WorldWideScience

Sample records for subenergy tunneling trust

  1. "Doing Trust".

    Science.gov (United States)

    Guillemin, Marilys; Gillam, Lynn; Barnard, Emma; Stewart, Paul; Walker, Hannah; Rosenthal, Doreen

    2016-10-01

    Trust in research is important but not well understood. We examine the ways that researchers understand and practice trust in research. Using a qualitative research design, we interviewed 19 researchers, including eight researchers involved in Australian Indigenous research. The project design focused on sensitive research including research involving vulnerable participants and sensitive research topics. Thematic analysis was used to analyze the data. We found that researchers' understanding of trust integrates both the conceptual and concrete; researchers understand trust in terms of how it relates to other similar concepts and how they practice trust in research. This provides a sound basis to better understand trust in research, as well as identifying mechanisms to regain trust when it is lost in research.

  2. Academy Trust

    Indian Academy of Sciences (India)

    The Academy Trust (tAcT) was set up in August 2014 as a non-governmental entity under the auspices of the Indian Academy of Sciences (IASc), Bengaluru. Working closely with some of the most distinguished scientific minds in the country through the Fellowship of the IASc, the Trust hopes to bring about a tangible ...

  3. Can we trust robots?

    NARCIS (Netherlands)

    Coeckelbergh, Mark

    2011-01-01

    Can we trust robots? Responding to the literature on trust and e-trust, this paper asks if the question of trust is applicable to robots, discusses different approaches to trust, and analyses some preconditions for trust. In the course of the paper a phenomenological-social approach to trust is

  4. Trust matters

    DEFF Research Database (Denmark)

    Østergaard, Lise Rosendal

    2015-01-01

    This article makes a contribution to the debate about health service utilisation and the role of trust in fostering demand for health services in sub-Saharan Africa. It is framed as a narrative literature review based on a thematic analysis of nine empirical, qualitative studies. For the purposes...... and institutional situations. The findings of the review point to four elements that are important for trust to develop in health sector relationships: the sensitive use of discretionary power by health workers, perceived empathy by patients of the health workers, the quality of medical care and workplace......-workers and managers, will improve health sector collaboration and stimulate demand for health care services....

  5. Personal trust increases cooperation beyond general trust

    National Research Council Canada - National Science Library

    Acedo-Carmona, Cristina; Gomila, Antoni

    2014-01-01

    ..., according to whether or not players personally trust each other. The design thus goes beyond standard approaches to the role of trust in fostering cooperation, which is restricted to general trust...

  6. Short tunnels.

    NARCIS (Netherlands)

    Schreuder, D.A.

    1965-01-01

    Before dealing with the question of lighting short tunnels, it is necessary define what is meant by a tunnel and when it should be called 'short'. Confined to motorized road traffic the following is the most apt definition of a tunnel: every form of roofing-over a road section, irrespective of it

  7. Trusted Domain

    DEFF Research Database (Denmark)

    Hjorth, Theis Solberg; Torbensen, Rune

    2012-01-01

    In the digital age of home automation and with the proliferation of mobile Internet access, the intelligent home and its devices should be accessible at any time from anywhere. There are many challenges such as security, privacy, ease of configuration, incompatible legacy devices, a wealth...... of wireless standards, limited resources of embedded systems, etc. Taking these challenges into account, we present a Trusted Domain home automation platform, which dynamically and securely connects heterogeneous networks of Short-Range Wireless devices via simple non-expert user. interactions, and allows...... remote access via IP-based devices such as smartphones. The Trusted Domain platform fits existing legacy technologies by managing their interoperability and access controls, and it seeks to avoid the security issues of relying on third-party servers outside the home. It is a distributed system...

  8. Trusted Objects

    Energy Technology Data Exchange (ETDEWEB)

    CAMPBELL,PHILIP L.; PIERSON,LYNDON G.; WITZKE,EDWARD L.

    1999-10-27

    In the world of computers a trusted object is a collection of possibly-sensitive data and programs that can be allowed to reside and execute on a computer, even on an adversary's machine. Beyond the scope of one computer we believe that network-based agents in high-consequence and highly reliable applications will depend on this approach, and that the basis for such objects is what we call ''faithful execution.''

  9. Trusting the state, trusting each other?

    DEFF Research Database (Denmark)

    Sønderskov, Kim Mannemar; Dinesen, Peter Thisted

    2016-01-01

    reflects reverse causality (social trust forming institutional trust), or both forms of trust reflecting deep-seated dispositions (common confounding). Against the backdrop of the shortcomings of previous cross-sectional analyses, this paper utilizes two Danish panel surveys containing measures of both......Trust in state institutions is a prominent explanation of social trust. However, previous—mainly cross-sectional—analyses provide limited causal evidence regarding the relationship between institutional trust and social trust and it is thus essentially unknown whether an observed relationship...... types of trust for the same individuals surveyed at multiple points in time over a long time-span (up to 18 years) to address the potentially reverse and/or spurious relationship. Using individual fixed effects and cross-lagged panel models, the results provide strong evidence of trust in state...

  10. Trust in Scientific Publishing

    NARCIS (Netherlands)

    Hummels, Harry; Roosendaal, Hans E.

    2001-01-01

    Trust is an important phenomenon to reduce organisational complexity and uncertainty. In the literature many types of trust are distinguished. An important framework to understand the variety and development of trust in organisations is provided by Zucker. She distinguishes three types of trust:

  11. The Academy Trust

    Indian Academy of Sciences (India)

    user

    The Academy Trust. Agenda. Date: 3rd November 2016. Time: 0900 hrs. Venue: Visitors' Hostel – Auditorium, IISER Bhopal. 0900 – 0930 hrs Welcome and Introduction to the Academy Trust (Chair Academy. Trust or Trustee). Remarks by Director, IISER, Bhopal. Remarks by: Eklavya Trust. 0930 – 1015 hrs Talk by Prof.

  12. Trust and Leadership

    DEFF Research Database (Denmark)

    Bordum, Anders

    2005-01-01

    The concept and phenomenon of trust and its relation to leadership has recently come into focus. What role does trust play? Can trust be created strategically? Questions like these are often raised. How we conceive of and conceptualize trust is not as often discussed. Among those conceptualizations...... flexibility of form for example, the idea that one with leadership tools can consciously bring forth trust. In the conclusion, the question about trust communication is addressed. In this section I argue that trust is positively value-laden, becausesincerity is a functional and pragmatic condition...

  13. Trusting the State, Trusting Each Other? The Effect of Institutional Trust on Social Trust

    DEFF Research Database (Denmark)

    Sønderskov, Kim Mannemar; Dinesen, Peter Thisted

    2016-01-01

    Trust in state institutions is a prominent explanation of social trust. However, previous—mainly cross-sectional—analyses provide limited causal evidence regarding the relationship between institutional trust and social trust and it is thus essentially unknown whether an observed relationship...... reflects reverse causality (social trust forming institutional trust), or both forms of trust reflecting deep-seated dispositions (common confounding). Against the backdrop of the shortcomings of previous cross-sectional analyses, this paper utilizes two Danish panel surveys containing measures of both...... types of trust for the same individuals surveyed at multiple points in time over a long time-span (up to 18 years) to address the potentially reverse and/or spurious relationship. Using individual fixed effects and cross-lagged panel models, the results provide strong evidence of trust in state...

  14. Calculativeness and trust

    DEFF Research Database (Denmark)

    Frederiksen, Morten

    2014-01-01

    Williamson’s characterisation of calculativeness as inimical to trust contradicts most sociological trust research. However, a similar argument is found within trust phenomenology. This paper re-investigates Williamson’s argument from the perspective of Løgstrup’s phenomenological theory of trust....... Contrary to Williamson, however, Løgstrup’s contention is that trust, not calculativeness, is the default attitude and only when suspicion is awoken does trust falter. The paper argues that while Williamson’s distinction between calculativeness and trust is supported by phenomenology, the analysis needs...... to take actual subjective experience into consideration. It points out that, first, Løgstrup places trust alongside calculativeness as a different mode of engaging in social interaction, rather conceiving of trust as a state or the outcome of a decision-making process. Secondly, the analysis must take...

  15. Trust in motives, trust in competence

    Directory of Open Access Journals (Sweden)

    Matt Twyman

    2008-01-01

    Full Text Available According to Siegrist, Earle and Gutscher's (2003 model of risk communication, the effect of advice about risk on an agent's behavior depends on the agent's trust in the competence of the advisor and on their trust in the motives of the advisor. Trust in competence depends on how good the advice received from the source has been in the past. Trust in motives depends on how similar the agent assesses the advisor's values to be to their own. We show that past quality of advice and degree of similarity between advisors' and judges' values have separate (non-interacting effects on two types of agent behavior: the degree of trust expressed in a source (stated trust and the weight given to the source's advice (revealed trust. These findings support Siegrist et al.'s model. We also found that revealed trust was affected more than stated trust by differences in advisor quality. It is not clear how this finding should be accommodated within Siegrist et al.'s (2003 model.

  16. Looking for Trust

    DEFF Research Database (Denmark)

    Bøge, Ask Risom; Lauritsen, Peter

    Trust and surveillance are often seen as opposites. Trust is regularly characterized as the glue that holds society together, while surveillance is seen as corrosive. However, in Scandinavia high levels of trust and surveillance coexist. It is therefore interesting to investigate if there is a co......Trust and surveillance are often seen as opposites. Trust is regularly characterized as the glue that holds society together, while surveillance is seen as corrosive. However, in Scandinavia high levels of trust and surveillance coexist. It is therefore interesting to investigate...

  17. Reliable Design Versus Trust

    Science.gov (United States)

    Berg, Melanie; LaBel, Kenneth A.

    2016-01-01

    This presentation focuses on reliability and trust for the users portion of the FPGA design flow. It is assumed that the manufacturer prior to hand-off to the user tests FPGA internal components. The objective is to present the challenges of creating reliable and trusted designs. The following will be addressed: What makes a design vulnerable to functional flaws (reliability) or attackers (trust)? What are the challenges for verifying a reliable design versus a trusted design?

  18. The productivity of trust

    DEFF Research Database (Denmark)

    Bjørnskov, Christian; Méon, Pierre-Guillaume

    This paper returns to one of the early questions of the literature on social trust, whether trust affects total factor productivity (TFP). Using both development and growth accounting, we find strong evidence of a causal effect of trust on the level and growth of TFP. Using a three-stage least...

  19. Balancing Trust and Control

    DEFF Research Database (Denmark)

    Jagd, Søren

    This paper focuses on the leadership challenge of balancing trust and control. The relation between trust and control has for a long time been a puzzling issue for management researchers. In the paper I first show that there has been a dramatic change in the way the relation between trust and con...

  20. Trust and innovation

    NARCIS (Netherlands)

    Nooteboom, B.; Bachmann, R.; Zaheer, A.

    2013-01-01

    In innovation, trust is especially needed as well as especially problematic. One needs trust under uncertainty and in innovation uncertainty is high. If one were certain about conditions, conduct and outcomes one would no longer talk about trust. This is related to a paradox of information

  1. Trust Management V

    DEFF Research Database (Denmark)

    2011-01-01

    from 42 submissions. The papers feature both theoretical research and real-world case studies from academia, business and government focusing on areas such as: trust models, social and behavioral aspects of trust, trust in networks, mobile systems and cloud computation, privacy, reputation systems...

  2. Trust and Credit

    DEFF Research Database (Denmark)

    Harste, Gorm

    The present paper is an answer to the question, how did trust and credit emerge. The systems of trust and credit reduce the environmental and contextual complexities in which trust and credit are embedded. The paper analyses the forms of this reduction in a number of stages in the evolution...

  3. Impact Through Trust

    DEFF Research Database (Denmark)

    Mayoral, Juan A.

    trust between judges as a new mechanism for enhancing the cooperation and compliance by national courts with the CJEU jurisprudence and EU legal mandates. The chapter describes the conditions under which national judges trust the CJEU to identify how the Court can promote trust in its role as a supreme...

  4. Trust Drives Internet Use

    DEFF Research Database (Denmark)

    Ljunge, Jan Martin

    This paper estimates the effect of trust on internet use by studying the general population as well as second generation immigrants in 29 European countries with ancestry in 87 nations. There is a significant positive effect of trust on internet use. The positive trust effect is not universal...

  5. The Dimensionality of Trust

    Science.gov (United States)

    2005-06-30

    REMPEL , J.K. (1989). Trust in close relationships . In C. Hendrick (Ed.). Close Relationships . Newbury Park...conduct behaviour research? Journal of Marketing Research, 33, 1-8. REMPEL , J., HOLMES, J., & ZANNA, M. (1985). Trust in Close Relationships ... closeness but was less in close relationships . Moreover, in relationships with more than two parties, having a third party amplified both trust

  6. Social Trust and Fractionalization:

    DEFF Research Database (Denmark)

    Bjørnskov, Christian

    2008-01-01

    This paper takes a closer look at the importance of fractionalization for the creation of social trust. It first argues that the determinants of trust can be divided into two categories: those affecting individuals' trust radii and those affecting social polarization. A series of estimates using...... a much larger country sample than in previous literature confirms that fractionalization in the form of income inequality and political diversity adversely affects social trust while ethnic diversity does not. However, these effects differ systematically across countries, questioning standard...... interpretations of the influence of fractionalization on trust....

  7. Dimensions of trust

    DEFF Research Database (Denmark)

    Frederiksen, Morten

    2012-01-01

    limited sets of exchange or work relations. This article revisits Simmel’s concept of trust as social form in order to investigate this differentiation. From an interview study, the differentiation and limits of trust are analysed within different types of social relations. Trust is found to vary greatly...... in scope and mode influenced by the intersecting dimensions of relations, objects and situations. Furthermore, trust exists between an outer threshold of expected deceit and an inner threshold of confident reliance. The findings from the qualitative study contribute new knowledge on the diversity of trust...

  8. Trust Management: Literature Review

    Directory of Open Access Journals (Sweden)

    Joanna Olga Paliszkiewicz

    2011-12-01

    Full Text Available The concept of trust has become popular in public debate andacademic analysis. In high income countries this interest is associatedwith concern for the decline of trust in governments andprofessionals, and in developing countries has been promptedby debates around the motion of social capital. Trust has beenidentified as a major factor influencing such things as capital investment,relationship marketing, cross-cultural communication,learning and various types of cooperation. Trust management isbecoming also very important inside the organization. The studywill review empirical research on organizational trust. The purposeof the study will be also evaluation of the advancements andsetbacks in current empirical research in terms of managementorganizational trust. This paper will analyze the theoretical approach,the conceptualization and the measurement issues coveredin studies on management organizational trust. Althoughtrust has emerged as an important factor in organizational relationships,there are still major conceptual and methodologicalchallenges to be met when studying this complex concept.

  9. Personal Trust Increases Cooperation beyond General Trust

    Science.gov (United States)

    Acedo-Carmona, Cristina; Gomila, Antoni

    2014-01-01

    In this paper we present a new methodology which, while allowing for anonymous interaction, it also makes possible to compare decisions of cooperating or defecting when playing games within a group, according to whether or not players personally trust each other. The design thus goes beyond standard approaches to the role of trust in fostering cooperation, which is restricted to general trust. It also allows considering the role of the topology of the social network involved may play in the level of cooperation found. The results of this work support the idea that personal trust promotes cooperation beyond the level of general trust. We also found that this effect carries over to the whole group, making it more cohesive, but that higher levels of cohesion rely on a particular topology. As a conclusion, we hypothesize that personal trust is a psychological mechanism evolved to make human social life possible in the small groups our ancestors lived in, and that this mechanism persists and plays a role in sustaining cooperation and social cohesion. PMID:25144539

  10. Trust in Strategic Alliances

    DEFF Research Database (Denmark)

    Nielsen, Bo

    2011-01-01

    This article examines the dynamic and multi-dimensional nature of trust in strategic alliances. Adopting a co-evolutionary approach, I developed a framework to show how trust, conceptualised in different forms, plays distinct roles at various evolutionary stages of the alliance relationship....... Emphasising the multi-dimensional and dynamic role of trust, the framework illustrates how initial levels of a particular type of trust may co-evolve with the alliance and influence subsequent phases of the relationship – either on its own or in combination with other types or dimensions of trust....... The theoretical distinction between trust as antecedent, moderator and outcome during the evolution of the alliance relationship leads to research questions that may guide future empirical research....

  11. Neither Trust nor Distrust

    DEFF Research Database (Denmark)

    Jensen, Tina Gudrun

    2016-01-01

    This article deals with the politicised notions of trust and social cohesion in urban spaces through a focus on practices of everyday relations in a mixed neighbourhood. Quantitative studies maintain that ethnically diverse neighbourhoods lack in trust and solidarity. However, the very meaning...... and effect of concepts such as `diversity`, `contact` and `trust´ are often unclear. This article challenges both the politicised assumptions and methodological basis for statements on trust as a condition for coexistence. Drawing on fieldwork in a multi-ethnic social housing estate in Copenhagen......, this article explores residents´ understandings of diversity, contact and trust. The article argues that trust and strong ties may not be the prerequisite for coexistence in neighbourhoods, where the micro-politics of everyday contacts predominate....

  12. Terrorism, Trust and Tourism

    DEFF Research Database (Denmark)

    Jensen, Susanne; Svendsen, Gert Tinggaard

    2017-01-01

    How does terrorism affect social trust and tourism? The rising number of terrorist attacks in Western Europe has caused safety problems not only for local citizens but also for tourists. In fact, terrorists challenge the formal violence monopoly of the state thus creating a sense of anarchy...... and distrust. Social trust is about trusting strangers, so when less predictable behaviour occurs in, a given country, people become more careful as they tend to trust most other people less. An interesting case for future research is Scandinavia as the level of terrorism is still low and, at the same time......, Scandinavia can record most social trust in the world meaning a competitive advantage when attracting tourists. Arguably, a double dividend is created from fighting terrorism, namely more social trust accumulated and more tourists attracted. Future research should therefore try to further test our model...

  13. The geography of trust.

    Science.gov (United States)

    Joni, Saj-nicole A

    2004-03-01

    Leaders who rely forever on the same internal advisers, entrusting them with issues of ever greater sensitivity and consequence, run the risk of being sold short and possibly betrayed. Alternatively, lone-wolf leaders who trust no one may make enormous, yet preventable, mistakes when trying to sort through difficult decisions. A sophisticated understanding of trust can protect leaders from both fates. During the past decade, author and consultant Saj-nicole Joni studied leadership in more than 150 European and North American companies. Her research reveals three fundamental types of trustpersonal trust, expertise trust, and structural trust. Executives may persevere in relationships that are based on personal trust, no matter how exalted their leadership roles become. But such relationships are unlikely to remain static. They also probably won't provide the kinds of deep, often specialized knowledge leaders need. In circumstances where advisers' competence matters as much as their character, expertise trust--reliance on an adviser's ability in a specific subject--enters the picture. In organizations, leaders develop expertise trust by working closely with people who consistently demonstrate their mastery of particular subjects or processes. Structural trust refers to how roles and ambitions influence advisers' perspectives and candor. It shifts constantly as people rise through organizations. High-level structural trust can provide leaders with pure insight and information--but advisers in positions of the highest structural trust generally reside outside organizations. These advisers provide leaders with insights that their organizations cannot. High-performing leaders' most enduring--and most valuable--relationships are characterized by enormous levels of all three kinds of trust.

  14. Trust and Influence

    Science.gov (United States)

    2012-03-05

    strikes, messaging, developmental activities) •Understanding the cognitive mechanisms that drive influence effects – identify the avenues of influence...competencies – trust building AF Tech Horizon‟s 2010 “In the near to mid-term, developing methods for establishing „certifiable trust in...Stokes – Dynamic Trust Model PI: Charlene Stokes (AFRL) Lab Task Drs. Lin ( Sunway U) and Chen (NICTA) Objective: Examine contextual factors

  15. Trust repertoires for collaboration

    DEFF Research Database (Denmark)

    Fuglsang, Lars

    This case study analyses the role of trust in a public private innovation network that involved a private consultancy company as a facilitator. We know that collaboration is a important for innovation, and that collaboration across organizational boundaries is not a trivial issue. But we know very...... little about how such processes develop and how trust, understood as “confident positive expectations” (Lewicki et al. 1998) to collaborative activities, arises out of collaboration. The paper contributes by showing how trust and collaboration are intertwined. The main finding is that a facilitator can...... mediate trust in such a context by drawing on cultural repertoires of justification...

  16. In regulation we trust.

    Science.gov (United States)

    Wiig, Siri; Tharaldsen, Jorunn Elise

    2012-01-01

    The role of trust has been argued to play an increasingly important role in modern, complex, and ambivalent risk societies. Trust within organizational research is anticipated to have a general strategic impact on aspects such as organizational performance, communication and knowledge exchange, and learning from accidents. Trust is also an important aspect related to regulation of risk. Diverse regulatory regimes, their contexts and risks influence regulators use of trust and distrust in regulatory practice. The aim of this paper is to discuss the relationship between risk regulation and trust across diverse risk regulation regimes. By drawing from studies of risk regulation, risk perception, and trust the purpose is to discuss how regulation and trust are linked and used in practice to control risk across system levels in socio-technical systems in high risk industries. This paper provides new knowledge on 1) how functional and dysfunctional trust and distrust are grounded in the empirical realities of high risk industries, 2) how different perspectives on trust and distrust act together and bring new knowledge on how society control risk.

  17. The Determinants of Trust

    DEFF Research Database (Denmark)

    Bjørnskov, Christian

    general, do you think that most people can be trusted?”, the by now quite substantial literature has found that social trust is associated with a set of different macroeconomic outcomes: economic growth, the rule of law and overall quality of governance, corruption, education, the extent of violent crime...... that the empirical associations between social trust and e.g. education or rule of law reflect the reverse causal direction, i.e. that trust has caused part of the cross-country differences in these factors. The aim of this paper is to assess the impact of a number of the central factors proposed in the literature...

  18. Carpal Tunnel Syndrome

    Science.gov (United States)

    ... a passing cramp? It could be carpal tunnel syndrome. The carpal tunnel is a narrow passageway of ... three times more likely to have carpal tunnel syndrome than men. Early diagnosis and treatment are important ...

  19. Trust Discovery in Online Communities

    Science.gov (United States)

    Piorkowski, John

    2014-01-01

    This research aims to discover interpersonal trust in online communities. Two novel trust models are built to explain interpersonal trust in online communities drawing theories and models from multiple relevant areas, including organizational trust models, trust in virtual settings, speech act theory, identity theory, and common bond theory. In…

  20. The trust formula: Trust = fairness + leadership

    Energy Technology Data Exchange (ETDEWEB)

    Lovenheim, R. [Regulatory and Legislative Consultants, Inc., Rochester, NY (United States)

    1995-11-01

    Many state and compact LLW siting processes have been characterized by slippage and failure. The paper focuses on two major {open_quotes}lessons learned{close_quotes} regarding public interaction and trust, and how these lessons are being applied to current siting efforts. The relationship of environmental idealism and trust will be explored further in this paper. Supreme Court Justice Stephen Breyer concludes his 1994 book, Breaking the Vicious Circle by stating: {open_quotes}Finally, this book also reflects a belief that trust in institutions arises not simply as a result of openness in government, responses to local interest groups, or priorities emphasized in the press -- though these attitudes and actions play an important role -- but also from those institutions doing a difficult job well.{close_quotes}

  1. Balancing Trust and Control

    DEFF Research Database (Denmark)

    Jagd, Søren

    2010-01-01

    The purpose of this paper is to show that conceptualizing trust and control as interactively related processes, as opposed to more static conceptualizations of the two concepts and the relations between them, adds importantly towards understanding the challenges involved in balancing of trust and...

  2. Does trust pay off?

    NARCIS (Netherlands)

    R. de Bliek (Ruben)

    2012-01-01

    textabstractIt is believed that a society's level of trust in strangers, also known as generalized or interpersonal trust, is an accurate reflection of the quality of civil society and of the success of its accompanying economy. Two unresolved issues remain. The first issue concerns the

  3. National Education Trust Fund

    Science.gov (United States)

    Shapp, Milton J.

    1975-01-01

    A proposal from the governor of Pennsylvania for financing all levels of education through a National Education Trust Fund (NETF) that would operate as the present Federal Highway Trust Fund does on a revolving, self-liquidating basis with the cost of an individual's education repaid through a progressive education tax on income. (JT)

  4. Dimensionality of Organizational Trust

    Science.gov (United States)

    Adams, Samuel H.; Wiswell, Albert K.

    2007-01-01

    Trust facilitates individual and organizational learning, and is often misunderstood by organizations although they must continuously learn in order to attain organizational goals and survive. Leaders of organizations often view trust defensively and their reactions may impede organizational learning This paper builds on prior research concerning…

  5. On Representative Trust

    NARCIS (Netherlands)

    Bellemare, C.; Kroger, S.

    2003-01-01

    Because of its relation to economic growth, there is a policy interest in measuring social capital and average trust as its currently most important proxy.In this paper we measure societal trust and trustworthiness by combining the virtues of laboratory experiments and survey data and present

  6. Trust in agile teams

    DEFF Research Database (Denmark)

    Tjørnehøj, Gitte; Fransgård, Mette; Skalkam, Signe

    2012-01-01

    of the problems of DSD. However important incompatibilities between the challenges of DSD and the key tenets of agility exist and achieving a beneficially balanced agile practice in DSD can be difficult. Trust could be the key to this, since trust is crucial for the necessary corporate behavior that leads to team...... success. This article reports from a study of two agile DSD teams with very different organization and collaboration patterns. It addresses the role of trust and distrust in DSD by analyzing how the team members’ trust developed and erode through the lifetime of the two collaborations and how management...... actions influenced this. We see two important lessons from the analysis. First the agile practices of daily Scrum and self organizing team can empower DSD teams to manage their own development of trust and thereby alleviate the obstacles of DSD. Second if management fails to support the development...

  7. Trust and Wellbeing

    Directory of Open Access Journals (Sweden)

    John F. Helliwell

    2011-01-01

    Full Text Available

    This paper presents new evidence linking trust and subjective wellbeing, based primarily on data from the Gallup World Poll and cycle 17 of the Canadian General Social Survey (GSS17. Because several of the general explanations for subjective wellbeing examined here show large and significant linkages to both household income and various measures of trust, it is possible to estimate income-equivalent compensating differentials for different types of trust. Measures of trust studied include general social trust, trust in management, trust in co-workers, trust in neighbours, and trust in police. In addition, some Canadian surveys and the Gallup World Poll ask respondents to estimate the chances that a lost wallet would be returned to them if found by different individuals, including neighbours, police and strangers.

    Our results reveal strong linkages between several trust measures and subjective well-being, as well as strong linkages between social trust and two major global causes of death—suicides and traffic fatalities. This suggests the value of learning more about how trust can be built and maintained, or repaired where it has been damaged. We therefore use data from the Canadian GSS17 to analyze personal and neighbourhood characteristics, including education, migration history, and mobility, that help explain differences in trust

  8. Autonomy, Trust, and Respect.

    Science.gov (United States)

    Nys, Thomas

    2016-02-01

    This article seeks to explore and analyze the relationship between autonomy and trust, and to show how these findings could be relevant to medical ethics. First, I will argue that the way in which so-called "relational autonomy theories" tie the notions of autonomy and trust together is not entirely satisfying Then, I will introduce the so-called Encapsulated Interest Account as developed by Russell Hardin. This will bring out the importance of the reasons for trust. What good reasons do we have for trusting someone? I will criticize Hardin's business model as insufficiently robust, especially in the context of health care, and then turn to another source of trust, namely, love. It may seem that trust-through-love is much better suited for the vulnerability that is often involved in health care, but I will also show that it has its own deficiencies. Good health care should therefore pay attention to both models of trust, and I will offer some tentative remarks on how to do this. © The Author 2015. Published by Oxford University Press, on behalf of the Journal of Medicine and Philosophy Inc. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  9. Quantifying and Qualifying Trust: Spectral Decomposition of Trust Networks

    NARCIS (Netherlands)

    Pavlovic, Dusko

    In a previous FAST paper, I presented a quantitative model of the process of trust building, and showed that trust is accumulated like wealth: the rich get richer. This explained the pervasive phenomenon of adverse selection of trust certificates, as well as the fragility of trust networks in

  10. Trust vs. Crisis

    Directory of Open Access Journals (Sweden)

    Kirsten Mogensen

    2014-06-01

    Full Text Available The three social phenomena -- norms, trust, and crisis -- are in this paper combined into one model that illustrates their function and relationship. Crisis is seen as a reaction to serious violations of expectations that leave people disoriented, insecure about situational norms, and unable to judge whom to trust. One logical solution to a crisis is to rebuild a shared understanding of the norms involved in any given context. Banking is used as a case. Central concepts are borrowed from Niklas Luhmann Trust (1968, Alf Ross Directives and Norms (1967, and Arthur G. Neal National Trauma & Collective Memory (1998.

  11. Trust vs. Crisis

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    2014-01-01

    The three social phenomena -- norms, trust, and crisis -- are in this paper combined into one model that illustrates their function and relationship. Crisis is seen as a reaction to serious violations of expectations that leave people disoriented, insecure about situational norms, and unable...... to judge whom to trust. One logical solution to a crisis is to rebuild a shared understanding of the norms involved in any given context. Banking is used as a case. Central concepts are borrowed from Niklas Luhmann Trust (1968), Alf Ross Directives and Norms (1967), and Arthur G. Neal National Trauma...

  12. Competition Fosters Trust

    DEFF Research Database (Denmark)

    Huck, Steffen; Lünser, Gabriele; Tyran, Jean-Robert Karl

    2012-01-01

    We study the effects of reputation and competition in a trust game. If trustees are anonymous, outcomes are poor: trustees are not trustworthy, and trustors do not trust. If trustees are identifiable and can, hence, build a reputation, efficiency quadruples but is still at only a third of the first...... best. Adding more information by granting trustors access to all trustees' complete history has, somewhat surprisingly, no effect. On the other hand, we find that competition, coupled with some minimal information, eliminates the trust problem almost completely...

  13. Trusting Crowdsourced Geospatial Semantics

    Science.gov (United States)

    Goodhue, P.; McNair, H.; Reitsma, F.

    2015-08-01

    The degree of trust one can place in information is one of the foremost limitations of crowdsourced geospatial information. As with the development of web technologies, the increased prevalence of semantics associated with geospatial information has increased accessibility and functionality. Semantics also provides an opportunity to extend indicators of trust for crowdsourced geospatial information that have largely focused on spatio-temporal and social aspects of that information. Comparing a feature's intrinsic and extrinsic properties to associated ontologies provides a means of semantically assessing the trustworthiness of crowdsourced geospatial information. The application of this approach to unconstrained semantic submissions then allows for a detailed assessment of the trust of these features whilst maintaining the descriptive thoroughness this mode of information submission affords. The resulting trust rating then becomes an attribute of the feature, providing not only an indication as to the trustworthiness of a specific feature but is able to be aggregated across multiple features to illustrate the overall trustworthiness of a dataset.

  14. Trusts and Financialization

    DEFF Research Database (Denmark)

    Harrington, Brooke

    2017-01-01

    This article identifies trusts as a legal structure associated with the global spread of financialization. Although trusts originated in Medieval England, they have acquired a new significance in contemporary finance by virtue of their advantages in terms of 10 profit maximization and capital...... mobility. As a result, trusts have become common in contemporary structured finance for corporations, in addition to their traditional functions as estate planning and asset protection vehicles for high-net-worth individuals. This article specifies three ways in which the trust structure has facilitated...... the global spread of financialization: by privileging the rentier–investor within the 15 world economy; by perpetuating a distinctively Anglo-American approach to finance internationally; and by increasing the autonomy of finance vis-a-vis the nation-state. This study shares the primarily descriptive...

  15. Balancing trust and power

    DEFF Research Database (Denmark)

    Broholm-Jørgensen, Marie; Guassora, Ann Dorrit; Reventlow, Susanne

    2017-01-01

    OBJECTIVE: Little is known about how strategies of retaining patients are acted out by general practitioners (GPs) in the clinical encounter. With this study, we apply Grimens' (2009) analytical connection between trust and power to explore how trust and power appear in preventive health checks...... from the GPs' perspectives, and in what way trust and power affect and/or challenge strategies towards retaining patients without formal education. DESIGN: Data in this study were obtained through semi-structured interviews with GPs participating in an intervention project, as well as observations...... of clinical encounters. RESULTS: From the empirical data, we identified three dimensions of respect: respect for the patient's autonomy, respect for professional authority and respect as a mutual exchange. A balance of respect influenced trust in the relationship between GP and patients and the transfer...

  16. Balancing trust and power

    DEFF Research Database (Denmark)

    Broholm-Jørgensen, Marie; Guassora, Ann Dorrit; Reventlow, Susanne

    2017-01-01

    from the GPs' perspectives, and in what way trust and power affect and/or challenge strategies towards retaining patients without formal education. DESIGN: Data in this study were obtained through semi-structured interviews with GPs participating in an intervention project, as well as observations......OBJECTIVE: Little is known about how strategies of retaining patients are acted out by general practitioners (GPs) in the clinical encounter. With this study, we apply Grimens' (2009) analytical connection between trust and power to explore how trust and power appear in preventive health checks...... of power in the encounter. The GPs articulated that a balance was needed in preventive health checks in order to establish trust and thus retain the patient in the clinic. One way this balance of respect was carried out was with the use of humour. CONCLUSIONS: To retain patients without formal education...

  17. Education and Social Trust

    DEFF Research Database (Denmark)

    Oskarsson, Sven; Dinesen, Peter Thisted; Dawes, Christopher

    2017-01-01

    One of the clearest results in previous studies on social trust is the robust positive relationship with educational attainment. The most common interpretation is that education has a causal effect on social trust. The theoretical argument and empirical results in this article suggest a different...... interpretation. We argue that common preadult factors such as cognitive abilities and personality traits rooted in genes and early-life family environment may confound the relationship between educational attainment and social trust. We provide new evidence on this question by utilizing the quasi......-experiment of twinning. By looking at the relationship between education and social trust within monozygotic (MZ) twin pairs, we are able to avoid potential confounders rooted in genetic factors and common environmental influences because the monozygotic twins share both. The results suggest that when controlling...

  18. Building trust-business essentials

    Science.gov (United States)

    Sandy MacIver

    2008-01-01

    (Please note: This paper only contains the abstract.) Trust is particularly vital in the leadership of organizations. Trust is built by working through "joy, fear, and vulnerability," especially as it relates to trust in others and in teams. Key is learning to trust the right people in the right way in the right circumstances. In addition...

  19. Trust and Influence

    Science.gov (United States)

    2013-03-06

    Influence effects • Psychological /Behavioral Effects of Novel Weaponry BRI •Cognitive mechanisms for influence •Socio-digital Influence BRI...Officer AFOSR/RTC Air Force Research Laboratory Trust and Influence Date:6 MAR 2013 Report Documentation Page Form ApprovedOMB No. 0704-0188 Public...00-2013 4. TITLE AND SUBTITLE Trust and Influence 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT

  20. Foundation trusts. Power sharing.

    Science.gov (United States)

    Jobanputra, Renu; Buchan, James

    2003-05-01

    Foundation trusts will in theory have greater freedoms over pay, non-pay rewards and recruitment, although details are still unclear. Foundations are likely to differ in their use of these powers, partly because of desire and partly because of practical limits. Taking advantage of new powers for short-term gain, at the expense of other trusts, will have negative effects if not part of a wider development of HR practice.

  1. Computationally modeling interpersonal trust

    OpenAIRE

    Lee, Jin Joo; Knox, W. Bradley; Wormwood, Jolie B.; Breazeal, Cynthia; DeSteno, David

    2013-01-01

    We present a computational model capable of predicting—above human accuracy—the degree of trust a person has toward their novel partner by observing the trust-related nonverbal cues expressed in their social interaction. We summarize our prior work, in which we identify nonverbal cues that signal untrustworthy behavior and also demonstrate the human mind’s readiness to interpret those cues to assess the trustworthiness of a social robot. We demonstrate that domain knowledge gained from our pr...

  2. Trust and virtual worlds

    DEFF Research Database (Denmark)

    Ess, Charles; Thorseth, May

    2011-01-01

    We collect diverse philosophical analyses of the issues and problems clustering around trust online with specific attention to establishing trust in virtual environments. The book moves forward important discussions of how virtual worlds and virtuality are to be defined and understood; the role...... by virtuality, such as virtual child pornography. The introduction further develops a philosophical anthropology, rooted in Kantian ethics, phenomenology, virtue ethics, and feminist perspectives, that grounds a specific approach to ethical issues in virtual environments....

  3. Trusted Computing Technologies, Intel Trusted Execution Technology.

    Energy Technology Data Exchange (ETDEWEB)

    Guise, Max Joseph; Wendt, Jeremy Daniel

    2011-01-01

    We describe the current state-of-the-art in Trusted Computing Technologies - focusing mainly on Intel's Trusted Execution Technology (TXT). This document is based on existing documentation and tests of two existing TXT-based systems: Intel's Trusted Boot and Invisible Things Lab's Qubes OS. We describe what features are lacking in current implementations, describe what a mature system could provide, and present a list of developments to watch. Critical systems perform operation-critical computations on high importance data. In such systems, the inputs, computation steps, and outputs may be highly sensitive. Sensitive components must be protected from both unauthorized release, and unauthorized alteration: Unauthorized users should not access the sensitive input and sensitive output data, nor be able to alter them; the computation contains intermediate data with the same requirements, and executes algorithms that the unauthorized should not be able to know or alter. Due to various system requirements, such critical systems are frequently built from commercial hardware, employ commercial software, and require network access. These hardware, software, and network system components increase the risk that sensitive input data, computation, and output data may be compromised.

  4. The Process of Trust Development

    DEFF Research Database (Denmark)

    Jagd, Søren; Højland, Jeppe

    by high trust and co-operation? In this paper we explore the process of trust development during an organisational change project in a Danish SME by looking at two kinds of trust relations: employee trust in management and trust relations among employees. We find substantial differences in trust......Trust is critical for the quality of social interaction especially in organisations based on employee cooperation and empowerment. An important question is how organisations pass from a situation with low trust between management and employees and among employees to a situation characterised...... in management among employees. Trust is found to be higher among employees interacting regularly with managers, as in the project coordination group. It is found that personal relations are very important for the development of trust. The success of the project may be explained by the involvement of an ‘elite...

  5. Shedding Light on Trust

    Directory of Open Access Journals (Sweden)

    Lesley Gill

    2013-01-01

    Full Text Available New Zealand Human Resource Development practitioners interviewed in earlier research indicates that building “trust” is necessary if training efforts in the area of Emotional Intelligence are to be successful.  Yet, trust is often not defined clearly by those working in the field of HRD.  To establish a definition of trust that provides HRD practitioners with direction in the design of training programs, a large group conversation utilizing the “World Café” process was undertaken, after which EI training practitioners wrote reflections on the nature of trust.  Experienced EI Trainers tended to define trust in terms of the outcome produced in training, which was the readiness of participants to talk.  Defining trust in this way has the advantage of involving a low level of inference.  Trainers also identified actions within their control that could stimulate greater readiness amongst training participants about their experiences to trainers and other learners. The aim of the article is to provide a practice-based definition of trust that can inform HRD practitioners working in the field of Emotional Intelligence.

  6. Computationally modeling interpersonal trust

    Science.gov (United States)

    Lee, Jin Joo; Knox, W. Bradley; Wormwood, Jolie B.; Breazeal, Cynthia; DeSteno, David

    2013-01-01

    We present a computational model capable of predicting—above human accuracy—the degree of trust a person has toward their novel partner by observing the trust-related nonverbal cues expressed in their social interaction. We summarize our prior work, in which we identify nonverbal cues that signal untrustworthy behavior and also demonstrate the human mind's readiness to interpret those cues to assess the trustworthiness of a social robot. We demonstrate that domain knowledge gained from our prior work using human-subjects experiments, when incorporated into the feature engineering process, permits a computational model to outperform both human predictions and a baseline model built in naiveté of this domain knowledge. We then present the construction of hidden Markov models to investigate temporal relationships among the trust-related nonverbal cues. By interpreting the resulting learned structure, we observe that models built to emulate different levels of trust exhibit different sequences of nonverbal cues. From this observation, we derived sequence-based temporal features that further improve the accuracy of our computational model. Our multi-step research process presented in this paper combines the strength of experimental manipulation and machine learning to not only design a computational trust model but also to further our understanding of the dynamics of interpersonal trust. PMID:24363649

  7. Computationally Modeling Interpersonal Trust

    Directory of Open Access Journals (Sweden)

    Jin Joo eLee

    2013-12-01

    Full Text Available We present a computational model capable of predicting—above human accuracy—the degree of trust a person has toward their novel partner by observing the trust-related nonverbal cues expressed in their social interaction. We summarize our prior work, in which we identify nonverbal cues that signal untrustworthy behavior and also demonstrate the human mind’s readiness to interpret those cues to assess the trustworthiness of a social robot. We demonstrate that domain knowledge gained from our prior work using human-subjects experiments, when incorporated into the feature engineering process, permits a computational model to outperform both human predictions and a baseline model built in naivete' of this domain knowledge. We then present the construction of hidden Markov models to incorporate temporal relationships among the trust-related nonverbal cues. By interpreting the resulting learned structure, we observe that models built to emulate different levels of trust exhibit different sequences of nonverbal cues. From this observation, we derived sequence-based temporal features that further improve the accuracy of our computational model. Our multi-step research process presented in this paper combines the strength of experimental manipulation and machine learning to not only design a computational trust model but also to further our understanding of the dynamics of interpersonal trust.

