WorldWideScience

Sample records for trust management system

  1. Trust Management System for Opportunistic Cloud Services

    DEFF Research Database (Denmark)

    Kuada, Eric

    2013-01-01

    We have over the past three years been working on the feasibility of Opportunistic Cloud Services (OCS) for enterprises. OCS is about enterprises strategically contributing and utilizing spare IT resources as cloud services. One of the major challenges that such a platform faces is data security...... and trust management issues. This paper presents a trust management system for OCS platforms. It models the concept of trust and applies it to OCS platforms. The trust model and the trust management system are verified through the simulation of the computation of the trust values with Infrastructure...

  2. Trust Management in Open Systems (TMOS)

    National Research Council Canada - National Science Library

    Jones, Vicki

    2002-01-01

    .... The problem considered in the Trust Management in Open Systems (TMOS) project is management of the exchange of sensitive credentials between strangers for the purpose of property-based authentication and authorization...

  3. Building trusted national identity management systems: Presenting the privacy concern-trust (PCT) model

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    This paper discusses the effect of trust and information privacy concerns on citizens’ attitude towards national identity management systems. We introduce the privacyconcerns- trust model, which shows the role of trust in mediating and moderating citizens’ attitude towards identity management...... systems. We adopted a qualitative research approach in our analysis of data that was gathered through a series of interviews and a stakeholder workshop in Ghana. Our findings indicate that, beyond the threshold level of trust, societal information privacy concern is low; hence, trust is high, thereby...

  4. DualTrust: A Trust Management Model for Swarm-Based Autonomic Computing Systems

    Energy Technology Data Exchange (ETDEWEB)

    Maiden, Wendy M. [Washington State Univ., Pullman, WA (United States)

    2010-05-01

    Trust management techniques must be adapted to the unique needs of the application architectures and problem domains to which they are applied. For autonomic computing systems that utilize mobile agents and ant colony algorithms for their sensor layer, certain characteristics of the mobile agent ant swarm -- their lightweight, ephemeral nature and indirect communication -- make this adaptation especially challenging. This thesis looks at the trust issues and opportunities in swarm-based autonomic computing systems and finds that by monitoring the trustworthiness of the autonomic managers rather than the swarming sensors, the trust management problem becomes much more scalable and still serves to protect the swarm. After analyzing the applicability of trust management research as it has been applied to architectures with similar characteristics, this thesis specifies the required characteristics for trust management mechanisms used to monitor the trustworthiness of entities in a swarm-based autonomic computing system and describes a trust model that meets these requirements.

  5. Research on Trust Propagation Models in Reputation Management Systems

    Directory of Open Access Journals (Sweden)

    Zhiyuan Su

    2014-01-01

    Full Text Available Feedback based reputation systems continue to gain popularity in eCommerce and social media systems today and reputation management in large social networks needs to manage cold start and sparseness in terms of feedback. Trust propagation has been widely recognized as an effective mechanism to handle these problems. In this paper we study the characterization of trust propagation models in the context of attack resilience. We characterize trust propagation models along three dimensions: (i uniform propagation and conditional propagation, (ii jump strategies for breaking unwanted cliques, and (iii decay factors for differentiating recent trust history from remote past history. We formally and experimentally show that feedback similarity is a critical measure for countering colluding attacks in reputation systems. Without feedback similarity guided control, trust propagations are vulnerable to different types of colluding attacks.

  6. Trust on the Ratee: A Trust Management System for Social Internet of Vehicles

    Directory of Open Access Journals (Sweden)

    Fangyu Gai

    2017-01-01

    Full Text Available The integration of social networking concepts with Internet of Vehicles (IoV has led to the novel paradigm “Social Internet of Vehicles (SIoV,” which enables vehicles to establish social relationships autonomously to improve traffic conditions and service discovery. There is a growing requirement for effective trust management in the SIoV, considering the critical consequences of acting on misleading information spread by malicious nodes. However, most existing trust models are rater-based, where the reputation information of each node is stored in other nodes it has interacted with. This is not suitable for vehicular environment due to the ephemeral nature of the network. To fill this gap, we propose a Ratee-based Trust Management (RTM system, where each node stores its own reputation information rated by others during past transactions, and a credible CA server is introduced to ensure the integrality and the undeniability of the trust information. RTM is built based on the concept of SIoV, so that the relationships established between nodes can be used to increase the accuracy of the trustworthiness. Experimental results demonstrate that our scheme achieves faster information propagation and higher transaction success rate than the rater-based method, and the time cost when calculating trustworthiness can meet the demand of vehicular networks.

  7. Trust Management V

    DEFF Research Database (Denmark)

    2011-01-01

    from 42 submissions. The papers feature both theoretical research and real-world case studies from academia, business and government focusing on areas such as: trust models, social and behavioral aspects of trust, trust in networks, mobile systems and cloud computation, privacy, reputation systems...

  8. Academic Panel: Can Self-Managed Systems be trusted?

    NARCIS (Netherlands)

    de Lemos, Rogerio; McCann, Julie A.; Rana, Omar F.; Wombacher, Andreas

    Trust can be defined as to have confidence or faith in; a form of reliance or certainty based on past experience; to allow without fear; believe; hope: expect and wish; and extend credit to. The issue of trust in computing has always been a hot topic, especially notable with the proliferation of

  9. Trust management in cloud services

    CERN Document Server

    Noor, Talal H; Bouguettaya, Athman

    2014-01-01

    This book describes the design and implementation of Cloud Armor, a novel approach for credibility-based trust management and automatic discovery of cloud services in distributed and highly dynamic environments. This book also helps cloud users to understand the difficulties of establishing trust in cloud computing and the best criteria for selecting a service cloud. The techniques have been validated by a prototype system implementation and experimental studies using a collection of real world trust feedbacks on cloud services.The authors present the design and implementation of a novel pro

  10. Trust Management in P2P systems using Standard TuLiP

    NARCIS (Netherlands)

    Czenko, M.R.; Doumen, J.M.; Etalle, Sandro

    2008-01-01

    In this paper we introduce Standard TuLiP - a new logic based Trust Management system. In Standard TuLiP, security decisions are based on security credentials, which can be issued by different entities and stored at different locations. Standard TuLiP directly supports the distributed credential

  11. Trust management in P2P systems using standard TuLiP

    NARCIS (Netherlands)

    Czenko, M.; Doumen, J.M.; Etalle, S.; Karabulut, Y.; Mitchell, J.C.; Herrmann, P.; Jensen, C.D.

    2008-01-01

    In this paper we introduce Standard TuLiP - a new logic based Trust Management system. In Standard TuLiP, security decisions are based on security credentials, which can be issued by different entities and stored at different locations. Standard TuLiP directly supports the distributed credential

  12. Trust Management in P2P Systems Using Standard TuLiP

    NARCIS (Netherlands)

    Czenko, M.R.; Doumen, J.M.; Etalle, Sandro

    2008-01-01

    In this paper we introduce Standard TuLiP - a new logic based Trust Management system. In Standard TuLiP, security decisions are based on security credentials, which can be issued by different entities and stored at different locations. Standard TuLiP directly supports the distributed credential

  13. Trust-based Service Management of Internet of Things Systems and Its Applications

    OpenAIRE

    Guo, Jia

    2018-01-01

    A future Internet of Things (IoT) system will consist of a huge quantity of heterogeneous IoT devices, each capable of providing services upon request. It is of utmost importance for an IoT device to know if another IoT service is trustworthy when requesting it to provide a service. In this dissertation research, we develop trust-based service management techniques applicable to distributed, centralized, and hybrid IoT environments. For distributed IoT systems, we develop a trust protocol...

  14. A Distributed Energy-Aware Trust Management System for Secure Routing in Wireless Sensor Networks

    Science.gov (United States)

    Stelios, Yannis; Papayanoulas, Nikos; Trakadas, Panagiotis; Maniatis, Sotiris; Leligou, Helen C.; Zahariadis, Theodore

    Wireless sensor networks are inherently vulnerable to security attacks, due to their wireless operation. The situation is further aggravated because they operate in an infrastructure-less environment, which mandates the cooperation among nodes for all networking tasks, including routing, i.e. all nodes act as “routers”, forwarding the packets generated by their neighbours in their way to the sink node. This implies that malicious nodes (denying their cooperation) can significantly affect the network operation. Trust management schemes provide a powerful tool for the detection of unexpected node behaviours (either faulty or malicious). Once misbehaving nodes are detected, their neighbours can use this information to avoid cooperating with them either for data forwarding, data aggregation or any other cooperative function. We propose a secure routing solution based on a novel distributed trust management system, which allows for fast detection of a wide set of attacks and also incorporates energy awareness.

  15. Trust Management in P2P systems using Standard TuLiP

    OpenAIRE

    Czenko, M.R.; Doumen, J.M.; Etalle, Sandro

    2008-01-01

    In this paper we introduce Standard TuLiP - a new logic based Trust Management system. In Standard TuLiP, security decisions are based on security credentials, which can be issued by different entities and stored at different locations. Standard TuLiP directly supports the distributed credential storage by providing a sound and complete Lookup and Inference AlgoRithm (LIAR). In this paper we focus on (a) the language of Standard TuLiP and (b) on the practical considerations which arise when d...

  16. Maintaining control while delegating trust: Integrity constraints in trust management

    NARCIS (Netherlands)

    Etalle, S.; Winsborough, W.H.

    2009-01-01

    We introduce the use, monitoring, and enforcement of integrity constraints in trust management-style authorization systems. We consider what portions of the policy state must be monitored to detect violations of integrity constraints. Then, we address the fact that not all participants in a

  17. TRUST MODEL FOR INFORMATION SECURITY OF MULTI-AGENT ROBOTIC SYSTEMS WITH A DECENTRALIZED MANAGEMENT

    Directory of Open Access Journals (Sweden)

    I. A. Zikratov

    2014-03-01

    Full Text Available The paper deals with the issues on protection of multi-agent robotic systems against attacks by robots-saboteurs. The operation analysis of such systems with decentralized control is carried out. Concept of harmful information impact (attack from a robot-saboteur to the multi-agent robotic system is given. The class of attacks is considered using interception of messages, formation and transfer of misinformation to group of robots, and also carrying out other actions with vulnerabilities of multiagent algorithms without obviously identified signs of invasion of robots-saboteurs. The model of information security is developed, in which robots-agents work out trust levels to each other analyzing the events occurring in the system. The idea of trust model consists in the analysis of transferred information by each robot and the executed actions of other members in a group, comparison of chosen decision on iteration step k with objective function of the group. Distinctive feature of the trust model in comparison with the closest analogue - Buddy Security Model in which the exchange between the agents security tokens is done — is involvement of the time factor during which agents have to "prove" by their actions the usefulness in achievement of a common goal to members of the group. Variants of this model realization and ways of an assessment of trust levels for agents in view of the security policy accepted in the group are proposed.

  18. A Dynamic Active Multicast Group Access Control Framework Based on Trust Management System

    Institute of Scientific and Technical Information of China (English)

    YANG Chang; CHEN Xiaolin; ZHANG Huanguo

    2006-01-01

    The current multicast model provides no access control mechanism. Any host can send data directly to a multicast address or join a multicast group to become a member, which brings safety problems to multicast. In this paper, we present a new active multicast group access control mechanism that is founded on trust management. This structure can solve the problem that exists in multicast members' access control and distributing authorization of traditional IP multicast.

  19. Distributed Trust Management for Validating SLA Choreographies

    Science.gov (United States)

    Haq, Irfan Ul; Alnemr, Rehab; Paschke, Adrian; Schikuta, Erich; Boley, Harold; Meinel, Christoph

    For business workflow automation in a service-enriched environment such as a grid or a cloud, services scattered across heterogeneous Virtual Organizations (VOs) can be aggregated in a producer-consumer manner, building hierarchical structures of added value. In order to preserve the supply chain, the Service Level Agreements (SLAs) corresponding to the underlying choreography of services should also be incrementally aggregated. This cross-VO hierarchical SLA aggregation requires validation, for which a distributed trust system becomes a prerequisite. Elaborating our previous work on rule-based SLA validation, we propose a hybrid distributed trust model. This new model is based on Public Key Infrastructure (PKI) and reputation-based trust systems. It helps preventing SLA violations by identifying violation-prone services at service selection stage and actively contributes in breach management at the time of penalty enforcement.

  20. Banking system trust, bank trust, and bank loyalty

    NARCIS (Netherlands)

    van Esterik-Plasmeijer, P.; van Raaij, W.F.

    2017-01-01

    Purpose The purpose of this paper is to test a model of banking system trust as an antecedent of bank trust and bank loyalty. Six determinants of trust and loyalty are included: competence, stability, integrity, customer orientation, transparency, and value congruence. The study provides insights

  1. Protecting Mobile Crowd Sensing against Sybil Attacks Using Cloud Based Trust Management System

    Directory of Open Access Journals (Sweden)

    Shih-Hao Chang

    2016-01-01

    Full Text Available Mobile crowd sensing (MCS arises as a new sensing paradigm, which leverages citizens for large-scale sensing by various mobile devices to efficiently collect and share local information. Unlike other MCS application challenges that consider user privacy and data trustworthiness, this study focuses on the network trustworthiness problem, namely, Sybil attacks in MCS network. The Sybil attack in computer security is a type of security attack, which illegally forges multiple identities in peer-to-peer networks, namely, Sybil identities. These Sybil identities will falsify multiple identities that negatively influence the effectiveness of sensing data in this MCS network or degrading entire network performance. To cope with this problem, a cloud based trust management scheme (CbTMS was proposed to detect Sybil attacks in the MCS network. The CbTMS was proffered for performing active and passive checking scheme, in addition to the mobile PCS trustworthiness management, and includes a decision tree algorithm, to verify the covered nodes in the MCS network. Simulation studies show that our CbTMS can efficiently detect the malicious Sybil nodes in the network and cause 6.87 Wh power reduction compared with other malicious Sybil node attack mode.

  2. Decoupling, re-Engaging: managing trust relationships in implementation projects

    DEFF Research Database (Denmark)

    Rose, Jeremy; Schlichter, Bjarne Rerup

    2012-01-01

    , and the complex demands of managing those fluctuations. We investigate evolving trust relationships in a longitudinal case analysis of a large Integrated Hospital System implementation for the Faroe Islands. Trust relationships suffered various breakdowns, but the project was able to recover and eventually meet...... its goals. Based on concepts from Giddens’ later work on modernity, we develop two approaches for managing dynamic trust relationships in implementation projects: decoupling and re-engaging.......An important aspect of the successful implementation of large information systems (such as ERP systems) is trust. These implementations impact the legitimate interests of many groups of stakeholders, and trust is a critical factor for success. Trust in the project is contingent upon many factors...

  3. Research of Trust Chain of Operating System

    Science.gov (United States)

    Li, Hongjiao; Tian, Xiuxia

    Trust chain is one of the key technologies in designing secure operating system based on TC technology. Constructions of trust chain and trust models are analyzed. Future works in these directions are discussed.

  4. Requirements engineering for trust management: Model, methodology, and reasoning

    NARCIS (Netherlands)

    Giorgini, P.; Massacci, F.; Mylopoulos, J.; Zannone, N.

    2006-01-01

    A number of recent proposals aim to incorporate security engineering into mainstream software engineering. Yet, capturing trust and security requirements at an organizational level, as opposed to an IT system level, and mapping these into security and trust management policies is still an open

  5. Trust and Online Reputation Systems

    Science.gov (United States)

    Kwan, Ming; Ramachandran, Deepak

    Web 2.0 technologies provide organizations with unprecedented opportunities to expand and solidify relationships with their customers, partners, and employees—while empowering firms to define entirely new business models focused on sharing information in online collaborative environments. Yet, in and of themselves, these technologies cannot ensure productive online interactions. Leading enterprises that are experimenting with social networks and online communities are already discovering this fact and along with it, the importance of establishing trust as the foundation for online collaboration and transactions. Just as today's consumers must feel secure to bank, exchange personal information and purchase products and services online; participants in Web 2.0 initiatives will only accept the higher levels of risk and exposure inherent in e-commerce and Web collaboration in an environment of trust. Indeed, only by attending to the need to cultivate online trust with customers, partners and employees will enterprises ever fully exploit the expanded business potential posed by Web 2.0. But developing online trust is no easy feat. While various preliminary attempts have occurred, no definitive model for establishing or measuring it has yet been established. To that end, nGenera has identified three, distinct dimensions of online trust: reputation (quantitative-based); relationship (qualitative-based) and process (system-based). When considered together, they form a valuable model for understanding online trust and a toolbox for cultivating it to support Web 2.0 initiatives.

  6. Managing Trust in Online Social Networks

    Science.gov (United States)

    Bhuiyan, Touhid; Josang, Audun; Xu, Yue

    In recent years, there is a dramatic growth in number and popularity of online social networks. There are many networks available with more than 100 million registered users such as Facebook, MySpace, QZone, Windows Live Spaces etc. People may connect, discover and share by using these online social networks. The exponential growth of online communities in the area of social networks attracts the attention of the researchers about the importance of managing trust in online environment. Users of the online social networks may share their experiences and opinions within the networks about an item which may be a product or service. The user faces the problem of evaluating trust in a service or service provider before making a choice. Recommendations may be received through a chain of friends network, so the problem for the user is to be able to evaluate various types of trust opinions and recommendations. This opinion or recommendation has a great influence to choose to use or enjoy the item by the other user of the community. Collaborative filtering system is the most popular method in recommender system. The task in collaborative filtering is to predict the utility of items to a particular user based on a database of user rates from a sample or population of other users. Because of the different taste of different people, they rate differently according to their subjective taste. If two people rate a set of items similarly, they share similar tastes. In the recommender system, this information is used to recommend items that one participant likes, to other persons in the same cluster. But the collaborative filtering system performs poor when there is insufficient previous common rating available between users; commonly known as cost start problem. To overcome the cold start problem and with the dramatic growth of online social networks, trust based approach to recommendation has emerged. This approach assumes a trust network among users and makes recommendations

  7. Cryptographic Trust Management Requirements Specification: Version 1.1

    Energy Technology Data Exchange (ETDEWEB)

    Edgar, Thomas W.

    2009-09-30

    The Cryptographic Trust Management (CTM) Project is being developed for Department of Energy, OE-10 by the Pacific Northwest National Laboratory (PNNL). It is a component project of the NSTB Control Systems Security R&D Program.

  8. Perceptions of trust in physician-managers.

    Science.gov (United States)

    Cregård, Anna; Eriksson, Nomie

    2015-01-01

    The purpose of this paper is to explore the dual role of physician-managers through an examination of perceptions of trust and distrust in physician-managers. The healthcare sector needs physicians to lead. Physicians in part-time managerial positions who continue their medical practice are called part-time physician-managers. This paper explores this dual role through an examination of perceptions of trust and distrust in physician-managers. The study takes a qualitative research approach in which interviews and focus group discussions with physician-managers and nurse-managers provide the empirical data. An analytical model, with the three elements of ability, benevolence and integrity, was used in the analysis of trust and distrust in physician-managers. The respondents (physician-managers and nurse-managers) perceived both an increase and a decrease in physicians' trust in the physician-managers. Because elements of distrust were more numerous and more severe than elements of trust, the physician-managers received negative perceptions of their role. This paper's findings are based on perceptions of perceptions. The physicians were not interviewed on their trust and distrust of physician-managers. The healthcare sector must pay attention to the diverse expectations of the physician-manager role that is based on both managerial and medical logics. Hospital management should provide proper support to physician-managers in their dual role to ensure their willingness to continue to assume managerial responsibilities. The paper takes an original approach in its research into the dual role of physician-managers who work under two conflicting logics: the medical logic and the managerial logic. The focus on perceived trust and distrust in physician-managers is a new perspective on this complicated role.

  9. Trust is a must: What is involved in trusting those who manage forest fires?

    Science.gov (United States)

    Adam Liljeblad; Bill Borrie; Alan Watson

    2010-01-01

    Trust is a complicated emotion. In the past, many social scientists have studied trust. They discovered that trust involves a number of beliefs and emotions. The scientists in this study were interested in learning more about trust. They believed that forest managers can do a better job if people trust them to do what is best for citizens and the environment (figure 1...

  10. ReTrust: attack-resistant and lightweight trust management for medical sensor networks.

    Science.gov (United States)

    He, Daojing; Chen, Chun; Chan, Sammy; Bu, Jiajun; Vasilakos, Athanasios V

    2012-07-01

    Wireless medical sensor networks (MSNs) enable ubiquitous health monitoring of users during their everyday lives, at health sites, without restricting their freedom. Establishing trust among distributed network entities has been recognized as a powerful tool to improve the security and performance of distributed networks such as mobile ad hoc networks and sensor networks. However, most existing trust systems are not well suited for MSNs due to the unique operational and security requirements of MSNs. Moreover, similar to most security schemes, trust management methods themselves can be vulnerable to attacks. Unfortunately, this issue is often ignored in existing trust systems. In this paper, we identify the security and performance challenges facing a sensor network for wireless medical monitoring and suggest it should follow a two-tier architecture. Based on such an architecture, we develop an attack-resistant and lightweight trust management scheme named ReTrust. This paper also reports the experimental results of the Collection Tree Protocol using our proposed system in a network of TelosB motes, which show that ReTrust not only can efficiently detect malicious/faulty behaviors, but can also significantly improve the network performance in practice.

  11. Trust

    OpenAIRE

    Söllner, Matthias; Benbasat, Izak; Gefen, David; Leimeister, Jan Marco; Pavlou, Paul A.

    2016-01-01

    Trust is the enabler of social interaction. Although the origins of research on trust traditionally lie outside the Information Systems (IS) domain, the importance of trust for IS research rapidly grew in the late 1990s, and it is still growing with the increasing ubiquity and advancement of technology in organizations, virtual teams, online markets, and user-technology interactions. Theoretically, the central role of trust is tied to the growing social change that Information and Communicati...

  12. A multi-domain trust management model for supporting RFID applications of IoT.

    Directory of Open Access Journals (Sweden)

    Xu Wu

    Full Text Available The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system, in which trust establishment among entities from heterogeneous domains without past interaction or prior agreed policy, is a challenge. The current trust management mechanisms in the literature do not meet the specific requirements in multi-domain RFID systems. Therefore, this paper analyzes the special challenges on trust management in multi-domain RFID systems, and identifies the implications and the requirements of the challenges on the solutions to the trust management of multi-domain RFID systems. A multi-domain trust management model is proposed, which provides a hierarchical trust management framework include a diversity of trust evaluation and establishment approaches. The simulation results and analysis show that the proposed method has excellent ability to deal with the trust relationships, better security, and higher accuracy rate.

  13. A Calculus for Trust Management

    DEFF Research Database (Denmark)

    Carbone, Marco; Nielsen, Mogens; Sassone, Vladimiro

    2004-01-01

    principals to policies. We elect to formalise policies using a Datalog-like logic, and to express protocols in the process algebra style. This yields an expressive calculus very suitable for the global computing scenarios, and provides a formalisation of notions such as trust evolution. For ctm we define...

  14. Trust dynamics in a large system implementation

    DEFF Research Database (Denmark)

    Schlichter, Bjarne Rerup; Rose, Jeremy

    2013-01-01

    outcomes, but largely ignored the dynamics of trust relations. Giddens, as part of his study of modernity, theorises trust dynamics in relation to abstract social systems, though without focusing on information systems. We use Giddens’ concepts to investigate evolving trust relationships in a longitudinal......A large information systems implementation (such as Enterprise Resource Planning systems) relies on the trust of its stakeholders to succeed. Such projects impact diverse groups of stakeholders, each with their legitimate interests and expectations. Levels of stakeholder trust can be expected...... case analysis of a large Integrated Hospital System implementation for the Faroe Islands. Trust relationships suffered a serious breakdown, but the project was able to recover and meet its goals. We develop six theoretical propositions theorising the relationship between trust and project outcomes...

  15. Dynamic Trust Management for Mobile Networks and Its Applications

    Science.gov (United States)

    Bao, Fenye

    2013-01-01

    Trust management in mobile networks is challenging due to dynamically changing network environments and the lack of a centralized trusted authority. In this dissertation research, we "design" and "validate" a class of dynamic trust management protocols for mobile networks, and demonstrate the utility of dynamic trust management…

  16. Trust and trust relations from the providers' perspective: the case of the healthcare system in India.

    Science.gov (United States)

    Kane, Sumit; Calnan, Michael; Radkar, Anjali

    2015-01-01

    Commentators suggest that there is an erosion of trust in the relations between different actors in the health system in India. This paper presents the results of an exploratory study of the situation of providers in an urban setting in western India, the nature of their relations in terms of trust and what influences these relations. The data on relationships of trust were collected through interviews and focus group discussions with key informants, including public and private providers, regulators, managers and societal actors, such as patients/citizens, politicians and the media.

  17. Trusted computing for embedded systems

    CERN Document Server

    Soudris, Dimitrios; Anagnostopoulos, Iraklis

    2015-01-01

    This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. Case studies are used to present new techniques designed as industrial security solutions. Coverage includes development of tamper resistant hardware and firmware mechanisms for lightweight embedded devices, as well as those serving as security anchors for embedded platforms required by applications such as smart power grids, smart networked and home appliances, environmental and infrastructure sensor networks, etc. ·         Enables readers to address a variety of security threats to embedded hardware and software; ·         Describes design of secure wireless sensor networks, to address secure authen...

  18. XML Based Adaptive IPSEC Policy Management in a Trust Management Context

    National Research Council Canada - National Science Library

    Mohan, R

    2002-01-01

    ... the level of security service "on-the-fly" to respond to changing network and operational conditions, The IPsec implementation in OpenESD works in conjunction with the Trust Management System, KeyNote...

  19. Trust-based information system architecture for personal wellness.

    Science.gov (United States)

    Ruotsalainen, Pekka; Nykänen, Pirkko; Seppälä, Antto; Blobel, Bernd

    2014-01-01

    Modern eHealth, ubiquitous health and personal wellness systems take place in an unsecure and ubiquitous information space where no predefined trust occurs. This paper presents novel information model and an architecture for trust based privacy management of personal health and wellness information in ubiquitous environment. The architecture enables a person to calculate a dynamic and context-aware trust value for each service provider, and using it to design personal privacy policies for trustworthy use of health and wellness services. For trust calculation a novel set of measurable context-aware and health information-sensitive attributes is developed. The architecture enables a person to manage his or her privacy in ubiquitous environment by formulating context-aware and service provider specific policies. Focus groups and information modelling was used for developing a wellness information model. System analysis method based on sequential steps that enable to combine results of analysis of privacy and trust concerns and the selection of trust and privacy services was used for development of the information system architecture. Its services (e.g. trust calculation, decision support, policy management and policy binding services) and developed attributes enable a person to define situation-aware policies that regulate the way his or her wellness and health information is processed.

  20. Recovering from trust breakdowns in large system implementations

    DEFF Research Database (Denmark)

    Rerup Schlichter, Bjarne Rerup; Andersen, Povl Erik Rostgård

    2011-01-01

    On the basis of experiences from the Faroese large-scale implementation of integrated healthcare information systems and insights into dynamic aspects of trust, we offer the following lessons learned for the successful management and recovery of trust (breakdowns) in large system implementations......: restore relations by turning towards face-to-face events and procedures, assure a well-functioning and available support organization, demonstrate trust in actors to enhance their own self-confidence and celebrate successes, even the smallest or ones injected by yourself. The propositions are based on a 6...

  1. An Analysis of Behavioral Intention to use Thai Internet Banking with Quality Management and Trust

    OpenAIRE

    Namahoot KS; Laohavichien T

    2015-01-01

    This research explores the effects of quality management and trust towards behavioural intention of Thai consumers to use internet banking. It specifically investigates whether the quality management dimensions of information quality, system quality and service quality affect the level of trust of Thai consumers towards internet banking, and whether this trust correspondingly affect their intention to use the system. This study has been conducted in Thailand and focused on the users of intern...

  2. Beyond the Hype: On Using Blockchains in Trust Management for Authentication

    OpenAIRE

    Alexopoulos, Nikolaos; Daubert, Jörg; Mühlhäuser, Max; Habib, Sheikh Mahbub

    2017-01-01

    Trust Management (TM) systems for authentication are vital to the security of online interactions, which are ubiquitous in our everyday lives. Various systems, like the Web PKI (X.509) and PGP's Web of Trust are used to manage trust in this setting. In recent years, blockchain technology has been introduced as a panacea to our security problems, including that of authentication, without sufficient reasoning, as to its merits.In this work, we investigate the merits of using open distributed le...

  3. Trust and the transformation of energy systems

    Energy Technology Data Exchange (ETDEWEB)

    Rayner, Steve [James Martin Institute for Science and Civilization, Said Business School, Park End Street, Oxford, OX1 1HP (United Kingdom)

    2010-06-15

    The author looks at diverse concepts and roles of trust in the challenge of decarbonising energy systems, drawing on 25 years of personal experience in the fields of energy and environmental policy research. The paper focuses on three issues-public trust in science, institutional trust in making technology choices, and the idea that high-trust societies are more sustainable than those exhibiting low-trust. While trust is a key concept in understanding the public acceptability of technology choices, it is only one of a suite of interrelated concepts that must be addressed, which also includes liability, consent, and fairness. Furthermore, rational distrust among competing institutional world views may be critical in understanding the role of social capital in socioeconomic and technological development. Thus the concept of trust has become a portmanteau, carrying a diverse range of ideas and conditions for sustainable energy systems. The paper concludes with three emphases for decision makers. First, the issue is the energy system, not particular generating technologies. Second, the energy system must be recognized to be as much a social system as it is a technical one. Third, the system requires incorporation of the minimum level of diversity of engineering technologies and social actors to be sustainable. (author)

  4. Trust and the transformation of energy systems

    International Nuclear Information System (INIS)

    Rayner, Steve

    2010-01-01

    The author looks at diverse concepts and roles of trust in the challenge of decarbonising energy systems, drawing on 25 years of personal experience in the fields of energy and environmental policy research. The paper focuses on three issues-public trust in science, institutional trust in making technology choices, and the idea that high-trust societies are more sustainable than those exhibiting low-trust. While trust is a key concept in understanding the public acceptability of technology choices, it is only one of a suite of interrelated concepts that must be addressed, which also includes liability, consent, and fairness. Furthermore, rational distrust among competing institutional world views may be critical in understanding the role of social capital in socioeconomic and technological development. Thus the concept of trust has become a portmanteau, carrying a diverse range of ideas and conditions for sustainable energy systems. The paper concludes with three emphases for decision makers. First, the issue is the energy system, not particular generating technologies. Second, the energy system must be recognized to be as much a social system as it is a technical one. Third, the system requires incorporation of the minimum level of diversity of engineering technologies and social actors to be sustainable.

  5. The quality of interaction between managers and clinicians: a question of trust

    NARCIS (Netherlands)

    Brown, P.; Alaszewski, A.; Pilgrim, D.; Calnan, M.

    2011-01-01

    A lack of trust between clinicians and junior/middle managers is well documented in health care systems but under-theorized. Face-to-face interactions between clinicians and managers, through which trust is constructed, are vitally shaped by assumptions drawn from local organizational

  6. Hierarchical Trust Management of COI in Heterogeneous Mobile Networks

    Science.gov (United States)

    2017-08-01

    Report: Hierarchical Trust Management of COI in Heterogeneous Mobile Networks The views, opinions and/or findings contained in this report are those of...Institute & State University Title: Hierarchical Trust Management of COI in Heterogeneous Mobile Networks Report Term: 0-Other Email: irchen@vt.edu...Reconfigurability, Survivability and Intrusion Tolerance for Community of Interest (COI) Applications – Our proposed COI trust management protocol will

  7. Trust Management Considerations For the Cooperative Infrastructure Defense Framework: Trust Relationships, Evidence, and Decisions

    Energy Technology Data Exchange (ETDEWEB)

    Maiden, Wendy M.

    2009-12-01

    Cooperative Infrastructure Defense (CID) is a hierarchical, agent-based, adaptive, cyber-security framework designed to collaboratively protect multiple enclaves or organizations participating in a complex infrastructure. CID employs a swarm of lightweight, mobile agents called Sensors designed to roam hosts throughout a security enclave to find indications of anomalies and report them to host-based Sentinels. The Sensors’ findings become pieces of a larger puzzle, which the Sentinel puts together to determine the problem and respond per policy as given by the enclave-level Sergeant agent. Horizontally across multiple enclaves and vertically within each enclave, authentication and access control technologies are necessary but insufficient authorization mechanisms to ensure that CID agents continue to fulfill their roles in a trustworthy manner. Trust management fills the gap, providing mechanisms to detect malicious agents and offering more robust mechanisms for authorization. This paper identifies the trust relationships throughout the CID hierarchy, the types of trust evidence that could be gathered, and the actions that the CID system could take if an entity is determined to be untrustworthy.

  8. Nonmonotonic Trust Management for P2P Applications

    NARCIS (Netherlands)

    Czenko, M.R.; Tran, H.M.; Doumen, J.M.; Etalle, Sandro; Hartel, Pieter H.; den Hartog, Jeremy

    Community decisions about access control in virtual communities are non-monotonic in nature. This means that they cannot be expressed in current, monotonic trust management languages such as the family of Role Based Trust Management languages (RT). To solve this problem we propose RTo, which adds a

  9. Integrated Social and Quality of Service Trust Management of Mobile Groups in Ad Hoc Networks

    Science.gov (United States)

    2013-01-01

    high resiliency to malicious attacks and misbehaving nodes. Keywords—trust management; mobile ad hoc networks; QoS trust; social trust; trust...paper we address an importance issue of trust management protocol design for MANETs: trust bias minimization despite misbehaving nodes performing

  10. CROWN: A service grid middleware with trust management mechanism

    Institute of Scientific and Technical Information of China (English)

    HUAI Jinpeng; HU Chunming; LI Jianxin; SUN Hailong; WO Tianyu

    2006-01-01

    Based on a proposed Web service-based grid architecture, a service grid middleware system called CROWN is designed in this paper. As the two kernel points of the middleware, the overlay-based distributed grid resource management mechanism is proposed, and the policy-based distributed access control mechanism with the capability of automatic negotiation of the access control policy and trust management and negotiation is also discussed in this paper. Experience of CROWN testbed deployment and application development shows that the middleware can support the typical scenarios such as computing-intensive applications, data-intensive applications and mass information processing applications.

  11. 77 FR 67029 - Arden Investment Series Trust and Arden Asset Management LLC; Notice of Application

    Science.gov (United States)

    2012-11-08

    ... Investment Series Trust and Arden Asset Management LLC; Notice of Application November 2, 2012. AGENCY... disclosure requirements. Applicants: Arden Investment Series Trust (the ``Trust'') and Arden Asset Management... Company Regulation, Division of Investment Management). SUPPLEMENTARY INFORMATION: The following is a...

  12. Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker

    Directory of Open Access Journals (Sweden)

    Ahmad Samer Wazan

    2017-01-01

    Full Text Available A Public Key Infrastructure (PKI is considered one of the most important techniques used to propagate trust in authentication over the Internet. This technology is based on a trust model defined by the original X.509 (1988 standard and is composed of three entities: the certification authority (CA, the certificate holder (or subject, and the Relying Party (RP. The CA plays the role of a trusted third party between the certificate holder and the RP. In many use cases, this trust model has worked successfully. However, we argue that the application of this model on the Internet implies that web users need to depend on almost anyone in the world in order to use PKI technology. Thus, we believe that the current TLS system is not fit for purpose and must be revisited as a whole. In response, the latest draft edition of X.509 has proposed a new trust model by adding new entity called the Trust Broker (TB. In this paper, we present an implementation approach that a Trust Broker could follow in order to give RPs trust information about a CA by assessing the quality of its issued certificates. This is related to the quality of the CA’s policies and procedures and its commitment to them. Finally, we present our Trust Broker implementation that demonstrates how RPs can make informed decisions about certificate holders in the context of the global web, without requiring large processing resources themselves.

