stakeholders on the African continent. I argue that trust and lack of trust based on long term relations influence choices on aid distribution made by African and partner countries. The analysis is based on a reading of OECD statistics...... on aid distribution in combination with select interviews with stakeholders in foreign aid, and archival findings on the historical presence of Japanese, Chinese, Indian, European, and North American people on the African continent. By looking at the impact of historical networks on ODA distribution...

  6. Increasing interpersonal trust through divergent thinking

    OpenAIRE

    Sellaro, Roberta; Hommel, Bernhard; de Kwaadsteniet, Erik W.; van de Groep, Suzanne; Colzato, Lorenza S.

    2014-01-01

    Interpersonal trust is an essential ingredient of many social relationships but how stable is it actually, and how is it controlled? There is evidence that the degree of trust into others might be rather volatile and can be affected by manipulations like drawing attention to personal interdependence or independence. Here we investigated whether the degree of interpersonal trust can be biased by inducing either a more integrative or a more focused/exclusive cognitive control mode by means of a...

  7. Defining Trust Using Expected Utility Theory

    OpenAIRE

    Arai, Kazuhiro

    2009-01-01

    Trust has been discussed in many social sciences including economics, psychology, and sociology. However, there is no widely accepted definition of trust. Inparticular, there is no definition that can be used for economic analysis. This paper regards trust as expectation and defines it using expected utility theory together with concepts such as betrayal premium. In doing so, it rejects the widely accepted black-and-white view that (un) trustworthy people are always (un)trustworthy. This pape...

  8. Trust in Diverse Teams

    DEFF Research Database (Denmark)

    Clausen, Lisbeth

    , maintaining team cohesiveness in multicultural teams to collaborate effectively presents a number of challenges. The present study employs the concept of trust to explore influences on team collaboration in high performing teams. The study is based on observation of teams in seven multinational corporations...... and interviews with managers from the US, Europe, China and Japan. The study presents a conceptual framework - a ‘trust buffer’ – which enables analysis and exemplification of the dynamics and challenges of teams as drivers of change. Each team has strategically important tasks, unique capacities and deal...... with change in particular ways: Each team is analyzed in relation to its global (HQ) mandate, local (national) stakeholders and organizational context. It is found that communication energy, resources and team mandate underscore the sense of trust in high performing teams. Diversity is understood...

  9. Trust in organizations — organizational, intergroup, and value research perspective

    Directory of Open Access Journals (Sweden)

    Kaltiainen J.

    2018-03-01

    Full Text Available In this overview article, we discuss the importance of trust for organizations by employing a multilevel and multidisciplinary perspective. We complement and contribute to the existing reviews by (1 considering trust not only within and between individuals and organizations, but also at the societal level, (2 bridging findings and literature from the fields of organizational, intergroup, and value research, and (3 summarizing recent research on the dynamics of trust and its development in organizations. Related to contemplating trust at various levels, we present multiple topics such as individual’s tendency to trust, employees’ trust in leaders, trust between groups with examples from organizational mergers and interethnic relations, and the relationship between trust and societies’ economic competitiveness. We conclude by summarizing recent organizational literature about the development of trust, transfers of trust towards different levels of leadership, and reciprocity in employees’ trust and fairness perceptions. In so doing, we contribute to the means to promote trust, active citizenship and socially sustainable growth of organizations and our societies.

  10. Ivar Giaever, Tunneling, and Superconductors

    Science.gov (United States)

    dropdown arrow Site Map A-Z Index Menu Synopsis Ivar Giaever, Tunneling, and Superconductors Resources with in Superconductors Measured by Electron Tunneling; Physical Review Letters, Vol. 5 Issue 4: 147 - 148 ; August 15, 1960 Electron Tunneling Between Two Superconductors; Physical Review Letters, Vol. 5 Issue 10

  11. Physics of optimal resonant tunneling

    NARCIS (Netherlands)

    Racec, P.N.; Stoica, T.; Popescu, C.; Lepsa, M.I.; Roer, van de T.G.

    1997-01-01

    The optimal resonant tunneling, or the complete tunneling transparence of a biased double-barrier resonant-tunneling (DBRT) structure, is discussed. It is shown that its physics does not rest on the departure from the constant potential within the barriers and well, due to the applied electric

  12. Making sense of institutional trust in organizations

    DEFF Research Database (Denmark)

    Fuglsang, Lars; Jagd, Søren

    2015-01-01

    and inter-organizational level. We suggest, however, that the actor-dimension of institutional-based trust is an underexplored issue in the literature. Quoting Fligstein, institutional theory needs to explain how ‘some social actors are better at producing desired social outcomes than are others’ (Fligstein......Institutional-based approaches to trust can explain how trust logics can exist in a societal context as compared to logics of distrust. Strong institutions in the form of regulative, normative and cognitive structures can enable and inspire trust-relations among people at the interpersonal......, 1997: 398). While Fligstein refers to actors who engage in ‘robust or local action’ we argue that actors who engage in (robust, local) sensemaking activities are better at (re)producing institutional-based trust. Particularly in situations when institutions are relatively unstable, unfamiliar...

  13. Collider detector at Fermilab - CDF. Progress report

    International Nuclear Information System (INIS)

    Theriot, D.

    1985-06-01

    CDF, the Collider Detector at Fermilab, is a collaboration of almost 180 physicists from ten US universities (University of Chicago, Brandeis University, Harvard University, University of Illinois, University of Pennsylvania, Purdue University, Rockefeller University, Rutgers University, Texas A and M University, and University of Wisconsin), three US DOE supported national laboratories (Fermilab, Argonne National Laboratory, and Lawrence Berkeley Laboratory), Italy (Frascati National Laboratory and University of Pisa), and Japan (KEK National Laboratory and University of Tsukuba). The primary physics goal for CDF is to study the general features of proton-antiproton collisions at 2 TeV center-of-mass energy. On general grounds, we expect that parton subenergies in the range 50 to 500 GeV will provide the most interesting physics at this energy. Work at the present CERN Collider has already demonstrated the richness of the 100 GeV scale in parton subenergies. 7 refs., 14 figs

  14. Collider Detector (CDF) at FERMILAB: an overview

    International Nuclear Information System (INIS)

    Theriot, D.

    1984-07-01

    CDF, the Collider Detector at Fermilab, is a collaboration of almost 150 physicists from ten US universities (University of Chicago, Brandeis University, Harvard University, University of Illinois, University of Pennsylvania, Purdue University, Rockefeller University, Rutgers University, Texas A and M University, and University of Wisconsin), three US DOE supported national laboratories (Fermilab, Argonne National Laboratory, and Lawrence Berkeley Laboratory), Italy (Frascati Laboratory and University of Pisa), and Japan (KEK National Laboratory and Unversity of Tsukuba). The primary physics goal for CDF is to study the general features of proton-antiproton collisions at 2 TeV center-of-mass energy. On general grounds, we expect that parton subenergies in the range 50 to 500 GeV will provide the most interesting physics at this energy. Work at the present CERN Collider has already demonstrated the richness of the 100 GeV scale in parton subenergies

  15. Spin-polarized tunneling with GaAs tips in scanning tunneling microscopy

    NARCIS (Netherlands)

    Prins, M.W.J.; Jansen, R.; Kempen, van H.

    1996-01-01

    We describe a model as well as experiments on spin-polarized tunneling with the aid of optical spin orientation. This involves tunnel junctions between a magnetic material and gallium arsenide (GaAs), where the latter is optically excited with circularly polarized light in order to generate

  16. Wireless next generation networks a virtue-based trust model

    CERN Document Server

    Harvey, Melissa

    2014-01-01

    This SpringerBrief proposes a trust model motivated by virtue epistemology, addressing the need for a more efficient and flexible trust model for wireless next generation networks. This theory of trust simplifies the computation and communication overhead of strictly cognitive-computational models of trust. Both the advantages and the challenges of virtue-based trust models are discussed. This brief offers new research and a general theory of rationality that enables users to interpret trust and reason as complementary mechanisms that guide our rational conduct at two different epistemic level

  17. Submucosal tunneling techniques: current perspectives.

    Science.gov (United States)

    Kobara, Hideki; Mori, Hirohito; Rafiq, Kazi; Fujihara, Shintaro; Nishiyama, Noriko; Ayaki, Maki; Yachida, Tatsuo; Matsunaga, Tae; Tani, Johji; Miyoshi, Hisaaki; Yoneyama, Hirohito; Morishita, Asahiro; Oryu, Makoto; Iwama, Hisakazu; Masaki, Tsutomu

    2014-01-01

    Advances in endoscopic submucosal dissection include a submucosal tunneling technique, involving the introduction of tunnels into the submucosa. These tunnels permit safer offset entry into the peritoneal cavity for natural orifice transluminal endoscopic surgery. Technical advantages include the visual identification of the layers of the gut, blood vessels, and subepithelial tumors. The creation of a mucosal flap that minimizes air and fluid leakage into the extraluminal cavity can enhance the safety and efficacy of surgery. This submucosal tunneling technique was adapted for esophageal myotomy, culminating in its application to patients with achalasia. This method, known as per oral endoscopic myotomy, has opened up the new discipline of submucosal endoscopic surgery. Other clinical applications of the submucosal tunneling technique include its use in the removal of gastrointestinal subepithelial tumors and endomicroscopy for the diagnosis of functional and motility disorders. This review suggests that the submucosal tunneling technique, involving a mucosal safety flap, can have potential values for future endoscopic developments.

  18. Ultrafast scanning tunneling microscopy

    Energy Technology Data Exchange (ETDEWEB)

    Botkin, D.A. [California Univ., Berkeley, CA (United States). Dept. of Physics]|[Lawrence Berkeley Lab., CA (United States)

    1995-09-01

    I have developed an ultrafast scanning tunneling microscope (USTM) based on uniting stroboscopic methods of ultrafast optics and scanned probe microscopy to obtain nanometer spatial resolution and sub-picosecond temporal resolution. USTM increases the achievable time resolution of a STM by more than 6 orders of magnitude; this should enable exploration of mesoscopic and nanometer size systems on time scales corresponding to the period or decay of fundamental excitations. USTM consists of a photoconductive switch with subpicosecond response time in series with the tip of a STM. An optical pulse from a modelocked laser activates the switch to create a gate for the tunneling current, while a second laser pulse on the sample initiates a dynamic process which affects the tunneling current. By sending a large sequence of identical pulse pairs and measuring the average tunnel current as a function of the relative time delay between the pulses in each pair, one can map the time evolution of the surface process. USTM was used to measure the broadband response of the STM`s atomic size tunnel barrier in frequencies from tens to hundreds of GHz. The USTM signal amplitude decays linearly with the tunnel junction conductance, so the spatial resolution of the time-resolved signal is comparable to that of a conventional STM. Geometrical capacitance of the junction does not appear to play an important role in the measurement, but a capacitive effect intimately related to tunneling contributes to the measured signals and may limit the ultimate resolution of the USTM.

  19. The comparison between limited open carpal tunnel release using direct vision and tunneling technique and standard open carpal tunnel release: a randomized controlled trial study.

    Science.gov (United States)

    Suppaphol, Sorasak; Worathanarat, Patarawan; Kawinwongkovit, Viroj; Pittayawutwinit, Preecha

    2012-04-01

    To compare the operative outcome of carpal tunnel release between limited open carpal tunnel release using direct vision and tunneling technique (group A) with standard open carpal tunnel release (group B). Twenty-eight patients were enrolled in the present study. A single blind randomized control trial study was conducted to compare the postoperative results between group A and B. The study parameters were Levine's symptom severity and functional score, grip and pinch strength, and average two-point discrimination. The postoperative results between two groups were comparable with no statistical significance. Only grip strength at three months follow up was significantly greater in group A than in group B. The limited open carpal tunnel release in the present study is effective comparable to the standard open carpal tunnel release. The others advantage of this technique are better cosmesis and improvement in grip strength at the three months postoperative period.