  8. Trust Revision for Conflicting Sources

    Science.gov (United States)

    2017-02-01

    analyst wants to include the realistic possibility that there can be rain and sunshine simultaneously, then the domain would need to include a...tative and idempotent; but it is not associative. IV. TRUST DISCOUNTING The general idea behind trust discounting is to express degrees of trust in an...A:C X is revised. Trust revision consists of increasing distrust at the cost of trust and uncertainty. The idea is that sources found to be unreliable

  9. Impact of signals and experience on trust and trusting behavior.

    Science.gov (United States)

    Chen, Ying-Hueih; Chien, Shu-Hua; Wu, Jyh-Jeng; Tsai, Pei-Yin

    2010-10-01

    Trust is an essential factor that drives virtual interaction and transactions on the Internet. Researchers have investigated the trust development process, and identified several important factors that form the basis for trust. This research combines the signal perspective and trust theory to examine the impact of market signals and past experience on trust formation and trusting behavior. Three market signals, including brand image, Web-site investment, and privacy policies, are identified and empirically tested to determine their impact on consumer trust. Based on 322 active Web users, the quantitative results suggest that brand image, Web-site investment, privacy policies, and past experience all positively impact trust formation. Furthermore, trust shows a positive effect on Web-site stickiness. Both theoretical and practical implications of the results are also offered.

  10. A Model of Trusted Measurement Model

    OpenAIRE

    Ma Zhili; Wang Zhihao; Dai Liang; Zhu Xiaoqin

    2017-01-01

    A model of Trusted Measurement supporting behavior measurement based on trusted connection architecture (TCA) with three entities and three levels is proposed, and a frame to illustrate the model is given. The model synthesizes three trusted measurement dimensions including trusted identity, trusted status and trusted behavior, satisfies the essential requirements of trusted measurement, and unified the TCA with three entities and three levels.

  11. Trust Transitivity in Social Networks

    Science.gov (United States)

    Richters, Oliver; Peixoto, Tiago P.

    2011-01-01

    Non-centralized recommendation-based decision making is a central feature of several social and technological processes, such as market dynamics, peer-to-peer file-sharing and the web of trust of digital certification. We investigate the properties of trust propagation on networks, based on a simple metric of trust transitivity. We investigate analytically the percolation properties of trust transitivity in random networks with arbitrary in/out-degree distributions, and compare with numerical realizations. We find that the existence of a non-zero fraction of absolute trust (i.e. entirely confident trust) is a requirement for the viability of global trust propagation in large systems: The average pair-wise trust is marked by a discontinuous transition at a specific fraction of absolute trust, below which it vanishes. Furthermore, we perform an extensive analysis of the Pretty Good Privacy (PGP) web of trust, in view of the concepts introduced. We compare different scenarios of trust distribution: community- and authority-centered. We find that these scenarios lead to sharply different patterns of trust propagation, due to the segregation of authority hubs and densely-connected communities. While the authority-centered scenario is more efficient, and leads to higher average trust values, it favours weakly-connected “fringe” nodes, which are directly trusted by authorities. The community-centered scheme, on the other hand, favours nodes with intermediate in/out-degrees, in detriment of the authorities and its “fringe” peers. PMID:21483683

  12. Trust transitivity in social networks.

    Directory of Open Access Journals (Sweden)

    Oliver Richters

    Full Text Available Non-centralized recommendation-based decision making is a central feature of several social and technological processes, such as market dynamics, peer-to-peer file-sharing and the web of trust of digital certification. We investigate the properties of trust propagation on networks, based on a simple metric of trust transitivity. We investigate analytically the percolation properties of trust transitivity in random networks with arbitrary in/out-degree distributions, and compare with numerical realizations. We find that the existence of a non-zero fraction of absolute trust (i.e. entirely confident trust is a requirement for the viability of global trust propagation in large systems: The average pair-wise trust is marked by a discontinuous transition at a specific fraction of absolute trust, below which it vanishes. Furthermore, we perform an extensive analysis of the Pretty Good Privacy (PGP web of trust, in view of the concepts introduced. We compare different scenarios of trust distribution: community- and authority-centered. We find that these scenarios lead to sharply different patterns of trust propagation, due to the segregation of authority hubs and densely-connected communities. While the authority-centered scenario is more efficient, and leads to higher average trust values, it favours weakly-connected "fringe" nodes, which are directly trusted by authorities. The community-centered scheme, on the other hand, favours nodes with intermediate in/out-degrees, in detriment of the authorities and its "fringe" peers.

  13. Carpal tunnel biopsy

    Science.gov (United States)

    ... tunnel Images Carpal tunnel syndrome Surface anatomy - normal palm Surface anatomy - normal wrist Carpal biopsy References Calandruccio ... CA. Also reviewed by David Zieve, MD, MHA, Isla Ogilvie, PhD, and the A.D.A.M. ...

  14. Transonic Dynamics Tunnel (TDT)

    Data.gov (United States)

    Federal Laboratory Consortium — The Transonic Dynamics Tunnel (TDT) is a continuous flow wind-tunnel facility capable of speeds up to Mach 1.2 at stagnation pressures up to one atmosphere. The TDT...

  15. Hypersonic Tunnel Facility (HTF)

    Data.gov (United States)

    Federal Laboratory Consortium — The Hypersonic Tunnel Facility (HTF) is a blow-down, non-vitiated (clean air) free-jet wind tunnel capable of testing large-scale, propulsion systems at Mach 5, 6,...

  16. Carpal tunnel repair - slideshow

    Science.gov (United States)

    ... page: //medlineplus.gov/ency/presentations/100078.htm Carpal tunnel repair - series—Normal anatomy To use the sharing ... in the wrist and the wrist bones (carpal tunnel). Review Date 4/18/2017 Updated by: C. ...

  17. Road and Railroad Tunnels

    Data.gov (United States)

    Department of Homeland Security — Tunnels in the United States According to the HSIP Tiger Team Report, a tunnel is defined as a linear underground passageway open at both ends. This dataset is based...

  18. Quantum theory of tunneling

    CERN Document Server

    Razavy, Mohsen

    2014-01-01

    In this revised and expanded edition, in addition to a comprehensible introduction to the theoretical foundations of quantum tunneling based on different methods of formulating and solving tunneling problems, different semiclassical approximations for multidimensional systems are presented. Particular attention is given to the tunneling of composite systems, with examples taken from molecular tunneling and also from nuclear reactions. The interesting and puzzling features of tunneling times are given extensive coverage, and the possibility of measurement of these times with quantum clocks are critically examined. In addition by considering the analogy between evanescent waves in waveguides and in quantum tunneling, the times related to electromagnetic wave propagation have been used to explain certain aspects of quantum tunneling times. These topics are treated in both non-relativistic as well as relativistic regimes. Finally, a large number of examples of tunneling in atomic, molecular, condensed matter and ...

  19. Tunnel and Station Cost Methodology : Mined Tunnels

    Science.gov (United States)

    1983-01-01

    The main objective of this study was to develop a model for estimating the cost of subway station and tunnel construction. This report describes a cost estimating methodology for subway tunnels that can be used by planners, designers, owners, and gov...

  20. Review of Interorganizational Trust Models

    Science.gov (United States)

    2010-09-01

    trust in the salesperson . For example: ‘‘Anyone who trusts him/her is asking for trouble.’’ And three items measuring trust in the company. For...and benevolence of a target of Credibility and benevolence Trust of the supplier firm was measured on eight items, and trust of the salesperson on...used in the evaluation. Plank et al. (1999) ‘‘Trust is a global belief on the part of the buyer that the salesperson , product, and company will

  1. Trust Models in Ubiquitous Computing

    DEFF Research Database (Denmark)

    Nielsen, Mogens; Krukow, Karl; Sassone, Vladimiro

    2008-01-01

    We recapture some of the arguments for trust-based technologies in ubiquitous computing, followed by a brief survey of some of the models of trust that have been introduced in this respect. Based on this, we argue for the need of more formal and foundational trust models.......We recapture some of the arguments for trust-based technologies in ubiquitous computing, followed by a brief survey of some of the models of trust that have been introduced in this respect. Based on this, we argue for the need of more formal and foundational trust models....

  2. Trust as a Critical Concept

    DEFF Research Database (Denmark)

    Bordum, Anders

    2004-01-01

    In this articlei I will argue that trust is a fundamental and critical concept because trust is the direct or transcendental constitutive ground of most social phenomena, as well as applicable as an operational method in critical theory. There are two different but overlapping positions on trust I...... where trust is treated as if it was a value-neutral system-internal decision, which presupposes that trust and mistrust are symmetrically interrelated functionally (Luhmann 1979). In his early book Trust and Power, Niklas Luhmann seems to agree with the vision guiding my general argument...

  3. Governance, Trust and Taxes

    DEFF Research Database (Denmark)

    Weihe, Guri; Joensen, E. Juanna Schröter

    This paper examines the role of social capital (trust) vis-à-vis the propensity of a country to be a tax haven. The empirical analysis corroborates that better governed countries have a higher ceteris paribus probability to be tax havens. However, social capital counteracts the effect of governance...... quality. This effect is so strong that the partial effect of governance quality is reversed for countries with the trust index in the top quartile – making these high trust countries less likely to be tax havens – even as governance quality is increased. Thus it is crucial to consider the interaction...... between institutions and social capital, since the same governance institutions have a different impact on the tax haven propensity for countries with different social capital....

  4. Trust in media information

    Directory of Open Access Journals (Sweden)

    Miquel Rodrigo

    2003-06-01

    Full Text Available For Miquel Rodrigo, cultural diversity places informative discourse in a crisis because it needs new categories to explain reality, and these categories are not always shared by journalists and by those who receive the information. Instead of gaining an easy trust drawnfrom stereotypes, he proposes, as a better way of overcoming the crisis, fostering the existence of sceptical readers. The media interprets social phenomena with its personal and professional limitations. The sceptical reader is one who knows why the media says what it says and understands that its truths are not absolute, since all ways of seeing are ways of concealing. The relationship between scepticism and trust is that which opposes a blind, acrylic and capitulating trust.

  5. Where is trust heading?

    Directory of Open Access Journals (Sweden)

    Edgard Weber

    2003-06-01

    Full Text Available Edgard Weber thinks of trust as a process which places the individual in a position which does not only take into account his or her group, his or her direct environment or that of his or her interest, but rather all humanity, regardless of origin, race or social class.In other words, a process that departs from that which is particular and takes an interest in that which is universal, like a horizon that retreats the more we approach it and as a process constructed with the Other. In this sense, three conditions underlie trust: hope, love, and faith.

  6. Trusted cloud computing

    CERN Document Server

    Krcmar, Helmut; Rumpe, Bernhard

    2014-01-01

    This book documents the scientific results of the projects related to the Trusted Cloud Program, covering fundamental aspects of trust, security, and quality of service for cloud-based services and applications. These results aim to allow trustworthy IT applications in the cloud by providing a reliable and secure technical and legal framework. In this domain, business models, legislative circumstances, technical possibilities, and realizable security are closely interwoven and thus are addressed jointly. The book is organized in four parts on "Security and Privacy", "Software Engineering and

  7. Competition Fosters Trust

    DEFF Research Database (Denmark)

    Huck, Steffen; Ruchala, Gabriele K.; Tyran, Jean-Robert

    We study the effects of reputation and competition in a stylized market for experience goods. If interaction is anonymous, such markets perform poorly: sellers are not trustworthy, and buyers do not trust sellers. If sellers are identifiable and can, hence, build a reputation, efficiency quadruples...... but is still at only a third of the first best. Adding more information by granting buyers access to all sellers’ complete history has, somewhat surprisingly, no effect. On the other hand, we find that competition, coupled with some minimal information, eliminates the trust problem almost completely...

  8. Pricing and Trust

    DEFF Research Database (Denmark)

    Huck, Steffen; Ruchala, Gabriele K.; Tyran, Jean-Robert

    We experimentally examine the effects of flexible and fixed prices in markets for experience goods in which demand is driven by trust. With flexible prices, we observe low prices and high quality in competitive (oligopolistic) markets, and high prices coupled with low quality in non-competitive (......We experimentally examine the effects of flexible and fixed prices in markets for experience goods in which demand is driven by trust. With flexible prices, we observe low prices and high quality in competitive (oligopolistic) markets, and high prices coupled with low quality in non...

  9. Free Riding or Trust?

    DEFF Research Database (Denmark)

    Svendsen, Gert Tinggaard; Nilsson, Jerker

    2011-01-01

    It is often observed that members have little interest in monitoring their cooperatives. One explanation is that the members are free-riders, hoping that others will perform the task. Another explanation is that the weak member interest is a consequence of members having trust in the leadership. ...... have a subset of members who trusts the leadership so they do not read the annual reports....... conditions rule. These propositions get support from five studies of members’ readership of their cooperatives’ annual reports. In large and heterogeneous memberships there is free-riding behavior, which explains the members’ low interest in governing their cooperatives. To a limited extent a membership may...

  10. Trust in Anonymity Networks

    Science.gov (United States)

    Sassone, Vladimiro; Hamadou, Sardaouna; Yang, Mu

    Anonymity is a security property of paramount importance, as we move steadily towards a wired, online community. Its import touches upon subjects as different as eGovernance, eBusiness and eLeisure, as well as personal freedom of speech in authoritarian societies. Trust metrics are used in anonymity networks to support and enhance reliability in the absence of verifiable identities, and a variety of security attacks currently focus on degrading a user's trustworthiness in the eyes of the other users. In this paper, we analyse the privacy guarantees of the Crowds anonymity protocol, with and without onion forwarding, for standard and adaptive attacks against the trust level of honest users.

  11. Banking system trust, bank trust, and bank loyalty

    NARCIS (Netherlands)

    van Esterik-Plasmeijer, P.; van Raaij, W.F.

    2017-01-01

    Purpose The purpose of this paper is to test a model of banking system trust as an antecedent of bank trust and bank loyalty. Six determinants of trust and loyalty are included: competence, stability, integrity, customer orientation, transparency, and value congruence. The study provides insights

  12. Cultivating trust : how do public policies become trusted

    NARCIS (Netherlands)

    Breeman, Gerard Engelbert

    2006-01-01

    Trust research has become vitally important in the study of public administration. Many scholars emphasize the importance of trust for society, because it may improve co-operation. The relation between trust and policy making, however, has not yet been discussed very thoroughly. This is remarkable

  13. Proton tunneling in solids

    Energy Technology Data Exchange (ETDEWEB)

    Kondo, J.

    1998-10-01

    The tunneling rate of the proton and its isotopes between interstitial sites in solids is studied theoretically. The phonons and/or the electrons in the solid have two effects on the tunneling phenomenon. First, they suppress the transfer integral between two neighbouring states. Second, they give rise to a finite lifetime of the proton state. Usually the second effect is large and the tunneling probability per unit time (tunneling rate) can be defined. In some cases, however, a coherent tunneling is expected and actually observed. (author)

  14. Understanding Trust in Financial Services

    DEFF Research Database (Denmark)

    Hansen, Torben

    2012-01-01

    . This research extends prior research by developing a conceptual framework explaining how these constructs affect consumers' trust in their financial service provider. Based on two surveys comprising 764 pension consumers and 892 mortgage consumers, respectively, the results of this study indicate that financial...... healthiness, broad-scope trust, knowledge, and satisfaction positively affect narrow-scope trust in financial services. Furthermore, it is found that broad-scope trust negatively moderates the relationships between financial healthiness and narrow-scope trust and between satisfaction and narrow-scope trust......, respectively. In addition, the results marginally indicate that broad-scope trust negatively moderates the relationship between consumer financial knowledge and narrow-scope trust. This study encourages public policy makers, consumer organizations, and financial service providers to continue, improve, and...

  15. Initial Formation of Trust

    DEFF Research Database (Denmark)

    Schärfe, Henrik; Dougerthery, Elizabeth Ann

    2011-01-01

    In this paper we present a study of how touch may be used as a way of inducing trust in the meeting with a teloperated android, the Geminoid-DK. The use of hapics with Gestalt-based 'Balance Theory' is used as a persuasive desing of the interaction between human and robot. Balance theory includes...

  16. Trust and Critical Thinking

    Science.gov (United States)

    Kleinig, John

    2018-01-01

    This article discusses the tension between trust, as an expression of interpersonal commitment, and critical thinking, which includes a demand for reasons. It explores the importance of each for individual flourishing, and then seeks to establish some ways in which they intersect, drawing on ideas of authority and trustworthiness. It argues that…

  17. Balancing trust and power

    DEFF Research Database (Denmark)

    Broholm-Jørgensen, Marie; Guassora, Ann Dorrit; Reventlow, Susanne

    2017-01-01

    of clinical encounters. Results: From the empirical data, we identified three dimensions of respect: respect for the patient’s autonomy, respect for professional authority and respect as a mutual exchange. A balance of respect influenced trust in the relationship between GP and patients and the transfer...

  18. TRUSTING CROWDSOURCED GEOSPATIAL SEMANTICS

    Directory of Open Access Journals (Sweden)

    P. Goodhue

    2015-08-01

    Full Text Available The degree of trust one can place in information is one of the foremost limitations of crowdsourced geospatial information. As with the development of web technologies, the increased prevalence of semantics associated with geospatial information has increased accessibility and functionality. Semantics also provides an opportunity to extend indicators of trust for crowdsourced geospatial information that have largely focused on spatio-temporal and social aspects of that information. Comparing a feature’s intrinsic and extrinsic properties to associated ontologies provides a means of semantically assessing the trustworthiness of crowdsourced geospatial information. The application of this approach to unconstrained semantic submissions then allows for a detailed assessment of the trust of these features whilst maintaining the descriptive thoroughness this mode of information submission affords. The resulting trust rating then becomes an attribute of the feature, providing not only an indication as to the trustworthiness of a specific feature but is able to be aggregated across multiple features to illustrate the overall trustworthiness of a dataset.

  19. Time and Trust

    DEFF Research Database (Denmark)

    Hansen, Annette Skovsted

    in Africa, we can map a territory, within which current stakeholders from Asia are bound to operate. In the case of Japan, a fifty year history of capacity development projects in Africa has established channels of communication and trust to compete with longer term European, Chinese, and Indian ties. One...

  20. Building Trust in Organic

    OpenAIRE

    Huber, Beate

    2007-01-01

    What are the basics for setting up an organic certification body? How is an efficient and service-oriented certification system implemented? How should the necessary documentation be developed? These are some questions that are explained thoroughly in the completely revised IFOAM publication "Building Trust in Organic".

  1. Social Capital, Institutions and Trust

    NARCIS (Netherlands)

    Nooteboom, B.

    2006-01-01

    This paper analyzes the relations between social capital, institutions and trust.These concepts are full of ambiguity and confusion.This paper attempts to dissolve some of the confusion, by distinguishing trust and control, and analyzing institutional and relational conditions of trust.It presents a

  2. Trust-based belief change

    OpenAIRE

    Lorini, Emiliano; Jiang, Guifei; Perrussel, Laurent

    2014-01-01

    International audience; We propose a modal logic that supports reasoning about trust-based belief change. The term trust-based belief change refers to belief change that depends on the degree of trust the receiver has in the source of information.

  3. Trust It or Trash It?

    Science.gov (United States)

    Trust It or Trash It? About | Contact | Español Tab 1 Tab 2 What is Trust It or Trash It? This is a tool ... be true, it may be. (See the second “Trust it” statement above). Click on each element below ...

  4. Creating trust through narrative strategy

    NARCIS (Netherlands)

    Gabbay, SM; Leenders, RTAJ

    2003-01-01

    In the rational model of trust, an actor's level of trust is a function of the expected gain and loss involved. As a consequence, if A can influence the gain and loss perceived by B, A can influence B's level of trust. In this article we study how A can do this through the strategic use of

  5. Trust, Endangerment and Divine Vulnerability

    DEFF Research Database (Denmark)

    Christoffersen, Mikkel Gabriel

    2017-01-01

    Faith is trusting God in the midst of endangerment. Yet, human experience of excessive suffering has challenged any spontaneous trust in God. In this article, I reconsider the idea of faith as trust in God, adding an emphasis on the divine vulnerability in the incarnation, and I develop a more...

  6. Four Essential Practices for Building Trust

    Science.gov (United States)

    Combs, Julie Peterson; Harris, Sandra; Edmonson, Stacey

    2015-01-01

    The presence of trust can enhance an organization's efforts to fulfill its mission, and the lack of trust can constrict those efforts. The authors offer four essential guidelines to help school leaders communicate in a way that builds trust. Build trust by understanding trust. Trusted leaders demonstrate care, character, and competence in their…

  7. The Condition for Generous Trust.

    Science.gov (United States)

    Shinya, Obayashi; Yusuke, Inagaki; Hiroki, Takikawa

    2016-01-01

    Trust has been considered the "cement" of a society and is much studied in sociology and other social sciences. Most studies, however, have neglected one important aspect of trust: it involves an act of forgiving and showing tolerance toward another's failure. In this study, we refer to this concept as "generous trust" and examine the conditions under which generous trust becomes a more viable option when compared to other types of trust. We investigate two settings. First, we introduce two types of uncertainties: uncertainty as to whether trustees have the intention to cooperate, and uncertainty as to whether trustees have enough competence to accomplish the entrusted tasks. Second, we examine the manner in which trust functions in a broader social context, one that involves matching and commitment processes. Since we expect generosity or forgiveness to work differently in the matching and commitment processes, we must differentiate trust strategies into generous trust in the matching process and that in the commitment process. Our analytical strategy is two-fold. First, we analyze the "modified" trust game that incorporates the two types of uncertainties without the matching process. This simplified setting enables us to derive mathematical results using game theory, thereby giving basic insight into the trust mechanism. Second, we investigate socially embedded trust relationships in contexts involving the matching and commitment processes, using agent-based simulation. Results show that uncertainty about partner's intention and competence makes generous trust a viable option. In contrast, too much uncertainty undermines the possibility of generous trust. Furthermore, a strategy that is too generous cannot stand alone. Generosity should be accompanied with moderate punishment. As for socially embedded trust relationships, generosity functions differently in the matching process versus the commitment process. Indeed, these two types of generous trust coexist, and

  8. Trust and Sensemaking in Organizations

    DEFF Research Database (Denmark)

    Fuglsang, Lars; Jagd, Søren; Olsen, Poul Bitsch

    The literature on trust and the literature on sensemaking constitute two separate streams of literature that are both seen as highly relevant to understanding organisational processes in modern complex high-trust organisations. However, though a few studies have argued for the relevance of linkin...... help furthering the understanding of trust processes in organizations. The variety of links between sensemaking and trust processes is illustrated by the intertwining of trust and four processes of sensemaking: arguing, expecting, committing and manipulation identified by Karl Weick....

  9. HMM-based Trust Model

    DEFF Research Database (Denmark)

    ElSalamouny, Ehab; Nielsen, Mogens; Sassone, Vladimiro

    2010-01-01

    Probabilistic trust has been adopted as an approach to taking security sensitive decisions in modern global computing environments. Existing probabilistic trust frameworks either assume fixed behaviour for the principals or incorporate the notion of ‘decay' as an ad hoc approach to cope with thei...... the major limitation of existing Beta trust model. We show the consistency of the HMM-based trust model and contrast it against the well known Beta trust model with the decay principle in terms of the estimation precision....

  10. Modeling trust context in networks

    CERN Document Server

    Adali, Sibel

    2013-01-01

    We make complex decisions every day, requiring trust in many different entities for different reasons. These decisions are not made by combining many isolated trust evaluations. Many interlocking factors play a role, each dynamically impacting the others.? In this brief, 'trust context' is defined as the system level description of how the trust evaluation process unfolds.Networks today are part of almost all human activity, supporting and shaping it. Applications increasingly incorporate new interdependencies and new trust contexts. Social networks connect people and organizations throughout

  11. Social Trust of Virtual Identities

    Science.gov (United States)

    Seigneur, Jean-Marc

    Most other chapters of this book discuss computational models of trust in broader terms, giving definitions of trust, explaining how trust should evolve over time, surveying the different facets of trust .On the other hand, this chapter has a clear focus on the important element of identity in computational trust mechanisms. Trust and reputation are easier to form in face-to-face situations than in situations involving the use of computers and networks because the identity of the trustee is more difficult to verify. In this chapter, the different means to recognise virtual identities are surveyed. Next, their integration into computational trust engines is discussed, especially according to four main requirements: Adaptability, Security, Usability and Privacy (ASUP).

  12. A Matter of Trust

    DEFF Research Database (Denmark)

    Blach-Ørsten, Mark; Hartley, Jannie Møller; Wittchen, Maria Bendix

    In 2015 two major journalistic scandals hit the Danish news media. One was a plagiarism scandal in which a freelance foreign correspondent was found to have plagiarized parts of the stories she had filed from other international news media. The other scandal involved a sports journalist who...... was found to have invented a large number of the sources that were quoted in his stories and had made up false co-bylines. In a time of diminishing trust in the news media (Blach-Ørsten & Burkal, 2013; Reuters, 2016) these scandals represented a significant and acute credibility problem for the news media...... that were affected. Using paradigm repair theory this paper analyses which strategies the affected news media employed to re-instore trust in their journalism, and thus in the traditional news paradigm, as quickly as possible. Like previous studies on paradigm repair (Bennet et al, 1975; Hackett, 1984...

  13. Trust in Internet Election

    DEFF Research Database (Denmark)

    Markussen, Randi; Ronquillo, Lorena; Schürmann, Carsten

    2014-01-01

    This paper discusses the Decryption and Counting Ceremony held in conjunction with the internet voting trial on election day in the Ministry of Local Government and Regional Development of Norway in 2013. We examine the organizers' ambition of making the decryption and counting of electronic votes...... public in order to sustain trust in internet voting. We introduce a pragmatic approach to trust that emphasises the inseparability of truth from witnessing it. Based on this and on a description of how the event was made observable and how the complexities in the counting process were disclosed, we...... discuss what we term economy of truth from the perspective of the IT community involved in the ceremony. We claim that broadening the economy of truth by including more explicitly social and political perspectives in the ceremony, and in internet elections in general, and how witnessing is brought about...

  14. Problems of judiciary trust

    Directory of Open Access Journals (Sweden)

    Vuković Slobodan

    2007-01-01

    Full Text Available Topic of the article is problem of trust in judiciary as a most important part of legal system. For all empirical researches so far have shown very law degree of this trust many authors were searching for the causes of this phenomenon. Among multifold causes some are special worth while to be mentioned here: historical inheritance, political pressures, delaying of judiciary decisions, respect of the laws, transferring of responsibility from political power to the judiciary, public comments of judiciary decisions, media pressures, efficiency of judiciary and police. Among inner factors author pays attention to competency of judges, modes of penal policy, modes of judges’ entitlement, problems of communication, involvement into criminal and corruptional affairs, etc.

  15. Trust and Corruption

    DEFF Research Database (Denmark)

    Graeff, Peter; Svendsen, Gert Tinggaard

    2013-01-01

    Why are the Scandinavian countries in the European Union significantly richer than South-ern/Eastern European countries? We try to answer this question from an empirical social capital perspective. In particular, we are interested in the interplay of social trust as a positive and corruption...... capital by applying a path model that accounts for Granger-like causal effects. Our empirical results, referring to a sample of up to 25 EU countries, show that corruption might harm poor European countries but is not able to affect social trust. However, corruption in itself means that resources end up...... in the wrong places and not in socioeconomically optimal investments. There is, therefore, a direct damaging effect of corruption on wealth. This implies that economic actors have to invest higher transaction and control costs which will bind resources to non-productive purposes and thus destroy economic...

  16. Learning to trust: trust and attachment in early psychosis.

    Science.gov (United States)

    Fett, A-K J; Shergill, S S; Korver-Nieberg, N; Yakub, F; Gromann, P M; Krabbendam, L

    2016-05-01

    Distrust and social dysfunction are characteristic in psychosis and may arise from attachment insecurity, which is elevated in the disorder. The relationship between trust and attachment in the early stages of psychosis is unknown, yet could help to understand interpersonal difficulties and disease progression. This study aimed to investigate whether trust is reduced in patients with early psychosis and whether this is accounted for by attachment avoidance and attachment anxiety. We used two trust games with a cooperative and unfair partner in a sample of 39 adolescents with early psychosis and 100 healthy controls. Patients had higher levels of attachment anxiety, but the groups did not differ in attachment avoidance. Basic trust was lower in patients than controls, as indicated by lower initial investments. During cooperation patients increased their trust towards levels of controls, i.e. they were able to learn and to override initial suspiciousness. Patients decreased their trust less than controls during unfair interactions. Anxious attachment was associated with higher basic trust and higher trust during unfair interactions and predicted trust independent of group status. Discussion Patients showed decreased basic trust but were able to learn from the trustworthy behaviour of their counterpart. Worries about the acceptance by others and low self-esteem are associated with psychosis and attachment anxiety and may explain behaviour that is focused on conciliation, rather than self-protection.

  17. Trust and Estate Planning

    DEFF Research Database (Denmark)

    Harrington, Brooke

    2012-01-01

    , these professionals keep a significant portion of the world’s private wealth beyond the reach of the state. Trust and estate planning thus contributes to creating and maintaining socioeconomic inequality on a global scale. The significance of the profession has grown as wealth itself has become more fungible......, spurring innovation in legal, organizational, and financial strategies, and thwarting a myriad of laws and policies designed to limit enduring inequality in modern, democratic societies....

  18. The Superluminal Tunneling Story

    OpenAIRE

    Aichmann, Horst; Nimtz, Günter

    2013-01-01

    Since 1992 experimental evidence of superluminal (faster than light, FTL) signals are causing much excitement in the physical community and in the media. Superluminal signal velocity and zero time tunneling was first observed in an analog tunneling experiment with microwaves. Recently, the conjectured zero time of electron was claimed to be observed in ionizing helium. The FTL signal velocity was reproduced with infrared light and with various tunneling barriers in several laboratories worldw...

  19. Trust in Digital Repositories

    Directory of Open Access Journals (Sweden)

    Elizabeth Yakel

    2013-06-01

    Full Text Available ISO 16363:2012, Space Data and Information Transfer Systems - Audit and Certification of Trustworthy Digital Repositories (ISO TRAC, outlines actions a repository can take to be considered trustworthy, but research examining whether the repository’s designated community of users associates such actions with trustworthiness has been limited. Drawing from this ISO document and the management and information systems literatures, this paper discusses findings from interviews with 66 archaeologists and quantitative social scientists. We found similarities and differences across the disciplines and among the social scientists. Both disciplinary communities associated trust with a repository’s transparency. However, archaeologists mentioned guarantees of preservation and sustainability more frequently than the social scientists, who talked about institutional reputation. Repository processes were also linked to trust, with archaeologists more frequently citing metadata issues and social scientists discussing data selection and cleaning processes. Among the social scientists, novices mentioned the influence of colleagues on their trust in repositories almost twice as much as the experts. We discuss the implications our findings have for identifying trustworthy repositories and how they extend the models presented in the management and information systems literatures.

  20. Microsystem Aeromechanics Wind Tunnel

    Data.gov (United States)

    Federal Laboratory Consortium — The Microsystem Aeromechanics Wind Tunnel advances the study of fundamental flow physics relevant to micro air vehicle (MAV) flight and assesses vehicle performance...

  1. Do people trust dentists? Development of the Dentist Trust Scale.

    Science.gov (United States)

    Armfield, J M; Ketting, M; Chrisopoulos, S; Baker, S R

    2017-09-01

    This study aimed to adapt a measure of trust in physicians to trust in dentists and to assess the reliability and validity of the measure. Questionnaire data were collected from a simple random sample of 596 Australian adults. The 11-item General Trust in Physicians Scale was modified to apply to dentists. The Dentist Trust Scale (DTS) had good internal consistency (α = 0.92) and exploratory factor analysis revealed a single-factor solution. Lower DTS scores were associated with less trust in the dentist last visited, having previously changed dentists due to unhappiness with the care received, currently having dental pain, usual visiting frequency, dental avoidance, and with past experiences of discomfort, gagging, fainting, embarrassment and personal problems with the dentist. The majority of people appear to exhibit trust in dentists. The DTS shows promising reliability and validity evidence. © 2017 Australian Dental Association.

  2. Radio Wave Propagation in Tunnels

    National Research Council Canada - National Science Library

    Lee, Jeho

    2000-01-01

    This report examines the radio propagation model for narrow and long tunnels. Modal analysis is used to model the path gain in 2-D and 3-D rectangular tunnels and the coupling loss of L, T and cross tunnels...

  3. Carpal Tunnel Syndrome (For Kids)

    Science.gov (United States)

    ... OK for Kids? Your Teeth Heart Murmurs Carpal Tunnel Syndrome KidsHealth > For Kids > Carpal Tunnel Syndrome Print ... syndrome in the first place. Where Is This Tunnel? Take a look at the palm of your ...

  4. A Model of Trusted Measurement Model

    Directory of Open Access Journals (Sweden)

    Ma Zhili

    2017-01-01

    Full Text Available A model of Trusted Measurement supporting behavior measurement based on trusted connection architecture (TCA with three entities and three levels is proposed, and a frame to illustrate the model is given. The model synthesizes three trusted measurement dimensions including trusted identity, trusted status and trusted behavior, satisfies the essential requirements of trusted measurement, and unified the TCA with three entities and three levels.

  5. Sociology of Trust Towards a Sociology of `E-trust'

    OpenAIRE

    Rutter, Jason

    2001-01-01

    This paper focuses on the importance of trust in business-to-consumer e-commerce.Divided into three sections the paper first asks the question of why trust is important to the development and implementation of e-commerce and suggests some of the areas where user trust is specifically important. The second offers a view of trust developed using sociological theory and interactionism and looks at how this can inform our understanding of e-commerce users. Finally, the paper suggests a number of ...

  6. Tunnel operations study.

    Science.gov (United States)

    2013-12-01

    In June 2000, the State of Alaska Department of Transportation and Public Facilities completed construction of the Whittier Access Project by converting the existing 2.5- : mile Whittier Tunnel into the worlds only dual-use highway/rail tunnel wit...

  7. Securing Trust on the Market

    OpenAIRE

    Vurušić, Gordan

    2004-01-01

    The purpose of this paper is twofold: first, on the normative level, the author compares three main ways of securing trust on imperfectly competitive markets – informal social enforcement, formal-third party enforcement, and conditional internal commitment to the cultural norm of trust, in terms of the standard criteria of allocative and adaptive efficiency. Admittedly, the three ways of securing trust in reality rarely exist separately and as ideal types, but the author separates them for th...

  8. Tunnel fire dynamics

    CERN Document Server

    Ingason, Haukur; Lönnermark, Anders

    2015-01-01

    This book covers a wide range of issues in fire safety engineering in tunnels, describes the phenomena related to tunnel fire dynamics, presents state-of-the-art research, and gives detailed solutions to these major issues. Examples for calculations are provided. The aim is to significantly improve the understanding of fire safety engineering in tunnels. Chapters on fuel and ventilation control, combustion products, gas temperatures, heat fluxes, smoke stratification, visibility, tenability, design fire curves, heat release, fire suppression and detection, CFD modeling, and scaling techniques all equip readers to create their own fire safety plans for tunnels. This book should be purchased by any engineer or public official with responsibility for tunnels. It would also be of interest to many fire protection engineers as an application of evolving technical principles of fire safety.

  9. Trust in Social Computing

    Science.gov (United States)

    2014-04-07

    Computing Arizona State University Data Mining and Machine Learning Lab WWW2014 52 PageRank [Page et al., 1999]  PageRank is a global metric... Pagerank is from trustees’ perspective  The trustworthiness of a trustee is aggregated from her trustors ─Trustors’ trustworthiness ─Trust values...Frontiers, 7(4-5):337–358, 2005. [Page et al., 1999] L. Page, S. Brin, R. Motwani, and T. Winograd. The pagerank citation ranking: Bringing order to the web

  10. Trust is other people

    DEFF Research Database (Denmark)

    Luckner, Naemi; Werner, Katharina; Subasi, Özge

    , the Internet is often experienced as a place of anonymity, and people are scared of the ’figurative creep’ lurking behind every dark corner. This view on online environments can be a reason for potential sharers not to use sharing platforms. To explore how people view such issues, we conducted an open...... concerning the interaction with strangers through the platform. Putting trust in an online sharing community seems to be the biggest obstacle that influences whether people draw away rather than move closer together and start collaborating in the sharing community. Here, we report on the main issues...

  11. Trust for intelligent recommendation

    CERN Document Server

    Bhuiyan, Touhid

    2013-01-01

    Recommender systems are one of the recent inventions to deal with the ever-growing information overload in relation to the selection of goods and services in a global economy. Collaborative Filtering (CF) is one of the most popular techniques in recommender systems. The CF recommends items to a target user based on the preferences of a set of similar users known as the neighbors, generated from a database made up of the preferences of past users. In the absence of these ratings, trust between the users could be used to choose the neighbor for recommendation making. Better recommendations can b

  12. Trust in Diverse Teams

    DEFF Research Database (Denmark)

    Clausen, Lisbeth

    Multicultural membership and diversity in teams are important to maintain effectiveness in organizations in a global business environment. Multicultural teams offer great potential in international collaboration just as top management teams are becoming increasingly diversified. However......, maintaining team cohesiveness in multicultural teams to collaborate effectively presents a number of challenges. The present study employs the concept of trust to explore influences on team collaboration in high performing teams. The study is based on observation of teams in seven multinational corporations...... as nationalities, gender, functional expertise and international experience. The study contributes insights to diverse teams through a processual study of micro-processes in global organizational contexts crossing multicultural boundaries....

  13. Trust Propagation in Small Worlds

    DEFF Research Database (Denmark)

    Gray, Elizabeth; Seigneur, Jean-Marc; Chen, Yong

    2003-01-01

    do not scale well. We aim to develop trust-based security mechanisms using small world concepts to optimise formation and propagation of trust amongst entities in these vast networks. In this regard, we surmise that in a very large mobile ad hoc network, trust, risk, and recommendations can...... be propagated through relatively short paths connecting entities. Our work describes the design of trust-formation and risk-assessment systems, as well as that of an entity recognition scheme, within the context of the small world network topology....

  14. Consumer Trust in Information Sources

    Directory of Open Access Journals (Sweden)

    Brad Love

    2013-06-01

    Full Text Available Trust is essential to understanding public reaction to innovative issues. This research focuses on trust in information sources by explicating the construct of trust and testing a comprehensive model on several information sources about genetically modified foods. Results from a survey of 369 participants reveal the significance of projecting competence and the role of the environment in which a target public receives information. Perceptions of regulatory, social, business, and technical environments affect how likely individuals are to follow advice from institutions like the Food and Drug Administration and the news media. Future research should incorporate knowledge levels and personal relevance as variables likely to influence trusting relationships.

  15. Designing High-Trust Organizations

    DEFF Research Database (Denmark)

    Jagd, Søren

    The specific problem considered in this paper is what are the key issues to consider for managers involved in designing high-trust organizations, a design problem still not properly explored. This paper intends to take the first step in filling this lacuna. In the paper, I first present...... the existing management and research literature on building high-trust organizations. Then I explore Alan Fox’s (1974) analysis of low-trust vs. high-trust dynamics which, I argue, may serve as a theoretically stronger basis for understanding the issues management have to consider when designing hightrust...

  16. Trusting Relationships in International Politics

    DEFF Research Database (Denmark)

    Keating, Vincent Charles; Ruzicka, Jan

    2014-01-01

    How can trusting relationships be identified in international politics? The recent wave of scholarship on trust in International Relations answers this question by looking for one or the combination of three indicators – the incidence of cooperation; discourses expressing trust; or the calculated...... acceptance of vulnerability. These methods are inadequate both theoretically and empirically. Distinguishing between the concepts of trust and confidence, we instead propose an approach that focuses on the actors’ hedging strategies. We argue that actors either declining to adopt or removing hedging...

  17. Forms, Sources and Processes of Trust

    NARCIS (Netherlands)

    Nooteboom, B.

    2006-01-01

    This chapter reviews some key points in the analysis of trust, based on Nooteboom (2002)i.The following questions are addressed.What can we have trust in?What is the relation between trust and control?What are the sources of trust? And what are its limits?By what process is trust built up and broken

  18. Generalized Trust and Trust in Institutions in Confucian Asia

    Science.gov (United States)

    Tan, Soo Jiuan; Tambyah, Siok Kuan

    2011-01-01

    This study examines generalized trust and trust in institutions in Confucian Asia, covering six countries namely, China, Japan, Singapore, South Korea, Taiwan and Vietnam, and one dependent region, Hong Kong. Using data from the 2006 AsiaBarometer Survey, our study affirms the reliability and validity of using a two-item scale to measure…

  19. The Need to Trust and to Trust More Wisely in Academe

    Science.gov (United States)

    Bowman, Richard F.