  13. Trust and automation: the influence of automation malfunctions and system feedback on operator trust

    International Nuclear Information System (INIS)

    Strand, Stine

    2001-10-01

    Level of operator trust in an automatic system, which is not in accordance with the reliability of the system, might impose serious threats concerning issues of safety, productivity and the well being of the operator. Operator trust is therefore regarded as an important variable in man-machine interaction. The focus of this study was the influence of automatic malfunctions and amount of feedback provided by the automatic system on level of operator trust. The study was conducted in conjunction with the Human Centred Automation 2000-experiment. Two questionnaires attempting to measure operator trust were developed, designed to reflect the dimensions of predictability, dependability and faith. Analysis of the questionnaires demonstrated that they were reliable tools for measurement of operator trust. Factor analysis did not completely confirm the theoretical dimensions of trust, but indicated partial support. Operator trust correlated negatively with workload across situations, and positively with performance in complex situations. The results of the hypotheses tests demonstrated that operator trust gradually decreased after introduction of malfunctions. The effect of different malfunctions was however the opposite of what was expected, with obvious malfunctions reducing trust more than more camouflaged and safety critical malfunctions. Trust in the automatic system in general was lower than trust in specific malfunctioning components. Different interfaces providing different amount of feedback to the operator did not significantly influence level of operator trust. (Author)

  14. Trust between man and machine in a teleoperation system

    International Nuclear Information System (INIS)

    Dassonville, I.; Jolly, D.; Desodt, A.M.

    1996-01-01

    The work we present deals with the trust of man in a teleoperation system. Trust is important because it is linked to stress which modifies human reliability. We are trying to quantify trust. In this paper, we'll present the theory of trust in relationships, and its extension for a man-machine system. Then, we explain the links between trust and human reliability. Then, we introduce our experimental process and the first results concerning selfconfidence

  15. Security, privacy and trust in cloud systems

    CERN Document Server

    Nepal, Surya

    2013-01-01

    The book compiles technologies for enhancing and provisioning security, privacy and trust in cloud systems based on Quality of Service requirements. It is a timely contribution to a field that is gaining considerable research interest, momentum, and provides a comprehensive coverage of technologies related to cloud security, privacy and trust. In particular, the book includes - Cloud security fundamentals and related technologies to-date, with a comprehensive coverage of evolution, current landscape, and future roadmap. - A smooth organization with introductory, advanced and specialist content

  16. Public Trust in Health Information Sharing: A Measure of System Trust.

    Science.gov (United States)

    Platt, Jodyn E; Jacobson, Peter D; Kardia, Sharon L R

    2018-04-01

    To measure public trust in a health information sharing in a broadly defined health system (system trust), inclusive of health care, public health, and research; to identify individual characteristics that predict system trust; and to consider these findings in the context of national health initiatives (e.g., learning health systems and precision medicine) that will expand the scope of data sharing. Survey data (n = 1,011) were collected in February 2014. We constructed a composite index of four dimensions of system trust-competency, fidelity, integrity, and trustworthiness. The index was used in linear regression evaluating demographic and psychosocial predictors of system trust. Data were collected by GfK Custom using a nationally representative sample and analyzed in Stata 13.0. Our findings suggest the public's trust may not meet the needs of health systems as they enter an era of expanded data sharing. We found that a majority of the U.S. public does not trust the organizations that have health information and share it (i.e., the health system) in one or more dimensions. Together, demographic and psychosocial factors accounted for ~18 percent of the observed variability in system trust. Future research should consider additional predictors of system trust such as knowledge, attitudes, and beliefs to inform policies and practices for health data sharing. © Health Research and Educational Trust.

  17. Trust

    OpenAIRE

    Fojtů, Dominik

    2015-01-01

    This rigorous thesis is focused on a status of trust in an application practise in a Czech legislation with a context of historical aspects of institutes similar to trusts as well as actual legislation. The thesis includes also analyses of more difficult provisions concerning the trust, including economic impacts representing accounting and tax consequences. Also comparison with established modifications trusts in Europe and their possible utilization of the Czech point of view of the settlor...

  18. 78 FR 19542 - Neuberger Berman ETF Trust and Neuberger Berman Management LLC; Notice of Application

    Science.gov (United States)

    2013-04-01

    ...] Neuberger Berman ETF Trust and Neuberger Berman Management LLC; Notice of Application March 25, 2013. AGENCY... ETF Trust (the ``Trust'') and Neuberger Berman Management LLC (``NBM'' or [[Page 19543

  19. Trust management for e-transactions

    Indian Academy of Sciences (India)

    R. Narasimhan (Krishtel eMaging) 1461 1996 Oct 15 13:05:22

    medium for disseminating information, doing commerce and business. ..... intensity of effect on individual's decision making is subjective. In next section .... that takes into account all the factors in trust formation, enhancement and enforcement.

  20. An Appraisal Of The Operation And Management Of Unit Trust ...

    African Journals Online (AJOL)

    An Appraisal Of The Operation And Management Of Unit Trust Schemes In Nigeria. ... Open Access DOWNLOAD FULL TEXT ... instead of being invested in shares or in money market instruments as a result of widespread financial illiteracy.

  1. Trust Management - Building Trust for International Cross Disciplinary Collaboration on Climate Change

    Science.gov (United States)

    Oakley, K. V.; Gurney, R. J.

    2014-12-01

    Successful communication and collaboration entails mutual understanding, and transfer, of information. The risk of misunderstanding and/or miscommunication between collaborating groups is tackled in different ways around the globe; some are well documented whereas others may be unknown outside particular groups, whether defined geographically or by specialism. For example; in some countries legally binding contracts define the terms of collaboration. Some regions place greater emphasis on developing trust relationships, and sometimes an official agreement is implied, such as many electronic data transfers on the web. International collaboration on climate change increasingly involves electronic data exchange (e.g. open access publications, shared documents, data repositories etc.) and with this increased reliance on electronic data a need has arisen for scientists to collaborate both internationally and cross-disciplinarily particularly with information technology and data management specialists. Trust of data and metadata on the internet (e.g. privacy, legitimacy etc.) varies, possibly due to a lack of internationally agreed standards for data governance and management, leaving many national, regional and institutional practices tailored to the needs of that group only. It is proposed that building trust relationships between cross-disciplinary and international groups could help facilitate further communication, understanding and benefits from the relationship, while still maintaining independence as separate groups. Complex international cross-disciplinary group relationship dynamics are not easily mapped and producing a set of trust building rules that can be applied to any current and future collaboration with equal validity may be unfeasible. An alternative to such a set of rules may be found in a Trust Manager, whose role is to improve mutually beneficial knowledge exchange between groups, build trust and increase future collaborative potential. This

  2. SMEs: Trust and judicial system

    Directory of Open Access Journals (Sweden)

    Marilene Lorizio

    2016-06-01

    Full Text Available Italian SMEs share capabilities and routines that permit them to reach high level of competition. But in a global system that is affected by structural deficiencies and negative performance of judicial system, it is very hard to maintain high performances. In this work, starting from the resilience capacity of a group of SMEs of surviving to the crisis, we try to analyse the quality of the expectations of a sample of resilient firms. Our study leads to the hypothesis that the economic crisis is in line with a crisis of confidence in the judicial system. This is all the more serious when considering that this distrust is rooted in those firms located in Southern Italy, where the inefficiency of the judicial system is particularly pronounced.

  3. Do Reputation Systems Undermine Trust? Divergent Effects of Enforcement Type on Generalized Trust and Trustworthiness.

    Science.gov (United States)

    Kuwabara, Ko

    2015-03-01

    Research shows that enforcing cooperation using contracts or tangible sanctions can backfire, undermining people's intrinsic motivation to cooperate: when the enforcement is removed, people are less trusting or trustworthy than when there is no enforcement to begin with. The author examines whether reputation systems have similar consequences for generalized trust and trustworthiness. Using a web-based experiment simulating online market transactions (studies 1 and 2), he shows that reputation systems can reinforce generalized trust and trustworthiness, unlike contractual enforcement or relational enforcement based on repeated interactions. In a survey experiment (study 3), he finds that recalling their eBay feedback scores made participants more trusting and trustworthy. These results are predicated on the diffuse nature of reputational enforcement to reinforce perceptions of trust and trustworthiness. These results have implications for understanding how different forms of governance affect generalized trust and trustworthiness.

  4. Trustsim - A Simulator for Trust Relationships in Grid Systems

    DEFF Research Database (Denmark)

    2006-01-01

    This report describes the use of Trustsim for simulation of trust- and reputation-based phenomena in small or large scale distributed systems. The trust mechanisms which can be simulated are incremental, in the sense that good behaviour is rewarded by a higher degree of trust and bad behaviour...

  5. Agent Based Trust Management Model Based on Weight Value Model for Online Auctions

    OpenAIRE

    Sathiyamoorthy, E.; Iyenger, N. Ch. Sriman Narayana; Ramachandran, V.

    2010-01-01

    This paper is aimed at the stipulations which arise in the traditional online auctions as a result of various anomalies in the reputation and trust calculation mechanism. We try to improve the scalability andefficiency of the online auctions by providing efficient trust management methodology considering several factors into consideration. A comparison between the performance of the auctions system with and without the agent methodology is done with good results.

  6. Trust matters: A narrative literature review of the role of trust in health care systems in sub-Saharan Africa.

    Science.gov (United States)

    Østergaard, Lise Rosendal

    2015-10-01

    This article makes a contribution to the debate about health service utilisation and the role of trust in fostering demand for health services in sub-Saharan Africa. It is framed as a narrative literature review based on a thematic analysis of nine empirical, qualitative studies. For the purposes of this article trust is defined as a voluntary course of action, which involves the optimistic expectation that the trustee will do no harm to the trustor and is increasingly perceived as an important influence on health system functioning. The article looks at trust issues in interpersonal, intergroup and institutional situations. The findings of the review point to four elements that are important for trust to develop in health sector relationships: the sensitive use of discretionary power by health workers, perceived empathy by patients of the health workers, the quality of medical care and workplace collegiality. When trust works in health sector encounters, it reduces the social complexity and inherent uneven distribution of power between clients and providers. The article concludes that understanding and supporting trust processes between patients and providers, as well as between co-workers and managers, will improve health sector collaboration and stimulate demand for health care services.

  7. Security management based on trust determination in cognitive radio networks

    Science.gov (United States)

    Li, Jianwu; Feng, Zebing; Wei, Zhiqing; Feng, Zhiyong; Zhang, Ping

    2014-12-01

    Security has played a major role in cognitive radio networks. Numerous researches have mainly focused on attacking detection based on source localization and detection probability. However, few of them took the penalty of attackers into consideration and neglected how to implement effective punitive measures against attackers. To address this issue, this article proposes a novel penalty mechanism based on cognitive trust value. The main feature of this mechanism has been realized by six functions: authentication, interactive, configuration, trust value collection, storage and update, and punishment. Data fusion center (FC) and cluster heads (CHs) have been put forward as a hierarchical architecture to manage trust value of cognitive users. Misbehaving users would be punished by FC by declining their trust value; thus, guaranteeing network security via distinguishing attack users is of great necessity. Simulation results verify the rationality and effectiveness of our proposed mechanism.

  8. Trust, but verify: social media models for disaster management.

    Science.gov (United States)

    Mehta, Amisha M; Bruns, Axel; Newton, Judith

    2017-07-01

    A lack of trust in the information exchanged via social media may significantly hinder decisionmaking by community members and emergency services during disasters. The need for timely information at such times, though, challenges traditional ways of establishing trust. This paper, building on a multi-year research project that combined social media data analysis and participant observation within an emergency management organisation and in-depth engagement with stakeholders across the sector, pinpoints and examines assumptions governing trust and trusting relationships in social media disaster management. It assesses three models for using social media in disaster management-information gathering, quasi-journalistic verification, and crowdsourcing-in relation to the guardianship of trust to highlight the verification process for content and source and to identify the role of power and responsibilities. The conclusions contain important implications for emergency management organisations seeking to enhance their mechanisms for incorporating user-generated information from social media sources in their disaster response efforts. © 2017 The Author(s). Disasters © Overseas Development Institute, 2017.

  9. Exploring a Dynamic Model of Trust Management

    Science.gov (United States)

    2014-06-01

    organisational justice and affective trust in a sample of employees working in Turkey and Kuwait. International Journal of Research in Organisational ...42.7% of males and 56.3% of females (missing value: 0.9%) whose age ranged from 18 to 48 years old (M = 20.77, SD = 3.47). See Table 1 for more...details. Australia. A total of 72 participants, comprised of 90.3% males and 9.7% females whose age ranged from 20 to 29 years old were recruited (M

  10. Trust makers, breakers and brokers: building trust in the Australian food system.

    Science.gov (United States)

    Wilson, Annabelle; Coveney, John; Henderson, Julie; Meyer, Samantha; Calnan, Michael; Caraher, Martin; Webb, Trevor; Elliott, Anthony; Ward, Paul

    2013-03-15

    The importance of consumer trust in the food supply has previously been identified, and dimensions of consumer trust in food-who they trust and the type of trust that they exhibit-has been explored. However, there is a lack of research about the mechanisms through which consumer trust in the food supply is developed, maintained, broken and repaired. This study seeks to address this gap by exploring if, and how, consumer trust in the food supply is considered by the media, food industry and governments when responding to food scares. The aim of the research is to develop models of trust building that can be implemented following food scares. Semi-structured interviews will be undertaken with media, public relations officials and policy makers in Australia, New Zealand and the United Kingdom. Participants will be recruited through purposive sampling and will be asked to discuss a hypothetical case study outlining a food incident, and any experiences of specific food scares. Models of trust development, maintenance and repair will be developed from interview data. Comment on these models will be sought from experts in food-related organizations through a Delphi study, where participants will be asked to consider the usefulness of the models. Participants' comments will be used to revise the models until consensus is reached on the suitability and usability of the models. This study will contribute to the literature about systems-based trust, and explore trust as a social and regulatory process. The protocol and results will be of interest and use to the food industry, food regulators, consumer advocate groups, media seeking to report food-related issues and policy makers concerned with public health and consumer health and well-being. This research represents an important contribution to the translation of the theoretical conceptualizations of trust into practical use in the context of food.

  11. 78 FR 54298 - Horizons ETFs Management (USA) LLC and Horizons ETF Trust; Notice of Application

    Science.gov (United States)

    2013-09-03

    ... ETFs Management (USA) LLC and Horizons ETF Trust; Notice of Application August 27, 2013. AGENCY... Management (USA) LLC (``Horizons'') and Horizons ETF Trust (the ``Trust''). Summary of Application... of the Trust will be the Horizons Active Global Dividend ETF (the ``Initial Fund''), which will seek...

  12. Analyzing Trust Perceptions in System Implementations

    DEFF Research Database (Denmark)

    Schlichter, Bjarne Rerup; Rose, Jeremy

    2009-01-01

    ' perceptions of trust relations influence future actions, and in this way have both negative and positive consequences. We also conclude that Giddens' theories of trust provide a promising insight into the dynamic aspects of trust relations in implementation projects, which go further than trust theories...... a framework based on Giddens´ theory of modernity. The framework theorizes dynamic elements of the evolution of trust, not previously investigated in this context. The data collection involves 4 actors interviewed twice in 2006 and 2007; and the data analysis strategy is content analysis using Nvivo software...

  13. Information pricing based on trusted system

    Science.gov (United States)

    Liu, Zehua; Zhang, Nan; Han, Hongfeng

    2018-05-01

    Personal information has become a valuable commodity in today's society. So our goal aims to develop a price point and a pricing system to be realistic. First of all, we improve the existing BLP system to prevent cascading incidents, design a 7-layer model. Through the cost of encryption in each layer, we develop PI price points. Besides, we use association rules mining algorithms in data mining algorithms to calculate the importance of information in order to optimize informational hierarchies of different attribute types when located within a multi-level trusted system. Finally, we use normal distribution model to predict encryption level distribution for users in different classes and then calculate information prices through a linear programming model with the help of encryption level distribution above.

  14. Relationship between islamic human resources management (IHRM practices and trust: An empirical study

    Directory of Open Access Journals (Sweden)

    Nik Mutasim Nik Ab. Rahman

    2013-09-01

    Full Text Available Purpose: The purpose of this study is to explore and examines the theoretical frameworks of Islamic human resource management practices and trust in organization. Additionally, to investigate the extent to which Islamic HRM practices inspire and revival employees trust in organization.Design/methodology/approach: This study comprised sample of 236 Islamic Bank employees in Bangladesh. A cross-sectional research design was used to examine the relationship between Islamic Human Resource Management practices and trust. Data were gathered based on personal administered questionnaire.Findings and Originality/value: This study results show that knowledge, understanding and practices of Islamic principles, recruitment and selection, training and development, and reward system significantly related to the trust. But performance appraisal are found have insignificant relationship.Research limitations/implications: The data for this study are collected by self-administered questionnaire, a method with well-known shortcomings. Second, this study concentrated on the Islamic bank employees in Bangladesh.Practical implications: An important implication of this research is that the interesting findings give some insight to the management of Islamic bank to focus on improving Islamic Human Resource Management practices, in their all kind of management, as that could improve their trust in the bank.Originality/value: The findings are original and unique and are based on the literature from different researches. The results are based on a sample of Islamic Bank employees in Bangladesh. The research findings are useful to academics and management of Islamic bank all over the world.

  15. Trust and cooperation relations in environmental management of Lebanon

    NARCIS (Netherlands)

    Abbas, Nivine; van der Molen, I.; Nader, M.R.; Lovett, Jonathan Cranidge

    2014-01-01

    This paper investigates trust and cooperation in the context of environmental management in Lebanon. Literature already indicated increasing environmental problems in this area that suffered from repeated episodes of armed conflict. The Lebanese government has been faced by many difficulties to

  16. Trust management support for context-aware service platforms

    NARCIS (Netherlands)

    Neisse, R.; Wegdam, M.; van Sinderen, Marten J.; Aldini, A.; Bogliolo, A.

    High quality context information retrieved from trustworthy context providers allows a more reliable context-aware service adaption but also implies a higher risk for the service users in case of privacy violations. In this chapter we present a trust management model that support users and providers

  17. Identity Management and Trust Services: Foundations for Cloud Computing

    Science.gov (United States)

    Suess, Jack; Morooney, Kevin

    2009-01-01

    Increasingly, IT organizations will move from providing IT services locally to becoming an integrator of IT services--some provided locally and others provided outside the institution. As a result, institutions must immediately begin to plan for shared services and must understand the essential role that identity management and trust services play…

  18. Core TuLiP - Logic Programming for Trust Management

    NARCIS (Netherlands)

    Czenko, M.R.; Etalle, Sandro; Dahl, V.; Niemelä, I.

    2007-01-01

    We propose CoreTuLiP - the core of a trust management language based on Logic Programming. CoreTuLiP is based on a subset of moded logic programming, but enjoys the features of TM languages such as RT; in particular clauses are issued by different authorities and stored in a distributed manner. We

  19. Trust Account Fraud And Effective Information Security Management

    Directory of Open Access Journals (Sweden)

    Sameera Mubarak

    2010-09-01

    Full Text Available The integrity of lawyers trust accounts has come under scrutiny in the last few years. There are strong possibilities of information technology security breaches happening within the firms, either accidental or deliberate. The damage caused by these security breaches could be extreme. For example, a trust account fund in an Australian law firm was misused in a security breach in which Telstra charged. A$50,000 for phone usage, mainly for ISD calls to Hong Kong.Our study involved interviewing principles of ten law companies to find out solicitors attitudes to computer security and the possibility of breaches of their trust accounts. We simultaneously carried out a survey to see if the trends identified in our case-studies could be backed up with broader quantitative data. We have also conducted in-depth interviews of 5 trust account regulators from the Law society of South Australia to know their view points on security threats on trust accounts. An overall finding highlights that law firms were not current with technology to combat computer crime, and inadequate access control was a major concern in safeguarding account data. Our conclusions revealed the urgent need for law firms to adopt security controls, implement information security policies and procedures and obtain cooperation from management to communicate these policies to staff.

  20. Building a framework to manage trust in automation

    Science.gov (United States)

    Metcalfe, J. S.; Marathe, A. R.; Haynes, B.; Paul, V. J.; Gremillion, G. M.; Drnec, K.; Atwater, C.; Estepp, J. R.; Lukos, J. R.; Carter, E. C.; Nothwang, W. D.

    2017-05-01

    All automations must, at some point in their lifecycle, interface with one or more humans. Whether operators, end-users, or bystanders, human responses can determine the perceived utility and acceptance of an automation. It has been long believed that human trust is a primary determinant of human-automation interactions and further presumed that calibrating trust can lead to appropriate choices regarding automation use. However, attempts to improve joint system performance by calibrating trust have not yet provided a generalizable solution. To address this, we identified several factors limiting the direct integration of trust, or metrics thereof, into an active mitigation strategy. The present paper outlines our approach to addressing this important issue, its conceptual underpinnings, and practical challenges encountered in execution. Among the most critical outcomes has been a shift in focus from trust to basic interaction behaviors and their antecedent decisions. This change in focus inspired the development of a testbed and paradigm that was deployed in two experiments of human interactions with driving automation that were executed in an immersive, full-motion simulation environment. Moreover, by integrating a behavior and physiology-based predictor within a novel consequence-based control system, we demonstrated that it is possible to anticipate particular interaction behaviors and influence humans towards more optimal choices about automation use in real time. Importantly, this research provides a fertile foundation for the development and integration of advanced, wearable technologies for sensing and inferring critical state variables for better integration of human elements into otherwise fully autonomous systems.

  1. From risk perception to social trust: an outline of recent contributions of psychology to risk management

    International Nuclear Information System (INIS)

    Earle, T.C.

    2002-01-01

    As with many developing areas of inquiry, the psychology of risk management has progressed from an initial focus on proximal effects to an exploration of more stable distal factors, from risk perception to social trust. Risk perception is concerned with disruptions in the relations between individuals and their physical environments, specifically with the varying negative effects experienced by individuals. These effects have been found to be socially constructed, with systematic variations among groups (e.g., lay-person and experts; among various groups of experts; men and women; those with economic interests and those without; etc.). The focus of risk perception research has shifted over time: from the likelihood of specific health effects; to the likelihood of a wide range of effects, including emotional effects, varying with context; and, finally, to general emotional effects, positive and negative affect. This shift can be seen to be from cognitive/rational to affective; from expert/technical to public. The second stage of inquiry moved away from the surface effects of risk perception to the study of confidence. Confidence is concerned with constancy, the underlying, not directly experienced order of the relations between individuals and their social/physical environments. Disruptions in confidence lead to concern with risk. Initially, confidence was said to be based on past performance and systems of control, objectively defined; the appropriate response to disruptions was risk communication, the provision of correct information. Failures in risk communication indicated that confidence must be based on subjective judgements of past performance and systems of control. The third, and present, stage of inquiry moved back from confidence, and from the physical environment, to the study of social trust. Social trust is concerned with the relations between individuals within social groups. Individuals tend to trust others whom they judge to be similar to themselves

  2. Trust

    OpenAIRE

    Bentham, R

    2016-01-01

    Rachel Bentham's 'Let All Tongues Flower' won her many new admirers for its 'openness to form' and 'strong yet subtle feminine sensibility'. It was also a Top 3 selling book on Amazon Kindle Women's Poetry. Here, in her new book 'Trust', she shows she is equally at home with the increasingly popular haiku form - using both classic 5-7-5 and free form haiku, she gives us more treasured and crafted glimpses into her 'unhindered and mostly joyful life'.

  3. Trust

    OpenAIRE

    Carro, Salvatore

    2006-01-01

    Il lavoro eseguito ha per oggetto il trust, istituto, come noto, estraneo alla nostra cultura giuridica, tipico dei sistemi di common law, riconosciuto e regolato dalla Convenzione dell’ Aja, firmata il 1°luglio 1985, ratificata in Italia con L. 16 ottobre 1989, n. 364, ed entrata in vigore il 1° giugno 1992. La ricerca svolta ha, in primo luogo, esaminato la fattispecie, con un approccio comparatistico, analizzando, nella prima parte, il contenuto e la controversa natura giuridica della c...

  4. The Double-System Architecture for Trusted OS

    Science.gov (United States)

    Zhao, Yong; Li, Yu; Zhan, Jing

    With the development of computer science and technology, current secure operating systems failed to respond to many new security challenges. Trusted operating system (TOS) is proposed to try to solve these problems. However, there are no mature, unified architectures for the TOS yet, since most of them cannot make clear of the relationship between security mechanism and the trusted mechanism. Therefore, this paper proposes a double-system architecture (DSA) for the TOS to solve the problem. The DSA is composed of the Trusted System (TS) and the Security System (SS). We constructed the TS by establishing a trusted environment and realized related SS. Furthermore, we proposed the Trusted Information Channel (TIC) to protect the information flow between TS and SS. In a word, the double system architecture we proposed can provide reliable protection for the OS through the SS with the supports provided by the TS.

  5. The Swift Trust Partnership: A Project Management Exercise Investigating the Effects of Trust and Distrust in Outsourcing Relationships

    Science.gov (United States)

    Adler, Terry R.

    2005-01-01

    The Swift Trust exercise provides instructors with the opportunity to discuss the issues of managing trust and distrust perceptions in a team-based design. Lewicki, McAllister, and Bies's (1998) framework is used to allow students to experience the difficulties of deriving a common set of contract requirements based on team dynamics and…

  6. Developing a trust model for assisting management during change

    Directory of Open Access Journals (Sweden)

    Nico Martins

    2000-06-01

    Full Text Available This study investigates the relation of the "Big Five" personality dimensions and managerial practices to the dimension of trust relationships between managers and employees. The "Big Five" dimensions are conscientiousness, agreeableness, emotional stability, resourcefulness and extraversion. Managerial practices are credibility, team management, information sharing and work support. Results indicate that managerial practices have an influence on the trust relationships between managers and employees. For the "Big Five" personality dimensions, a weaker relationship with the dimension of trust was obtained. Although there appears to be a weaker relationship between the "Big Five" and the dimension of trust relationships, the relatively good fit of the model indicates that an overall implication of the model is that both managerial practices and the "Big Five" personality aspects of the manager might influence his/her subordinates indirectly. These findings have numerous implications for the relationships between managers and employees, especially in the selection, recruitment and appointment of managers and the role of managers during transformation. Opsomming Die studie ondersoek die verhouding tussen die Groot Vyf ("Big Five" persoonlikheidsdimensies en bestuurspraktyke en die dimensie van vertroue tussen bestuur en werknemers. Die Groot Vyf dimensies is konsensieusheid, eenstemmigheid, emosionele stabiliteit, vernuftigheid en ekstroversie. Die bestuurspraktyke is kredietwaardigheid, spanbestuur, die deel van inligting en werksondersteuning. Die resultate dui aan dat die bestuurspraktyke 'n invloed het op die verhouding tussen bestuur en werknemers. Wat die Groot Vyf dimensies aanbetref, is n swakker verhouding met die dimensie van vertroue bevind. Alhoewel dit skyn as of daar n swakker verhouding tussen die Groot Vyf en die dimensie van vertroue is, toon die relatiewe goeie passing van die model dat beide die bestuurspraktyke en die Groot Vyf

  7. Investment management for nuclear decommissioning trusts

    International Nuclear Information System (INIS)

    Stimes, P.C.; Flaherty, R.T.

    1990-01-01

    According to Nuclear Regulatory Commission estimates, and assuming a 4 percent annual inflation rate, minimum decommissioning requirements for a single reactor could total almost $350 million after 30 years. Consequently, reducing customer contributions to decommissioning funds is a potentially rewarding activity. In fact, improving the after-tax return earned on an NDT fund by as little as one percentage point can reduce customer contributions to the fund by 15% over its life. Unfortunately, many electric utilities are headed in the wrong direction and are unlikely to achieve satisfactory results. The main problem is the prevalence of the conventional wisdom, most of which has been appropriated from the area of pension fund management. This is an area which is familiar to most utility managements, but which has only superficial similarity to the issue of NDT investing. The differences are pronounced: NDTs, unlike pensions, are fully taxable at corporate income tax rates. In addition, NDT managers should be concerned with protecting the inflation-adjusted or real value of fund investments at a single, future decommissioning date. Pension managers, on the other hand, may be concerned with satisfying nominal contractual obligations spread over an extended future time horizon. In view of the large stakes involved in the management of NDTs, the authors summarize five key tenets of the conventional wisdom in this area and demonstrate where they feel they are in error

  8. System reliability, performance and trust in adaptable automation.

    Science.gov (United States)

    Chavaillaz, Alain; Wastell, David; Sauer, Jürgen

    2016-01-01

    The present study examined the effects of reduced system reliability on operator performance and automation management in an adaptable automation environment. 39 operators were randomly assigned to one of three experimental groups: low (60%), medium (80%), and high (100%) reliability of automation support. The support system provided five incremental levels of automation which operators could freely select according to their needs. After 3 h of training on a simulated process control task (AutoCAMS) in which the automation worked infallibly, operator performance and automation management were measured during a 2.5-h testing session. Trust and workload were also assessed through questionnaires. Results showed that although reduced system reliability resulted in lower levels of trust towards automation, there were no corresponding differences in the operators' reliance on automation. While operators showed overall a noteworthy ability to cope with automation failure, there were, however, decrements in diagnostic speed and prospective memory with lower reliability. Copyright © 2015. Published by Elsevier Ltd.

  9. Facing the Incompleteness of Epistemic Trust: Managing Dependence in Scientific Practice

    DEFF Research Database (Denmark)

    Wagenknecht, Susann

    2014-01-01

    Based on an empirical study of a research team in natural science, the author argues that collaborating scientists do not trust each other completely. Due to the inherent incompleteness of trust, epistemic trust among scientists is not sufficient to manage epistemic dependency in research teams....... To mitigate the limitations of epistemic trust, scientists resort to specific strategies of indirect assessment such as dialoguing practices and the probing of explanatory responsiveness. Furthermore, they rely upon impersonal trust and deploy practices of hierarchical authorship....

  10. Methods for reliability evaluation of trust and reputation systems

    Science.gov (United States)

    Janiszewski, Marek B.

    2016-09-01

    Trust and reputation systems are a systematic approach to build security on the basis of observations of node's behaviour. Exchange of node's opinions about other nodes is very useful to indicate nodes which act selfishly or maliciously. The idea behind trust and reputation systems gets significance because of the fact that conventional security measures (based on cryptography) are often not sufficient. Trust and reputation systems can be used in various types of networks such as WSN, MANET, P2P and also in e-commerce applications. Trust and reputation systems give not only benefits but also could be a thread itself. Many attacks aim at trust and reputation systems exist, but such attacks still have not gain enough attention of research teams. Moreover, joint effects of many of known attacks have been determined as a very interesting field of research. Lack of an acknowledged methodology of evaluation of trust and reputation systems is a serious problem. This paper aims at presenting various approaches of evaluation such systems. This work also contains a description of generalization of many trust and reputation systems which can be used to evaluate reliability of such systems in the context of preventing various attacks.

  11. Enhancing Trust Management for Wireless Intrusion Detection via Traffic Sampling in the Era of Big Data

    DEFF Research Database (Denmark)

    Meng, Weizhi; Li, Wenjuan; Su, Chunhua

    2017-01-01

    many kinds of information among sensors, whereas such network is vulnerable to a wide range of attacks, especially insider attacks, due to its natural environment and inherent unreliable transmission. To safeguard its security, intrusion detection systems (IDSs) are widely adopted in a WSN to defend...... against insider attacks through implementing proper trustbased mechanisms. However, in the era of big data, sensors may generate excessive information and data, which could degrade the effectiveness of trust computation. In this paper, we focus on this challenge and propose a way of combining Bayesian......-based trust management with traffic sampling for wireless intrusion detection under a hierarchical structure. In the evaluation, we investigate the performance of our approach in both a simulated and a real network environment. Experimental results demonstrate that packet-based trust management would become...

  12. Handbook for the Computer Security Certification of Trusted Systems

    National Research Council Canada - National Science Library

    Weissman, Clark

    1995-01-01

    Penetration testing is required for National Computer Security Center (NCSC) security evaluations of systems and products for the B2, B3, and A1 class ratings of the Trusted Computer System Evaluation Criteria (TCSEC...

  13. 77 FR 65025 - Trust for Professional Managers and Collins Capital Investments, LLC; Notice of Application

    Science.gov (United States)

    2012-10-24

    ... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 30235; 812-14012] Trust for Professional Managers and Collins Capital Investments, LLC; Notice of Application October 18, 2012. AGENCY...: Trust for Professional Managers (the ``Trust'') and Collins Capital Investments, LLC (the ``Advisor...

  14. Trust Management and Accountability for Internet Security

    Science.gov (United States)

    Liu, Wayne W.

    2011-01-01

    Adversarial yet interacting interdependent relationships in information sharing and service provisioning have been a pressing issue of the Internet. Such relationships exist among autonomous software agents, in networking system peers, as well as between "service users and providers." Traditional "ad hoc" security approaches effective in…

  15. TrustRank: a Cold-Start tolerant recommender system

    Science.gov (United States)

    Zou, Haitao; Gong, Zhiguo; Zhang, Nan; Zhao, Wei; Guo, Jingzhi

    2015-02-01

    The explosive growth of the World Wide Web leads to the fast advancing development of e-commerce techniques. Recommender systems, which use personalised information filtering techniques to generate a set of items suitable to a given user, have received considerable attention. User- and item-based algorithms are two popular techniques for the design of recommender systems. These two algorithms are known to have Cold-Start problems, i.e., they are unable to effectively handle Cold-Start users who have an extremely limited number of purchase records. In this paper, we develop TrustRank, a novel recommender system which handles the Cold-Start problem by leveraging the user-trust networks which are commonly available for e-commerce applications. A user-trust network is formed by friendships or trust relationships that users specify among them. While it is straightforward to conjecture that a user-trust network is helpful for improving the accuracy of recommendations, a key challenge for using user-trust network to facilitate Cold-Start users is that these users also tend to have a very limited number of trust relationships. To address this challenge, we propose a pre-processing propagation of the Cold-Start users' trust network. In particular, by applying the personalised PageRank algorithm, we expand the friends of a given user to include others with similar purchase records to his/her original friends. To make this propagation algorithm scalable to a large amount of users, as required by real-world recommender systems, we devise an iterative computation algorithm of the original personalised TrustRank which can incrementally compute trust vectors for Cold-Start users. We conduct extensive experiments to demonstrate the consistently improvement provided by our proposed algorithm over the existing recommender algorithms on the accuracy of recommendations for Cold-Start users.

  16. Distributed Trust Management and Rogue AV Software

    Science.gov (United States)

    2010-06-10

    Integrate with QTM – Particularly important in federated systems (e.g., dynamically composable SOAs) • Investigate the use of reactive mechanisms – Global...of demonstrators surfaced on Capitol Hill in opposition to the Democrats’ health care legislation. MAGAZINE PREVIEW Making Health Care Better By...sale will be sent on saving green forests in Amazonia . Have more questions? You can contact us easy via Online Supoort. Green AV an award-winning

  17. Trust and responsible eco managing. The case of state controlled repacking

    DEFF Research Database (Denmark)

    Rittenhofer, Iris

    systems. It takes a postmodern stance and discusses the case from the perspective of trust, responsible management, cosmopolitanization, the ‘transparent society’ and ‘green growth’ strategies. In the concluding section, the implications for the further development of a concept ‘responsible management......The paper is concerned with a case of local management of eco certification. With outset in a case study, the paper explores the relation of eco certification to economy, society and culture. The paper emphasizes the multidimensional quality of local eco management of global organic agrifood......’ are discussed and suggestions for future research are made. The paper draws on multidisciplinary research from management and business studies, intercultural and cross-cultural communication, trust research, cultural studies, philosophy and discourse studies....

  18. Effect of Board Management and Governmental Model on Zakat Payers’ Trust on Zakat Institutions

    OpenAIRE

    Erlane K Ghani; Asmah Abdul Aziz; Sakinah Mohamed Tajularifin; Nahla Samargandi

    2018-01-01

    Trust among zakat payers is important as it contributes to the success of zakat institutions. Zakat payers, are reluctant to pay zakat through zakat institutions due to lack of trust. This study examines whether perceived board management and governmental model may influence zakat payers’ trust on zakat institutions. Using questionnaire survey on 184 zakat payers, this study shows that perceived board management influences zakat payers’ trust on zakat institution...