  20. Trusted Domain

    DEFF Research Database (Denmark)

    Hjorth, Theis Solberg; Torbensen, Rune

    2012-01-01

    remote access via IP-based devices such as smartphones. The Trusted Domain platform fits existing legacy technologies by managing their interoperability and access controls, and it seeks to avoid the security issues of relying on third-party servers outside the home. It is a distributed system...... of wireless standards, limited resources of embedded systems, etc. Taking these challenges into account, we present a Trusted Domain home automation platform, which dynamically and securely connects heterogeneous networks of Short-Range Wireless devices via simple non-expert user. interactions, and allows......In the digital age of home automation and with the proliferation of mobile Internet access, the intelligent home and its devices should be accessible at any time from anywhere. There are many challenges such as security, privacy, ease of configuration, incompatible legacy devices, a wealth...

  1. 13th Australian tunnelling conference. Proceedings

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2008-07-01

    The theme of the conference was 'Engineering in a changing environment'. Topics covered include Australian tunnelling projects, design and development of ground support, tunnelling, international projects, fire and life safety, mining projects, risk management in tunnelling, and tunnel boring machine tunnelling. Papers of particular interest to the coal industry are: improving roadway development in underground coal mine (G. Lewis and G. Gibson), and polymer-based alternative to steel mesh for coal mine strata reinforcement (C. Lukey and others).

  2. Does flexible tunnel drilling affect the femoral tunnel angle measurement after anterior cruciate ligament reconstruction?

    Science.gov (United States)

    Muller, Bart; Hofbauer, Marcus; Atte, Akere; van Dijk, C Niek; Fu, Freddie H

    2015-12-01

    To quantify the mean difference in femoral tunnel angle (FTA) as measured on knee radiographs between rigid and flexible tunnel drilling after anatomic anterior cruciate ligament (ACL) reconstruction. Fifty consecutive patients that underwent primary anatomic ACL reconstruction with a single femoral tunnel drilled with a flexible reamer were included in this study. The control group was comprised of 50 patients all of who underwent primary anatomic ACL reconstruction with a single femoral tunnel drilled with a rigid reamer. All femoral tunnels were drilled through a medial portal to ensure anatomic tunnel placement. The FTA was determined from post-operative anterior-to-posterior (AP) radiographs by two independent observers. A 5° difference between the two mean FTA was considered clinically significant. The average FTA, when drilled with a rigid reamer, was 42.0° ± 7.2°. Drilling with a flexible reamer resulted in a mean FTA of 44.7° ± 7.0°. The mean difference of 2.7° was not statistically significant. The intraclass correlation coefficient for inter-tester reliability was 0.895. The FTA can be reliably determined from post-operative AP radiographs and provides a useful and reproducible metric for characterizing femoral tunnel position after both rigid and flexible femoral tunnel drilling. This has implications for post-operative evaluation and preoperative treatment planning for ACL revision surgery. IV.

  3. Trust and trust relations from the providers' perspective: the case of the healthcare system in India.

    Science.gov (United States)

    Kane, Sumit; Calnan, Michael; Radkar, Anjali

    2015-01-01

    Commentators suggest that there is an erosion of trust in the relations between different actors in the health system in India. This paper presents the results of an exploratory study of the situation of providers in an urban setting in western India, the nature of their relations in terms of trust and what influences these relations. The data on relationships of trust were collected through interviews and focus group discussions with key informants, including public and private providers, regulators, managers and societal actors, such as patients/citizens, politicians and the media.

  4. Social information influences trust behaviour in adolescents.

    Science.gov (United States)

    Lee, Nikki C; Jolles, Jelle; Krabbendam, Lydia

    2016-01-01

    Trust plays an integral role in daily interactions within adolescents' social environment. Using a trust game paradigm, this study investigated the modulating influence of social information about three interaction partners on trust behaviour in adolescents aged 12-18 (N = 845). After receiving information about their interaction partners prior to the task, participants were most likely to share with a 'good' partner and rate this partner as most trustworthy. Over the course of the task all interaction partners showed similar levels of trustworthy behaviour, but overall participants continued to trust and view the good partner as more trustworthy than 'bad' and 'neutral' partners throughout the game. However, with age the ability to overcome prior social information and adapt trust behaviour improved: middle and late adolescents showed a larger decrease in trust of the good partner than early adolescents, and late adolescents were more likely to reward trustworthy behaviour from the negative partner. Copyright © 2015 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  5. How Does Social Trust Lead to Better Governance?

    DEFF Research Database (Denmark)

    Bjørnskov, Christian

    2010-01-01

    This paper explores questions related to the association between social trust and governance. In particular, the paper explores whether the trust-governance association is mainly a reflection of political responsiveness to the demands of the electorate or of the supply of honest politicians...... and bureaucrats. After outlining some simple theory, the findings suggest that the association reflects a causal influence of both types of trust on institutions of economic-judicial governance while electoral institutions are not associated with social trust. Assessed at the sample mean, the value of social...... trust under high political competition as evaluated by the compensating income variation is substantial....

  6. Derivation of the tunnelling exchange time for the model of trap-assisted tunnelling

    International Nuclear Information System (INIS)

    Racko, J.; Ballo, P.; Benko, P.; Harmatha, L.; Grmanova, A.; Breza, J.

    2014-01-01

    We present derivation of the tunnelling exchange times that play the key role in the model of trap assisted tunnelling (TAT) considering the electron and hole exchange processes between the trapping centre lying in the forbidden band of the semiconductor and the conduction band, valence band or a metal. All exchange processes are quantitatively described by respective exchange times. The reciprocal values of these exchange times represent the frequency with which the exchange processes contribute to the probability of occupation of the trap by free charge carriers. The crucial problem in any model of TAT is the calculation of the occupation probability. In our approach this probability is expressed in terms of only thermal and tunnelling exchange times. The concept of tunnelling exchange times presents a dominant contribution to our model of TAT. The new approach allows to simply calculate the probability of occupation of the trapping centre by a free charge carrier and subsequently to get the thermal and tunnelling generation-recombination rates occurring in the continuity equations. This is why the TAT model based on thermal and tunnelling exchange times is suitable for simulating the electrical properties of semiconductor nanostructures in which quantum mechanical phenomena play a key role. (authors)

  7. Trust Mines: Legal Documents and Settlements

    Science.gov (United States)

    Legal Documents and Settlements related to the Northern Abandoned Uranium Mines Region including the Phase 1 Settlement Agreement and Environmental Response Trust Agreement, Phase 2 Settlement Agreement Removal Site Evaluation (RSE) Trust Agreement.

  8. Electronic noise of superconducting tunnel junction detectors

    International Nuclear Information System (INIS)

    Jochum, J.; Kraus, H.; Gutsche, M.; Kemmather, B.; Feilitzsch, F. v.; Moessbauer, R.L.

    1994-01-01

    The optimal signal to noise ratio for detectors based on superconducting tunnel junctions is calculated and compared for the cases of a detector consisting of one single tunnel junction, as well as of series and of parallel connections of such tunnel junctions. The influence of 1 / f noise and its dependence on the dynamical resistance of tunnel junctions is discussed quantitatively. A single tunnel junction yields the minimum equivalent noise charge. Such a tunnel junction exhibits the best signal to noise ratio if the signal charge is independent of detector size. In case, signal charge increases with detector size, a parallel or a series connection of tunnel junctions would provide the optimum signal to noise ratio. The equivalent noise charge and the respective signal to noise ratio are deduced as functions of tunnel junction parameters such as tunneling time, quasiparticle lifetime, etc. (orig.)

  9. Perceptions of trust in physician-managers.

    Science.gov (United States)

    Cregård, Anna; Eriksson, Nomie

    2015-01-01

    The purpose of this paper is to explore the dual role of physician-managers through an examination of perceptions of trust and distrust in physician-managers. The healthcare sector needs physicians to lead. Physicians in part-time managerial positions who continue their medical practice are called part-time physician-managers. This paper explores this dual role through an examination of perceptions of trust and distrust in physician-managers. The study takes a qualitative research approach in which interviews and focus group discussions with physician-managers and nurse-managers provide the empirical data. An analytical model, with the three elements of ability, benevolence and integrity, was used in the analysis of trust and distrust in physician-managers. The respondents (physician-managers and nurse-managers) perceived both an increase and a decrease in physicians' trust in the physician-managers. Because elements of distrust were more numerous and more severe than elements of trust, the physician-managers received negative perceptions of their role. This paper's findings are based on perceptions of perceptions. The physicians were not interviewed on their trust and distrust of physician-managers. The healthcare sector must pay attention to the diverse expectations of the physician-manager role that is based on both managerial and medical logics. Hospital management should provide proper support to physician-managers in their dual role to ensure their willingness to continue to assume managerial responsibilities. The paper takes an original approach in its research into the dual role of physician-managers who work under two conflicting logics: the medical logic and the managerial logic. The focus on perceived trust and distrust in physician-managers is a new perspective on this complicated role.

  10. Tunneling of Atoms, Nuclei and Molecules

    International Nuclear Information System (INIS)

    Bertulani, C.A.

    2015-01-01

    This is a brief review of few relevant topics on tunneling of composite particles and how the coupling to intrinsic and external degrees of freedom affects tunneling probabilities. I discuss the phenomena of resonant tunneling, different barriers seen by subsystems, damping of resonant tunneling by level bunching and continuum effects due to particle dissociation. (author)

  11. Trust on the Ratee: A Trust Management System for Social Internet of Vehicles

    Directory of Open Access Journals (Sweden)

    Fangyu Gai

    2017-01-01

    Full Text Available The integration of social networking concepts with Internet of Vehicles (IoV has led to the novel paradigm “Social Internet of Vehicles (SIoV,” which enables vehicles to establish social relationships autonomously to improve traffic conditions and service discovery. There is a growing requirement for effective trust management in the SIoV, considering the critical consequences of acting on misleading information spread by malicious nodes. However, most existing trust models are rater-based, where the reputation information of each node is stored in other nodes it has interacted with. This is not suitable for vehicular environment due to the ephemeral nature of the network. To fill this gap, we propose a Ratee-based Trust Management (RTM system, where each node stores its own reputation information rated by others during past transactions, and a credible CA server is introduced to ensure the integrality and the undeniability of the trust information. RTM is built based on the concept of SIoV, so that the relationships established between nodes can be used to increase the accuracy of the trustworthiness. Experimental results demonstrate that our scheme achieves faster information propagation and higher transaction success rate than the rater-based method, and the time cost when calculating trustworthiness can meet the demand of vehicular networks.

  12. Improving the radiologist–CAD interaction: designing for appropriate trust

    International Nuclear Information System (INIS)

    Jorritsma, W.; Cnossen, F.; Ooijen, P.M.A. van

    2015-01-01

    Computer-aided diagnosis (CAD) has great potential to improve radiologists' diagnostic performance. However, the reported performance of the radiologist–CAD team is lower than what might be expected based on the performance of the radiologist and the CAD system in isolation. This indicates that the interaction between radiologists and the CAD system is not optimal. An important factor in the interaction between humans and automated aids (such as CAD) is trust. Suboptimal performance of the human–automation team is often caused by an inappropriate level of trust in the automation. In this review, we examine the role of trust in the radiologist–CAD interaction and suggest ways to improve the output of the CAD system so that it allows radiologists to calibrate their trust in the CAD system more effectively. Observer studies of the CAD systems show that radiologists often have an inappropriate level of trust in the CAD system. They sometimes under-trust CAD, thereby reducing its potential benefits, and sometimes over-trust it, leading to diagnostic errors they would not have made without CAD. Based on the literature on trust in human–automation interaction and the results of CAD observer studies, we have identified four ways to improve the output of CAD so that it allows radiologists to form a more appropriate level of trust in CAD. Designing CAD systems for appropriate trust is important and can improve the performance of the radiologist–CAD team. Future CAD research and development should acknowledge the importance of the radiologist–CAD interaction, and specifically the role of trust therein, in order to create the perfect artificial partner for the radiologist. This review focuses on the role of trust in the radiologist–CAD interaction. The aim of the review is to encourage CAD developers to design for appropriate trust and thereby improve the performance of the radiologist–CAD team. - Highlights: • Radiologists often have an inappropriate

  13. Chimpanzees trust conspecifics to engage in low-cost reciprocity.

    Science.gov (United States)

    Engelmann, Jan M; Herrmann, Esther; Tomasello, Michael

    2015-02-22

    Many of humans' most important social interactions rely on trust, including most notably among strangers. But little is known about the evolutionary roots of human trust. We presented chimpanzees (Pan troglodytes) with a modified version of the human trust game--trust in reciprocity--in which subjects could opt either to obtain a small but safe reward on their own or else to send a larger reward to a partner and trust her to reciprocate a part of the reward that she could not access herself. In a series of three studies, we found strong evidence that in interacting with a conspecific, chimpanzees show spontaneous trust in a novel context; flexibly adjust their level of trust to the trustworthiness of their partner and develop patterns of trusting reciprocity over time. At least in some contexts then, trust in reciprocity is not unique to humans, but rather has its evolutionary roots in the social interactions of humans' closest primate relatives. © 2015 The Author(s) Published by the Royal Society. All rights reserved.