    2012-01-01

    Where trust is an issue, there is no trust. Trust in diverse organizations has never been lower. A shadow of doubt stalks one's every decision to trust collegially and institutionally. Still, colleagues sense intuitively that institutions cannot function optimally without a bedrock level of trust. In academic life, trust is a form of social…

  20. InDependent Diabetes Trust.

    Science.gov (United States)

    Evans, Roger

    2014-10-21

    The InDependent Diabetes Trust is a UK-based charity run by people with diabetes for others living with the condition. It was set up in 1994 as the Insulin Dependent Diabetes Trust (IDDT), a registered charity. It is run entirely by voluntary donations and does not accept funding from pharmaceutical companies.

  1. Mediating Trust in Terrorism Coverage

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    crisis. While the framework is presented in the context of television coverage of a terror-related crisis situation, it can equally be used in connection with all other forms of mediated trust. Key words: National crisis, risk communication, crisis management, television coverage, mediated trust....

  2. Towards trusted trade-lanes

    NARCIS (Netherlands)

    Hulstijn, J.; Hofman, W.; Zomer, G.; Tan, Y.H.

    2016-01-01

    Customs administrations are exploring system-based approaches to regulatory supervision, taking the entire set of controls in a process into account. In addition to Trusted Traders, which are recognized by a certification process, customs are considering to identify so called Trusted Trade Lanes:

  3. Context-Aware Trust Domains

    NARCIS (Netherlands)

    Neisse, R.; van Sinderen, Marten J.; Havinga, P.J.M.; Havinga, Paul J.M.; Lijding, M.E.M.; Meratnia, Nirvana; Meratnia, N.; Wegdam, M.

    Context-aware service platforms need to establish and manage trust relationships for users to know if the user’s privacy policies are being enforced and for service providers to control access to their services. Current trust solutions are not suitable for this because they do not address in an

  4. Trust and New Communication Technologies

    DEFF Research Database (Denmark)

    Ess, Charles

    2010-01-01

    I approach the philosophical analyses of the phenomenon of trust vis-à-vis online communication beginning with an overview from within the framework of computer-mediated communication (CMC) of concerns and paradigmatic failures of trust in the history of online communication. I turn to the more...

  5. In the CJEU Judges Trust

    DEFF Research Database (Denmark)

    Mayoral, Juan A.

    2016-01-01

    This article aims to highlight the relevance of judicial trust in international courts, focusing on national judges' trust in the Court of Justice of the European Union (CJEU). EU scholars have put a great deal of effort into explaining how legal and political factors affect the use of preliminar...

  6. Integrity Constraints in Trust Management

    NARCIS (Netherlands)

    Etalle, Sandro; Winsborough, William H.

    We introduce the use, monitoring, and enforcement of integrity constraints in trust managementstyle authorization systems. We consider what portions of the policy state must be monitored to detect violations of integrity constraints. Then we address the fact that not all participants in a trust

  7. riences from REACH Trust, Malawi

    African Journals Online (AJOL)

    Drawing on the experiences of REACH Trust, this paper highlights practical lessons of using research processes and outcomes to promote equity in health policy and practice. The REACH '11'ust is first introduced. Case studies are then used to highlight how REACH Trust has worked in a par- ticipatory manner with key ...

  8. Trusted computing strengthens cloud authentication.

    Science.gov (United States)

    Ghazizadeh, Eghbal; Zamani, Mazdak; Ab Manan, Jamalul-lail; Alizadeh, Mojtaba

    2014-01-01

    Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM). Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM) are great technologies for solving the trust and security concerns in the cloud identity environment. Single sign-on (SSO) and OpenID have been released to solve security and privacy problems for cloud identity. This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in .Net environment. Security analyzing, simulation, and BLP confidential model are three ways to evaluate and analyze our proposed model.

  9. Trusted Computing Strengthens Cloud Authentication

    Science.gov (United States)

    2014-01-01

    Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM). Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM) are great technologies for solving the trust and security concerns in the cloud identity environment. Single sign-on (SSO) and OpenID have been released to solve security and privacy problems for cloud identity. This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in .Net environment. Security analyzing, simulation, and BLP confidential model are three ways to evaluate and analyze our proposed model. PMID:24701149

  10. Trusted Computing Strengthens Cloud Authentication

    Directory of Open Access Journals (Sweden)

    Eghbal Ghazizadeh

    2014-01-01

    Full Text Available Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM. Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM are great technologies for solving the trust and security concerns in the cloud identity environment. Single sign-on (SSO and OpenID have been released to solve security and privacy problems for cloud identity. This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in .Net environment. Security analyzing, simulation, and BLP confidential model are three ways to evaluate and analyze our proposed model.

  11. Towards a Formal Notion of Trust

    DEFF Research Database (Denmark)

    Nielsen, Mogens; Krukow, Karl Kristian

    2003-01-01

    Trust management systems have been proposed as an alternative to traditional security mechanisms in Global Computing. We present some challenges in establishing a formal foundation for the notion of trust, and some preliminary ideas towards a category of trust models.......Trust management systems have been proposed as an alternative to traditional security mechanisms in Global Computing. We present some challenges in establishing a formal foundation for the notion of trust, and some preliminary ideas towards a category of trust models....

  12. Trust-based environmental regulation.

    Science.gov (United States)

    Lange, Bettina; Gouldson, Andy

    2010-10-15

    Within this paper, we examine the contribution that trust-based relationships can make to achieving better-and particularly more effective, efficient and equitable-environmental regulation. While levels of trust in regulators, regulatory processes and outcomes are often discussed, the influence of trust on different actors and on different measures of regulatory performance is poorly understood. Within this paper, we define trust-based environmental regulation as a specific regulatory style that involves openness and cooperation in interaction between regulated, regulators and third-party stakeholders in order to achieve environmental protection objectives. We then discuss the pros and cons of trust relationships between regulators, regulated businesses and citizens for achieving behavioural change towards greater environmental protection. To illustrate the significance of these issues, we then examine three forms of contractual regulatory style where trust relationships are critically important: responsive regulation, self-regulation and environmental agreements. Based on this analysis, we highlight the importance of trust-based relationships, and we argue that one of the greatest contributions of trust-based environmental regulation is to challenge how we think about regulation. Trust is often understood as enabling existing regulatory relationships or in the case of self-regulation as a complement to regulation. However, we argue that the real potential of trust is to open up new ways for participants in regulatory regimes to engage in collective action, to go beyond a perception of regulation as driven by the competing interests of individual actors, and thus, to open up new channels of influence for behavioural change towards greater environmental protection. Our analysis therefore has great relevance for future research and for on-going debates on the future of regulation. Copyright © 2010. Published by Elsevier B.V.

  13. Towards Trust Engineering for Opportunistic Cloud Services

    DEFF Research Database (Denmark)

    Kuada, Eric

    2014-01-01

    The systematic review methodology has been employed to review trust related studies in cloud computing. It was observed that trusted computing technologies and reputation based approaches are the main approaches to trust engineering in cloud computing. Also, trusted third party approaches...... and the deployment model play a significant role in enhancing trust between service providers and consumers. It was observed that the concept of trust is used loosely without any formal specification in cloud computing discussions and trust engineering in general. As a first step towards addressing this problem, we...... have contextualized the formal trust specification in multi-agent environments for cloud computing....

  14. Trust dynamics in a large system implementation

    DEFF Research Database (Denmark)

    Schlichter, Bjarne Rerup; Rose, Jeremy

    2013-01-01

    A large information systems implementation (such as Enterprise Resource Planning systems) relies on the trust of its stakeholders to succeed. Such projects impact diverse groups of stakeholders, each with their legitimate interests and expectations. Levels of stakeholder trust can be expected...... outcomes, but largely ignored the dynamics of trust relations. Giddens, as part of his study of modernity, theorises trust dynamics in relation to abstract social systems, though without focusing on information systems. We use Giddens’ concepts to investigate evolving trust relationships in a longitudinal......, the maintenance, breakdown and restoration of trust, the role of the information system in restoring trust, and the emergent and reciprocal nature of trust and project outcomes....

  15. Carpal Tunnel Syndrome

    Science.gov (United States)

    ... make CTS better and help relieve symptoms. Massage, yoga, ultrasound, chiropractic manipulation, and acupuncture are just a ... tunnel syndrome > A-Z Health Topics Related information Menopause Pregnancy The javascript used in this widget is ...

  16. Carpal Tunnel Syndrome

    Science.gov (United States)

    ... is not confined to people in a single industry or job, but is especially common in those ... tunnel syndrome. Nonsteroidal anti-inflammatory drugs, such as aspirin, ibuprofen, and other nonprescription pain relievers, may provide ...

  17. INCAS TRISONIC WIND TUNNEL

    Directory of Open Access Journals (Sweden)

    Florin MUNTEANU

    2009-09-01

    Full Text Available The 1.2 m x 1.2 m Trisonic Blowdown Wind Tunnel is the largest of the experimental facilities at the National Institute for Aerospace Research - I.N.C.A.S. "Elie Carafoli", Bucharest, Romania. The tunnel has been designed by the Canadian company DSMA (now AIOLOS and since its commissioning in 1978 has performed high speed aerodynamic tests for more than 120 projects of aircraft, missiles and other objects among which the twin jet fighter IAR-93, the jet trainer IAR-99, the MIG-21 Lancer, the Polish jet fighter YRYDA and others. In the last years the wind tunnel has been used mostly for experimental research in European projects such as UFAST. The high flow quality parameters and the wide range of testing capabilities ensure the competitivity of the tunnel at an international level.

  18. Quantum tunneling with friction

    Science.gov (United States)

    Tokieda, M.; Hagino, K.

    2017-05-01

    Using the phenomenological quantum friction models introduced by P. Caldirola [Nuovo Cimento 18, 393 (1941), 10.1007/BF02960144] and E. Kanai [Prog. Theor. Phys. 3, 440 (1948), 10.1143/ptp/3.4.440], M. D. Kostin [J. Chem. Phys. 57, 3589 (1972), 10.1063/1.1678812], and K. Albrecht [Phys. Lett. B 56, 127 (1975), 10.1016/0370-2693(75)90283-X], we study quantum tunneling of a one-dimensional potential in the presence of energy dissipation. To this end, we calculate the tunneling probability using a time-dependent wave-packet method. The friction reduces the tunneling probability. We show that the three models provide similar penetrabilities to each other, among which the Caldirola-Kanai model requires the least numerical effort. We also discuss the effect of energy dissipation on quantum tunneling in terms of barrier distributions.

  19. Wind Tunnel Testing Facilities

    Data.gov (United States)

    Federal Laboratory Consortium — NASA Ames Research Center is pleased to offer the services of our premier wind tunnel facilities that have a broad range of proven testing capabilities to customers...

  20. Wind Tunnel Facility

    Data.gov (United States)

    Federal Laboratory Consortium — This ARDEC facility consists of subsonic, transonic, and supersonic wind tunnels to acquire aerodynamic data. Full-scale and sub-scale models of munitions are fitted...

  1. Steel formworks for tunnelling

    OpenAIRE

    Andrić, Ante; Tešović, Snježana

    2008-01-01

    The plant used for concreting the secondary tunnel lining is described. The plant is made of three segments: sheathing, self-propelled conveyor, and concrete supply system. In addition to technical properties and other features of this plant, the authors describe the work technology, and problems encountered during concept development, design and adjustment for three-rail and four-rail formwork. The structure of formwork portal, face formwork and tunnel lay-by is described and presented, incl...

  2. Interpersonal trust across six Asia-Pacific countries: testing and extending the 'high trust society' and 'low trust society' theory.

    Directory of Open Access Journals (Sweden)

    Paul R Ward

    Full Text Available BACKGROUND: Trust is regarded as a necessary component for the smooth running of society, although societal and political modernising processes have been linked to an increase in mistrust, potentially signalling social and economic problems. Fukuyama developed the notion of 'high trust' and 'low trust' societies, as a way of understanding trust within different societies. The purpose of this paper is to empirically test and extend Fukuyama's theory utilising data on interpersonal trust in Taiwan, Hong Kong, South Korea, Japan, Australia and Thailand. This paper focuses on trust in family, neighbours, strangers, foreigners and people with a different religion. METHODS: Cross-sectional surveys were undertaken in 2009-10, with an overall sample of 6331. Analyses of differences in overall levels of trust between countries were undertaken using Chi square analyses. Multivariate binomial logistic regression analysis was undertaken to identify socio-demographic predictors of trust in each country. RESULTS: Our data indicate a tripartite trust model: 'high trust' in Australia and Hong Kong; 'medium trust' in Japan and Taiwan; and 'low trust' in South Korea and Thailand. Trust in family and neighbours were very high across all countries, although trust in people with a different religion, trust in strangers and trust in foreigners varied considerably between countries. The regression models found a consistent group of subpopulations with low trust across the countries: people on low incomes, younger people and people with poor self-rated health. The results were conflicting for gender: females had lower trust in Thailand and Hong Kong, although in Australia, males had lower trust in strangers, whereas females had lower trust in foreigners. CONCLUSION: This paper identifies high, medium and low trust societies, in addition to high and low trusting population subgroups. Our analyses extend the seminal work of Fukuyama, providing both corroboration and

  3. The Beginner's Guide to Wind Tunnels with TunnelSim and TunnelSys

    Science.gov (United States)

    Benson, Thomas J.; Galica, Carol A.; Vila, Anthony J.

    2010-01-01

    The Beginner's Guide to Wind Tunnels is a Web-based, on-line textbook that explains and demonstrates the history, physics, and mathematics involved with wind tunnels and wind tunnel testing. The Web site contains several interactive computer programs to demonstrate scientific principles. TunnelSim is an interactive, educational computer program that demonstrates basic wind tunnel design and operation. TunnelSim is a Java (Sun Microsystems Inc.) applet that solves the continuity and Bernoulli equations to determine the velocity and pressure throughout a tunnel design. TunnelSys is a group of Java applications that mimic wind tunnel testing techniques. Using TunnelSys, a team of students designs, tests, and post-processes the data for a virtual, low speed, and aircraft wing.

  4. Incremental Trust in Grid Computing

    DEFF Research Database (Denmark)

    Brinkløv, Michael Hvalsøe; Sharp, Robin

    2007-01-01

    This paper describes a comparative simulation study of some incremental trust and reputation algorithms for handling behavioural trust in large distributed systems. Two types of reputation algorithm (based on discrete and Bayesian evaluation of ratings) and two ways of combining direct trust...... and reputation (discrete combination and combination based on fuzzy logic) are considered. The various combinations of these methods are evaluated from the point of view of their ability to respond to changes in behaviour and the ease with which suitable parameters for the algorithms can be found in the context...

  5. Trust management in cloud services

    CERN Document Server

    Noor, Talal H; Bouguettaya, Athman

    2014-01-01

    This book describes the design and implementation of Cloud Armor, a novel approach for credibility-based trust management and automatic discovery of cloud services in distributed and highly dynamic environments. This book also helps cloud users to understand the difficulties of establishing trust in cloud computing and the best criteria for selecting a service cloud. The techniques have been validated by a prototype system implementation and experimental studies using a collection of real world trust feedbacks on cloud services.The authors present the design and implementation of a novel pro

  6. Trusted counsellor retires

    CERN Multimedia

    2006-01-01

    His astute counsel, knowing smile and distinguished eloquence will be missed by many. With a pang of regret, the man himself admits that 'CERN was like a drug for me'. Last week, Jean-Daniel Mandica retired, after 40 years of loyal service. He was the trusted counsellor of every Director of the Administration and Director-General for eighteen years, from 1986 to 2003. Head of the planning unit for the Directorate and the Administration from 1986 to 1996, he was then named Head of the Directorate Services Unit in 1996, a position he held until the end of 2003. Throughout that time, he conducted key tasks for the Organization, such as restructuring the Administration and carrying out audits. His role in the creation of Microcosm and his commitment to CERN's participation in the Universal Exposition at Seville in 1992 contributed in no small part to the spread of the Laboratory's fame. Jean-Daniel Mandica's incomparable knowledge of the Administration, sense of diplomacy and great ability to listen made him a v...

  7. Ethnic Diversity and Social Trust

    DEFF Research Database (Denmark)

    Dinesen, Peter Thisted; Sønderskov, Kim Mannemar

    2015-01-01

    diversity. In contrast, we analyze how ethnic diversity of the immediate micro-context—where interethnic exposure is inevitable—affects trust. We do this using Danish survey data linked with register-based data, which enables us to obtain precise measures of the ethnic diversity of each individual......We argue that residential exposure to ethnic diversity reduces social trust. Previous within-country analyses of the relationship between contextual ethnic diversity and trust have been conducted at higher levels of aggregation, thus ignoring substantial variation in actual exposure to ethnic......’s residential surroundings. We focus on contextual diversity within a radius of 80 meters of a given individual, but we also compare the effect in the micro-context to the impact of diversity in more aggregate contexts. Our results show that ethnic diversity in the micro-context affects trust negatively...

  8. Trust me, I am Robot!

    DEFF Research Database (Denmark)

    Stoyanova, Angelina; Drefeld, Jonas; Tanev, Stoyan

    /developers to further refine their product design. The paper will conclude with a more detailed conceptual analysis of interpersonal trust in human-technology interactions. The personalization of technological artifacts or assigning personality to active objects has been considered as natural to human beings (Gombrich...... on multiple case studies. The investigation so far suggests that it will be necessary to conceptualize three types of trust – interpersonal, social trust and trust in automation. This knowledge is incorporated in a descriptive model that could be used by technology and application designers......, 1972). The analysis will use some of the insights of Byzantine philosophy (Kapriev, 2005) regarding the distinction between the terms hypostasis (unique actualization of an essence) and prosopon (persona or person) to suggest a more general notion of interpersonality that could provide some additional...

  9. Ethnic Diversity and Social Trust

    DEFF Research Database (Denmark)

    Dinesen, Peter Thisted; Sønderskov, Kim Mannemar

    2017-01-01

    Due to its wide-ranging implications for social cohesion in diversifying Western countries, the question of the potential negative consequences of ethnic diversity for social trust is arguably the most contentious question in the literature on social trust. In this chapter we critically review...... the empirical evidence for a negative relationship between contextual ethnic diversity (measured locally within countries) and social trust. We cautiously conclude that there are indications of a negative relationship, although with important variations across study characteristics including national setting......, context unit analyzed, and conditioning on moderating influences. Building on the review, we highlight a number of paths for theoretical and methodological advances, which we argue would advance the literature on the relationship between ethnic diversity and social trust....

  10. International Trust and Public Diplomacy

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    as described by Brewer, Gross, Aday and Willnat (2004). The paper is based on case studies of five Public Diplomacy activities: Iranian President Hassan Rouhani’s letter in The Washington Post (2013); Denmark’s trust-building effort in Pakistan following the so-called “Muhammad crisis” (from 2010); The British...... Council’s strategy for trust-building in China (2012); Russian President Vladimir Putin’s letter in The New York Times (2013), and the USA’s trust-building effort in Turkey (from 2006). The best results have been obtained where Public Diplomacy has been linked to successful traditional diplomacy at state...... for a Public Diplomacy initiative to succeed. From a social responsible perspective journalists may have a role to play in creating international trust, and Public Diplomacy staffs consider it already important...

  11. Trust, dependence and interorganizational systems

    NARCIS (Netherlands)

    Ibrahim, M.K.M.

    2006-01-01

    Organizations form interorganizational relationships and utilize information technology to improve performance. This thesis discusses the influences of dependence and different types of trust on the use of interorganizational systems and subsequently the attainment of strategic benefits. The

  12. Metadata trust in a personal video recorder

    NARCIS (Netherlands)

    Boertjes, E.M.

    2004-01-01

    Trust is the belief or confidence in someone that their recommendations will work for you, i.e. that you will like the TV-programs (or other content) that they recommend. Many systems incorporate some notion of trust. Trust is more than similarity in taste, which makes trust a broader concept than

  13. 7 CFR 1400.100 - Revocable trust.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Revocable trust. 1400.100 Section 1400.100... AND SUBSEQUENT CROP, PROGRAM, OR FISCAL YEARS Payment Limitation § 1400.100 Revocable trust. A revocable trust and the grantor of the trust will be considered to be the same person. ...

  14. Trust, Behavior, and High School Outcomes

    Science.gov (United States)

    Romero, Lisa S.

    2015-01-01

    Purpose: The purpose of this paper is to contribute to the literature on student trust and to examine the relationship between student trust, behavior, and academic outcomes in high school. It asks, first, does trust have a positive effect on high school outcomes? Second, does trust influence student behavior, exerting an indirect effect on…

  15. A Formal Model for Trust Lifecycle Management

    DEFF Research Database (Denmark)

    Wagealla, Waleed; Carbone, Marco; English, Colin

    2003-01-01

    We propose a formal model of trust informed by the Global Computing scenario and focusing on the aspects of trust formation, evolution, and propagation. The model is based on a novel notion of trust structures which, building on concepts from trust management and domain theory, feature at the same...

  16. The Complex Relationship between Cyberbullying and Trust

    Science.gov (United States)

    Pieschl, Stephanie; Porsch, Torsten

    2017-01-01

    Theoretically, there are strong arguments for a relationship between cyberbullying and trust. On the one hand, trust is built on experiences; thus, experiences of malevolence such as cyberbullying might contribute to low trust. On the other hand, high trust may lead to risky online behavior such as self-disclosures that could increase the risk of…

  17. Building and Understanding Trust Relationships

    Science.gov (United States)

    2012-03-17

    to create cultures in new groups, but also to manage cultural issues in mature organizations.”57 Senior military leaders face the challenge of...no different . It requires military leaders to adhere to responsibilities, remain politically neutral, and provide viable military alternatives when... debate and formulation process.82 As trust goes, so does influence. Without trust, even the most highly decorated senior military leader increase the

  18. The Relationship between Teamwork and Organizational Trust

    Directory of Open Access Journals (Sweden)

    Musab Işık

    2015-04-01

    Full Text Available The aim of this study is to investigate the relationship between teamwork and organizational trust. In the implementation section the data from the survey of 250 workers is employed in call centers in Erzurum by using relevant statistical methods. Consequently, it is found that there is a positive and significant relationship between teamwork and organizational trust. Thus, the hypothesis of the study is supported as it was expected. Besides, it is found that there are positive and significant relationships between communication, openness to innovation, participation-trust in teamwork and organizational trust, trust in management, trust in co-workers, and trust in workplace.

  19. Trust is a must: What is involved in trusting those who manage forest fires?

    Science.gov (United States)

    Adam Liljeblad; Bill Borrie; Alan Watson

    2010-01-01

    Trust is a complicated emotion. In the past, many social scientists have studied trust. They discovered that trust involves a number of beliefs and emotions. The scientists in this study were interested in learning more about trust. They believed that forest managers can do a better job if people trust them to do what is best for citizens and the environment (figure 1...

  20. An Operational Semantics for Trust Policies

    DEFF Research Database (Denmark)

    Krukow, Karl Kristian

    2005-01-01

    In the trust-structure model of trust management, principals specify their trusting relationships with other principals in terms of trust policies. In their paper on trust structures, Carbone et al. present a language for trust policies, and provide a suitable denotational semantics. The semantics...... ensures that for any collection of trust policies, there is always a unique global trust-state, compatible with all the policies, specifying everyone's degree of trust in everyone else. However, as the authors themselves point out, the language lacks an operational model: the global trust-state is a well......-defined mathematical object, but it is not clear how principals can actually compute it. This becomes even more apparent when one considers the intended application environment: vast numbers of autonomous principals, distributed and possibly mobile. We provide a compositional operational semantics for a language...

  1. Trust and Online Reputation Systems

    Science.gov (United States)

    Kwan, Ming; Ramachandran, Deepak

    Web 2.0 technologies provide organizations with unprecedented opportunities to expand and solidify relationships with their customers, partners, and employees—while empowering firms to define entirely new business models focused on sharing information in online collaborative environments. Yet, in and of themselves, these technologies cannot ensure productive online interactions. Leading enterprises that are experimenting with social networks and online communities are already discovering this fact and along with it, the importance of establishing trust as the foundation for online collaboration and transactions. Just as today's consumers must feel secure to bank, exchange personal information and purchase products and services online; participants in Web 2.0 initiatives will only accept the higher levels of risk and exposure inherent in e-commerce and Web collaboration in an environment of trust. Indeed, only by attending to the need to cultivate online trust with customers, partners and employees will enterprises ever fully exploit the expanded business potential posed by Web 2.0. But developing online trust is no easy feat. While various preliminary attempts have occurred, no definitive model for establishing or measuring it has yet been established. To that end, nGenera has identified three, distinct dimensions of online trust: reputation (quantitative-based); relationship (qualitative-based) and process (system-based). When considered together, they form a valuable model for understanding online trust and a toolbox for cultivating it to support Web 2.0 initiatives.

  2. Tunneling in axion monodromy

    Energy Technology Data Exchange (ETDEWEB)

    Brown, Jon; Cottrell, William; Shiu, Gary; Soler, Pablo [Department of Physics, University of Wisconsin,Madison, WI 53706 (United States)

    2016-10-06

    The Coleman formula for vacuum decay and bubble nucleation has been used to estimate the tunneling rate in models of axion monodromy in recent literature. However, several of Coleman’s original assumptions do not hold for such models. Here we derive a new estimate with this in mind using a similar Euclidean procedure. We find that there are significant regions of parameter space for which the tunneling rate in axion monodromy is not well approximated by the Coleman formula. However, there is also a regime relevant to large field inflation in which both estimates parametrically agree. We also briefly comment on the applications of our results to the relaxion scenario.

  3. LEP tunnel monorail

    CERN Multimedia

    1985-01-01

    A monorail from CERN's Large Electron Positron collider (LEP, for short). It ran around the 27km tunnel, transporting equipment and personnel. With its 27-kilometre circumference, LEP was the largest electron-positron accelerator ever built and ran from 1989 to 2000. During 11 years of research, LEP's experiments provided a detailed study of the electroweak interaction. Measurements performed at LEP also proved that there are three – and only three – generations of particles of matter. LEP was closed down on 2 November 2000 to make way for the construction of the Large Hadron Collider in the same tunnel.

  4. Breaking through the tranfer tunnel

    CERN Multimedia

    Laurent Guiraud

    2001-01-01

    This image shows the tunnel boring machine breaking through the transfer tunnel into the LHC tunnel. Proton beams will be transferred from the SPS pre-accelerator to the LHC at 450 GeV through two specially constructed transfer tunnels. From left to right: LHC Project Director, Lyn Evans; CERN Director-General (at the time), Luciano Maiani, and Director for Accelerators, Kurt Hubner.

  5. Zero-Time Tunneling - Revisited

    Science.gov (United States)

    Nimtz, Günter; Aichmann, Horst

    2017-08-01

    Since 1931, the nonclassical process of tunneling was conjectured to have a zero-time delay in the barrier. These theories have been rejected and denied. However, photonic and recent electronic tunneling experiments have proven the zero-time prediction. Tunneling is due to virtual wave packets in electromagnetic, elastic, and Schrödinger wave fields up to the macroscopic level. In this article we cite theoretical and experimental studies on zero-time tunneling, which have proven this striking behavior.

  6. On what bases? The role of trust cues in longitudinal trust development during newcomer socialisation

    OpenAIRE

    van der Werff, Lisa

    2014-01-01

    Despite recent theoretical advances, the pattern of trust development between coworkers is a topic of dispute and many basic trust processes remain unclear. Increasingly, trust researchers are recognising that trust development is a context specific process that requires more nuanced empirical investigation of trust changes over time and in specific situations. Furthermore, theory suggests that employees attend to an array of independent trust cues but it fails to identify which cues are impo...

  7. The Process Perspective on Trust in Organizations

    DEFF Research Database (Denmark)

    Jagd, Søren

    Several trust researchers have pointed to the relevance of the process perspective for understanding trust in organizations. In this paper I review the attempts to apply the process perspective in trust research distinguishing between a soft and a strong process perspective. It appears that nearly......’s history? A few examples of studies applying a strong process perspective to trust in organizations is discussed.  Summarising, I argue that the process perspective, in general, may contribute furthering the understanding of the complexities of the development of trust over time and that the strong process...... all process oriented trust researchers have applied the weak process perspective having studied questions like: how trust processes get started; how the trust process may grow and develop over time; and how to understand the qualitative transformations of trust in the course of a relationship...

  8. Tunnelling with wormhole creation

    Energy Technology Data Exchange (ETDEWEB)

    Ansoldi, S. [National Institute of Nuclear Physics (INFN) (Italy); Tanaka, T., E-mail: tanaka@yukawa.kyoto-u.ac.jp [Kyoto University, Department of Physics (Japan)

    2015-03-15

    The description of quantum tunnelling in the presence of gravity shows subtleties in some cases. We discuss wormhole production in the context of the spherically symmetric thin-shell approximation. By presenting a fully consistent treatment based on canonical quantization, we solve a controversy present in the literature.

  9. Tunnelling Effects in Chemistry

    Indian Academy of Sciences (India)

    IAS Admin

    Tunnelling Effects in Chemistry. Molecules in the Strange Quantum World. Sharmistha Karmakar, Deepthi Jose and Ayan Datta. (left) Sharmistha Karmakar is doing her PhD in the group of. Ayan Datta, IACS,. Kolkata. Her research interests are modelling molecules with strong optical absorbtion and emission properties.

  10. Signatures of chaotic tunnelling

    OpenAIRE

    Mouchet, Amaury; Delande, Dominique

    2002-01-01

    Recent experiments with cold atoms provide a significant step toward a better understanding of tunnelling when irregular dynamics is present at the classical level. In this paper, we lay out numerical studies which shed light on the previous experiments, help to clarify the underlying physics and have the ambition to be guidelines for future experiments.

  11. INCAS SUBSONIC WIND TUNNEL

    Directory of Open Access Journals (Sweden)

    Corneliu STOICA

    2009-09-01

    Full Text Available The INCAS Subsonic Wind Tunnel is a closed circuit, continuous, atmospheric pressure facility with a maximum speed of 110 m/s. The test section is octagonal ,of 2.5 m wide, 2.0 m high and 4 m long. The tunnel is powered by a 1200 kW, air cooled variable speed DC motor which drives a 12 blade, 3.5 m diameter fan and is equipped with a six component pyramidal type external mechanical balance with a 700 Kgf maximum lift capacity.The angle of attack range is between -45º and +45º while the yaw angle range is between -140º and +216º .The data acquisition system has been modified recently to allow the recording of all test data on a PC - type computer using LABVIEW and a PXI – type chassis containing specialized data acquisition modules.The tunnel is equipped with a variable frequency electrical supply system for powered models and a 10 bar compressed air supply for pneumatic flow control applications.In the recent years the subsonic wind tunnel has been intensively used for tests within several European projects (AVERT, CESAR and others.

  12. Carpal tunnel release

    DEFF Research Database (Denmark)

    Larsen, Morten Bo; Sørensen, A I; Crone, K L

    2013-01-01

    A single-blind, randomized, controlled trial was done to compare the results of carpal tunnel release using classic incision, short incision, or endoscopic technique. In total, 90 consecutive cases were included. Follow-up was 24 weeks. We found a significantly shorter sick leave in the endoscopic...

  13. Tunnelling Effects in Chemistry

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 19; Issue 2. Tunnelling Effects in Chemistry: Molecules in the Strange Quantum World. Sharmistha Karmakar Deepthi Jose Ayan Datta. General Article Volume 19 Issue 2 February 2014 pp 160-174 ...

  14. 25 CFR 115.815 - How does a tribe request trust funds from a tribal trust account?

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false How does a tribe request trust funds from a tribal trust... ACTIVITIES TRUST FUNDS FOR TRIBES AND INDIVIDUAL INDIANS Tribal Accounts Withdrawing Tribal Trust Funds § 115.815 How does a tribe request trust funds from a tribal trust account? To request trust funds from a...

  15. Trust Management System for Opportunistic Cloud Services

    DEFF Research Database (Denmark)

    Kuada, Eric

    2013-01-01

    We have over the past three years been working on the feasibility of Opportunistic Cloud Services (OCS) for enterprises. OCS is about enterprises strategically contributing and utilizing spare IT resources as cloud services. One of the major challenges that such a platform faces is data security...... and trust management issues. This paper presents a trust management system for OCS platforms. It models the concept of trust and applies it to OCS platforms. The trust model and the trust management system are verified through the simulation of the computation of the trust values with Infrastructure...

  16. Trust-Based Leadership in the Making

    DEFF Research Database (Denmark)

    Bentzen, Tina Øllgaard; Jagd, Søren

    I spite of the popularity of trust-based leadership in consultancy and popular management writings empirical research on the transformation from traditional top-down to trust-based leadership is still limited. In this paper we study the implementation of a trust-based leadership reform in the City...... of Copenhagen taking place since 2012. We focus on understanding the trust dynamics in this major transformation. We show that the implementation of trust-based leadership should be seen as an emergent process involving a variety of actors within the organization. The case study reveals that the Trust Reform...

  17. Disaggregating ethnoracial disparities in physician trust.

    Science.gov (United States)

    Sewell, Abigail A

    2015-11-01

    Past research yields mixed evidence regarding whether ethnoracial minorities trust physicians less than Whites. Using the 2002 and 2006 General Social Surveys, variegated ethnoracial differences in trust in physicians are identified by disaggregating a multidimensional physician trust scale. Compared to Whites, Blacks are less likely to trust the technical judgment and interpersonal competence of doctors. Latinos are less likely than Whites to trust the fiduciary ethic, technical judgment, and interpersonal competence of doctors. Black-Latino differences in physician trust are a function of ethnoracial differences in parental nativity. The ways ethnoracial hierarchies are inscribed into power-imbalanced clinical exchanges are discussed. Copyright © 2015 Elsevier Inc. All rights reserved.

  18. Analyzing Trust Perceptions in System Implementations

    DEFF Research Database (Denmark)

    Schlichter, Bjarne Rerup; Rose, Jeremy

    2009-01-01

    mount, trust relations become strained, leading to a circle of suspicion and disbelief which is both destructive and hard to break out of. This case study analyses trust relations during a problematic period of time in the implementation of the Faroese integrated healthcare information system, using......' perceptions of trust relations influence future actions, and in this way have both negative and positive consequences. We also conclude that Giddens' theories of trust provide a promising insight into the dynamic aspects of trust relations in implementation projects, which go further than trust theories...

  19. A Trusted Portable Computing Device

    Science.gov (United States)

    Ming-wei, Fang; Jun-jun, Wu; Peng-fei, Yu; Xin-fang, Zhang

    A trusted portable computing device and its security mechanism were presented to solve the security issues, such as the attack of virus and Trojan horse, the lost and stolen of storage device, in mobile office. It used smart card to build a trusted portable security base, virtualization to create a secure virtual execution environment, two-factor authentication mechanism to identify legitimate users, and dynamic encryption to protect data privacy. The security environment described in this paper is characteristic of portability, security and reliability. It can meet the security requirement of mobile office.

  20. A Calculus for Trust Management

    DEFF Research Database (Denmark)

    Carbone, Marco; Nielsen, Mogens; Sassone, Vladimiro

    2004-01-01

    We introduce ctm, a process calculus which embodies a notion of trust for global computing systems. In ctm each principal (location) is equipped with a policy, which determines its legal behaviour, and with a protocol, which allows interactions between principals and the flow of information from...... principals to policies. We elect to formalise policies using a Datalog-like logic, and to express protocols in the process algebra style. This yields an expressive calculus very suitable for the global computing scenarios, and provides a formalisation of notions such as trust evolution. For ctm we define...

  1. Learning to trust: trust and attachment in early psychosis

    NARCIS (Netherlands)

    Fett, A.J.; Shergill, S.; Korver-Nieberg, N.; Yakub, F.; Gromann, P.; Krabbendam, L.

    2016-01-01

    Background Distrust and social dysfunction are characteristic in psychosis and may arise from attachment insecurity, which is elevated in the disorder. The relationship between trust and attachment in the early stages of psychosis is unknown, yet could help to understand interpersonal difficulties

  2. Maintaining control while delegating trust: Integrity constraints in trust management

    NARCIS (Netherlands)

    Etalle, Sandro; Winsborough, William H.

    2009-01-01

    We introduce the use, monitoring, and enforcement of integrity constraints in trust management-style authorization systems. We consider what portions of the policy state must be monitored to detect violations of integrity constraints. Then, we address the fact that not all participants in a

  3. An Operational Semantics for Trust Policies

    DEFF Research Database (Denmark)

    Krukow, Karl

    2006-01-01

    In the trust-structure framework for trust management, principals specify their trusting relationships in terms of trust policies. In their paper on trust structures, Carbone et al. present a language for such policies, and provide a suitable denotational semantics. The semantics ensures that for......In the trust-structure framework for trust management, principals specify their trusting relationships in terms of trust policies. In their paper on trust structures, Carbone et al. present a language for such policies, and provide a suitable denotational semantics. The semantics ensures...... that for any collection of policies, there is always a unique global trust-state, compatible with all the policies, specifying everyone's degree of trust in everyone else. However, as the authors themselves point out, the language lacks an operational model: the global trust-state is a well......-defined mathematical object, but it is not clear how principals can actually compute it. This becomes even more apparent when one considers the intended application environment: vast numbers of autonomous principals, distributed and possibly mobile. We provide a compositional operational semantics for a language...

  4. Trusted Product Evaluations. A Guide for Vendors

    National Research Council Canada - National Science Library

    1990-01-01

    Trusted Product Evaluations: A Guide for Vendors describes procedures for conducting business with the Information Systems Security Organization within the National Security Agency using the Trusted Product Evaluation Program...

  5. Trust Networks on the Semantic Web

    National Research Council Canada - National Science Library

    Golbeck, Jennifer; Parisa, Bijan; Hendler, James

    2006-01-01

    The so-called "Web of Trust" is one of the ultimate goals of the Semantic Web. Research on the topic of trust in this domain has focused largely on digital signatures, certificates, and authentication...

  6. 77 FR 39143 - Executive Branch Qualified Trusts

    Science.gov (United States)

    2012-07-02

    ... executive branch qualified trust, an entity must meet the strict requirements for independence set forth in... this subpart. A parent or guardian may execute the umbrella trust agreement on behalf of a required...

  7. Programmable ferroelectric tunnel memristor

    Directory of Open Access Journals (Sweden)

    Andy eQuindeau

    2014-02-01

    Full Text Available We report an analogously programmable memristor based on genuine electronic resistive switching combining ferroelectric switching and electron tunneling. The tunnel current through an 8 unit cell thick epitaxial Pb(Zr[0.2]Ti[0.8]O[3] film sandwiched between La[0.7]Sr[0.3]MnO[3] and cobalt electrodes obeys the Kolmogorov-Avrami-Ishibashi model for bidimensional growth with a characteristic switching time in the order of 10^-7 seconds. The analytical description of switching kinetics allows us to develop a characteristic transfer function that has only one parameter viz. the characteristic switching time and fully predicts the resistive states of this type of memristor.

  8. Educational Wind Tunnel

    Directory of Open Access Journals (Sweden)

    Juozas Bielskus

    2012-12-01

    Full Text Available The paper analyzes an educational wind tunnel produced by the Department of Building Energetics (DBE of Vilnius Gediminas Technical University. The equipment could be used for performing laboratory works and simple research. The article presents the projection of inflow and outlet velocity in the working chamber of DBE wind tunnel and carries out actual noise level measurement. The received data are compared with information on the level of noise generated by the fan considering instructions provided by the manufacturer. In order to assess the reliability of the computer program, simulation applying PHOENICS software has been conducted. The aim of modeling is to simulate a pilot model and to compare the obtained results with those of an analogous test presented in scientific articles.Article in Lithuanian

  9. Nanowire resonant tunneling diodes

    Science.gov (United States)

    Björk, M. T.; Ohlsson, B. J.; Thelander, C.; Persson, A. I.; Deppert, K.; Wallenberg, L. R.; Samuelson, L.

    2002-12-01

    Semiconductor heterostructures and their implementation into electronic and photonic devices have had tremendous impact on science and technology. In the development of quantum nanoelectronics, one-dimensional (1D) heterostructure devices are receiving a lot of interest. We report here functional 1D resonant tunneling diodes obtained via bottom-up assembly of designed segments of different semiconductor materials in III/V nanowires. The emitter, collector, and the central quantum dot are made from InAs and the barrier material from InP. Ideal resonant tunneling behavior, with peak-to-valley ratios of up to 50:1 and current densities of 1 nA/μm2 was observed at low temperatures.

  10. The beam dump tunnels

    CERN Multimedia

    Patrice Loïez

    2002-01-01

    In these images workers are digging the tunnels that will be used to dump the counter-circulating beams. Travelling just a fraction under the speed of light, the beams at the LHC will each carry the energy of an aircraft carrier travelling at 12 knots. In order to dispose of these beams safely, a beam dump is used to extract the beam and diffuse it before it collides with a radiation shielded graphite target.

  11. Social Capital. Trust and Ideology

    Directory of Open Access Journals (Sweden)

    Jacek TITTENBRUN

    2013-06-01

    Full Text Available The paper offers a critical analysis of the central concept around which the popular construct of social capital is organised, i.e. trust. To this end the views of Fukuyama, the leading exponent of the said concept are considered. As a result, the concept in question is found to be ideologically charged and substantively weak in many respects.