  19. Towards Trust-based Cognitive Networks: A Survey of Trust Management for Mobile Ad Hoc Networks

    Science.gov (United States)

    2009-06-01

    of trust. First, social trust refers to properties derived from social relationships . Examples of social networks are strong social ... relationships such as colleagues or relatives or loose social relationships such as school alumni or friends with common interests [44]. Social trust may...also use social relationships in evaluating the trust metric among group members by employing the concept of social networks. Yu et al. [44] define

  20. An exploratory study of the role of trust in medication management within mental health services.

    Science.gov (United States)

    Maidment, Ian D; Brown, Patrick; Calnan, Michael

    2011-08-01

    To develop understandings of the nature and influence of trust in the safe management of medication within mental health services. Mental health services in the UK. Qualitative methods were applied through focus groups across three different categories of service user--older adult, adults living in the community and forensic services. An inductive thematic analysis was carried out, using the method of constant comparison derived from grounded theory. Participants' views on the key factors influencing trust and the role of trust in safe medication management. The salient factors impacting trust were: the therapeutic relationship; uncertainty and vulnerability; and social control. Users of mental health services may be particularly vulnerable to adverse events and these can damage trust. Safe management of medication is facilitated by trust. However, this trust may be difficult to develop and maintain, exposing service users to adverse events and worsening adherence. Practice and policy should be oriented towards developing trust.

  1. Continuous Calibration of Trust in Automated Systems

    Science.gov (United States)

    2014-01-01

    Airlines Flight 214 in San Francisco. Therefore, understanding how users form, lose, and recover trust in imperfect automation is of critical...1997). Misuse and disuse can have fatal consequences; for example, inappropriate automation reliance has been implicated in the recent crash of Asiana

  2. Achieving Optimal Privacy in Trust-Aware Social Recommender Systems

    Science.gov (United States)

    Dokoohaki, Nima; Kaleli, Cihan; Polat, Huseyin; Matskin, Mihhail

    Collaborative filtering (CF) recommenders are subject to numerous shortcomings such as centralized processing, vulnerability to shilling attacks, and most important of all privacy. To overcome these obstacles, researchers proposed for utilization of interpersonal trust between users, to alleviate many of these crucial shortcomings. Till now, attention has been mainly paid to strong points about trust-aware recommenders such as alleviating profile sparsity or calculation cost efficiency, while least attention has been paid on investigating the notion of privacy surrounding the disclosure of individual ratings and most importantly protection of trust computation across social networks forming the backbone of these systems. To contribute to addressing problem of privacy in trust-aware recommenders, within this paper, first we introduce a framework for enabling privacy-preserving trust-aware recommendation generation. While trust mechanism aims at elevating recommender's accuracy, to preserve privacy, accuracy of the system needs to be decreased. Since within this context, privacy and accuracy are conflicting goals we show that a Pareto set can be found as an optimal setting for both privacy-preserving and trust-enabling mechanisms. We show that this Pareto set, when used as the configuration for measuring the accuracy of base collaborative filtering engine, yields an optimized tradeoff between conflicting goals of privacy and accuracy. We prove this concept along with applicability of our framework by experimenting with accuracy and privacy factors, and we show through experiment how such optimal set can be inferred.

  3. Public trust in the healthcare system in a developing country.

    Science.gov (United States)

    Peters, Dexnell; Youssef, Farid F

    2016-04-01

    Broadly defined, trust in the healthcare system is concerned with how the public perceives the system and the actors therein as it pertains to their ability to both deliver services and seek the best interests of their clientele. Trust is important because it impacts upon a range of health behaviors including compliance and ultimately affects the ability of the healthcare system to meet its goals. While several studies exist on public trust within the developed world, few studies have explored this issue in developing countries. This paper therefore assesses public trust in the healthcare system of a developing small island nation, Trinidad and Tobago. A cross-sectional survey of adults was conducted using a questionnaire that has been successfully used across Europe. We report that trust levels in the healthcare system in Trinidad and Tobago are relatively low with less than 50% of persons indicating fair trust in the healthcare system. In addition, individual health professionals also did not score highly with lowest scores found for nurses and complementary therapists. Results on four out of five dimensions of trust also demonstrated scores significantly lower than those reported in more developed nations. Open-ended comments supported these findings with the majority of persons indicating a lack of confidence in the healthcare system. These results may reflect the reality in the wider developing world, and we suggest that bolstering trust is a needed area of focus in the delivery of healthcare services throughout the nation. Copyright © 2014 John Wiley & Sons, Ltd. Copyright © 2014 John Wiley & Sons, Ltd.

  4. A Model of Trust for Developing Trustworthy Systems From Untrustworthy Actors

    National Research Council Canada - National Science Library

    Ray, Indrajit; Ray, Indrakshi

    2007-01-01

    The objective of this effort is to develop a new model of trust that allowed one to reason about trust relationships in information systems with special emphasis on trust as it related to integrity and availability...

  5. 77 FR 74884 - Cambria Investment Management, L.P. and Cambria ETF Trust; Notice of Application

    Science.gov (United States)

    2012-12-18

    ... Investment Management, L.P. and Cambria ETF Trust; Notice of Application December 12, 2012. AGENCY... request an order that permits: (a) Actively-managed series of certain open-end management investment... registered management investment companies and unit investment trusts outside of the same group of investment...

  6. Mobile Location-Based Services for Trusted Information in Disaster Management

    Science.gov (United States)

    Ragia, Lemonia; Deriaz, Michel; Seigneur, Jean-Marc

    The goal of the present chapter is to provide location-based services for disaster management. The application involves services related to the safety of the people due to an unexpected event. The current prototype is implemented for a specific issue of disaster management which is road traffic control. The users can ask requests on cell phones or via Internet to the system and get an answer in a display or in textual form. The data are in a central database and every user can input data via virtual tags. The system is based on spatial messages which can be sent from any user to any other in a certain distance. In this way all the users and not a separate source provide the necessary information for a dangerous situation. To avoid any contamination problems we use trust security to check the input to the system and a trust engine model to provide information with a considerable reliability.

  7. 78 FR 48205 - Ranger Alternative Management, L.P. and Ranger Funds Investment Trust; Notice of Application

    Science.gov (United States)

    2013-08-07

    ... Alternative Management, L.P. and Ranger Funds Investment Trust; Notice of Application August 1, 2013. AGENCY... Management, L.P. (``Ranger'') and Ranger Funds Investment Trust (the ``Trust''). Summary of Application... (e) certain registered management investment companies and unit investment trusts outside of the same...

  8. Dependence on Supplier, Supplier Trust and Green Supplier Integration: The Moderating Role of Contract Management Difficulty

    Directory of Open Access Journals (Sweden)

    Xuesong Zhao

    2018-05-01

    Full Text Available This study aims to investigate the impacts of dependence on supplier and supplier trust on green supplier integration, and the moderating role of contract management difficulty. In this study, we develop a dependence-trust-integration model based on resource dependence theory, social capital theory and transaction cost theory. We examine the hypothesized relationships using hierarchical regression analyses based on data collected from 187 Chinese firms. Our findings suggest that dependence on supplier has positive impacts on green supplier integration and supplier trust. Supplier trust partially mediates the relationship between dependence on supplier and green supplier integration. In addition, contract management difficulty negatively moderates the relationship between supplier trust and green supplier integration. This research contributes to the literature by offering empirical evidence concerning the indirect relationship between dependence on supplier and green supplier integration via supplier trust, and the trust-integration link depends on the level of contract management difficulty.

  9. 77 FR 73089 - Cambria Investment Management, L.P. and Cambria ETF Trust; Notice of Application

    Science.gov (United States)

    2012-12-07

    ... Investment Management, L.P. and Cambria ETF Trust; Notice of Application November 30, 2012. AGENCY... (e) certain registered management investment companies and unit investment trusts outside of the same... Jennifer L. Sawin, Branch Chief, at (202) 551-6821 (Division of Investment Management, Office of Investment...

  10. 77 FR 34095 - Federated Investment Management Company and Federated ETF Trust; Notice of Application

    Science.gov (United States)

    2012-06-08

    ... Investment Management Company and Federated ETF Trust; Notice of Application June 1, 2012. AGENCY: Securities... (e) certain registered management investment companies and unit investment trusts outside of the same... Daniele Marchesani, Branch Chief, at (202) 551-6821 (Division of Investment Management, Office of...

  11. 25 CFR 1200.3 - What is the Department's policy on tribal management of trust funds?

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false What is the Department's policy on tribal management of..., DEPARTMENT OF THE INTERIOR AMERICAN INDIAN TRUST FUND MANAGEMENT REFORM ACT General Provisions § 1200.3 What is the Department's policy on tribal management of trust funds? (a) We will give tribes as much...

  12. A Cache Considering Role-Based Access Control and Trust in Privilege Management Infrastructure

    Institute of Scientific and Technical Information of China (English)

    ZHANG Shaomin; WANG Baoyi; ZHOU Lihua

    2006-01-01

    PMI(privilege management infrastructure) is used to perform access control to resource in an E-commerce or E-government system. With the ever-increasing need for secure transaction, the need for systems that offer a wide variety of QoS (quality-of-service) features is also growing. In order to improve the QoS of PMI system, a cache based on RBAC(Role-based Access Control) and trust is proposed. Our system is realized based on Web service. How to design the cache based on RBAC and trust in the access control model is described in detail. The algorithm to query role permission in cache and to add records in cache is dealt with. The policy to update cache is introduced also.

  13. Trust and Reputation Management for Critical Infrastructure Protection

    Science.gov (United States)

    Caldeira, Filipe; Monteiro, Edmundo; Simões, Paulo

    Today's Critical Infrastructures (CI) depend of Information and Communication Technologies (ICT) to deliver their services with the required level of quality and availability. ICT security plays a major role in CI protection and risk prevention for single and also for interconnected CIs were cascading effects might occur because of the interdependencies that exist among different CIs. This paper addresses the problem of ICT security in interconnected CIs. Trust and reputation management using the Policy Based Management paradigm is the proposed solution to be applied at the CI interconnection points for information exchange. The proposed solution is being applied to the Security Mediation Gateway being developed in the European FP7 MICIE project, to allow for information exchange among interconnected CIs.

  14. Evolution of Trust in Economic Systems

    Science.gov (United States)

    Bossomaier, Terry; Harré, Michael; Thompson, James

    When ET in the eponymous Spielberg movie follows a trail of Smarties to meet his new human friends, we find this entirely plausible — that a baby alien will quickly form a bond with human kids and for each to quickly learn to trust the other. This surely reflects the way trust is such a fundamental part of human nature that its absence would be more remarkable than its presence, even where one of the protagonists is a not overly attractive alien species! Another, less plausible, fictional character which has often been employed in economic settings is Homo Economicus. The character played by this economic actor is that of the perfectly informed, perfectly rational, self interested individual trying to maximise their personal utility. This view of the economic actor, particularly as it is used in decision theory, inspired Herbert Simon in his Nobel Prize award speech to criticise models of economic microphenomena [29]: "Thus economists who are zealous in insisting that economic actors maximize turn around and become satisficers when the evaluation of their own theories is concerned. They believe that businessmen maximize, but they know that economic theorists satisfice." However, in the three decades since Simon's speech there has been a large body of evidence accumulating which demonstrates the lack of universality of the assumptions of economic man [6] and has contributed to the advancement of more reasonable models, as described by Daniel Kahneman [14], another Nobel Laureate: "... proposed that an automatic affective valuation — the emotional core of an attitude — is the main determinant of many judgements and behaviours."

  15. Trust makers, breakers and brokers: building trust in the Australian food system

    OpenAIRE

    Wilson, Annabelle; Coveney, John; Henderson, Julie; Meyer, Samantha; Calnan, Michael; Caraher, Martin; Webb, Trevor; Elliott, Anthony; Ward, Paul

    2013-01-01

    Background The importance of consumer trust in the food supply has previously been identified, and dimensions of consumer trust in food?who they trust and the type of trust that they exhibit?has been explored. However, there is a lack of research about the mechanisms through which consumer trust in the food supply is developed, maintained, broken and repaired. This study seeks to address this gap by exploring if, and how, consumer trust in the food supply is considered by the media, food indu...

  16. Chemical Manufacturing and Refining Industry Legitimacy: Reflective Management, Trust, Precrisis Communication to Achieve Community Efficacy.

    Science.gov (United States)

    Heath, Robert L; Lee, Jaesub

    2016-06-01

    Calls for emergency right-to-know in the 1980s, and, in the 1990s, risk management planning, motivated U.S. chemical manufacturing and refining industries to operationalize a three-pronged approach to risk minimization and communication: reflective management to increase legitimacy, operational safety programs to raise trust, and community engagement designed to facilitate citizens' emergency response efficacy. To assess these management, operational, and communication initiatives, communities (often through Local Emergency Planning Committees) monitored the impact of such programs. In 2012, the fourth phase of a quasi-longitudinal study was conducted to assess the effectiveness of operational change and community outreach in one bellwether community. This study focuses on legitimacy, trust, and response efficacy to suggest that an industry can earn legitimacy credits by raising its safety and environmental impact standards, by building trust via that change, and by communicating emergency response messages to near residents to raise their response efficacy. As part of its campaign to demonstrate its concern for community safety through research, planning, and implementation of safe operations and viable emergency response systems, this industry uses a simple narrative of risk/emergency response-shelter-in-place-communicated by a spokes-character: Wally Wise Guy. © 2015 Society for Risk Analysis.

  17. Innovation systems, saving, trust, and economic development in Africa

    NARCIS (Netherlands)

    Pamuk, H.

    2014-01-01

    The five essays in the dissertation explore the interaction between economic development in Africa and three economic concepts from different fields: decentralized agricultural innovation systems, trust and saving practices. A relatively new view to boost agricultural growth is the implementation of

  18. Trust in the justice system: A comparative view across Europe

    NARCIS (Netherlands)

    S.G.J. Van de Walle (Steven)

    2009-01-01

    textabstractThe justice system is not one of the most trusted institutions in the UK. While most citizens consider it fair, they also think it is out of touch in specific cases, and many consider it relatively inefficient. The UK is not alone. Many governments throughout Europe and the wider world

  19. Effect of Board Management and Governmental Model on Zakat Payers’ Trust on Zakat Institutions

    Directory of Open Access Journals (Sweden)

    Erlane K Ghani

    2018-01-01

    Full Text Available Trust among zakat payers is important as it contributes to the success of zakat institutions. Zakat payers, are reluctant to pay zakat through zakat institutions due to lack of trust. This study examines whether perceived board management and governmental model may influence zakat payers’ trust on zakat institutions. Using questionnaire survey on 184 zakat payers, this study shows that perceived board management influences zakat payers’ trust on zakat institutions. By contrast, perceived governmental model does not influence zakat payers’ trust on zakat institutions. These findings imply that zakat institutions should focus on strengthening the efficiency of their institutions to increase the trust level among zakat payers. In doing so, the zakat payers are driven to pay zakat diligently, thereby ensuring the sustainability of zakat institutions particularly in developing countries such as Malaysia.

  20. A Survey on Trust Management for Mobile Ad Hoc Networks

    Science.gov (United States)

    2011-11-01

    expects, trust is dangerous implying the possible betrayal of trust. In his comments on Lagerspetz’s book titled Trust: The Tacit Demand, Lahno [24...AODV Zouridaki et al. (2005 ) [79] (2006) [80] Secure routing Direct observation [79][80] Reputation by secondhand information [80] Packet dropping...areas of signal processing, wireless communications, sensor and mobile ad hoc networks. He is co-editor of the book Wireless Sensor Networks: Signal

  1. Social Trust and Confidence in the Management of Long Lived Radioactive Wastes: Qualitative Data from France

    Energy Technology Data Exchange (ETDEWEB)

    Mays, Claire [Inst. Symlog, Cachan (France); Charron, Sylvie; Brenot, Jean [IRSN-DPHD-SEGR, Fontenay-aux-Roses (France)

    2003-10-01

    Our qualitative study brought confirmation to Petts' finding that trust components may be of variable significance to different populations in different risk contexts. When we asked interviewees simply to talk about LLiRW (long-lived radioactive wastes management), social trust and confidence were frequently addressed (more than any other of our seven study themes). However, the themes' status appears to differ according to study sample. For the Limousine interviewees, these concepts are central and deeply tied into the uncertainty evoked by LLiRWM. Some interviewees explicitly described how social trust in waste managers, and confidence in the RWM system, are challenged by the very long term, and by the unpredictability of health effects from ionizing radiation. Limousine interviewees ask themselves questions about trust and confidence every time they think about the issues of mine and mill tailings in their community. While managers can draw guidance on how to ameliorate their performance on e.g. openness and credibility, residents suggest that there are structural limits to how far social trust can suffice in a RWM system. In such a context, improving system confidence may reside not so much in convincing residents that institutional actors are more trustworthy, as in fostering a dialogue among all these stakeholders on how to address long term, uncertain risks and their impacts. This is in alignment with Bradbury et al. who with reference to Webler recommend that 'increasing trust and decreasing distrust' be viewed primarily as a basis for initiating and sustaining a more effective (fair and competent) dialogue with the goal of developing consensus on risk management policies. Uninvolved urban samples also talked about trust and confidence, especially during the group interviews. In contrast, however, participants seemed to use these themes as a tool to spark animated discussion on a risk topic - LLiRWM - of which they had not necessarily

  2. Social Trust and Confidence in the Management of Long Lived Radioactive Wastes: Qualitative Data from France

    International Nuclear Information System (INIS)

    Mays, Claire; Charron, Sylvie; Brenot, Jean

    2003-01-01

    Our qualitative study brought confirmation to Petts' finding that trust components may be of variable significance to different populations in different risk contexts. When we asked interviewees simply to talk about LLiRW (long-lived radioactive wastes management), social trust and confidence were frequently addressed (more than any other of our seven study themes). However, the themes' status appears to differ according to study sample. For the Limousine interviewees, these concepts are central and deeply tied into the uncertainty evoked by LLiRWM. Some interviewees explicitly described how social trust in waste managers, and confidence in the RWM system, are challenged by the very long term, and by the unpredictability of health effects from ionizing radiation. Limousine interviewees ask themselves questions about trust and confidence every time they think about the issues of mine and mill tailings in their community. While managers can draw guidance on how to ameliorate their performance on e.g. openness and credibility, residents suggest that there are structural limits to how far social trust can suffice in a RWM system. In such a context, improving system confidence may reside not so much in convincing residents that institutional actors are more trustworthy, as in fostering a dialogue among all these stakeholders on how to address long term, uncertain risks and their impacts. This is in alignment with Bradbury et al. who with reference to Webler recommend that 'increasing trust and decreasing distrust' be viewed primarily as a basis for initiating and sustaining a more effective (fair and competent) dialogue with the goal of developing consensus on risk management policies. Uninvolved urban samples also talked about trust and confidence, especially during the group interviews. In contrast, however, participants seemed to use these themes as a tool to spark animated discussion on a risk topic - LLiRWM - of which they had not necessarily given much thought in

  3. Building on the trust of management: overcoming the paradoxes of principles based regulation

    OpenAIRE

    Ojo, Marianne

    2010-01-01

    This paper illustrates how trust in management can be consolidated through the order and mode of application of enforcement measures (negotiating and punitive enforcement measures) which are employed in facilitating and maximising compliance with rules. “Whilst negotiating strategies are introduced initially to develop trust between the regulator and the regulated, resort is made to more punitive strategies where an absence of trust in the compliance activity has been confirmed.” In consi...

  4. Personalized Trust Management for Open and Flat P2P Communities

    Institute of Scientific and Technical Information of China (English)

    ZUO Min; LI Jian-hua

    2008-01-01

    A personalized trust management scheme is proposed to help peers build up trust between each other in open and flat P2P communities. This scheme totally abandons the attempt to achieve a global view. It evaluates trust from a subjective point of view and gives personalized decision support to each peer. Simulation experiments prove its three advantages: free of central control, stronger immunity to misleading recommendations, and limited traffic overload.

  5. System-wide versus component-specific trust using multiple aids.

    Science.gov (United States)

    Keller, David; Rice, Stephen

    2010-01-01

    Previous research in operator trust toward automated aids has focused primarily on single aids. The current study focuses on how operator trust is affected by the presence of multiple aids. Two competing theories of multiple-trust are presented. A component-specific trust theory predicts that operators will differentially place their trust in automated aids that vary in reliability. A system-wide trust theory predicts that operators will treat multiple imperfect aids as one "system" and merge their trust across aids despite differences in the aids' reliability. A simulated flight task was used to test these theories, whereby operators performed a pursuit tracking task while concurrently monitoring multiple system gauges that were augmented with perfect or imperfect automated aids. The data revealed that a system-wide trust theory best predicted the data; operators merged their trust across both aids, behaving toward a perfectly reliable aid in the same manner as they did towards unreliable aids.

  6. 77 FR 50185 - LoCorr Fund Management, LLC and LoCorr Investment Trust; Notice of Application

    Science.gov (United States)

    2012-08-20

    ... Fund Management, LLC and LoCorr Investment Trust; Notice of Application August 14, 2012. AGENCY.... Applicants: LoCorr Fund Management, LLC (``LFM'' or the ``Adviser'') and LoCorr Investment Trust (the ``Trust... Mary Kay Frech, Branch Chief, at (202) 551-6821 (Division of Investment Management, Office of...

  7. Loan managers' decisions and trust in entrepreneurs in different institutional contexts

    DEFF Research Database (Denmark)

    Moro, Andrea; Fink, Matthias; Maresch, Daniela

    2018-01-01

    Loan managers’ trust in entrepreneurs can be a useful tool for overcoming entrepreneurial firms’ opaqueness. Nevertheless, the possibility for loan managers to leverage trust can be affected by differences in the regulative institutions within the banks (type of bank) and by place-bound normative...

  8. Relationship Between Cybernetics Management and Organizational Trust Among Librarians of Mazandaran University of Medical Sciences

    OpenAIRE

    Ghiasi, Mitra; Shahrabi, Afsaneh; Siamian, Hasan

    2017-01-01

    Background and purpose: Organization must keep current skills, abilities, and in the current field of competition, and move one step ahead of other competitors; for this purpose, must be a high degree of trust inside the organization. Cybernetic management is a new approach in management of organizations that its main task according to internal issues. This study aimed to investigate the relationship between cybernetics management and organizational trust among librarians of Mazandaran Univer...

  9. Trust in management as a buffer of the relationships between overload and strain.

    Science.gov (United States)

    Harvey, Steve; Kelloway, E Kevin; Duncan-Leiper, Leslie

    2003-10-01

    This study examined the role of trust in management as a moderating factor in work overload's impact on personal strain (i.e., burnout, psychological strain, and work's interference with family). Participants were 94 employees of an accounting firm responding to a survey. The results were supportive of all study propositions. Both work overload and trust in management had the expected negative and positive main effects on the outcomes variables, respectively. The impact of work overload on the outcome variables was moderated by employees' trust in management. The significance of these results and areas of future research are discussed. 2003 APA

  10. Normative Multiagent Systems and Trust Dynamics

    NARCIS (Netherlands)

    G. Boella (Guido); L.W.N. van der Torre (Leon)

    2005-01-01

    htmlabstractIn this paper we use recursive modelling to formalize sanction-based obligations in a qualitative game theory. In particular, we formalize an agent who attributes mental attitudes such as goals and desires to the normative system which creates and enforces its obligations. The wishes

  11. Group Recommendation Systems Based on External Social-Trust Networks

    Directory of Open Access Journals (Sweden)

    Guang Fang

    2018-01-01

    Full Text Available With the development of social networks and online mobile communities, group recommendation systems support users’ interaction with similar interests or purposes with others. We often provide some advices to the close friends, such as listening to favorite music and sharing favorite dishes. However, users’ personalities have been ignored by the traditional group recommendation systems while the majority is satisfied. In this paper, a method of group recommendation based on external social-trust networks is proposed, which builds a group profile by analyzing not only users’ preferences, but also the social relationships between members inside and outside of the group. We employ the users’ degree of disagreement to adjust group preference rating by external information of social-trust network. Moreover, having a discussion about different social network utilization ratio, we proposed a method to work for smaller group size. The experimental results show that the proposed method has consistently higher precision and leads to satisfactory recommendations for groups.

  12. I trust it, but I don't know why: effects of implicit attitudes toward automation on trust in an automated system.

    Science.gov (United States)

    Merritt, Stephanie M; Heimbaugh, Heather; LaChapell, Jennifer; Lee, Deborah

    2013-06-01

    This study is the first to examine the influence of implicit attitudes toward automation on users' trust in automation. Past empirical work has examined explicit (conscious) influences on user level of trust in automation but has not yet measured implicit influences. We examine concurrent effects of explicit propensity to trust machines and implicit attitudes toward automation on trust in an automated system. We examine differential impacts of each under varying automation performance conditions (clearly good, ambiguous, clearly poor). Participants completed both a self-report measure of propensity to trust and an Implicit Association Test measuring implicit attitude toward automation, then performed an X-ray screening task. Automation performance was manipulated within-subjects by varying the number and obviousness of errors. Explicit propensity to trust and implicit attitude toward automation did not significantly correlate. When the automation's performance was ambiguous, implicit attitude significantly affected automation trust, and its relationship with propensity to trust was additive: Increments in either were related to increases in trust. When errors were obvious, a significant interaction between the implicit and explicit measures was found, with those high in both having higher trust. Implicit attitudes have important implications for automation trust. Users may not be able to accurately report why they experience a given level of trust. To understand why users trust or fail to trust automation, measurements of implicit and explicit predictors may be necessary. Furthermore, implicit attitude toward automation might be used as a lever to effectively calibrate trust.

  13. Trust in the context of management relationships: an empirical study.

    OpenAIRE

    Atkinson, Sally; Butcher, David

    2003-01-01

    This paper responds to calls for exploration of the dynamics of trust in the embedded context of interpersonal managerial relationships. Building on theoretical distinctions between different types of interpersonal relationships established in social psychology, the paper proposes a generic typology of interpersonal managerial relationships, along with associated hypotheses and implications for trust. The later part of the paper then reports the results from an initial explorat...

  14. Incorporating Trust into Department of Defense Acquisition Risk Management

    Science.gov (United States)

    2014-09-01

    taken from Chiles and McMackin (1996, 85) where they define trust as ‘‘the expectation that an exchange partner will not engage in opportunistic...short-term 53 incentives and uncertainty about long-term benefits” ( Chiles and McMackin 1996, 85). Trust is a positive term and vulnerability is...center for immigration and industry in the 1920s, which allotted it various ethnical backgrounds and poverty levels for the university social researchers

  15. Communication Management and Trust: Their Role in Building Resilience to "Surprises" Such As Natural Disasters, Pandemic Flu, and Terrorism

    Directory of Open Access Journals (Sweden)

    P. H. Longstaff

    2008-06-01

    Full Text Available In times of public danger such as natural disasters and health emergencies, a country's communication systems will be some of its most important assets because access to information will make individuals and groups more resilient. Communication by those charged with dealing with the situation is often critical. We analyzed reports from a wide variety of crisis incidents and found a direct correlation between trust and an organization's preparedness and internal coordination of crisis communication and the effectiveness of its leadership. Thus, trust is one of the most important variables in effective communication management in times of "surprise."

  16. Trust and controlling

    Directory of Open Access Journals (Sweden)

    Bieńkowska Agnieszka

    2016-12-01

    Full Text Available The purpose of this study is to discuss the trust within and towards an organisation in the context of implementation of controlling therein. In this context the essence of trust and its importance in organisation management was presented, as well as trust in the contemporary management methods and concepts. Controlling as a trust-building factor inside an organisation was pointed out. Especially controlling and control were described. Moreover management by considering deviations in controlling and the teamwork in controlling were described. The role of controlling in process of trust-building to an organisation was presented. Establishing relations with the environment and systems of measurement of organisation’s achievements were presented, too.

  17. A Smart Trust Management Method to Detect On-Off Attacks in the Internet of Things

    Directory of Open Access Journals (Sweden)

    Jean Caminha

    2018-01-01

    Full Text Available Internet of Things (IoT resources cooperate with themselves for requesting and providing services. In heterogeneous and complex environments, those resources must trust each other. On-Off attacks threaten the IoT trust security through nodes performing good and bad behaviors randomly, to avoid being rated as a menace. Some countermeasures demand prior levels of trust knowledge and time to classify a node behavior. In some cases, a malfunctioning node can be mismatched as an attacker. In this paper, we introduce a smart trust management method, based on machine learning and an elastic slide window technique that automatically assesses the IoT resource trust, evaluating service provider attributes. In simulated and real-world data, this method was able to identify On-Off attackers and fault nodes with a precision up to 96% and low time consumption.

  18. Research of trust model base on P2P and grid system

    International Nuclear Information System (INIS)

    Jiang Zhuoming; Wu Huan; Xu Rongsheng

    2009-01-01

    Orienting to the characteristic of P2P and Grid system in architecture and service, a trust management model (PG-TM) based on cluster partition is presented. In this model, the protocol is described that trustworthiness is computed before service interaction, and recommendation values will be fed back after interaction. About the trustworthiness, some arithmetic is compared and geometric mean is brought up for the non-linear trust principle. In addition, it is also considered that the trustworthiness is adjusted by the produce contribution rate,network stability and history accumulation. Finally, the factors of maintaining management server and cluster are discussed. PG-TM model can ensure the security and availability in computation and storage of high energy physics experiments. (authors)

  19. The effect of system aesthetics on trust, cooperation, satisfaction and annoyance in an imperfect automated system.

    Science.gov (United States)

    Weinstock, Alona; Oron-Gilad, Tal; Parmet, Yisrael

    2012-01-01

    Lack of system reliability has been repeatedly identified as a factor that decreases trust. However, aesthetics has an important role in the development of trust. Most of the research concerning the connection between aesthetics and trust focused on mobile commerce and websites while very little has been done in examining aesthetics in automated systems. This study integrated aesthetics manipulations into an imperfect in-vehicle automation system and focused on the power of aesthetics to decrease the negative effects of errors on trust, satisfaction, annoyance, and human-automation cooperation perceptions. Participants used the navigation system in either 100% or 85% accuracy levels with an aesthetic or non aesthetic system (4 conditions). In both aesthetic and non aesthetic systems, perceptions of trust, satisfaction and human automation cooperation were decreased in the imperfect system compared to the perfect one. However, in the annoyance rating, this trend was found only in the aesthetic system while in the non-aesthetic system no difference was found between the two levels of accuracy. This single effect may indicate upon the possibility that in automated systems aesthetics affects trust and satisfaction more moderately compared to mobile commerce applications and websites. However, more research is needed to assess this assumption.

  20. Trust in management, communication and organisational commitment: Factors influencing readiness for change management in organisation

    Science.gov (United States)

    Ahmad, Mohd Hafis; Ismail, Syuhaida; Rani, Wan Nurul Mardiah Wan Mohd; Wahab, Mohammad Hussaini

    2017-10-01

    Organisational change occurs when an organisation makes a transition from its current state to some desired future state in minimising employee resistance and cost to the organisation while simultaneously maximising the effectiveness of the change effort. This paper, aims at appraising the change management of organisation in Malaysia since limited research has been done to examine readiness for change by the employees in the organisation. This paper is materialising its objectives of (1) investigating the current practice of organisation and employees in the organisation towards change management and (2) assessing the factors influencing readiness of organisation and employees in the organisation towards change management. It is found via literature review that change management is a structured approach for ensuring that changes are thoroughly and smoothly implemented to transitioning individuals, teams, and organisations to a desired future state by focusing on the wider impacts of change, particularly on people, where change does not happen in isolation and it impacts the whole organisation. Furthermore, it is found that current practice of organisation and employees in the organisation towards change management involved in three main factors, namely trust in management, communication and organisational commitment; with the factor for trust in management is the positive vision for the future by management team, meanwhile for communication, it is found that there is good communication between supervisors and employees about the organisation's policy toward the changes. The factor found in organisational commitment is employees enjoying discussing about their organisation with outsiders. The findings of this paper provide a positive impact on change management planning, which ultimately help in ensuring more effective change programme implementation in the organisation in Malaysia.

  1. Relationship Between Cybernetics Management and Organizational Trust Among Librarians of Mazandaran University of Medical Sciences.

    Science.gov (United States)

    Ghiasi, Mitra; Shahrabi, Afsaneh; Siamian, Hasan

    2017-12-01

    Organization must keep current skills, abilities, and in the current field of competition, and move one step ahead of other competitors; for this purpose, must be a high degree of trust inside the organization. Cybernetic management is a new approach in management of organizations that its main task according to internal issues. This study aimed to investigate the relationship between cybernetics management and organizational trust among librarians of Mazandaran University of Medical Sciences. This is applied and analytical survey. which its population included all librarians of Mazandaran University of Medical Sciences, amounting to 42 people which were selected by census and participated in this research. There has no relationship between components of Cybernetics management (participative decision making, commitment, pay equity, Correct flow of information, develop a sense of ownership, online education) with organizational trust amongst librarians of Mazandaran University of Medical Sciences. And there has a significant relationship between flat Structure of cybernetics management and organizational trust. For data analysis was used Kolmogorov-Smirnov test and linear regression. There is no significant relationship between Cybernetic management and organizational trust amongst librarians of Mazandaran University of Medical Sciences.

  2. Supporting reputation based trust management enhancing security layer for cloud service models

    Science.gov (United States)

    Karthiga, R.; Vanitha, M.; Sumaiya Thaseen, I.; Mangaiyarkarasi, R.

    2017-11-01

    In the existing system trust between cloud providers and consumers is inadequate to establish the service level agreement though the consumer’s response is good cause to assess the overall reliability of cloud services. Investigators recognized the significance of trust can be managed and security can be provided based on feedback collected from participant. In this work a face recognition system that helps to identify the user effectively. So we use an image comparison algorithm where the user face is captured during registration time and get stored in database. With that original image we compare it with the sample image that is already stored in database. If both the image get matched then the users are identified effectively. When the confidential data are subcontracted to the cloud, data holders will become worried about the confidentiality of their data in the cloud. Encrypting the data before subcontracting has been regarded as the important resources of keeping user data privacy beside the cloud server. So in order to keep the data secure we use an AES algorithm. Symmetric-key algorithms practice a shared key concept, keeping data secret requires keeping this key secret. So only the user with private key can decrypt data.

  3. Trust and management-to-employee communication in Slovenian companies: Some evidence from the current economic crisis

    OpenAIRE

    Matevž Rašković; Maja Makovec Brenčič; Barbara Moerec

    2011-01-01

    This paper analyzes the importance of trust and management-to-employee communication among top Slovenian employers from the Golden Thread Survey. The paper analyzes the changes and impact of the deteriorating external economic situation on (a) company-employee relational trust, and on the (b) perceived importance of “trust and long-term relationships with the company in the eyes of the customer” by respondent managers. Furthermore, our analysis also looks at the impact of management-to-employ...

  4. Trusted Domain

    DEFF Research Database (Denmark)

    Hjorth, Theis Solberg; Torbensen, Rune

    2012-01-01

    remote access via IP-based devices such as smartphones. The Trusted Domain platform fits existing legacy technologies by managing their interoperability and access controls, and it seeks to avoid the security issues of relying on third-party servers outside the home. It is a distributed system...... of wireless standards, limited resources of embedded systems, etc. Taking these challenges into account, we present a Trusted Domain home automation platform, which dynamically and securely connects heterogeneous networks of Short-Range Wireless devices via simple non-expert user. interactions, and allows......In the digital age of home automation and with the proliferation of mobile Internet access, the intelligent home and its devices should be accessible at any time from anywhere. There are many challenges such as security, privacy, ease of configuration, incompatible legacy devices, a wealth...

  5. Studies of transformational leadership in consumer service: leadership trust and the mediating-moderating role of cooperative conflict management.