  14. Control and trust impact on outsourcing

    DEFF Research Database (Denmark)

    Herbert-Hansen, Zaza Nadja Lee; Rasmussen, Lauge Baungaard; Schmidt, Andreas Strøjer Tynan

    This paper examines the relationships between control, trust and inter-organizational learning in outsourcing relationships, focusing on the question: How do different trust and control strategies affect the sharing and withholding of knowledge between client and vendor? Four studies are conducted......; one, large international client company and three of its vendors. Based on these cases and a literature review, various trust and control strategies are examined, and factors influencing the mutual knowledge interaction are identified. The results show an internal disagreement among managers...

  15. Chaos regularization of quantum tunneling rates

    International Nuclear Information System (INIS)

    Pecora, Louis M.; Wu Dongho; Lee, Hoshik; Antonsen, Thomas; Lee, Ming-Jer; Ott, Edward

    2011-01-01

    Quantum tunneling rates through a barrier separating two-dimensional, symmetric, double-well potentials are shown to depend on the classical dynamics of the billiard trajectories in each well and, hence, on the shape of the wells. For shapes that lead to regular (integrable) classical dynamics the tunneling rates fluctuate greatly with eigenenergies of the states sometimes by over two orders of magnitude. Contrarily, shapes that lead to completely chaotic trajectories lead to tunneling rates whose fluctuations are greatly reduced, a phenomenon we call regularization of tunneling rates. We show that a random-plane-wave theory of tunneling accounts for the mean tunneling rates and the small fluctuation variances for the chaotic systems.

  16. Trusting Only Whom You Know, Knowing Only Whom You Trust: The Joint Impact of Social Capital and Trust on Individuals' Economic Performance and Well-Being in CEE Countries

    OpenAIRE

    Growiec, Katarzyna; Growiec, Jakub

    2010-01-01

    This paper provides evidence that bridging and bonding social capital as well as social trust may interdependently affect individuals' earnings and subjective well-being. Based on cross-sectional World Values Survey 2000 data on individuals from Central and Eastern European countries (CEECs), we show that majority of citizens of these countries seem to fall in a "low trust trap" where deficits of bridging social capital and trust reinforce each other in lowering individuals' incomes and well-...

  17. Trust Networks on the Semantic Web

    National Research Council Canada - National Science Library

    Golbeck, Jennifer; Parisa, Bijan; Hendler, James

    2006-01-01

    The so-called "Web of Trust" is one of the ultimate goals of the Semantic Web. Research on the topic of trust in this domain has focused largely on digital signatures, certificates, and authentication...

  18. Excavation of the Surikamigawa dam diversion tunnel. Surikamigawa dam karihaisui tunnel kantsu

    Energy Technology Data Exchange (ETDEWEB)

    Ikeda, T.; Konno, T. (Ministry of Construction, Tokyo (Japan))

    1994-04-01

    A bypass tunnel construction has been completed at the Surikamigawa dam (Japan). This paper describes the summary of the construction. The full-swing dam construction work is scheduled to begin in 1995. The soils distributed near the dam site consist of lapillus tuff containing andesite-based light stones and tuff-based conglomerates containing large gravels. Excavation of the dam diversion tunnel has used a blasting method, and the tunnel construction has adopted an automatic tunnel cross section marking system and a non-electric explosion method. This marking system is a system to irradiate a laser beam onto the facing to depict excavation lines that realizes labor saving and high-accuracy excavation. The error at the tunnel completion was found 20 mm. The non-electric explosion method ignites a coated explosive layer with an impact wave, which is electrostatically safe, and reduces blasting vibration. Electric detonators have also been used because of using ANFO explosives. The result obtained from measurements of inner space displacement necessary for the blasting process has indicated that the area near the dam site consists of stable mountains. 6 figs., 4 tabs.

  19. Charge Islands Through Tunneling

    Science.gov (United States)

    Robinson, Daryl C.

    2002-01-01

    It has been recently reported that the electrical charge in a semiconductive carbon nanotube is not evenly distributed, but rather it is divided into charge "islands." This paper links the aforementioned phenomenon to tunneling and provides further insight into the higher rate of tunneling processes, which makes tunneling devices attractive. This paper also provides a basis for calculating the charge profile over the length of the tube so that nanoscale devices' conductive properties may be fully exploited.

  20. Tunneling progress on the Yucca Mountain Project

    International Nuclear Information System (INIS)

    Hansmire, W.H.; Munzer, R.J.

    1996-01-01

    The current status of tunneling progress on the Yucca Mountain Project (YMP) is presented in this paper. The Exploratory Studies Facility (ESF), a key part of the YMP, has been long in development and construction is ongoing. This is a progress report on the tunneling aspects of the ESF as of January 1, 1996. For purposes of discussion in this summary, the tunneling has progressed in four general phases. The paper describes: tunneling in jointed rock under low stress; tunneling through the Bow Ridge Fault and soft rock; tunneling through the Imbricate Fault Zone; and Tunneling into the candidate repository formation

  1. Trusted computing platforms TPM2.0 in context

    CERN Document Server

    Proudler, Graeme; Dalton, Chris

    2015-01-01

    In this book the authors first describe the background of trusted platforms and trusted computing and speculate about the future. They then describe the technical features and architectures of trusted platforms from several different perspectives, finally explaining second-generation TPMs, including a technical description intended to supplement the Trusted Computing Group's TPM2 specifications. The intended audience is IT managers and engineers and graduate students in information security.

  2. How Does Social Trust Affect Economic Growth?

    DEFF Research Database (Denmark)

    Bjørnskov, Christian

    Social capital in the form of generalized trust has been shown to be a determinant of economic growth in a number of studies. Other studies have explored other consequences of trust, such as its effects on governance, corruption, education and investment. This paper connects the two strands...... of literature by estimating the effects of trust on growth through a set of potential transmission mechanisms directly. It does so by modelling the process using a three-stage least squares estimator on a sample of countries for which a full data set is available. The results indicate that trust affects...

  3. Peak stresses shift from femoral tunnel aperture to tibial tunnel aperture in lateral tibial tunnel ACL reconstructions: a 3D graft-bending angle measurement and finite-element analysis.

    Science.gov (United States)

    Van Der Bracht, Hans; Tampere, Thomas; Beekman, Pieter; Schepens, Alexander; Devriendt, Wouter; Verdonk, Peter; Victor, Jan

    2018-02-01

    To investigate the effect of tibial tunnel orientation on graft-bending angle and stress distribution in the ACL graft. Eight cadaveric knees were scanned in extension, 45°, 90°, and full flexion. 3D reconstructions with anatomically placed anterior cruciate ligament (ACL) grafts were constructed with Mimics 14.12 ® . 3D graft-bending angles were measured for classic medial tibial tunnels (MTT) and lateral tibial tunnels (LTT) with different drill-guide angles (DGA) (45°, 55°, 65°, and 75°). A pivot shift was performed on 1 knee in a finite-element analysis. The peak stresses in the graft were calculated for eight different tibial tunnel orientations. In a classic anatomical ACL repair, the largest graft-bending angle and peak stresses are seen at the femoral tunnel aperture. The use of a different DGA at the tibial side does not change the graft-bending angle at the femoral side or magnitude of peak stresses significantly. When using LTT, the largest graft-bending angles and peak stresses are seen at the tibial tunnel aperture. In a classic anatomical ACL repair, peak stresses in the ACL graft are found at the femoral tunnel aperture. When an LTT is used, peak stresses are similar compared to classic ACL repairs, but the location of the peak stress will shift from the femoral tunnel aperture towards the tibial tunnel aperture. the risk of graft rupture is similar for both MTTs and LTTs, but the location of graft rupture changes from the femoral tunnel aperture towards the tibial tunnel aperture, respectively. I.

  4. Hypersonic Tunnel Facility (HTF)

    Data.gov (United States)

    Federal Laboratory Consortium — The Hypersonic Tunnel Facility (HTF) is a blow-down, non-vitiated (clean air) free-jet wind tunnel capable of testing large-scale, propulsion systems at Mach 5, 6,...

  5. Trust and virtual worlds

    DEFF Research Database (Denmark)

    Ess, Charles; Thorseth, May

    2011-01-01

    We collect diverse philosophical analyses of the issues and problems clustering around trust online with specific attention to establishing trust in virtual environments. The book moves forward important discussions of how virtual worlds and virtuality are to be defined and understood; the role o...... by virtuality, such as virtual child pornography. The introduction further develops a philosophical anthropology, rooted in Kantian ethics, phenomenology, virtue ethics, and feminist perspectives, that grounds a specific approach to ethical issues in virtual environments....

  6. Social relationships and trust

    OpenAIRE

    Binzel, Christine; Fehr, Dietmar

    2010-01-01

    While social relationships play an important role for individuals to cope with missing market institutions, they also limit individuals' range of trading partners. This paper aims at understanding the determinants of trust at various social distances when information asymmetries are present. Among participants from an informal housing area in Cairo we find that the increase in trust following a reduction in social distance comes from the fact that trustors are much more inclined to follow the...

  7. Genetic influences are virtually absent for trust.

    Directory of Open Access Journals (Sweden)

    Paul A M Van Lange

    Full Text Available Over the past decades, numerous twin studies have revealed moderate to high heritability estimates for individual differences in a wide range of human traits, including cognitive ability, psychiatric disorders, and personality traits. Even factors that are generally believed to be environmental in nature have been shown to be under genetic control, albeit modest. Is such heritability also present in social traits that are conceptualized as causes and consequences of social interactions or in other ways strongly shaped by behavior of other people? Here we examine a population-based sample of 1,012 twins and relatives. We show that the genetic influence on generalized trust in other people (trust-in-others: h2 = 5%, ns, and beliefs regarding other people's trust in the self (trust-in-self: h2 = 13%, ns, is virtually absent. As test-retest reliability for both scales were found to be moderate or high (r = .76 and r = .53, respectively in an independent sample, we conclude that all variance in trust is likely to be accounted for by non-shared environmental influences. We show that, relative to cognitive abilities, psychiatric disorders, and classic personality variables, genetic influences are smaller for trust, and propose that experiences with or observations of the behavior of other people shape trust more strongly than other traits.

  8. Klein tunneling phenomenon with pair creation process

    Science.gov (United States)

    Wu, G. Z.; Zhou, C. T.; Fu, L. B.

    2018-01-01

    In this paper, we study the Klein tunneling phenomenon with electron-positron pair creation process. Pairs can be created from the vacuum by a supercritical single-well potential (for electrons). In the time region, the time-dependent growth pattern of the created pairs can be characterized by four distinct regimes which can be considered as four different statuses of the single well. We find that if positrons penetrate the single well by Klein tunneling in different statuses, the total number of the tunneling positrons will be different. If Klein tunneling begins at the initial stage of the first status i.e. when the sing well is empty, the tunneling process and the total number of tunneling positrons are similar to the traditional Klein tunneling case without considering the pair creation process. As the tunneling begins later, the total tunneling positron number increases. The number will finally settle to an asymptotic value when the tunneling begins later than the settling-down time t s of the single well which has been defined in this paper.

  9. 36 CFR 1012.2 - What is the Presidio Trust's policy on granting requests for employee testimony or Presidio Trust...

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false What is the Presidio Trust's policy on granting requests for employee testimony or Presidio Trust records? 1012.2 Section 1012.2 Parks, Forests, and Public Property PRESIDIO TRUST LEGAL PROCESS: TESTIMONY BY EMPLOYEES AND PRODUCTION OF RECORDS General Information § 1012.2 What...