  12. TEE-Based Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe

    Today, it is safe to assume that any program or data can be compromised, if they are not protected by hardware within a secure area. Systems based on crypto-processors (e.g., a trusted platform module, a smart card or a hardware security module) rely on the properties of tamper resistant hardware...

  13. International trust and public diplomacy

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    2015-01-01

    descriptions of public diplomacy activities, public polls, and scholarly literature. Public diplomacy ideas discussed include lightshow, hand-on cooperation, win-win projects, and the creation of frameworks for self-expression. A central concept is international trust as described by Brewer, Gross, Aday...

  14. INNOVATION - THE ROLE OF TRUST

    Directory of Open Access Journals (Sweden)

    Kornélia Lazányi

    2017-11-01

    Full Text Available Innovations and constant change are inevitable parts of our everyday lives. It is not only because advanced technologies are more effective, but mostly because in the 21st century more and more realise that scarce resources – among them the safe and clean environment as such - necessitate a paradigm change and intense innovation. This revolution is easily trackable in the organisational and (supranational policies. However, innovation, and its necessary prerequisites are seldom investigated from the individuals’ point of view. It is easy to understand that inter-organisational trust is inevitable on both the consumers’ and the providers’ (innovators’ side, however, it has to be made clear that an innovative organisation has to create a trusting environment within the company, in order to foster collaboration, the generation of new ideas, creativity and finally innovation. The present paper endeavours to call attention to the notion of trust and its antecedents and consequences in relation to innovations. The aim is to provide assistance in understanding how to develop trust in each other and hence foster further innovations and development.

  15. Ombud's Corner: tried and trusted

    CERN Multimedia

    Sudeshna Datta-Cockerill

    2014-01-01

    Trust is an essential ingredient in all working relationships. When trust breaks down, conflicts may arise and teams may stop working in harmony. The Ombud is there to help you to find your way out before the point of no return is reached.   Reliability, integrity, expertise and good will: these are the four pillars on which trust is built. Trust between colleagues may break down for many different reasons, including misunderstandings, and the way to restoring the relationship is through working on these four pillars. For instance, if we assume that we do indeed have the expertise to deal with a particular task assigned to us, we may need to improve our reliability by making sure that we meet deadlines and expectations or demonstrate our integrity by acknowledging and accepting accountability for this, all the while showing that we are doing our best to do whatever it takes to achieve the common goals and restore our colleagues’ faith in us. All four of these pillars need to be in...

  16. Secure Hardware Design for Trust

    Science.gov (United States)

    2014-03-01

    benchmarks as the algorithm takes the fault propagation and masking effects into account. In these types of encryption, a fault is always excited on...Multiplier with incorrect key. 6.3. Grain using Sequential XOR Logic Encryption Cryptographic algorithms are a key feature in secure and trusted...10 6.1.1 AES Algorithm Details

  17. Design for Trust - Online Grocery Shopping

    OpenAIRE

    Karahasanovic, Amela; Holm, Kristoffer T.; Nejad, Aria

    2017-01-01

    This paper presents our ongoing research into trust and the risks related to online grocery shopping. More specifically, we investigate how to increase customer trust when buying perishable products online. Online grocery shopping is an increasing trend in many countries, and several studies on trust have been conducted in the context of online grocery shopping. However, knowledge of how to improve trust and reduce risks is rather limited in this context. Through design, prototyping and user ...

  18. Consumer Trust in E-commerce

    OpenAIRE

    Gustavsson, Malin; Johansson, Anne-Marie

    2006-01-01

    An often mentioned reason for consumers not purchasing from Internet vendors, is the lack of trust. The lack of physical clues and physical interaction in the online environment make it more difficult to establish trust with the consumers. So, it is important for companies to learn how to manage consumers’ trust in e-commerce. Although, building consumer trust on the Internet is a challenge for online vendors. The purpose with this dissertation was to get a better understanding of consumer t...

  19. Culture and Consumer Trust in Online Businesses

    OpenAIRE

    Robert Greenberg; Bernard Wong-On-Wing; Gladie Lui

    2008-01-01

    The importance of consumer trust to the success of online businesses is well documented in the literature. Given the global nature of online transactions, an important question is whether trust and trust formation differ across cultures. This study compared Hong Kong and U.S. consumer trust in online businesses. Specifically, the study examined security and privacy risks related to the purchase of products as well as services. The results show that significant differences exist between consum...

  20. Inferring Trust Based on Similarity with TILLIT

    Science.gov (United States)

    Tavakolifard, Mozhgan; Herrmann, Peter; Knapskog, Svein J.

    A network of people having established trust relations and a model for propagation of related trust scores are fundamental building blocks in many of today’s most successful e-commerce and recommendation systems. However, the web of trust is often too sparse to predict trust values between non-familiar people with high accuracy. Trust inferences are transitive associations among users in the context of an underlying social network and may provide additional information to alleviate the consequences of the sparsity and possible cold-start problems. Such approaches are helpful, provided that a complete trust path exists between the two users. An alternative approach to the problem is advocated in this paper. Based on collaborative filtering one can exploit the like-mindedness resp. similarity of individuals to infer trust to yet unknown parties which increases the trust relations in the web. For instance, if one knows that with respect to a specific property, two parties are trusted alike by a large number of different trusters, one can assume that they are similar. Thus, if one has a certain degree of trust to the one party, one can safely assume a very similar trustworthiness of the other one. In an attempt to provide high quality recommendations and proper initial trust values even when no complete trust propagation path or user profile exists, we propose TILLIT — a model based on combination of trust inferences and user similarity. The similarity is derived from the structure of the trust graph and users’ trust behavior as opposed to other collaborative-filtering based approaches which use ratings of items or user’s profile. We describe an algorithm realizing the approach based on a combination of trust inferences and user similarity, and validate the algorithm using a real large-scale data-set.

  1. PROBLEM OF TRUST TO POWER IN RUSSIA

    Directory of Open Access Journals (Sweden)

    Alexander V. Tsarev

    2014-01-01

    Full Text Available Currently the topic of trust is very important. The most important problem of our country at the present stage performs low level of trust relationships between people, business, government. Generally trust is an integral part of society and is manifested in all its spheres. Directly, this paper analyzes the trust in the political sphere. Mostly, the task is to assess the level of public confidence in the existing government in our country.

  2. Validation and verification of agent models for trust: Independent compared to relative trust

    NARCIS (Netherlands)

    Hoogendoorn, M.; Jaffry, S.W.; Maanen, P.P. van

    2011-01-01

    In this paper, the results of a validation experiment for two existing computational trust models describing human trust are reported. One model uses experiences of performance in order to estimate the trust in different trustees. The second model in addition carries the notion of relative trust.

  3. Trust and School Life: The Role of Trust for Learning, Teaching, Leading, and Bridging

    Science.gov (United States)

    Van Maele, Dimitri, Ed.; Forsyth, Patrick B., Ed.; Van Houtte, Miek, Ed.

    2014-01-01

    This book samples recent and emerging trust research in education including an array of conceptual approaches, measurement innovations, and explored determinants and outcomes of trust. The collection of pathways explores the phenomenon of trust and establishes the significance of trust relationships in school life. It emboldens the claim that…

  4. Public trust: expectancies, beliefs, and behavior

    NARCIS (Netherlands)

    Alink, D.

    2014-01-01

    Most people think of trust as the bonding force between people in romantic, professional, and family relationships. Of growing importance however is public trust: trust in organizations that are not represented by a single person, such as companies, non-profit organizations and governmental

  5. Trust and Relationship Building in Electronic Commerce.

    Science.gov (United States)

    Papadopoulou, Panagiota; Andreou, Andreas; Kanellis, Panagiotis; Martakos, Drakoulis

    2001-01-01

    Discussion of the need for trust in electronic commerce to build customer relationships focuses on a model drawn from established theoretical work on trust and relationship marketing that highlights differences between traditional and electronic commerce. Considers how trust can be built into virtual environments. (Contains 50 references.)…

  6. Trust and innovativeness in virtual organisations

    NARCIS (Netherlands)

    Pournaras, E.; Lazakidou, A.

    2008-01-01

    This paper discusses trust and control in a virtualised environment. An extensive use of information and communication technology, and virtualisation of organisations put trust into the core of management challenges. Trust is a glue that bonds individuals and groups together to form virtual teams

  7. 26 CFR 301.7701-4 - Trusts.

    Science.gov (United States)

    2010-04-01

    ..., therefore, are not associates in a joint enterprise for the conduct of business for profit. (b) Business... remediation trust if the organization is organized under state law as a trust; the primary purpose of the... federal, state, or local environmental laws; all contributors to the trust have (at the time of...

  8. Trusted Truck(R) II (phase A).

    Science.gov (United States)

    2009-01-01

    The Trusted Truck Program was initiated in 2003 as a joint effort by NTRCI, Volvo and UT. The vision of the Trusted Truck program is to develop a secure and "trusted" transport solution from pickup to delivery. The program's objective is to incre...

  9. 46 CFR 67.36 - Trust.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 2 2010-10-01 2010-10-01 false Trust. 67.36 Section 67.36 Shipping COAST GUARD... Citizenship Requirements for Vessel Documentation § 67.36 Trust. (a) For the purpose of obtaining a registry or recreational endorsement, a trust arrangement meets citizenship requirements if: (1) Each of its...

  10. 40 CFR 280.102 - Trust fund.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 26 2010-07-01 2010-07-01 false Trust fund. 280.102 Section 280.102...) Financial Responsibility § 280.102 Trust fund. (a) An owner or operator may satisfy the requirements of § 280.93 by establishing a trust fund that conforms to the requirements of this section. The trustee...

  11. 75 FR 66977 - Housing Trust Fund

    Science.gov (United States)

    2010-10-29

    ... Housing and Urban Development 24 CFR Parts 91 and 92 Housing Trust Fund; Proposed Rule #0;#0;Federal... URBAN DEVELOPMENT 24 CFR Parts 91 and 92 RIN 2506-AC30 Housing Trust Fund AGENCY: Office of the... and Economic Recovery Act of 2008 establishes a Housing Trust Fund (HTF) to be administered by HUD...

  12. 7 CFR 46.46 - Statutory trust.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Statutory trust. 46.46 Section 46.46 Agriculture... THAN RULES OF PRACTICE) UNDER THE PERISHABLE AGRICULTURAL COMMODITIES ACT, 1930 Statutory Trust § 46.46 Statutory trust. (a) Definitions. (1) “Received” means the time when the buyer, receiver, or agent gains...

  13. Animal Behaviour: Friendship Enhances Trust in Chimpanzees.

    Science.gov (United States)

    Silk, Joan

    2016-01-25

    Individuals that participate in exchanges with delayed rewards can be exploited if their partners don't reciprocate. In humans, friendships are built on trust, and trust enhances cooperation. New evidence suggests that close social bonds also enhance trust in chimpanzees. Copyright © 2016 Elsevier Ltd. All rights reserved.

  14. Temperament Constructs Related to Betrayal of Trust

    Science.gov (United States)

    1991-12-01

    disintegrate. The interrelatedness between system trust and interpersonal trust has been noted by Durkheim (1933), who predicted a loss of trust in others...and suspicion. Journal of Conflict Resolution, 2, 265-279. Durkheim , E. (1933). The division of labor in societ’. New York: Free Press of Glencoe

  15. Control Is Good, But Trust Is Cheaper

    DEFF Research Database (Denmark)

    Jensen, Keld; Svendsen, Gert Tinggaard

    2014-01-01

    Trust or Control? Trust-Based Management and the Thriving Workplace Lenin once said, “Trust is good, but control is better” – and many a modern manager seems to agree. One sees precious time and resources plowed into paper-pushing, form-filling, and the drafting of voluminous, hyper-detailed cont...

  16. Trust in Client-Vendor Relations

    DEFF Research Database (Denmark)

    Tøth, Thomas

    2014-01-01

    and organizational boundaries within the field of IT offshore outsourcing. The article concludes that trust is primarily established when the teams are meeting face-to-face and in order to establish trust at a distance they are dependent on technology being readily available and on engaging in active trust building...

  17. The edge of trust : An introduction

    NARCIS (Netherlands)

    Evans, A.M.; Krueger, J.I.

    2015-01-01

    The dynamics of interpersonal trust are an essential part of understanding how people think and act in social interactions. Trust enables human beings to form meaningful personal relationships (Simpson, 2007) and engage in mutually profitable social and economic exchanges (Kohn, 2008). Yet, trust is

  18. Heuritic Trust in IoT

    DEFF Research Database (Denmark)

    Kaur, Bipjeet; Tange, Henrik

    2015-01-01

    Increasing use of Internet of things in diverse fields has demanding association in security and trust of such services. The trust on the services cannot exist independent. It is greatly depended on the security of system at each layer. In this paper we analyze different existing trust algorithms...

  19. The Effects of Trust Transference, Mobile Attributes and Enjoyment on Mobile Trust

    Directory of Open Access Journals (Sweden)

    Cristiane Junqueira Giovannini

    2015-01-01

    Full Text Available Trust is essential in building relationships. In mobile commerce, as in electronic commerce, trust is even more valuable given the absence of human contact and direct observation of the service provider. Despite the importance of trust for mobile commerce, there has been little academic effort to study the relationships between mobile devices unique components of interactivity and customer trust, or the relationship between offline, online and mobile trust. This study proposes a trust-mediated model for customer attitude and transaction intentions in mobile commerce contexts that incorporates trust transference and unique factors present in mobile commerce. Data were collected in an online survey and analyzed via structural equations modeling. Results suggest that trust transferred from online contexts and ease of use have significant effects on mobile trust formation, while also indicating that mobile trust influences consumers’ attitudes and intentions to purchase using mobile devices.

  20. Passive fire protection measures for concrete tunnels

    NARCIS (Netherlands)

    Both, C.; Haar, P.W. van de; Tan, G.L.; Wolsink, G.M.

    1999-01-01

    executed or in the process of designing; worth mentioning are the Western Scheld tunnel (approximately 2x6.5 km), the tunnels in the Betuwe railway and the tunnels in the HSL (high velocity train) railway. The most prominent of these tunnels will be executed as bored tunnels. The Directorate-General

  1. Leader trustworthy behavior and organizational trust: The role of the immediate manager for cultivating trust

    OpenAIRE

    Thomas, Geoff; Legood, A; Sacramento, C

    2016-01-01

    Drawing from both trust-building theory and interpersonal trust literature, we investigate how trust between a leader and follower may be leveraged to influence organizational trust. We also explore the mediating mechanisms of this link and test a potential moderator. A cross-sectional, multi-foci design was adopted and participants were 201 employees within a public sector organization. Leader trustworthy behavior was found to predict organizational trust, mediated by trustworthiness percept...

  2. Investing in Low-Trust Countries: Trust in the Global Mutual Fund Industry

    OpenAIRE

    Massa, Massimo; Wang, Chengwei; Zhang, Hong; Zhang, Jian

    2015-01-01

    We hypothesize that trust plays an important role in affecting the activeness and effectiveness of the global mutual fund industry. Empirically, trust is positively associated with the activeness of domestic funds, whereas for internationals mutual funds conducting cross-border investments activeness is bounded by the trust of low-trust countries. In both cases, trust-related active share delivers superior performance, whereas the economic magnitude is larger for cross-border investments (aro...

  3. Toward a generic model of trust for electronic commerce

    NARCIS (Netherlands)

    Tan, YH; Thoen, W

    2000-01-01

    The authors present a generic model of trust for electronic commerce consisting of two basic components, party trust and control trust, based on the concept that trust in a transaction with another party combines trust in the other parry and trust in the control mechanisms that ensure the successful

  4. Predators and the public trust.

    Science.gov (United States)

    Treves, Adrian; Chapron, Guillaume; López-Bao, Jose V; Shoemaker, Chase; Goeckner, Apollonia R; Bruskotter, Jeremy T

    2017-02-01

    Many democratic governments recognize a duty to conserve environmental resources, including wild animals, as a public trust for current and future citizens. These public trust principles have informed two centuries of U.S.A. Supreme Court decisions and environmental laws worldwide. Nevertheless numerous populations of large-bodied, mammalian carnivores (predators) were eradicated in the 20th century. Environmental movements and strict legal protections have fostered predator recoveries across the U.S.A. and Europe since the 1970s. Now subnational jurisdictions are regaining management authority from central governments for their predator subpopulations. Will the history of local eradication repeat or will these jurisdictions adopt public trust thinking and their obligation to broad public interests over narrower ones? We review the role of public trust principles in the restoration and preservation of controversial species. In so doing we argue for the essential roles of scientists from many disciplines concerned with biological diversity and its conservation. We look beyond species endangerment to future generations' interests in sustainability, particularly non-consumptive uses. Although our conclusions apply to all wild organisms, we focus on predators because of the particular challenges they pose for government trustees, trust managers, and society. Gray wolves Canis lupus L. deserve particular attention, because detailed information and abundant policy debates across regions have exposed four important challenges for preserving predators in the face of interest group hostility. One challenge is uncertainty and varied interpretations about public trustees' responsibilities for wildlife, which have created a mosaic of policies across jurisdictions. We explore how such mosaics have merits and drawbacks for biodiversity. The other three challenges to conserving wildlife as public trust assets are illuminated by the biology of predators and the interacting

  5. Multiple Trust Model in Online Transaction by Trusted Third Party

    OpenAIRE

    R. Suganya; C. Merlin Pauliester

    2016-01-01

    the information fortune and the connectivity are provided by the universe of E-commerce over an enormous distance at all time. In an open and distributed environment the buyers or providers will not act in a mutually understood or agreed manner by which the incomplete practices and fraudulent activities happen. So in any online transaction the security and trust are two important factors that are to be considered. In Ecommerce markets the above mentioned problems are criticized as the most im...

  6. Cubital Tunnel Syndrome: Current Concepts.

    Science.gov (United States)

    Staples, Jonathan Robert; Calfee, Ryan

    2017-10-01

    Cubital tunnel syndrome is the second most common upper extremity compressive neuropathy. In recent years, rates of surgical treatment have increased, and the popularity of in situ decompression has grown. Nonsurgical treatment, aiming to decrease both compression and traction on the ulnar nerve about the elbow, is successful in most patients with mild nerve dysfunction. Recent randomized controlled trials assessing rates of symptom resolution and ultimate success have failed to identify a preferred surgical procedure. Revision cubital tunnel surgery, most often consisting of submuscular transposition, may improve symptoms. However, ulnar nerve recovery after revision cubital tunnel surgery is less consistent than that after primary cubital tunnel surgery.

  7. Managerial Ownership Influencing Tunnelling Behaviour

    Directory of Open Access Journals (Sweden)

    Agung Juliarto

    2013-06-01

    Full Text Available This study investigates the extent and the determinants of tunnelling behaviour in five ASEAN countries (i.e. Indonesia, Malaysia, Philippines, Singapore, and Thailand. Related party transactions (RPTs in the form of loans to related parties are used as the proxy for tunnelling. With 200 firm-year observations over the period 2006-2009, this study finds a positive association between managerial ownership and the extent of tunnelling.The other important findings are that business environment (BE, foreign ownership, and independent directors are ineffective governance mechanisms to rein in tunnelling behaviour. This suggests that regulators need to evolve more effective governance mechanisms.

  8. Economic and Other Determinants of Political Trust

    Directory of Open Access Journals (Sweden)

    William R. DiPietro

    2016-01-01

    Full Text Available Political trust is important for the effective functioning of government. This paper uses cross country regression analysis to see whether three different measures of economic performance matter for political trust. The results lend support to the hypothesis that political trust is influenced by economic growth, the standard of living, and the appropriate use of government spending. In addition, the paper considers two institutional variables, perceived independence of the judiciary and the degree of democracy to assess their effect on political trust. It finds that perceived judicial independence has a positive effect on political trust, but democracy has a negative effect.

  9. Of Money And Trust In Biomedical Care

    OpenAIRE

    Joel Lexchin

    2007-01-01

    Over the past few years we have been repeatedly told that we now live in an evidence-based medical world. That should be good news since evidence comes from science. But on a deeper level doctors' and the public's faith in science rests on trust; trust that the right questions have been asked, trust that the clinical trials have been done correctly, trust that the results of the trials have been interpreted in the proper manner and trust that what finally appears in medical journals and clini...

  10. Going global: Trust research and international relations

    DEFF Research Database (Denmark)

    Ruzicka, Jan; Keating, Vincent Charles

    2015-01-01

    In this review article we explore the growing body of literature on the subject of trust in the field of international relations. We argue that the international level represents a unique challenge for trust research. This is so because some of the most pressing problems facing the world today...... require the development of trusting relationships internationally. In addition, the international environment is structurally different from domestic or personal relations on which much of the trust literature has focused so far. We identify three main strands of trust literature in international...

  11. Trust, Welfare States and Income Equality

    DEFF Research Database (Denmark)

    Bergh, Andreas; Bjørnskov, Christian

    2014-01-01

    The cross-country correlation between social trust and income equality is well documented, but few studies examine the direction of causality. We show theoretically that by facilitating cooperation, trust may lead to more equal outcomes, while the feedback from inequality to trust is ambiguous....... Using a structural equation model estimated on a large country sample, we find that trust has a positive effect on both market and net income equality. Larger welfare states lead to higher net equality but neither net income equality nor welfare state size seems to have a causal effect on trust. We...

  12. Public knowledge and public trust.

    Science.gov (United States)

    Cunningham-Burley, Sarah

    2006-01-01

    As health care applications derived from human genetics research are likely to move increasingly from 'clinic to community', there is growing interest not just in how patients understand and take up health-related genetic information but also in the views of the wider population, as well as a range of professional groups. In this paper, issues relating public knowledge and public trust are raised and discussed in an attempt to move forward debates about public involvement in genomic research and the role of sociologists within interdisciplinary teams. As the field of public understanding of science has developed, we have seen a shift from a focus on the lack of scientific literacy as problem to a recognition of the range of different knowledges that people have and use as they confront science and technology in their everyday lives. As a mood for dialogue pervades many institutions in their relations with 'publics', attention must now be paid to the way in which knowledge and expertise is expressed, heard and acted upon in dialogic encounters. There is increasing concern about public trust in science and calls to increase public confidence, particularly through more open engagement with a range of publics. However, lack of trust or loss of confidence may be constructed as problems rather than reflecting empirical reality, where more complex relationships and attitudes prevail. Lack of trust is often privatized, deeply rooted in lived experience and routinely managed. Trust relations are generally characterized by ambivalence, uncertainty and risk, and are always provisional. Drawing on selected literature and empirical research to review and illustrate this field, this paper argues that scepticism or ambivalence on the part of publics are not necessarily problems to be overcome in the interest of scientific progress, but rather should be mobilized to enhance open and public debates about the nature and direction of genomics research, medicine, and the related

  13. Political Trust and Sophistication: Taking Measurement Seriously.

    Science.gov (United States)

    Turper, Sedef; Aarts, Kees

    2017-01-01

    Political trust is an important indicator of political legitimacy. Hence, seemingly decreasing levels of political trust in Western democracies have stimulated a growing body of research on the causes and consequences of political trust. However, the neglect of potential measurement problems of political trust raises doubts about the findings of earlier studies. The current study revisits the measurement of political trust and re-examines the relationship between political trust and sophistication in the Netherlands by utilizing European Social Survey (ESS) data across five time points and four-wave panel data from the Panel Component of ESS. Our findings illustrate that high and low political sophistication groups display different levels of political trust even when measurement characteristics of political trust are taken into consideration. However, the relationship between political sophistication and political trust is weaker than it is often suggested by earlier research. Our findings also provide partial support for the argument that the gap between sophistication groups is widening over time. Furthermore, we demonstrate that, although the between-method differences between the latent means and the composite score means of political trust for high- and low sophistication groups are relatively minor, it is important to analyze the measurement characteristics of the political trust construct.

  14. Antecedents of coworker trust: leaders' blessings.

    Science.gov (United States)

    Lau, Dora C; Liden, Robert C

    2008-09-01

    Although employee trust in leaders has garnered substantial empirical research, trust between coworkers has been virtually ignored. Extending the work of D. L. Ferrin, K. T. Dirks, and P. P. Shah (2006), the authors examined the role of group leaders, an influential third party in the workplace, on coworker trust formation. The correlates of the extent to which coworkers trust one another were examined in an investigation of 146 members of 32 work groups representing 4 diverse organizations. In this study, which utilized full network data, coworker trust was operationalized as in-degree centrality in the trust network. Controlling for relational demography and coworker helping behaviors, the authors found, as hypothesized, that coworkers tended to place more trust in fellow coworkers who were also trusted by the teams' formal leaders than in coworkers who were less trusted by leaders. In addition, consistent with the social information processing theory, support was found for the hypothesis that the relationship between leaders' trust and coworker trust is stronger when group performance is poor.

  15. Exploring trust relationships during times of change

    Directory of Open Access Journals (Sweden)

    Hartmut Von der Ohe

    2010-03-01

    Full Text Available Orientation: In the current economic climate and the resulting fast-changing global business and political environment, trust among different role players in organisations has become critical for survival.Research purpose: The objective of this study was to explore the impact of different variables such as demographics on trust relationships in South African organisations.Motivation for the study: Anecdotal evidence and preliminary data collected for a national trust indicator seemed to suggest a shift in trust levels in organisations.Research design: A trust questionnaire was administered to a convenience sample of 307 respondents in all economic sectors. Parametric and nonparametric analyses were used to determine significant differences among economic sectors, job levels and sample periods.Main findings: No significant differences were found for job levels or the different sample periods. However, significant differences were found for the economic sectors and, specifically, between government participants and other sectors for the dimensions of change, team management, organisational trust, information sharing and credibility.Practical implications: In times of change, leadership in organisations need to be aware of the impact on trust levels. It is therefore important that leaders in government focus more on trust-enhancing behaviours needed to repair mistrust in organisations.Contribution: Although the effect of time on trust levels is inconclusive, the clearly differing levels of trust in various economic sectors point to the importance of appropriate and fitting approaches to building trust and not a ‘one-size-fits-all’ attitude.

  16. Making sense of institutional trust in organizations

    DEFF Research Database (Denmark)

    Fuglsang, Lars; Jagd, Søren

    2015-01-01

    Institutional-based approaches to trust can explain how trust logics can exist in a societal context as compared to logics of distrust. Strong institutions in the form of regulative, normative and cognitive structures can enable and inspire trust-relations among people at the interpersonal......, 1997: 398). While Fligstein refers to actors who engage in ‘robust or local action’ we argue that actors who engage in (robust, local) sensemaking activities are better at (re)producing institutional-based trust. Particularly in situations when institutions are relatively unstable, unfamiliar...... to the actors and ambiguous, sensemaking strategies directed towards exploring the institutional foundations of trust at a local level can be an important basis of interpersonal trust-relations. First, based on a summary of studies of institutional-based trust we argue that an unresolved issue is how...

  17. The Relationship between Teamwork and Organizational Trust

    Directory of Open Access Journals (Sweden)

    Musab Isik

    2016-01-01

    Full Text Available The aim of this study is to investigate the relationship between teamwork and organizational trust. In the implementation section the data from the survey of 250 workers is employed in call centers in Erzurum by using relevant statistical  methods. Consequently, it is found that there is a positive and significant relationship between teamwork and organizational trust. Thus, the hypothesis of the study is supported as it was expected. Besides, it is found that there are positive and significant relationships between communication, openness to innovation, participation-trust in teamwork and organizational trust, trust in management, trust in co-workers, and trust in workplace.

  18. Trusting the other or taking a chance?

    DEFF Research Database (Denmark)

    Frederiksen, Morten; Heinskou, Marie Bruvik

    2016-01-01

    , respectively, reside. Secondly, the issue of temporality is traced in Luhmann’s work on trust and it is demonstrated how his dichotomous treatment of social time conflates markedly different temporal experiences. As a solution to this, the article presents the notion of a third temporal mode of the process......Theories of modernity and risk society argue that increasing levels of risk fundamentally alter or lower the level of trust in society. In this article we argue that this assumption is based in a fallacious theoretical link between trust and risk. Rather than calculative assessment of risk...... and specific events, trust directs anticipation towards process. First, we outline dominant approaches to trust as a question of actions and uncertainty of outcomes, arguing that these approaches treat trust and chance as interchangeable, conflating the different socio-temporalities within which risk and trust...

  19. Using informed consent to save trust.

    Science.gov (United States)

    Eyal, Nir

    2014-07-01

    Increasingly, bioethicists defend informed consent as a safeguard for trust in caretakers and medical institutions.This paper discusses an ‘ideal type’ of that move. What I call the trust-promotion argument for informed consent states:1. Social trust, especially trust in caretakers and medical institutions, is necessary so that, for example,people seek medical advice, comply with it, and participate in medical research.2. Therefore, it is usually wrong to jeopardise that trust.3. Coercion, deception, manipulation and other violations of standard informed consent requirements seriously jeopardise that trust.4. Thus, standard informed consent requirements are justified.This article describes the initial promise of this argument, then identifies challenges to it. As I show, the value of trust fails to account for some common sense intuitions about informed consent. We should revise the argument, common sense morality, or both.

  20. Why European Subordinates Trust their Managers

    Directory of Open Access Journals (Sweden)

    Andersen Jon Aarum

    2012-11-01

    Full Text Available This article addresses the problem of why subordinates trust their managers based on the responses from 108 subordinates of seven Slovenian managers and from 138 subordinates of eight Swedish managers. The subordinates of these managers responded to a 20-item instrument tested for reliability and validity. In both samples the managers enjoyed different degrees of trust. The level of trust vested in Slovenian managers was higher than in Swedish ones. The kinds of managers’ actions that enhanced trust were similar amongst Swedish and Slovenian subordinates. Different socio-cultural contexts may theoretically explain why some other kinds of actions had contrasting effects between the samples. On the whole, the actions of managers explain trust in both countries. Subordinates’ trust in managers declines with the increasing hierarchical distance in both national samples. Managers need to show in action that they trust their subordinates, promote their interests, demonstrate appreciation of their subordinates, and solve problems.

  1. For a civilisation of trust

    Directory of Open Access Journals (Sweden)

    Burhan Ghalioun

    2003-06-01

    Full Text Available For the author, the world in disarray is the origin of mistrust: disarray in the social, political and economic aspect. Nevertheless, he sees a possibility for restoring trust through becoming aware of the importance of the concept of immaterial capital and its decisiverole in the reproduction of the social and international system. A second element is the emergence, outside of the process of globalising integration, of a real, supportive world society. The failure of the system of international relations in the face of the challenges of globalisation, even if it means worsening the deficit of trust, gives rise to a hope of a better world and favours the development of a common, collective, transnational consciousnesswith supportive impulses and convergences of increasingly powerful interests.

  2. Trust and Traditions in Transitions

    DEFF Research Database (Denmark)

    McQuaid, Sara Dybris

    and the state and more recently, trust in the peace process. As the contest over meaning is always determined by the context of articulation, this paper examines the role of parades in the current ‘post-conflict’ phase of the peace process. Using theories of cultural and collective memory (Assman 2011, Olick......On New Year’s Eve 2013, months of talks on ‘Dealing with the past’, ‘Flags’ and ‘Parades’ ended without agreement on how to move towards a reconciliation of positions in Northern Ireland. The failure of the talks illustrates the importance of culture and (mis)trust in divided societies, where...... politics often pivot around whose culture shall be official and whose subordinated, whose history shall be remembered and whose forgotten (Jordan and Weedon 1995). These struggles are particularly intense in times of transition where traditions, power relations and frames of relevant remembrance...

  3. Icing Research Tunnel

    Science.gov (United States)

    Chennault, Jonathan

    2004-01-01

    The Icing Research Tunnel in Building 11 at the NASA Glenn Research Center is committed to researching the effects of in flight icing on aircraft and testing ways to stop the formation of hazardous icing conditions on planes. During this summer, I worked here with Richard DelRosa, the lead engineer for this area. address one of the major concerns of aviation: icing conditions. During the war, many planes crashed (especially supply planes going over the.Himalayas) because ice built up in their wings and clogged the engines. To this day, it remains the largest ice tunnel in the world, with a test section that measures 6 feet high, 9 feet long, and 20 feet wide. It can simulate airspeeds from 50 to 300 miles per hour at temperatures as low as -50 Fahrenheit. Using these capabilities, IRT can simulate actual conditions at high altitudes. The first thing I did was creating a cross reference in Microsoft Excel. It lists commands for the DPU units that control the pressure and temperature variations in the tunnel, as well as the type of command (keyboard, multiplier, divide, etc). The cross reference also contains the algorithm for every command, and which page it is listed in on the control sheet (visual Auto-CAD graphs, which I helped to make). I actually spent most of the time on the computer using Auto-CAD. I drew a diagram of the entire icing tunnel and then drew diagrams of its various parts. Between my mentor and me, we have drawings of every part of it, from the spray bars to the thermocouples, power cabinets, input-output connectors for power systems, and layouts of various other machines. I was also responsible for drawing schematics for the Escort system (which controls the spray bars), the power system, DPUs, and other electrical systems. In my spare time, I am attempting to build and program the "toddler". Toddler is a walking robot that I have to program in PBASIC language. When complete, it should be able to walk on level terrain while avoiding obstacles in

  4. Wind tunnel AVERT model

    Directory of Open Access Journals (Sweden)

    Adrian DOBRE

    2009-09-01

    Full Text Available The AVERT project aims to asses the oscillatory blowing on the flap for a high-lift configuration (wing with flap, and involves both experimental (low speed wind tunnel INCAS and numerical activities.At low speed the active flow control may lead to a reduction or elimination of the flow separation on the high-lift devices, such as flaps, and involves the introduction or re distribution of momentum within the boundary layer.High-lift systems utilized as particular profiles at a certain offset of the main wing may solve the disagreement between the requirements of cruise flight and landing, especially for low velocity take-off.

  5. Magnetic tunnel junctions with monolayer hexagonal boron nitride tunnel barriers

    Energy Technology Data Exchange (ETDEWEB)

    Piquemal-Banci, M.; Galceran, R.; Bouzehouane, K.; Anane, A.; Petroff, F.; Fert, A.; Dlubak, B.; Seneor, P. [Unité Mixte de Physique, CNRS, Thales, Univ. Paris-Sud, Université Paris-Saclay, Palaiseau 91767 (France); Caneva, S.; Martin, M.-B.; Weatherup, R. S.; Kidambi, P. R.; Robertson, J.; Hofmann, S. [Department of Engineering, University of Cambridge, Cambridge CB21PZ (United Kingdom); Xavier, S. [Thales Research and Technology, 1 avenue Augustin Fresnel, Palaiseau 91767 (France)

    2016-03-07

    We report on the integration of atomically thin 2D insulating hexagonal boron nitride (h-BN) tunnel barriers into Co/h-BN/Fe magnetic tunnel junctions (MTJs). The h-BN monolayer is directly grown by chemical vapor deposition on Fe. The Conductive Tip Atomic Force Microscopy (CT-AFM) measurements reveal the homogeneity of the tunnel behavior of our h-BN layers. As expected for tunneling, the resistance depends exponentially on the number of h-BN layers. The h-BN monolayer properties are also characterized through integration into complete MTJ devices. A Tunnel Magnetoresistance of up to 6% is observed for a MTJ based on a single atomically thin h-BN layer.

  6. BRI: Cyber Trust and Suspicion

    Science.gov (United States)

    2017-06-06

    psychiatric ratings, including the Snaith-Hamilton Anhedonia/Pleasure Scale (SHAPS), the Anhedonia rating scale, and the Hamilton Depression & Anxiety...Inventories (HAM-D; HAM-A; respectively) which are 21 item multi-choice questionnaires designed to assess the current level of depression and anxiety...429, 2006. [30] R. Riedl and A. Javor, “The biology of trust: integrating evidence from genetics , endocrinology, and functional brain imaging.,” J

  7. Building Trust Through Servant Leadership

    Science.gov (United States)

    2016-06-10

    Army Leadership (Washington, DC: Government Printing Office, August 2012), 1-5. The category of “Leads” includes five sub- skills : Leads others...opposition of formal military education, Puller’s ability to develop leadership skills in junior officers had pronounced effects. In a speech...BUILDING TRUST THROUGH SERVANT LEADERSHIP A thesis presented to the Faculty of the U.S. Army Command and General Staff

  8. Specifika Real Estate Investment Trust

    OpenAIRE

    Nenadál, Petr

    2012-01-01

    The thesis is aimed to describe and approach the REIT practice that is, especially in the U. S. very enhanced. In the first part, general parameters of real estate investment trusts are introduced and understated in connection with the depiction of the advantages and disadvantages of this issue. In chronological sequence, the development and progress of the U. S. real estate market is approached. The thesis further undertakes the current subject of the global financial crisis with a special f...

  9. Trust Assessment Using Cloud Broker

    OpenAIRE

    P.S.Pawar; Rajarajan, M.; Dimitrakos, T.; Zisman, A.

    2014-01-01

    Part 3: Short Papers; International audience; Despite the advantages and rapid growth of Cloud computing, the cloud environments are still not sufficiently trustworthy from a customer’s perspective. Several challenges such as specification of service level agreements, standards, security measures, selection of service providers and computation of trust still persists, that concerns the customer. To deal with these challenges and provide a trustworthy environment, a mediation layer may be esse...

  10. Money and trust among strangers.

    Science.gov (United States)

    Camera, Gabriele; Casari, Marco; Bigoni, Maria

    2013-09-10

    What makes money essential for the functioning of modern society? Through an experiment, we present evidence for the existence of a relevant behavioral dimension in addition to the standard theoretical arguments. Subjects faced repeated opportunities to help an anonymous counterpart who changed over time. Cooperation required trusting that help given to a stranger today would be returned by a stranger in the future. Cooperation levels declined when going from small to large groups of strangers, even if monitoring and payoffs from cooperation were invariant to group size. We then introduced intrinsically worthless tokens. Tokens endogenously became money: subjects took to reward help with a token and to demand a token in exchange for help. Subjects trusted that strangers would return help for a token. Cooperation levels remained stable as the groups grew larger. In all conditions, full cooperation was possible through a social norm of decentralized enforcement, without using tokens. This turned out to be especially demanding in large groups. Lack of trust among strangers thus made money behaviorally essential. To explain these results, we developed an evolutionary model. When behavior in society is heterogeneous, cooperation collapses without tokens. In contrast, the use of tokens makes cooperation evolutionarily stable.

  11. Social Collaborative Filtering by Trust.

    Science.gov (United States)

    Yang, Bo; Lei, Yu; Liu, Jiming; Li, Wenjie

    2017-08-01

    Recommender systems are used to accurately and actively provide users with potentially interesting information or services. Collaborative filtering is a widely adopted approach to recommendation, but sparse data and cold-start users are often barriers to providing high quality recommendations. To address such issues, we propose a novel method that works to improve the performance of collaborative filtering recommendations by integrating sparse rating data given by users and sparse social trust network among these same users. This is a model-based method that adopts matrix factorization technique that maps users into low-dimensional latent feature spaces in terms of their trust relationship, and aims to more accurately reflect the users reciprocal influence on the formation of their own opinions and to learn better preferential patterns of users for high-quality recommendations. We use four large-scale datasets to show that the proposed method performs much better, especially for cold start users, than state-of-the-art recommendation algorithms for social collaborative filtering based on trust.

  12. Exploring the Change from Low-Trust to High-Trust Organizations

    DEFF Research Database (Denmark)

    Jagd, Søren

    what the notion of high-trust organization actually means, and that the change process in the direction of high trust organizations involves not only a quantitative growth in trust, but may involve important qualitative changes in the organization, especially concerning the relations between management...... and employees. An especially important issue is the trust/self-control nexus. Following this analysis it may be argued that the distinction low versus high-trust is much more complex and involves radical changes in organizational culture and identity than assumed by most management literature on trust a new......A growing body of literature point to the increasing importance of trust for organizations and for the explicit use of trust as a management tool. The explicit or implicit message in both management literature and research literature on trust as a management tool is that managers should pursue...

  13. Modeling Indirect Tunneling in Silicon

    Science.gov (United States)

    Chen, Edward

    Indirect tunneling in silicon p-n junctions catches people's attention again in recent years. First, the phenomenon induces a serious leakage problem, so called gate-induced drain leakage (GIDL) effect, in modern metal-oxide-semiconductor field-effect transistors (MOSFETs). Second, it is utilized to develop a novel tunneling transistor with the sharp turn-on ability for continuing ITRS roadmap. Although the indirect tunneling is important for the state-of-the-art transistor-technology, the accuracy of the present tunneling models in technology computer-aided design (TCAD) tools is still vague. In the research work, the theory of indirect tunneling in silicon has been thoroughly studied. The phonon-assisted tunneling model has been developed and compared with the existing ones in the Sentaurus-Synopsys, Medici-Synopsys, and Atlas-Silvaco TCAD tools. Beyond these existing models, ours successfully predicts the indirect tunneling current under the different field direction in silicon. In addition, bandgap narrowing in heavily-doped p-n junctions under the reverse-biased condition is also studied during the model development. At the end of the research work, the application to low standby power (LSTP) transistors is demonstrated to show the capability of our tunneling model in the device level.

  14. Results of carpal tunnel release

    NARCIS (Netherlands)

    Prick, J.J.W; Blaauw, G.; Vredeveld, J.W.; Oosterloo, Sebe J.