    Science.gov (United States)

    Yang, Yi-Feng

    2012-02-01

    This is the third in a series of studies evaluating how transformational leadership is associated with related variables such as job satisfaction, change commitment, leadership trust, cooperative conflict management, and market orientation. The present paper evaluates the effects of transformational leadership and cooperative conflict management along with their mediating and moderating of leadership trust in the life insurance industry for two sample groups, sales managers and sales employees. The main effect of leadership trust was mediated and moderated by cooperative conflict management. Cooperative conflict management made a more important contribution than transformational leadership or the moderating effect (interaction), but these three together were the most important variables predicting highest leadership trust. Transformational leadership has an indirect influence on leadership trust. This work summarizes the specific contribution and importance of building successful leadership trust associations with employees in relation to leadership and satisfaction with change commitment.

  6. Understanding and managing trust at the climate science-policy interface

    Science.gov (United States)

    Lacey, Justine; Howden, Mark; Cvitanovic, Christopher; Colvin, R. M.

    2018-01-01

    Climate change effects are accelerating, making the need for appropriate actions informed by sound climate knowledge ever more pressing. A strong climate science-policy relationship facilitates the effective integration of climate knowledge into local, national and global policy processes, increases society's responsiveness to a changing climate, and aligns research activity to policy needs. This complex science-policy relationship requires trust between climate science `producers' and `users', but our understanding of trust at this interface remains largely uncritical. To assist climate scientists and policymakers, this Perspective provides insights into how trust develops and operates at the interface of climate science and policy, and examines the extent to which trust can manage — or even create — risk at this interface.

  7. 78 FR 69147 - Ranger Alternative Management, L.P. and Ranger Funds Investment Trust; Notice of Application

    Science.gov (United States)

    2013-11-18

    ...] Ranger Alternative Management, L.P. and Ranger Funds Investment Trust; Notice of Application November 12... Application: Applicants request an order that would permit (a) certain open-end management investment... Units; and (e) certain registered management investment companies and unit investment trusts outside of...

  8. Improved Trust Prediction in Business Environments by Adaptive Neuro Fuzzy Inference Systems

    Directory of Open Access Journals (Sweden)

    Ali Azadeh

    2015-06-01

    Full Text Available Trust prediction turns out to be an important challenge when cooperation among intelligent agents with an impression of trust in their mind, is investigated. In other words, predicting trust values for future time slots help partners to identify the probability of continuing a relationship. Another important case to be considered is the context of trust, i.e. the services and business commitments for which a relationship is defined. Hence, intelligent agents should focus on improving trust to provide a stable and confident context. Modelling of trust between collaborating parties seems to be an important component of the business intelligence strategy. In this regard, a set of metrics have been considered by which the value of confidence level for predicted trust values has been estimated. These metrics are maturity, distance and density (MD2. Prediction of trust for future mutual relationships among agents is a problem that is addressed in this study. We introduce a simulation-based model which utilizes linguistic variables to create various scenarios. Then, future trust values among agents are predicted by the concept of adaptive neuro-fuzzy inference system (ANFIS. Mean absolute percentage errors (MAPEs resulted from ANFIS are compared with confidence levels which are determined by applying MD2. Results determine the efficiency of MD2 for forecasting trust values. This is the first study that utilizes the concept of MD2 for improvement of business trust prediction.

  9. 78 FR 2363 - Notification of Deletion of a System of Records; Automated Trust Funds Database

    Science.gov (United States)

    2013-01-11

    ... [Docket No. APHIS-2012-0041] Notification of Deletion of a System of Records; Automated Trust Funds Database AGENCY: Animal and Plant Health Inspection Service, USDA. ACTION: Notice of deletion of a system... establishing the Automated Trust Funds (ATF) database system of records. The Federal Information Security...

  10. Technology Trust and E-Banking Adoption: The Mediating Effect of Customer Relationship Management Performance

    Directory of Open Access Journals (Sweden)

    Samsudin Wahab

    2012-01-01

    Full Text Available The electronic revolution in the Malaysian banking sector has started in the 1970's. The first visible form of electronic innovation in the Malaysian banking industry was the introduction of Automated Teller Machines in 1981. Finally, on June 1, 2000, the Malaysian Central Bank gave the green light for locally owned commercial banks to offer Internet banking services. Due to the drastic changes in the business environment, it leads financial institutions to revise their marketing strategies to stress long-lasting relationships with customers. Relationships is important criteria in the selection of private bank. In many conditions, customer satisfaction mediates the relationship between antecedent’s factors and marketing performance. Hence, CRM performance is about maintaining good relationship and repurchases behavior, word-of-mouth and customer retention. Trust has been studied in traditional physical commercial environments. In the marketing and management literatures, trust is strongly associated with attitudes toward products, services, and purchasing behaviors. So that, the main objective of this research paper is to investigate the role of CRM performance as the mediator in the relationship between trust and E-Banking adoption. Hence, this empirical paper confirmed the role of customer relationship management performance as the mediators in the relationship between trust and electronic banking adoption.Key words: Trust, Customer Relationship Management Performance, E-Banking Adoption

  11. Trust-Based Information Risk Management in a Supply Chain Network

    OpenAIRE

    Yanjun Zuo; Wen-Chen Hu

    2009-01-01

    Information risk management is crucial for an organization operating in an increasingly integrated and intensively communicated environment to mitigate risks and ensure core business functions. Given the open and dynamic nature of a supply chain network, information risk management is challenging and various factors must be considered. This article introduces a trust-based approach to facilitate supply chain participants to perform effective risk management. The major components of the propos...

  12. A management approach that drives actions strategically: balanced scorecard in a mental health trust case study.

    Science.gov (United States)

    Schmidt, Stefan; Bateman, Ian; Breinlinger-O'Reilly, Jochen; Smith, Peter

    2006-01-01

    Achieving excellence is a current preoccupation in U.K. public health organisations. This article aims to use a case study to explain how a mental health trust delivers excellent performance using a balanced scorecard (BSC) management approach. Reports a project to implement a BSC approach in the South West Yorkshire Mental Health NHS Trust to achieve its "excellence" objectives. The authors were participants in the project. The design of the pilot project was informed theoretically by the work of Kaplan and Norton and practically by in-house discussions on a strategy to achieve excellence. Explains the process of building a BSC strategy step-by-step. Discusses how the vision and strategies of a mental health trust can be translated into tangible measures, which are the basis for actions that are driven strategically. There are many possibilities for a BSC management approach and this case study is specific to mental health trusts in the UK, although it is believed that the case has a universally applicable modus operandi. This article will help healthcare managers to evaluate the benefits of a BSC management approach. This article explains how actions can be structured in connection with a BSC management approach.

  13. 78 FR 23318 - Trust for Professional Managers and Aurora Investment Management L.L.C.; Notice of Application

    Science.gov (United States)

    2013-04-18

    ... subadvisory agreements (``Subadvisory Agreements'') with Chicago Fundamental Investment Partners, LLC, First... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 30460; 812-14113] Trust for Professional Managers and Aurora Investment Management L.L.C.; Notice of Application April 12, 2013. AGENCY...

  14. The Effects of Parental Involvement, Trust in Parents, Trust in Students and Pupil Control Ideology on Conflict Management Strategies of Early Childhood Teachers

    Science.gov (United States)

    Karakus, Mehmet; Savas, Ahmet Cezmi

    2012-01-01

    In this study it was aimed to determine the effects of parental involvement, teachers' trust in parents and students, and teachers' pupil control ideology on the conflict management strategies used by teachers in classroom management. Data were collected from a sample of 254 teachers through paper and pencil questionnaires. Data were analyzed with…

  15. 36 CFR 1011.9 - When will the Presidio Trust transfer a debt to the Financial Management Service for collection?

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false When will the Presidio Trust transfer a debt to the Financial Management Service for collection? 1011.9 Section 1011.9 Parks, Forests... When will the Presidio Trust transfer a debt to the Financial Management Service for collection? (a...

  16. Scalable Trust of Next-Generation Management (STRONGMAN)

    National Research Council Canada - National Science Library

    Smith, Jonathan

    2004-01-01

    STRONGMAN focused on advanced boundary controls and risk management with the key goal of increasing automation of the management of boundary controllers such as gateways and firewalls, in the Internet...

  17. The relationship between servant leadership and employee empowerment, commitment, trust and innovative behaviour: A project management perspective

    Directory of Open Access Journals (Sweden)

    Camilla L. Krog

    2015-10-01

    Full Text Available Orientation: Understanding the relationship between a project sponsor’s servant leadership traits and employee commitment, trust and innovative behaviour. Research purpose: This study aimed to understand the relationship, if any, between a project sponsor’s servant leadership traits of altruistic calling, emotional healing, wisdom, persuasive mapping and organisational stewardship and a project team’s empowerment, commitment, trust and innovative behaviour. Motivation of the study: Most project leadership studies focus on understanding the role and power position of the project manager, with very little research being dedicated to understanding the effect the leadership style has on the project team and project success. Research approach: A survey was conducted amongst a non-probability sample of 48 project team members from amongst a population of 257, comprising project managers, business analysts and IT staff of a medium sized fleet management organisation that is in the process of implementing an entirely new enterprise resource planning system. Main findings: Through inferential statistical analysis, using structural equation modelling and path analysis, it was determined that persuasive mapping has the strongest impact on employee innovative behaviour, followed by employee commitment and trust via the mediator of employee perceived empowerment. Wisdom and organisational stewardship had a negative impact on employee perceived empowerment. Practical/managerial implications: Project sponsors need to exhibit persuasive mapping, altruistic calling and emotional healing traits due to the significant influence that these have on employee innovative behaviour, commitment and trust, albeit through their perceived empowerment. Contribution/value-add: This study contributes to knowledge of leadership, more especially servant leadership and its significance in project management, which knowledge may contribute to project success

  18. Trust and management : Explaining cross-national differences in work autonomy

    NARCIS (Netherlands)

    van Hoorn, A.A.J.

    2013-01-01

    We open the black box of what goes on in firms in terms of management of their operations. Work autonomy is a key aspect of firm organization and we test the hypothesis that societal trust affects the level of autonomy that firms grant to their employees. Analysis of up to 189,213 individuals from

  19. The Relationship among Interactional Justice, Manager Trust and Teachers' Organizational Silence Behavior

    Science.gov (United States)

    Yangin, Demet; Elma, Cevat

    2017-01-01

    The purpose of this study was to determine the relationship between the manager trust and interactional justice perceptions and organizational silence behaviors of those teachers who work in primary and secondary schools. The research is based on the survey model and the population consists of 4761 teachers who worked in Samsun, Turkey. The sample…

  20. Trust and social representations of the management of threatened and endangered species

    Science.gov (United States)

    George Cvetkovich; Patricia L. Winter

    2003-01-01

    Using quantitative analysis of questionnaire responses, observations during focus group discussions, and qualitative assessment of discussion statements, the present study examined trust and social representations of the U.S. Forest Service's management of Southern California national forests for the protection of endangered species. Supporting expectations based...

  1. 76 FR 45198 - Indian Trust Management Reform-Implementation of Statutory Changes

    Science.gov (United States)

    2011-07-28

    ... Parts 4, 30 [Docket ID BIA-2009-0001] RIN 1076-AF07 Indian Trust Management Reform--Implementation of Statutory Changes AGENCY: Bureau of Indian Affairs, Office of the Secretary, Interior. ACTION: Final rule... February 10, 2011, to implement the latest statutory changes to the Indian Land Consolidation Act, as...

  2. Secure grid-based computing with social-network based trust management in the semantic web

    Czech Academy of Sciences Publication Activity Database

    Špánek, Roman; Tůma, Miroslav

    2006-01-01

    Roč. 16, č. 6 (2006), s. 475-488 ISSN 1210-0552 R&D Projects: GA AV ČR 1ET100300419; GA MŠk 1M0554 Institutional research plan: CEZ:AV0Z10300504 Keywords : semantic web * grid computing * trust management * reconfigurable networks * security * hypergraph model * hypergraph algorithms Subject RIV: IN - Informatics, Computer Science

  3. Characterizing Economic and Social Properties of Trust and Reputation Systems in P2P Environment

    Institute of Scientific and Technical Information of China (English)

    Yu-Feng Wang; Yoshiaki Hori; Kouichi Sakurai

    2008-01-01

    Considering the fact that P2P (Peer-to-Peer) systems are self-organized and autonomous, social-control mechanism (like trust and reputation) is essential to evaluate the trustworthiness of participating peers and to combat the selfish, dishonest and malicious peer behaviors. So, naturally, we advocate that P2P systems that gradually act as an important information infrastructure should be multi-disciplinary research topic, and reflect certain features of our society. So, from economic and social perspective, this paper designs the incentive-compatible reputation feedback scheme based on well-known economic model, and characterizes the social features of trust network in terms of efficiency and cost. Specifically, our framework has two distinctive purposes: first, from high-level perspective, we argue trust system is a special kind of social network, and an accurate characterization of the structural properties of the network can be of fundamental importance to understand the dynamics of the system. Thus, inspired by the concept of weighted small-world, this paper proposes new measurements to characterize the social properties of trust system, that is, highg lobal and local efficiency, and low cost; then, from relative low-level perspective, we argue that reputation feedback is a special kind of information, and it is not free. So, based on economic model, VCG (Vickrey-Clarke-Grove)-like reputation remuneration mechanism is proposed to stimulate rational peers not only to provide reputation feedback, but truthfully offer feedback. Furthermore, considering that trust and reputation is subjective, we classify the trust into functional trust and referral trust, and extend the referral trust to include two factors: similarity and truthfulness, which can efficiently reduce the trust inference error. The preliminary simulation results show the benefits of our proposal and the emergence of certain social properties in trust network.

  4. Earning public trust and confidence: Requisites for managing radioactive wastes. Final report

    Energy Technology Data Exchange (ETDEWEB)

    1993-11-01

    The Task Force on Radioactive Waste Management was created in April 1991 by former Secretary James D. Watkins, who asked the group to analyze the critical institutional question of how the Department of Energy (DOE) might strengthen public trust and confidence in the civilian radioactive waste management program. The panel met eight times over a period of 27 months and heard formal presentations from nearly 100 representatives of state and local governments, non-governmental organizations, and senior DOE Headquarters and Field Office managers. The group also commissioned a variety of studies from independent experts, contracted with the National Academy of Sciences and the National Academy of Public Administration to hold workshops on designing and leading trust-evoking organizations, and carried out one survey of parties affected by the Department`s radioactive waste management activities and a second one of DOE employees and contractors.

  5. Earning public trust and confidence: Requisites for managing radioactive wastes. Final report

    International Nuclear Information System (INIS)

    1993-11-01

    The Task Force on Radioactive Waste Management was created in April 1991 by former Secretary James D. Watkins, who asked the group to analyze the critical institutional question of how the Department of Energy (DOE) might strengthen public trust and confidence in the civilian radioactive waste management program. The panel met eight times over a period of 27 months and heard formal presentations from nearly 100 representatives of state and local governments, non-governmental organizations, and senior DOE Headquarters and Field Office managers. The group also commissioned a variety of studies from independent experts, contracted with the National Academy of Sciences and the National Academy of Public Administration to hold workshops on designing and leading trust-evoking organizations, and carried out one survey of parties affected by the Department's radioactive waste management activities and a second one of DOE employees and contractors

  6. Trust Threshold Based Public Key Management in Mobile Ad Hoc Networks

    Science.gov (United States)

    2016-03-05

    detection 49 [6,7] , authentication, access control, key management, iso- 50 lating misbehaving nodes for effective routing [6,8,9] , and 51 many other...83 84 85 aims to achieve: (a) resiliency against misbehaving nodes 86 in the network to maintain minimum security vulnerabil- 87 ity; (b...neighbor will decreas the misbehaving node’s direct competence trust. Fur thermore, this neighbor when acting as a recommended public key management in

  7. Public trust in the Spanish health‐care system

    Science.gov (United States)

    Jovell, Albert; Blendon, Robert J.; Navarro, Maria Dolors; Fleischfresser, Channtal; Benson, John M.; DesRoches, Catherine M.; Weldon, Kathleen J.

    2007-01-01

    Abstract Background  Fifteen years ago, public opinion surveys in Spain showed substantial dissatisfaction with the health‐care system. Since that time, health‐care in Spain has undergone significant changes, including a decentralization of the system, an increase in spending and a change in the way the system is financed. Objective  This study examines how Spanish citizens rate the performance of their health system today, both as compared with other sectors of society and as compared with earlier time periods. Methods  Data are drawn from nationally representative telephone surveys of the non‐institutionalized adult Spanish population (age 18 years and over). The study was carried out in two phases: October–November 2005 (n = 3010) and January 2006 (n = 2101). Results  The majority of the Spanish population thinks the health system needs to be changed. The problems cited relate mostly to long wait times to get health‐care. Nevertheless, over the last 15 years, the proportion of people who have very negative views about the health system has decreased by half. The majority believes that not enough money is spent on health‐care, but few people would support an increase in taxes to provide additional funding. The survey finds the National Health System’s institutions and health professionals to be more highly trusted than other institutions and professional groups in the country. Conclusions  Government policy‐makers in Spain face a dilemma: the public wants more health spending to decrease wait times, but there is substantial resistance to increasing taxes as a means to finance improvements in the system’s capacity. PMID:17986071

  8. A Trusted Computing Architecture of Embedded System Based on Improved TPM

    Directory of Open Access Journals (Sweden)

    Wang Xiaosheng

    2017-01-01

    Full Text Available The Trusted Platform Module (TPM currently used by PCs is not suitable for embedded systems, it is necessary to improve existing TPM. The paper proposes a trusted computing architecture with new TPM and the cryptographic system developed by China for the embedded system. The improved TPM consists of the Embedded System Trusted Cryptography Module (eTCM and the Embedded System Trusted Platform Control Module (eTPCM, which are combined and implemented the TPM’s autonomous control, active defense, high-speed encryption/decryption and other function through its internal bus arbitration module and symmetric and asymmetric cryptographic engines to effectively protect the security of embedded system. In our improved TPM, a trusted measurement method with chain model and star type model is used. Finally, the improved TPM is designed by FPGA, and it is used to a trusted PDA to carry out experimental verification. Experiments show that the trusted architecture of the embedded system based on the improved TPM is efficient, reliable and secure.

  9. Nuclear Waste Management, Nuclear Power, and Energy Choices Public Preferences, Perceptions, and Trust

    CERN Document Server

    Greenberg, Michael

    2013-01-01

    Hundreds of studies have investigated public perceptions and preferences about nuclear power, waste management, and technology. However there is clear lack of uniformity in the style, aims and methods applied.  Consequently, the body of results is inconsistent and it is difficult to isolate relevant patterns or interpretations. Nuclear Waste Management, Nuclear Power and Energy Choices: Public Preferences, Perceptions and Trust presents a theoretical base for public reactions then classifies and reviews the large body of surveys carried out over the past decade.   Particular focus is placed on residents within 50 miles US nuclear waste facilities due to the disproportionate presence of nuclear factors in their lives such as the legacy of nuclear waste disposal and job dependency. The motivations and reasons for their views such as fear, attraction to the economic benefits, trust of site managers and federal agencies, cultural views, personal history, and demographic attributes of the people are also conside...

  10. System Modeling and Trust Evaluation of Distributed Systems

    OpenAIRE

    Alhadad , Nagham; Serrano-Alvarado , Patricia; Busnel , Yann; Lamarre , Philippe

    2015-01-01

    International audience; Nowadays, digital systems are connected through complex architectures. These systems involve persons, physical and digital resources such that we can consider that a system consists of elements from two worlds, the social world and the digital world, and their relations. Users perform activities like chatting, buying, sharing data, etc. Evaluating and choosing appropriate systems involve aspects like functionality, performance, QoS, ease of use, or price. Recently, tru...

  11. Collaboration management framework for OEM - suppliers relationships: a trust-based conceptual approach

    Science.gov (United States)

    Belkadi, Farouk; Messaadia, Mourad; Bernard, Alain; Baudry, David

    2017-08-01

    Due to the increased competitiveness and the diversity of requirements in today's markets, manufacturing companies need to join their competencies and resources to propose innovative solutions for each specific market, with the possibility to transpose these solutions to another market, by means of slight adaptations. Thus, manufacturing firms must constantly conduct new collaborations with known partners in most cases, but also with new partners. The critical question for managers in this latter case is how to define the best collaborative strategy according to the goals of the project and the specificity of the target market. This paper tackles the problem by proposing a conceptual framework for supporting the management of collaborative situations in the case of Original equipment manufacturers (OEMs). Based on the concept of trust level, the framework proposes a classification of different collaboration modes to be adopted in various contexts of inter-enterprise relationships, in manufacturing sector. The aim is to support the flexible navigation between different collaborative situations by taking into account all decision-making levels from the strategy to the implementation of the information technologies (IT) systems at the operational level.

  12. Public Trust in Health Information Sharing: Implications for Biobanking and Electronic Health Record Systems

    Directory of Open Access Journals (Sweden)

    Jodyn Platt

    2015-02-01

    Full Text Available Biobanks are made all the more valuable when the biological samples they hold can be linked to health information collected in research, electronic health records, or public health practice. Public trust in such systems that share health information for research and health care practice is understudied. Our research examines characteristics of the general public that predict trust in a health system that includes researchers, health care providers, insurance companies and public health departments. We created a 119-item survey of predictors and attributes of system trust and fielded it using Amazon’s MTurk system (n = 447. We found that seeing one’s primary care provider, having a favorable view of data sharing and believing that data sharing will improve the quality of health care, as well as psychosocial factors (altruism and generalized trust were positively and significantly associated with system trust. As expected, privacy concern, but counterintuitively, knowledge about health information sharing were negatively associated with system trust. We conclude that, in order to assure the public’s trust, policy makers charged with setting best practices for governance of biobanks and access to electronic health records should leverage critical access points to engage a diverse public in joint decision making.

  13. Rethinking trust.

    Science.gov (United States)

    Kramer, Roderick M

    2009-06-01

    Will we ever learn? We'd barely recovered from Enron and WorldCom before we faced the subprime mortgage meltdown and more scandals that shook our trust in businesspeople. Which raises the question: Do we trust too much? In this article, Stanford professor and social psychologist Kramer explores the reasons we trust so easily--and, often, so unwisely. He explains that genetics and childhood learning make us predisposed to trust and that it's been a good survival mechanism. That said, our willingness to trust makes us vulnerable. Our sense of trust kicks in on remarkably simple cues, such as when people look like us or are part of our social group. We also rely on third parties to verify the character of others, sometimes to our detriment (as the victims of Bernard Madoff learned). Add in our illusions of invulnerability and our tendencies to see what we want to see and to overestimate our own judgment, and the bottom line is that we're often easily fooled. We need to develop tempered trust. For those who trust too much, that means reading cues better; for the distrustful, it means developing more receptive behaviors. Everyone should start with small acts of trust that encourage reciprocity and build up. Having a hedge against potential abuses also helps. Hollywood scriptwriters, for instance, register their treatments with the Writers Guild of America to prevent their ideas from being stolen by the executives they pitch. To attract the right relationships, people must strongly signal their own honesty, proactively allay concerns, and, if their trust is abused, retaliate. Trusting individuals in certain roles, which essentially means trusting the system that selects and trains them, also works but isn't foolproof. And don't count on due diligence alone for protection; constant vigilance is needed to make sure the landscape hasn't changed.

  14. 77 FR 60732 - PACE Select Advisors Trust and UBS Global Asset Management (Americas) Inc.; Notice of Application

    Science.gov (United States)

    2012-10-04

    ....; Institutional Capital, LLC; J.P. Morgan Investment Management, Inc.; Kayne Anderson Rudnick Investment...; Standish Mellon Asset Management Company, LLC; Systematic Financial Management, L.P.; Wellington Management... Select Advisors Trust and UBS Global Asset Management (Americas) Inc.; Notice of Application September 27...

  15. Exploring pathways for building trust in vaccination and strengthening health system resilience

    Directory of Open Access Journals (Sweden)

    Sachiko Ozawa

    2016-11-01

    Full Text Available Abstract Background Trust is critical to generate and maintain demand for vaccines in low and middle income countries. However, there is little documentation on how health system insufficiencies affect trust in vaccination and the process of re-building trust once it has been compromised. We reflect on how disruptions to immunizations systems can affect trust in vaccination and can compromise vaccine utilization. We then explore key pathways for overcoming system vulnerabilities in order to restore trust, to strengthen the resilience of health systems and communities, and to promote vaccine utilization. Methods Utilizing secondary data and a review of the literature, we developed a causal loop diagram (CLD to map the determinants of building trust in immunizations. Using the CLD, we devised three scenarios to illustrate common vulnerabilities that compromise trust and pathways to strengthen trust and utilization of vaccines, specifically looking at weak health systems, harmful communication channels, and role of social capital. Spill-over effects, interactions and other dynamics in the CLD were then examined to assess leverage points to counter these vulnerabilities. Results Trust in vaccination arises from the interactions among experiences with the health system, the various forms of communication and social capital – both external and internal to communities. When experiencing system-wide shocks such as the case in Ebola-affected countries, distrust is reinforced by feedback between the health and immunization systems where distrust often lingers even after systems are restored and spills over beyond vaccination in the broader health system. Vaccine myths or anti-vaccine movements reinforce distrust. Social capital – the collective value of social networks of community members – plays a central role in increasing levels of trust. Conclusions Trust is important, yet underexplored, in the context of vaccine utilization. Using a CLD to

  16. Trust, performance and well-being in Nordic working life and management research

    DEFF Research Database (Denmark)

    Sørensen, Ole Henning; Hasle, Peter; Madsen, Christian Uhrenholdt

    2014-01-01

    In the last decades there has been a growing focus in working life and management research on sustainable organizational development that simultaneously improve organizational outcomes such as productivity and quality and employee outcomes such as well-being and job-satisfaction. Research has...... pointed to trust as an important component of participatory management practices having simultaneous positive outcomes for organizational productivity and employee well-being. The aim of this paper is to establish an overview of the results of Nordic working life and man-agement research inquiring...

  17. Information Technology Convergence, Secure and Trust Computing, and Data Management ITCS 2012 & STA 2012

    CERN Document Server

    Kim, Jongsung; Zou, Deqing; Lee, Yang

    2012-01-01

    ITCS 2012 and STA 2012 address the various theories and practical applications of information technology convergence, secure and trust computing, and data management in future environments. It will present important results of significant value to solve the application services and various problems within the scope of ITCS 2012 & STA 2012. In addition, we expect it will trigger further related research and technology developments which will improve our lives in the future.

  18. The Influence Of Franchisors Brand Image On Franchisee Trust And Its Impact On Franchisee Intention To Remain In Franchise System

    OpenAIRE

    Erlinda; Yuyus Suryana; Faisal Afiff; Arief Helmi

    2015-01-01

    Franchisee is the party that play important role in the franchising because most of franchise outlets managed and operated by franchisees. Nevertheless in the process of business operating there would be the conflict of interests between franchisor as the owner of brand with the franchisee as the buyer of franchisors brand to operating retail outlet.and bound with futures contract. Therefore franchisee trust is needed in order to maintain franchisee intention to remain in franchise system. O...

  19. Review of Trusted Computer System Evaluation Criteria of Some Countries (USA, Canada, EC

    Directory of Open Access Journals (Sweden)

    Natalia Mikhailovna Nikiforova

    2013-02-01

    Full Text Available In the paper a brief review of the evolution in developing and designing trusted computer system evaluation criteria from specific national to common international standards is given/suggested.

  20. The Influence of Trust and Security in the Use of Electronic Payment System in Manado

    OpenAIRE

    Tani, Frangky

    2015-01-01

    Electronic payment is the way to make in the process of buying and selling customers in real estate market or online market easier. Electronic payments give innovation to consumer with transaction overseas like online shopping. This study aims to determine the influence of trust and security in the use of electronic payment system. Where the independent variables are trust and security influence in using electronic payment system as the dependent variable. This research used quantitative meth...

  1. Distance in schools : The influence of psychological and structural distance from management on teachers’ trust in management, organisational commitment, and organisational citizenship behaviour

    NARCIS (Netherlands)

    Thomsen, M.; Karsten, S.; Oort, F.J.

    2016-01-01

    This study aimed to examine the relationship between teachers’ perceived psychological distance and structural distance from management and teachers’ affective organisational commitment (AOC) and organisational citizenship behaviour (OCB). Teachers’ trust in management was expected to mediate these

  2. Trust and management-to-employee communication in Slovenian companies: Some evidence from the current economic crisis

    Directory of Open Access Journals (Sweden)

    Maja Makovec Brenčič

    2011-01-01

    Full Text Available This paper analyzes the importance of trust and management-to-employee communication among top Slovenian employers from the Golden Thread Survey. The paper analyzes the changes and impact of the deteriorating external economic situation on (a company-employee relational trust, and on the (b perceived importance of “trust and long-term relationships with the company in the eyes of the customer” by respondent managers. Furthermore, our analysis also looks at the impact of management-to-employee communication on both trust perspectives. The results show a stable level of company-employee relational trust in the face of the current economic crisis, despite a high level of perceived organizational process changes and a sharp decline in financial performance. On the other hand, the perceived importance of “trust and long-term relationships with the company in the eyes of the customer” has increased substantially as the crisis has deepened, supporting our claim that relationships and the external relationship orientation gain importance in the time of crisis. There is also a strong link between the degree of open and frequent management-to-employee communication, and both perspectives of measured trust among top Slovenian employers.

  3. Balancing Trust and Control

    DEFF Research Database (Denmark)

    Jagd, Søren

    This paper focuses on the leadership challenge of balancing trust and control. The relation between trust and control has for a long time been a puzzling issue for management researchers. In the paper I first show that there has been a dramatic change in the way the relation between trust...... and control has been conceptualized in trust research. While the relation between trust and control earlier was conceptualized as a more or less stable balance between trust and control, more recent research conceptualizes the relation between trust and control more as a dynamical process that involves...... an ongoing process of balancing the relation between trust and control. Second, taking the departure in the recent conceptualization of the balance between trust and control as an interactive process I discuss the challenges for management in handling this more subtle balancing of trust and control...

  4. Online reputation systems: The effects of feedback comments and reactions on building and rebuilding trust in online auctions

    NARCIS (Netherlands)

    Utz, S.; Matzat, U.; Snijders, C.

    2009-01-01

    Previous research on reputation systems primarily focused on their trust-building function. The present research addresses their trust-rebuilding function-specifically, the role of the short text comments given in reaction to negative feedback. Rebuilding trust is often necessary because on-line

  5. Towards a Model of Open and Reliable Cognitive Multiagent Systems: Dealing with Trust and Emotions

    Directory of Open Access Journals (Sweden)

    Ricardo SILVEIRA

    2016-06-01

    Full Text Available  Open multiagent systems are those in which the agents can enter or leave the system freely. In these systems any entity with unknown intention can occupy the environment. For this scenario trust and reputation mechanisms should be used to choose partners in order to request services or delegate tasks. Trust and reputation models have been proposed in the Multiagent Systems area as a way to assist agents to select good partners in order to improve interactions between them. Most of the trust and reputation models proposed in the literature take into account their functional aspects, but not how they affect the reasoning cycle of the agent. That is, under the perspective of the agent, a trust model is usually just a “black box” and the agents usually does not take into account their emotional state to make decisions as well as humans often do. As well as trust, agent’s emotions also have been studied with the aim of making the actions and reactions of the agents more like those of humans being in order to imitate their reasoning and decision making mechanisms. In this paper we analyse some proposed models found in the literature and propose a BDI and multi-context based agent model which includes emotional reasoning to lead trust and reputation in open multiagent systems.

  6. Know what you trust

    NARCIS (Netherlands)

    Spiessens, F.; den Hartog, Jeremy; Etalle, Sandro; Degano, P.; Guttman, J. D.; Martinelli, F.

    2009-01-01

    In Decentralized Trust Management (DTM) authorization decisions are made by multiple principals who can also delegate decisions to each other. Therefore, a policy change of one principal will often affect who gets authorized by another principal. In such a system of influenceable authorization a

  7. Task conflict and relationship conflict in top management teams: the pivotal role of intragroup trust.

    Science.gov (United States)

    Simons, T L; Peterson, R S

    2000-02-01

    Task conflict is usually associated with effective decisions, and relationship conflict is associated with poor decisions. The 2 conflict types are typically correlated in ongoing groups, however, which creates a prescriptive dilemma. Three explanations might account for this relationship--misattribution of task conflict as relationship conflict, harsh task conflict tactics triggering relationship conflict, and misattribution of relationship conflict as task conflict. The authors found that intragroup trust moderates the relationship between task conflict and relationship conflict in 70 top management teams. This result supports the "misattribution of task conflict" explanation. The authors also found a weak effect that is consistent with the argument that tactical choices drive the association between the 2 conflict types. We infer that trust is a key to gaining the benefits of task conflict without suffering the costs of relationship conflict.

  8. Operating Security System Support for Run-Time Security with a Trusted Execution Environment

    DEFF Research Database (Denmark)

    Gonzalez, Javier

    Software services have become an integral part of our daily life. Cyber-attacks have thus become a problem of increasing importance not only for the IT industry, but for society at large. A way to contain cyber-attacks is to guarantee the integrity of IT systems at run-time. Put differently......, it is safe to assume that any complex software is compromised. The problem is then to monitor and contain it when it executes in order to protect sensitive data and other sensitive assets. To really have an impact, any solution to this problem should be integrated in commodity operating systems...... sensitive assets at run-time that we denote split-enforcement, and provide an implementation for ARM-powered devices using ARM TrustZone security extensions. We design, build, and evaluate a prototype Trusted Cell that provides trusted services. We also present the first generic TrustZone driver...

  9. Trust and controlling

    OpenAIRE

    Bieńkowska Agnieszka; Zabłocka-Kluczka Anna

    2016-01-01

    The purpose of this study is to discuss the trust within and towards an organisation in the context of implementation of controlling therein. In this context the essence of trust and its importance in organisation management was presented, as well as trust in the contemporary management methods and concepts. Controlling as a trust-building factor inside an organisation was pointed out. Especially controlling and control were described. Moreover management by considering deviations in controll...

  10. Secure Trust Based Key Management Routing Framework for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jugminder Kaur

    2016-01-01

    Full Text Available Security is always a major concern in wireless sensor networks (WSNs. Several trust based routing protocols are designed that play an important role in enhancing the performance of a wireless network. However they still have some disadvantages like limited energy resources, susceptibility to physical capture, and little protection against various attacks due to insecure wireless communication channels. This paper presents a secure trust based key management (STKF routing framework that establishes a secure trustworthy route depending upon the present and past node to node interactions. This route is then updated by isolating the malicious or compromised nodes from the route, if any, and a dedicated link is created between every pair of nodes in the selected route with the help of “q” composite random key predistribution scheme (RKPS to ensure data delivery from source to destination. The performance of trust aware secure routing framework (TSRF is compared with the proposed routing scheme. The results indicate that STKF provides an effective mechanism for finding out a secure route with better trustworthiness than TSRF which avoids the data dropping, thereby increasing the data delivery ratio. Also the distance required to reach the destination in the proposed protocol is less hence effectively utilizing the resources.

  11. Anomaly Detection for Internet of Vehicles: A Trust Management Scheme with Affinity Propagation

    Directory of Open Access Journals (Sweden)

    Shu Yang

    2016-01-01

    Full Text Available Anomaly detection is critical for intelligent vehicle (IV collaboration. Forming clusters/platoons, IVs can work together to accomplish complex jobs that they are unable to perform individually. To improve security and efficiency of Internet of Vehicles, IVs’ anomaly detection has been extensively studied and a number of trust-based approaches have been proposed. However, most of these proposals either pay little attention to leader-based detection algorithm or ignore the utility of networked Roadside-Units (RSUs. In this paper, we introduce a trust-based anomaly detection scheme for IVs, where some malicious or incapable vehicles are existing on roads. The proposed scheme works by allowing IVs to detect abnormal vehicles, communicate with each other, and finally converge to some trustworthy cluster heads (CHs. Periodically, the CHs take responsibility for intracluster trust management. Moreover, the scheme is enhanced with a distributed supervising mechanism and a central reputation arbitrator to assure robustness and fairness in detecting process. The simulation results show that our scheme can achieve a low detection failure rate below 1%, demonstrating its ability to detect and filter the abnormal vehicles.