  10. Trust, confidence, and the 2008 global financial crisis.

    Science.gov (United States)

    Earle, Timothy C

    2009-06-01

    The 2008 global financial crisis has been compared to a "once-in-a-century credit tsunami," a disaster in which the loss of trust and confidence played key precipitating roles and the recovery from which will require the restoration of these crucial factors. Drawing on the analogy between the financial crisis and environmental and technological hazards, recent research on the role of trust and confidence in the latter is used to provide a perspective on the former. Whereas "trust" and "confidence" are used interchangeably and without explicit definition in most discussions of the financial crisis, this perspective uses the TCC model of cooperation to clearly distinguish between the two and to demonstrate how this distinction can lead to an improved understanding of the crisis. The roles of trust and confidence-both in precipitation and in possible recovery-are discussed for each of the three major sets of actors in the crisis, the regulators, the banks, and the public. The roles of trust and confidence in the larger context of risk management are also examined; trust being associated with political approaches, confidence with technical. Finally, the various stances that government can take with regard to trust-such as supportive or skeptical-are considered. Overall, it is argued that a clear understanding of trust and confidence and a close examination of the specific, concrete circumstances of a crisis-revealing when either trust or confidence is appropriate-can lead to useful insights for both recovery and prevention of future occurrences.

  11. INNOVATION - THE ROLE OF TRUST

    Directory of Open Access Journals (Sweden)

    Kornélia Lazányi

    2017-11-01

    Full Text Available Innovations and constant change are inevitable parts of our everyday lives. It is not only because advanced technologies are more effective, but mostly because in the 21st century more and more realise that scarce resources – among them the safe and clean environment as such - necessitate a paradigm change and intense innovation. This revolution is easily trackable in the organisational and (supranational policies. However, innovation, and its necessary prerequisites are seldom investigated from the individuals’ point of view. It is easy to understand that inter-organisational trust is inevitable on both the consumers’ and the providers’ (innovators’ side, however, it has to be made clear that an innovative organisation has to create a trusting environment within the company, in order to foster collaboration, the generation of new ideas, creativity and finally innovation. The present paper endeavours to call attention to the notion of trust and its antecedents and consequences in relation to innovations. The aim is to provide assistance in understanding how to develop trust in each other and hence foster further innovations and development.

  12. Ombud's Corner: tried and trusted

    CERN Multimedia

    Sudeshna Datta-Cockerill

    2014-01-01

    Trust is an essential ingredient in all working relationships. When trust breaks down, conflicts may arise and teams may stop working in harmony. The Ombud is there to help you to find your way out before the point of no return is reached.   Reliability, integrity, expertise and good will: these are the four pillars on which trust is built. Trust between colleagues may break down for many different reasons, including misunderstandings, and the way to restoring the relationship is through working on these four pillars. For instance, if we assume that we do indeed have the expertise to deal with a particular task assigned to us, we may need to improve our reliability by making sure that we meet deadlines and expectations or demonstrate our integrity by acknowledging and accepting accountability for this, all the while showing that we are doing our best to do whatever it takes to achieve the common goals and restore our colleagues’ faith in us. All four of these pillars need to be in...

  13. Tunneling time, what is its meaning?

    International Nuclear Information System (INIS)

    McDonald, C R; Orlando, G; Vampa, G; Brabec, T

    2015-01-01

    The tunnel time ionization dynamics for bound systems in laser fields are investigated. Numerical analysis for a step function switch-on of the field allows for the tunnel time to be defined as the time it takes the ground state to develop the under-barrier wavefunction components necessary to achieve the static field ionization rate. A relation between the tunnel time and the Keldysh time is established. The definition of the tunnel time is extended to time varying fields and experimental possibilities for measuring the tunnel time are discussed

  14. Trust between man and machine in a teleoperation system

    International Nuclear Information System (INIS)

    Dassonville, I.; Jolly, D.; Desodt, A.M.

    1996-01-01

    The work we present deals with the trust of man in a teleoperation system. Trust is important because it is linked to stress which modifies human reliability. We are trying to quantify trust. In this paper, we'll present the theory of trust in relationships, and its extension for a man-machine system. Then, we explain the links between trust and human reliability. Then, we introduce our experimental process and the first results concerning selfconfidence

  15. The Impact of Trust on Job Performance in Organisations

    OpenAIRE

    Ana Nešić; Danijela Lalić

    2016-01-01

    In circumstances governed by consistent change in all aspects of business, trust represents a significant factor in the behavioural patterns of organisations. Of great importance for a successful communication in organisations is understanding the levels of trust among staff, employees and their management, and trust in the organisation itself. Trust is a cohesive and motivating factor in work groups. Also, based on trust are identification and commitment to the organisation, as well as the r...

  16. Dynamic Trust Management for Mobile Networks and Its Applications

    Science.gov (United States)

    Bao, Fenye

    2013-01-01

    Trust management in mobile networks is challenging due to dynamically changing network environments and the lack of a centralized trusted authority. In this dissertation research, we "design" and "validate" a class of dynamic trust management protocols for mobile networks, and demonstrate the utility of dynamic trust management…

  17. Transonic Dynamics Tunnel (TDT)

    Data.gov (United States)

    Federal Laboratory Consortium — The Transonic Dynamics Tunnel (TDT) is a continuous flow wind-tunnel facility capable of speeds up to Mach 1.2 at stagnation pressures up to one atmosphere. The TDT...

  18. Effects of neglecting carrier tunneling on electrostatic potential in calculating direct tunneling gate current in deep submicron MOSFETs

    OpenAIRE

    Hakim, MMA; Haque, A

    2002-01-01

    We investigate the validity of the assumption of neglecting carrier tunneling effects on self-consistent electrostatic potential in calculating direct tunneling gate current in deep submicron MOSFETs. Comparison between simulated and experimental results shows that for accurate modeling of direct tunneling current, tunneling effects on potential profile need to be considered. The relative error in gate current due to neglecting carrier tunneling is higher at higher gate voltages and increases...

  19. Particularized trust, generalized trust, and immigrant self-rated health: cross-national analysis of World Values Survey.

    Science.gov (United States)

    Kim, H H-S

    2018-05-01

    This research examined the associations between two types of trust, generalized and particularized, and self-rated health among immigrants. Data were drawn from the World Values Survey (WVS6), the latest wave of cross-sectional surveys based on face-to-face interviews. The immigrant subsample analyzed herein contains 3108 foreign-born individuals clustered from 51 countries. Given the hierarchically nested data, two-level logistic regressions models were estimated using HLM (Hierarchical Linear Modeling) 7.1. At the individual level, net of socio-economic and demographic factors (age, gender, marital status, education, income, neighborhood security, and subjective well-being), particularized trust was positively related to physical health (odds ratio [OR] = 1.11, P < .001). Generalized trust, however, was not a significant predictor. At the country level, based on alternative models, the aggregate measure of particularized trust was negatively associated with subjective health. The odds of being healthy were on average about 30% lower. The interdisciplinary literature on social determinants of health has largely focused on the salubrious impact of trust and other forms of social capital on physical well-being. Many previous studies based on general, not immigrant, populations also did not differentiate between generalized and particularized types of trust. Results from this study suggest that this conceptual distinction is critical in understanding how and to what extent the two are differentially related to immigrant well-being across multiple levels of analysis. Copyright © 2018 The Royal Society for Public Health. Published by Elsevier Ltd. All rights reserved.

  20. Road and Railroad Tunnels

    Data.gov (United States)

    Department of Homeland Security — Tunnels in the United States According to the HSIP Tiger Team Report, a tunnel is defined as a linear underground passageway open at both ends. This dataset is based...

  1. PUREX Storage Tunnels dangerous waste permit application

    International Nuclear Information System (INIS)

    1991-12-01

    The PUREX Storage Tunnels are a mixed waste storage unit consisting of two underground railroad tunnels: Tunnel Number 1 designated 218-E-14 and Tunnel Number 2 designated 218-E-15. The two tunnels are connected by rail to the PUREX Plant and combine to provide storage space for 48 railroad cars (railcars). The PUREX Storage Tunnels provide a long-term storage location for equipment removed from the PUREX Plant. Transfers into the PUREX Storage Tunnels are made on an as-needed basis. Radioactively contaminated equipment is loaded on railcars and remotely transferred by rail into the PUREX Storage Tunnels. Railcars act as both a transport means and a storage platform for equipment placed into the tunnels. This report consists of part A and part B. Part A reports on amounts and locations of the mixed water. Part B permit application consists of the following: Facility Description and General Provisions; Waste Characteristics; Process Information; Groundwater Monitoring; Procedures to Prevent Hazards; Contingency Plan; Personnel Training; Exposure Information Report

  2. Fairness and Trust in Structured Populations

    Directory of Open Access Journals (Sweden)

    Corina E. Tarnita

    2015-07-01

    Full Text Available Classical economic theory assumes that people are rational and selfish, but behavioral experiments often point to inconsistent behavior, typically attributed to “other regarding preferences.” The Ultimatum Game, used to study fairness, and the Trust Game, used to study trust and trustworthiness, have been two of the most influential and well-studied examples of inconsistent behavior. Recently, evolutionary biologists have attempted to explain the evolution of such preferences using evolutionary game theoretic models. While deterministic evolutionary game theoretic models agree with the classical economics predictions, recent stochastic approaches that include uncertainty and the possibility of mistakes have been successful in accounting for both the evolution of fairness and the evolution of trust. Here I explore the role of population structure by generalizing and expanding these existing results to the case of non-random interactions. This is a natural extension since such interactions do not occur randomly in the daily lives of individuals. I find that, in the limit of weak selection, population structure increases the space of fair strategies that are selected for but it has little-to-no effect on the optimum strategy played in the Ultimatum Game. In the Trust Game, in the limit of weak selection, I find that some amount of trust and trustworthiness can evolve even in a well-mixed population; however, the optimal strategy, although trusting if the return on investment is sufficiently high, is never trustworthy. Population structure biases selection towards strategies that are both trusting and trustworthy trustworthy and reduces the critical return threshold, but, much like in the case of fairness, it does not affect the winning strategy. Further considering the effects of reputation and structure, I find that they act synergistically to promote the evolution of trustworthiness.

  3. Power decreases trust in social exchange.

    Science.gov (United States)

    Schilke, Oliver; Reimann, Martin; Cook, Karen S

    2015-10-20

    How does lacking vs. possessing power in a social exchange affect people's trust in their exchange partner? An answer to this question has broad implications for a number of exchange settings in which dependence plays an important role. Here, we report on a series of experiments in which we manipulated participants' power position in terms of structural dependence and observed their trust perceptions and behaviors. Over a variety of different experimental paradigms and measures, we find that more powerful actors place less trust in others than less powerful actors do. Our results contradict predictions by rational actor models, which assume that low-power individuals are able to anticipate that a more powerful exchange partner will place little value on the relationship with them, thus tends to behave opportunistically, and consequently cannot be trusted. Conversely, our results support predictions by motivated cognition theory, which posits that low-power individuals want their exchange partner to be trustworthy and then act according to that desire. Mediation analyses show that, consistent with the motivated cognition account, having low power increases individuals' hope and, in turn, their perceptions of their exchange partners' benevolence, which ultimately leads them to trust.

  4. Trusted Operations on Sensor Data †

    Directory of Open Access Journals (Sweden)

    Hassaan Janjua

    2018-04-01

    Full Text Available The widespread use of mobile devices has allowed the development of participatory sensing systems that capture various types of data using the existing or external sensors attached to mobile devices. Gathering data from such anonymous sources requires a mechanism to establish the integrity of sensor readings. In many cases, sensor data need to be preprocessed on the device itself before being uploaded to the target server while ensuring the chain of trust from capture to the delivery of the data. This can be achieved by a framework that provides a means to implement arbitrary operations to be performed on trusted sensor data, while guaranteeing the security and integrity of the data. This paper presents the design and implementation of a framework that allows the capture of trusted sensor data from both external and internal sensors on a mobile phone along with the development of trusted operations on sensor data while providing a mechanism for performing predefined operations on the data such that the chain of trust is maintained. The evaluation shows that the proposed system ensures the security and integrity of sensor data with minimal performance overhead.