    We evaluated, by means of a prospective study, the results of carpal tunnel release both clinically and electrophysiologically in 188 patients with a carpal tunnel syndrome. A questionnaire was completed by patient and surgeon pre- and post-operatively (6 and 12 months after operation), when

  15. Early Childhood: Funnels and Tunnels.

    Science.gov (United States)

    Fowlkes, Mary Anne

    1985-01-01

    Suggests using funnels and tunnels in combination with water, blocks, transportation toys, and other materials to help teach preschoolers to make predictions. Many examples are included for using funnels to understand properties of liquids and for using tunnels to predict order. (DH)

  16. POEM and Submucosal Tunneling.

    Science.gov (United States)

    Werner, Yuki B; Rösch, Thomas

    2016-06-01

    Submucosal endoscopy has introduced new and important aspects into gastrointestinal endoscopic therapeutics by opening the way to interventions even outside of the GI tract. At present, innovative techniques for submucosal endoscopy in different esophageal diseases include peroral endoscopic myotomy (POEM) for idiopathic achalasia and related motility disorders, submucosal tunneling endoscopic resection (STER) for submucosal tumors arising from the muscularis propria, and endoscopic submucosal tunneling dissection (ESTD) for superficial esophageal neoplastic lesions. POEM for achalasia-still a rare disease-is currently evaluated in comparison to endoscopic and surgical standard therapies, while this procedure enabling a long thoracic myotomy might constitute an advantage over the laparoscopic approach in treatments of spastic esophageal diseases. Removal of smaller submucosal esophageal tumors may appear tempting, but the clinical indications are limited by the facts that the vast majority of such smaller tumors are asymptomatic and benign.For all these innovative and technically demanding techniques, learning curves have to be taken into account, not only with regard to technical competence but also to clinical assessment, ranging from proper indication and patient selection to the management of (potential) complications and logistics/back-up. Although preliminary results from high-skilled endoscopic centers have been very encouraging, long-term data as well as prospective randomized controlled trials are needed to validate the efficacy and safety of the modalities.

  17. Tunneling magnetic force microscopy

    Science.gov (United States)

    Burke, Edward R.; Gomez, Romel D.; Adly, Amr A.; Mayergoyz, Isaak D.

    1993-01-01

    We have developed a powerful new tool for studying the magnetic patterns on magnetic recording media. This was accomplished by modifying a conventional scanning tunneling microscope. The fine-wire probe that is used to image surface topography was replaced with a flexible magnetic probe. Images obtained with these probes reveal both the surface topography and the magnetic structure. We have made a thorough theoretical analysis of the interaction between the probe and the magnetic fields emanating from a typical recorded surface. Quantitative data about the constituent magnetic fields can then be obtained. We have employed these techniques in studies of two of the most important issues of magnetic record: data overwrite and maximizing data-density. These studies have shown: (1) overwritten data can be retrieved under certain conditions; and (2) improvements in data-density will require new magnetic materials. In the course of these studies we have developed new techniques to analyze magnetic fields of recorded media. These studies are both theoretical and experimental and combined with the use of our magnetic force scanning tunneling microscope should lead to further breakthroughs in the field of magnetic recording.

  18. Tunneling Ionization of Diatomic Molecules

    DEFF Research Database (Denmark)

    Svensmark, Jens Søren Sieg

    2016-01-01

    When a molecule is subject to a strong laser field, there is a probability that an electron can escape, even though the electrons are bound by a large potential barrier. This is possible because electrons are quantum mechanical in nature, and they are therefore able to tunnel through potential...... barriers, an ability classical particles do not possess. Tunnelling is a fundamental quantum mechanical process, a process that is distinctly non-classical, so solving this tunnelling problem is not only relevant for molecular physics, but also for quantum theory in general. In this dissertation the theory...... of tunneling ionizaion of molecules is presented and the results of numerical calculations are shown. One perhaps surprising result is, that the frequently used Born-Oppenheimer approximation breaks down for weak fields when describing tunneling ionization. An analytic theory applicable in the weak-field limit...

  19. Trust me, I'm a researcher!: The role of trust in biomedical research.

    Science.gov (United States)

    Kerasidou, Angeliki

    2017-03-01

    In biomedical research lack of trust is seen as a great threat that can severely jeopardise the whole biomedical research enterprise. Practices, such as informed consent, and also the administrative and regulatory oversight of research in the form of research ethics committees and Institutional Review Boards, are established to ensure the protection of future research subjects and, at the same time, restore public trust in biomedical research. Empirical research also testifies to the role of trust as one of the decisive factors in research participation and lack of trust as a barrier for consenting to research. However, what is often missing is a clear definition of trust. This paper seeks to address this gap. It starts with a conceptual analysis of the term trust. It compares trust with two other related terms, those of reliance and trustworthiness, and offers a defence of Baier's attribute of 'good will' a basic characteristic of trust. It, then, proceeds to consider trust in the context of biomedical research by examining two questions: First, is trust necessary in biomedical research?; and second, do increases in regulatory oversight of biomedical research also increase trust in the field? This paper argues that regulatory oversight is important for increasing reliance in biomedical research, but it does not improve trust, which remains important for biomedical research. It finishes by pointing at professional integrity as a way of promoting trust and trustworthiness in this field.

  20. From the general to the specific: How social trust motivates relational trust.

    Science.gov (United States)

    Robbins, Blaine G

    2016-01-01

    When people form beliefs about the trustworthiness of others with respect to particular matters (i.e., when individuals trust), theory suggests that they rely on preexistent cognitive schemas regarding the general cooperativeness of individuals and organizations (i.e., social trust). In spite of prior work, the impact of social trust on relational trust-or what Russell Hardin (2002) calls trust as a three-part relation where actor A trusts actor B with reference to matter Y-is not well established. Four vignette experiments were administered to Amazon.com Mechanical Turk workers (N = 1388 and N = 1419) and to public university undergraduate students (N = 995 and N = 956) in order to investigate the relationship between social trust and relational trust. Measures of general social trust and particular social trust produced statistically equivalent effects that were positively associated with relational trust. Political trust, however, was statistically unrelated to relational trust. These results support the idea that people rely on schemas and stereotypes concerned with the general cooperativeness and helpfulness of others when forming beliefs about another person's trustworthiness with respect to a particular matter at hand. Copyright © 2015 Elsevier Inc. All rights reserved.

  1. Time Dependent Tunneling in Laser Irradiated Scanning Tunneling Microscope Junction

    Science.gov (United States)

    Park, Sookyung Hur

    A principal motivation for the studies reported in this thesis was to obtain a theoretical explanation for the experimental results obtained by Nguyen et al. (1989) to determine the traversal time of an electron tunneling through a quantum mechanical barrier in a laser irradiated STM junction. The work therefore focused on the calculation of tunneling in a time-dependent oscillating barrier, and more specifically on the inelastic contributions to the tunneling current. To do so the kinetic formalism for tunneling was modified and extended to calculate inelastic processes in an irradiated tunneling junction. Furthermore, there is significant absorption of power from the laser beam in the junction electrodes resulting in thermal effects which can influence the tunneling. Extensive analysis of the spatial and temporal temperature distributions was first done for a realistic model of the diode emitter and anode using the Green function method. Specifically we considered (i) thermal effects due to surface heating of the absorbed laser radiation, (ii) the thermoelectric emf produced in the junction due to differential heating, and (iii) resistive and Thomson heat produced in the junction by laser induced currents. Using first-order time-dependent perturbation theory we also (iv) calculated the inelastic tunneling current due to a time dependent oscillating barrier produced by the antenna geometry of the STM junction. Lastly, we (v) formulated photo-assisted tunneling due to the electron -photon interaction in the junction using the second-quantization formalism. Although quite significant results were obtained for the tunneling current density as a function of frequency, gap distance and other junction parameters which gave insights into important features of the Nguyen et al. experiment (and tunneling characteristics of an irradiated STM in general), no single expression was derived or calculated results obtained which explains or fits all their observed data, or

  2. Trust in a Time of Increasing Diversity

    DEFF Research Database (Denmark)

    Dinesen, Peter Thisted; Sønderskov, Kim Mannemar

    2012-01-01

    in the period from 1979 to 2009 coupled with diversity at the municipality level. Individual-level measures of trust over time enable us to estimate the impact on social trust of changes in ethnic diversity within municipalities and, we argue, thereby obtain a more precise estimate of the effect of ethnic......In this study, we examine the impact of ethnic diversity in Danish municipalities on citizens’ social trust over the last three decades. During this period, Danish society has grown increasingly ethnically diverse, and this begs the question whether this has influenced trust in others negatively....... Existing evidence from the Anglo-Saxon countries would suggest that this is the case, whereas evidence from the European continent mainly suggests that no link exists between ethnic diversity and social trust. The empirical analysis uses individual-level data on social trust from several surveys in Denmark...

  3. The multileveled division of trust labour

    DEFF Research Database (Denmark)

    Frederiksen, Morten

    The trust concept is inherently linked to institutional issues. Trust, according to contemporary research, may be directed at both people and institutions and the influence of institutions may affect both trust in other people and trust in other institutions. This conceptual stretching takes place...... at the expense of accuracy and may block our understanding of the intricacies of the multiple levels involved in trusting. This paper suggests a conceptual clarification of this issue by employing a phenomenological approach to the perspective of the trustor, differentiating the types of uncertainty involved...... at the intersubjective and institutional levels. I argue that confidence in institutions define the playing field of uncertainty in intersubjective relations, thus underpinning both the possibility and scope of intersubjective trust. However, once confidence in the institutional setting is brought into question...

  4. The Volatile Nature of Social Trust

    DEFF Research Database (Denmark)

    Kjærsgård, Andreas Pihl; Anhøj, Anne Iversen

    undertakes. The article conducts a comparative study of the development of social trust in Croatia and Slovenia. In spite these countries’ common Yugoslavian heritage they show a remarkably diversified development in social trust over a rather short timespan (1996-2007). The two cases thus provide good cases......The countries in Central and Eastern Europe (CEE) have to varying degrees been struggling in their transition to market economies and democracy. Social trust is often argued to be a crucial lubricant in solving collective action problems and thus building and maintaining well......-functioning institutions. Therefore building and maintaining social trust seems crucial for the countries in CEE struggling with transition. Existing research on social trust is mainly conducted in a western context, and there is a clear need for research to focus on social trust in CEE - an endeavour which this article...

  5. The Value of Trust to Nursing.

    Science.gov (United States)

    Rutherford, Marcella M

    2014-01-01

    Trust, one of nursing's intangible assets, impacts nurses' ability to form meaningful relationships with patients and this connection positively impacts health outcomes. Linking trust to the fabric of nursing and investing in its measurement will become essential to nursing's valuation and the resulting investment in nursing. Trust, as nursing's core value, should be fostered by nurse educators as they prepare the next generation of nurses. Nurse administrators should connect the trust a patient has for his or her nurse and patient cooperation and honest transparent communication between providers and the patient. Banking trust as a valuable nursing asset will substantiate nursing's marketing and support its worth. Nursing's trustworthiness is an intangible asset that warrants protection, as trust once lost is hard to recapture.

  6. Trust Dynamics in a Large System Implementation

    DEFF Research Database (Denmark)

    Schlichter, Bjarne Rerup; Rose, Jeremy

    2013-01-01

    A large information systems implementation (such as ERP systems) relies on the trust of its stakeholders to suc-ceed. Such projects impact diverse groups of stakeholders, each with their legitimate interests and expectations. Levels of stakeholder trust can be expected to vary in large scale...... Integrated Hospi-tal System implementation for the Faroe Islands. Trust relationships suffered a serious breakdown, but the project was able to recover and meet its goals. We develop six theoretical propositions theorising the relationship between trust and project outcomes, the maintenance, breakdown...... implementations (which can take several years), and cannot be taken for granted. Previous studies have largely focused on the taxonomic deconstruction of the trust construct, through point-in-time variance studies. They have identified the relationship between trust and project outcomes, but largely ignored...

  7. Explaining the emergence of social trust

    DEFF Research Database (Denmark)

    Svendsen, Gunnar Lind Haase; Tinggaard Svendsen, Gert; Graeff, Peter

    2012-01-01

    How does social trust emerge in a country? By comparing the cases of Denmark and Germany through six historical phases, we suggest that a plausible explanation is long run political stability. In Denmark, social trust was arguably allowed to accumulate slowly over time and was probably not destro......How does social trust emerge in a country? By comparing the cases of Denmark and Germany through six historical phases, we suggest that a plausible explanation is long run political stability. In Denmark, social trust was arguably allowed to accumulate slowly over time and was probably...... not destroyed up till the universal welfare state of the 20th century. In Germany, however, political instability since the first German state building hampered the emergence and maintenance of social trust, which is why social trust was never allowed to grow in this country....

  8. Increasing interpersonal trust through divergent thinking

    Directory of Open Access Journals (Sweden)

    Roberta eSellaro

    2014-06-01

    Full Text Available Interpersonal trust is an essential ingredient of many social relationships but how stable is it actually, and how is it controlled? There is evidence that the degree of trust into others might be rather volatile and can be affected by manipulations like drawing attention to personal interdependence or independence. Here we investigated whether the degree of interpersonal trust can be biased by inducing either a more integrative or a more cognitive-control mode by means of a creativity task requiring divergent or convergent thinking, respectively. Participants then performed the Trust Game, which provides an index of interpersonal trust by assessing the money units one participant (the trustor transfers to another participant (the trustee. As expected, participants transferred significantly more money to the trustee after engaging in divergent thinking as compared to convergent thinking. This observation provides support for the idea that interpersonal trust is controlled by domain-general (i.e., not socially dedicated cognitive states.

  9. TRANSFORMATIONAL LEADERSHIP AND TRUST: A CASE STUDY

    OpenAIRE

    Adriana Zaharia; Carmen-Aida Huţu

    2016-01-01

    According to previous research, an employee’s trust in his/her leader has been linked to: increased individual efficiency and commitment; increased organizational performance; effective team and organizational functioning where the tasks are complex and unstructured. Considering these findings concerning the positive influence of trust on various aspects of organizational performance, we used relevant theories in literature relating to trust in organizational settings and transformational lea...

  10. The impact of voice on trust attributions

    OpenAIRE

    Torre, Ilaria

    2017-01-01

    Trust and speech are both essential aspects of human interaction. On the one hand, trust is necessary for vocal communication to be meaningful. On the other hand, humans have developed a way to infer someone’s trustworthiness from their voice, as well as to signal their own. Yet, research on trustworthiness attributions to speakers is scarce and contradictory, and very often uses explicit data, which do not predict actual trusting behaviour. However, measuring behaviour is very...

  11. Increasing interpersonal trust through divergent thinking

    OpenAIRE

    Sellaro, Roberta; Hommel, Bernhard; De Kwaadsteniet, Erik W.; van de Groep, Suzanne; Colzato, Lorenza S.

    2014-01-01

    Interpersonal trust is an essential ingredient of many social relationships but how stable is it actually, and how is it controlled? There is evidence that the degree of trust into others might be rather volatile and can be affected by manipulations like drawing attention to personal interdependence or independence. Here we investigated whether the degree of interpersonal trust can be biased by inducing either a more integrative or a more focused/exclusive cognitive control mode by means of a...

  12. Representative trust in cognitive social simulations

    OpenAIRE

    Pollock, Shawnoah

    2011-01-01

    Approved for public release; distribution is unlimited. Trust plays a critical role in communications, strength of relationships, and information processing at the individual and group levels. Cognitive social simulations show promise in providing an experimental platform for the examination of social phenomena such as trust formation. This work is a novel attempt at trust representation in a cognitive social simulation using reinforcement learning algorithms. Initial algorithm development...

  13. Repertoires of trust : The practice of trust in a multinational organization amid political conflict

    NARCIS (Netherlands)

    Mizrachi, Nissim; Drori, Israel; Anspach, Renee R.

    Sociologists and other social scientists have recently renewed their interest in the concept of trust. Multidisciplinary studies have identified social psychological, economic, and structural determinants of trust; traced its development in interpersonal relationships; and explored its

  14. Trust reality-mining: evidencing the role of friendship for trust diffusion

    National Research Council Canada - National Science Library

    Farrahi, Katayoun; Zia, Kashif

    2017-01-01

    ... and computational models of those values. This paper, educated by trust theories and models from cognitive science, social sciences and artificial intelligence, proposes a novel stochastic computational model of trust, encapsulating...

  15. The Dyadic Trust Scale: Toward Understanding Interpersonal Trust in Close Relationships.

    Science.gov (United States)

    Larzelere, Robert E.; Huston, Ted L.

    1980-01-01

    Dyadic trust proved to be associated with love and with intimacy of self-disclosure, especially for longer married partners. It varied by level of commitment. Partners reciprocated trust more than either love or depth of self-disclosure. (Author)

  16. Microbuckle tunnelling in fibre composites

    Science.gov (United States)

    Fleck, N. A.; Zhao, L. G.

    2000-09-01

    The propagation of compressive failure in multi-directional composite laminates is modelled by the tunnelling of a microbuckle within the load-bearing axial plies, with concomitant delamination of the neighbouring off-axis plies. The microbuckle tunnels at its tip in a crack-like mode III manner, and the steady state tunnelling stress is estimated by calculating the energy difference between the upstream unbuckled state and the downstream buckled state. The downstream state is analysed in detail using a plane strain analysis of a microbuckle with delaminations from its tips. In the downstream 2D problem, microbuckling of the axial plies is represented by the generation of an inclined mode II crack, with an associated microbuckling tip toughness and a constant sliding stress across its flanks. The delaminations at the interface between the axial and adjacent off-axis plies are idealised as traction-free mixed-mode interfacial cracks. Predictions of the steady-state tunnelling stress are obtained for an isotropic solid by solving an integral equation and by the finite element method; finite element techniques are then used to solve the tunnelling problem for an orthotropic solid and for a cross-ply laminate. For each case, the tunnelling stress and the delamination crack length are obtained as functions of the ratio of delamination to microbuckle toughness, and of the inclination of the microbuckle band. The tunnelling stress provides a useful lower bound for the compressive strength of a thick laminated structure.

  17. Can I Trust Your Findings?

    DEFF Research Database (Denmark)

    Cuervo-Cazurra, Alvaro; Andersson, Ulf; Yoko Brannen, Mary

    2016-01-01

    this complexity and ensure that readers can trust their findings. We provide suggestions for how to rule out alternative explanations, explaining key considerations not only in empirical analyses, but also in theory building and in research design. Our discussion covers both qualitative and quantitative studies......, because we believe that it is imperative to understand how trustworthiness is established in both traditions, even for international business researchers who self-identify with only one. This enables scholars to have a broader scope of knowledge when interpreting past research in the field and to be more...

  18. How Does Social Trust Affect Economic Growth?

    DEFF Research Database (Denmark)

    Bjørnskov, Christian

    Social capital in the form of generalized trust has been shown to be a determinant of economic growth in a number of studies. Other studies have explored other consequences of trust, such as its effects on governance, corruption, education and investment. This paper connects the two strands...... of literature by estimating the effects of trust on growth through a set of potential transmission mechanisms directly. It does so by modelling the process using a three-stage least squares estimator on a sample of countries for which a full data set is available. The results indicate that trust affects...

  19. Does Religiosity Promote or Discourage Social Trust?

    DEFF Research Database (Denmark)

    Berggren, Niclas; Bjørnskov, Christian

    -being. The effect of religiosity is theoretically unclear: while all major religions call for behaving well to others, religious groups may primarily trust people in their own groups and distrust others, as well as cause division in the broader population. We make use of new data from the Gallup World Poll for 105......We look at the effect of religiosity on social trust, defined as the share of a population that thinks that people in general can be trusted. This is important since social trust is related to many desired outcomes, such as growth, education, democratic stability and subjective well...

  20. Explaining the emergence of social trust

    DEFF Research Database (Denmark)

    Svendsen, Gunnar Lind Haase; Svendsen, Gert Tinggaard; Graeff, Peter

    2012-01-01

    How does social trust emerge in a country? By comparing the cases of Denmark and Germany through six historical phases, we suggest that a plausible explanation is long run political stability. In Denmark, social trust was arguably allowed to accumulate slowly over time and was probably...... not destroyed up till the universal welfare state of the 20th century. In Germany, however, political instability since the first German state building hampered the emergence and maintenance of social trust, which is why social trust was never allowed to grow in this country....

  1. Endoscopic cubital tunnel recurrence rates.

    Science.gov (United States)

    Cobb, Tyson K; Sterbank, Patrick T; Lemke, Jon H

    2010-06-01

    Cubital tunnel syndrome is the second most common nerve entrapment in the upper extremity. There are no current publications concerning the recurrence rates after endoscopic cubital tunnel release. The purpose of this study is to evaluate the recurrence rate of endoscopic cubital tunnel release compared to published reports of recurrence following open cubital tunnel procedures. We reviewed 134 consecutive cases of endoscopic cubital tunnel release in 117 patients. There were 104 cases in 94 patients with greater than 3 months follow-up. The mean follow-up time was 736 days. They were grouped using Dellon's classification. Two literature control groups were used from published reports of recurrence rate following open cubital tunnel release. A recurrence was identified if the patient was symptom-free following surgery but had symptoms reappear 3 months or more after surgery as defined in the literature. Of the 104 cases, 92.31% had more than a 4-month follow-up. One case (0.96%) met the criteria for recurrence at 4 months postprocedure. Data were then compared to the literature control groups used from published reports of recurrence rates following open cubital tunnel release. Pooled, the combined controls had 22 of 180 cases (12.22%) with recurrences. The percentage of procedure recurrence varied significantly with p value equal to 0.0004. It is recognized that there is a lack of common classification and comparative analysis of these studies, but they do classify preoperative grading and recurrence similarly. We are 95% confident that our true recurrence rate is between 0.02% and 5.24% and that endoscopic cubital tunnel release has a recurrence rate, which is not higher than open cubital tunnel release literature controls.

  2. Trust in automation: integrating empirical evidence on factors that influence trust.

    Science.gov (United States)

    Hoff, Kevin Anthony; Bashir, Masooda

    2015-05-01

    We systematically review recent empirical research on factors that influence trust in automation to present a three-layered trust model that synthesizes existing knowledge. Much of the existing research on factors that guide human-automation interaction is centered around trust, a variable that often determines the willingness of human operators to rely on automation. Studies have utilized a variety of different automated systems in diverse experimental paradigms to identify factors that impact operators' trust. We performed a systematic review of empirical research on trust in automation from January 2002 to June 2013. Papers were deemed eligible only if they reported the results of a human-subjects experiment in which humans interacted with an automated system in order to achieve a goal. Additionally, a relationship between trust (or a trust-related behavior) and another variable had to be measured. All together, 101 total papers, containing 127 eligible studies, were included in the review. Our analysis revealed three layers of variability in human-automation trust (dispositional trust, situational trust, and learned trust), which we organize into a model. We propose design recommendations for creating trustworthy automation and identify environmental conditions that can affect the strength of the relationship between trust and reliance. Future research directions are also discussed for each layer of trust. Our three-layered trust model provides a new lens for conceptualizing the variability of trust in automation. Its structure can be applied to help guide future research and develop training interventions and design procedures that encourage appropriate trust. © 2014, Human Factors and Ergonomics Society.

  3. Trust in Libraries and Trust in Most People: Social Capital Creation in the Public Library

    OpenAIRE

    Vårheim, Andreas

    2014-01-01

    Studies of the creation of social trust and social capital indicate that informal social contact has a positive effect. Some studies find that uncorrupt public institutions have positive effects on trust and social capital. Additionally, a number of papers show that public libraries have a similar effect. The mechanisms that generate trust, however, remain largely unspecified. Therefore, research describing micro-level processes is needed to uncover the mechanisms creating trust. ...

  4. Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker

    OpenAIRE

    Wazan, Ahmad Samer; LABORDE, Romain; Chadwick, David W.; Barrere, Francois; Benzekri, Abdelmalek; Habbal, Abid M.M.; Kaiiali, Mustafa

    2017-01-01

    A Public Key Infrastructure (PKI) is considered one of the most important techniques used to propagate trust in authentication over the Internet. This technology is based on a trust model defined by the original X.509 (1988) standard and is composed of three entities: the Certification Authority (CA), the certificate holder (or subject) and the Relying Party (RP). The CA plays the role of a trusted third party between the certificate holder and the RP. In many use cases, this trust model has ...

  5. Tunnel fire testing and modeling the Morgex North tunnel experiment

    CERN Document Server

    Borghetti, Fabio; Gandini, Paolo; Frassoldati, Alessio; Tavelli, Silvia

    2017-01-01

    This book aims to cast light on all aspects of tunnel fires, based on experimental activities and theoretical and computational fluid dynamics (CFD) analyses. In particular, the authors describe a transient full-scale fire test (~15 MW), explaining how they designed and performed the experimental activity inside the Morgex North tunnel in Italy. The entire organization of the experiment is described, from preliminary evaluations to the solutions found for management of operational difficulties and safety issues. This fire test allowed the collection of different measurements (temperature, air velocity, smoke composition, pollutant species) useful for validating and improving CFD codes and for testing the real behavior of the tunnel and its safety systems during a diesel oil fire with a significant heat release rate. Finally, the fire dynamics are compared with empirical correlations, CFD simulations, and literature measurements obtained in other similar tunnel fire tests. This book will be of interest to all ...

  6. Enhanced multi-attribute trust protocol for malicious node detection ...

    Indian Academy of Sciences (India)

    This paper proposes a trust-based intrusion detection that uses multi-attribute trust metrics to improve detection accuracy. It uses an enhanced distributive trust calculation algorithm that involves monitoring neighbouring nodes and trust calculation using the trust metrics message success rate (MSR), elapsed time at node ...

  7. Dynamical tunneling theory and experiment

    CERN Document Server

    Keshavamurthy, Srihari

    2011-01-01

    A prominent aspect of quantum theory, tunneling arises in a variety of contexts across several fields of study, including nuclear, atomic, molecular, and optical physics and has led to technologically relevant applications in mesoscopic science. Exploring mechanisms and consequences, Dynamical Tunneling: Theory and Experiment presents the work of international experts who discuss the considerable progress that has been achieved in this arena in the past two decades.Highlights in this volume include:A historical introduction and overview of dynamical tunneling, with case histories ranging from

  8. Pathophysiology of carpal tunnel syndrome

    Science.gov (United States)

    Aboonq, Moutasem S.

    2015-01-01

    Carpal tunnel syndrome (CTS) is the most common median nerve neuropathy, accounting for 90% of all neuropathies. Carpal tunnel syndrome presents in 3.8% of the general population, with a higher prevalence among women. There are several risk factors associated with CTS, including both medical and non medical factors. The pathophysiologic mechanisms involved in the median nerve compression and traction are thought to be complex, and as yet are not fully understood. The present review aimed to provide an overview of the pathophysiology of median nerve neuropathy in the carpal tunnel, and subsequent development of CTS. PMID:25630774

  9. Finding optimal ventilation control for highway tunnels

    NARCIS (Netherlands)

    Ferki, Lukáš; Meinsma, Gjerrit

    2007-01-01

    A control scheme for highway tunnels is designed based on a static model of the highway tunnel. The controller is designed to keep the exhaust levels inside the tunnel below given limits. The control is then simulated on a dynamical model of a highway tunnel.

  10. Is It a Trust Issue? Factors That Influence Trust for Persons Living With HIV/AIDS.

    Science.gov (United States)

    Krause, Denise D; May, Warren L

    2016-09-01

    Trust in one's health care provider, trust in the health care system in general, and even trust in one's community affects engagement in HIV-related health care. This article examines the issue of trust among a random sample of HIV-infected individuals residing in Mississippi, an area hard-hit by the HIV/AIDS epidemic. Five constructs based on survey responses from these individuals were developed: (1) trust in one's provider to offer the best possible medical care, (2) trust in one's provider to protect patient privacy, (3) willingness to disclose HIV status to one's provider, (4) trust in the health care system, and (5) trust in one's community. Findings suggest that interventions to improve trust in providers to deliver the highest quality of care should be targeted to young people, African Americans, and the more highly educated. Interventions to increase trust in providers to protect privacy should focus on creating and strengthening social support groups or networks that build relationships and foster trust. Interventions aimed to increase community trust also should be targeted to young people. This information is useful to researchers, policy makers, health care providers, and organizations interested in prioritizing interventions and strategies that have the greatest potential to reduce health disparities in HIV diagnosis and treatment in the Deep South. © 2016 Society for Public Health Education.

  11. A healthy dose of trust: the relationship between interpersonal trust and health

    NARCIS (Netherlands)

    Schneider, I.K.; Konijn, E.A.; Righetti, F.; Rusbult, C.E.

    2011-01-01

    The positive effects of trust are manifold. Recent research has shown that trust levels may even influence physical health. The current work explores this issue and aims to shed light on the mechanisms underlying the relationship between trust and health in a 5-wave longitudinal data set. Results

  12. Does conflict shatter trust or does trust obliterate conflict? Revisiting the relationships between team diversity, conflict, and trust

    NARCIS (Netherlands)

    Curseu, P.; Schruijer, S.G.L.

    2010-01-01

    This article explores the interplay between trust and conflict as antecedents of team effectiveness. In the first cross-sectional study, two alternative path models are tested in a sample of 174 teams (897 participants) with the emergent states of task conflict, relationship conflict, and trust

  13. Price transparency: building community trust.

    Science.gov (United States)

    Clarke, Richard L

    2007-01-01

    With the push from policymakers, payers, and consumers for hospitals to make their prices public, healthcare executives need to recognize two central issues related to price transparency: 1) meaningful price transparency involves helping patients and consumers understand their financial obligation for an episode of care, and 2) price transparency is key to the most critical success strategy for healthcare providers: building trust. This article reviews the history of pricing and billing practices and explores why price transparency is not easily achieved in today's environment. Pricing is a mystery even to those of us who work in the field, yet despite its complexity, the call for price transparency is not going to go away. For transparency, the goal should be to establish a rational pricing system that is easily explainable and justified to all stakeholders. Healthcare executives must make pricing a priority, understand cost, develop a pricing philosophy, understand the overall revenue requirements, examine market conditions and prices, and set up systems for review. A rational process of price setting should enhance community trust. In this matter there is nothing less at stake than the hearts of our community members.

  14. Trusted computing for embedded systems

    CERN Document Server

    Soudris, Dimitrios; Anagnostopoulos, Iraklis

    2015-01-01

    This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. Case studies are used to present new techniques designed as industrial security solutions. Coverage includes development of tamper resistant hardware and firmware mechanisms for lightweight embedded devices, as well as those serving as security anchors for embedded platforms required by applications such as smart power grids, smart networked and home appliances, environmental and infrastructure sensor networks, etc. ·         Enables readers to address a variety of security threats to embedded hardware and software; ·         Describes design of secure wireless sensor networks, to address secure authen...

  15. Trust in African Americans' Healthcare Experiences.

    Science.gov (United States)

    Murray, Traci M

    2015-01-01

    The purpose of the study is to clarify the concept of trust, identify its defining attributes, antecedents, and consequences, and apply to the healthcare experiences of African Americans. For African Americans, mistrust in the healthcare system is the result of unequal treatment that began in slavery. Fear and negative experiences engender a reluctance to trust healthcare providers, which contributes to health disparities. Walker and Avant's method of concept analysis was used to clarify the concept of trust. The concept was applied to African Americans' healthcare experiences with discussion of opportunities for trust building. Data support for concept development was done using Cumulative Index to Nursing and Allied Health Literature (CINAHL), Medline, and online reference sources. Literature review was guided by using the keyword trust. Further contextual explication was done by adding a review of literature from sociology and history regarding the evolution of African American mistrust of the U.S. healthcare system. The defining attributes of trust are dependence, willingness, and met expectations. Antecedents to trust include a need requiring the help of another and prior knowledge or experience. The consequence of trust is an evaluation of the congruence between expected and actual behaviors of the trusted person or thing. Literature review of the African American culture adds a dynamic aspect for nurses to consider when developing relationships in minority communities. Trust is the willingness to enter a dependent relationship to have the needs addressed, and is maintained by met expectations. Rebuilding trusting relationships between providers and African American patients is a vital step toward reducing health disparities. Murray. © 2015 Wiley Periodicals, Inc.

  16. Analyses of tunnel stability under dynamic loads

    OpenAIRE

    Oraee, B; Hosseini, N.; Oraee, K; Gholinejad, M

    2011-01-01

    Tunnels as any other structures are affected by different loads and stresses. Generally, the loads on tunnels consist of both static and dynamic loads. These loads must both be considered in the tunnel design process. In this paper, the stability state of Jiroft water-transform tunnel is evaluated. Firstly, the in-situ stresses and then using Kirschs equations the induced stresses due to static loads in walls and crown of tunnel are calculated. Consequently, the strain caused by probable eart...

  17. The Statistics of Chaotic Tunnelling

    CERN Document Server

    Creagh, S C; Creagh, Stephen C.; Whelan, Niall D.

    2000-01-01

    We discuss the statistics of tunnelling rates in the presence of chaotic classical dynamics. This applies to resonance widths in chaotic metastable wells and to tunnelling splittings in chaotic symmetric double wells. The theory is based on using the properties of a semiclassical tunnelling operator together with random matrix theory arguments about wave function overlaps. The resulting distribution depends on the stability of a specific tunnelling orbit and is therefore not universal. However it does reduce to the universal Porter-Thomas form as the orbit becomes very unstable. For some choices of system parameters there are systematic deviations which we explain in terms of scarring of certain real periodic orbits. The theory is tested in a model symmetric double well problem and possible experimental realisations are discussed.

  18. Free Surface Water Tunnel (FSWT)

    Data.gov (United States)

    Federal Laboratory Consortium — Description: The Free Surface Water Tunnel consists of the intake plenum, the test section and the exit plenum. The intake plenum starts with a perforated pipe that...

  19. Flatback airfoil wind tunnel experiment.

    Energy Technology Data Exchange (ETDEWEB)

    Mayda, Edward A. (University of California, Davis, CA); van Dam, C.P. (University of California, Davis, CA); Chao, David D. (University of California, Davis, CA); Berg, Dale E.

    2008-04-01

    A computational fluid dynamics study of thick wind turbine section shapes in the test section of the UC Davis wind tunnel at a chord Reynolds number of one million is presented. The goals of this study are to validate standard wind tunnel wall corrections for high solid blockage conditions and to reaffirm the favorable effect of a blunt trailing edge or flatback on the performance characteristics of a representative thick airfoil shape prior to building the wind tunnel models and conducting the experiment. The numerical simulations prove the standard wind tunnel corrections to be largely valid for the proposed test of 40% maximum thickness to chord ratio airfoils at a solid blockage ratio of 10%. Comparison of the computed lift characteristics of a sharp trailing edge baseline airfoil and derived flatback airfoils reaffirms the earlier observed trend of reduced sensitivity to surface contamination with increasing trailing edge thickness.

  20. Bijzondere belastingen in tunnels : Eindrapport

    NARCIS (Netherlands)

    Molenaar, D.J.; Weerheijm, J.; Vervuurt, A.; Burggraaf, H.; Roekaerts, D.; Meijers, P.

    2009-01-01

    Verkeerstunnels en overkapte wegen (landtunnels) komen de milieukundige en stedenbouwkundige inpassing ten goede en maken meervoudig ruimtegebruik in de stad mogelijk. Het aantal tunnels en overkappingen groeit dan ook. Dit maakt het vervoer van explosiegevaarlijke stoffen en onder hoge druk

  1. An Efficient Dynamic Trust Evaluation Model for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Zhengwang Ye

    2017-01-01

    Full Text Available Trust evaluation is an effective method to detect malicious nodes and ensure security in wireless sensor networks (WSNs. In this paper, an efficient dynamic trust evaluation model (DTEM for WSNs is proposed, which implements accurate, efficient, and dynamic trust evaluation by dynamically adjusting the weights of direct trust and indirect trust and the parameters of the update mechanism. To achieve accurate trust evaluation, the direct trust is calculated considering multitrust including communication trust, data trust, and energy trust with the punishment factor and regulating function. The indirect trust is evaluated conditionally by the trusted recommendations from a third party. Moreover, the integrated trust is measured by assigning dynamic weights for direct trust and indirect trust and combining them. Finally, we propose an update mechanism by a sliding window based on induced ordered weighted averaging operator to enhance flexibility. We can dynamically adapt the parameters and the interactive history windows number according to the actual needs of the network to realize dynamic update of direct trust value. Simulation results indicate that the proposed dynamic trust model is an efficient dynamic and attack-resistant trust evaluation model. Compared with existing approaches, the proposed dynamic trust model performs better in defending multiple malicious attacks.

  2. Long-term tunnel behaviour and ground movements after tunnelling in clayey soils

    Directory of Open Access Journals (Sweden)

    Kenichi Soga

    2017-09-01

    Full Text Available Long term ground movements above a tunnel may continue to increase with time after tunnelling in clayey soils as the tunnelling-induced excess pore water pressures dissipate, whilst the changing earth pressure acting on the tunnel leads to further tunnel deformation during consolidation. Furthermore the tunnel itself introduces new drainage conditions; that is, depending on the drainage condition of the tunnel lining, the effective stresses around the tunnel change with time, inducing further soil consolidation. A seepage rate from low permeability clayey soil is often very small and the groundwater seeping into the tunnel can evaporate quickly. Although a tunnel may look impermeable because the surface looks dry, it is possible that the tunnel drainage conditions are actually permeable. This paper summarises the investigation of soil-tunnel consolidation interaction, particularly focusing on ground surface movements and tunnel lining deformation in the interest of engineering concerns. Analysis results show that tunnel lining permittivity relative to the permeability of the surrounding ground plays an important role on both long-term ground movements as well as tunnel lining behaviour. The findings published in literature are reviewed step by step starting from a single tunnel, twin tunnels to complex cross passage structures. The mechanisms of tunnelling-induced soil consolidation for these structures are identified and, where applicable, possible engineering methodologies to assess the magnitude of long-term ground surface settlements and tunnel lining loads are proposed.

  3. Active damper wind tunnel test

    Science.gov (United States)

    2008-01-01

    Active damper wind tunnel test in support of the development of Constellation/Ares. Testing of the 1% and .548% models for active damper and wall interference assessment in support of the Ares/CLV integrated vehicle. This test occurred at the 11 foot wind tunnel at the Ames Research Center, California. This image is extracted from high definition video file and is the highest resolution available.

  4. SERVANT LEADERSHIP AND ORGANIZATIONAL TRUST: THE MEDIATING EFFECT OF THE LEADER TRUST AND ORGANIZATIONAL COMMUNICATION

    Directory of Open Access Journals (Sweden)

    Morad Rezaei

    2012-01-01

    Full Text Available The purpose of this paper aims to clarify the relationship between servant leadership and organizational trust, and tries to demonstrate the mediator role of leader trust and organizational communication in this relationship. The study sample included 258 employees of Guilan province Tax Administration and for sampling we used cluster method. Previous studies have also focused on the positive impact of servant leadership in organizational trust and in this article the results show that there is a significant relationship between servant leadership, organizational trust, leader trust and organizational communication.

  5. Building trusted national identity management systems: Presenting the privacy concern-trust (PCT) model

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    This paper discusses the effect of trust and information privacy concerns on citizens’ attitude towards national identity management systems. We introduce the privacyconcerns- trust model, which shows the role of trust in mediating and moderating citizens’ attitude towards identity management...... systems. We adopted a qualitative research approach in our analysis of data that was gathered through a series of interviews and a stakeholder workshop in Ghana. Our findings indicate that, beyond the threshold level of trust, societal information privacy concern is low; hence, trust is high, thereby...... encouraging further institutional collaboration and acceptance of citizens’ informational self-determination....

  6. Does Ideological Education in China Suppress Trust in Religion and Foster Trust in Government?

    Directory of Open Access Journals (Sweden)

    Ying Xie

    2017-05-01

    Full Text Available A major goal of ideological education in China is to promote loyalty to the party-state and to instill atheism among the people. How effective is this ideological education? This article examines the relationship between education and trust in government and trust in religion using data from the 2010 Chinese General Social Survey. We find that education is negatively associated with trust in government, while positively related to trust in religion. Our findings suggest that policies aimed at displacing religion in favor of the Communist ideology have largely failed to shape the public mindset; rather, the more educated, the more people tend to trust religion instead of the government.

  7. The Importance of Trust in Electronic Commerce.

    Science.gov (United States)

    Ratnasingham, Pauline

    1998-01-01

    Introduces the new concept of trust and how it influences the process of managing the security of an organization operating in an electronic commerce environment. Theoretically, the study aims to develop a framework of trust and security to provide a set of guidelines for secure electronic commerce. (Author/LRW)

  8. Expectations as a key element in trusting

    DEFF Research Database (Denmark)

    Rasmussen, Mette Apollo; Hansen, Uffe Kjærgaard; Conradsen, Maria Bosse

    Considering the need for a tangible focus for qualitative research on trusting, we propose that expectations to the behavior of others can provide that. By focusing on expectations, researchers can produce narrative descriptions that explains how trusting develops and changes. Then the key theore...

  9. Interpersonal Trust and Experiential Education Leadership.

    Science.gov (United States)

    Honchalk, Dave

    1982-01-01

    All factors influencing trust (cooperative relationships, communication, credibility of the leader) are important to successful growth of participants in outdoor experience and are necessary prerequisites for meaningful learning experiences. Outdoor education programs should strive to create an atmosphere of trust. (ERB)

  10. Integrity Constraints in Trust Management (Extended Abstract)

    NARCIS (Netherlands)

    Etalle, Sandro; Winsborough, William H.; Ahn, G-J.