  12. THE IMPACT OF TRUST ON KNOWLEDGE TRANSFER IN INTERNATIONAL BUSINESS SYSTEMS

    Directory of Open Access Journals (Sweden)

    Konstantinos P. ROTSIOS

    2012-12-01

    Full Text Available Over the last decade, international business alliances have emerged as one of the most important strategies for firms to expand in international markets. In addition, knowledge transfer has been determined as one of the key factors that lead to the creation of sustainable competitive advantage for firms and to the success of learning alliances. Furthermore, trust enhances the effectiveness of this process. The growing volume of published research in recent years has indubitably revealed the significant role of trust on knowledge transfer in International Business (IB Systems and in particular in International Strategic Alliances (ISAs and International Joint Ventures (IJVs. This paper consists of an in depth review of the most recent literature about the impact of trust on transfer of various types of knowledge in IB Systems with reference to the relevant theoretical models and the applications in the international context. The first section contains the theoretical background of the concept of trust, the different types of knowledge and the process of knowledge transfer. The main section refers to a few contemporary and distinguished scientific articles about the impact of trust as a determinant factor of knowledge transfer from the most recent international literature. The conclusions of the literature review and testable propositions related to the creation of trust among IJV partners and their impact on knowledge transfer are presented at the final section of the paper.

  13. Building Trust in Natural Resource Management Within Local Communities: A Case Study of the Midewin National Tallgrass Prairie

    Science.gov (United States)

    Davenport, Mae A.; Leahy, Jessica E.; Anderson, Dorothy H.; Jakes, Pamela J.

    2007-03-01

    Communities neighboring federally protected natural areas regularly weigh the costs and benefits of the administering agency’s programs and policies. While most agencies integrate public opinion into decision making, efforts to standardize and formalize public involvement have left many local communities feeling marginalized, spurring acrimony and opposition. A significant body of research has examined barriers to effective public participation as well as strategies for relationship building in planning processes; many of which point to trust as a key factor. Trust is especially tenuous in local communities. This paper explores perceptions of trust, expectations for management, as well as constraints to building trust. In-depth interviews were conducted with 21 community members and USDA Forest Service personnel at the Midewin National Tallgrass Prairie in northeastern Illinois. The interviews revealed that trust is perceived as important to effective management. Distinct expectations for management outcomes and processes emerged, including the values, knowledge, and capacity demonstrated in management decisions and actions and opportunities provided for communication, collaboration, and cooperation within the agency-community relationship. The case study identified several constraints to building trust, including competing values, knowledge gaps, limited community engagement, and staff turnover.

  14. New information and social trust: asymmetry and perseverance of attributions about hazard managers.

    Science.gov (United States)

    Cvetkovich, George; Siegrist, Michael; Murray, Rachel; Tragesser, Sarah

    2002-04-01

    It has been argued that news about negative events has a much stronger effect on decreasing social trust than does news about positive events on increasing it. This asymmetry principle of trust was investigated in two surveys that also investigated the perseverance of trust. The possibility that established trust attributions persevere in the face of new information raises questions about the limits of trust asymmetry. The two studies yielded evidence that both type of news (good versus bad) and initial general trust in the nuclear power industry or the food supply industry affected level of trust. Compared to individuals trusting the industry, those distrusting the industry exhibited less trust following both bad and good news events. Study I also found that judged informativeness and judged positiveness of news events were affected by type of news and general trust of the industry. Individuals low in general trust of the nuclear power industry judged both bad news and good news as less positive than did those high in general trust. Those low in general trust judged bad news as more informative than good news and than did those high in general trust. An important implication of the perseverance of trust is to focus attention on including not only the effects of information about specific events and actions, but also on the judgment processes underlying social trust. The Salient Value Similarity model is suggested as one way of accounting for these psychological processes.

  15. THE TRUST INSTITUTION ROLE IN THE MANAGEMENT OF COMMUNICATIONS IN SOCIAL PROJECT

    Directory of Open Access Journals (Sweden)

    Ирина Николаевна КАДЫКОВА

    2015-05-01

    Full Text Available The authors propose expansion of the social projects classification on the basis of the magnitude of the projects products impact on the society, focusing on their role in the development of the state. The authors accept Russell D. Archibald projects classification as a whole, and expand it. Two subcategory are allocated ("social applied projects" and "socio-forming projects". Comparison was conducted on a number of indicators (project volume, project complexity, level of project risk and so on.. The innovativeness of innovative social-forming projects is identified. They are innovative in that aim formation / change of public opinion. The role of the institute of trust in building of effective system of social project communication is defined. The trust has a significant impact on the timing of the socio-forming projects. Identify priority communication channel for innovative projects of the social spectrum - online social network.

  16. Trust Management for Encounter-Based Routing in Delay Tolerant Networks

    Science.gov (United States)

    2010-05-15

    8217 4 O-i 0.5 E 1.6 a 90% M 300 i / fc -vfc 0.8:0.2 « 2 1 IDS 6OO5 Oil (0, 2] mis D WS p/DS 0.5% Eo [12,24] hrs I/;.• [160,320 480] min. Below we...34 IEEE Infocom, Barcelona , Spain, Apr. 2006, pp. 1-11. [3] J.H. Cho, A. Swami and I.R. Chen, "Modeling and Analysis of Trust Management for Cognitive

  17. Trust matters

    DEFF Research Database (Denmark)

    Østergaard, Lise Rosendal

    2015-01-01

    This article makes a contribution to the debate about health service utilisation and the role of trust in fostering demand for health services in sub-Saharan Africa. It is framed as a narrative literature review based on a thematic analysis of nine empirical, qualitative studies. For the purposes...... of this article trust is defined as a voluntary course of action, which involves the optimistic expectation that the trustee will do no harm to the trustor and is increasingly perceived as an important influence on health system functioning. The article looks at trust issues in interpersonal, intergroup...... and institutional situations. The findings of the review point to four elements that are important for trust to develop in health sector relationships: the sensitive use of discretionary power by health workers, perceived empathy by patients of the health workers, the quality of medical care and workplace...

  18. Environmental Management System

    Science.gov (United States)

    Goals Recycling Green Purchasing Pollution Prevention Reusing Water Resources Environmental Management Stewardship » Environmental Protection » Environmental Management System Environmental Management System An Environmental Management System is a systematic method for assessing mission activities, determining the

  19. The Influence Of Franchisors Brand Image On Franchisee Trust And Its Impact On Franchisee Intention To Remain In Franchise System

    Directory of Open Access Journals (Sweden)

    Erlinda

    2015-08-01

    Full Text Available Franchisee is the party that play important role in the franchising because most of franchise outlets managed and operated by franchisees. Nevertheless in the process of business operating there would be the conflict of interests between franchisor as the owner of brand with the franchisee as the buyer of franchisors brand to operating retail outlet.and bound with futures contract. Therefore franchisee trust is needed in order to maintain franchisee intention to remain in franchise system. One of the most important elements in franchising is franchisors brand image because basically franchise is selling the brand. Therefore this study aims to examine franchisee intention to remain in franchise system through franchisee trust that influenced by franchisors brand image. This study is conducted in Aceh province Indonesia. Using causality-explanatory approach with primary data in the form of perception opinions and attitude of 134 franchisees as individual research object. The method of data collection is survey using questionnaire. Regarding time dimension is one shot study. Partial Least Square is used to analyze the data. The result shows that franchisors brand image have a positive significant influence greater through franchisee trust than a direct influence of franchisors brand image to franchisee intention to remain in franchise system.

  20. Modelling End-User of Electronic-Government Service: The Role of Information quality, System Quality and Trust

    Science.gov (United States)

    Witarsyah Jacob, Deden; Fudzee, Mohd Farhan Md; Aizi Salamat, Mohamad; Kasim, Shahreen; Mahdin, Hairulnizam; Azhar Ramli, Azizul

    2017-08-01

    Many governments around the world increasingly use internet technologies such as electronic government to provide public services. These services range from providing the most basic informational website to deploying sophisticated tools for managing interactions between government agencies and beyond government. Electronic government (e-government) aims to provide a more accurate, easily accessible, cost-effective and time saving for the community. In this study, we develop a new model of e-government adoption service by extending the Unified Theory of Acceptance and Use of Technology (UTAUT) through the incorporation of some variables such as System Quality, Information Quality and Trust. The model is then tested using a large-scale, multi-site survey research of 237 Indonesian citizens. This model will be validated by using Structural Equation Modeling (SEM). The result indicates that System Quality, Information Quality and Trust variables proven to effect user behavior. This study extends the current understanding on the influence of System Quality, Information Quality and Trust factors to researchers, practitioners, and policy makers.

  1. Active and Passive User Trust in Sociotechnical Systems

    Science.gov (United States)

    2015-09-28

    Drury ,   2000)   was   used  for  measuring  trust  quantitatively  and  an  open  ended  question  was  used  for...is  severe   “If  something  goes  wrong,  there  is  an   accountability  nightmare.”  (P)     DISTRIBUTION A...for public release. AFOSR Grant FA9550-12-1-0311   it  did  not  take  the  whole  task  process  into  

  2. Pharmaceutical industry gifts to physicians: patient beliefs and trust in physicians and the health care system.

    Science.gov (United States)

    Grande, David; Shea, Judy A; Armstrong, Katrina

    2012-03-01

    Pharmaceutical industry gifts to physicians are common and influence physician behavior. Little is known about patient beliefs about the prevalence of these gifts and how these beliefs may influence trust in physicians and the health care system. To measure patient perceptions about the prevalence of industry gifts and their relationship to trust in doctors and the health care system. Cross sectional random digit dial telephone survey. African-American and White adults in 40 large metropolitan areas. Respondents' beliefs about whether their physician and physicians in general receive industry gifts, physician trust, and health care system distrust. Overall, 55% of respondents believe their physician receives gifts, and 34% believe almost all doctors receive gifts. Respondents of higher socioeconomic status (income, education) and younger age were more likely to believe their physician receives gifts. In multivariate analyses, those that believe their personal physician receives gifts were more likely to report low physician trust (OR 2.26, 95% CI 1.56-3.30) and high health care system distrust (OR 2.03, 95% CI 1.49-2.77). Similarly, those that believe almost all doctors accept gifts were more likely to report low physician trust (OR 1.69, 95% CI 1.25-2.29) and high health care system distrust (OR 2.57, 95% CI 1.82-3.62). Patients perceive physician-industry gift relationships as common. Patients that believe gift relationships exist report lower levels of physician trust and higher rates of health care system distrust. Greater efforts to limit industry-physician gifts could have positive effects beyond reducing influences on physician behavior.

  3. Quality management system

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Mu Sung

    2009-08-15

    This book deals with ISO9001 quality management system which includes summary of this system such as classification of quality, principle of quality management, and definition, requirement and procedure of quality management system, introduction of ISO9001 system like model of ISO9001 quality management system, ISO certificate system, structure of ISO9001 standard, requirement of ISO9001 quality management system, process approach and documentation of system, propel cases of ISO9001 quality management system.

  4. Quality management system

    International Nuclear Information System (INIS)

    Lee, Mu Sung

    2009-08-01

    This book deals with ISO9001 quality management system which includes summary of this system such as classification of quality, principle of quality management, and definition, requirement and procedure of quality management system, introduction of ISO9001 system like model of ISO9001 quality management system, ISO certificate system, structure of ISO9001 standard, requirement of ISO9001 quality management system, process approach and documentation of system, propel cases of ISO9001 quality management system.

  5. Overview of royalty trusts

    International Nuclear Information System (INIS)

    Panarites, P.

    1996-01-01

    The nature of royalty trusts as a means of financing exploration, development, production, and refining of oil sand and heavy oil to produce competitively marketable petroleum products, was reviewed. Attributes of the two distinct classes of royalty trusts - reflexive class and the fundamental class royalty trusts - and the considerations underlying each one, were summarized. The overall conclusion was that the future performance of conventional oil and gas royalty trusts (reflexive class) will depend heavily on interest rate levels and management's ability to complete acquisitions financed with new trust unit issues. Fundamental class royalty trusts also offer long term pure exposure to the underlying business, in addition to yield

  6. From transformative learning to social change? Using action research to explore and improve informal complaints management in an NHS trust

    Directory of Open Access Journals (Sweden)

    Anki Odelius

    2015-05-01

    Full Text Available Background: The number of complaints from patients and/or carers concerning aspects of care has increased over time. Yet, in spite of a growing body of national and international literature on healthcare complaints, there is a lack of knowledge around how nurses and midwives manage informal complaints at ward level, or staff needs in relation to this. Aim: Using an action research approach with mixed methods, four phases and four cycles, the aim was to explore informal complaints management by nurses and midwives at ward level. We discuss the action research process primarily in connection with learning and service change, drawing from the qualitative data in this paper. Findings: The analysis of the collected qualitative data resulted in three main themes, related to the complexities of complaints and complaints management, staff support needs and the existing ambiguous complaints systems, which are hard for staff and service users to negotiate. The action research approach facilitated learning and change in participants in relation to complaints management, in the collaborating trust. Conclusions: The extant body of research on complaints does not sufficiently recognise the complexity of complaints and informal complaints management, or the complaints systems that are in place. Needs-based staff training can help support staff to manage informal complaints more effectively. Implications for practice: • There needs to be recognition of the complexities involved in complaints management • Complaints systems need to be clearer for the benefit of service users and staff • Staff need training and support that is tailored to their needs to improve their response to complaints, leading to a better patient experience • Limited interventions, informed by staff needs, can lead to change and act as a catalyst for a wider change in informal complaints management

  7. Institutional trust in the national social security and municipal healthcare systems for the elderly in Japan.

    Science.gov (United States)

    Murayama, Hiroshi; Taguchi, Atsuko; Ryu, Shuhei; Nagata, Satoko; Murashima, Sachiyo

    2012-09-01

    Japanese social security systems and institutions for the elderly, as well as the general attitude toward elderly care services among the Japanese population, have been undergoing a dramatic change. By examining the association between institutional trust, which is a representative element of social capital, and anxiety regarding receiving elderly care, we can uncover clues toward building a more robust social security system for the elderly. This study examines the relationship between institutional trust, in the national social security and municipal healthcare systems for the elderly, and anxiety with respect to receiving elderly care among the general Japanese population. A cross-sectional survey was conducted using a self-administered questionnaire that was returned by mail in January and February 2005. The target population was 4735 community residents aged 20-75 years, who lived in the city of Koka, Shiga, Japan. A total of 2264 questionnaires were included in the analysis. A binominal logistic regression analysis showed that responses of 'trust' [odds ratio (OR): 2.09, 95% confidence interval (95% CI): 1.01-4.30] and 'strongly trust' (OR: 3.80, 95% CI: 1.55-9.31) for the national system were associated with not having anxiety regarding elderly care, compared with the reference category of feeling strongly distrust. However, trust in the municipal system showed no association with this anxiety. These results indicate the importance of developing strategies to increase a common trust in the national care services for the elderly to reduce the anxiety people feel regarding whether they will be able to receive elderly care when required.

  8. Early experiences with the multidose drug dispensing system – A matter of trust?

    Science.gov (United States)

    Wekre, Liv Johanne; Melby, Line; Grimsmo, Anders

    2011-01-01

    Objective To study early experiences with multidose drug dispensing (MDD) among different groups of health personnel. Design Qualitative study based on focus-group interviews. Setting Primary health care, Trondheim, Norway. Main outcome The importance of trust in the technology and in collaborating partners is actualized in the early implementation of MDD. Results GPs, home-care nurses, pharmacists, and medical secretaries trusted the new MDD technology. The quality of the GPs’ medication records improved. However, health personnel, including the GPs themselves, would not always trust the medication records of the GPs. Checking the multidose bags arriving from the pharmacy was considered unnecessary in the written routines dealing with MDD. However, home-care nurses experienced errors and continued to manually check the bags. Nurses in the home-care service felt a loss of knowledge with regard to the patients’ medications and in turn experienced reduced ability to give medical information to patients and to observe the effects of the drugs. The home-care services’ routines for drug handling were not always trusted by the other groups of health personnel involved. Conclusion Health personnel faced some challenges during the implementation of the MDD system, but most of them remained confident in the new system. Building trust has to be a process that runs in parallel with the introduction of new technology and the establishment of new routines for improving the quality in handling of medicines and to facilitate better cooperation and communication. PMID:21323496

  9. Assess and enhance public trust

    Science.gov (United States)

    Patricia Winter; James Absher; Alan Watson

    2007-01-01

    Trust is a form of social capital, facilitating effective land management, communication and collaboration. Although trust in the Forest Service is at least moderately high for most publics, evidence of a lack of trust and outright distrust has been found in some communities. However, the amount, types, and conditions of trust necessary for effective management to...

  10. Measurement of worker perceptions of trust and safety climate in managers and supervisors at commercial grain elevators.

    Science.gov (United States)

    Mosher, G A; Keren, N; Freeman, S A; Hurburgh, C R

    2013-04-01

    The safety climate of an agricultural workplace may be affected by several things, including the level of trust that workers have in their work group supervisor and organizational management. Safety climate has been used by previous safety researchers as a measure of worker perceptions of the relative importance of safety as compared with other operational goals. Trust has been linked to several positive safety outcomes, particularly in hazardous work environments, but has not been examined relative to safety climate in the perennially hazardous work environment of a commercial grain elevator. In this study, 177 workers at three Midwest grain elevator companies completed online surveys measuring their perceptions of trust and safety at two administrative levels: organizational management and work group supervisors. Positive and significant relationships were noted between trust and safety climate perceptions for organizational managers and for work group supervisors. Results from this research suggest that worker trust in organizational management and work group supervisors has a positive influence on the employees' perceptions of safety climate at the organizational and work group levels in an agricultural workplace.

  11. RELATIONSHIP BETWEEN THE ORGANIZATIONAL COMMITMENT WITH THE TRUST TO MANAGEMENT OF THE ATHLETES

    Directory of Open Access Journals (Sweden)

    Ercan ZORBA

    2015-08-01

    Full Text Available The aim of this study is to determine whether the relationship between organizational trust and organizational commitment. In order words, is intended to determine whether an effective factor on organizational commitment of the trusth levels to management of athletes. As research data collection tool is used the short form of Organizational trust Inventory developed by Bromiley and Cummings (1996. Tüzün (2006 has turned the Turkish and has tested of scale reliability and validity using the varimax rotated factor analysis. According to Alpha (Cronbach's alpha is designated as the reliability coefficient of 0.84. The obtained data are calculated frequency and percent values. In the analysis of data was used independent sample t tes t and One - way analysis of variance (ANOVA. In addition, is used "Personal Information Form" prepared by the researcher to achieve to some personal information of participants. The universe of this study, is creating licensed athletes in sports clubs, samp le; who voluntarily agree to participate in research constitutes 240 licensed athletes from sports club in Muğla. When examined by gender and organizational commitment status, although a have higher women than men organizational commitment scores, there is no commitment levels significant difference at the 0.05 level. Organizational commitment status was higher married participants than single participants also p <0.05 level has a significant difference. According to the education level, has a significant difference p<0.05 level among organizational commitment scores. As a result, a tendency to participate in high - level statements about the participants' emotional and cognitive organizational trust can say they play. We can say that the statements were und ecided about emotional commitment. Statements regarding the normative commitment and high level of participation is seen as unstable and exhibits a high level of participation towards their continued

  12. Fording Canadian Coal Trust

    Energy Technology Data Exchange (ETDEWEB)

    Popowich, J.; Millos, R. [Elk Valley Coal Corporation, Calgary, AB (Canada)

    2004-07-01

    This is the first of five slide/overhead presentations presented at the Fording Canadian Coal Trust and Tech Cominco Ltd. investor day and mine tour. The Fording Canadian Coal Trust is described. The Trust's assets comprise six Elk Valley metallurgical coal mines and six wollastonite operations (in the NYCO Group). Trust structure, corporate responsibility, organizational structure, reserves and resources, management philosophy, operating strategies, steel market dynamics, coal market, production expansion, sales and distribution are outlined. 15 figs., 5 tabs.

  13. Facilitating a just and trusting culture.

    Science.gov (United States)

    Pattison, Jill; Kline, Theresa

    2015-01-01

    The purpose of this paper is to identify managerial and organizational characteristics and behaviors that facilitate the fostering of a just and trusting culture within the healthcare system. Two studies were conducted. The initial qualitative one was used to identify themes based on interviews with health care workers that facilitate a just and trusting culture. The quantitative one used a policy-capturing design to determine which factors were most likely to predict outcomes of manager and organizational trust. The factors of violation type (ability vs integrity), providing an explanation or not, blame vs no blame by manager, and blame vs no blame by organization were all significant predictors of perceptions of trust. Limitations to the generalizability of findings included both a small and non-representative sample from one health care region. The present findings can be useful in developing training systems for managers and organizational executive teams for managing medical error events in a manner that will help develop a just and trusting culture. A just and trusting culture should enhance the likelihood of reporting medical errors. Improved reporting, in turn, should enhance patient safety. This is the first field study experimentally manipulating aspects of organizational trust within the health care sector. The use of policy-capturing is a unique feature that sheds light into the decision-making of health care workers as to the efficaciousness of particular managerial and organizational characteristics that impact a just and trusting culture.

  14. [Crises of trust].

    Science.gov (United States)

    Chen, Thai-Form; Tseng, Hsing-Chau

    2006-02-01

    Extensive media coverage is warning of a crisis of trust that has emerged as a serious issue in our society. This article explores the meaning of "crisis," concepts of crisis management, mechanisms for building trust, and the underlying significance of trust and distrust. Evidence is adduced to testify to the erosion of trust and factors in our society that reflect the potential for crises of trust. Organizational decision makers, including hospital managers, are urged to identify and reflect upon weaknesses in their organizations in order that remedial action can be taken to preempt such crises.

  15. Bridge Management Systems

    DEFF Research Database (Denmark)

    Thoft-Christensen, Palle

    In this paper bridge management systems are discussed with special emphasis on management systems for reinforced concrete bridges. Management systems for prestressed concrete bridges, steel bridges, or composite bridges can be developed in a similar way....

  16. Why are Industrial Relations in Spain Competitive? Trust in Management, Union Support and Conflict Behaviour in Worker Representatives

    Directory of Open Access Journals (Sweden)

    Patricia Elgoibar

    2013-04-01

    Full Text Available In the current context of limited resources and economic, social and labour changes, organizational conflicts are becoming more and more competitive. Two possible explanations for this approach to conflict in Spain are the low trust between unions and management and the long tradition of confrontation in industrial relations. In this study we analyse the conflict pattern from worker representatives and the relation to trust in management and union support. The hypotheses are tested in a quantitative study of 719 representatives. Results show that a representatives use a competitive conflict style; b trust is negatively related to this style; and c union support is positively related to the style. We explore how societal culture and historical industrial relations tradition explain these relations.

  17. Small supermarket management system

    Institute of Scientific and Technical Information of China (English)

    曹正

    2016-01-01

    This system USES the Java language in the MyEclipse platform development tool, SQL2005 as the database platform for data and data, the SQL2005 required for the user operating system. It mainly implements the daily management of goods, including purchase management, inventory management, sales management, personnel management and supplier management. The system can also complete the functions of browsing, querying, adding, deleting and modifying relevant information. This topic is the core of the stock management, inventory management and sales management, at the same time, the system also has the full user management and permissions management function..

  18. A model for (re)building consumer trust in the food system.

    Science.gov (United States)

    Wilson, Annabelle M; Withall, Elizabeth; Coveney, John; Meyer, Samantha B; Henderson, Julie; McCullum, Dean; Webb, Trevor; Ward, Paul R

    2017-12-01

    The article presents a best practice model that can be utilized by food system actors to assist with (re)building trust in the food system, before, during and after a food incident defined as 'any situation within the food supply chain where there is a risk or potential risk of illness or confirmed illness or injury associated with the consumption of a food or foods' (Commonwealth of Australia. National Food Incident Response Protocol. Commonwealth of Australia, Canberra, 2012). Interviews were undertaken with 105 actors working within the media, food industry and food regulatory settings across Australia, New Zealand (NZ) and the United Kingdom (UK). Interview data produced strategy statements, which indicated participant views on how to (re)build consumer trust in the food system. These included: (i) be transparent, (ii) have protocols and procedures in place, (iii) be credible, (iv) be proactive, (v) put consumers first, (vi) collaborate with stakeholders, (vii) be consistent, (viii) educate stakeholders and consumers, (ix) build your reputation and (x) keep your promises. A survey was designed to enable participants to indicate their agreement/disagreement with the ideas, rate their importance and provide further comment. The five strategies considered key to (re)building consumer trust were used to develop a model demonstrating best practice strategies for (re)building consumer trust in the food system before, during and after a food incident. In a world where the food system is increasingly complex, strategies for (re)building and fostering consumer trust are important. This study offers a model to do so which is derived from the views and experiences of actors working across the food industry, food regulation and the media. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  19. Development and testing of the Multidimensional Trust in Health Care Systems Scale.

    Science.gov (United States)

    Egede, Leonard E; Ellis, Charles

    2008-06-01

    To describe the development and psychometric testing of the Multidimensional Trust in Health Care Systems Scale (MTHCSS). Scale development occurred in 2 phases. In phase 1, a pilot instrument with 70 items was generated from the review of the trust literature, focus groups, and expert opinion. The 70 items were pilot tested in a sample of 256 students. Exploratory factor analysis was used to derive an orthogonal set of correlated factors. In phase 2, the final scale was administered to 301 primary care patients to assess reliability and validity. Phase 2 participants also completed validated measures of patient-centered care, health locus of control, medication nonadherence, social support, and patient satisfaction. In phase 1, a 17-item scale (MTHCSS) was developed with 10 items measuring trust in health care providers, 4 items measuring trust in health care payers, and 3 items measuring trust in health care institutions. In phase 2, the 17-item MTHCSS had a mean score of 63.0 (SD 8.8); the provider subscale had a mean of 40.0 (SD 6.2); the payers subscale had a mean of 12.8 (SD 3.0); and the institutions subscale had a mean of 10.3 (SD 2.1). Cronbach's alpha for the MTHCSS was 0.89 and 0.92, 0.74, and 0.64 for the 3 subscales. The MTHCSS was significantly correlated with patient-centered care (r = .22 to .62), locus of control-chance (r = .42), medication nonadherence (r = -.22), social support (r = .25), and patient satisfaction (r = .67). The MTHCSS is a valid and reliable instrument for measuring the 3 objects of trust in health care and is correlated with patient-level health outcomes.

  20. Exploring HRD in two Welsh NHS Trusts: analysing the discursive resources used by senior managers.

    Science.gov (United States)

    Sambrook, Sally

    2007-01-01

    The purpose of this paper is to examine human resource development (HRD) in the UK National Health Service (NHS), and particularly in two Welsh NHS Trusts, to help illuminate the various ways in which learning, training and development are talked about. The NHS is a complex organisation, not least with its recent devolution and separation into the four distinct countries of the UK. Within this, there are multiple and often conflicting approaches to human resource development associated with the various forms of employee, professional (nursing, medical etc.), managerial and organisational development. How people are developed is crucial to developing a modern health service, and yet, with the diverse range of health workers, HRD is a complex process, and one which receives little attention. Managers have a key role and their perceptions of HRD can be analysed through the discursive resources they employ. From an interpretivist stance, the paper employs semi-structured interviews with seven Directorate-General Managers, and adopts discourse analysis to explore how HRD is talked about in two Welsh NHS Trusts. The paper finds some of the different discourses used by different managers, including those with a nursing background and those without. It examines how they talk about HRD, and also explores their own (management) development and the impact this has had on their sense of identity. The paper highlights some of the tensions associated with HRD in the NHS, including ambiguities between professional and managerial development, the functional and physical fragmentation of HRD, conflict between a focus on performance/service delivery and the need to learn, discursive dissonance between the use of the terms training and learning, a delicate balance between "going on courses" and informal, work-related learning, inequities regarding "protected time" and discourses shifting between competition and cooperation. These tensions are exposed to help develop a shared

  1. The Influence of Trust on Project Management Practice within the Construction Industry

    Directory of Open Access Journals (Sweden)

    Scott Strahorn

    2017-03-01

    Full Text Available Given that any construction project is inherently a human endeavour, it follows that issues of trust are significant in terms of the stakeholder interactions that deliver eventual project outcomes.  Previous research indicates that the relational basis upon which projects are undertaken are intended to influence the likelihood of trusting relationships between stakeholders.  Thus, experiences of trust in a construction project environment are likely to be influenced by the contextual specifics of respective transactional and relational contracting (RC procurement mechanisms, given the divergent theoretical principles upon which they are founded.  The influence of trust has therefore been examined through the lived experiences of construction practitioners.  A phenomenological interview study consisting of thirty-five (35 participants was conducted with sensitivity to the procurement of experiences being recounted. Issues of trust were shown to be integral to stakeholder experiences in both procurement environments, with the benefits of trust acknowledged in many instances.  However, little understanding was evident regarding methods for building and maintaining trust, nor for repairing trust when problems arose. Importantly, despite the differing principles that underpin transactional and relational procurement, and particularly the contention that relational procurement would increase trust between trading partners, this was not evident; with individual personalities and appropriate risk apportionment shown to be greater influences upon the likelihood of trusting relationships.  It is reasonable to conjecture that relational contracts actually diminish the need for trust, given that the objective is to reduce uncertainty through formulaic approaches to risk distribution and reward; the absence of risk negates the need for trust.  Ultimately, the potential to deliver improved project outcomes as a result of proactive approaches to

  2. ComTrustO: Composite Trust-Based Ontology Framework for Information and Decision Fusion

    Science.gov (United States)

    2015-07-06

    11] presents a methodological approach for ontology management allowing development of extensible ontologies and the mapping from ontologies to...ComTrustO: Composite Trust-based Ontology Framework for Information and Decision Fusion Alessandro Oltramari Carnegie Mellon University Pittsburgh... ontology -based framework for information fusion, as a support system for human decision makers. In particular, we build upon the concept of composite

  3. 25 CFR 1200.5 - What are the advantages and disadvantages of managing trust funds under the options in § 1200.4?

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false What are the advantages and disadvantages of managing trust funds under the options in § 1200.4? 1200.5 Section 1200.5 Indians OFFICE OF THE SPECIAL TRUSTEE... General Provisions § 1200.5 What are the advantages and disadvantages of managing trust funds under the...

  4. Verification of Triple Modular Redundancy Insertion for Reliable and Trusted Systems

    Science.gov (United States)

    Berg, Melanie; LaBel, Kenneth

    2016-01-01

    If a system is required to be protected using triple modular redundancy (TMR), improper insertion can jeopardize the reliability and security of the system. Due to the complexity of the verification process and the complexity of digital designs, there are currently no available techniques that can provide complete and reliable confirmation of TMR insertion. We propose a method for TMR insertion verification that satisfies the process for reliable and trusted systems.

  5. Public trust doctrine, research and responsible wildlife management in South Africa

    Directory of Open Access Journals (Sweden)

    Andrew C. Blackmore

    2017-06-01

    Full Text Available A significant proportion of South African biodiversity occurs in extensive private wildlife areas. As such, the continuance of these private reserves is paramount to conservation of the country’s biodiversity. The areas are, however, vulnerable to being divided into smaller camps as landowners enter into the new and rapidly growing industry of selective breeding and intensive management of antelope and predators. Concerns are being raised as to the long-term consequences of the products and impacts of this industry on, inter alia, integrity and conservation of the country’s wildlife, and the landscapes these facilities are located in, as well as the country’s reputation as a free ranging and fair chase hunting destination. Using the public trust doctrine as a foundation, this article characterises the relationship between the country’s environmental law and the roles played by government as the regulator, the wildlife industry, research and the public in achieving responsible wildlife management and the long-term conservation of this resource. These relationships are seen to be finely balanced between the provision of robust science, and evidence-based and cautious or risk-averse decision-making. It is concluded that the public trust doctrine is a powerful tool to limit the impacts of unsustainable and parochial use of wildlife on the conservation of biodiversity. It is also concluded that an improved understanding of the doctrine by researchers, public and the wildlife industry would lead to a greater relevance of research, and in turn sound evidence-based decision-making and ultimately sustainable use of wildlife.

  6. Balancing Trust and Control

    DEFF Research Database (Denmark)

    Jagd, Søren

    2010-01-01

    of balancing trust and control becomes an issue that deserve ongoing attention. This paper adds to the discussion on the relation between trust and control by showing that the process perspective reframes the problem of balancing trust and control. More generally, by demonstrating the importance of the process......The purpose of this paper is to show that conceptualizing trust and control as interactively related processes, as opposed to more static conceptualizations of the two concepts and the relations between them, adds importantly towards understanding the challenges involved in balancing of trust...... on trust and control made the problem of finding a balance between trust and control a once and for all decision the process perspective introduced here implies that balancing trust and control is an ongoing process of balancing and rebalancing. The implication for management is that the problem...

  7. Perceptions from the public and private sector on trust and cooperation in the field of environmental management in Lebanon

    NARCIS (Netherlands)

    Abbas, Nivine; van der Molen, I.; Nader, M.; Lovett, Jonathan Cranidge

    2013-01-01

    This paper positions trust and cooperation in the context of environmental management in Lebanon. Previous studies indicated increasing environmental problems in this area. The effectiveness of the Lebanese government to address these challenges has been reported to be constrained by large varieties

  8. Development of a trusted healthcare service to support self-management and a physically active lifestyle in COPD patients

    NARCIS (Netherlands)

    Tabak, Monique; Flierman, I.; van Schooten, B.W.; Hermens, Hermanus J.

    2013-01-01

    Introduction: In chronic disease management, such as in chronic obstructive pulmonary disease (COPD), technology can play an important role to increase the quality and efficiency of care. In the THeCS project, which is part of the large Dutch COMMIT programme, we aim to develop a trusted healthcare

  9. Quantifying Trust, Distrust, and Suspicion in Human-System Interactions

    Science.gov (United States)

    2015-10-26

    communication, psychology , human factors, management, marketing, information technology, and brain/neurology. We first developed a generic model of state...task classification based upon topographic EEG data. Biological Psychology , 1995. 40: p. 239-250. 5. Gevins, A., et al., High-Resolution EEG...Interaction (submitted), 2013. 15. Pouliota, P., et al., Nonlinear hemodynamic responses in human epilepsy : A multimodal analysis with fNIRS-EEG and fMRI

  10. Waste Oriented Innovation Culture-Transparency-Public Trust Cycle : Success Key for Nuclear Facility Management in Indonesia

    International Nuclear Information System (INIS)

    Susetyo Hario Putero; Haryono B Santosa

    2007-01-01

    Radioactive matter that is a primary material in a nuclear facility, including nuclear power generation, is a part of hazardous materials. Its existence will lead a controversy, although the precise management system for handling it is available. Public sometimes reject the nuclear technology due to the lack of understanding and wrong perception on that technology, especially the radioactive waste treatment. So, strategies should be designed for correcting public perception, until public acceptance on utilization of nuclear technology in Indonesia increase. The innovation development on radioactive waste management was studied by observing and interviewing managements and operators of Japan Atomic Energy Agency (JAEA), Japan. The constructing of concept was based on study result. Based on assumption that the current state of the radioactive waste treatment is suitable and there is serious improvement of technology, therefore systematic and precise oriented corrective efforts of public perception could be done. Transparency, intensive communication, and public participation that show responsible action for emerging mutual trust are basic of strategy that should be developed. High level public acceptance on utilization of nuclear technology is expected to be able for stimulating and supporting sustainable technology innovation culture. (author)

  11. Privacy and user trust in context-aware systems

    NARCIS (Netherlands)

    Koldijk, S.J.; Koot, G.; Neerincx, M.A.; Kraaij, W.

    2014-01-01

    Context-aware systems (CAS) that collect personal information are a general trend. This leads to several privacy considerations, which we outline in this paper. We present as use-case the SWELL system, which collects information from various contextual sensors to provide support for well-being at

  12. Distance in Schools: The Influence of Psychological and Structural Distance from Management on Teachers' Trust in Management, Organisational Commitment, and Organisational Citizenship Behaviour

    Science.gov (United States)

    Thomsen, Maren; Karsten, Sjoerd; Oort, Frans J.