  5. Electrically tunable tunneling rectification magnetoresistance in magnetic tunneling junctions with asymmetric barriers.

    Science.gov (United States)

    Wang, Jing; Huang, Qikun; Shi, Peng; Zhang, Kun; Tian, Yufeng; Yan, Shishen; Chen, Yanxue; Liu, Guolei; Kang, Shishou; Mei, Liangmo

    2017-10-26

    The development of multifunctional spintronic devices requires simultaneous control of multiple degrees of freedom of electrons, such as charge, spin and orbit, and especially a new physical functionality can be realized by combining two or more different physical mechanisms in one specific device. Here, we report the realization of novel tunneling rectification magnetoresistance (TRMR), where the charge-related rectification and spin-dependent tunneling magnetoresistance are integrated in Co/CoO-ZnO/Co magnetic tunneling junctions with asymmetric tunneling barriers. Moreover, by simultaneously applying direct current and alternating current to the devices, the TRMR has been remarkably tuned in the range from -300% to 2200% at low temperature. This proof-of-concept investigation provides an unexplored avenue towards electrical and magnetic control of charge and spin, which may apply to other heterojunctions to give rise to more fascinating emergent functionalities for future spintronics applications.

  6. Scanning tunneling microscopy

    International Nuclear Information System (INIS)

    Binnig, G.; Rohrer, H.

    1983-01-01

    Based on vacuum tunneling, a novel type of microscope, the scanning tunneling microscope (STM) was developed. It has an unprecedented resolution in real space on an atomic scale. The authors review the important technical features, illustrate the power of the STM for surface topographies and discuss its potential in other areas of science and technology. (Auth.)

  7. A game theory-based trust measurement model for social networks.

    Science.gov (United States)

    Wang, Yingjie; Cai, Zhipeng; Yin, Guisheng; Gao, Yang; Tong, Xiangrong; Han, Qilong

    2016-01-01

    In social networks, trust is a complex social network. Participants in online social networks want to share information and experiences with as many reliable users as possible. However, the modeling of trust is complicated and application dependent. Modeling trust needs to consider interaction history, recommendation, user behaviors and so on. Therefore, modeling trust is an important focus for online social networks. We propose a game theory-based trust measurement model for social networks. The trust degree is calculated from three aspects, service reliability, feedback effectiveness, recommendation credibility, to get more accurate result. In addition, to alleviate the free-riding problem, we propose a game theory-based punishment mechanism for specific trust and global trust, respectively. We prove that the proposed trust measurement model is effective. The free-riding problem can be resolved effectively through adding the proposed punishment mechanism.

  8. Trust and Control in Public Sector Reform

    DEFF Research Database (Denmark)

    Vallentin, Steen; Thygesen, Niels Thyge

    2017-01-01

    to a substitution view when it comes to accounting for public sector reform as structure and process. Also, we propose a widening of the theoretical lens in the form of an emergent view of how trust and control, instead of being beforehand determinable and more or less stable identities, emerge in multiple......This paper provides an analysis of trust-based management reform in the Danish public sector from the point of view of the trust–control nexus. Based on a qualitative case study of home care in the municipality of Copenhagen we argue that a complementary view of trust and control is superior...... and singular ways from multiple events in the organisation. Noticing a dearth of research that explicitly addresses trust issues with regard to public sector management and organisation, the paper is a response to the call for more studies of trust as an institutionally embedded phenomenon....

  9. Does Religiosity Promote or Discourage Social Trust?

    DEFF Research Database (Denmark)

    Berggren, Niclas; Bjørnskov, Christian

    We look at the effect of religiosity on social trust, defined as the share of a population that thinks that people in general can be trusted. This is important since social trust is related to many desired outcomes, such as growth, education, democratic stability and subjective well...... countries and the U.S. states, measuring religiosity by the share of the population that answers yes to the question "Is religion an important part of your daily life?". Our empirical results, making use of regression analysis whereby we control for other possible determinants of social trust and, by using......-being. The effect of religiosity is theoretically unclear: while all major religions call for behaving well to others, religious groups may primarily trust people in their own groups and distrust others, as well as cause division in the broader population. We make use of new data from the Gallup World Poll for 105...

  10. The Double-System Architecture for Trusted OS

    Science.gov (United States)

    Zhao, Yong; Li, Yu; Zhan, Jing

    With the development of computer science and technology, current secure operating systems failed to respond to many new security challenges. Trusted operating system (TOS) is proposed to try to solve these problems. However, there are no mature, unified architectures for the TOS yet, since most of them cannot make clear of the relationship between security mechanism and the trusted mechanism. Therefore, this paper proposes a double-system architecture (DSA) for the TOS to solve the problem. The DSA is composed of the Trusted System (TS) and the Security System (SS). We constructed the TS by establishing a trusted environment and realized related SS. Furthermore, we proposed the Trusted Information Channel (TIC) to protect the information flow between TS and SS. In a word, the double system architecture we proposed can provide reliable protection for the OS through the SS with the supports provided by the TS.

  11. Trust Ownership of the Tata Group

    DEFF Research Database (Denmark)

    Thomsen, Steen

    The Indian Tata Group is one of the largest and most admired business groups in the world. It has 28 listed subsidiaries and more than 80 operating businesses. It has shown strong financial performance and social responsibility for decades. Interestingly, it has a unique ownership structure......: the main holding company Tata Sons Limited is majority-owned by charitable trusts. We examine the governance of this remarkable entity. The Trusts own 66% of Tata Sons, the main holding company of the Group, while members of the founding Tata family are very small minority shareholders. The governance...... structure is characterized by managerial distance between trusts and Group companies. The Trusts are almost exclusively concerned with philanthropy, and according to the Articles of Association of Tata Sons Limited, their governance role is limited to nominating two members to the Selection Committee which...

  12. Scanning tunneling microscope nanoetching method

    Science.gov (United States)

    Li, Yun-Zhong; Reifenberger, Ronald G.; Andres, Ronald P.

    1990-01-01

    A method is described for forming uniform nanometer sized depressions on the surface of a conducting substrate. A tunneling tip is used to apply tunneling current density sufficient to vaporize a localized area of the substrate surface. The resulting depressions or craters in the substrate surface can be formed in information encoding patterns readable with a scanning tunneling microscope.

  13. Perceived Information Security, Information Privacy, Risk and Institutional Trust on Consumer€™s Trust in E-commerce

    OpenAIRE

    Parengkuan, Frane Maorets

    2014-01-01

    E-commerce is widely being used in nowadays generation where the business entrepreneur from small to large institution, has widely taken advantage on the internet to promote business and deliver information about their product. Consumer trust is an important aspect of e-commerce, and understanding its antecedents and consequences is a prime concern. This research designed to find out the influence of Perceived Information Security, Privacy, Risk and Institutional Trust on Consumers Trust in E...

  14. Implicit vs. Explicit Trust in Social Matrix Factorization

    NARCIS (Netherlands)

    Fazeli, Soude; Loni, Babak; Bellogin, Alejandro; Drachsler, Hendrik; Sloep, Peter

    2014-01-01

    Incorporating social trust in Matrix Factorization (MF) methods demonstrably improves accuracy of rating prediction. Such approaches mainly use the trust scores explicitly expressed by users. However, it is often challenging to have users provide explicit trust scores of each other. There exist

  15. A Cloud Theory-Based Trust Computing Model in Social Networks

    Directory of Open Access Journals (Sweden)

    Fengming Liu

    2016-12-01

    Full Text Available How to develop a trust management model and then to efficiently control and manage nodes is an important issue in the scope of social network security. In this paper, a trust management model based on a cloud model is proposed. The cloud model uses a specific computation operator to achieve the transformation from qualitative concepts to quantitative computation. Additionally, this can also be used to effectively express the fuzziness, randomness and the relationship between them of the subjective trust. The node trust is divided into reputation trust and transaction trust. In addition, evaluation methods are designed, respectively. Firstly, the two-dimension trust cloud evaluation model is designed based on node’s comprehensive and trading experience to determine the reputation trust. The expected value reflects the average trust status of nodes. Then, entropy and hyper-entropy are used to describe the uncertainty of trust. Secondly, the calculation methods of the proposed direct transaction trust and the recommendation transaction trust involve comprehensively computation of the transaction trust of each node. Then, the choosing strategies were designed for node to trade based on trust cloud. Finally, the results of a simulation experiment in P2P network file sharing on an experimental platform directly reflect the objectivity, accuracy and robustness of the proposed model, and could also effectively identify the malicious or unreliable service nodes in the system. In addition, this can be used to promote the service reliability of the nodes with high credibility, by which the stability of the whole network is improved.

  16. Mediated Trust in the Innovation Ecosystem

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    This paper introduces a framework for further studies in the role of mediated trust in the innovation ecosystems. Combining insight from scholars like Etzkowitz, Russel and Nordfors, the concept of innovation ecosystem is described as an extended Triple Helix where media is seen as a fourth strand...... should be considered trustworthy. When receiving the message, the audience will decode the signals. Trust is considered fundamental for mass media if these are to fulfill their normative functions in the innovation ecosystem. However, the concept of trust is not clearly defined in the literature and we...

  17. Superconducting tunneling with the tunneling Hamiltonian. II. Subgap harmonic structure

    International Nuclear Information System (INIS)

    Arnold, G.B.

    1987-01-01

    The theory of superconducting tunneling without the tunneling Hamiltonian is extended to treat superconductor/insulator/superconductor junctions in which the transmission coefficient of the insulating barrier approaches unity. The solution for the current in such junctions is obtained by solving the problem of a particle hopping in a one-dimensional lattice of sites, with forward and reverse transfer integrals that depend on the site. The results are applied to the problem of subgap harmonic structure in superconducting tunneling. The time-dependent current at finite voltage through a junction exhibiting subgap structure is found to have terms that oscillate at all integer multiples of the Josephson frequency, n(2eV/h). The amplitudes of these new, and as yet unmeasured, ac current contributions as a function of voltage are predicted

  18. TrustRank: a Cold-Start tolerant recommender system

    Science.gov (United States)

    Zou, Haitao; Gong, Zhiguo; Zhang, Nan; Zhao, Wei; Guo, Jingzhi

    2015-02-01

    The explosive growth of the World Wide Web leads to the fast advancing development of e-commerce techniques. Recommender systems, which use personalised information filtering techniques to generate a set of items suitable to a given user, have received considerable attention. User- and item-based algorithms are two popular techniques for the design of recommender systems. These two algorithms are known to have Cold-Start problems, i.e., they are unable to effectively handle Cold-Start users who have an extremely limited number of purchase records. In this paper, we develop TrustRank, a novel recommender system which handles the Cold-Start problem by leveraging the user-trust networks which are commonly available for e-commerce applications. A user-trust network is formed by friendships or trust relationships that users specify among them. While it is straightforward to conjecture that a user-trust network is helpful for improving the accuracy of recommendations, a key challenge for using user-trust network to facilitate Cold-Start users is that these users also tend to have a very limited number of trust relationships. To address this challenge, we propose a pre-processing propagation of the Cold-Start users' trust network. In particular, by applying the personalised PageRank algorithm, we expand the friends of a given user to include others with similar purchase records to his/her original friends. To make this propagation algorithm scalable to a large amount of users, as required by real-world recommender systems, we devise an iterative computation algorithm of the original personalised TrustRank which can incrementally compute trust vectors for Cold-Start users. We conduct extensive experiments to demonstrate the consistently improvement provided by our proposed algorithm over the existing recommender algorithms on the accuracy of recommendations for Cold-Start users.

  19. Dirac particle tunneling from black rings

    International Nuclear Information System (INIS)

    Jiang Qingquan

    2008-01-01

    Recent research shows that Hawking radiation can be treated as a quantum tunneling process, and Hawking temperatures of Dirac particles across the horizon of a black hole can be correctly recovered via the fermion tunneling method. In this paper, motivated by the fermion tunneling method, we attempt to apply the analysis to derive Hawking radiation of Dirac particles via tunneling from black ring solutions of 5-dimensional Einstein-Maxwell-dilaton gravity theory. Finally, it is interesting to find that, as in the black hole case, fermion tunneling can also result in correct Hawking temperatures for the rotating neutral, dipole, and charged black rings.