    We introduce the use, monitoring, and enforcement of integrity constraints in trust managementstyle authorization systems. We consider what portions of the policy state must be monitored to detect violations of integrity constraints. Then we address the fact that not all participants in a trust

  11. Physical pain increases interpersonal trust in females.

    Science.gov (United States)

    Wang, C; Gao, J; Ma, Y; Zhu, C; Dong, X-W

    2017-09-14

    People behave and interact with others differently when experiencing physical pain. Pain has dramatic effects on one's emotional responses, cognitive functions and social interaction. However, little has been known about whether and how physical pain influences interpersonal trust in social interaction. In the present study, we examined the influence of physical pain on trusting behaviour. A total of 112 healthy participants were recruited and assigned to physical pain condition (induced by Capsaicin) and control condition (with hand cream), respectively. Thirty minutes after pain induction, three decision-making tasks were conducted to measure behaviours in social interaction, including trust and trustworthiness (trust game), non-social risk-taking (risk game) and altruism (dictator game). Results showed that physical pain increased interpersonal trust among females, but not among males. Pain did not influence non-social risk-taking, altruism or trustworthiness, as evaluated by monetary transfers in those tasks. Moreover, the effect of physical pain on interpersonal trust was fully mediated by expectation of monetary profit. These findings demonstrate an effect of pain on interpersonal trust and suggest a reciprocity mechanism that the effect may be driven by self-interest rather than altruistic motivation. The pain effect on trust was evident only in females, implying distinct pain coping strategies used by both genders. The present work highlights the social component of pain and extends our understanding of mutual interactions between pain and social cognition. © 2017 European Pain Federation - EFIC®.

  12. Trust Building in PPPs for Service Delivery

    DEFF Research Database (Denmark)

    Schulze, Christiane

    for service delivery in Denmark leads to two main findings. First, despite the existence of rather formalized procedures trust based on the perception of the other managers’ competence is already important before the contract is entered. Second, this trust is not automatically transferred onto the next...

  13. Corruption, Trust and their Public Sector Consequences

    DEFF Research Database (Denmark)

    Fritzen, Scott A.; Serritzlew, Søren; Svendsen, Gert Tinggaard

    2014-01-01

    Corruption and trust are two important determinants of the quality of public sectors. Empirical studies in different literatures suggest that corruption and trust have effects on factors such as economic growth, the quality of democratic institutions, life quality, the size and effectiveness of t...

  14. Playing Attack and Defense with Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe; Bouganim, Luc

    2014-01-01

    provide trusted storage? This is the question we tackle in this demonstration. We describe how secure devices, equipped with a trusted execution environment, differ from general purpose devices. We illustrate with our demonstration scenario, that it is much more difficult to attack a storage service...... running on a secure device, than to attack the same service running on a general purpose device....

  15. Web Trust Principles And Mechanisms Guiding Sustainable ...

    African Journals Online (AJOL)

    Trust is one of the mainstay of business, whether traditionally or electronically transacted. But as more and more individuals and businesses participate in electronic business, it would appear that much of what supports trust in the traditional business setting is unavailable online (the Web). It is against the backdrop that this ...

  16. The Neurobiology of Trust and Schooling

    Science.gov (United States)

    Sankey, Derek

    2018-01-01

    Are there neurobiological reasons why we are willing to trust other people and why "trust" and moral values such as "care" play a quite pivotal role in our social lives and the judgements we make, including our social interactions and judgements made in the context of schooling? In pursuing this question, this paper largely…

  17. Building Trust in High-Performing Teams

    Directory of Open Access Journals (Sweden)

    Aki Soudunsaari

    2012-06-01

    Full Text Available Facilitation of growth is more about good, trustworthy contacts than capital. Trust is a driving force for business creation, and to create a global business you need to build a team that is capable of meeting the challenge. Trust is a key factor in team building and a needed enabler for cooperation. In general, trust building is a slow process, but it can be accelerated with open interaction and good communication skills. The fast-growing and ever-changing nature of global business sets demands for cooperation and team building, especially for startup companies. Trust building needs personal knowledge and regular face-to-face interaction, but it also requires empathy, respect, and genuine listening. Trust increases communication, and rich and open communication is essential for the building of high-performing teams. Other building materials are a shared vision, clear roles and responsibilities, willingness for cooperation, and supporting and encouraging leadership. This study focuses on trust in high-performing teams. It asks whether it is possible to manage trust and which tools and operation models should be used to speed up the building of trust. In this article, preliminary results from the authors’ research are presented to highlight the importance of sharing critical information and having a high level of communication through constant interaction.

  18. Does Education Lead to Higher Generalized Trust?

    DEFF Research Database (Denmark)

    Charron, Nicholas; Rothstein, Bo

    2016-01-01

    to ‘trust others'. We hypothesize that higher levels of education will lead to higher social trust in individuals, given that the context (country or regions within countries) in which they reside has a sufficiently impartial and non-corrupt institutional setting. However, the positive effect of education...

  19. The Winston Churchill Memorial Trust of Australia

    Science.gov (United States)

    Hilton, Nicolette

    2013-01-01

    The Churchill Trust was established in 1965 to honour the memory of Sir Winston Churchill by awarding overseas research Fellowships known as "Churchill Fellowships". Since its inception, The Churchill Trust has awarded Churchill Fellowships to more than 3,700 Australians who, like Churchill, are innovative, filled with a spirit of…

  20. Trust Factors Affecting Cooperation in Construction

    DEFF Research Database (Denmark)

    Ditlev Bohnstedt, Kristian; Haugbølle, Kim; Bejder, Erik

    2013-01-01

    -productivity sector. By applying the theory that insufficient cooperation is the result of low trust the aim was to investigate how conditions for formation of positive and lasting trustful relationships can be created. A questionnaire survey including clients, contractors, architects, engineers and client design...

  1. Physical trust-based persistent authentication

    DEFF Research Database (Denmark)

    Fujita, Masahiro; Jensen, Christian D.; Arimura, Shiori

    2015-01-01

    propose a new type of persistent authentication, called Persistent Authentication Based On physical Trust (PABOT). PABOT uses a context of “physical trust relationship” that is built by visual contact between users, and thus can offer a persistent authentication mechanism with better usability and higher...

  2. Institutional and social trust: Is there a causal relationship?

    DEFF Research Database (Denmark)

    Dinesen, Peter Thisted; Sønderskov, Kim Mannemar

    affecting both types of trust. Therefore, conventional analyses using cross-sectional data are ill-suited to determine whether institutional trust actually cause social trust. In contrast to previous analyses, this paper utilizes two Danish panel surveys containing measures of the two types of trust......In the literature on social trust, institutional trust is prominent explanations of why people trust the generalized other. However, while institutional trust is a plausible cause of social trust, it is also likely to be consequences of trust or a consequence of deep-rooted personality traits...... as regressors), the results provide strong evidence of trust in state institutions exercising an impact on social trust whereas the evidence for a reverse relationship is mixed....

  3. Safety in tunnels : transport of dangerous goods through road tunnels : highlights

    Science.gov (United States)

    2001-10-01

    A serious incident involving dangerous goods in a tunnel can be extremely costly in terms of loss of human lives, environmental degradation, tunnel damage and transport disruption. On the other hand, needlessly banning dangerous goods from tunnels ma...

  4. Explaining the justice-performance relationship: trust as exchange deepener or trust as uncertainty reducer?

    Science.gov (United States)

    Colquitt, Jason A; Lepine, Jeffery A; Piccolo, Ronald F; Zapata, Cindy P; Rich, Bruce L

    2012-01-01

    Past research has revealed significant relationships between organizational justice dimensions and job performance, and trust is thought to be one mediator of those relationships. However, trust has been positioned in justice theorizing in 2 different ways, either as an indicator of the depth of an exchange relationship or as a variable that reflects levels of work-related uncertainty. Moreover, trust scholars distinguish between multiple forms of trust, including affect- and cognition-based trust, and it remains unclear which form is most relevant to justice effects. To explore these issues, we built and tested a more comprehensive model of trust mediation in which procedural, interpersonal, and distributive justice predicted affect- and cognition-based trust, with those trust forms predicting both exchange- and uncertainty-based mechanisms. The results of a field study in a hospital system revealed that the trust variables did indeed mediate the relationships between the organizational justice dimensions and job performance, with affect-based trust driving exchange-based mediation and cognition-based trust driving uncertainty-based mediation.

  5. Framing Trust at the Street-Level

    DEFF Research Database (Denmark)

    Perry, Kevin Anthony

    such as injustice and justice to create both distrust and trust frames around individual employees. The last analytical chapter reports finding four: negotiating cultural frames. The last part of the chapter looks closer at the relationship between the young men with minority ethnic backgrounds, the job consultant......This thesis deals with the phenomenon of distrust and trust between young men with minority ethnic backgrounds and public sector employees at the face-to-face level of interaction. The focus is on trust and distrust which can be understood as cultural resources – a valuable approach to researching...... trust and distrust largely under-represented in the trust literature. A common source of conflict is often a lack of confidence or distrust in the authorities; therefore, winning the confidence of minority ethnic groups in these communities is essential to easing tensions, along with reducing civil...

  6. TRUST AND DISTRUST: TWO NECESSARY FACTORS FOR THE DEVELOPMENT OF THE SOCIAL TRUST

    Directory of Open Access Journals (Sweden)

    RODRIGO YÁÑEZ GALLARDO

    2006-01-01

    Full Text Available Recent investigations argue that distrust is the absence of trust and it would be assumed that bothattitudes are independent; that would allow to distinguish between the naïve attitude and the wise attitudein the trust. It has been built a scale to measure the disposition to trust and the relationship has beenexamined among naïve and wise attitude when trusting. The sample was constituted by 575 universitystudents of both sexes, of four faculties and of different years of study. Through a factorial analysis itwas found that trust and distrust correspond to different factors. It was discussed the importance ofincrease an optimal trust in order to develop social abilities and to stimulate the social participation. Itwas questioned the validity of traditional surveys that measure the social trust.

  7. Trusting Facebook in Crisis Situations: The Role of General Use and General Trust Toward Facebook.

    Science.gov (United States)

    Szymczak, Hermann; Kücükbalaban, Pinar; Lemanski, Sandra; Knuth, Daniela; Schmidt, Silke

    2016-01-01

    An important concept that has been rather neglected in research on social media is the concept of trust. Although there is a considerable amount of research on online trust in general, little has been done in the area of social media. As a situation of risk is necessary for trust, the perceived trustworthiness of Facebook in crisis situations was examined in this study. A sample of 340 European Facebook users were questioned as part of a large European study about social media in the context of emergency situations. We found that participants' general trust toward Facebook as a medium predicted to a significant degree how much they would trust Facebook in a crisis situation. General use of Facebook and dispositional trust were also significantly associated with trust toward Facebook in a crisis situation.

  8. A Strategic Model of Trust Management in Web Services

    Science.gov (United States)

    Sun, Junqing; Sun, Zhaohao; Li, Yuanzhe; Zhao, Shuliang

    This article examines trust and trust management in web services and proposes a multiagent model of trust relationship in web services. It looks at the hierarchical structure of trust management in web services and proposes a strategic model of trust management in web services. The proposed approach in this article will facilitate research and development of trust management in e-commerce, web services and social networking.

  9. MANAGEMENT OF TUNNELS ON THE ZAGREB – MACELJ MOTORWAY IN THE COURSE OF TUNNELS EXPLOITATION

    OpenAIRE

    Deković, Zvonimir; Pili, Igor

    2012-01-01

    The paper focuses on the features of management of tunnels on the Zagreb-Macelj motorway. Management of tunnels is represented trough public-private partnership model that is applied on the Zagreb-Macelj motorway. In the course of tunnel operation and maintenance in the first five years of tunnels exploitation, the emphasis is put on the maintenance of the tunnel equipment systems. Tunnels as part of the motorway alignment are the most demanding facilities for maintaining appropriate safety a...

  10. MANAGEMENT OF TUNNELS ON THE ZAGREB – MACELJ MOTORWAY IN THE COURSE OF TUNNELS EXPLOITATION

    OpenAIRE

    Zvonimir Deković; Igor Pili

    2012-01-01

    he paper focuses on the features of management of tunnels on the Zagreb-Macelj motorway. Management of tunnels is represented trough public-private partnership model that is applied on the Zagreb-Macelj motorway. In the course of tunnel operation and maintenance in the first five years of tunnels exploitation, the emphasis is put on the maintenance of the tunnel equipment systems. Tunnels as part of the motorway alignment are the most demanding facilities for maintaining appropriate safety an...

  11. Beyond Trust: Plagiarism and Truth.

    Science.gov (United States)

    Penders, Bart

    2017-12-12

    Academic misconduct distorts the relationship between scientific practice and the knowledge it produces. The relationship between science and the knowledge it produces is, however, not something universally agreed upon. In this paper I will critically discuss the moral status of an act of research misconduct, namely plagiarism, in the context of different epistemological positions. While from a positivist view of science, plagiarism only influences trust in science but not the content of the scientific corpus, from a constructivist point of view both are at stake. Consequently, I argue that discussions of research misconduct and responsible research ought to be explicitly informed by the authors' views on the relationship between science and the knowledge it produces.

  12. Hardware IP security and trust

    CERN Document Server

    Bhunia, Swarup; Tehranipoor, Mark

    2017-01-01

    This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle. Readers will gain a comprehensive understanding of the security vulnerabilities of different types of IPs. This book would enable readers to overcome these vulnerabilities through an efficient combination of proactive countermeasures and design-for-security solutions, as well as a wide variety of IP security and trust assessment and validation techniques. This book serves as a single-source of reference for system designers and practitioners for designing secure, reliable and trustworthy SoCs.

  13. Genetic influences are virtually absent for trust.

    Directory of Open Access Journals (Sweden)

    Paul A M Van Lange

    Full Text Available Over the past decades, numerous twin studies have revealed moderate to high heritability estimates for individual differences in a wide range of human traits, including cognitive ability, psychiatric disorders, and personality traits. Even factors that are generally believed to be environmental in nature have been shown to be under genetic control, albeit modest. Is such heritability also present in social traits that are conceptualized as causes and consequences of social interactions or in other ways strongly shaped by behavior of other people? Here we examine a population-based sample of 1,012 twins and relatives. We show that the genetic influence on generalized trust in other people (trust-in-others: h2 = 5%, ns, and beliefs regarding other people's trust in the self (trust-in-self: h2 = 13%, ns, is virtually absent. As test-retest reliability for both scales were found to be moderate or high (r = .76 and r = .53, respectively in an independent sample, we conclude that all variance in trust is likely to be accounted for by non-shared environmental influences. We show that, relative to cognitive abilities, psychiatric disorders, and classic personality variables, genetic influences are smaller for trust, and propose that experiences with or observations of the behavior of other people shape trust more strongly than other traits.

  14. Current noise in tunnel junctions

    Energy Technology Data Exchange (ETDEWEB)

    Frey, Moritz; Grabert, Hermann [Physikalisches Institut, Universitaet Freiburg, Hermann-Herder-Strasse 3, 79104, Freiburg (Germany)

    2017-06-15

    We study current fluctuations in tunnel junctions driven by a voltage source. The voltage is applied to the tunneling element via an impedance providing an electromagnetic environment of the junction. We use circuit theory to relate the fluctuations of the current flowing in the leads of the junction with the voltage fluctuations generated by the environmental impedance and the fluctuations of the tunneling current. The spectrum of current fluctuations is found to consist of three parts: a term arising from the environmental Johnson-Nyquist noise, a term due to the shot noise of the tunneling current and a third term describing the cross-correlation between these two noise sources. Our phenomenological theory reproduces previous results based on the Hamiltonian model for the dynamical Coulomb blockade and provides a simple understanding of the current fluctuation spectrum in terms of circuit theory and properties of the average current. Specific results are given for a tunnel junction driven through a resonator. (copyright 2016 WILEY-VCH Verlag GmbH and Co. KGaA, Weinheim)

  15. TunnelVision: LHC Tunnel Photogrammetry System for Structural Monitoring

    CERN Document Server

    Fallas, William

    2014-01-01

    In this document an algorithm to detect deformations in the LHC Tunnel of CERN is presented. It is based on two images, one represents the ideal state of the tunnel and the other one the actual state. To find the differences between both, the algorithm is divided in three steps. First, an image enhancement is applied to make easier the detection. Second, two different approaches to reduce noise are applied to one or both images. And third, it is defined a group of characteristics about the type of deformation desired to detect. Finally, the conclusions show the effectiveness of the algorithm in the experimental results.

  16. Communicating Trust Between Parents and Their Children

    DEFF Research Database (Denmark)

    Demant, Jakob Johan; Ravn, Signe

    2013-01-01

    This article discusses how Danish parents and their children communicate trust. Based on Niklas Luhmann’s sociological theory, the article explores new aspects of communication about alcohol-related rules. The analysis shows how the parents emphasize the importance of communicating trust, while...... the adolescents, on the other hand, observe the parents’ communication on the basis of their own, more instrumental, logic. Trust becomes a functional solution to the parents’ paradoxical situation, because it enables them to balance between a democratic family ideal, emphasizing the adolescents’ independence...

  17. Trust Based Evaluation of Wikipedia's Contributors

    Science.gov (United States)

    Krupa, Yann; Vercouter, Laurent; Hübner, Jomi Fred; Herzig, Andreas

    Wikipedia is an encyclopedia on which anybody can change its content. Some users, self-proclaimed "patrollers", regularly check recent changes in order to delete or correct those which are ruining articles integrity. The huge quantity of updates leads some articles to remain polluted a certain time before being corrected. In this work, we show how a multiagent trust model can help patrollers in their task of controlling the Wikipedia. To direct the patrollers verification towards suspicious contributors, our work relies on a formalisation of Castelfranchi & Falcone's social trust theory to assist them by representing their trust model in a cognitive way.

  18. How Does Social Trust Affect Economic Growth?

    DEFF Research Database (Denmark)

    Bjørnskov, Christian

    This paper connects two strands of the literature on social trust by estimating the effects of trust on growth through a set of potential transmission mechanisms directly. It does so by modelling the process using a three-stage least squares estimator on a sample of countries for which a full data...... set is available. The results indicate that trust affects schooling and the rule of law directly. These variables in turn affect the investment rate (schooling) and provide a direct effect (rule of law) on the growth rate. The paper closes with a short discussion of the relevance of the findings....

  19. Analysis on trust influencing factors and trust model from multiple perspectives of online Auction

    Science.gov (United States)

    Yu, Wang

    2017-10-01

    Current reputation models lack the research on online auction trading completely so they cannot entirely reflect the reputation status of users and may cause problems on operability. To evaluate the user trust in online auction correctly, a trust computing model based on multiple influencing factors is established. It aims at overcoming the efficiency of current trust computing methods and the limitations of traditional theoretical trust models. The improved model comprehensively considers the trust degree evaluation factors of three types of participants according to different participation modes of online auctioneers, to improve the accuracy, effectiveness and robustness of the trust degree. The experiments test the efficiency and the performance of our model under different scale of malicious user, under environment like eBay and Sporas model. The experimental results analysis show the model proposed in this paper makes up the deficiency of existing model and it also has better feasibility.

  20. DualTrust: A Trust Management Model for Swarm-Based Autonomic Computing Systems

    Energy Technology Data Exchange (ETDEWEB)

    Maiden, Wendy M. [Washington State Univ., Pullman, WA (United States)

    2010-05-01

    Trust management techniques must be adapted to the unique needs of the application architectures and problem domains to which they are applied. For autonomic computing systems that utilize mobile agents and ant colony algorithms for their sensor layer, certain characteristics of the mobile agent ant swarm -- their lightweight, ephemeral nature and indirect communication -- make this adaptation especially challenging. This thesis looks at the trust issues and opportunities in swarm-based autonomic computing systems and finds that by monitoring the trustworthiness of the autonomic managers rather than the swarming sensors, the trust management problem becomes much more scalable and still serves to protect the swarm. After analyzing the applicability of trust management research as it has been applied to architectures with similar characteristics, this thesis specifies the required characteristics for trust management mechanisms used to monitor the trustworthiness of entities in a swarm-based autonomic computing system and describes a trust model that meets these requirements.

  1. Analysis on trust influencing factors and trust model from multiple perspectives of online Auction

    Directory of Open Access Journals (Sweden)

    Yu Wang

    2017-10-01

    Full Text Available Current reputation models lack the research on online auction trading completely so they cannot entirely reflect the reputation status of users and may cause problems on operability. To evaluate the user trust in online auction correctly, a trust computing model based on multiple influencing factors is established. It aims at overcoming the efficiency of current trust computing methods and the limitations of traditional theoretical trust models. The improved model comprehensively considers the trust degree evaluation factors of three types of participants according to different participation modes of online auctioneers, to improve the accuracy, effectiveness and robustness of the trust degree. The experiments test the efficiency and the performance of our model under different scale of malicious user, under environment like eBay and Sporas model. The experimental results analysis show the model proposed in this paper makes up the deficiency of existing model and it also has better feasibility.

  2. Pseudomorphic Bipolar Quantum Resonant-Tunneling Transistor

    National Research Council Canada - National Science Library

    Seabaugh, Alan C; Frensley, William R; Randall, John N; Reed, Mark A; Farrington, Dewey L; Matyi, Richard J

    1989-01-01

    ...+ InGaAs quantum well of a double-barrier resonant-tunneling structure. The heterojunction transistor consists of an n-GaAs emitter and collector, undoped AlAs tunnel barriers, and a pseudomorphic p...

  3. Tunneling field effect transistor technology

    CERN Document Server

    Chan, Mansun

    2016-01-01

    This book provides a single-source reference to the state-of-the art in tunneling field effect transistors (TFETs). Readers will learn the TFETs physics from advanced atomistic simulations, the TFETs fabrication process and the important roles that TFETs will play in enabling integrated circuit designs for power efficiency. · Provides comprehensive reference to tunneling field effect transistors (TFETs); · Covers all aspects of TFETs, from device process to modeling and applications; · Enables design of power-efficient integrated circuits, with low power consumption TFETs.

  4. Nature of "superluminal" barrier tunneling.

    Science.gov (United States)

    Winful, Herbert G

    2003-01-17

    We show that the distortionless tunneling of electromagnetic pulses through a barrier is a quasistatic process in which the slowly varying envelope of the incident pulse modulates the amplitude of a standing wave. For pulses longer than the barrier width, the barrier acts as a lumped element with respect to the pulse envelope. The envelopes of the transmitted and reflected fields can adiabatically follow the incident pulse with only a small delay that originates from energy storage. The theory presented here provides a physical explanation of the tunneling process and resolves the mystery of apparent superluminality.

  5. Molecular series-tunneling junctions.

    Science.gov (United States)

    Liao, Kung-Ching; Hsu, Liang-Yan; Bowers, Carleen M; Rabitz, Herschel; Whitesides, George M

    2015-05-13

    Charge transport through junctions consisting of insulating molecular units is a quantum phenomenon that cannot be described adequately by classical circuit laws. This paper explores tunneling current densities in self-assembled monolayer (SAM)-based junctions with the structure Ag(TS)/O2C-R1-R2-H//Ga2O3/EGaIn, where Ag(TS) is template-stripped silver and EGaIn is the eutectic alloy of gallium and indium; R1 and R2 refer to two classes of insulating molecular units-(CH2)n and (C6H4)m-that are connected in series and have different tunneling decay constants in the Simmons equation. These junctions can be analyzed as a form of series-tunneling junctions based on the observation that permuting the order of R1 and R2 in the junction does not alter the overall rate of charge transport. By using the Ag/O2C interface, this system decouples the highest occupied molecular orbital (HOMO, which is localized on the carboxylate group) from strong interactions with the R1 and R2 units. The differences in rates of tunneling are thus determined by the electronic structure of the groups R1 and R2; these differences are not influenced by the order of R1 and R2 in the SAM. In an electrical potential model that rationalizes this observation, R1 and R2 contribute independently to the height of the barrier. This model explicitly assumes that contributions to rates of tunneling from the Ag(TS)/O2C and H//Ga2O3 interfaces are constant across the series examined. The current density of these series-tunneling junctions can be described by J(V) = J0(V) exp(-β1d1 - β2d2), where J(V) is the current density (A/cm(2)) at applied voltage V and βi and di are the parameters describing the attenuation of the tunneling current through a rectangular tunneling barrier, with width d and a height related to the attenuation factor β.

  6. Inelastic scattering in resonant tunneling

    DEFF Research Database (Denmark)

    Wingreen, Ned S.; Jacobsen, Karsten Wedel; Wilkins, John W.

    1989-01-01

    The exact resonant-tunneling transmission probability for an electron interacting with phonons is presented in the limit that the elastic coupling to the leads is independent of energy. The phonons produce transmission sidebands but do not affect the integrated transmission probability or the esc......The exact resonant-tunneling transmission probability for an electron interacting with phonons is presented in the limit that the elastic coupling to the leads is independent of energy. The phonons produce transmission sidebands but do not affect the integrated transmission probability...

  7. Complications of Carpal Tunnel Release.

    Science.gov (United States)

    Karl, John W; Gancarczyk, Stephanie M; Strauch, Robert J

    2016-04-01

    Carpal tunnel release for compression of the median nerve at the wrist is one of the most common and successful procedures in hand surgery. Complications, though rare, are potentially devastating and may include intraoperative technical errors, postoperative infection and pain, and persistent or recurrent symptoms. Patients with continued complaints after carpal tunnel release should be carefully evaluated with detailed history and physical examination in addition to electrodiagnostic testing. For those with persistent or recurrent symptoms, a course of nonoperative management including splinting, injections, occupational therapy, and desensitization should be considered prior to revision surgery. Copyright © 2016 Elsevier Inc. All rights reserved.

  8. Framing Trust at the Street-Level

    DEFF Research Database (Denmark)

    Perry, Kevin Anthony

    This thesis deals with the phenomenon of distrust and trust between young men with minority ethnic backgrounds and public sector employees at the face-to-face level of interaction. The focus is on trust and distrust which can be understood as cultural resources – a valuable approach to researching...... trust and distrust largely under-represented in the trust literature. A common source of conflict is often a lack of confidence or distrust in the authorities; therefore, winning the confidence of minority ethnic groups in these communities is essential to easing tensions, along with reducing civil...... processes between public sector employees and young men with minority ethnic backgrounds, an under-researched and often misunderstood area. The central focus is on the relationship between the young men with minority ethnic backgrounds, a team of youth workers, a job consultant and a police officer...

  9. A Model of Trusted Connection Architecture

    Directory of Open Access Journals (Sweden)

    Zhang Xun

    2017-01-01

    Full Text Available According to that traditional trusted network connection architecture (TNC has limitations on dynamic network environment and the user behavior support, we develop TCA to propose a trusted connection architecture supporting behavior measurement (TCA-SBM, besides, the structure diagram of network architecture is given. Through introducing user behavior measure elements, TCA-SBM can conduct measurement on the whole network in time dimension periodically, and refine the measurement on network behavior in measure dimension to conduct fine-grained dynamic trusted measurement. As a result, TCA-SBM enhances the TCA’s ability to adapt to the dynamic change of network and makes up the deficiency of trusted computing framework in the network connection.

  10. Estate Planning: The Role of Trust Funds.

    Science.gov (United States)

    Neidermeyer, Ellen; Neidermeyer, Adolph

    1985-01-01

    The authors present estate planning suggestions that address concerns about lifetime care for the disabled children of aging parents. Aspects covered include disinheriting children, trust funds, and medical and legal assistance and food stamps. (CL)

  11. Trust region minimization of orbital localization functions

    DEFF Research Database (Denmark)

    Høyvik, Ida-Marie; Jansik, Branislav; Jørgensen, Poul

    2012-01-01

    The trust region method has been applied to the minimization of localization functions, and it is shown that both local occupied and local virtual Hartree–Fock (HF) orbitals can be obtained. Because step sizes are size extensive in the trust region method, large steps may be required when...... the method is applied to large molecular systems. For an exponential parametrization of the localization function only small steps are allowed, and the standard trust radius update therefore has been replaced by a scheme where the direction of the step is determined using a conservative estimate of the trust...... radius and the length of the step is determined from a line search along the obtained direction. Numerical results for large molecular systems have shown that large steps can then safely be taken, and a robust and nearly monotonic convergence is obtained....

  12. Trust and Coordination in Offshore Outsourcing

    DEFF Research Database (Denmark)

    Tøth, Thomas

    2013-01-01

    the implementation of handover meetings affected Danish employees' perception of their Indian counterparts in terms of work attitude, competence and reliability - and ultimately how these handover meetings increased the Danish employees' willingness and ability to trust their Indian counterparts. Contemporary...

  13. Personalized Service Recommendation Based on Trust Relationship

    Directory of Open Access Journals (Sweden)

    Hao Tian

    2017-01-01

    Full Text Available With the rapid development and extensive application of Web services, various approaches for Web service recommendation have been proposed in the past. However, the traditional methods only utilize the information of the user-service rating matrix but ignore the trust relations between users, so their recommendation precision is often unsatisfactory, and, furthermore, most of these methods lack the ability to distinguish the credibility of recommendation. To address the problems, we proposed a personalized service recommendation based on trust relationship. In particular, our approach takes into account user experience, interest background, recommendation effect, and evaluation tendency in the formalization of trust relationship, and moreover it can filter out useless or suspected services by exploiting trust relationships between users. To verify the proposed approach, we conducted experiments by using a real-world Web services set. The experimental results show that our proposed approach leads to a substantial increase in the precision and the credibility of service recommendations.

  14. Supporting collaboration with trust virtual organization

    NARCIS (Netherlands)

    Lin, A.; Vullings, E.; Dalziel, J.

    2008-01-01

    This chapter introduces the trust virtual organization as a means of facilitating authentication and authorization for sharing distributed and protected contents and services. It indicates that sharing institutional protected services and deliverables has proven a hurdle since user accounts are

  15. Leaking Underground Storage Tank (LUST) Trust Fund

    Science.gov (United States)

    In 1986, Congress created the Leaking Underground Storage Tank (LUST) Trust Fund to address releases from federally regulated underground storage tanks (USTs) by amending Subtitle I of the Solid Waste Disposal Act.

  16. The Contextual Antecedents of Organizational Trust

    DEFF Research Database (Denmark)

    Li, Peter Ping; Bai, Yuntao; Xi, Youmin

    2012-01-01

    , and cultural norm at the organizational level, on organizational trust directly, and their behavioural outcomes at the individual level indirectly, using organizational trust as a cross-level mediator. The empirical results, based on a hierarchical linear model with a sample of 444 employees from 82 firms......In this article we seek to explore the contextual antecedents of organizational trust. In light of the complex links between organizational contexts and organizational behaviours, we focus on the effects of the three most critical contextual antecedents, i.e., leadership role, structural rule...... in China, lent support for our multidimensional cross-level model of context–trust–behaviour link. We extend the research on organizational trust by treating it as a cross-level phenomenon and by specifying its core contextual antecedents and behavioural consequences....

  17. Leader Trust, Competence, LMX, and Member Performance.

    Science.gov (United States)

    Byun, Gukdo; Dai, Ye; Lee, Soojin; Kang, Seungwan

    2017-01-01

    Based on social exchange theory, this study examines the influence of leaders' trusting behavior and competence in in-role activities on members' perceived leader-member exchange (LMX) relationships. Our study proposes that a leader's trust in a member contributes to the member's perceived LMX, and that the leader's competence in in-role activities moderates this relationship. Furthermore, our study suggests that perceived LMX mediates the relationship between the leader's trust and members' task performance. Finally, the study proposes that the leader's competence moderates the mediating role of LMX in transmitting the effect of the leader's trust on members' task performance. Analyses of the data collected from soldiers and platoon leaders in the South Korean army support these hypotheses.

  18. Trust and communicated attributions in close relationships.

    Science.gov (United States)

    Rempel, J K; Ross, M; Holmes, J G

    2001-07-01

    The attributional statements intimate partners communicate to one another were examined as a function of trust. In discussions by 35 married couples, 850 attributions and corresponding events were coded on dimensions of valence, globality, and locus. Results of regression and contingency analyses indicate that attributional statements expressed in high-trust relationships emphasized positive aspects of the relationship. Medium-trust couples actively engaged issues but focused more on negative events and explanations. Low-trust couples expressed more specific, less affectively extreme attributional statements that minimized the potential for increased conflict. Results could not be accounted for by relationship satisfaction. These findings also highlight the importance of focusing on features of the events for which attributions are expressed.

  19. Trust Ownership of the Tata Group

    DEFF Research Database (Denmark)

    Thomsen, Steen

    structure is characterized by managerial distance between trusts and Group companies. The Trusts are almost exclusively concerned with philanthropy, and according to the Articles of Association of Tata Sons Limited, their governance role is limited to nominating two members to the Selection Committee which......The Indian Tata Group is one of the largest and most admired business groups in the world. It has 28 listed subsidiaries and more than 80 operating businesses. It has shown strong financial performance and social responsibility for decades. Interestingly, it has a unique ownership structure......: the main holding company Tata Sons Limited is majority-owned by charitable trusts. We examine the governance of this remarkable entity. The Trusts own 66% of Tata Sons, the main holding company of the Group, while members of the founding Tata family are very small minority shareholders. The governance...

  20. Trust in Co-sourced Software Development

    DEFF Research Database (Denmark)

    Schlichter, Bjarne Rerup; Persson, John Stouby

    2014-01-01

    Software development projects are increasingly geographical distributed with offshoring. Co-sourcing is a highly integrative and cohesive approach, seen successful, to software development offshoring. However, research of how dynamic aspects of trust are shaped in co-sourcing activities is limited....... We present a case study of how the co-sourcing relationship between a certified CMMI-level 5 Danish software company and an offshoring supplier can be conceptualized as an Abstract System. An Abstract System is a dis-embedded social system (such as banking) that is trusted despite lack of detailed...... understanding or personal trust relations. The paper suggests how certain work practices among developers and managers can be explained using a dynamic trust lens based on Abstract Systems, especially dis- and re-embedding mechanisms...

  1. 14 CFR 47.8 - Voting trusts.

    Science.gov (United States)

    2010-01-01

    ... prospective beneficiary, creditor, debtor, supplier or contractor of any other party to the trust agreement; (iv) That each voting trustee is not aware of any reason, situation, or relationship under which any...

  2. Disentangling cancer patients' trust in their oncologist: a qualitative study

    NARCIS (Netherlands)

    Hillen, Marij A.; Onderwater, Astrid T.; van Zwieten, Myra C. B.; de Haes, Hanneke C. J. M.; Smets, Ellen M. A.

    2012-01-01

    Objective: Patients' trust in their physician is crucial for an optimal treatment. Yet, among oncology patients, for whom trust might be especially important, research into trust is limited. A qualitative interview study was carried out to investigate (1) to what extent aspects of trust important to

  3. Cultural identity and patient trust among older American Indians.

    Science.gov (United States)

    Simonds, Vanessa W; Goins, R Turner; Krantz, Elizabeth M; Garroutte, Eva Marie

    2014-03-01

    Patients' trust in healthcare providers and institutions has been identified as a likely contributor to racial-ethnic health disparities. The likely influence of patients' cultural characteristics on trust is widely acknowledged but inadequately explored. To compare levels of patients' trust in primary care provider (interpersonal trust) with trust in healthcare organizations (institutional trust) among older American Indians (AIs), and determine associations with cultural identity. Patient survey administered following primary care visits. Two-hundred and nineteen American Indian patients ≥ 50 years receiving care for a non-acute condition at two clinics operated by the Cherokee Nation in northeastern Oklahoma. Self-reported sociodemographic and cultural characteristics. Trust was measured using three questions about interpersonal trust and one measure of institutional trust; responses ranged from strongly agree to strongly disagree. Finding substantial variation only in institutional trust, we used logistic generalized estimating equations to examine relationships of patient cultural identity with institutional trust. Ninety-five percent of patients reported trusting their individual provider, while only 46 % reported trusting their healthcare institution. Patients who strongly self-identified with an AI cultural identity had significantly lower institutional trust compared to those self-identifying less strongly (OR: 0.6, 95 % CI: 0.4, 0.9). Interpersonal and institutional trust represent distinct dimensions of patients' experience of care that may show important relationships to patients' cultural characteristics. Strategies for addressing low institutional trust may have special relevance for patients who identify strongly with AI culture.

  4. A Formal Model for Trust in Dynamic Networks

    DEFF Research Database (Denmark)

    Carbone, Marco; Nielsen, Mogens; Sassone, Vladimiro

    2003-01-01

    We propose a formal model of trust informed by the Global Computing scenario and focusing on the aspects of trust formation, evolution, and propagation. The model is based on a novel notion of trust structures which, building on concepts from trust management and domain theory, feature at the same...

  5. Teacher Trust in District Administration: A Promising Line of Inquiry

    Science.gov (United States)

    Adams, Curt M.; Miskell, Ryan C.

    2016-01-01

    Purpose: We set out in this study to establish a foundation for a line of inquiry around teacher trust in district administration by (1) describing the role of trust in capacity building, (2) conceptualizing trust in district administration, (3) developing a scale to measure teacher trust in district administration, and (4) testing the…

  6. Trust Matters: Leadership for Successful Schools, 2nd Edition

    Science.gov (United States)

    Tschannen-Moran, Megan

    2014-01-01

    Make your school soar by escalating trust between teachers, students, and families. Trust is an essential element in all healthy relationships, and the relationships that exist in your school are no different. How can your school leaders or teachers cultivate trust? How can your institution maintain trust once it is established? These are the…

  7. 24 CFR 92.500 - The HOME Investment Trust Fund.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false The HOME Investment Trust Fund. 92... Investment Trust Fund. (a) General. A HOME Investment Trust Fund consists of the accounts described in this... Investment Trust Fund United States Treasury account for each participating jurisdiction. Each participating...

  8. 26 CFR 1.664-2 - Charitable remainder annuity trust.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 8 2010-04-01 2010-04-01 false Charitable remainder annuity trust. 1.664-2... TAX (CONTINUED) INCOME TAXES Estates and Trusts Which May Accumulate Income Or Which Distribute Corpus § 1.664-2 Charitable remainder annuity trust. (a) Description. A charitable remainder annuity trust is...

  9. Design and validation of a relative trust model

    NARCIS (Netherlands)

    Hoogendoorn, M.; Jaffry, S.W.; Maanen, P.P. van; Treur, J.

    2014-01-01

    When considering intelligent agents that interact with humans, having an idea of the trust levels of the human, for example in other agents or services, can be of great importance. Most models of human trust that exist assume trust in one trustee is independent of trust in another trustee. The model

  10. Self-Efficacy Mediates the Association between Partner Trust and ...

    African Journals Online (AJOL)

    AJRH Managing Editor

    psychological resilience and partner trust to increase understanding of trust towards one's intercourse partner. Mediation analyses, stratified by gender, reveal that condom usage is predicted by self-efficacy and partner trust among females but not males. Higher psychological resilience predicts lower partner trust among ...

  11. Collective Trust: Why Schools Can't Improve without It

    Science.gov (United States)

    Forsyth, Patrick B.; Adams, Curt M.; Hoy, Wayne K.

    2011-01-01

    The culmination of nearly three decades of research, "Collective Trust" offers new insight and practical knowledge on the social construction of trust for school improvement. The authors argue that "collective trust" is not merely an average trust score for a group, but rather an independent concept with distinctive origins and consequences. The…

  12. Trust in food: a comparative and institutional analysis

    National Research Council Canada - National Science Library

    Kjærnes, Unni; Warde, Alan; Harvey, Mark

    2007-01-01

    ... and institutional performance 2.6 Institutionalized relationships of trust 2.7 Determinants of trust in institutionalized arrangements 2.8 Forms of institutionalization and forms of trust in contemporary food markets 18 19 21 23 25 27 29 34 37 3 Enquiring into Trust: Some Methodological Considerations 3.1 The project 3.2 The nature of the comparative inst...

  13. Analyzing user demographics and user behavior for trust assessment

    NARCIS (Netherlands)

    Ceolin, D.; Groth, P.T.; Nottamkandath, A.; Fokkink, W.J.; van Hage, W.R.

    2014-01-01

    In many systems, the determination of trust is reduced to reputation estimation. However, reputation is just one way of determining trust. The estimation of trust can be tackled from a variety of other perspectives. In this chapter, we model trust relying on user reputation, user demographics and

  14. Dynamic Trust Management for Mobile Networks and Its Applications

    Science.gov (United States)

    Bao, Fenye

    2013-01-01

    Trust management in mobile networks is challenging due to dynamically changing network environments and the lack of a centralized trusted authority. In this dissertation research, we "design" and "validate" a class of dynamic trust management protocols for mobile networks, and demonstrate the utility of dynamic trust management…

  15. Tunable tunneling electroresistance in ferroelectric tunnel junctions by mechanical loads.

    Science.gov (United States)

    Luo, Xin; Wang, Biao; Zheng, Yue

    2011-03-22

    Combining nonequilibrium Green function's approach with density functional theory, effects of the applied mechanical loads on polarization, electrostatic potential, and tunneling conductance of a ferroelectric tunneling junction (FTJ) have been investigated. Using the first principle calculations, we show that compressive strains can induce and enhance the polarization in ferroelectric tunnel barriers, and practically achieve ferroelectricity in two unit cell thickness under a -2.2% compressive strain. More importantly, mechanical strains can significantly change the effective electrostatic potential in FTJ and thus control its tunneling conductance, which is defined as giant piezoelectric resistance (GPR) effect. Our calculations indicate that GPR effect is particularly significant near the paraelectric/ferroelectric phase transition, and increases exponentially with the barrier thickness. Furthermore, it is also found that defects of oxygen vacancies and nitrogen doping have little impact on GPR ratio of strained FTJ. Because of its high-sensitivity to external mechanical loads, FTJ with GPR effect should be adequate for applications in agile mechanical sensors, transducers, and other multifunctional devices.