    2016-01-01

    This study aimed to examine the relationship between teachers' perceived psychological distance and structural distance from management and teachers' affective organisational commitment (AOC) and organisational citizenship behaviour (OCB). Teachers' trust in management was expected to mediate these relationships. Furthermore, the adequacy and…

  13. The Influence of Trust on Project Management Practice within the Construction Industry

    OpenAIRE

    Strahorn, Scott; Brewer, Graham; Gajendran, Thayaparan

    2017-01-01

    Given that any construction project is inherently a human endeavour, it follows that issues of trust are significant in terms of the stakeholder interactions that deliver eventual project outcomes.  Previous research indicates that the relational basis upon which projects are undertaken are intended to influence the likelihood of trusting relationships between stakeholders.  Thus, experiences of trust in a construction project environment are likely to be influenced by the contextual specific...

  14. Enterprise’s Online Trust Crisis Management: A Life Cycle View

    OpenAIRE

    Zeng , Yitang; Tan , Chunhui

    2014-01-01

    Part 3: Digital Business; International audience; Online trust is the vital mechanism for the development of e-commerce, and the significance of online trust has become a consensus. Undeniably, an obscure message may be magnified indefinitely and evolve into the enterprise’s online trust crisis, which will affect the image of the enterprise, threaten the survival and development of the enterprise, or make the enterprise into a doomed situation that can never be recovered. We study the develop...

  15. On the Tradeoff Between Altruism and Selfishness in MANET Trust Management

    Science.gov (United States)

    2016-04-07

    network deployment, we assume that there is no predefined trust . Without prior interactions, the initial bootstrapping will establish a shallow level of...a challenge/response process (e.g., public key authentication). Over time, partic- ipating nodes will establish a stronger trust level with more...periodically. This will enable each node to compute trust values of other nodes considering the original recommen- dations from the 1-hop neighbors of

  16. Management Data Used to Manage the Foreign Military Sales Trust Fund

    National Research Council Canada - National Science Library

    McKinney, Terry

    1994-01-01

    The overall objective of the audit was to determine whether critical management data were available, accurate, and provided to Fund managers to operate, evaluate, and make major financial and nonfinancial decisions...

  17. Applying Trusted Network Technology To Process Control Systems

    Science.gov (United States)

    Okhravi, Hamed; Nicol, David

    Interconnections between process control networks and enterprise networks expose instrumentation and control systems and the critical infrastructure components they operate to a variety of cyber attacks. Several architectural standards and security best practices have been proposed for industrial control systems. However, they are based on older architectures and do not leverage the latest hardware and software technologies. This paper describes new technologies that can be applied to the design of next generation security architectures for industrial control systems. The technologies are discussed along with their security benefits and design trade-offs.

  18. You Present like a Drug Addict: Patient and Clinician Perspectives on Trust and Trustworthiness in Chronic Pain Management

    Science.gov (United States)

    Ho, Anita; Illes, Judy

    2016-01-01

    Objective. Past research has demonstrated that trust is central to an effective therapeutic relationship, but the role of trust in chronic pain management is not well understood. The objective of this study was to provide an in-depth examination of how adults living with chronic pain negotiate trust and demonstrate trustworthiness with clinicians in therapeutic encounters. Methods. This qualitative study focused on adults living in an urban setting in British Columbia, Canada. Semi-structured interviews (N = 27) were conducted with participants with chronic low back pain. The results were triangulated by two feedback groups comprising re-contacted interview participants (n = 4) and physicians with expertise in pain and addiction management (n = 6). Results. Grounded theory analysis of the adult patient interviews and feedback groups yielded four major themes: 1) threats to trustworthiness and iatrogenic suffering; 2) communicating the invisible and subjective condition of chronic pain; 3) motive, honesty, and testimony; and 4) stigmatized identities. The following two themes emerged from the analysis of the physician feedback group: 1) challenges of the practice context, and 2) complicated clinical relationships. Conclusions. We found that perceived trustworthiness is important in therapeutic encounters as it helps to negotiate tensions with respect to subjective pain symptoms, addiction, and prescription opioid use. An attitude of epistemic humility may help both clinicians and patients cultivate a trustworthy clinical environment, manage the challenges associated with uncertain testimony, place trust wisely, and promote optimal pain care. PMID:26759389

  19. A Method to Increase Drivers' Trust in Collision Warning Systems Based on Reliability Information of Sensor

    Science.gov (United States)

    Tsutsumi, Shigeyoshi; Wada, Takahiro; Akita, Tokihiko; Doi, Shun'ichi

    Driver's workload tends to be increased during driving under complicated traffic environments like a lane change. In such cases, rear collision warning is effective for reduction of cognitive workload. On the other hand, it is pointed out that false alarm or missing alarm caused by sensor errors leads to decrease of driver' s trust in the warning system and it can result in low efficiency of the system. Suppose that reliability information of the sensor is provided in real-time. In this paper, we propose a new warning method to increase driver' s trust in the system even with low sensor reliability utilizing the sensor reliability information. The effectiveness of the warning methods is shown by driving simulator experiments.

  20. Supply Chain Collaboration Roles of Interorganizational Systems, Trust, and Collaborative Culture

    CERN Document Server

    Cao, Mei

    2013-01-01

    To survive and thrive in the competition, firms have strived to achieve greater supply chain collaboration to leverage the resources and knowledge of suppliers and customers.  Internet based technologies, particularly interorganizational systems, further extend the firms’ opportunities to strengthen their supply chain partnerships and share real-time information to optimize their operations.  Supply Chain Collaboration: Roles of Interorganizational Systems, Trust, and Collaborative Culture explores the nature and characteristics, antecedents, and consequences of supply chain collaboration from multiple theoretical perspectives.  Supply Chain Collaboration: Roles of Interorganizational Systems, Trust, and Collaborative Culture conceptualizes supply chain collaboration as seven interconnecting elements including information sharing, incentive alignment, goal congruence, decision synchronization, resource sharing, as well as communication and joint knowledge creation. These seven components define the occur...

  1. Verification of Triple Modular Redundancy (TMR) Insertion for Reliable and Trusted Systems

    Science.gov (United States)

    Berg, Melanie; LaBel, Kenneth A.

    2016-01-01

    We propose a method for TMR insertion verification that satisfies the process for reliable and trusted systems. If a system is expected to be protected using TMR, improper insertion can jeopardize the reliability and security of the system. Due to the complexity of the verification process, there are currently no available techniques that can provide complete and reliable confirmation of TMR insertion. This manuscript addresses the challenge of confirming that TMR has been inserted without corruption of functionality and with correct application of the expected TMR topology. The proposed verification method combines the usage of existing formal analysis tools with a novel search-detect-and-verify tool. Field programmable gate array (FPGA),Triple Modular Redundancy (TMR),Verification, Trust, Reliability,

  2. With directed study before a 4-day operating room management course, trust in the content did not change progressively during the classroom time.

    Science.gov (United States)

    Dexter, Franklin; Epstein, Richard H; Fahy, Brenda G; Van Swol, Lyn M

    2017-11-01

    A 4-day course in operating room (OR) management is sufficient to provide anesthesiologists with the knowledge and problem solving skills needed to participate in projects of the systems-based-practice competency. Anesthesiologists may need to learn fewer topics when the objective is, instead, limited to comprehension of decision-making on the day of surgery, We tested the hypothesis that trust in course content would not increase further after completion of topics related to OR decision-making on the day of surgery. Panel survey. A 4-day 35hour course in OR management. Mandatory assignments before classes were: 1) review of statistics at a level slightly less than required of anesthesiology residents by the American Board of Anesthesiology; and 2) reading of peer-reviewed published articles while learning the scientific vocabulary. N=31 course participants who each attended 1 of 4 identical courses. At the end of each of the 4days, course participants completed a 9-item scale assessing trust in the course content, namely, its quality, usefulness, and reliability. Cronbach alpha for the 1 to 7 trust scale was 0.94. The means±SD of scores were 5.86±0.80 after day #1, 5.81±0.76 after day #2, 5.80±0.77 after day #3, and 5.97±0.76 after day #4. Multiple methods of statistical analysis all found that there was no significant effect of the number of days of the course on trust in the content (all P≥0.30). Trust in the course content did not increase after the end of the 1st day. Therefore, statistics review, reading, and the 1st day of the course appear sufficient when the objective of teaching OR management is not that participants will learn how to make the decisions, but will comprehend them and trust in the information underlying knowledgeable decision-making. Copyright © 2017 Elsevier Inc. All rights reserved.

  3. Trust-Based Cooperative Social System Applied to a Carpooling Platform for Smartphones

    Directory of Open Access Journals (Sweden)

    Cándido Caballero-Gil

    2017-01-01

    Full Text Available One of the worst traffic problems today is the existence of huge traffic jams in almost any big city, produced by the large number of commuters using private cars. This problem has led to an increase in research on the optimization of vehicle occupancy in urban areas as this would help to solve the problem that most cars are occupied by single passengers. The solution of sharing the available seats in cars, known as carpooling, is already available in major cities around the world. However, carpooling is still not considered a safe and reliable solution for many users. With the widespread use of mobile technology and social networks, it is possible to create a trust-based platform to promote carpooling through a convenient, fast and secure system. The main objective of this work is the design and implementation of a carpool system that improves some important aspects of previous systems, focusing on trust between users, and on the security of the system. The proposed system guarantees user privacy and measures trust levels through a new reputation algorithm. In addition to this, the proposal has been developed as a mobile application for devices using the Android Open Source Project.

  4. Trust-Based Cooperative Social System Applied to a Carpooling Platform for Smartphones.

    Science.gov (United States)

    Caballero-Gil, Cándido; Caballero-Gil, Pino; Molina-Gil, Jezabel; Martín-Fernández, Francisco; Loia, Vincenzo

    2017-01-27

    One of the worst traffic problems today is the existence of huge traffic jams in almost any big city, produced by the large number of commuters using private cars. This problem has led to an increase in research on the optimization of vehicle occupancy in urban areas as this would help to solve the problem that most cars are occupied by single passengers. The solution of sharing the available seats in cars, known as carpooling, is already available in major cities around the world. However, carpooling is still not considered a safe and reliable solution for many users. With the widespread use of mobile technology and social networks, it is possible to create a trust-based platform to promote carpooling through a convenient, fast and secure system. The main objective of this work is the design and implementation of a carpool system that improves some important aspects of previous systems, focusing on trust between users, and on the security of the system. The proposed system guarantees user privacy and measures trust levels through a new reputation algorithm. In addition to this, the proposal has been developed as a mobile application for devices using the Android Open Source Project.

  5. Understanding Is Key: An Analysis of Factors Pertaining to Trust in a Real-World Automation System

    Science.gov (United States)

    Balfe, Nora; Sharples, Sarah; Wilson, John R.

    2018-01-01

    Objective: This paper aims to explore the role of factors pertaining to trust in real-world automation systems through the application of observational methods in a case study from the railway sector. Background: Trust in automation is widely acknowledged as an important mediator of automation use, but the majority of the research on automation trust is based on laboratory work. In contrast, this work explored trust in a real-world setting. Method: Experienced rail operators in four signaling centers were observed for 90 min, and their activities were coded into five mutually exclusive categories. Their observed activities were analyzed in relation to their reported trust levels, collected via a questionnaire. Results: The results showed clear differences in activity, even when circumstances on the workstations were very similar, and significant differences in some trust dimensions were found between groups exhibiting different levels of intervention and time not involved with signaling. Conclusion: Although the empirical, lab-based studies in the literature have consistently found that reliability and competence of the automation are the most important aspects of trust development, understanding of the automation emerged as the strongest dimension in this study. The implications are that development and maintenance of trust in real-world, safety-critical automation systems may be distinct from artificial laboratory automation. Application: The findings have important implications for emerging automation concepts in diverse industries including highly automated vehicles and Internet of things. PMID:29613815

  6. Understanding Is Key: An Analysis of Factors Pertaining to Trust in a Real-World Automation System.

    Science.gov (United States)

    Balfe, Nora; Sharples, Sarah; Wilson, John R

    2018-06-01

    This paper aims to explore the role of factors pertaining to trust in real-world automation systems through the application of observational methods in a case study from the railway sector. Trust in automation is widely acknowledged as an important mediator of automation use, but the majority of the research on automation trust is based on laboratory work. In contrast, this work explored trust in a real-world setting. Experienced rail operators in four signaling centers were observed for 90 min, and their activities were coded into five mutually exclusive categories. Their observed activities were analyzed in relation to their reported trust levels, collected via a questionnaire. The results showed clear differences in activity, even when circumstances on the workstations were very similar, and significant differences in some trust dimensions were found between groups exhibiting different levels of intervention and time not involved with signaling. Although the empirical, lab-based studies in the literature have consistently found that reliability and competence of the automation are the most important aspects of trust development, understanding of the automation emerged as the strongest dimension in this study. The implications are that development and maintenance of trust in real-world, safety-critical automation systems may be distinct from artificial laboratory automation. The findings have important implications for emerging automation concepts in diverse industries including highly automated vehicles and Internet of things.

  7. Trust Trust Me (The Additivity)

    OpenAIRE

    Mano , Ken; Sakurada , Hideki; Tsukada , Yasuyuki

    2017-01-01

    Part 4: Trust Metrics; International audience; We present a mathematical formulation of a trust metric using a quality and quantity pair. Under a certain assumption, we regard trust as an additive value and define the soundness of a trust computation as not to exceed the total sum. Moreover, we point out the importance of not only soundness of each computed trust but also the stability of the trust computation procedure against changes in trust value assignment. In this setting, we define tru...

  8. A fuzzy expert system to Trust-Based Access Control in crowdsourcing environments

    Directory of Open Access Journals (Sweden)

    Olusegun Folorunso

    2015-07-01

    Full Text Available Crowdsourcing has been widely accepted across a broad range of application areas. In crowdsourcing environments, the possibility of performing human computation is characterized with risks due to the openness of their web-based platforms where each crowd worker joins and participates in the process at any time, causing serious effect on the quality of its computation. In this paper, a combination of Trust-Based Access Control (TBAC strategy and fuzzy-expert systems was used to enhance the quality of human computation in crowdsourcing environment. A TBAC-fuzzy algorithm was developed and implemented using MATLAB 7.6.0 to compute trust value (Tvalue, priority value as evaluated by fuzzy inference system (FIS and finally generate access decision to each crowd-worker. In conclusion, the use of TBAC is feasible in improving quality of human computation in crowdsourcing environments.

  9. 区块链与可信数据管理:问题与方法%Research Problems and Methods in Blockchain and Trusted Data Management

    Institute of Scientific and Technical Information of China (English)

    钱卫宁; 邵奇峰; 朱燕超; 金澈清; 周傲英

    2018-01-01

    As a supporting technology of Bitcoin for decentralized ledger management,blockchain has gain much attention in financial domain.Blockchain achieves trusted data management in not fully trusted computation environments.It has the advantage of decentralization,immutability,strong consistency and integrity,however,also suffers from poor performance with high latency and low throughput.With ever growing Internet technology and applications,the success of blockchain technology in cryptocurrency may shed light on the research of new trusted data management theories,technologies and systems.This paper introduces the blockchain related technologies,including distributed consensus,smart contract and data provenance,from the perspective of trusted data management.The requirements and research challenges of trusted data management are also analyzed.%作为支撑比特币实现无中心高可信的账本管理的技术,区块链在金融领域得到了广泛关注,区块链实现了不完全可信环境中的可信数据管理,具有去中心化、防篡改、不可抵赖、强一致和完整性等特性,但同时也存在高延迟和低吞吐率的性能问题,在互联网技术发展、新型应用层出不穷的大背景下,借鉴区块链在数字加密货币应用中的成功经验,探索可信数据管理的理论、技术,并设计、实现系统,是学术界所面临的重要问题.从可信数据管理角度,介绍了区块链相关的技术和研究进展,包括分布式共识、智能合约、数据溯源等,并分析了应用对可信数据管理所提出的需求和研究挑战.

  10. Trust in Digital Repositories

    Directory of Open Access Journals (Sweden)

    Elizabeth Yakel

    2013-06-01

    Full Text Available ISO 16363:2012, Space Data and Information Transfer Systems - Audit and Certification of Trustworthy Digital Repositories (ISO TRAC, outlines actions a repository can take to be considered trustworthy, but research examining whether the repository’s designated community of users associates such actions with trustworthiness has been limited. Drawing from this ISO document and the management and information systems literatures, this paper discusses findings from interviews with 66 archaeologists and quantitative social scientists. We found similarities and differences across the disciplines and among the social scientists. Both disciplinary communities associated trust with a repository’s transparency. However, archaeologists mentioned guarantees of preservation and sustainability more frequently than the social scientists, who talked about institutional reputation. Repository processes were also linked to trust, with archaeologists more frequently citing metadata issues and social scientists discussing data selection and cleaning processes. Among the social scientists, novices mentioned the influence of colleagues on their trust in repositories almost twice as much as the experts. We discuss the implications our findings have for identifying trustworthy repositories and how they extend the models presented in the management and information systems literatures.

  11. The Role of Benevolence in Trust of Autonomous Systems

    Science.gov (United States)

    2015-05-19

    circuits link bodily arousal centers, emotion centers and the motor areas of brain and nervous system with the muscles required for display of non...benevolence as a complex belief structure with antecedent beliefs having semantic, temporal, causal and other interrelationships; (2) the mapping of a...temporal,   causal  and  other  interrelationships;  (2)  the   mapping  of  a  portion  of  this  belief   structure

  12. Secure multi-party communication with quantum key distribution managed by trusted authority

    Science.gov (United States)

    Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

    2013-07-09

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  13. Secure multi-party communication with quantum key distribution managed by trusted authority

    Science.gov (United States)

    Hughes, Richard John; Nordholt, Jane Elizabeth; Peterson, Charles Glen

    2017-06-14

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  14. TRUST AND REPUTATION MODEL DESIGN FOR OBJECTS OF MULTI-AGENT ROBOTICS SYSTEMS WITH DECENTRALIZED CONTROL

    Directory of Open Access Journals (Sweden)

    I. A. Zikratov

    2014-03-01

    Full Text Available The problem of mechanisms design for protection of multi-agent robotics systems from attacks of robots-saboteurs is considered. Functioning analysis of these systems with decentralized control is carried out. The type of the so-called soft attacks using interception of messages, misinformation formation and transmission to group of robots which are also realizing other actions without identified signs of invasion of robots-saboteurs. Analysis of existing information security models of the system based on the trust level computation, calculated in the process of agents’ interaction is carried out. Information security model is offered in which robots-agents produce the trust levels to each other on the basis of situation analysis emerging on a certain step of iterative algorithm with usage of onboard sensor devices. On the basis of calculated trust levels, recognition of “saboteur” objects in the group of legitimate robots-agents is done. For measure of likeness (adjacency increase for objects from the same category (“saboteur” or “legitimate agent”, calculation algorithm for agents reputation is offered as a measure of public opinion about qualities of this or that agent-subject. Implementation alternatives of the algorithms for detection of saboteurs on the example of the basic algorithm for distribution of purposes in the group of robots are considered.

  15. Design of Remote Heat-Meter System Based on Trusted Technology

    Science.gov (United States)

    Yu, Changgeng; Lai, Liping

    2018-03-01

    This article presents a proposal of a heat meter and remote meter reading system for the disadvantages of the hackers very easily using eavesdropping, tampering, replay attack of traditional remote meter reading system. The system selects trusted technology such as, the identity authentication, integrity verifying, and data protection. By the experiments, it is proved that the remote meter reading system of the heat meter can be used to verify the feasibility of the technology, and verify the practicability and operability of data protection technology.

  16. Measuring Trust

    OpenAIRE

    Glaeser, Edward Ludwig; Laibson, David I.; Scheinkman, Jose A.; Soutter, Christine L.

    2000-01-01

    We combine two experiments and a survey to measure trust and trustworthiness—two key components of social capital. Standard attitudinal survey questions about trust predict trustworthy behavior in our experiments much better than they predict trusting behavior. Trusting behavior in the experiments is predicted by past trusting behavior outside of the experiments. When individuals are closer socially, both trust and trustworthiness rise. Trustworthiness declines when partners are of differen...

  17. Credit Management System

    Data.gov (United States)

    US Agency for International Development — Credit Management System. Outsourced Internet-based application. CMS stores and processes data related to USAID credit programs. The system provides information...

  18. SecureCore Software Architecture: Trusted Management Layer (TML) Kernel Extension Module Integration Guide

    National Research Council Canada - National Science Library

    Shifflett, David J; Clark, Paul C; Irvine, Cynthia E; Nguyen, Thuy D; Vidas, Timothy M; Levin, Timothy E

    2007-01-01

    .... The purpose of the SecureCore research project is to investigate fundamental architectural features required for the trusted operation of mobile computing devices such as smart cards, embedded...

  19. SecureCore Software Architecture: Trusted Management Layer (TML) Kernel Extension Module Interface Specification

    National Research Council Canada - National Science Library

    Shifflett, David J; Clark, Paul C; Irvine, Cynthia E; Nguyen, Thuy D; Vidas, Timothy M; Levin, Timothy E

    2008-01-01

    .... The purpose of the SecureCore research project is to investigate fundamental architectural features required for the trusted operation of mobile computing devices such as smart cards, embedded...

  20. The impact of the customer relationship management on organizational productivity, customer trust and satisfaction by using the structural equation model: A study in the Iranian hospitals.

    Science.gov (United States)

    Yaghoubi, Maryam; Asgari, Hamed; Javadi, Marzieh

    2017-01-01

    One of the challenges in the fiercely competitive space of health organizations is responding to customers and building trust and satisfaction in them in the shortest time, with best quality and highest productivity. Hence the aim of this study is to survey the impact of customer relationship management (CRM) on organizational productivity, customer loyalty, satisfaction and trust in selected hospitals of Isfahan (in Iran). This study is a correlation descriptive research. Study population was the nurses in selected hospitals of Isfahan and the sampling has been conducted using stratified random method. Data collection tool is a researcher-made questionnaire of CRM and its effects (organizational productivity, customer loyalty, satisfaction and trust) which its validity and reliability has been confirmed by researchers. Structural equation method was used to determine the impact of variables. Data analysis method was structural equation modeling and the software used was SPSS version 16 (IBM, SPSS, 2007 Microsoft Corp., Bristol, UK) and AMOS version 18 (IBM, SPSS, 2010 Microsoft Corp, Bristol, UK). Among the dimensions of CRM, diversification had the highest impact (0.83) and customer acquisition had the lowest (0.57) CRM, had the lowest impact on productivity (0.59) and the highest effect on customer satisfaction (0.83). For the implementation of CRM, it is necessary that the studied hospitals improve strategies of acquiring information about new customers, attracting new customers and keeping them and communication with patients outside the hospital and improve the system of measuring patient satisfaction and loyalty.

  1. Trust Management in Mobile Ad Hoc Networks for Bias Minimization and Application Performance Maximization

    Science.gov (United States)

    2014-02-26

    4 develops a novel model-based approach to de- scribe dynamic behaviors of nodes in MANETs in the pres- ence of misbehaving nodes with the objective...bile node to subjectively yet informatively assess the trust levels of other mobile nodes. Further, SQTrust is resilient against misbehaving nodes. Given...objective trust’’ despite the presence of misbehaving nodes. The desirable output is to achieve high accuracy in peer-to-peer subjective trust evaluation

  2. Trust in Management under Post-bureaucratic Conditions: The Case of Finnish Civil Servants

    Directory of Open Access Journals (Sweden)

    Jaakko Koivumäki

    2013-12-01

    Full Text Available The Finnish state administration has recently undergone a wave of reforms towards decentralized decision-making and increased flexibility in organizing work. Traditional bureaucracy, however, has its virtues. Based on a survey and qualitative interview material, the results presented in this paper indicate that many characteristics of bureaucracy, such as well-defined work roles and hierarchical control, facilitate trust among employees. In contrast, the current post-bureaucratic model of organizing work may increase insecurity and decrease trust.

  3. On-line reputation systems : the effects of feedback comments and reactions on building and rebuilding trust in on-line auctions

    NARCIS (Netherlands)

    Utz, S.; Matzat, U.; Snijders, C.C.P.

    2009-01-01

    Previous research on reputation systems primarily focused on their trust-building function. The present research addresses their trust-rebuilding function-specifically, the role of the short text comments given in reaction to negative feedback. Rebuilding trust is often necessary because on-line

  4. Systems Engineering Management Plan

    International Nuclear Information System (INIS)

    1994-01-01

    The purpose of this Monitored Retrievable Storage (MRS) Project Systems Engineering Management Plan (SEMP) is to define and establish the MRS Project Systems Engineering process that implements the approved policy and requirements of the Office of Civilian Radioactive Waste Management (OCRWM) for the US Department of Energy (DOE). This plan is Volume 5 of the MRS Project Management Plan (PMP). This plan provides the framework for implementation of systems engineering on the MRS Project consistent with DOE Order 4700.1, the OCRWM Program Management System Manual (PMSM), and the OCRWM Systems Engineering Management Plan (SEMP)

  5. Maintenance and management system

    International Nuclear Information System (INIS)

    Ando, Yasumasa.

    1992-01-01

    Since highly reliable operation is required in a nuclear power plant, monitoring during operation and periodical inspection are conducted carefully. The present invention provides maintenance and management systems for providing an aid so that these systems are combined effectively and operated rationally based on unified information management. That is, the system contains data bases comprising information for the design of the equipments and pipelines of a plant, information for the exchange of equipment parts, information for the history of plant operation, information for the monitoring and inspection, and information for the management of repair operation. In addition, it has an equipment part history management sub-system for managing equipment part exchange information, an operation history management sub-system for managing the operation state of the plant, an operation history management sub-system for managing equipment monitoring inspection data and operation management sub-system for managing periodical inspection/ repairing operation. These sub-systems are collectively combined to manage the maintenance and management jobs of the plant unitarily. (I.S.)

  6. The Main Approaches to Using the Concept of Trust-Based Marketing in Trade Enterprises

    Directory of Open Access Journals (Sweden)

    Albina Basova

    2017-12-01

    Full Text Available The concept of trust and the main factors affecting it are analyzed. The essence of trust-based marketing and its tasks, the main strategies of building trust to an organization from the clients’ side are considered. The CRM system has been explored as a tool for managing customer relationships, and contemporary marketing technologies such as crowdsourcing and collaboration that develop trust are considered.

  7. Autonomous emergency braking systems adapted to snowy road conditions improve drivers' perceived safety and trust.

    Science.gov (United States)

    Koglbauer, Ioana; Holzinger, Jürgen; Eichberger, Arno; Lex, Cornelia

    2018-04-03

    This study investigated drivers' evaluation of a conventional autonomous emergency braking (AEB) system on high and reduced tire-road friction and compared these results to those of an AEB system adaptive to the reduced tire-road friction by earlier braking. Current automated systems such as the AEB do not adapt the vehicle control strategy to the road friction; for example, on snowy roads. Because winter precipitation is associated with a 19% increase in traffic crashes and a 13% increase in injuries compared to dry conditions, the potential of conventional AEB to prevent collisions could be significantly improved by including friction in the control algorithm. Whereas adaption is not legally required for a conventional AEB system, higher automated functions will have to adapt to the current tire-road friction because human drivers will not be required to monitor the driving environment at all times. For automated driving functions to be used, high levels of perceived safety and trust of occupants have to be reached with new systems. The application case of an AEB is used to investigate drivers' evaluation depending on the road condition in order to gain knowledge for the design of future driving functions. In a driving simulator, the conventional, nonadaptive AEB was evaluated on dry roads with high friction (μ = 1) and on snowy roads with reduced friction (μ = 0.3). In addition, an AEB system adapted to road friction was designed for this study and compared with the conventional AEB on snowy roads with reduced friction. Ninety-six drivers (48 males, 48 females) assigned to 5 age groups (20-29, 30-39, 40-49, 50-59, and 60-75 years) drove with AEB in the simulator. The drivers observed and evaluated the AEB's braking actions in response to an imminent rear-end collision at an intersection. The results show that drivers' safety and trust in the conventional AEB were significantly lower on snowy roads, and the nonadaptive autonomous braking strategy was

  8. Maintenance management systems

    International Nuclear Information System (INIS)

    Rohan, M. de

    1989-01-01

    This paper is concerned principally with Maintenance Management systems and their effective introduction into organisations. Maintenance improvement is basically a problem of managing the maintenance department in the broadest sense. Improvement does not only lie in the area of special techniques, systems or procedures; although they are valuable tools, but rather in a balanced attack, carefully guided by management. Over recent years, maintenance systems have received the major emphasis and in many instances the selection of the system has become a pre-occupation, whereas the importance of each maintenance function must be recognised and good management practices applied to all maintenance activities. The ingredients for success in the implementation of maintenance management systems are summarised as: having a management committee, clear objectives, project approach using project management techniques and an enthusiastic leader, user managed and data processing supported project, realistic budget and an understanding of the financial audit requirements. (author)

  9. Business advertisements management system

    OpenAIRE

    Rekel, Ernest

    2017-01-01

    Business Advertisements Management System The main goal of the project was to create a business advertisements management system, where users could easily create and find business advertisements. To accomplish this goal exist- ing systems were analyzed as well as their limitations. The end result is a working system which is able to store and proccess huge amount of data.

  10. A general definition of trust

    OpenAIRE

    O'Hara, Kieron

    2012-01-01

    In this paper a definition and conceptual analysis of trust is given in terms of trustworthiness. Its focus will be as wide as possible, and will not be restricted to any particular type of trust. The aim is to show the key parameters that enable us to investigate and understand trust, thereby facilitating the development of systems, institutions and technologies to support, model or mimic trust. The paper will also show the strong connection between trust and trustworthiness, showing how the...

  11. The Process of Trust Development

    DEFF Research Database (Denmark)

    Jagd, Søren; Højland, Jeppe

    in management among employees. Trust is found to be higher among employees interacting regularly with managers, as in the project coordination group. It is found that personal relations are very important for the development of trust. The success of the project may be explained by the involvement of an ‘elite...... and discuss with colleagues from other departments and develop personal knowledge of each other....... by high trust and co-operation? In this paper we explore the process of trust development during an organisational change project in a Danish SME by looking at two kinds of trust relations: employee trust in management and trust relations among employees. We find substantial differences in trust...

  12. Integrated management systems

    CERN Document Server

    Bugdol, Marek

    2015-01-01

    Examining the challenges of integrated management, this book explores the importance and potential benefits of using an integrated approach as a cross-functional concept of management. It covers not only standardized management systems (e.g. International Organization for Standardization), but also models of self-assessment, as well as different types of integration. Furthermore, it demonstrates how processes and systems can be integrated, and how management efficiency can be increased. The major part of this book focuses on management concepts which use integration as a key tool of management processes (e.g. the systematic approach, supply chain management, virtual and network organizations, processes management and total quality management). Case studies, illustrations, and tables are also provided to exemplify and illuminate the content, as well as examples of successful and failed integrations. Providing a particularly useful resource to managers and specialists involved in the improvement of organization...

  13. Relationship between perceived organizational politics, organizational trust, human resource management practices and turnover intention among Nigerian nurses

    Directory of Open Access Journals (Sweden)

    Ramatu Abdulkareem Abubakar

    2014-09-01

    Full Text Available Prior research has indicated that employee turnover is detrimental to both individuals and organisations. Because a turnover intention in the workplace is detrimental, several factors have been suggested to better understand the reasons why employees may decide to leave their organisations. Some of the organizational-related factors that have been considered by previous research include perceived organizational justice, job satisfaction, perceived psychological contract breach, and perceived organizational support, among others. Despite these empirical studies, literatures indicate that less attention has been paid to the influence of perceived organisational politics, organizational trust, and perceived human resource practices management (HRM practices on employee turnover. Hence, the present study fills in the gap by examining the relationship between perceived organisational politics, organizational trust, perceived human resource management practices and employee turnover among Registered Nurses in Nigerian public hospitals using multiple regression analysis technique. One hundred and seventy five Registered Nurses participated in the study. Result indicated that perceived organisational politics was significantly and positively related to turnover intentions. The result also showed that both organizational trust and perceived human resource practices were significantly and negatively related to turnover intentions. Theoretical and practical implications of the results are discussed.

  14. Audit Information Management System

    Data.gov (United States)

    US Agency for International Development — USAID/OIG has initiated its new Audit Information Management System (AIMS) to track OIG's audit recommendations and USAID's management decisions. OIG's in-house...

  15. SoundMeGood: A Trust Model Supporting Preliminary Trust Establishment Between Mutually Unknown Entities

    Czech Academy of Sciences Publication Activity Database

    Špánek, Roman; Tyl, P.

    2013-01-01

    Roč. 1, č. 1 (2013), s. 10-14 ISSN 2320-401X R&D Projects: GA ČR GAP202/10/0761 Grant - others:ČVUT(CZ) SGS 2011/7821 Institutional support: RVO:67985807 Keywords : trust * social network * trust management systems * distributed systems Subject RIV: IN - Informatics, Computer Science http://www.isaet.org/images/extraimages/IJCSEE%200101303.pdf

  16. Trust and risk: a model for medical education.

    Science.gov (United States)

    Damodaran, Arvin; Shulruf, Boaz; Jones, Philip

    2017-09-01

    Health care delivery, and therefore medical education, is an inherently risky business. Although control mechanisms, such as external audit and accreditation, are designed to manage risk in clinical settings, another approach is 'trust'. The use of entrustable professional activities (EPAs) represents a deliberate way in which this is operationalised as a workplace-based assessment. Once engaged with the concept, clinical teachers and medical educators may have further questions about trust. This narrative overview of the trust literature explores how risk, trust and control intersect with current thinking in medical education, and makes suggestions for potential directions of enquiry. Beyond EPAs, the importance of trust in health care and medical education is reviewed, followed by a brief history of trust research in the wider literature. Interpersonal and organisational levels of trust and a model of trust from the management literature are used to provide the framework with which to decipher trust decisions in health care and medical education, in which risk and vulnerability are inherent. In workplace learning and assessment, the language of 'trust' may offer a more authentic and practical vocabulary than that of 'competency' because clinical and professional risks are explicitly considered. There are many other trust relationships in health care and medical education. At the most basic level, it is helpful to clearly delineate who is the trustor, the trustee, and for what task. Each relationship has interpersonal and organisational elements. Understanding and considered utilisation of trust and control mechanisms in health care and medical education may lead to systems that maturely manage risk while actively encouraging trust and empowerment. © 2017 John Wiley & Sons Ltd and The Association for the Study of Medical Education.

  17. The Role of Organizational Control Systems in Employees’ Organizational Trust and Performance Outcomes

    NARCIS (Netherlands)

    Verburg, R.M.; Nienaber, Ann Marie; Searle, Rosalind H.; Weibel, Antoinette; Den Hartog, Deanne N.; Rupp, Deborah E.

    2018-01-01

    This study examined how organizational control is related to employees’ organizational trust. We specifically focus on how different forms of control (process, outcome, and normative) relate to employees’ trust in their employing organizations and examine whether such trust in turn relates

  18. The role of organizational control systems in employees’ organizational trust and performance outcomes

    NARCIS (Netherlands)

    Verburg, R.M.; Nienaber, A.; Searle, R.H.; Weibel, A.; Den Hartog, D.N.; Rupp, D.E.