  20. Engineers win award for Swiss tunnel

    CERN Multimedia

    2003-01-01

    A Derby engineering consultancy has won the Tunnelling Industry Award 2003 for Excellence in Tunnel Design, offered by the British Tunnelling Society, for its work on the LHC in Geneva, Switzerland (1/2 page).

  1. Semiclassical description of resonant tunneling

    International Nuclear Information System (INIS)

    Bogomolny, E.B.; Rouben, D.C.

    1996-01-01

    A semiclassical formula is calculated for the tunneling current of electrons trapped in a potential well which can tunnel into and across a wide quantum well. The tunneling current is measured at the second interface of this well and the calculations idealized an experimental situation where a strong magnetic field tilted with respect to an electric field was used. It is shown that the contribution to the tunneling current, due to trajectories which begin at the first interface and end on the second, is dominant for periodic orbits which hit both walls of the quantum well. (author)

  2. Collective Trust: Why Schools Can't Improve without It

    Science.gov (United States)

    Forsyth, Patrick B.; Adams, Curt M.; Hoy, Wayne K.

    2011-01-01

    The culmination of nearly three decades of research, "Collective Trust" offers new insight and practical knowledge on the social construction of trust for school improvement. The authors argue that "collective trust" is not merely an average trust score for a group, but rather an independent concept with distinctive origins and consequences. The…

  3. Determinants of trust in B2C e-commerce and their relationship with consumer online trust

    Science.gov (United States)

    Bojang, Ismaila; Medvedev, Maxim A.; Spasov, Kamen B.; Matvevnina, Arina I.

    2017-12-01

    The aim of this research was to investigate specific determinants or factors that influence consumer online trust in the B2C e-commerce with a focus on consumers. Constructs such as perceived security, perceived privacy, perceived third party assurance, perceived reputation, perceived familiarity and perceived website quality and their relationship with online trust in the B2C context were studied. In conducting the research, a convenience sampling technique was adopted in carrying out the survey. Questionnaires were distributed to the target respondents and the data were analyzed using SPSS version 24. A Pearson's correlation was used to test the six hypotheses identified in this study. The results provided evidence that perceived security has the greatest influence on online trust. This was followed closely by perceived reputation and finally perceived privacy. This clearly shows that e-commerce consumer population considers these factors very imperative in engendering their trust in the virtual B2C e-commerce environment.

  4. A Top Pilot Tunnel Preconditioning Method for the Prevention of Extremely Intense Rockbursts in Deep Tunnels Excavated by TBMs

    Science.gov (United States)

    Zhang, Chuanqing; Feng, Xiating; Zhou, Hui; Qiu, Shili; Wu, Wenping

    2012-05-01

    The headrace tunnels at the Jinping II Hydropower Station cross the Jinping Mountain with a maximum overburden depth of 2,525 m, where 80% of the strata along the tunnels consist of marble. A number of extremely intense rockbursts occurred during the excavation of the auxiliary tunnels and the drainage tunnel. In particular, a tunnel boring machine (TBM) was destroyed by an extremely intense rockburst in a 7.2-m-diameter drainage tunnel. Two of the four subsequent 12.4-m-diameter headrace tunnels will be excavated with larger size TBMs, where a high risk of extremely intense rockbursts exists. Herein, a top pilot tunnel preconditioning method is proposed to minimize this risk, in which a drilling and blasting method is first recommended for the top pilot tunnel excavation and support, and then the TBM excavation of the main tunnel is conducted. In order to evaluate the mechanical effectiveness of this method, numerical simulation analyses using the failure approaching index, energy release rate, and excess shear stress indices are carried out. Its construction feasibility is discussed as well. Moreover, a microseismic monitoring technique is used in the experimental tunnel section for the real-time monitoring of the microseismic activities of the rock mass in TBM excavation and for assessing the effect of the top pilot tunnel excavation in reducing the risk of rockbursts. This method is applied to two tunnel sections prone to extremely intense rockbursts and leads to a reduction in the risk of rockbursts in TBM excavation.

  5. Trust as the Foundation of Resource Exchange in GENI

    Directory of Open Access Journals (Sweden)

    Marshall Brinn

    2015-08-01

    Full Text Available Researchers and educators in computer science and other domains are increasingly turning to distributed test beds that offer access to a variety of resources, including networking, computation, storage, sensing, and actuation. The provisioning of resources from their owners to interested experimenters requires establishing sufficient mutual trust between these parties. Building such trust directly between researchers and resource owners will not scale as the number of experimenters and resource owners grows. The NSF GENI (Global Environment for Network Innovation project has focused on establishing scalable mechanisms for maintaining such trust based on common approaches for authentication, authorization and accountability. Such trust reflects the actual trust relationships and agreements among humans or real-world organizations. We describe here GENI’s approaches for federated trust based on mutually trusted authorities, and implemented via cryptographically signed credentials and shared policies.

  6. Trust, Contracting, and Adaptation in Agri-Food Hybrid Structures

    Directory of Open Access Journals (Sweden)

    Gaetano Martino

    2011-02-01

    Full Text Available The paper considers the relationship between trust and governance structure from a Transaction Cost Economics perspective. The role of trust in the coordinating decisions is variously conceptualized according to the theoretical view adopted by the scholars. The present study adopt the three-level schema introduced by Williamson (1996 and suggest that determinants of trust may operate both at institutional and governance structure level. The analytical framework depicted maintains that trust may determine a reduction of ex post transaction cost in the adaptation of hybrid structure. As a consequence trust appears to be able to extend the range of existence of the hybrids. The empirical part of the study is dedicated to a case study which illustrates the emerging of conditional trust (Fritz et al., 2008 and the role of trust in the adaptation process.

  7. Skattemæsssig kvalifikation af trusts i praksis

    DEFF Research Database (Denmark)

    Feldthusen, Rasmus Kristian

    2013-01-01

    Artiklen har til formål at systematisere og redegøre for skattemyndighedernes fremgangsmåde og kvalifikation af trusts i dansk ret. Baggrunden herfor er, at antallet af trust-sager for såvel de administrative myndigheder som domstolene relativt set er vokset betydeligt siden årtusindeskiftet. Ud...... fra en gennemgang af doms- og administrativ praksis kan det konstateres, at kvalifikationen af trusts kan opdeles i fire hovedkategorier, som er væsentlige at have kendskab til, såfremt en skattesag indeholdende trust-elementer måtte være under opsejling. Endvidere inddrages skattestrafferetlig...... praksis på baggrund af en nyligt afsagt landsretsdom vedrørende en offshore trust....

  8. Do Research Participants Trust Researchers or Their Institution?

    Science.gov (United States)

    Guillemin, Marilys; Barnard, Emma; Allen, Anton; Stewart, Paul; Walker, Hannah; Rosenthal, Doreen; Gillam, Lynn

    2018-07-01

    Relationships of trust between research participants and researchers are often considered paramount to successful research; however, we know little about participants' perspectives. We examined whom research participants trusted when taking part in research. Using a qualitative approach, we interviewed 36 research participants, including eight Indigenous participants. Thematic analysis was used to analyze the data. This article focuses on findings related to non-Indigenous participants. In contrast to Indigenous participants, non-Indigenous participants placed their trust in research institutions because of their systems of research ethics, their reputation and prestige. Researchers working in non-Indigenous contexts need to be cognizant that the trust that participants place in them is closely connected with the trust that participants have in the institution.

  9. Money Can't Buy Me Trust

    DEFF Research Database (Denmark)

    Christoffersen, Jeppe; Robson, Matthew J.

    2017-01-01

    country partners’ government to support alliances with local, developing country partners. Applying motivation crowding theory to trust processes, we develop theoretical logic explaining how and under what conditions such third-party financial support negatively affects the local partner's trust. Our...

  10. Tunneling Ionization of Diatomic Molecules

    DEFF Research Database (Denmark)

    Svensmark, Jens Søren Sieg

    2016-01-01

    When a molecule is subject to a strong laser field, there is a probability that an electron can escape, even though the electrons are bound by a large potential barrier. This is possible because electrons are quantum mechanical in nature, and they are therefore able to tunnel through potential...... barriers, an ability classical particles do not possess. Tunnelling is a fundamental quantum mechanical process, a process that is distinctly non-classical, so solving this tunnelling problem is not only relevant for molecular physics, but also for quantum theory in general. In this dissertation the theory...... of tunneling ionizaion of molecules is presented and the results of numerical calculations are shown. One perhaps surprising result is, that the frequently used Born-Oppenheimer approximation breaks down for weak fields when describing tunneling ionization. An analytic theory applicable in the weak-field limit...

  11. Asymmetric voltage behavior of the tunnel magnetoresistance in double barrier magnetic tunnel junctions

    KAUST Repository

    Useinov, Arthur

    2012-06-01

    In this paper, we study the value of the tunnel magnetoresistance (TMR) as a function of the applied voltage in double barrier magnetic tunnel junctions (DMTJs) with the left and right ferromagnetic (FM) layers being pinned and numerically estimate the possible difference of the TMR curves for negative and positive voltages in the homojunctions (equal barriers and electrodes). DMTJs are modeled as two single barrier junctions connected in series with consecutive tunneling (CST). We investigated the asymmetric voltage behavior of the TMR for the CST in the range of a general theoretical model. Significant asymmetries of the experimental curves, which arise due to different annealing regimes, are mostly explained by different heights of the tunnel barriers and asymmetries of spin polarizations in magnetic layers. © (2012) Trans Tech Publications.

  12. Asymmetric voltage behavior of the tunnel magnetoresistance in double barrier magnetic tunnel junctions

    KAUST Repository

    Useinov, Arthur; Gooneratne, Chinthaka Pasan; Kosel, Jü rgen

    2012-01-01

    In this paper, we study the value of the tunnel magnetoresistance (TMR) as a function of the applied voltage in double barrier magnetic tunnel junctions (DMTJs) with the left and right ferromagnetic (FM) layers being pinned and numerically estimate the possible difference of the TMR curves for negative and positive voltages in the homojunctions (equal barriers and electrodes). DMTJs are modeled as two single barrier junctions connected in series with consecutive tunneling (CST). We investigated the asymmetric voltage behavior of the TMR for the CST in the range of a general theoretical model. Significant asymmetries of the experimental curves, which arise due to different annealing regimes, are mostly explained by different heights of the tunnel barriers and asymmetries of spin polarizations in magnetic layers. © (2012) Trans Tech Publications.

  13. Tunneling magnetoresistance and electroresistance in Fe/PbTiO3/Fe multiferroic tunnel junctions

    International Nuclear Information System (INIS)

    Dai, Jian-Qing

    2016-01-01

    We perform first-principles electronic structure and spin-dependent transport calculations for a Fe/PbTiO 3 /Fe multiferroic tunnel junction with asymmetric TiO 2 - and PbO-terminated interfaces. We demonstrate that the interfacial electronic reconstruction driven by the in situ screening of ferroelectric polarization, in conjunction with the intricate complex band structure of barrier, play a decisive role in controlling the spin-dependent tunneling. Reversal of ferroelectric polarization results in a transition from insulating to half-metal-like conducting state for the interfacial Pb 6p z orbitals, which acts as an atomic-scale spin-valve by releasing the tunneling current in antiparallel magnetization configuration as the ferroelectric polarization pointing to the PbO-terminated interface. This effect produces large change in tunneling conductance. Our results open an attractive avenue in designing multiferroic tunnel junctions with excellent performance by exploiting the interfacial electronic reconstruction originated from the in situ screening of ferroelectric polarization.

  14. Atomistic nature in band-to-band tunneling in two-dimensional silicon pn tunnel diodes

    International Nuclear Information System (INIS)

    Tabe, Michiharu; Tan, Hoang Nhat; Mizuno, Takeshi; Muruganathan, Manoharan; Anh, Le The; Mizuta, Hiroshi; Nuryadi, Ratno; Moraru, Daniel

    2016-01-01

    We study low-temperature transport properties of two-dimensional (2D) Si tunnel diodes, or Si Esaki diodes, with a lateral layout. In ordinary Si Esaki diodes, interband tunneling current is severely limited because of the law of momentum conservation, while nanoscale Esaki diodes may behave differently due to the dopants in the narrow depletion region, by atomistic effects which release such current limitation. In thin-Si lateral highly doped pn diodes, we find clear signatures of interband tunneling between 2D-subbands involving phonon assistance. More importantly, the tunneling current is sharply enhanced in a narrow voltage range by resonance via a pair of a donor- and an acceptor-atom in the pn junction region. Such atomistic behavior is recognized as a general feature showing up only in nanoscale tunnel diodes. In particular, a donor-acceptor pair with deeper ground-state energies is likely to be responsible for such a sharply enhanced current peak, tunable by external biases.