  16. Tunneling in high-K isomeric decays

    CERN Document Server

    Shizuma, T; Shimizu, Y R

    2002-01-01

    We have systematically investigated highly-K-forbidden transitions observed in the Hf, W and Os region, using the gamma-tunneling model in which low-K and high-k states interact through a process of quantum tunneling. The measured hindrance factors are compared with the values calculated using the gamma-tunneling model. Isotope dependences of gamma-tunneling probabilities particularly for neutron-rich nuclei and the relation to stimulated decays of isomers are discussed. (author)

  17. Trust in technology-mediated collaborative health encounters: constructing trust in passive user interactions with technologies.

    Science.gov (United States)

    Montague, Enid; Asan, Onur

    2012-01-01

    The present study investigated factors that explain patient trust in health technology and the relationship between patient trust in technology and trust in their care provider. Sociotechnical systems theory states that changes in one part of the system are likely related to other parts of the system. Therefore, attitudes about technologies, like trust, are likely related to other aspects of the system. Contributing to appropriate trust at the technological, interpersonal, and system levels can potentially lead to positive health outcomes. The study described in this manuscript used data collected from 101 patients with a Trust in Medical Technology instrument. The instrument measured patients' trust in (1) their providers, (2) the technology, and (3) how their providers used the technology. Measure 3 was positively associated with measures 1 and 2, while measures 1 and 2 were not positively or negatively associated with one another. These results may indicate that patient assessments of the trustworthiness of care providers and technologies are based on their observations of how providers use technologies. Though patients are not active users of technologies in health care, the results of this study show that their perceptions of how providers use technology are related to their trust in both technology and the care provider. Study findings have implications for how trust is conceptualised and measured in interpersonal relationships and in technologies.

  18. Trust in health care providers: factors predicting trust among homeless veterans over time.

    Science.gov (United States)

    van den Berk-Clark, Carissa; McGuire, James

    2014-08-01

    We examined whether a combination of predisposing, enabling, need, and primary care experience variables would predict trust in medical health care providers for homeless veterans over 18 months. Linear mixed model analysis indicated that, among these variables, race, social support, service-connected disability status, and satisfaction and continuity with providers predicted trust in provider over time. Trust in providers improved during the initial stages of the relationship between patient and provider and then declined to slightly below baseline levels over time. Further research is needed to determine generalizability and effects of provider trust on patient health care status over longer periods of time.

  19. Can We Trust Measures of Political Trust? Assessing Measurement Equivalence in Diverse Regime Types.

    Science.gov (United States)

    Schneider, Irena

    2017-01-01

    Do standard "trust in government" survey questions deliver measures which are reliable and equivalent in meaning across diverse regime types? I test for the measurement equivalence of political trust in a sample of 35 former Soviet and European countries using the 2010 Life in Transition Survey II conducted by the World Bank and European Bank for Reconstruction and Development. Employing multiple group confirmatory factor analysis, I find that trust perceptions in central political institutions differ from (1) trust in regional and local political institutions, (2) trust in protective institutions like the armed forces and police and (3) trust in order institutions like the courts and police. Four measurement models achieve partial metric invariance and two reach partial scalar invariance in most countries, allowing for comparisons of correlates using latent factors from each model. I also found some clustering of measurement error and variation in the dimensionality of political trust between democratic and autocratic portions of the sample. On some measurement parameters, therefore, respondents in diverse cultures and regime types do not have equivalent understandings of political trust. The findings offer both optimism and a note of caution for researchers using political trust measures in cross-regime contexts.

  20. Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker

    Directory of Open Access Journals (Sweden)

    Ahmad Samer Wazan

    2017-01-01

    Full Text Available A Public Key Infrastructure (PKI is considered one of the most important techniques used to propagate trust in authentication over the Internet. This technology is based on a trust model defined by the original X.509 (1988 standard and is composed of three entities: the certification authority (CA, the certificate holder (or subject, and the Relying Party (RP. The CA plays the role of a trusted third party between the certificate holder and the RP. In many use cases, this trust model has worked successfully. However, we argue that the application of this model on the Internet implies that web users need to depend on almost anyone in the world in order to use PKI technology. Thus, we believe that the current TLS system is not fit for purpose and must be revisited as a whole. In response, the latest draft edition of X.509 has proposed a new trust model by adding new entity called the Trust Broker (TB. In this paper, we present an implementation approach that a Trust Broker could follow in order to give RPs trust information about a CA by assessing the quality of its issued certificates. This is related to the quality of the CA’s policies and procedures and its commitment to them. Finally, we present our Trust Broker implementation that demonstrates how RPs can make informed decisions about certificate holders in the context of the global web, without requiring large processing resources themselves.

  1. Online trust building through third party trust transfer and third party protection

    Science.gov (United States)

    Wandoko, Wanda; Saleh Abbas, Bahtiar; Budiastuti, Dyah; Kosala, Raymond

    2017-03-01

    The primary objective of this research is to develop an online trust building mechanism for SME (Small Medium Enterprise). Trust is very important in e-commerce. The nature of online shopping has a greater uncertainty than offline shopping. Seeing as there is an uncertainty that can produce risks, a prospective buyer’s trust is needed. A lot of people’s unwillingness to shop online is caused by their lack of trust toward e-commerce. E-commerce is said to be one of the ways for SME to compete with bigger companies. However, building trust requires immense time and cost. SME with limited resources may experience difficulties in building trust just with their own resources. Base on literature research that needs to be validated in next research, we found that trust can be built through trust transfer from the reputable and well-known trust-mark issuer, and third party protection such as escrow account service and credit card issuer.

  2. Statis Program Analysis for Reliable, Trusted Apps

    Science.gov (United States)

    2017-02-01

    devices. App stores also provide a tempting vector for an attacker. An attacker can take advantage of bugdoors (software defects that permit...STATIC PROGRAM ANALYSIS FOR RELIABLE, TRUSTED APPS UNIVERSITY OF WASHINGTON FEBRUARY 2017 FINAL TECHNICAL REPORT APPROVED FOR PUBLIC RELEASE...STATIC PROGRAM ANALYSIS FOR RELIABLE, TRUSTED APPS 5a. CONTRACT NUMBER 5b. GRANT NUMBER FA8750-12-2-0107 5c. PROGRAM ELEMENT NUMBER 61101E 6. AUTHOR

  3. Social Trust and the Growth of Schooling

    DEFF Research Database (Denmark)

    Bjørnskov, Christian

    The paper develops a simple model to exemplify how social trust might affect the growth of schooling through lowering transaction costs. In a sample of 52 countries, the paper thereafter provides empirical evidence that trust has indeed led to faster growth of schooling in the period 1960......-2000. The findings are robust to the inclusion of a set of control variables and being estimated using an instrumental variables approach...

  4. Social Trust and the Growth of Schooling

    DEFF Research Database (Denmark)

    Bjørnskov, Christian

    2009-01-01

    The paper develops a simple model to examine how social trust might affect the growth of schooling through lowering transaction costs associated with employing educated individuals. In a sample of 52 countries, the paper thereafter provides empirical evidence that trust has led to faster growth...... of schooling in the period 1960-2000. The findings are robust to the inclusion of a set of control variables and being estimated using an instrumental variables approach....

  5. Delaying gratification depends on social trust

    OpenAIRE

    Laura eMichaelson; Alejandro ede la Vega; Christopher eChatham; Yuko eMunakata

    2013-01-01

    Delaying gratification is hard, yet predictive of important life outcomes, such as academic achievement and physical health. Prominent theories focus on the role of self-control, hypersensitivity to immediate rewards, and the cost of time spent waiting. However, delaying gratification may also require trust in people delivering future rewards as promised. To test the role of social trust, participants were presented with character vignettes and faces that varied in trustworthiness, and the...

  6. Trust: Implications for the Army Profession

    Science.gov (United States)

    2013-10-01

    with the frameworks to understand trust and do not have the language to discuss it effec- tively. The lack of understanding is most acute when...members expressed less trust in elected or appointed civilian leaders.11 The Army Profession study concluded this sec- tion of the report, saying...mission at risk. Army culture lauds leadership and eschews management descrip- tors in the cultural idioms used in performance appraisals, awards

  7. Building Trust-Based Sustainable Networks

    Science.gov (United States)

    2013-06-05

    influence relationships among entities? ■ What behaviors affect trust and sustainability (e.g., altruism , reciprocation, cooperation)? Based on these...addition, altruistic behavior can trigger the reciprocal altruistic relationship, the so called “reciprocal altruism .” In this rela- tionship, some... Prosocial Behavior , r. A. Hinde and J. Groebel, Eds. Cambridge univ. Press, 1991, pp. 27–48. [4] C. Castelfranchi and r. Falcone, TrustThe- ory: A

  8. The Relationship between Teamwork and Organizational Trust

    OpenAIRE

    Musab Işık; Kürşad Timuroğlu; Yussuf Aliyev

    2015-01-01

    The aim of this study is to investigate the relationship between teamwork and organizational trust. In the implementation section the data from the survey of 250 workers is employed in call centers in Erzurum by using relevant statistical methods. Consequently, it is found that there is a positive and significant relationship between teamwork and organizational trust. Thus, the hypothesis of the study is supported as it was expected. Besides, it is found that there are positive and significan...

  9. A Model of Trusted Connection Architecture

    OpenAIRE

    Zhang Xun; Wang Zhihao; Zhi Yong; Yuan Hui

    2017-01-01

    According to that traditional trusted network connection architecture (TNC) has limitations on dynamic network environment and the user behavior support, we develop TCA to propose a trusted connection architecture supporting behavior measurement (TCA-SBM), besides, the structure diagram of network architecture is given. Through introducing user behavior measure elements, TCA-SBM can conduct measurement on the whole network in time dimension periodically, and refine the measurement on network ...

  10. Interpersonal trust and empathy in nurse-nurse relationships.

    Science.gov (United States)

    Northouse, P G

    1979-01-01

    The specific purpose of a study that examined interpersonal communication in ongoing nurse-nurse dyads was to ascertain the nature of the relationship between interpersonal trust and empathy in nurse-nurse interaction. Analysis of questionnaire data collected from a sample of 36 diploma school nursing instructors indicated slight correlations between specific trust and general trust and between general trust and empathy. A strong negative correlation was found between specific trust and empathy. Discussion centered on an explanation for the inverse relationship between specific trust and empathy and a proposed model for how trust functions in ongoing nurse-nurse dyads.

  11. Characterization of magnetic tunnel junction test pads

    DEFF Research Database (Denmark)

    Østerberg, Frederik Westergaard; Kjær, Daniel; Nielsen, Peter Folmer

    2015-01-01

    We show experimentally as well as theoretically that patterned magnetic tunnel junctions can be characterized using the current-in-plane tunneling (CIPT) method, and the key parameters, the resistance-area product (RA) and the tunnel magnetoresistance (TMR), can be determined. The CIPT method...

  12. Fiber coupled ultrafast scanning tunneling microscope

    DEFF Research Database (Denmark)

    Keil, Ulrich Dieter Felix; Jensen, Jacob Riis; Hvam, Jørn Märcher

    1997-01-01

    We report on a scanning tunneling microscope with a photoconductive gate in the tunneling current circuit. The tunneling tip is attached to a coplanar transmission line with an integrated photoconductive switch. The switch is illuminated through a fiber which is rigidly attached to the switch...

  13. 7 CFR 58.621 - Freezing tunnels.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 3 2010-01-01 2010-01-01 false Freezing tunnels. 58.621 Section 58.621 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Standards....621 Freezing tunnels. Freezing tunnels for quick freezing at extremely low temperatures shall be...

  14. Vehicle fires and fire safety in tunnels

    Science.gov (United States)

    2002-09-20

    Tunnels present what is arguably the most hazardous environment, from the point of view of fire safety, that members of the public ever experience. The fire safety design of tunnels is carried out by tunnel engineers on the basis of a potential fire ...

  15. Railway tunnels in Europe and North America

    Science.gov (United States)

    2002-05-01

    This list of railway tunnels (longer than 1, 000 m) was compiled by the secretariat from various national and international sources. The list is intended to serve as a reference inventory for a long railway tunnels in Europe and North America. Tunnel...

  16. The road safety of motorway tunnels.

    NARCIS (Netherlands)

    2009-01-01

    This fact sheet discusses the safety of motorway tunnels in the Netherlands. Broadly speaking, it is not certain whether crashes in the Netherlands are relatively more frequent in tunnels than on open road stretches. However, there are certain factors that increase the risk in tunnels, such as the

  17. 49 CFR 177.810 - Vehicular tunnels.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Vehicular tunnels. 177.810 Section 177.810... Information and Regulations § 177.810 Vehicular tunnels. Except as regards Class 7 (radioactive) materials... through any urban vehicular tunnel used for mass transportation. [Amdt. 177-52, 46 FR 5316, Jan. 19, 1981...

  18. All NbN tunnel junction fabrication

    Science.gov (United States)

    Leduc, H. G.; Khanna, S. K.; Stern, J. A.

    1987-01-01

    The development of SIS tunnel junctions based on NbN for mixer applications in the submillimeter range is reported. The unique technological challenges inherent in the development of all refractory-compound superconductor-based tunnel junctions are highlighted. Current deposition and fabrication techniques are discussed, and the current status of all-NbN tunnel junctions is reported.

  19. Aeronautical Wind Tunnels, Europe and Asia

    Science.gov (United States)

    2006-02-01

    site: http://sop25.kaist.ac.kr/index.html. February 2006 Page 117 of 308 European and Asian Wind Tunnels KAIST Anechoic Wind Tunnel, Korea Advanced... KAIST Anechoic Wind Tunnel.” <http://acoustic.kaist.ac.kr/research/wind.php> Korea Advanced Institute of Science and Technology. “Low Turbulence Open

  20. Analysing Trust Transitivity and The Effects of Unknown Dependence

    Directory of Open Access Journals (Sweden)

    Touhid Bhuiyan

    2010-03-01

    Full Text Available Trust can be used to improve online automated recommendation within a given domain. Trust transitivity is used to make it successful. But trust transitivity has different interpretations. Trust and trust transitivity; both are the human mental phenomenon and for this reason, there is no such thing as objective transitivity. Trust transitivity and trust fusion both are important elements in computational trust. This paper analyses the parameter dependence problem in trust transitivity and proposes some definitions considering the effects of base rate. In addition, it also proposes belief functions based on subjective logic to analyse trust transitivity of three specified cases with sensitive and insensitive based rate. Then it presents a quantitative analysis of the effects of unknown dependence problem in an interconnected network environment; such Internet.

  1. Parochial trust and cooperation across 17 societies.

    Science.gov (United States)

    Romano, Angelo; Balliet, Daniel; Yamagishi, Toshio; Liu, James H

    2017-11-28

    International challenges such as climate change, poverty, and intergroup conflict require countries to cooperate to solve these complex problems. However, the political tide in many countries has shifted inward, with skepticism and reluctance to cooperate with other countries. Thus, cross-societal investigations are needed to test theory about trust and cooperation within and between groups. We conducted an experimental study in 17 countries designed to test several theories that explain why, who, and where people trust and cooperate more with ingroup members, compared with outgroup members. The experiment involved several interactions in the trust game, either as a trustor or trustee. We manipulated partner group membership in the trust game (ingroup, outgroup, or unknown) and if their reputation was at stake during the interaction. In addition to the standard finding that participants trust and cooperate more with ingroup than outgroup members, we obtained findings that reputational concerns play a decisive role for promoting trust and cooperation universally across societies. Furthermore, men discriminated more in favor of their ingroup than women. Individual differences in cooperative preferences, as measured by social value orientation, predicted cooperation with both ingroup and outgroup members. Finally, we did not find support for three theories about the cross-societal conditions that influence the degree of ingroup favoritism observed across societies (e.g., material security, religiosity, and pathogen stress). We discuss the implications for promoting cooperation within and between countries. Copyright © 2017 the Author(s). Published by PNAS.

  2. Specifics of interpersonal trust among people with different gender identities

    OpenAIRE

    Zinchenko, Yury P.; Olga Yu. Zotova; Lyudmila V. Tarasova

    2017-01-01

    Background. This study addresses a current problem relating to trust and the identification of gender differences in trust/mistrust manifestation. Gender identity is associated with cultural stereotypes and social roles, which facilitate the formation of trust in people. It acts as a significant integral meaning-based component of an individual’s “I”- conception, which contributes to the formation of trust in himself and the world around him. Objective. To study features of trust/mistrus...

  3. Interpersonal Trust across Six Asia-Pacific Countries: Testing and Extending the ‘High Trust Society’ and ‘Low Trust Society’ Theory

    Science.gov (United States)

    Ward, Paul R.; Mamerow, Loreen; Meyer, Samantha B.

    2014-01-01

    Background Trust is regarded as a necessary component for the smooth running of society, although societal and political modernising processes have been linked to an increase in mistrust, potentially signalling social and economic problems. Fukuyama developed the notion of ‘high trust’ and ‘low trust’ societies, as a way of understanding trust within different societies. The purpose of this paper is to empirically test and extend Fukuyama’s theory utilising data on interpersonal trust in Taiwan, Hong Kong, South Korea, Japan, Australia and Thailand. This paper focuses on trust in family, neighbours, strangers, foreigners and people with a different religion. Methods Cross-sectional surveys were undertaken in 2009–10, with an overall sample of 6331. Analyses of differences in overall levels of trust between countries were undertaken using Chi square analyses. Multivariate binomial logistic regression analysis was undertaken to identify socio-demographic predictors of trust in each country. Results Our data indicate a tripartite trust model: ‘high trust’ in Australia and Hong Kong; ‘medium trust’ in Japan and Taiwan; and ‘low trust’ in South Korea and Thailand. Trust in family and neighbours were very high across all countries, although trust in people with a different religion, trust in strangers and trust in foreigners varied considerably between countries. The regression models found a consistent group of subpopulations with low trust across the countries: people on low incomes, younger people and people with poor self-rated health. The results were conflicting for gender: females had lower trust in Thailand and Hong Kong, although in Australia, males had lower trust in strangers, whereas females had lower trust in foreigners. Conclusion This paper identifies high, medium and low trust societies, in addition to high and low trusting population subgroups. Our analyses extend the seminal work of Fukuyama, providing both corroboration and

  4. Installation in the SPS tunnel

    CERN Multimedia

    1974-01-01

    The SPS tunnel is 6910 m in circumference and has a cross section of 4 m inner diameter. It is situated at an elevation of 400 m above sea level at a depth below the surface varying between 23 and 65 m. Its walls are lined with a concrete shell of about 30 cm thickness. See also 7410043X

  5. Time tunnels meet warped passages

    CERN Multimedia

    Kushner, David

    2006-01-01

    "Just in time for its 40th anniversary, the classic sci-fi television show "The time tunnel" is out on DVD. The conceit is something every engineer can relate to: a pulled plug. Scientists in an underground lab are working on a secret government experiment in time travel. (1 page)

  6. Travelling inside the SPS tunnel

    CERN Multimedia

    1974-01-01

    The golf cart proved to be a very useful form of transport around the 7 km circumference of the machine. It could carry four passengers and pull light equipment in its trailer. Here Peter Zettwoch is the driver along a mock-up tunnel for installation tests. (see photo 7401011X and Photo Archive 7401018)

  7. Josephson tunnel junction microwave attenuator

    DEFF Research Database (Denmark)

    Koshelets, V. P.; Shitov, S. V.; Shchukin, A. V.

    1993-01-01

    A new element for superconducting electronic circuitry-a variable attenuator-has been proposed, designed, and successfully tested. The principle of operation is based on the change in the microwave impedance of a superconductor-insulator-superconductor (SIS) Josephson tunnel junction when dc bias...

  8. Apparent tunneling in chemical reactions

    DEFF Research Database (Denmark)

    Henriksen, Niels Engholm; Hansen, Flemming Yssing; Billing, G. D.

    2000-01-01

    A necessary condition for tunneling in a chemical reaction is that the probability of crossing a barrier is non-zero, when the energy of the reactants is below the potential energy of the barrier. Due to the non-classical nature (i.e, momentum uncertainty) of vibrational states this is, however...

  9. Unitary Plan Wind Tunnel Test

    Science.gov (United States)

    2008-01-01

    Shown is a wind tunnel test of the Ares model for force/moment testing in support of the Ares/Clv integrated vehicle at Langley Research Center, Virginia. The image is extracted from a high definition video file and is the highest resolution available.

  10. Praktijkervaring met calamiteiten in tunnels

    NARCIS (Netherlands)

    De Waard, D.; Brookhuis, K.A.

    2000-01-01

    The first part of this report is about experience with (catastrophic) traffic accidents in tunnels and describes interviews with representatives of Police and the Department of Transportation, as well as the results of a short questionnaire among involved policemen and victims. The primary causes of

  11. Calculating the Number of Tunnels

    NARCIS (Netherlands)

    Li, Fajie; Klette, Reinhard; RuizShulcloper, J; Kropatsch, WG

    2008-01-01

    This paper considers 2-regions of grid cubes and proposes an algorithm for calculating the number of tunnels of such a. region. The graph-theoretical algorithm proceeds layer by layer; a proof of its correctness is provided, and its time complexity is also given.

  12. A Seamless Ubiquitous Telehealthcare Tunnel

    Directory of Open Access Journals (Sweden)

    Sao-Jie Chen

    2013-08-01

    Full Text Available Mobile handheld devices are rapidly using to implement healthcare services around the World. Fundamentally, these services utilize telemedicine technologies. A disconnection of a mobile telemedicine system usually results in an interruption, which is embarrassing, and reconnection is necessary during the communication session. In this study, the Stream Control Transmission Protocol (SCTP is adopted to build a stable session tunnel to guarantee seamless switching among heterogeneous wireless communication standards, such as Wi-Fi and 3G. This arrangement means that the telemedicine devices will not be limited by a fixed wireless connection and can switch to a better wireless channel if necessary. The tunnel can transmit plain text, binary data, and video streams. According to the evaluation of the proposed software-based SCTP-Tunnel middleware shown, the performance is lower than anticipated and is slightly slower than a fixed connection. However, the transmission throughput is still acceptable for healthcare professionals in a healthcare enterprise or home care site. It is necessary to build more heterogeneous wireless protocols into the proposed tunnel-switching scheme to support all possible communication protocols. In addition, SCTP is another good choice for promoting communication in telemedicine and healthcare fields.

  13. Spinoff from Wind Tunnel Technology

    Science.gov (United States)

    1985-01-01

    Douglas Juanarena, a former NASA Langley instrument design engineer, found a solution to the problem of long, repetitive tunnel runs needed to measure airflow pressures. Electronically scanned pressure (ESP) replaced mechanical systems with electronic sensors. Juanarena licensed the NASA-patented technology and now manufactures ESP modules for research centers, aerospace companies, etc.

  14. Rehabilitation following carpal tunnel release

    NARCIS (Netherlands)

    Peters, Susan; Page, Matthew J.; Coppieters, Michel W.; Ross, Mark; Johnston, Venerina

    2016-01-01

    Background: Various rehabilitation treatments may be offered following carpal tunnel syndrome (CTS) surgery. The effectiveness of these interventions remains unclear. This is the first update of a review first published in 2013. Objectives: To review the effectiveness and safety of rehabilitation

  15. Earth Pressure on Tunnel Crown

    DEFF Research Database (Denmark)

    Andersen, Lars

    Two different analyses have been carried out in order to find the vertical earth pressure, or overburden pressure, at the crown of a tunnel going through a dike. Firstly, a hand calculation is performed using a simple dispersion of the stresses over depth. Secondly, the finite‐element program...

  16. Introduction to scanning tunneling microscopy

    CERN Document Server

    Chen, C Julian

    2008-01-01

    The scanning tunneling and the atomic force microscope, both capable of imaging individual atoms, were crowned with the Physics Nobel Prize in 1986, and are the cornerstones of nanotechnology today. This is a thoroughly updated version of this 'bible' in the field.

  17. Trust makers, breakers and brokers: building trust in the Australian food system.

    Science.gov (United States)

    Wilson, Annabelle; Coveney, John; Henderson, Julie; Meyer, Samantha; Calnan, Michael; Caraher, Martin; Webb, Trevor; Elliott, Anthony; Ward, Paul

    2013-03-15

    The importance of consumer trust in the food supply has previously been identified, and dimensions of consumer trust in food-who they trust and the type of trust that they exhibit-has been explored. However, there is a lack of research about the mechanisms through which consumer trust in the food supply is developed, maintained, broken and repaired. This study seeks to address this gap by exploring if, and how, consumer trust in the food supply is considered by the media, food industry and governments when responding to food scares. The aim of the research is to develop models of trust building that can be implemented following food scares. Semi-structured interviews will be undertaken with media, public relations officials and policy makers in Australia, New Zealand and the United Kingdom. Participants will be recruited through purposive sampling and will be asked to discuss a hypothetical case study outlining a food incident, and any experiences of specific food scares. Models of trust development, maintenance and repair will be developed from interview data. Comment on these models will be sought from experts in food-related organizations through a Delphi study, where participants will be asked to consider the usefulness of the models. Participants' comments will be used to revise the models until consensus is reached on the suitability and usability of the models. This study will contribute to the literature about systems-based trust, and explore trust as a social and regulatory process. The protocol and results will be of interest and use to the food industry, food regulators, consumer advocate groups, media seeking to report food-related issues and policy makers concerned with public health and consumer health and well-being. This research represents an important contribution to the translation of the theoretical conceptualizations of trust into practical use in the context of food.

  18. Perceptions of trust in physician-managers.

    Science.gov (United States)

    Cregård, Anna; Eriksson, Nomie

    2015-01-01

    The purpose of this paper is to explore the dual role of physician-managers through an examination of perceptions of trust and distrust in physician-managers. The healthcare sector needs physicians to lead. Physicians in part-time managerial positions who continue their medical practice are called part-time physician-managers. This paper explores this dual role through an examination of perceptions of trust and distrust in physician-managers. The study takes a qualitative research approach in which interviews and focus group discussions with physician-managers and nurse-managers provide the empirical data. An analytical model, with the three elements of ability, benevolence and integrity, was used in the analysis of trust and distrust in physician-managers. The respondents (physician-managers and nurse-managers) perceived both an increase and a decrease in physicians' trust in the physician-managers. Because elements of distrust were more numerous and more severe than elements of trust, the physician-managers received negative perceptions of their role. This paper's findings are based on perceptions of perceptions. The physicians were not interviewed on their trust and distrust of physician-managers. The healthcare sector must pay attention to the diverse expectations of the physician-manager role that is based on both managerial and medical logics. Hospital management should provide proper support to physician-managers in their dual role to ensure their willingness to continue to assume managerial responsibilities. The paper takes an original approach in its research into the dual role of physician-managers who work under two conflicting logics: the medical logic and the managerial logic. The focus on perceived trust and distrust in physician-managers is a new perspective on this complicated role.

  19. Building a Culture of Trust: Trust in the Use of Educational Technology

    Science.gov (United States)

    Kirkman, Jacqueline

    2014-01-01

    This paper investigates the place of trust in a school context and its importance in achieving the aims of schooling, "namely high academic performance and positive affects among members of the school community" (Forsyth, 2008). The role of trust in the use of technology and technological change is examined. Literature is surveyed in the…

  20. Trust and Fiduciary Relationships in Education: What Happens When Trust Is Breached?

    Science.gov (United States)

    Grierson, Elizabeth Mary

    2018-01-01

    This paper examines trust as a fundamental aspect of fiduciary relationships in education. The specific relationship under examination is that of academic employee and university employer. Both have the value of trust assigned to them as an implicit part of their social and professional contract. The setting is Australia, but the principles apply…

  1. Tunneling Flight Time, Chemistry, and Special Relativity.

    Science.gov (United States)

    Petersen, Jakob; Pollak, Eli

    2017-09-07

    Attosecond ionization experiments have not resolved the question "What is the tunneling time?". Different definitions of tunneling time lead to different results. Second, a zero tunneling time for a material particle suggests that the nonrelativistic theory includes speeds greater than the speed of light. Chemical reactions, occurring via tunneling, should then not be considered in terms of a nonrelativistic quantum theory calling into question quantum dynamics computations on tunneling reactions. To answer these questions, we define a new experimentally measurable paradigm, the tunneling flight time, and show that it vanishes for scattering through an Eckart or a square barrier, irrespective of barrier length or height, generalizing the Hartman effect. We explain why this result does not lead to experimental measurement of speeds greater than the speed of light. We show that this tunneling is an incoherent process by comparing a classical Wigner theory with exact quantum mechanical computations.

  2. 77 FR 16282 - Columbia Funds Master Investment Trust, LLC, et al.; Notice of Application

    Science.gov (United States)

    2012-03-20

    ... COMMISSION Columbia Funds Master Investment Trust, LLC, et al.; Notice of Application March 13, 2012. AGENCY... Funds Master Investment Trust, LLC; Columbia Funds Series Trust; Columbia Funds Series Trust I; Columbia Funds Series Trust II; Columbia Funds Variable Insurance Trust; Columbia Funds Variable Insurance Trust...

  3. Trust in leadership in sport: An empirical study of ethnicity and gender

    African Journals Online (AJOL)

    The importance of trust for sustaining human relationships and organizational effectiveness in the workplace has been increasingly recognized in the past decades. Trust has been examined in different settings such as interpersonal trust, dyadic trust, inter-organizational trust, societal trust, peer trust in the workplace, ...

  4. Dimensions of Trust: The Tensions and Challenges in Provider-Interpreter Trust

    Science.gov (United States)

    Hsieh, Elaine; Ju, Hyejung; Kong, Haiying

    2014-01-01

    This study problemtizes provider-interpreter trust, examining the challenges to providers' and interpreters' collaboration in bilingual health care. We conducted in-depth interviews and focus groups with 26 medical interpreters (from 17 languages) and 32 providers (from 4 specialties) in the United States to provide an empirically-based framework of provider-interpreter trust. Constant comparative analysis was used for data analysis. We identified four dimensions of trust, theoretical constructs that can strengthen or compromise provider-interpreter trust: interpreter's competence, shared goals, professional boundaries, and established patterns of collaboration. We further explore how these dimensions highlight tensions and challenges that are unique in provider-interpreter relationship. We concluded with practical guidelines that can enhance provider-interpreter trust and propose future research directions in bilingual health care. PMID:19826078

  5. Do Group Decision Rules Affect Trust? A Laboratory Experiment on Group Decision Rules and Trust

    DEFF Research Database (Denmark)

    Nielsen, Julie Hassing

    2016-01-01

    Enhanced participation has been prescribed as the way forward for improving democratic decision making while generating positive attributes like trust. Yet we do not know the extent to which rules affect the outcome of decision making. This article investigates how different group decision rules...... affect group trust by testing three ideal types of decision rules (i.e., a Unilateral rule, a Representative rule and a 'Non-rule') in a laboratory experiment. The article shows significant differences between the three decision rules on trust after deliberation. Interestingly, however, it finds...... that the Representative rule yields more trust than the Non-rule and also significantly more trust than the Unilateral rule, when analysing the results at group level. These findings challenge the theoretical understanding by, for example, deliberative normative theorists that more inclusive, consensual and non...

  6. Resonant tunnel magnetoresistance in a double magnetic tunnel junction

    KAUST Repository

    Useinov, Arthur

    2011-08-09

    We present quasi-classical approach to calculate a spin-dependent current and tunnel magnetoresistance (TMR) in double magnetic tunnel junctions (DMTJ) FML/I/FMW/I/FMR, where the magnetization of the middle ferromagnetic metal layer FMW can be aligned parallel or antiparallel with respect to the fixed magnetizations of the left FML and right FMR ferromagnetic electrodes. The transmission coefficients for components of the spin-dependent current, and TMR are calculated as a function of the applied voltage. As a result, we found a high resonant TMR. Thus, DMTJ can serve as highly effective magnetic nanosensor for biological applications, or as magnetic memory cells by switching the magnetization of the inner ferromagnetic layer FMW.© Springer Science+Business Media, LLC 2011.

  7. MANAGEMENT OF TUNNELS ON THE ZAGREB – MACELJ MOTORWAY IN THE COURSE OF TUNNELS EXPLOITATION

    Directory of Open Access Journals (Sweden)

    Zvonimir Deković

    2012-12-01

    Full Text Available he paper focuses on the features of management of tunnels on the Zagreb-Macelj motorway. Management of tunnels is represented trough public-private partnership model that is applied on the Zagreb-Macelj motorway. In the course of tunnel operation and maintenance in the first five years of tunnels exploitation, the emphasis is put on the maintenance of the tunnel equipment systems. Tunnels as part of the motorway alignment are the most demanding facilities for maintaining appropriate safety and operational level in order to rich continuous availability providing safe and quality of service to the motorway users. The goal of the tunnel operation and maintenance is to ensure undisturbed and safe traffic flow through the tunnels by keeping the tunnel at the normal functional conditions.

  8. Making Sense of Context as a Basis for Trust

    DEFF Research Database (Denmark)

    Fuglsang, Lars; Jagd, Søren

    The concept of interpersonal trust has been important in organizational trust research for at least a decade, but recently a growing literature is stressing the need to focus more on the institutional dimensions of trust-creation. The opposition between traditions stressing either interpersonal...... or institutional trust raises the more general question of how we may understand the role of context in interpersonal trust relations. The paper attempts to fill the gap in the organizational trust literature, between interpersonal and institutional trust research, by investigating the more general problem......., 2011) between institutions and interactions to explore how context may be relevant for trust processes. We argue that people must actively and consciously “make sense of context” as a basis for trust. The importance of understanding how actors make sense of context in order to understand organizational...

  9. The Impact of Trust on Job Performance in Organisations

    Directory of Open Access Journals (Sweden)

    Ana Nešić

    2016-04-01

    Full Text Available In circumstances governed by consistent change in all aspects of business, trust represents a significant factor in the behavioural patterns of organisations. Of great importance for a successful communication in organisations is understanding the levels of trust among staff, employees and their management, and trust in the organisation itself. Trust is a cohesive and motivating factor in work groups. Also, based on trust are identification and commitment to the organisation, as well as the relationships of employees. In successful organisations special attention is given to the problems of trust and mistrust. This work considers different theoretical concepts of how trust is created and maintained in organisations, different dimensions of organisational trust, as well as the effects of trust in organisational performance.

  10. The Third Quantization: To Tunnel or Not to Tunnel?

    Directory of Open Access Journals (Sweden)

    Mariam Bouhmadi-López

    2018-02-01

    Full Text Available Within the framework of the third quantization, we consider the possibility that an initially recollapsing baby universe can enter a stage of near de Sitter inflation by tunnelling through a Euclidean wormhole that connects the recollapsing and inflationary geometries. We present the solutions for the evolution of the scale factor in the Lorentzian and Euclidean regions as well as the probability that the baby universe indeed crosses the wormhole when it reaches its maximum size.

  11. Anatomical placement of double femoral tunnels in anterior cruciate ligament reconstruction: anteromedial tunnel first or posterolateral tunnel first?

    Science.gov (United States)

    Taketomi, Shuji; Nakagawa, Takumi; Takeda, Hideki; Nakajima, Kohei; Nakayama, Shuichi; Fukai, Atsushi; Hirota, Jinso; Kachi, Yoshinori; Kawano, Hirotaka; Miura, Toshiki; Fukui, Naoshi; Nakamura, Kozo

    2011-03-01

    The purpose of this study was to know which tunnel--the anteromedial (AM) bundle or the posterolateral (PL) bundle--should be prepared first to create the 2 femoral tunnels accurately in anatomic double-bundle (DB) anterior cruciate ligament (ACL) reconstruction. Thirty-four patients were divided into 2 groups of 17 depending on the sequence of preparation of the 2 femoral tunnels. In group A, the AM tunnel was prepared first, whereas the PL tunnel was prepared first in group P. ACL reconstruction was performed using a three-dimensional (3-D) fluoroscopy-based navigation system to place the double femoral tunnels through an accessory medial portal. The double femoral socket positioning was evaluated by 3-D computed tomography (CT) scan image. The non-anatomical placement of the femoral sockets occurred in 5 patients (29%) in group A, whereas the 2 sockets were placed anatomically in all patients in group P (P tunnels through accessory medial portal affected the resultant location of the sockets and the rate of the complications. When femoral tunnels are prepared with a transportal technique, PL tunnel first technique seems to be superior to AM first technique regarding anatomic placement. However, PL tunnel first technique accompanies the risk of socket communication.

  12. Program Partitioning using Dynamic Trust Models

    DEFF Research Database (Denmark)

    Søndergaard, Dan; Probst, Christian W.; Jensen, Christian D.

    2006-01-01

    Developing distributed applications is a difficult task. It is further complicated if system-wide security policies shall be specified and enforced, or if both data and hosts are owned by principals that do not fully trust each other, as is typically the case in service-oriented or grid-based sce...... of the splitting framework, that is parametrised in the trust component, and show the result of specialising it with different trust models. We also develop a metric to measure the quality of the result of the partitioning process.......Developing distributed applications is a difficult task. It is further complicated if system-wide security policies shall be specified and enforced, or if both data and hosts are owned by principals that do not fully trust each other, as is typically the case in service-oriented or grid...... across a set of hosts, obeying both the annotations and the trust relation between the principals. The resulting applications guarantee \\$\\backslash\\$emph{by construction} that safety and confidentiality of both data and computations are ensured. In this work, we develop a generalised version...

  13. Introduction to Hardware Security and Trust

    CERN Document Server

    Wang, Cliff

    2012-01-01

    The emergence of a globalized, horizontal semiconductor business model raises a set of concerns involving the security and trust of the information systems on which modern society is increasingly reliant for mission-critical functionality. Hardware-oriented security and trust issues span a broad range including threats related to the malicious insertion of Trojan circuits designed, e.g.,to act as a ‘kill switch’ to disable a chip, to integrated circuit (IC) piracy,and to attacks designed to extract encryption keys and IP from a chip. This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade.  Coverage includes security and trust issues in all types of electronic devices and systems such as ASICs, COTS, FPGAs, microprocessors/DSPs, and embedded systems.  This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of,and trust in, modern society�...

  14. Public trust in vaccination: an analytical framework.

    Science.gov (United States)

    Gopichandran, Vijayaprasad

    2017-01-01

    While vaccination is one of the most successful public health interventions, there has always been a parallel movement against vaccines. Apart from scientific factors, the uptake of vaccinations is influenced by historical, political, sociocultural and economic factors. In India, the health system is struggling with logistical weaknesses in taking vaccination to the remotest corners; while on the other hand, some people in places where vaccination is available resist it. Unwillingness to be vaccinated is a growing problem in the developed world. This trend is gradually emerging in several parts of India as well. Other factors, such as heightened awareness of the profit motives of the vaccine industry, conflicts of interest among policy-makers, and social, cultural and religious considerations have eroded the people's trust in vaccination. This paper develops an analytical framework to assess trust in vaccination. The framework considers trust in vaccination from four perspectives - trust in the health system, the vaccine policy, vaccination providers and specific vaccines. The framework considers specific issues involved in vaccination trust, including the increasing scepticism towards medical technology, perceptions of conflicts of interest in the vaccine policy, and of lack of transparency and openness, the presence of strong alternative schools of thought, influence of the social media. The paper will conclude by arguing that engaging with communities and having a dialogue about the vaccination policy is an ethical imperative.

  15. Power decreases trust in social exchange.

    Science.gov (United States)

    Schilke, Oliver; Reimann, Martin; Cook, Karen S

    2015-10-20

    How does lacking vs. possessing power in a social exchange affect people's trust in their exchange partner? An answer to this question has broad implications for a number of exchange settings in which dependence plays an important role. Here, we report on a series of experiments in which we manipulated participants' power position in terms of structural dependence and observed their trust perceptions and behaviors. Over a variety of different experimental paradigms and measures, we find that more powerful actors place less trust in others than less powerful actors do. Our results contradict predictions by rational actor models, which assume that low-power individuals are able to anticipate that a more powerful exchange partner will place little value on the relationship with them, thus tends to behave opportunistically, and consequently cannot be trusted. Conversely, our results support predictions by motivated cognition theory, which posits that low-power individuals want their exchange partner to be trustworthy and then act according to that desire. Mediation analyses show that, consistent with the motivated cognition account, having low power increases individuals' hope and, in turn, their perceptions of their exchange partners' benevolence, which ultimately leads them to trust.