    2018-01-01

    This study examined how organizational control is related to employees’ organizational trust. We specifically focus on how different forms of control (process, outcome, and normative) relate to employees’ trust in their employing organizations and examine whether such trust in turn relates

  19. The Chinese community patient’s life satisfaction, assessment of community medical service, and trust in community health delivery system

    Science.gov (United States)

    2013-01-01

    Background Although the Chinese government put a lot of effort into promoting the community patient’s life satisfaction, there still lacked the holistic and systematic approaches to promote the community patient’s life satisfaction in various regions of China. On the basis of the literature, it was found that both the community patient’s assessment of community medical service and trust in community health delivery system were important considerations when the community patient comprehensively evaluated community medical service to generate life satisfaction. So this study was set up to test whether and to what extent the community patient’s assessments of various major aspects of community medical service/various major aspects of the community patient’s trust in community health delivery system influenced life satisfaction in whole China/in various regions of China. Methods In order to explore the situation of China’s community health delivery system before 2009 and provide a reference for China’s community health delivery system reform, the data that could comprehensively and accurately reflect the community patient’s life satisfaction, assessment of community medical service, and trust in community health delivery system in various regions of China was needed, so this study collaborated with the National Bureau of Statistics of China to carry out a large-scale 2008 national community resident household survey (N = 3,306) for the first time in China. And the specified ordered probit models were established to analyze the dataset from this household survey. Results Among major aspects of community medical service, the medical cost (particularly in developed regions), the doctor-patient communication (particularly in developed regions), the medical facility and hospital environment (particularly in developed regions), and the medical treatment process (particularly in underdeveloped regions) were all key considerations (ppatient’s life

  20. Managing hybrid marketing systems.

    Science.gov (United States)

    Moriarty, R T; Moran, U

    1990-01-01

    As competition increases and costs become critical, companies that once went to market only one way are adding new channels and using new methods - creating hybrid marketing systems. These hybrid marketing systems hold the promise of greater coverage and reduced costs. But they are also hard to manage; they inevitably raise questions of conflict and control: conflict because marketing units compete for customers; control because new indirect channels are less subject to management authority. Hard as they are to manage, however, hybrid marketing systems promise to become the dominant design, replacing the "purebred" channel strategy in all kinds of businesses. The trick to managing the hybrid is to analyze tasks and channels within and across a marketing system. A map - the hybrid grid - can help managers make sense of their hybrid system. What the chart reveals is that channels are not the basic building blocks of a marketing system; marketing tasks are. The hybrid grid forces managers to consider various combinations of channels and tasks that will optimize both cost and coverage. Managing conflict is also an important element of a successful hybrid system. Managers should first acknowledge the inevitability of conflict. Then they should move to bound it by creating guidelines that spell out which customers to serve through which methods. Finally, a marketing and sales productivity (MSP) system, consisting of a central marketing database, can act as the central nervous system of a hybrid marketing system, helping managers create customized channels and service for specific customer segments.

  1. Management Information Systems Research.

    Science.gov (United States)

    Research on management information systems is illusive in many respects. Part of the basic research problem in MIS stems from the absence of standard...decision making. But the transition from these results to the realization of ’satisfactory’ management information systems remains difficult indeed. The...paper discusses several aspects of research on management information systems and reviews a selection of efforts that appear significant for future progress. (Author)

  2. Facility Environmental Management System

    Data.gov (United States)

    Federal Laboratory Consortium — This is the Web site of the Federal Highway Administration's (FHWA's) Turner-Fairbank Highway Research Center (TFHRC) facility Environmental Management System (EMS)....

  3. The relationship between trust in mass media and the healthcare system and individual health: evidence from the AsiaBarometer Survey

    Directory of Open Access Journals (Sweden)

    Tokuda Yasuharu

    2009-01-01

    Full Text Available Abstract Background Vertical and horizontal trust, as dimensions of social capital, may be important determinants of health. As mass media campaigns have been used extensively to promote healthy lifestyles and convey health-related information, high levels of individual trust in the media may facilitate the success of such campaigns and, hence, have a positive influence on health. However, few studies have investigated the relationship between trust levels in mass media, an aspect of vertical trust, and health. Methods Based on cross-sectional data of the general population from the AsiaBarometer Survey (2003–2006, we analyzed the relationship between self-rated health and trust in mass media, using a multilevel logistic model, adjusted for age, gender, marital status, income, education, occupation, horizontal trust, and trust in the healthcare system. Results In a total of 39082 participants (mean age 38; 49% male, 26808 (69% were classified as in good health. By the levels of trust in mass media, there were 6399 (16% who reported that they trust a lot, 16327 (42% reporting trust to a degree, 9838 (25% who do not really trust, 3307 (9% who do not trust at all, and 191 (0.5% who have not thought about it. In the multilevel model, trust in mass media was associated with good health (do not trust at all as the base group: the odds ratios (OR of 1.16 (95% confidence interval (CI = 1.05–1.27 for do not really trust; OR of 1.35 (95% CI = 1.23–1.49 for trust to a degree, and 1.57 (95% CI = 1.36–1.81 for trust a lot. Horizontal trust and trust in the healthcare system were also associated with health. Conclusion Vertical trust in mass media is associated with better health in Asian people. Since mass media is likely an important arena for public health, media trust should be enhanced to make people healthier.

  4. NASA's Risk Management System

    Science.gov (United States)

    Perera, Jeevan S.

    2011-01-01

    Leadership is key to success. Phased-approach for implementation of risk management is necessary. Risk management system will be simple, accessible and promote communication of information to all relevant stakeholders for optimal resource allocation and risk mitigation. Risk management should be used by all team members to manage risks -- risk office personnel. Each group is assigned Risk Integrators who are facilitators for effective risk management. Risks will be managed at the lowest-level feasible, elevate only those risks that require coordination or management from above. Risk reporting and communication is an essential element of risk management and will combine both qualitative and quantitative elements. Risk informed decision making should be introduced to all levels of management. Provide necessary checks and balances to insure that risks are caught/identified and dealt with in a timely manner. Many supporting tools, processes & training must be deployed for effective risk management implementation. Process improvement must be included in the risk processes.

  5. Learning Content Management Systems

    Directory of Open Access Journals (Sweden)

    Tache JURUBESCU

    2008-01-01

    Full Text Available The paper explains the evolution of e-Learning and related concepts and tools and its connection with other concepts such as Knowledge Management, Human Resources Management, Enterprise Resource Planning, and Information Technology. The paper also distinguished Learning Content Management Systems from Learning Management Systems and Content Management Systems used for general web-based content. The newest Learning Content Management System, very expensive and yet very little implemented is one of the best tools that helps us to cope with the realities of the 21st Century in what learning concerns. The debates over how beneficial one or another system is for an organization, can be driven by costs involved, efficiency envisaged, and availability of the product on the market.

  6. Trust and Influence

    Science.gov (United States)

    2013-03-06

    the behavior or attitudes of others). LIST SUB-AREAS IN PORTFOLIO: Science of Reliance • Trust in Autonomous Systems/ Autonomy – identify the...error •Humans have trust biases (Lyons & Stokes, 2012) •Little is known about how human trust principles apply to autonomy /robotics...for the model in western context (Colquitt et al., 2007) • Some evidence that benevolence is favored by collectivist culture (Branzei et al., 2007

  7. Trust and Social Commerce

    OpenAIRE

    Julia Y. Lee

    2016-01-01

    Internet commerce has transformed the marketing of goods and services. The separation between point of sale and seller, and the presence of geographically dispersed sellers who do not engage in repeated transactions with the same customers challenge traditional mechanisms for building the trust required for commercial exchanges. In this changing environment, legal rules and institutions play a diminished role in building trust. Instead, new systems and methods are emerging to foster trust in ...

  8. Worldviews and trust of sources for health information on electronic nicotine delivery systems: Effects on risk perceptions and use

    Directory of Open Access Journals (Sweden)

    Scott R. Weaver

    2017-12-01

    Full Text Available Public health agencies, the news media, and the tobacco/vapor industry have issued contradictory statements about the health effects of electronic nicotine delivery systems (ENDS. We investigated the levels of trust that consumers place in different information sources and how trust is associated with cultural worldviews, risk perceptions, ENDS use, and sociodemographic characteristics using a nationally representative sample of 6051 U.S. adults in 2015. Seventeen percent of adults were uncertain about their trust for one or more potential sources. Among the rest, the Centers for Disease Control and Prevention (CDC, health experts, and the Food & Drug Administration (FDA elicited the highest levels of trust. In contrast, tobacco and vapor manufacturers, vape shop employees, and, to a lesser extent, the news media were distrusted. Adults who had higher incomes and more education or espoused egalitarian and communitarian worldviews expressed more trust in health sources and the FDA, whereas those identifying as non-Hispanic Black or multiracial reported less trust. Current smokers, those who identified as non-Hispanic Black or other race, had lower incomes, and espoused hierarchy and individualism worldviews expressed less distrust toward the tobacco and vapor industry. Greater trust (or less distrust toward the tobacco and vapor industry and an individualism worldview were associated with perceptions of lower risk of premature death from daily ENDS use, greater uncertainty about those risks, and greater odds of using ENDS. Public health and the FDA should consider consumer trust and worldviews in the design and regulation of public education campaigns regarding the potential health risks and benefits of ENDS.

  9. Worldviews and trust of sources for health information on electronic nicotine delivery systems: Effects on risk perceptions and use.

    Science.gov (United States)

    Weaver, Scott R; Jazwa, Amelia; Popova, Lucy; Slovic, Paul; Rothenberg, Richard B; Eriksen, Michael P

    2017-12-01

    Public health agencies, the news media, and the tobacco/vapor industry have issued contradictory statements about the health effects of electronic nicotine delivery systems (ENDS). We investigated the levels of trust that consumers place in different information sources and how trust is associated with cultural worldviews, risk perceptions, ENDS use, and sociodemographic characteristics using a nationally representative sample of 6051 U.S. adults in 2015. Seventeen percent of adults were uncertain about their trust for one or more potential sources. Among the rest, the Centers for Disease Control and Prevention (CDC), health experts, and the Food & Drug Administration (FDA) elicited the highest levels of trust. In contrast, tobacco and vapor manufacturers, vape shop employees, and, to a lesser extent, the news media were distrusted. Adults who had higher incomes and more education or espoused egalitarian and communitarian worldviews expressed more trust in health sources and the FDA, whereas those identifying as non-Hispanic Black or multiracial reported less trust. Current smokers, those who identified as non-Hispanic Black or other race, had lower incomes, and espoused hierarchy and individualism worldviews expressed less distrust toward the tobacco and vapor industry. Greater trust (or less distrust) toward the tobacco and vapor industry and an individualism worldview were associated with perceptions of lower risk of premature death from daily ENDS use, greater uncertainty about those risks, and greater odds of using ENDS. Public health and the FDA should consider consumer trust and worldviews in the design and regulation of public education campaigns regarding the potential health risks and benefits of ENDS.

  10. A Geographic Information System (GIS-Based Analysis of Social Capital Data: Landscape Factors That Correlate with Trust

    Directory of Open Access Journals (Sweden)

    Sohrab Rahimi

    2017-03-01

    Full Text Available The field of community sociology has yielded rich insights on how neighborhoods and individuals foster social capital and reap the benefits of interpersonal relationships and institutions alike. Traditionally, institutions and cultural factors have been lauded as catalysts of community social life and cohesion. Yet, the built environment and configuration of the landscape, including infrastructure, amenities and population density, may also contribute to community social capital. In this article, we embedded zip code-level responses from Harvard University’s Saguaro Seminar’s 2006 Social Capital Community Benchmark Survey with a geographic information system. Specifically, we correlated responses on residents’ general trust, trust of one’s neighbors, and trust of members of other racial groups with local urban environmental factors and infrastructural indicators such as housing and street conditions, land use, city form, amenity access (e.g., libraries and schools, home vacancy rates, and home value. We conducted these tests at the national level and for Rochester, NY, due to its many survey responses. We found that housing vacancies drive down levels of social trust, as captured by homeownership rates and tenure, yielding higher levels of social trust, and that certain urban facilities correlate with high trust among neighbors. Results can inform urban planners on the amenities that support sustainable community ties.

  11. Salient value similarity, social trust, and attitudes toward wildland fire management strategies

    Science.gov (United States)

    Jerry J. Vaske; James D. Absher; Alan D. Bright

    2007-01-01

    Using the salient value similarity (SVS) model, we predicted that social trust mediated the relationship between SVS and attitudes toward prescribed burns and mechanical thinning. Data were obtained from a mail survey (n = 532) of Colorado residents living in the wildland-urban interface. Results indicated that respondents shared the same values as U...

  12. Don't Trust a Management Metric, Especially in Life Support

    Science.gov (United States)

    Jones, Harry W.

    2014-01-01

    Goodhart's law states that metrics do not work. Metrics become distorted when used and they deflect effort away from more important goals. These well-known and unavoidable problems occurred when the closure and system mass metrics were used to manage life support research. The intent of life support research should be to develop flyable, operable, reliable systems, not merely to increase life support system closure or to reduce its total mass. It would be better to design life support systems to meet the anticipated mission requirements and user needs. Substituting the metrics of closure and total mass for these goals seems to have led life support research to solve the wrong problems.

  13. NASA's Risk Management System

    Science.gov (United States)

    Perera, Jeevan S.

    2013-01-01

    Phased-approach for implementation of risk management is necessary. Risk management system will be simple, accessible and promote communication of information to all relevant stakeholders for optimal resource allocation and risk mitigation. Risk management should be used by all team members to manage risks - not just risk office personnel. Each group/department is assigned Risk Integrators who are facilitators for effective risk management. Risks will be managed at the lowest-level feasible, elevate only those risks that require coordination or management from above. Risk informed decision making should be introduced to all levels of management. ? Provide necessary checks and balances to insure that risks are caught/identified and dealt with in a timely manner. Many supporting tools, processes & training must be deployed for effective risk management implementation. Process improvement must be included in the risk processes.

  14. Lithium battery management system

    Science.gov (United States)

    Dougherty, Thomas J [Waukesha, WI

    2012-05-08

    Provided is a system for managing a lithium battery system having a plurality of cells. The battery system comprises a variable-resistance element electrically connected to a cell and located proximate a portion of the cell; and a device for determining, utilizing the variable-resistance element, whether the temperature of the cell has exceeded a predetermined threshold. A method of managing the temperature of a lithium battery system is also included.

  15. Archival Information Management System.

    Science.gov (United States)

    1995-02-01

    management system named Archival Information Management System (AIMS), designed to meet the audit trail requirement for studies completed under the...are to be archived to the extent that future reproducibility and interrogation of results will exist. This report presents a prototype information

  16. Medical Information Management System

    Science.gov (United States)

    Alterescu, S.; Hipkins, K. R.; Friedman, C. A.

    1979-01-01

    On-line interactive information processing system easily and rapidly handles all aspects of data management related to patient care. General purpose system is flexible enough to be applied to other data management situations found in areas such as occupational safety data, judicial information, or personnel records.

  17. Predicting TUrnover Intentions of Hotel Employees: The Influence of Employee Development Human Resource Management Practices and Trust in Organization

    Directory of Open Access Journals (Sweden)

    Mohamad Abdullah Hemdi

    2006-01-01

    Full Text Available This study investigates the variables that may be predictive of hotel employees’ turnover intentions. The influence of trust in organization as a mediator in the proposed relationship is also examined. A total of 380 operational employees from 5-star rated hotels completed the questionnaires. Hierarchical regression analysis was used to test the relationships hypothesized in the model. Most of the hypotheses were supported. It is suggested that to enhance employees’ trust in organization and subsequently to reduce turnover intentions, hotels need to continue to provide training and development programs to their employees, conduct fair and formal appraisal system, and provide ample and clear career advancement to their employees. Limitations and suggestions for future studies are forwarded.

  18. Operations management system

    Science.gov (United States)

    Brandli, A. E.; Eckelkamp, R. E.; Kelly, C. M.; Mccandless, W.; Rue, D. L.

    1990-01-01

    The objective of an operations management system is to provide an orderly and efficient method to operate and maintain aerospace vehicles. Concepts are described for an operations management system and the key technologies are highlighted which will be required if this capability is brought to fruition. Without this automation and decision aiding capability, the growing complexity of avionics will result in an unmanageable workload for the operator, ultimately threatening mission success or survivability of the aircraft or space system. The key technologies include expert system application to operational tasks such as replanning, equipment diagnostics and checkout, global system management, and advanced man machine interfaces. The economical development of operations management systems, which are largely software, will require advancements in other technological areas such as software engineering and computer hardware.

  19. Incremental Trust in Grid Computing

    DEFF Research Database (Denmark)

    Brinkløv, Michael Hvalsøe; Sharp, Robin

    2007-01-01

    This paper describes a comparative simulation study of some incremental trust and reputation algorithms for handling behavioural trust in large distributed systems. Two types of reputation algorithm (based on discrete and Bayesian evaluation of ratings) and two ways of combining direct trust and ...... of Grid computing systems....

  20. Program Management System manual

    International Nuclear Information System (INIS)

    1986-01-01

    The Program Management System (PMS), as detailed in this manual, consists of all the plans, policies, procedure, systems, and processes that, taken together, serve as a mechanism for managing the various subprograms and program elements in a cohesive, cost-effective manner. The PMS is consistent with the requirements of the Nuclear Waste Policy Act of 1982 and the ''Mission Plan for the Civilian Radioactive Waste Management Program'' (DOE/RW-0005). It is based on, but goes beyond, the Department of Energy (DOE) management policies and procedures applicable to all DOE programs by adapting these directives to the specific needs of the Civilian Radioactive Waste Management program. This PMS Manual describes the hierarchy of plans required to develop and maintain the cost, schedule, and technical baselines at the various organizational levels of the Civilian Radioactive Waste Management Program. It also establishes the management policies and procedures used in the implementation of the Program. These include requirements for internal reports, data, and other information; systems engineering management; regulatory compliance; safety; quality assurance; and institutional affairs. Although expanded versions of many of these plans, policies, and procedures are found in separate documents, they are an integral part of this manual. The PMS provides the basis for the effective management that is needed to ensure that the Civilian Radioactive Waste Management Program fulfills the mandate of the Nuclear Waste Policy Act of 1982. 5 figs., 2 tabs

  1. Trust in Management under Post-bureaucratic Conditions: The Case of Finnish Civil Servants

    OpenAIRE

    Jaakko Koivumäki; Pasi Pyöriä

    2013-01-01

    The Finnish state administration has recently undergone a wave of reforms towards decentralized decision-making and increased flexibility in organizing work. Traditional bureaucracy, however, has its virtues. Based on a survey and qualitative interview material, the results presented in this paper indicate that many characteristics of bureaucracy, such as well-defined work roles and hierarchical control, facilitate trust among employees. In contrast, the current post-bureaucratic model of org...

  2. Towards trusted tradelanes

    NARCIS (Netherlands)

    Hulstijn, Joris; Hofman, W.; Zomer, G.; Tan, Yao-Hua; Scholl, H. J.; Glassey, O.; Janssen, M.

    Customs administrations are exploring system-based approaches to regulatory supervision, taking the entire set of controls in a process into account. In addition to Trusted Traders, which are recognized by a certification process, customs are considering to identify so called Trusted Trade Lanes:

  3. Management information systems

    Energy Technology Data Exchange (ETDEWEB)

    Crump, K.

    1978-01-01

    An Australian university architect studying management information systems programs at academic institutions in the United States visited 26 universities and colleges and nine educational and professional associations, including extended visits at the University of Wisconsin and the National Center of Higher Education Management Systems. During these visits, he investigated university and college space utilization programs, gained operational and developmental experience at institutions with education philosophies similar to those in Australia, and examined trends in low cost student housing. This report of his observations focusses on management information systems projects throughout the academic community, resource accountability, energy conservation, facilities planning for the handicapped, student housing, and interdisciplinary approaches to education.

  4. Trust transitivity in social networks.

    Directory of Open Access Journals (Sweden)

    Oliver Richters

    Full Text Available Non-centralized recommendation-based decision making is a central feature of several social and technological processes, such as market dynamics, peer-to-peer file-sharing and the web of trust of digital certification. We investigate the properties of trust propagation on networks, based on a simple metric of trust transitivity. We investigate analytically the percolation properties of trust transitivity in random networks with arbitrary in/out-degree distributions, and compare with numerical realizations. We find that the existence of a non-zero fraction of absolute trust (i.e. entirely confident trust is a requirement for the viability of global trust propagation in large systems: The average pair-wise trust is marked by a discontinuous transition at a specific fraction of absolute trust, below which it vanishes. Furthermore, we perform an extensive analysis of the Pretty Good Privacy (PGP web of trust, in view of the concepts introduced. We compare different scenarios of trust distribution: community- and authority-centered. We find that these scenarios lead to sharply different patterns of trust propagation, due to the segregation of authority hubs and densely-connected communities. While the authority-centered scenario is more efficient, and leads to higher average trust values, it favours weakly-connected "fringe" nodes, which are directly trusted by authorities. The community-centered scheme, on the other hand, favours nodes with intermediate in/out-degrees, in detriment of the authorities and its "fringe" peers.

  5. Trust Transitivity in Social Networks

    Science.gov (United States)

    Richters, Oliver; Peixoto, Tiago P.

    2011-01-01

    Non-centralized recommendation-based decision making is a central feature of several social and technological processes, such as market dynamics, peer-to-peer file-sharing and the web of trust of digital certification. We investigate the properties of trust propagation on networks, based on a simple metric of trust transitivity. We investigate analytically the percolation properties of trust transitivity in random networks with arbitrary in/out-degree distributions, and compare with numerical realizations. We find that the existence of a non-zero fraction of absolute trust (i.e. entirely confident trust) is a requirement for the viability of global trust propagation in large systems: The average pair-wise trust is marked by a discontinuous transition at a specific fraction of absolute trust, below which it vanishes. Furthermore, we perform an extensive analysis of the Pretty Good Privacy (PGP) web of trust, in view of the concepts introduced. We compare different scenarios of trust distribution: community- and authority-centered. We find that these scenarios lead to sharply different patterns of trust propagation, due to the segregation of authority hubs and densely-connected communities. While the authority-centered scenario is more efficient, and leads to higher average trust values, it favours weakly-connected “fringe” nodes, which are directly trusted by authorities. The community-centered scheme, on the other hand, favours nodes with intermediate in/out-degrees, in detriment of the authorities and its “fringe” peers. PMID:21483683

  6. Trust us Trust Thorp Campaign

    International Nuclear Information System (INIS)

    Kane, John

    1995-01-01

    The history of the nuclear industry in the UK has been dominated by Sellafield reprocessing site in west Cumbria. The site, formerly owned by the United Kingdom Atomic Energy Authority was transferred to the newly-formed British Nuclear Fuels plc in 1971. Although trade union representation existed at Sellafield before the emergence of BNFL, it is only after this date that collective trade union activity began to emerge. In 1977, after a long running dispute with management about the issue of radiation dose uptake, the workforce went on strike, forcing the management to question their previous 'need to know' attitude and to improve industrial relations. In 1984, it was recognised that the lobbying influence of trade unions within politics, and especially the Labour party could be used to greater effect to challenge potentially -damaging influence of anti-nuclear campaigners. The National Campaign for the Nuclear Industry (NCNI) was born, combining nine industrial and non-industrial trade unions within the nuclear industry. Its task during the last ten years has been to put forward the interests of its members collectively and to secure the, role of nuclear power. within a balanced energy policy in the political arena. In dome so, it has gained a credible voice within both the trade union movement and the Labour party. The new Thermal Oxide Reprocessing Plant (THORP) received strong support from the NCNI during its construction and commissioning phases. When it became clear that the anti-nuclear lobby had gained the upper hand and were beginning to seriously delay the necessary legal instruments required to start the plant, the power of collective action was once again recognised, and the TRUST US campaign was born. The campaign was run and organised by a clerks committee and fronted by the Trade Unions at Sellafield., and turned out to be one of the most successful] trade union campaigns in recent history. The first task involved getting, the entire workforce on

  7. Trust in Co-sourced Software Development

    DEFF Research Database (Denmark)

    Schlichter, Bjarne Rerup; Persson, John Stouby

    2014-01-01

    Software development projects are increasingly geographical distributed with offshoring. Co-sourcing is a highly integrative and cohesive approach, seen successful, to software development offshoring. However, research of how dynamic aspects of trust are shaped in co-sourcing activities is limite...... understanding or personal trust relations. The paper suggests how certain work practices among developers and managers can be explained using a dynamic trust lens based on Abstract Systems, especially dis- and re-embedding mechanisms......Software development projects are increasingly geographical distributed with offshoring. Co-sourcing is a highly integrative and cohesive approach, seen successful, to software development offshoring. However, research of how dynamic aspects of trust are shaped in co-sourcing activities is limited...

  8. The impact of the customer relationship management on organizational productivity, customer trust and satisfaction by using the structural equation model: A study in the Iranian hospitals

    Science.gov (United States)

    Yaghoubi, Maryam; Asgari, Hamed; Javadi, Marzieh

    2017-01-01

    Context: One of the challenges in the fiercely competitive space of health organizations is responding to customers and building trust and satisfaction in them in the shortest time, with best quality and highest productivity. Hence the aim of this study is to survey the impact of customer relationship management (CRM) on organizational productivity, customer loyalty, satisfaction and trust in selected hospitals of Isfahan (in Iran). Materials and Methods: This study is a correlation descriptive research. Study population was the nurses in selected hospitals of Isfahan and the sampling has been conducted using stratified random method. Data collection tool is a researcher-made questionnaire of CRM and its effects (organizational productivity, customer loyalty, satisfaction and trust) which its validity and reliability has been confirmed by researchers. Structural equation method was used to determine the impact of variables. Data analysis method was structural equation modeling and the software used was SPSS version 16 (IBM, SPSS, 2007 Microsoft Corp., Bristol, UK) and AMOS version 18 (IBM, SPSS, 2010 Microsoft Corp, Bristol, UK). Results: Among the dimensions of CRM, diversification had the highest impact (0.83) and customer acquisition had the lowest (0.57) CRM, had the lowest impact on productivity (0.59) and the highest effect on customer satisfaction (0.83). Conclusions: For the implementation of CRM, it is necessary that the studied hospitals improve strategies of acquiring information about new customers, attracting new customers and keeping them and communication with patients outside the hospital and improve the system of measuring patient satisfaction and loyalty. PMID:28546971

  9. Evaluation of social interaction, task management, and trust among dental hygiene students in a collaborative learning environment.

    Science.gov (United States)

    Saylor, Catherine D; Keselyak, Nancy T; Simmer-Beck, Melanie; Tira, Daniel

    2011-02-01

    The purpose of this study was to evaluate the impact of collaborative learning on the development of social interaction, task management, and trust in dental hygiene students. These three traits were assessed with the Teamwork Assessment Scale in two different learning environments (traditional lecture/lab and collaborative learning environment). A convenience sample of fifty-six entry-level dental hygiene students taking an introductory/preclinic course at two metropolitan area dental hygiene programs provided comparable experimental and control groups. Factor scores were computed for the three traits, and comparisons were conducted using the Ryan-Einot-Gabriel-Welsh multiple comparison procedure among specific cell comparisons generated from a two-factor repeated measures ANOVA. The results indicate that the collaborative learning environment influenced dental hygiene students positively regarding the traits of social interaction, task management, and trust. However, comparing dental hygiene students to undergraduate students overall indicates that dental hygiene students already possess somewhat higher levels of these traits. Future studies on active learning strategies should examine factors such as student achievement and explore other possible active learning methodologies.

  10. Portfolio Management System

    Data.gov (United States)

    US Agency for International Development — PfMS is an implementation of WorkLenz. WorkLenz is USAID's portfolio management system tool. It is a commercially available, off-the-shelf (COTS) package that...

  11. Environmental Management Systems

    Science.gov (United States)

    This site on Environmental Management Systems (EMS) provides information and resources related to EMS for small businesses and private industry, as well as local, state and federal agencies, including all the EPA offices and laboratories.

  12. Holdings Management System

    Data.gov (United States)

    National Archives and Records Administration — This system supports the physical management of permanent, hard-copy archival Records in the custody of National Archives and Records Administration program offices.

  13. Correspondence Management System

    Data.gov (United States)

    U.S. Environmental Protection Agency — CMS is EPA's correspondence tracking and workflow management system. It scans, logs, routes, tracks, and stores incoming and outgoing correspondence in all Program...

  14. Earned Value Management System

    Data.gov (United States)

    US Agency for International Development — EVMS is a system for measuring project performance and progress in an objective manner by supporting earned value management. EVMS has the ability to combine...

  15. A distribution management system

    Energy Technology Data Exchange (ETDEWEB)

    Verho, P.; Jaerventausta, P.; Kaerenlampi, M.; Paulasaari, H. [Tampere Univ. of Technology (Finland); Partanen, J. [Lappeenranta Univ. of Technology (Finland)

    1996-12-31

    The development of new distribution automation applications is considerably wide nowadays. One of the most interesting areas is the development of a distribution management system (DMS) as an expansion of the traditional SCADA system. At the power transmission level such a system is called an energy management system (EMS). The idea of these expansions is to provide supporting tools for control center operators in system analysis and operation planning. The needed data for new applications is mainly available in some existing systems. Thus the computer systems of utilities must be integrated. The main data source for the new applications in the control center are the AM/FM/GIS (i.e. the network database system), the SCADA, and the customer information system (CIS). The new functions can be embedded in some existing computer system. This means a strong dependency on the vendor of the existing system. An alternative strategy is to develop an independent system which is integrated with other computer systems using well-defined interfaces. The latter approach makes it possible to use the new applications in various computer environments, having only a weak dependency on the vendors of the other systems. In the research project this alternative is preferred and used in developing an independent distribution management system

  16. A distribution management system

    Energy Technology Data Exchange (ETDEWEB)

    Verho, P; Jaerventausta, P; Kaerenlampi, M; Paulasaari, H [Tampere Univ. of Technology (Finland); Partanen, J [Lappeenranta Univ. of Technology (Finland)

    1997-12-31

    The development of new distribution automation applications is considerably wide nowadays. One of the most interesting areas is the development of a distribution management system (DMS) as an expansion of the traditional SCADA system. At the power transmission level such a system is called an energy management system (EMS). The idea of these expansions is to provide supporting tools for control center operators in system analysis and operation planning. The needed data for new applications is mainly available in some existing systems. Thus the computer systems of utilities must be integrated. The main data source for the new applications in the control center are the AM/FM/GIS (i.e. the network database system), the SCADA, and the customer information system (CIS). The new functions can be embedded in some existing computer system. This means a strong dependency on the vendor of the existing system. An alternative strategy is to develop an independent system which is integrated with other computer systems using well-defined interfaces. The latter approach makes it possible to use the new applications in various computer environments, having only a weak dependency on the vendors of the other systems. In the research project this alternative is preferred and used in developing an independent distribution management system

  17. A Meta-Analysis of Factors Influencing the Development of Trust in Automation: Implications for Understanding Autonomy in Future Systems.

    Science.gov (United States)

    Schaefer, Kristin E; Chen, Jessie Y C; Szalma, James L; Hancock, P A

    2016-05-01

    We used meta-analysis to assess research concerning human trust in automation to understand the foundation upon which future autonomous systems can be built. Trust is increasingly important in the growing need for synergistic human-machine teaming. Thus, we expand on our previous meta-analytic foundation in the field of human-robot interaction to include all of automation interaction. We used meta-analysis to assess trust in automation. Thirty studies provided 164 pairwise effect sizes, and 16 studies provided 63 correlational effect sizes. The overall effect size of all factors on trust development was ḡ = +0.48, and the correlational effect was [Formula: see text]  = +0.34, each of which represented medium effects. Moderator effects were observed for the human-related (ḡ  = +0.49; [Formula: see text] = +0.16) and automation-related (ḡ = +0.53; [Formula: see text] = +0.41) factors. Moderator effects specific to environmental factors proved insufficient in number to calculate at this time. Findings provide a quantitative representation of factors influencing the development of trust in automation as well as identify additional areas of needed empirical research. This work has important implications to the enhancement of current and future human-automation interaction, especially in high-risk or extreme performance environments. © 2016, Human Factors and Ergonomics Society.

  18. Trust-based or performance-based management: a study of employment contracting in hospitals.

    Science.gov (United States)

    Pettersen, Inger Johanne

    2011-01-01

    Hospitals are frequently changing managerial practices due to numerous public sector reforms taking place. In general, these reforms include the making and monitoring of contracts that regulate relations between the hospitals and their professional staffs. The aim of this paper is to discuss some main characteristics of the contracts that regulate the perceived relations between physicians as employees and the public hospital as employer. The theoretical framework is based on a contract theory approach. The empirical data is based on survey data from full-time employed physicians in the medical and surgical divisions in one of the largest university hospitals in Norway. This study shows that perceived obligations and psychological contracts indicate high degree of relational contracts between the hospital and the physicians. These socio-cultural elements should be recognized as important mechanisms of coordination and communication when policy makers and hospital managers are designing hospital management control systems. Copyright © 2009 John Wiley & Sons, Ltd.

  19. Systems engineering management plan

    International Nuclear Information System (INIS)

    Conner, C.W.

    1985-10-01

    The purpose of this Systems Engineering Management Plan (SEMP) is to prescribe the systems engineering procedures to be implemented at the Program level and the minimum requirements for systems engineering at the Program-element level. The Program level corresponds to the Director, OCRWM, or to the organizations within OCRWM to which the Director delegates responsibility for the development of the System and for coordinating and integrating the activities at the Program-element level. The Office of Policy and Outreach (OPO) and the Office of Resource Management (ORM) support the Director at the Program level. The Program-element level corresponds to the organizations within OCRWM (i.e., the Office of Geologic Repositories (OGR) and the Office of Storage and Transportation Systems (OSTS)) with overall responsibility for developing the System elements - that is, the mined geologic disposal system (MGDS), monitored retrievable storage (MRS) (if approved by Congress), and the transportation system

  20. Designing High-Trust Organizations

    DEFF Research Database (Denmark)

    Jagd, Søren

    The specific problem considered in this paper is what are the key issues to consider for managers involved in designing high-trust organizations, a design problem still not properly explored. This paper intends to take the first step in filling this lacuna. In the paper, I first present...... the existing management and research literature on building high-trust organizations. Then I explore Alan Fox’s (1974) analysis of low-trust vs. high-trust dynamics which, I argue, may serve as a theoretically stronger basis for understanding the issues management have to consider when designing hightrust...... organizations...

  1. Trust and Credit

    DEFF Research Database (Denmark)

    Harste, Gorm

    The present paper is an answer to the question, how did trust and credit emerge. The systems of trust and credit reduce the environmental and contextual complexities in which trust and credit are embedded. The paper analyses the forms of this reduction in a number of stages in the evolution...... of history from the present risk of modern systems back to early modernity, the Reformation and the high medieval Revolutions in law, organization and theology. It is not a history of economics, but a history of the conditions of some communication codes used in economic systems....

  2. Audit Management System

    CERN Document Server

    Alconada, Federico

    2015-01-01

    In the need of renewing their system, the Internal Audit department has given a proposal for building a new one. Taking into consideration the problems of their system they elaborated a requirement's list with the functionalities and features they were expecting from the new management system. This new system would be primarily for the use of the Internal Audit staff but it would also support the follow-up of internal audit recommendations by potentially all CERN staff members.

  3. The Role of Trust and Interaction in Global Positioning System Related Accidents

    Science.gov (United States)

    Johnson, Chris W.; Shea, Christine; Holloway, C. Michael

    2008-01-01

    The Global Positioning System (GPS) uses a network of satellites to calculate the position of a receiver over time. This technology has revolutionized a wide range of safety-critical industries and leisure applications. These systems provide diverse benefits; supplementing the users existing navigation skills and reducing the uncertainty that often characterizes many route planning tasks. GPS applications can also help to reduce workload by automating tasks that would otherwise require finite cognitive and perceptual resources. However, the operation of these systems has been identified as a contributory factor in a range of recent accidents. Users often come to rely on GPS applications and, therefore, fail to notice when they develop faults or when errors occur in the other systems that use the data from these systems. Further accidents can stem from the over confidence that arises when users assume automated warnings will be issued when they stray from an intended route. Unless greater attention is paid to the role of trust and interaction in GPS applications then there is a danger that we will see an increasing number of these failures as positioning technologies become integral in the functioning of increasing numbers of applications.