  15. Trust matters: A narrative literature review of the role of trust in health care systems in sub-Saharan Africa.

    Science.gov (United States)

    Østergaard, Lise Rosendal

    2015-10-01

    This article makes a contribution to the debate about health service utilisation and the role of trust in fostering demand for health services in sub-Saharan Africa. It is framed as a narrative literature review based on a thematic analysis of nine empirical, qualitative studies. For the purposes of this article trust is defined as a voluntary course of action, which involves the optimistic expectation that the trustee will do no harm to the trustor and is increasingly perceived as an important influence on health system functioning. The article looks at trust issues in interpersonal, intergroup and institutional situations. The findings of the review point to four elements that are important for trust to develop in health sector relationships: the sensitive use of discretionary power by health workers, perceived empathy by patients of the health workers, the quality of medical care and workplace collegiality. When trust works in health sector encounters, it reduces the social complexity and inherent uneven distribution of power between clients and providers. The article concludes that understanding and supporting trust processes between patients and providers, as well as between co-workers and managers, will improve health sector collaboration and stimulate demand for health care services.

  16. Moral opinion polarization and the erosion of trust

    DEFF Research Database (Denmark)

    Rapp, Carolin

    2016-01-01

    generalized trust, we focus on opinion polarization as another potential impact factor on trust. In more detail, we investigate the extent to which polarization over morally charged issues such as homsexuality, abortion and euthanasia affects individuals' likelihood to trust others. We hypothesize that moral...

  17. Income inequality, trust and homicide in 33 countries.

    Science.gov (United States)

    Elgar, Frank J; Aitken, Nicole

    2011-04-01

    Theories of why income inequality correlates with violence suggest that inequality erodes social capital and trust, or inhibits investment into public services and infrastructure. Past research sensed the importance of these causal paths but few have examined them using tests of statistical mediation. We explored links between income inequality and rates of homicide in 33 countries and then tested whether this association is mediated by an indicator of social capital (interpersonal trust) or by public spending on health and education. Survey data on trust were collected from 48 641 adults and matched to country data on per capita income, income inequality, public expenditures on health and education and rate of homicides. Between countries, income inequality correlated with trust (r = -0.64) and homicide (r = 0.80) but not with public expenditures. Trust also correlated with homicides (r = -0.58) and partly mediated the association between income inequality and homicide, whilst public expenditures did not. Multilevel analysis showed that income inequality related to less trust after differences in per capita income and sample characteristics were taken into account. Results were consistent with psychosocial explanations of links between income inequality and homicide; however, the causal relationship between inequality, trust and homicide remains unclear given the cross-sectional design of this study. Societies with large income differences and low levels of trust may lack the social capacity to create safe communities.

  18. Trust Matters: Leadership for Successful Schools, 2nd Edition

    Science.gov (United States)

    Tschannen-Moran, Megan

    2014-01-01

    Make your school soar by escalating trust between teachers, students, and families. Trust is an essential element in all healthy relationships, and the relationships that exist in your school are no different. How can your school leaders or teachers cultivate trust? How can your institution maintain trust once it is established? These are the…

  19. Trust estimation of the semantic web using semantic web clustering

    Science.gov (United States)

    Shirgahi, Hossein; Mohsenzadeh, Mehran; Haj Seyyed Javadi, Hamid

    2017-05-01

    Development of semantic web and social network is undeniable in the Internet world these days. Widespread nature of semantic web has been very challenging to assess the trust in this field. In recent years, extensive researches have been done to estimate the trust of semantic web. Since trust of semantic web is a multidimensional problem, in this paper, we used parameters of social network authority, the value of pages links authority and semantic authority to assess the trust. Due to the large space of semantic network, we considered the problem scope to the clusters of semantic subnetworks and obtained the trust of each cluster elements as local and calculated the trust of outside resources according to their local trusts and trust of clusters to each other. According to the experimental result, the proposed method shows more than 79% Fscore that is about 11.9% in average more than Eigen, Tidal and centralised trust methods. Mean of error in this proposed method is 12.936, that is 9.75% in average less than Eigen and Tidal trust methods.

  20. An Analysis of a supervisor-subordinate trust relationship

    Directory of Open Access Journals (Sweden)

    A. S. Engelbrecht

    2000-06-01

    Full Text Available In view of the importance of interpersonal trust as recognized by organizational scholars and the problems associated with the study of trust in organizations, the development of a conceptual model of organizational trust is essential. The aim of this study was to establish empirically the validity of a theoretically sound model of trust in the South African work context. The overall results confirmed a positive relationship between interpersonal trust, trustworthiness and successful trust relationships. The propensity to trust, as well as the length of the supervisorsubordinate relationship, however, did not prove to have a moderating effect on trustworthiness. Opsomming In die lig van die belangrike rol wat navorsers aan vertroue heg en die probleme verbonde aan die bestudering van vertroue in organisasies, is die ontwikkeling van'n konseptuele model van organisatoriese vertroue essensieel. Die doel van hierdie studie was om empiries te bepaal of 'n teoreties gefundeerde model van vertroue in die Suid-Afrikaanse werkskonteks geldig is. In die algemeen bevestig die resultate die bestaan van n beduidend positiewe verband tussen interpersoonlike vertroue, vertrouenswaardigheid en n suksesvolle vertrouensverhouding. Vertrouensgeneigdheid sowel as lengte van toesighouerondergeskikte verhouding het egter nie 'n moderende invloed op vertrouenswaardigheid getoon nie.

  1. Decoupling, re-Engaging: managing trust relationships in implementation projects

    DEFF Research Database (Denmark)

    Rose, Jeremy; Schlichter, Bjarne Rerup

    2012-01-01

    , and the complex demands of managing those fluctuations. We investigate evolving trust relationships in a longitudinal case analysis of a large Integrated Hospital System implementation for the Faroe Islands. Trust relationships suffered various breakdowns, but the project was able to recover and eventually meet...... its goals. Based on concepts from Giddens’ later work on modernity, we develop two approaches for managing dynamic trust relationships in implementation projects: decoupling and re-engaging.......An important aspect of the successful implementation of large information systems (such as ERP systems) is trust. These implementations impact the legitimate interests of many groups of stakeholders, and trust is a critical factor for success. Trust in the project is contingent upon many factors...

  2. Trust in health research relationships: accounts of human subjects.

    Science.gov (United States)

    McDonald, Michael; Townsend, Anne; Cox, Susan M; Paterson, Natasha Damiano; Lafrenière, Darquise

    2008-12-01

    TRUST IS FUNDAMENTAL in health research, yet there is little empirical evidence that explores the meaning of trust from the perspective of human subjects. The analysis presented here focuses on how human subjects talked about trust in the in-depth interviews. It emerged from the accounts that trust could not be assumed in the research setting, rather it was portrayed as a dynamic concept, built and easily broken, characterized by reciprocity and negotiation. Human subjects were ambivalent about who, when, what, and how much to trust in the research endeavor. This paper adds a fresh perspective to the literature on trust, and so offers a currently neglected, and little understood dimension to the discourse around health research ethics.

  3. Quantum tunneling with friction

    Science.gov (United States)

    Tokieda, M.; Hagino, K.

    2017-05-01

    Using the phenomenological quantum friction models introduced by P. Caldirola [Nuovo Cimento 18, 393 (1941), 10.1007/BF02960144] and E. Kanai [Prog. Theor. Phys. 3, 440 (1948), 10.1143/ptp/3.4.440], M. D. Kostin [J. Chem. Phys. 57, 3589 (1972), 10.1063/1.1678812], and K. Albrecht [Phys. Lett. B 56, 127 (1975), 10.1016/0370-2693(75)90283-X], we study quantum tunneling of a one-dimensional potential in the presence of energy dissipation. To this end, we calculate the tunneling probability using a time-dependent wave-packet method. The friction reduces the tunneling probability. We show that the three models provide similar penetrabilities to each other, among which the Caldirola-Kanai model requires the least numerical effort. We also discuss the effect of energy dissipation on quantum tunneling in terms of barrier distributions.

  4. INCAS TRISONIC WIND TUNNEL

    Directory of Open Access Journals (Sweden)

    Florin MUNTEANU

    2009-09-01

    Full Text Available The 1.2 m x 1.2 m Trisonic Blowdown Wind Tunnel is the largest of the experimental facilities at the National Institute for Aerospace Research - I.N.C.A.S. "Elie Carafoli", Bucharest, Romania. The tunnel has been designed by the Canadian company DSMA (now AIOLOS and since its commissioning in 1978 has performed high speed aerodynamic tests for more than 120 projects of aircraft, missiles and other objects among which the twin jet fighter IAR-93, the jet trainer IAR-99, the MIG-21 Lancer, the Polish jet fighter YRYDA and others. In the last years the wind tunnel has been used mostly for experimental research in European projects such as UFAST. The high flow quality parameters and the wide range of testing capabilities ensure the competitivity of the tunnel at an international level.

  5. Capturing Trust in Social Web Applications

    Science.gov (United States)

    O'Donovan, John

    The Social Web constitutes a shift in information flow from the traditional Web. Previously, content was provided by the owners of a website, for consumption by the end-user. Nowadays, these websites are being replaced by Social Web applications which are frameworks for the publication of user-provided content. Traditionally, Web content could be `trusted' to some extent based on the site it originated from. Algorithms such as Google's PageRank were (and still are) used to compute the importance of a website, based on analysis of underlying link topology. In the Social Web, analysis of link topology merely tells us about the importance of the information framework which hosts the content. Consumers of information still need to know about the importance/reliability of the content they are reading, and therefore about the reliability of the producers of that content. Research into trust and reputation of the producers of information in the Social Web is still very much in its infancy. Every day, people are forced to make trusting decisions about strangers on the Web based on a very limited amount of information. For example, purchasing a product from an eBay seller with a `reputation' of 99%, downloading a file from a peer-to-peer application such as Bit-Torrent, or allowing Amazon.com tell you what products you will like. Even something as simple as reading comments on a Web-blog requires the consumer to make a trusting decision about the quality of that information. In all of these example cases, and indeed throughout the Social Web, there is a pressing demand for increased information upon which we can make trusting decisions. This chapter examines the diversity of sources from which trust information can be harnessed within Social Web applications and discusses a high level classification of those sources. Three different techniques for harnessing and using trust from a range of sources are presented. These techniques are deployed in two sample Social Web

  6. In-mine (tunnel-to-tunnel) electrical resistance tomography in South African platinum mines

    CSIR Research Space (South Africa)

    Van Schoor, Abraham M

    2009-12-01

    Full Text Available The applicability of tunnel-to-tunnel electrical resistance tomography (ERT) for imaging disruptive geological structures ahead of mining, in an igneous platinum mining environment is assessed. The geophysical targets of interest are slump...

  7. Trust-aware recommendation for improving aggregate diversity

    Science.gov (United States)

    Liu, Haifeng; Bai, Xiaomei; Yang, Zhuo; Tolba, Amr; Xia, Feng

    2015-10-01

    Recommender systems are becoming increasingly important and prevalent because of the ability of solving information overload. In recent years, researchers are paying increasing attention to aggregate diversity as a key metric beyond accuracy, because improving aggregate recommendation diversity may increase long tails and sales diversity. Trust is often used to improve recommendation accuracy. However, how to utilize trust to improve aggregate recommendation diversity is unexplored. In this paper, we focus on solving this problem and propose a novel trust-aware recommendation method by incorporating time factor into similarity computation. The rationale underlying the proposed method is that, trustees with later creation time of trust relation can bring more diverse items to recommend to their trustors than other trustees with earlier creation time of trust relation. Through relevant experiments on publicly available dataset, we demonstrate that the proposed method outperforms the baseline method in terms of aggregate diversity while maintaining almost the same recall.