  16. Does Generalized (Dis)trust Travel? Examining the Impact of Cultural Heritage and Destination Country Environment on Trust of Immigrants

    DEFF Research Database (Denmark)

    Dinesen, Peter Thisted

    2012-01-01

    with what we experience in the environment in which we live. Analyzing trust of immigrants is an effective way to contrast the two perspectives, as the cultural perspective predicts that immigrants' level of trust will continue to reflect the level of trust of their home country, whereas the experiential......At least two contrasting perspectives on the roots of generalized trust exist: The cultural perspective emphasizing how trust is a stable trait passed on from one generation to the next through parental socialization, and the experiential perspective, which stresses that trust is subject to change...... perspective predicts that trust of immigrants will change according to the environment of the destination country. This article examines how first-generation immigrants from three low-trust countries of origin (Turkey, Poland, and Italy) are affected by migrating to high-trust countries in Northern Europe...

  17. Wireless next generation networks a virtue-based trust model

    CERN Document Server

    Harvey, Melissa

    2014-01-01

    This SpringerBrief proposes a trust model motivated by virtue epistemology, addressing the need for a more efficient and flexible trust model for wireless next generation networks. This theory of trust simplifies the computation and communication overhead of strictly cognitive-computational models of trust. Both the advantages and the challenges of virtue-based trust models are discussed. This brief offers new research and a general theory of rationality that enables users to interpret trust and reason as complementary mechanisms that guide our rational conduct at two different epistemic level

  18. Development of trust during large scale system implementation

    DEFF Research Database (Denmark)

    Schlichter, Bjarne Rerup

    2010-01-01

      Implementations of information systems are complex and problematic with a reputation for being delayed and exceeding budget. A critical factor in implementations is trust in the system, trust in the project and trust between the various stakeholders. This case charts the evolution of trust...... in the implementation of the Faroese integrated healthcare system and shows how trust relations at various points in the project became difficult, what the causes and consequences of these trust difficulties were, and how they were successfully resolved in the project....

  19. Seismic scanning tunneling macroscope - Theory

    KAUST Repository

    Schuster, Gerard T.

    2012-09-01

    We propose a seismic scanning tunneling macroscope (SSTM) that can detect the presence of sub-wavelength scatterers in the near-field of either the source or the receivers. Analytic formulas for the time reverse mirror (TRM) profile associated with a single scatterer model show that the spatial resolution limit to be, unlike the Abbe limit of λ/2, independent of wavelength and linearly proportional to the source-scatterer separation as long as the point scatterer is in the near-field region; if the sub-wavelength scatterer is a spherical impedance discontinuity then the resolution will also be limited by the radius of the sphere. Therefore, superresolution imaging can be achieved as the scatterer approaches the source. This is analogous to an optical scanning tunneling microscope that has sub-wavelength resolution. Scaled to seismic frequencies, it is theoretically possible to extract 100 Hz information from 20 Hz data by imaging of near-field seismic energy.

  20. Tunneling magnetoresistance in Si nanowires

    KAUST Repository

    Montes Muñoz, Enrique

    2016-11-09

    We investigate the tunneling magnetoresistance of small diameter semiconducting Si nanowires attached to ferromagnetic Fe electrodes, using first principles density functional theory combined with the non-equilibrium Green\\'s functions method for quantum transport. Silicon nanowires represent an interesting platform for spin devices. They are compatible with mature silicon technology and their intrinsic electronic properties can be controlled by modifying the diameter and length. Here we systematically study the spin transport properties for neutral nanowires and both n and p doping conditions. We find a substantial low bias magnetoresistance for the neutral case, which halves for an applied voltage of about 0.35 V and persists up to 1 V. Doping in general decreases the magnetoresistance, as soon as the conductance is no longer dominated by tunneling.

  1. Wildlife Tunnel Enhances Population Viability

    Directory of Open Access Journals (Sweden)

    Rodney van der Ree

    2009-12-01

    Full Text Available Roads and traffic are pervasive components of landscapes throughout the world: they cause wildlife mortality, disrupt animal movements, and increase the risk of extinction. Expensive engineering solutions, such as overpasses and tunnels, are increasingly being adopted to mitigate these effects. Although some species readily use such structures, their success in preventing population extinction remains unknown. Here, we use population viability modeling to assess the effectiveness of tunnels for the endangered Mountain Pygmy-possum (Burramys parvus in Australia. The underpasses reduced, but did not completely remove, the negative effects of a road. The expected minimum population size of a "reconnected" population remained 15% lower than that of a comparable "undivided" population. We propose that the extent to which the risk of extinction decreases should be adopted as a measure of effectiveness of mitigation measures and that the use of population modeling become routine in these evaluations.

  2. Trust and the illusive force of scenarios

    DEFF Research Database (Denmark)

    Selin, Cynthia Lea

    2006-01-01

    frameworks for action. Trust speaks to persuasion and how stories of the future become trustworthy and garner credibility when traditional measures are fundamentally insufficient and irrelevant. That is, if we take as an assumption that we are not transpiring for truth or truthfulness in scenarios, then what...... formulation and decision-making. By definition, scenarios are possible versions of the future so judging and evaluating scenarios is thus not about revealing truthfulness, but rather demonstrating trust, reliability, credibility in the absence of truth and in the face of varied influences and possible...... planning in light of conceptual understandings of trust. Such an inquiry highlights that scenarios have value inscriptions and varying degrees of normatively which are indebted to the particularities of their production q 2005 Elsevier Ltd. All rights reserved....

  3. Commitment and Trust in Young Adult Friendships

    Directory of Open Access Journals (Sweden)

    Jennifer Wieselquist

    2007-12-01

    Full Text Available Given the importance of maintaining mutuality in interdependent relationships, the goal of the present research was to determine if interpersonal trust serves as a gauge of partners’ commitment within young adults’ close friendships. It was hypothesized that individuals trust their friends to the degree that their friends are committed to their relationship, and that individuals’ perceptions of their friends’ commitment mediates this association. A correlational design was employed and measures were obtained from both members of 60 same-sex friendship dyads. A multilevel modeling approach was used to perform a mediational analysis of model variables; the hypotheses were confirmed. Furthermore, it was revealed that friends demonstrate a moderate degree of mutual commitment in their relationships. Potential avenues for future research regarding the development and consequences of trust in close friendships are discussed.

  4. Measuring Institutional Trust: Evidence from Guyana

    Directory of Open Access Journals (Sweden)

    Troy Devon Thomas

    2015-01-01

    Full Text Available Institutional trust is often measured by several items that are analyzed individually or as sum-scores. However, it is difficult to summarize the results of individual-items analyses, whereas sum-scores may be meaningless if the dimensions that the items are assumed to measure are not verified. Although these limitations are circumvented by using factor analysis, response styles may still bias research results. We use data from Guyana to show that a second-order factor model is appropriate for measuring institutional trust. We also demonstrate that response styles can inflate item and factor convergent validity and may either distort regression effects or create completely spurious ones. We therefore recommend using factor models with corrections for response styles in institutional trust research instead of sum-scores and individual-items analyses.

  5. NGOs, Trust, and the Accountability Agenda

    DEFF Research Database (Denmark)

    Keating, Vincent Charles; Thrandardottir, Erla

    2017-01-01

    NGOs are undergoing an alleged crisis of trustworthiness. The past decades have seen an increase in both academic and practitioner skepticism, particularly given the transformations many NGOs have undergone in size, professionalism, and political importance. The accountability agenda, which...... stresses transparency and external oversight, has gained a significant amount of traction as a means to solve this crisis. But the causal link between the implementation of these recommendations and increased trustworthiness among donors has never been considered. This paper bridges this gap by drawing...... on theoretical innovations in trust research to put forward three arguments. First, the proponents of the accountability agenda are implicitly working with a rational model of trust. Second, this model does not reflect important social characteristics of trust between donors and NGOs. Third, this mismatch means...

  6. Taxation of Income in Foreign Trusts

    DEFF Research Database (Denmark)

    Schmidt, Peter Koerver

    2016-01-01

    Denmark has introduced a new provision that states that Danish settlors of foreign trusts, under certain circumstances, must include the trust’s income in their own taxable income. The provision forms part of the Danish legislator’s recent attempts to prevent international tax evasion/ avoidance......, and the underlying aim of the provision is to make the rules concerning foreign trusts easier to administrate and enforce by the Danish tax authorities. Based on an analysis of the provision’s area of application and legal effects, it is concluded that the new provision seems to be effective in mitigating the use...... of foreign (family) trusts for tax evasion/avoidance purposes. However, it is also concluded that there is reason to question whether the new provision is sufficiently precise and whether the aim could have been reached in a more expedient way...

  7. Modelling Users` Trust in Online Social Networks

    Directory of Open Access Journals (Sweden)

    Iacob Cătoiu

    2014-02-01

    Full Text Available Previous studies (McKnight, Lankton and Tripp, 2011; Liao, Lui and Chen, 2011 have shown the crucial role of trust when choosing to disclose sensitive information online. This is the case of online social networks users, who must disclose a certain amount of personal data in order to gain access to these online services. Taking into account privacy calculus model and the risk/benefit ratio, we propose a model of users’ trust in online social networks with four variables. We have adapted metrics for the purpose of our study and we have assessed their reliability and validity. We use a Partial Least Squares (PLS based structural equation modelling analysis, which validated all our initial assumptions, indicating that our three predictors (privacy concerns, perceived benefits and perceived risks explain 48% of the variation of users’ trust in online social networks, the resulting variable of our study. We also discuss the implications and further research opportunities of our study.

  8. Framing Trust at the Street-Level

    DEFF Research Database (Denmark)

    Perry, Kevin Anthony

    unrest, antisocial behaviour, crime and unnecessary public spending. The purpose of this in-depth study, based on nine months of ethnographic fieldwork in and around two residential housing estates, is to contribute towards understanding the micro-processes at play in distrust and trust building...... the experiences of the young men with minority ethnic backgrounds and the aforementioned professionals. The problem formulation is: How can trust (and distrust) be understood as a cultural resource and what are the implications for public sector employees who work with young men with minority ethnic backgrounds...... ethnic backgrounds who reside in and hang out in a local residential housing estate. The main focus of this chapter is on the relationship between a team of youth workers and the young men, which can be described best as highly distrustful. Following this, the thesis reports finding three: trust...

  9. Trust and Distrust as Cultural Frames

    DEFF Research Database (Denmark)

    Perry, Kevin Anthony

    2016-01-01

    ’ implies that individuals respond actively to unfolding events in the context and modify their responses to meet changes in circumstances. Within a process perspective, this chapter looks closely at the relationships between a group of young men with minority ethnic backgrounds, a team of youth workers......, a job consultant and a police officer, to shed light on trust- and distrust-building processes. This chapter addresses the frames used by the young men to organize public sector employees, either as trusting or distrusting, together with some of the cultural tools used to construct these frames. The key....... The chapter contributes towards understanding of the micro-processes at play in trust- and distrust-building processes....

  10. Distributed Trust Management for Validating SLA Choreographies

    Science.gov (United States)

    Haq, Irfan Ul; Alnemr, Rehab; Paschke, Adrian; Schikuta, Erich; Boley, Harold; Meinel, Christoph

    For business workflow automation in a service-enriched environment such as a grid or a cloud, services scattered across heterogeneous Virtual Organizations (VOs) can be aggregated in a producer-consumer manner, building hierarchical structures of added value. In order to preserve the supply chain, the Service Level Agreements (SLAs) corresponding to the underlying choreography of services should also be incrementally aggregated. This cross-VO hierarchical SLA aggregation requires validation, for which a distributed trust system becomes a prerequisite. Elaborating our previous work on rule-based SLA validation, we propose a hybrid distributed trust model. This new model is based on Public Key Infrastructure (PKI) and reputation-based trust systems. It helps preventing SLA violations by identifying violation-prone services at service selection stage and actively contributes in breach management at the time of penalty enforcement.

  11. Dissipative Effect and Tunneling Time

    Directory of Open Access Journals (Sweden)

    Samyadeb Bhattacharya

    2011-01-01

    Full Text Available The quantum Langevin equation has been studied for dissipative system using the approach of Ford et al. Here, we have considered the inverted harmonic oscillator potential and calculated the effect of dissipation on tunneling time, group delay, and the self-interference term. A critical value of the friction coefficient has been determined for which the self-interference term vanishes. This approach sheds new light on understanding the ion transport at nanoscale.

  12. Digging the CNGS decay tunnel

    CERN Multimedia

    Patrice Loiez

    2002-01-01

    Products of the collision between a proton beam and a graphite target will pass through a horn containing an electric field that will produce a focused beam. These particles will decay into muon neutrinos within the tunnel that is being constructed in these images. The neutrinos will then travel 730 km to Gran Sasso in Italy where huge detectors will observe the beam to study a process called neutrino oscillation.

  13. Diagnosis of Carpal Tunnel Syndrome

    OpenAIRE

    Keith, Michael Warren; Masear, Victoria; Chung, Kevin; Maupin, Kent; Andary, Michael; Amadio, Peter C.; Barth, Richard W.; Watters, William C.; Goldberg, Michael J.; Haralson, Robert H.; Turkelson, Charles M.; Wies, Janet L.

    2009-01-01

    This clinical practice guideline was created to improve patient care by outlining the appropriate information-gathering and decision-making processes involved in managing the diagnosis of carpal tunnel syndrome. The methods used to develop this clinical practice guideline were designed to combat bias, enhance transparency, and promote reproducibility. The guideline’s recommendations are as follows: The physician should obtain an accurate patient history. The physician should perform a physica...

  14. Bidirectional resonant tunneling spin pump

    OpenAIRE

    Ting, David Z. -Y.; Cartoixà Soler, Xavier

    2003-01-01

    We propose a mechanism for achieving bidirectional spin pumping in conventional nonmagnetic semiconductorresonant tunnelingheterostructures under zero magnetic field. The device is designed specifically to take advantage of the special spin configuration described by the Rashba effect in asymmetric quantum wells. It induces the simultaneous flow of oppositely spin-polarized current components in opposite directions through spin-dependent resonant tunneling, and can thus generate significant l...

  15. Variable density turbulence tunnel facility

    Science.gov (United States)

    Bodenschatz, E.; Bewley, G. P.; Nobach, H.; Sinhuber, M.; Xu, H.

    2014-09-01

    The Variable Density Turbulence Tunnel at the Max Planck Institute for Dynamics and Self-Organization in Göttingen, Germany, produces very high turbulence levels at moderate flow velocities, low power consumption, and adjustable kinematic viscosity between 10-4 m2/s and 10-7 m2/s. The Reynolds number can be varied by changing the pressure or flow rate of the gas or by using different non-flammable gases including air. The highest kinematic viscosities, and hence lowest Reynolds numbers, are reached with air or nitrogen at 0.1 bar. To reach the highest Reynolds numbers the tunnel is pressurized to 15 bars with the dense gas sulfur hexafluoride (SF6). Turbulence is generated at the upstream ends of two measurement sections with grids, and the evolution of this turbulence is observed as it moves down the length of the sections. We describe the instrumentation presently in operation, which consists of the tunnel itself, classical grid turbulence generators, and state-of-the-art nano-fabricated hot-wire anemometers provided by Princeton University [M. Vallikivi, M. Hultmark, S. C. C. Bailey, and A. J. Smits, Exp. Fluids 51, 1521 (2011)]. We report measurements of the characteristic scales of the flow and of turbulent spectra up to Taylor Reynolds number Rλ ≈ 1600, higher than any other grid-turbulence experiment. We also describe instrumentation under development, which includes an active grid and a Lagrangian particle tracking system that moves down the length of the tunnel with the mean flow. In this configuration, the properties of the turbulence are adjustable and its structure is resolvable up to Rλ ≈ 8000.

  16. Variable density turbulence tunnel facility.

    Science.gov (United States)

    Bodenschatz, E; Bewley, G P; Nobach, H; Sinhuber, M; Xu, H

    2014-09-01

    The Variable Density Turbulence Tunnel at the Max Planck Institute for Dynamics and Self-Organization in Göttingen, Germany, produces very high turbulence levels at moderate flow velocities, low power consumption, and adjustable kinematic viscosity between 10(-4) m(2)/s and 10(-7) m(2)/s. The Reynolds number can be varied by changing the pressure or flow rate of the gas or by using different non-flammable gases including air. The highest kinematic viscosities, and hence lowest Reynolds numbers, are reached with air or nitrogen at 0.1 bar. To reach the highest Reynolds numbers the tunnel is pressurized to 15 bars with the dense gas sulfur hexafluoride (SF6). Turbulence is generated at the upstream ends of two measurement sections with grids, and the evolution of this turbulence is observed as it moves down the length of the sections. We describe the instrumentation presently in operation, which consists of the tunnel itself, classical grid turbulence generators, and state-of-the-art nano-fabricated hot-wire anemometers provided by Princeton University [M. Vallikivi, M. Hultmark, S. C. C. Bailey, and A. J. Smits, Exp. Fluids 51, 1521 (2011)]. We report measurements of the characteristic scales of the flow and of turbulent spectra up to Taylor Reynolds number R(λ) ≈ 1600, higher than any other grid-turbulence experiment. We also describe instrumentation under development, which includes an active grid and a Lagrangian particle tracking system that moves down the length of the tunnel with the mean flow. In this configuration, the properties of the turbulence are adjustable and its structure is resolvable up to R(λ) ≈ 8000.

  17. Integrity Management Infrastructure for Trusted Computing

    Science.gov (United States)

    Munetoh, Seiji; Nakamura, Megumi; Yoshihama, Sachiko; Kudo, Michiharu

    Computer security concerns have been rapidly increasing because of repeated security breaches and leakages of sensitive personal information. Such security breaches are mainly caused by an inappropriate management of the PCs, so maintaining integrity of the platform configuration is essential, and, verifying the integrity of the computer platform and software becomes more significant. To address these problems, the Trusted Computing Group (TCG) has developed various specifications that are used to measure the integrity of the platform based on hardware trust. In the trusted computing technology, the integrity data of each component running on the platform is recorded in the security chip and they are securely checked by a remote attestation. The infrastructure working group in the TCG is trying to define an Integrity Management Infrastructure in which the Platform Trust Services (PTS) is a new key component which deals with an Integrity Report. When we use the PTS in the target platform, it is a service component that collects and measures the runtime integrity of the target platform in a secure way. The PTS can also be used to validate the Integrity Reports. We introduce the notion of the Platform Validation Authority, a trusted third party, which verifies the composition of the integrity measurement of the target platform in the Integrity Reports. The Platform Validation Authority complements the role of the current Certificate Authority in the Public Key Infrastructure which attests to the integrity of the user identity as well as to related artifacts such as digital signatures. In this paper, we cover the research topics in this new area, the relevant technologies and open issues of the trusted computing, and the detail of our PTS implementation.

  18. Trust and managerialism: exploring discourses of care.

    Science.gov (United States)

    Gilbert, Tony P

    2005-11-01

    This paper reports a study that explored the relationship between trust and managerialism through an analysis of professional discourse. Managerialism is a distinct set of discourses and practices related to managerial effectiveness, flexibility and consumer responsiveness that have come to characterize debates over the provision of health and welfare services across the developed world. At the same time, trust has attracted increasing academic and political interest. Managerial discourses are critical of healthcare professions and the way they operate. Professional opinions are challenged as representing the interests of professions rather than service users; as a consequence trust is contested. However, where practitioners are both professionals and managers, the boundaries between these discourses become blurred. Moreover, paradoxical development occurs where increasing autonomy for practitioners is accompanied by a strengthening of managerial controls over their activity. Discourse analysis was used to explore the text from two genres, academic literature and interviews (n = 17), in the context of community residential services for people with learning disabilities. The study was conducted in 2001. Two broad themes were identified, each with a number of sub-themes. The first focuses on the relationship between managerialism and trust located around the management of expectations. The second, 'the politics of care', explores the way professional and managerial discourse articulate to produce complementary and contradictory positions. The colonization of professional activity by managerial discourse has produced a context where professional activity is defined by a series of managerial imperatives; trust, which was once the product of intimate social activity is now shaped through techniques based on distrust such as audits and quality monitoring. Nevertheless, the persistence of tensions between trust and managerialism suggest an ongoing struggle for

  19. Autonomous Robotic Inspection in Tunnels

    Science.gov (United States)

    Protopapadakis, E.; Stentoumis, C.; Doulamis, N.; Doulamis, A.; Loupos, K.; Makantasis, K.; Kopsiaftis, G.; Amditis, A.

    2016-06-01

    In this paper, an automatic robotic inspector for tunnel assessment is presented. The proposed platform is able to autonomously navigate within the civil infrastructures, grab stereo images and process/analyse them, in order to identify defect types. At first, there is the crack detection via deep learning approaches. Then, a detailed 3D model of the cracked area is created, utilizing photogrammetric methods. Finally, a laser profiling of the tunnel's lining, for a narrow region close to detected crack is performed; allowing for the deduction of potential deformations. The robotic platform consists of an autonomous mobile vehicle; a crane arm, guided by the computer vision-based crack detector, carrying ultrasound sensors, the stereo cameras and the laser scanner. Visual inspection is based on convolutional neural networks, which support the creation of high-level discriminative features for complex non-linear pattern classification. Then, real-time 3D information is accurately calculated and the crack position and orientation is passed to the robotic platform. The entire system has been evaluated in railway and road tunnels, i.e. in Egnatia Highway and London underground infrastructure.

  20. Diagnosis of Carpal Tunnel Syndrome

    Science.gov (United States)

    Keith, Michael Warren; Masear, Victoria; Chung, Kevin; Maupin, Kent; Andary, Michael; Amadio, Peter C.; Barth, Richard W.; Watters, William C.; Goldberg, Michael J.; Haralson, Robert H.; Turkelson, Charles M.; Wies, Janet L.

    2016-01-01

    This clinical practice guideline was created to improve patient care by outlining the appropriate information-gathering and decision-making processes involved in managing the diagnosis of carpal tunnel syndrome. The methods used to develop this clinical practice guideline were designed to combat bias, enhance transparency, and promote reproducibility. The guideline’s recommendations are as follows: The physician should obtain an accurate patient history. The physician should perform a physical examination of the patient that may include personal characteristics as well as performing a sensory examination, manual muscle testing of the upper extremity, and provocative and/or discriminatory tests for alternative diagnoses. The physician may obtain electrodiagnostic tests to differentiate among diagnoses. This may be done in the presence of thenar atrophy and/or persistent numbness. The physician should obtain electrodiagnostic tests when clinical and/or provocative tests are positive and surgical management is being considered. If the physician orders electrodiagnostic tests, the testing protocol should follow the American Academy of Neurology/American Association of Neuromuscular and Electrodiagnostic Medicine/American Academy of Physical Medicine and Rehabilitation guidelines for diagnosis of carpal tunnel syndrome. In addition, the physician should not routinely evaluate patients suspected of having carpal tunnel syndrome with new technology, such as magnetic resonance imaging, computed tomography, and pressure-specified sensorimotor devices in the wrist and hand. This decision was based on an additional nonsystematic literature review following the face-to-face meeting of the work group. PMID:19474448

  1. Quantum Tunneling Affects Engine Performance.

    Science.gov (United States)

    Som, Sibendu; Liu, Wei; Zhou, Dingyu D Y; Magnotti, Gina M; Sivaramakrishnan, Raghu; Longman, Douglas E; Skodje, Rex T; Davis, Michael J

    2013-06-20

    We study the role of individual reaction rates on engine performance, with an emphasis on the contribution of quantum tunneling. It is demonstrated that the effect of quantum tunneling corrections for the reaction HO2 + HO2 = H2O2 + O2 can have a noticeable impact on the performance of a high-fidelity model of a compression-ignition (e.g., diesel) engine, and that an accurate prediction of ignition delay time for the engine model requires an accurate estimation of the tunneling correction for this reaction. The three-dimensional model includes detailed descriptions of the chemistry of a surrogate for a biodiesel fuel, as well as all the features of the engine, such as the liquid fuel spray and turbulence. This study is part of a larger investigation of how the features of the dynamics and potential energy surfaces of key reactions, as well as their reaction rate uncertainties, affect engine performance, and results in these directions are also presented here.

  2. ReTrust: attack-resistant and lightweight trust management for medical sensor networks.

    Science.gov (United States)

    He, Daojing; Chen, Chun; Chan, Sammy; Bu, Jiajun; Vasilakos, Athanasios V

    2012-07-01

    Wireless medical sensor networks (MSNs) enable ubiquitous health monitoring of users during their everyday lives, at health sites, without restricting their freedom. Establishing trust among distributed network entities has been recognized as a powerful tool to improve the security and performance of distributed networks such as mobile ad hoc networks and sensor networks. However, most existing trust systems are not well suited for MSNs due to the unique operational and security requirements of MSNs. Moreover, similar to most security schemes, trust management methods themselves can be vulnerable to attacks. Unfortunately, this issue is often ignored in existing trust systems. In this paper, we identify the security and performance challenges facing a sensor network for wireless medical monitoring and suggest it should follow a two-tier architecture. Based on such an architecture, we develop an attack-resistant and lightweight trust management scheme named ReTrust. This paper also reports the experimental results of the Collection Tree Protocol using our proposed system in a network of TelosB motes, which show that ReTrust not only can efficiently detect malicious/faulty behaviors, but can also significantly improve the network performance in practice.

  3. Time dependence of tunnel statistics and the energy resolution of superconducting tunnel junctions

    Science.gov (United States)

    Verhoeve, P.; Hartog, R. den; Kozorezov, A.; Martin, D.; van Dordrecht, A.; Wigmore, J. K.; Peacock, A.

    2002-11-01

    Multiple tunneling of quasiparticle charge carriers in a superconducting tunnel junction (STJ) enhances the signal generated by a photon absorption event. It is also an additional source of noise, responsible for a substantial degradation of the energy resolution. Although tunneling is a binomial chance process, governed by a constant tunneling probability, the resulting cumulative statistics of tunnelled quasiparticles depend on time. In particular, the variance of the total number of tunneled quasiparticles reaches a minimum after a finite integration time, corresponding to a minimum in the spectral linewidth. Since the intrinsic energy resolution of the present generation of STJs is mainly limited by the scatter on the number of tunneled quasiparticles, the improvement of the tunnel noise can be experimentally tested by variation of the pulse integration time. An analytical theory is developed that describes the relation between the tunnel noise and the transfer function of the pulse integration hardware for an STJ characterized by a quasiparticle tunnel and loss time in each electrode. We present experiments that demonstrate that the noise contribution from multiple tunnelling is not constant during the time that the quasiparticles are present in the STJ, and that by proper filtering of the STJ pulses the tunnel noise can be optimized at a level which lies well below the canonical tunnel limit.

  4. New drainage tunnel of the tunnel Višňové - design and excavation

    Science.gov (United States)

    Jurík, Igor; Grega, Ladislav; Valko, Jozef; Janega, Peter

    2017-09-01

    The actual pilot tunnel dated to the period of geological and hydrogeological survey, is designed as a part of the tunnel Višňové, which is located at the section of the D1 motorway Lietavská Lúčka - Višňové - Dubná Skala in Slovakia. Drainage tunnel will be used for the drainage of the main tunnel tubes, where the maximum inflow from the eastern portal is greater than 250 l.s-1. Overlapping of the initial pilot tunnel with the profile of the southern tunnel tube led to the demolition of the portal sections of the pilot tunnel during the excavation of main tunnel tubes. These sections were replaced by new drainage tunnels, with the lengths of 288.0 meters from west portal and 538.0 meters from eastern portal, to ensure access from both portals. The new drainage tunnel is excavated under the level of the two main tunnel tubes. Drainage pipes with a diameter of 250 mm will be installed from cleaning niches in the main tunnel tubes to the new drainage tunnel.

  5. Framing Trust at the Street-Level

    DEFF Research Database (Denmark)

    Perry, Kevin Anthony

    trust and distrust largely under-represented in the trust literature. A common source of conflict is often a lack of confidence or distrust in the authorities; therefore, winning the confidence of minority ethnic groups in these communities is essential to easing tensions, along with reducing civil...... and artefacts such as media and local authority reports. In addition to the empirical material, the study explores a key governmental policy to investigate how the (previous) government names and frames people with minority ethnic backgrounds. Analysing this policy helps to locate the fieldwork and interactants...

  6. Problems in Cross Cultural Trust Building

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    2013-01-01

    Based on an explorative study of the Danish Public Diplomacy activities in Pakistan this paper brings to attention a number of issues related to cross cultural trust building. The empirical data includes information from the communication consultant at the Danish Embassy in Islamabad, and other...... public documents from the Danish Foreign Ministry. The conclusion is a list of research problems that needs to be investigated in the future, because there are still too many unknown factors that are of relevance for international trust building....

  7. MULTILEVEL AND MULTIDIMENSIONAL SCALE FOR ONLINE TRUST

    Directory of Open Access Journals (Sweden)

    Encarnación González-Vázquez

    2014-02-01

    Full Text Available This paper examines the nature of the construct of consumers’ trust toward the electronic channel of their financial institution. Through a study of a total of 372 individual users of Internet banking in Spain, we have managed to develop a third-order measuring instrument that integrates a total of seven dimensions. The exploratory and confirmatory factor analyses were used to test the validation and reliability of the proposed scale. Findings provide useful information to professionals who seek to identify how customer's trust is formed in the online channel and in the financial sector.

  8. The Relationship between Teamwork and Organizational Trust

    OpenAIRE

    Musab Isik

    2016-01-01

    The aim of this study is to investigate the relationship between teamwork and organizational trust. In the implementation section the data from the survey of 250 workers is employed in call centers in Erzurum by using relevant statistical  methods. Consequently, it is found that there is a positive and significant relationship between teamwork and organizational trust. Thus, the hypothesis of the study is supported as it was expected. Besides, it is found that there are positive and significa...

  9. Social trust aspects of rural electrification

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-10-01

    This report is a contribution to a growing body of work which acknowledges the importance of social considerations in the electricity industry, and provides an electricity industry perspective on the role of social trust, which is closely related to concepts such as social responsibility, corporate governance and corporate stewardship. The report provides a full explanation of the concept of social trust, defines its components (competence, commitment, consistency, fairness, respect, caring and empathy) and makes suggestions as to how each of these components could be implemented in a variety of settings and situations such as facility planning, construction and operation, risk management and customer relations.

  10. Trust and governance in regional planning

    DEFF Research Database (Denmark)

    Tait, Malcolm; Hansen, Carsten Jahn

    2013-01-01

    This paper seeks to understand how planning systems respond to narratives of distrust, focusing on regional planning as a particularly contested field. Using a framework to explore how reforms have enhanced trust, analysis of cases in England and Denmark reveals two distinct actions: firstly......, a reliance on strengthening formal mechanisms of government, a feature common in England, and secondly, collaborative governance, as seen in Denmark. However, both strategies fail to adequately enhance trust in the values of regional planning, leaving it vulnerable to ideological critique as a worthwhile...

  11. Security, privacy and trust in cloud systems

    CERN Document Server

    Nepal, Surya

    2013-01-01

    The book compiles technologies for enhancing and provisioning security, privacy and trust in cloud systems based on Quality of Service requirements. It is a timely contribution to a field that is gaining considerable research interest, momentum, and provides a comprehensive coverage of technologies related to cloud security, privacy and trust. In particular, the book includes - Cloud security fundamentals and related technologies to-date, with a comprehensive coverage of evolution, current landscape, and future roadmap. - A smooth organization with introductory, advanced and specialist content

  12. Macroeconomic Dynamics of Assets, Leverage and Trust

    Science.gov (United States)

    Rozendaal, Jeroen C.; Malevergne, Yannick; Sornette, Didier

    A macroeconomic model based on the economic variables (i) assets, (ii) leverage (defined as debt over asset) and (iii) trust (defined as the maximum sustainable leverage) is proposed to investigate the role of credit in the dynamics of economic growth, and how credit may be associated with both economic performance and confidence. Our first notable finding is the mechanism of reward/penalty associated with patience, as quantified by the return on assets. In regular economies where the EBITA/Assets ratio is larger than the cost of debt, starting with a trust higher than leverage results in the highest long-term return on assets (which can be seen as a proxy for economic growth). Therefore, patient economies that first build trust and then increase leverage are positively rewarded. Our second main finding concerns a recommendation for the reaction of a central bank to an external shock that affects negatively the economic growth. We find that late policy intervention in the model economy results in the highest long-term return on assets. However, this comes at the cost of suffering longer from the crisis until the intervention occurs. The phenomenon that late intervention is most effective to attain a high long-term return on assets can be ascribed to the fact that postponing intervention allows trust to increase first, and it is most effective to intervene when trust is high. These results are derived from two fundamental assumptions underlying our model: (a) trust tends to increase when it is above leverage; (b) economic agents learn optimally to adjust debt for a given level of trust and amount of assets. Using a Markov Switching Model for the EBITA/Assets ratio, we have successfully calibrated our model to the empirical data of the return on equity of the EURO STOXX 50 for the time period 2000-2013. We find that dynamics of leverage and trust can be highly nonmonotonous with curved trajectories, as a result of the nonlinear coupling between the variables. This

  13. Collaborative Trust Networks in Engineering Design Adaptation

    DEFF Research Database (Denmark)

    Atkinson, Simon Reay; Maier, Anja; Caldwell, Nicholas

    2011-01-01

    ); applying the Change Prediction Method (CPM) tool. It posits the idea of the ‘Networks-in-Being’ with varying individual and collective characteristics. [Social] networks are considered to facilitate information exchange between actors. At the same time, networks failing to provide trusted-information can...... collaboration and decision-making by using the change prediction method as a way of scoping information propagation between actors within a network....... hinder effective communication and collaboration. Different combinations of trust may therefore improve or impair the likelihood of information flow, transfer and subsequent action (cause and effect). This paper investigates how analysing different types of network-structures-in-being can support...

  14. Capturing Trust in Social Web Applications

    Science.gov (United States)

    O'Donovan, John

    The Social Web constitutes a shift in information flow from the traditional Web. Previously, content was provided by the owners of a website, for consumption by the end-user. Nowadays, these websites are being replaced by Social Web applications which are frameworks for the publication of user-provided content. Traditionally, Web content could be `trusted' to some extent based on the site it originated from. Algorithms such as Google's PageRank were (and still are) used to compute the importance of a website, based on analysis of underlying link topology. In the Social Web, analysis of link topology merely tells us about the importance of the information framework which hosts the content. Consumers of information still need to know about the importance/reliability of the content they are reading, and therefore about the reliability of the producers of that content. Research into trust and reputation of the producers of information in the Social Web is still very much in its infancy. Every day, people are forced to make trusting decisions about strangers on the Web based on a very limited amount of information. For example, purchasing a product from an eBay seller with a `reputation' of 99%, downloading a file from a peer-to-peer application such as Bit-Torrent, or allowing Amazon.com tell you what products you will like. Even something as simple as reading comments on a Web-blog requires the consumer to make a trusting decision about the quality of that information. In all of these example cases, and indeed throughout the Social Web, there is a pressing demand for increased information upon which we can make trusting decisions. This chapter examines the diversity of sources from which trust information can be harnessed within Social Web applications and discusses a high level classification of those sources. Three different techniques for harnessing and using trust from a range of sources are presented. These techniques are deployed in two sample Social Web

  15. LSOT: A Lightweight Self-Organized Trust Model in VANETs

    Directory of Open Access Journals (Sweden)

    Zhiquan Liu

    2016-01-01

    Full Text Available With the advances in automobile industry and wireless communication technology, Vehicular Ad hoc Networks (VANETs have attracted the attention of a large number of researchers. Trust management plays an important role in VANETs. However, it is still at the preliminary stage and the existing trust models cannot entirely conform to the characteristics of VANETs. This work proposes a novel Lightweight Self-Organized Trust (LSOT model which contains trust certificate-based and recommendation-based trust evaluations. Both the supernodes and trusted third parties are not needed in our model. In addition, we comprehensively consider three factor weights to ease the collusion attack in trust certificate-based trust evaluation, and we utilize the testing interaction method to build and maintain the trust network and propose a maximum local trust (MLT algorithm to identify trustworthy recommenders in recommendation-based trust evaluation. Furthermore, a fully distributed VANET scenario is deployed based on the famous Advogato dataset and a series of simulations and analysis are conducted. The results illustrate that our LSOT model significantly outperforms the excellent experience-based trust (EBT and Lightweight Cross-domain Trust (LCT models in terms of evaluation performance and robustness against the collusion attack.

  16. Trust and health: testing the reverse causality hypothesis

    Science.gov (United States)

    Giordano, Giuseppe Nicola; Lindström, Martin

    2016-01-01

    Background Social capital research has consistently shown positive associations between generalised trust and health outcomes over 2 decades. Longitudinal studies attempting to test causal relationships further support the theory that trust is an independent predictor of health. However, as the reverse causality hypothesis has yet to be empirically tested, a knowledge gap remains. The aim of this study, therefore, was to investigate if health status predicts trust. Methods Data employed in this study came from 4 waves of the British Household Panel Survey between years 2000 and 2007 (N=8114). The sample was stratified by baseline trust to investigate temporal relationships between prior self-rated health (SRH) and changes in trust. We used logistic regression models with random effects, as trust was expected to be more similar within the same individuals over time. Results From the ‘Can trust at baseline’ cohort, poor SRH at time (t−1) predicted low trust at time (t) (OR=1.38). Likewise, good health predicted high trust within the ‘Cannot’ trust cohort (OR=1.30). These patterns of positive association remained after robustness checks, which adjusted for misclassification of outcome (trust) status and the existence of other temporal pathways. Conclusions This study offers empirical evidence to support the circular nature of trust/health relationship. The stability of association between prior health status and changes in trust over time differed between cohorts, hinting at the existence of complex pathways rather than a simple positive feedback loop. PMID:26546287

  17. Trust that binds: the impact of collective felt trust on organizational performance.

    Science.gov (United States)

    Salamon, Sabrina Deutsch; Robinson, Sandra L

    2008-05-01

    The impact of employees' collective perceptions of being trusted by management was examined with a longitudinal study involving 88 retail stores. Drawing on the appropriateness framework (March, 1994; Weber, Kopelman, & Messick, 2004), the authors develop and test a model showing that when employees in an organization perceive they are trusted by management, increases in the presence of responsibility norms, as well as in the sales performance and customer service performance of the organization, are observed. Moreover, the relationship between perceptions of being trusted and sales performance is fully mediated by responsibility norms. PsycINFO Database Record (c) 2008 APA, all rights reserved.

  18. Low Temperature Scanning Tunneling Spectroscopy

    Science.gov (United States)

    Kirk, Michael Dominic

    A scanning tunneling microscope (STM) was designed and built to operate at liquid helium temperature and was used to measure highly localized electron tunneling spectroscopy. Several instruments were built, all capable of operating in many different environments: air, vacuum, liquid helium and in a transfer gas. An adaptation of one particular design was made into an atomic force microscope capable of operating at low temperatures. Using a low temperature STM, three adsorbed molecular species (liquid crystals, sorbic acid, and carbon monoxide), deposited on a graphite substrate, have been imaged at 4.2K. The inelastic tunneling spectra of these adsorbates show strong peaks in dI/dV vs V curves at energies that correspond to known vibrational modes. The increase in conductance at the onset of inelastic tunneling was measured to be as high as 100 times. The spatial variation of the spectra was measured and was seen to change dramatically on the scale of angstroms, suggesting that individual molecular bonds could be measured. A theoretical model is presented to explain the contrast seen in the STM images of adsorbed molecules, thereby explaining why adsorbed molecules appear to be more conductive than the background. The microscope proved very useful for measuring the energy gap of high temperature superconductors. These materials often have submicron grain sizes. For LaSrCuO, YBaCuO, and BiCaSrCuO, the conductance curves showed a large energy gap suggesting a strongly coupled superconductor. The conductance curves also indicated that intergrain tunneling may occur and that the background conductance varied linearly with the applied voltage. The crystalline structure of rm Bi_2 Sr_2 CaCu_2 O_ {8 + delta} was imaged by an STM operating in air and in ultra-high vacuum. From the STM images the bulk crystal structure model for this material was refined. Finally, the STM was used to make holes reproducibly on a graphite surface with diameters less than 40A. Because the

  19. Structural analysis for shallow tunnels in soft soils

    NARCIS (Netherlands)

    Vu Minh, N.; Broere, W.; Bosch, J.W.

    2017-01-01

    Generally, studies on structural design for bored tunnels focus on moderate to deep tunnels (cover-to-diameter ratio C/D ≥ 2). Such tunnel design methods cannot be used for shallow-situated bored tunnels because the influence of buoyancy is discounted, and actual loads on the tunnel lining are

  20. Tunnel design considering stress release effect

    Directory of Open Access Journals (Sweden)

    Van-hung Dao

    2009-09-01

    Full Text Available In tunnel design, the determination of installation time and the stiffness of supporting structures is very important to the tunnel stability. This study used the convergence-confinement method to determine the stress and displacement of the tunnel while considering the counter-pressure curve of the ground base, the stress release effect, and the interaction between the tunnel lining and the rock surrounding the tunnel chamber. The results allowed for the determination of the installation time, distribution and strength of supporting structures. This method was applied to the intake tunnel in the Ban Ve Hydroelectric Power Plant, in Nghe An Province, Vietnam. The results show that when a suitable displacement µ0 ranging from 0.0865 m to 0.0919 m occurrs, we can install supporting structures that satisfy the stability and economical requirements.