  8. The development of trust and altruism during childhood

    NARCIS (Netherlands)

    Evans, A.M.; Athenstaedt, U.; Krueger, J.I.

    2013-01-01

    Knowing when to trust is an essential skill, but little is known about its cognitive development. No previous studies have examined the development of trust while controlling for age differences in altruism. We hypothesized that older children are more likely to trust, and that this age-related

  9. Paying a Price: Culture, Trust, and Negotiation Consequences

    Science.gov (United States)

    Gunia, Brian C.; Brett, Jeanne M.; Nandkeolyar, Amit K.; Kamdar, Dishan

    2011-01-01

    Three studies contrasting Indian and American negotiators tested hypotheses derived from theory proposing why there are cultural differences in trust and how cultural differences in trust influence negotiation strategy. Study 1 (a survey) documented that Indian negotiators trust their counterparts less than American negotiators. Study 2 (a…

  10. Destructive quantum interference in spin tunneling problems

    OpenAIRE

    von Delft, Jan; Henley, Christopher L.

    1992-01-01

    In some spin tunneling problems, there are several different but symmetry-related tunneling paths that connect the same initial and final configurations. The topological phase factors of the corresponding tunneling amplitudes can lead to destructive interference between the different paths, so that the total tunneling amplitude is zero. In the study of tunneling between different ground state configurations of the Kagom\\'{e}-lattice quantum Heisenberg antiferromagnet, this occurs when the spi...

  11. Toward designing for trust in database automation

    Energy Technology Data Exchange (ETDEWEB)

    Duez, P. P.; Jamieson, G. A. [Cognitive Engineering Laboratory, Univ. of Toronto, 5 King' s College Rd., Toronto, Ont. M5S 3G8 (Canada)

    2006-07-01

    Appropriate reliance on system automation is imperative for safe and productive work, especially in safety-critical systems. It is unsafe to rely on automation beyond its designed use; conversely, it can be both unproductive and unsafe to manually perform tasks that are better relegated to automated tools. Operator trust in automated tools mediates reliance, and trust appears to affect how operators use technology. As automated agents become more complex, the question of trust in automation is increasingly important. In order to achieve proper use of automation, we must engender an appropriate degree of trust that is sensitive to changes in operating functions and context. In this paper, we present research concerning trust in automation in the domain of automated tools for relational databases. Lee and See have provided models of trust in automation. One model developed by Lee and See identifies three key categories of information about the automation that lie along a continuum of attributional abstraction. Purpose-, process-and performance-related information serve, both individually and through inferences between them, to describe automation in such a way as to engender r properly-calibrated trust. Thus, one can look at information from different levels of attributional abstraction as a general requirements analysis for information key to appropriate trust in automation. The model of information necessary to engender appropriate trust in automation [1] is a general one. Although it describes categories of information, it does not provide insight on how to determine the specific information elements required for a given automated tool. We have applied the Abstraction Hierarchy (AH) to this problem in the domain of relational databases. The AH serves as a formal description of the automation at several levels of abstraction, ranging from a very abstract purpose-oriented description to a more concrete description of the resources involved in the automated process

  12. Toward designing for trust in database automation

    International Nuclear Information System (INIS)

    Duez, P. P.; Jamieson, G. A.

    2006-01-01

    Appropriate reliance on system automation is imperative for safe and productive work, especially in safety-critical systems. It is unsafe to rely on automation beyond its designed use; conversely, it can be both unproductive and unsafe to manually perform tasks that are better relegated to automated tools. Operator trust in automated tools mediates reliance, and trust appears to affect how operators use technology. As automated agents become more complex, the question of trust in automation is increasingly important. In order to achieve proper use of automation, we must engender an appropriate degree of trust that is sensitive to changes in operating functions and context. In this paper, we present research concerning trust in automation in the domain of automated tools for relational databases. Lee and See have provided models of trust in automation. One model developed by Lee and See identifies three key categories of information about the automation that lie along a continuum of attributional abstraction. Purpose-, process-and performance-related information serve, both individually and through inferences between them, to describe automation in such a way as to engender r properly-calibrated trust. Thus, one can look at information from different levels of attributional abstraction as a general requirements analysis for information key to appropriate trust in automation. The model of information necessary to engender appropriate trust in automation [1] is a general one. Although it describes categories of information, it does not provide insight on how to determine the specific information elements required for a given automated tool. We have applied the Abstraction Hierarchy (AH) to this problem in the domain of relational databases. The AH serves as a formal description of the automation at several levels of abstraction, ranging from a very abstract purpose-oriented description to a more concrete description of the resources involved in the automated process

  13. Snow and ice blocking of tunnels

    Energy Technology Data Exchange (ETDEWEB)

    Lia, Leif

    1998-12-31

    Hydroelectric power development in cold regions causes much concern about operational reliability and dam safety. This thesis studies the temperature distribution in tunnels by means of air temperature measurements in six tunnel spillways and five diversion tunnels. The measurements lasted for two consecutive winters. The air through flow tunnel is used as it causes cooling of both rock and water. In open spillway tunnels, frost reaches the entire tunnel. In spillway tunnels with walls, the frost zones reach about 100 m from the downstream end. In mildly-inclined diversion tunnels, a frost free zone is located in the middle of the tunnel and snow and ice problems were only observed in the inlet and outlet. Severe aufeis is accumulation is observed in the frost zones. The heat transfer from rock to air, water and ice is calculated and used in a prediction model for the calculation of aufeis build-up together with local field observation data. The water penetration of snow plugs is also calculated, based on the heat balance. It takes 20 to 50 days for water to enter the blocked tunnel. The empirical values are 30 to 60 days, but only 1 day if the temperature of the snow pack is 0{sup o}C. Sensitivity analyses are carried out for temperature variations in rock, snow, water and ice. Systematic field observation shows that it is important for hydropower companies to know about the effects of snow and ice blocking in an area. A risk analysis of dam safety is presented for a real case. Finally, the thesis proposes solutions which can reduce the snow and ice problems. 79 refs., 63 figs., 11 tabs.

  14. Investigation of Corner Effect and Identification of Tunneling Regimes in L-Shaped Tunnel Field-Effect-Transistor.

    Science.gov (United States)

    Najam, Faraz; Yu, Yun Seop

    2018-09-01

    Corner-effect existing in L-shaped tunnel field-effect-transistor (LTFET) was investigated using numerical simulations and band diagram analysis. It was found that the corner-effect is caused by the convergence of electric field in the sharp source corner present in an LTFET, thereby increasing the electric field in the sharp source corner region. It was found that in the corner-effect region tunneling starts early, as a function of applied bias, as compared to the rest of the channel not affected by corner-effect. Further, different tunneling regimes as a function of applied bias were identified in the LTFET including source to channel and channel to channel tunneling regimes. Presence of different tunneling regimes in LTFET was analytically justified with a set of equations developed to model source to channel, and channel to channel tunneling currents. Drain-current-gate-voltage (Ids-Vgs) characteristics obtained from the equations is in reasonable qualitative agreement with numerical simulation.

  15. Scanning Tunneling Optical Resonance Microscopy

    Science.gov (United States)

    Bailey, Sheila; Wilt, Dave; Raffaelle, Ryne; Gennett, Tom; Tin, Padetha; Lau, Janice; Castro, Stephanie; Jenkins, Philip; Scheiman, Dave

    2003-01-01

    Scanning tunneling optical resonance microscopy (STORM) is a method, now undergoing development, for measuring optoelectronic properties of materials and devices on the nanoscale by means of a combination of (1) traditional scanning tunneling microscopy (STM) with (2) tunable laser spectroscopy. In STORM, an STM tip probing a semiconductor is illuminated with modulated light at a wavelength in the visible-to-near-infrared range and the resulting photoenhancement of the tunneling current is measured as a function of the illuminating wavelength. The photoenhancement of tunneling current occurs when the laser photon energy is sufficient to excite charge carriers into the conduction band of the semiconductor. Figure 1 schematically depicts a proposed STORM apparatus. The light for illuminating the semiconductor specimen at the STM would be generated by a ring laser that would be tunable across the wavelength range of interest. The laser beam would be chopped by an achromatic liquid-crystal modulator. A polarization-maintaining optical fiber would couple the light to the tip/sample junction of a commercial STM. An STM can be operated in one of two modes: constant height or constant current. A STORM apparatus would be operated in the constant-current mode, in which the height of the tip relative to the specimen would be varied in order to keep the tunneling current constant. In this mode, a feedback control circuit adjusts the voltage applied to a piezoelectric actuator in the STM that adjusts the height of the STM tip to keep the tunneling current constant. The exponential relationship between the tunneling current and tip-to-sample distance makes it relatively easy to implement this mode of operation. The choice of method by which the photoenhanced portion of the tunneling current would be measured depends on choice of the frequency at which the input illumination would be modulated (chopped). If the frequency of modulation were low enough (typically tunneling current

  16. Fiber coupled ultrafast scanning tunneling microscope

    DEFF Research Database (Denmark)

    Keil, Ulrich Dieter Felix; Jensen, Jacob Riis; Hvam, Jørn Märcher

    1997-01-01

    We report on a scanning tunneling microscope with a photoconductive gate in the tunneling current circuit. The tunneling tip is attached to a coplanar transmission line with an integrated photoconductive switch. The switch is illuminated through a fiber which is rigidly attached to the switch...... waveguide. The measurements show that the probe works as a transient voltage detector in contact and a capacitively coupled transient field detector in tunneling mode. We do not measure the transient voltage change in the ohmic tunneling current. In this sense, the spatial resolution for propagating...... substrate. By using a firmly attached fiber we achieve an excellent reproducibility and unconstrained positioning of the tip. We observe a transient signal with 2.9 ps pulse width in tunneling mode and 5 ps in contact mode. The instrument is applied to investigating the mode structure on a coplanar...

  17. Playing Attack and Defense with Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe; Bouganim, Luc

    2014-01-01

    It is often convenient to assume in a data management platform that one or several computing devices are trusted, specially when the goal is to provide privacy guarantees over personal data. But what does it take for a computing device to be trusted? More specifically, how can a personal device...... provide trusted storage? This is the question we tackle in this demonstration. We describe how secure devices, equipped with a trusted execution environment, differ from general purpose devices. We illustrate with our demonstration scenario, that it is much more difficult to attack a storage service...... running on a secure device, than to attack the same service running on a general purpose device....

  18. Experimental Evidence for Quantum Tunneling Time

    Science.gov (United States)

    Camus, Nicolas; Yakaboylu, Enderalp; Fechner, Lutz; Klaiber, Michael; Laux, Martin; Mi, Yonghao; Hatsagortsyan, Karen Z.; Pfeifer, Thomas; Keitel, Christoph H.; Moshammer, Robert

    2017-07-01

    The first hundred attoseconds of the electron dynamics during strong field tunneling ionization are investigated. We quantify theoretically how the electron's classical trajectories in the continuum emerge from the tunneling process and test the results with those achieved in parallel from attoclock measurements. An especially high sensitivity on the tunneling barrier is accomplished here by comparing the momentum distributions of two atomic species of slightly deviating atomic potentials (argon and krypton) being ionized under absolutely identical conditions with near-infrared laser pulses (1300 nm). The agreement between experiment and theory provides clear evidence for a nonzero tunneling time delay and a nonvanishing longitudinal momentum of the electron at the "tunnel exit."

  19. Bounded prospection in dilemmas of trust and reciprocity

    NARCIS (Netherlands)

    Evans, A.M.; Krueger, J.I.

    2016-01-01

    Knowing when to trust others is an important social skill, but recent findings suggest that humans struggle with this dilemma—trusting strangers more than they should. Although trust decisions often do not meet the standards of rationality, they appear to be boundedly rational. We present a model of

  20. Hugo Grotius on Trust, Its Causes and Effects

    NARCIS (Netherlands)

    H.W. Blom (Hans)

    2017-01-01

    markdownabstractIntroduction Trust is most present when it goes unnoticed. He who is wary that relevant others take his own interest into account when they (inter)act is distrustful, a situation that calls for trust restoring actions. In a fundamental sense, trust is the absence of distrust. He