  4. Health care alliances and alternative dispute resolution: managing trust and conflict.

    Science.gov (United States)

    Rotarius, T; Liberman, A

    2000-03-01

    The U.S. health care industry has entered an unprecedented era of alliance activity. These alliances involve medical groups and hospitals, as well as many of the newer health care entities such as managed care organizations and integrated delivery systems. The increase in organizational collaboration has resulted in an increase in organizational conflict. Alternative dispute resolution (ADR) techniques can serve as a valuable tool for mitigating this type of conflict. The role of ADR is to refocus partners' attentions away from an adversarial posture and toward a complementary existence. This will permit the partners to realize the intended outcomes of the collaboration.

  5. Electrical distribution system management

    International Nuclear Information System (INIS)

    Hajos, L.; Mortarulo, M.; Chang, K.; Sparks, T.

    1990-01-01

    This paper reports that maintenance of electrical system data is essential to the operation, maintenance, and modification of a nuclear station. Load and equipment changes affect equipment sizing, available short-circuit currents and protection coordination. System parameters must be maintained in a controlled manner to enable evaluation of proposed modifications and provide adequate verification and traceability. For this purpose, Public Service Electric and Gas Company has implemented a Verified and Validated Electric Distribution System Management (EDSM) program at the Hope Creek and Salem Nuclear Power Stations. EDSM program integrates computerized configuration management of electrical systems with calculational software the Technical Standard procedures. The software platform is PC-based. The Database Manager and Calculational programs have been linked together through a user friendly menu system. The database management nodule enable s assembly and maintenance of databases for individual loads, buses, and branches within the electrical systems with system access and approval controlled through electronic security incorporated within the database manger. Reports drawn from the database serve as the as-built and/or as-designed record of the system configurations. This module also creates input data files of network parameters in a format readable by the calculational modules. Calculations modules provide load flow, voltage drop, motor starting, and short-circuit analyses, as well as dynamic analyses of bus transfers

  6. Sewer System Management Plan.

    Energy Technology Data Exchange (ETDEWEB)

    Holland, Robert C. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-08-01

    A Sewer System Management Plan (SSMP) is required by the State Water Resources Control Board (SWRCB) Order No. 2006-0003-DWQ Statewide General Waste Discharge Requirements (WDR) for Sanitary Sewer Systems (General Permit). DOE, National Nuclear Security Administration (NNSA), Sandia Field Office has filed a Notice of Intent to be covered under this General Permit. The General Permit requires a proactive approach to reduce the number and frequency of sanitary sewer overflows (SSOs) within the State. SSMPs must include provisions to provide proper and efficient management, operation, and maintenance of sanitary sewer systems and must contain a spill response plan.

  7. Program management system manual

    International Nuclear Information System (INIS)

    1989-08-01

    OCRWM has developed a program management system (PMS) to assist in organizing, planning, directing and controlling the Civilian Radioactive Waste Management Program. A well defined management system is necessary because: (1) the Program is a complex technical undertaking with a large number of participants, (2) the disposal and storage facilities to be developed by the Program must be licensed by the Nuclear Regulatory Commission (NRC) and hence are subject to rigorous quality assurance (QA) requirements, (3) the legislation mandating the Program creates a dichotomy between demanding schedules of performance and a requirement for close and continuous consultation and cooperation with external entities, (4) the various elements of the Program must be managed as parts of an integrated waste management system, (5) the Program has an estimated total system life cycle cost of over $30 billion, and (6) the Program has a unique fiduciary responsibility to the owners and generators of the nuclear waste for controlling costs and minimizing the user fees paid into the Nuclear Waste Fund. This PMS Manual is designed and structured to facilitate strong, effective Program management by providing policies and requirements for organizing, planning, directing and controlling the major Program functions

  8. Authenticated Blind Issuing of Symmetric Keys for Mobile Access Control System without Trusted Parties

    Directory of Open Access Journals (Sweden)

    Shin-Yan Chiou

    2013-01-01

    Full Text Available Mobile authentication can be used to verify a mobile user’s identity. Normally this is accomplished through the use of logon passwords, but this can raise the secret-key agreement problem between entities. This issue can be resolved by using a public-key cryptosystem, but mobile devices have limited computation ability and battery capacity and a PKI is needed. In this paper, we propose an efficient, non-PKI, authenticated, and blind issued symmetric key protocol for mobile access control systems. An easy-to-deploy authentication and authenticated key agreement system is designed such that empowered mobile devices can directly authorize other mobile devices to exchange keys with the server upon authentication using a non-PKI system without trusted parties. Empowered mobile users do not know the key value of the other mobile devices, preventing users from impersonating other individuals. Also, for security considerations, this system can revoke specific keys or keys issued by a specific user. The scheme is secure, efficient, and feasible and can be implemented in existing environments.

  9. A distribution management system

    Energy Technology Data Exchange (ETDEWEB)

    Jaerventausta, P; Verho, P; Kaerenlampi, M; Pitkaenen, M [Tampere Univ. of Technology (Finland); Partanen, J [Lappeenranta Univ. of Technology (Finland)

    1998-08-01

    The development of new distribution automation applications is considerably wide nowadays. One of the most interesting areas is the development of a distribution management system (DMS) as an expansion to the traditional SCADA system. At the power transmission level such a system is called an energy management system (EMS). The idea of these expansions is to provide supporting tools for control center operators in system analysis and operation planning. Nowadays the SCADA is the main computer system (and often the only) in the control center. However, the information displayed by the SCADA is often inadequate, and several tasks cannot be solved by a conventional SCADA system. A need for new computer applications in control center arises from the insufficiency of the SCADA and some other trends. The latter means that the overall importance of the distribution networks is increasing. The slowing down of load-growth has often made network reinforcements unprofitable. Thus the existing network must be operated more efficiently. At the same time larger distribution areas are for economical reasons being monitored at one control center and the size of the operation staff is decreasing. The quality of supply requirements are also becoming stricter. The needed data for new applications is mainly available in some existing systems. Thus the computer systems of utilities must be integrated. The main data source for the new applications in the control center are the AM/FM/GIS (i.e. the network database system), the SCADA, and the customer information system (CIS). The new functions can be embedded in some existing computer system. This means a strong dependency on the vendor of the existing system. An alternative strategy is to develop an independent system which is integrated with other computer systems using well-defined interfaces. The latter approach makes it possible to use the new applications in various computer environments, having only a weak dependency on the

  10. Trust metrics in information fusion

    Science.gov (United States)

    Blasch, Erik

    2014-05-01

    Trust is an important concept for machine intelligence and is not consistent across many applications. In this paper, we seek to understand trust from a variety of factors: humans, sensors, communications, intelligence processing algorithms and human-machine displays of information. In modeling the various aspects of trust, we provide an example from machine intelligence that supports the various attributes of measuring trust such as sensor accuracy, communication timeliness, machine processing confidence, and display throughput to convey the various attributes that support user acceptance of machine intelligence results. The example used is fusing video and text whereby an analyst needs trust information in the identified imagery track. We use the proportional conflict redistribution rule as an information fusion technique that handles conflicting data from trusted and mistrusted sources. The discussion of the many forms of trust explored in the paper seeks to provide a systems-level design perspective for information fusion trust quantification.

  11. Materials management information systems.

    Science.gov (United States)

    1996-01-01

    The hospital materials management function--ensuring that goods and services get from a source to an end user--encompasses many areas of the hospital and can significantly affect hospital costs. Performing this function in a manner that will keep costs down and ensure adequate cash flow requires effective management of a large amount of information from a variety of sources. To effectively coordinate such information, most hospitals have implemented some form of materials management information system (MMIS). These systems can be used to automate or facilitate functions such as purchasing, accounting, inventory management, and patient supply charges. In this study, we evaluated seven MMISs from seven vendors, focusing on the functional capabilities of each system and the quality of the service and support provided by the vendor. This Evaluation is intended to (1) assist hospitals purchasing an MMIS by educating materials managers about the capabilities, benefits, and limitations of MMISs and (2) educate clinical engineers and information system managers about the scope of materials management within a healthcare facility. Because software products cannot be evaluated in the same manner as most devices typically included in Health Devices Evaluations, our standard Evaluation protocol was not applicable for this technology. Instead, we based our ratings on our observations (e.g., during site visits), interviews we conducted with current users of each system, and information provided by the vendor (e.g., in response to a request for information [RFI]). We divided the Evaluation into the following sections: Section 1. Responsibilities and Information Requirements of Materials Management: Provides an overview of typical materials management functions and describes the capabilities, benefits, and limitations of MMISs. Also includes the supplementary article, "Inventory Cost and Reimbursement Issues" and the glossary, "Materials Management Terminology." Section 2. The

  12. Management Information System

    Science.gov (United States)

    1984-01-01

    New Automated Management Information Center (AMIC) employs innovative microcomputer techniques to create color charts, viewgraphs, or other data displays in a fraction of the time formerly required. Developed under Kennedy Space Center's contract by Boeing Services International Inc., Seattle, WA, AMIC can produce an entirely new informational chart in 30 minutes, or an updated chart in only five minutes. AMIC also has considerable potential as a management system for business firms.

  13. Anesthesia information management systems

    OpenAIRE

    Feri Štivan; Janez Benedik; Tomaž Lužar

    2014-01-01

    Introduction: The use of anesthesia information management systems (AIMS) is on the increase. This is particularly true for academic anesthesia departments. The main reasons for slow adoption of these systems in the past are financial barriers associated with implementation of these systems and their not so traditionally obvious potential to improve patient care. In addition, a major obstacle to acceptance of this technology is the concern of users over the impact of the electronic anesthesia...

  14. Trust, temporality and systems: how do patients understand patient safety in primary care? A qualitative study.

    Science.gov (United States)

    Rhodes, Penny; Campbell, Stephen; Sanders, Caroline

    2016-04-01

    Patient safety research has tended to focus on hospital settings, although most clinical encounters occur in primary care, and to emphasize practitioner errors, rather than patients' own understandings of safety. To explore patients' understandings of safety in primary care. Qualitative interviews were conducted with patients recruited from general practices in northwest England. Participants were asked basic socio-demographic information; thereafter, topics were largely introduced by interviewees themselves. Transcripts were coded and analysed using NVivo10 (qualitative data software), following a process of constant comparison. Thirty-eight people (14 men, 24 women) from 19 general practices in rural, small town and city locations were interviewed. Many of their concerns (about access, length of consultation, relationship continuity) have been discussed in terms of quality, but, in the interviews, were raised as matters of safety. Three broad themes were identified: (i) trust and psycho-social aspects of professional-patient relationships; (ii) choice, continuity, access, and the temporal underpinnings of safety; and (iii) organizational and systems-level tensions constraining safety. Conceptualizations of safety included common reliance on a bureaucratic framework of accreditation, accountability, procedural rules and regulation, but were also individual and context-dependent. For patients, safety is not just a property of systems, but personal and contingent and is realized in the interaction between doctor and patient. However, it is the systems approach that has dominated safety thinking, and patients' individualistic and relational conceptualizations are poorly accommodated within current service organization. © 2015 The Authors Health Expectations Published by John Wiley & Sons Ltd.

  15. Enhancing Network Data Obliviousness in Trusted Execution Environment-based Stream Processing Systems

    KAUST Repository

    Alsibyani, Hassan M.

    2018-05-15

    Cloud computing usage is increasing and a common concern is the privacy and security of the data and computation. Third party cloud environments are not considered fit for processing private information because the data will be revealed to the cloud provider. However, Trusted Execution Environments (TEEs), such as Intel SGX, provide a way for applications to run privately and securely on untrusted platforms. Nonetheless, using a TEE by itself for stream processing systems is not sufficient since network communication patterns may leak properties of the data under processing. This work addresses leaky topology structures and suggests mitigation techniques for each of these. We create specific metrics to evaluate leaks occurring from the network patterns; the metrics measure information leaked when the stream processing system is running. We consider routing techniques for inter-stage communication in a streaming application to mitigate this data leakage. We consider a dynamic policy to change the mitigation technique depending on how much information is currently leaking. Additionally, we consider techniques to hide irregularities resulting from a filtering stage in a topology. We also consider leakages resulting from applications containing cycles. For each of the techniques, we explore their effectiveness in terms of the advantage they provide in overcoming the network leakage. The techniques are tested partly using simulations and some were implemented in a prototype SGX-based stream processing system.

  16. Advanced alarm management system

    International Nuclear Information System (INIS)

    Easter, J.R.

    1995-01-01

    The Westinghouse Advanced Alarm Management System (AWARE) is one of the Man-Machine Design Interfaces (MMI) which has great flexibility with regard to hardware type and configuration, alarm system concept, plant scope, engineering scope and installation. The AWARE System provides the capability to better manage the quantity prioritization and presentation of real-time process alarm messages in the control room. The messages are specific, precise and dynamic. The AWARE System can provide a large reduction in the number of messages that the control room staff must address at any one time, thus making the alarm message system a useful tool for the operators during situations that normally produce a high volume of messages as well as improving the clarity of the presentation of process abnormalities during small disturbances. The operating staff is now provided with the basis for a better understanding of the current plant state and for taking the appropriate control actions. (2 refs., 3 figs.)

  17. The Relationship between Teamwork and Organizational Trust

    Directory of Open Access Journals (Sweden)

    Musab Işık

    2015-04-01

    Full Text Available The aim of this study is to investigate the relationship between teamwork and organizational trust. In the implementation section the data from the survey of 250 workers is employed in call centers in Erzurum by using relevant statistical methods. Consequently, it is found that there is a positive and significant relationship between teamwork and organizational trust. Thus, the hypothesis of the study is supported as it was expected. Besides, it is found that there are positive and significant relationships between communication, openness to innovation, participation-trust in teamwork and organizational trust, trust in management, trust in co-workers, and trust in workplace.

  18. Pickering tool management system

    International Nuclear Information System (INIS)

    Wong, E.H.; Green, A.H.

    1997-01-01

    Tools were being deployed in the station with no process in effect to ensure that they are maintained in good repair so as to effectively support the performance of Maintenance activities. Today's legal requirements require that all employers have a process in place to ensure that tools are maintained in a safe condition. This is specified in the Ontario Health and Safety Act. The Pickering Tool Management System has been chosen as the process at Pickering N.D to manage tools. Tools are identified by number etching and bar codes. The system is a Windows application installed on several file servers

  19. Trusted Unix Working Group (TRUSIX) Rationale for Selecting Access Control List Features for the Unix System

    National Research Council Canada - National Science Library

    1989-01-01

    .... By addressing the class B3 issues, the NCSC believes that this information will also kelp vendors understand how evaluation interpretations will be made at the levels of trust below this class...

  20. BWR reactor management system

    International Nuclear Information System (INIS)

    Makino, Kakuji; Kawamura, Atsuo; Yoshioka, Ritsuo; Neda, Toshikatsu.

    1979-01-01

    It is necessary to grasp the delicate state of operation in reactor cores in view of the control of burn-up and power output at the time of the operation management of BWRs. Enormous labor has been required for the collection, processing and evaluation of the data. It is desirable to obtain the safer, more efficient and faster method of operation control by predicting the states in cores including the change of xenon and reflecting them to operation plans as well as by tracing with high accuracy the past burn-up history for a long period. At present, the on-line evaluation of the states in cores is carried out with the process computers attached to respective units, but the amount of data required for core operation management of high degree far exceeds their capacity. From such viewpoints, the research and development on the reactor management system were carried out. The data processing concerning core operation management is performed with newly installed computers utilizing the data from existing process computers, and the operation of reactor cores, the qualitative improvement of management works, labor saving, and fast, efficient operation control are feasible with it. This system was installed in an actual plant in October, 1977. The composition of the system, the prediction of the change in local output distribution accompanying control rod operation, the prediction of the change in the states in cores due to the flow rate of coolant, and the function of collecting plant data are explained. (Kako, I.)

  1. Management control system description

    Energy Technology Data Exchange (ETDEWEB)

    Bence, P. J.

    1990-10-01

    This Management Control System (MCS) description describes the processes used to manage the cost and schedule of work performed by Westinghouse Hanford Company (Westinghouse Hanford) for the US Department of Energy, Richland Operations Office (DOE-RL), Richland, Washington. Westinghouse Hanford will maintain and use formal cost and schedule management control systems, as presented in this document, in performing work for the DOE-RL. This MCS description is a controlled document and will be modified or updated as required. This document must be approved by the DOE-RL; thereafter, any significant change will require DOE-RL concurrence. Westinghouse Hanford is the DOE-RL operations and engineering contractor at the Hanford Site. Activities associated with this contract (DE-AC06-87RL10930) include operating existing plant facilities, managing defined projects and programs, and planning future enhancements. This document is designed to comply with Section I-13 of the contract by providing a description of Westinghouse Hanford's cost and schedule control systems used in managing the above activities. 5 refs., 22 figs., 1 tab.

  2. Trust-distrust Balance

    DEFF Research Database (Denmark)

    Jukka, Minna; Blomqvist, Kirsimarja; Li, Peter Ping

    2017-01-01

    notion of "guanxi" as personal ties. In contrast, the Finnish managers' view of trustworthiness was more associated with depersonalized organizational attributes. They emphasized the dimension of integrity, especially promise-keeping. In addition, tentative signs of trust ambivalence, as a balance...... opposites constitute a duality to be managed from the perspective of yin-yang balancing....

  3. Trust in agile teams

    DEFF Research Database (Denmark)

    Tjørnehøj, Gitte; Fransgård, Mette; Skalkam, Signe

    2012-01-01

    actions influenced this. We see two important lessons from the analysis. First the agile practices of daily Scrum and self organizing team can empower DSD teams to manage their own development of trust and thereby alleviate the obstacles of DSD. Second if management fails to support the development...

  4. Integrated management system

    International Nuclear Information System (INIS)

    Florescu, N.

    2003-01-01

    A management system is developed in order to reflect the needs of the business and to ensure that the objectives of the organization will be achieved. The process model and each individual process within the system then needs to identify the drives or requirements from external customers and stakeholders, regulations, and standards such as ISO and 50-C-Q. The processes are then developed to address these drivers. Developing the process in this way makes it fully integrated and capable of incorporating any new requirements. The International Standard (ISO 9000:2000) promotes the adoption of a process approach when developing, implementing and improving the effectiveness of a quality management system to enhance customer satisfaction by meeting customer requirements. The IAEA Code recognizes that the entire work is a process which can be planned, assessed and improved. For an organization to function effectively, numerous linked activities have to be identified and managed. By definition a process is an activity that using resources and taking into account all the constraints imposed executes the necessary operations which transform the inputs in outcomes. Running a system of processes within an organization, identification of the interaction between the processes and their management can be referred to as a 'process approach'. The advantage of such an approach is the ensuring of the ongoing control over the linkage between the individual processes composing the system as well as over their combination and interaction. Developing a management system implies: identification of the process which delivers Critical Success Factor (CSFs) of the business; identifying the support processes enabling the CSFs to be accomplished; identifying the processes that deliver the business fundamentals. An integrated management system should include all activities not only those related to Quality, Health and Safety. When developing an IMS it is necessary to identify all of the drivers

  5. Maintenance work management system

    International Nuclear Information System (INIS)

    Kanai, T.; Takahashi, Y.; Takahashi, K.; Nishino, M.; Takeshige, R.

    2000-01-01

    The maintenance work management system supports the efficient drawing up of various documents for the maintenance work at nuclear power stations and the speeding up of the permission procedure. In addition, it improves the quality assurance of the safety and reliability of the maintenance work. Key merits of the system are: 1. Efficiently drawing up various documents for the maintenance work by using the stored data for the previous maintenance work and the pipe and instrument diagram (P and ID) data. 2. Supporting the management work for the completion of maintenance work safety by using the isolation information stored on the computer system. 3. Speeding up the permission procedure by electronic mail and electronic permission. 4. Displaying additional information such as the specifications of equipment, maintenance result, and maintenance plan by linking up with the database of another system. 5. Reducing the cost of hardware devices by using client/server network configurations of personal computers and a personal computer server. (author)

  6. DIRAC Data Management System

    CERN Document Server

    Smith, A C

    2007-01-01

    The LHCb experiment being built to utilize CERN’s flagship Large Hadron Collider will generate data to be analysed by a community of over 600 physicists worldwide. DIRAC, LHCb’s Workload and Data Management System, facilitates the use of underlying EGEE Grid resources to generate, process and analyse this data in the distributed environment. The Data Management System, presented here, provides real-time, data-driven distribution in accordance with LHCb’s Computing Model. The data volumes produced by the LHC experiments are unprecedented, rendering individual institutes and even countries, unable to provide the computing and storage resources required to make full use of the produced data. EGEE Grid resources allow the processing of LHCb data possible in a distributed fashion and LHCb’s Computing Model is based on this approach. Data Management in this environment requires reliable and high-throughput transfer of data, homogeneous access to storage resources and the cataloguing of data replicas, all of...

  7. DISEASE MANAGEMENT INFORMATION SYSTEM

    OpenAIRE

    Bens Pardamean; Anindito; Anjela Djoeang; Nana Tobing

    2013-01-01

    The study designed an information system model for Disease Management (DisMan) that met the specifications and needs of a consumer electronics manufacturer. The diseases monitored by this study were diabetes, hypertension and tuberculosis. Data were collected through interviews with the companyâs human resources department and occupational health provider. As for the model, literature and online research were conducted to collect health standards and information system standards on existing D...

  8. Integrated management systems

    DEFF Research Database (Denmark)

    Jørgensen, Tine Herreborg; Remmen, Arne; Mellado, M. Dolores

    2006-01-01

    Different approaches to integration of management systems (ISO 9001, ISO 14001, OHSAS 18001 and SA 8000) with various levels of ambition have emerged. The tendency of increased compatibility between these standards has paved the road for discussions of, how to understand the different aspects of ...

  9. Managing Complex Dynamical Systems

    Science.gov (United States)

    Cox, John C.; Webster, Robert L.; Curry, Jeanie A.; Hammond, Kevin L.

    2011-01-01

    Management commonly engages in a variety of research designed to provide insight into the motivation and relationships of individuals, departments, organizations, etc. This paper demonstrates how the application of concepts associated with the analysis of complex systems applied to such data sets can yield enhanced insights for managerial action.

  10. Visual management support system

    Science.gov (United States)

    Lee Anderson; Jerry Mosier; Geoffrey Chandler

    1979-01-01

    The Visual Management Support System (VMSS) is an extension of an existing computer program called VIEWIT, which has been extensively used by the U. S. Forest Service. The capabilities of this program lie in the rapid manipulation of large amounts of data, specifically opera-ting as a tool to overlay or merge one set of data with another. VMSS was conceived to...

  11. Advanced Distribution Management System

    OpenAIRE

    Avazov, Artur; Sobinova, Lubov Anatolievna

    2016-01-01

    This article describes the advisability of using advanced distribution management systems in the electricity distribution networks area and considers premises of implementing ADMS within the Smart Grid era. Also, it gives the big picture of ADMS and discusses the ADMS advantages and functionalities.

  12. Advanced Distribution Management System

    Science.gov (United States)

    Avazov, Artur R.; Sobinova, Liubov A.

    2016-02-01

    This article describes the advisability of using advanced distribution management systems in the electricity distribution networks area and considers premises of implementing ADMS within the Smart Grid era. Also, it gives the big picture of ADMS and discusses the ADMS advantages and functionalities.

  13. Advanced Distribution Management System

    Directory of Open Access Journals (Sweden)

    Avazov Artur R.

    2016-01-01

    Full Text Available This article describes the advisability of using advanced distribution management systems in the electricity distribution networks area and considers premises of implementing ADMS within the Smart Grid era. Also, it gives the big picture of ADMS and discusses the ADMS advantages and functionalities.

  14. Modeling trust context in networks

    CERN Document Server

    Adali, Sibel

    2013-01-01

    We make complex decisions every day, requiring trust in many different entities for different reasons. These decisions are not made by combining many isolated trust evaluations. Many interlocking factors play a role, each dynamically impacting the others.? In this brief, 'trust context' is defined as the system level description of how the trust evaluation process unfolds.Networks today are part of almost all human activity, supporting and shaping it. Applications increasingly incorporate new interdependencies and new trust contexts. Social networks connect people and organizations throughout

  15. Metadata trust in a personal video recorder

    NARCIS (Netherlands)

    Boertjes, E.M.

    2004-01-01

    Trust is the belief or confidence in someone that their recommendations will work for you, i.e. that you will like the TV-programs (or other content) that they recommend. Many systems incorporate some notion of trust. Trust is more than similarity in taste, which makes trust a broader concept than

  16. An Operational Semantics for Trust Policies

    DEFF Research Database (Denmark)

    Krukow, Karl Kristian

    2005-01-01

    In the trust-structure model of trust management, principals specify their trusting relationships with other principals in terms of trust policies. In their paper on trust structures, Carbone et al. present a language for trust policies, and provide a suitable denotational semantics. The semantics...... ensures that for any collection of trust policies, there is always a unique global trust-state, compatible with all the policies, specifying everyone's degree of trust in everyone else. However, as the authors themselves point out, the language lacks an operational model: the global trust-state is a well......-defined mathematical object, but it is not clear how principals can actually compute it. This becomes even more apparent when one considers the intended application environment: vast numbers of autonomous principals, distributed and possibly mobile. We provide a compositional operational semantics for a language...

  17. A Cloud Theory-Based Trust Computing Model in Social Networks

    Directory of Open Access Journals (Sweden)

    Fengming Liu

    2016-12-01

    Full Text Available How to develop a trust management model and then to efficiently control and manage nodes is an important issue in the scope of social network security. In this paper, a trust management model based on a cloud model is proposed. The cloud model uses a specific computation operator to achieve the transformation from qualitative concepts to quantitative computation. Additionally, this can also be used to effectively express the fuzziness, randomness and the relationship between them of the subjective trust. The node trust is divided into reputation trust and transaction trust. In addition, evaluation methods are designed, respectively. Firstly, the two-dimension trust cloud evaluation model is designed based on node’s comprehensive and trading experience to determine the reputation trust. The expected value reflects the average trust status of nodes. Then, entropy and hyper-entropy are used to describe the uncertainty of trust. Secondly, the calculation methods of the proposed direct transaction trust and the recommendation transaction trust involve comprehensively computation of the transaction trust of each node. Then, the choosing strategies were designed for node to trade based on trust cloud. Finally, the results of a simulation experiment in P2P network file sharing on an experimental platform directly reflect the objectivity, accuracy and robustness of the proposed model, and could also effectively identify the malicious or unreliable service nodes in the system. In addition, this can be used to promote the service reliability of the nodes with high credibility, by which the stability of the whole network is improved.

  18. Smart energy management system

    Science.gov (United States)

    Desai, Aniruddha; Singh, Jugdutt

    2010-04-01

    Peak and average energy usage in domestic and industrial environments is growing rapidly and absence of detailed energy consumption metrics is making systematic reduction of energy usage very difficult. Smart energy management system aims at providing a cost-effective solution for managing soaring energy consumption and its impact on green house gas emissions and climate change. The solution is based on seamless integration of existing wired and wireless communication technologies combined with smart context-aware software which offers a complete solution for automation of energy measurement and device control. The persuasive software presents users with easy-to-assimilate visual cues identifying problem areas and time periods and encourages a behavioural change to conserve energy. The system allows analysis of real-time/statistical consumption data with the ability to drill down into detailed analysis of power consumption, CO2 emissions and cost. The system generates intelligent projections and suggests potential methods (e.g. reducing standby, tuning heating/cooling temperature, etc.) of reducing energy consumption. The user interface is accessible using web enabled devices such as PDAs, PCs, etc. or using SMS, email, and instant messaging. Successful real-world trial of the system has demonstrated the potential to save 20 to 30% energy consumption on an average. Low cost of deployment and the ability to easily manage consumption from various web enabled devices offers gives this system a high penetration and impact capability offering a sustainable solution to act on climate change today.

  19. Air System Information Management

    Science.gov (United States)

    Filman, Robert E.

    2004-01-01

    I flew to Washington last week, a trip rich in distributed information management. Buying tickets, at the gate, in flight, landing and at the baggage claim, myriad messages about my reservation, the weather, our flight plans, gates, bags and so forth flew among a variety of travel agency, airline and Federal Aviation Administration (FAA) computers and personnel. By and large, each kind of information ran on a particular application, often specialized to own data formats and communications network. I went to Washington to attend an FAA meeting on System-Wide Information Management (SWIM) for the National Airspace System (NAS) (http://www.nasarchitecture.faa.gov/Tutorials/NAS101.cfm). NAS (and its information infrastructure, SWIM) is an attempt to bring greater regularity, efficiency and uniformity to the collection of stovepipe applications now used to manage air traffic. Current systems hold information about flight plans, flight trajectories, weather, air turbulence, current and forecast weather, radar summaries, hazardous condition warnings, airport and airspace capacity constraints, temporary flight restrictions, and so forth. Information moving among these stovepipe systems is usually mediated by people (for example, air traffic controllers) or single-purpose applications. People, whose intelligence is critical for difficult tasks and unusual circumstances, are not as efficient as computers for tasks that can be automated. Better information sharing can lead to higher system capacity, more efficient utilization and safer operations. Better information sharing through greater automation is possible though not necessarily easy.

  20. TFTR data management system

    International Nuclear Information System (INIS)

    Randerson, L.; Chu, J.; Ludescher, C.; Malsbury, J.; Stark, W.

    1986-01-01

    Developments in the tokamak fusion test reactor (TFTR) data management system supporting data management system supporting data acquisition and off-line physics data reduction are described. Data from monitor points, timing channels, and transient recorder channels and other devices are acquired and stored for use by on-line tasks. Files are transferred off-line automatically. A configuration utility determines data acquired and files transferred. An event system driven by file arrival activates off-line reduction processes. A post-run process transfers files not shipped during runs. Files are archived to tape and are retrievable by digraph and shot number. Automatic skimming based on most recent access, file type, shot numbers, and user-set protection maintains the files required for post-run data reduction

  1. Management Information Systems

    Directory of Open Access Journals (Sweden)

    Furduescu Bogdan-Alexandru

    2017-12-01

    Full Text Available Technology is the science that studies processes, methods and operations run or applied onto raw materials, matters or data, in order to obtain a certain product. Information is the material signal able to launch a material reaction of a dynamic auto-tuning system for which the system is conditioned and finalized. Information Technology is the technology needed for handling (procuring, processing, storing converting and transmitting information, in particular, with the use of computers [Longley, D. & Shain, M. (1985, p. 164]. The importance of IT in the economic growth and development is widely known, taking into account the impact that technology can have on the success and survival, or the failure of the economic activity of enterprises/organizations, IT offering various management information systems (MIS, executive and feedback segments, which all have important and beneficial implications in management and control.

  2. How are homeless people treated in the healthcare system and other societal institutions? Study of their experiences and trust.

    Science.gov (United States)

    Irestig, Robert; Burström, Kristina; Wessel, Maja; Lynöe, Niels

    2010-05-01

    To elucidate the perceived treatment that the homeless have received from the healthcare and other societal organisations and to present homeless persons' trust in the healthcare system and suggestions of necessary changes for improving it. Homeless individuals in special houses and institutions in the County of Stockholm were asked to answer a short version of a public health survey, including added questions about how they experienced the healthcare providers' attitudes towards them and how much trust they had in the healthcare system. A total of 155 homeless persons (123 male and 32 female) were interviewed. Three-quarters of the participants stated that they had fairly or very high trust in healthcare services and also felt that they had been fairly or very well treated. Fewer females than males reported being treated well and they declared a lower degree of trust in the healthcare system. The homeless suggest that extra resources be set aside to organise their healthcare, including a higher level of knowledge of the medical problems prevailing in the group. Those who felt badly treated also asked for less neglect and disrespect from the healthcare staff. Even though a majority experience that they are being well treated within the healthcare system, the study also indicated disadvantages in the treatment of homeless persons in Sweden. The study also reveals an imbalance between the official ethical framework in Sweden and of the specific moral of some individual healthcare providers. One way to facilitate their entry into the healthcare system might be to create special surgeries for the homeless.

  3. ETHICS MANAGEMENT AND PATIENT CARE. A NECESSARY CONNECTION TOWARDS BUILDING AND MAINTAINING A RELATIONSHIP OF TRUST

    Directory of Open Access Journals (Sweden)

    Daniela-Tatiana AGHEORGHIESEI (CORODEANU

    2014-12-01

    Full Text Available Management of the health care institutions requires a responsible management of the scarce resources and in the same time satisfying the expectations of stakeholders regarding the provision of high quality services. The most important category of stakeholders is the patient. Patient care implies promoting strong ethical values, in other words, an ethics management. Our article is a theoretical and practical insight into this topic.

  4. Managing Conflict in Temporary Management Systems

    Science.gov (United States)

    Wilemon, David L.

    1973-01-01

    As organizational tasks have grown more complex, several innovative temporary management systems such as matrix management have been developed. The Apollo space program has been an important contribution to the development of matrix management techniques. Discusses the role of conflict within the matrix, its determinants, and the process of…

  5. Mastering the management system.

    Science.gov (United States)

    Kaplan, Robert S; Norton, David P

    2008-01-01

    Companies have always found it hard to balance pressing operational concerns with long-term strategic priorities. The tension is critical: World-class processes won't lead to success without the right strategic direction, and the best strategy in the world will get nowhere without strong operations to execute it. In this article, Kaplan, of Harvard Business School, and Norton, founder and director of the Palladium Group, explain how to effectively manage both strategy and operations by linking them tightly in a closed-loop management system. The system comprises five stages, beginning with strategy development, which springs from a company's mission, vision, and value statements, and from an analysis of its strengths, weaknesses, and competitive environment. In the next stage, managers translate the strategy into objectives and initiatives with strategy maps, which organize objectives by themes, and balanced scorecards, which link objectives to performance metrics. Stage three involves creating an operational plan to accomplish the objectives and initiatives; it includes targeting process improvements and preparing sales, resource, and capacity plans and dynamic budgets. Managers then put plans into action, monitoring their effectiveness in stage four. They review operational, environmental, and competitive data; assess progress; and identify barriers to execution. In the final stage, they test the strategy, analyzing cost, profitability, and correlations between strategy and performance. If their underlying assumptions appear faulty, they update the strategy, beginning another loop. The authors present not only a comprehensive blueprint for successful strategy execution but also a managerial tool kit, illustrated with examples from HSBC Rail, Cigna Property and Casualty, and Store 24. The kit incorporates leading management experts' frameworks, outlining where they fit into the management cycle.

  6. Use Trust Management Framework to Achieve Effective Security Mechanisms in Cloud Environment

    Directory of Open Access Journals (Sweden)

    Hicham Toumi

    2017-03-01

    Full Text Available Cloud Computing is an Internet based Computing where virtual shared servers provide software, infrastructure, platform and other resources to the customer on pay-as-you-use basis. Cloud Computing is increasingly becoming popular as many enterprise applications and data are moving into cloud platforms. However, with the enormous use of Cloud, the probability of occurring intrusion also increases. There is a major need of bringing security, transparency and reliability in cloud model for client satisfaction. One of the security issues is how to reduce the impact of any type of intrusion in this environment. To address this issue, a security solution is proposed in this paper. We provide a collaborative framework between our Hybrid Intrusion Detection System (Hy-IDS based on Mobile Agents and virtual firewalls. Therefore, our hybrid intrusion detection system consists of three types of IDS namely IDS-C, IDS-Cr and IDS-M, which are dispatched over three layer of cloud computing. In the first layer, we use IDS-C over our framework to collect, analyze and detect malicious data using Mobile Agents. In case of attack, we collect at the level of the second layer all the malicious data detected in the first layer for the generation of new signatures using IDS-Cr, which is based on a Signature Generation Algorithm (SGA and network intrusion detection system (NIDS. Finally, through an IDS-M placed in the third layer, the new signatures will be used to update the database NIDS belonging to IDS-Cr, then the database to NIDS belonging of IDS-Cr the cluster neighboring and also their IDS-C. Hardware firewall is unable to control communication between virtual machines on the same hypervisor. Moreover, they are blind to virtual traffic. Mostly, they are deployed at Virtual Machine Monitor- level (VMM under Cloud provider’s control. Equally, the mobile agents play an important role in this collaboration. They are used in our framework for investigation of hosts

  7. HMM-based Trust Model

    DEFF Research Database (Denmark)

    ElSalamouny, Ehab; Nielsen, Mogens; Sassone, Vladimiro

    2010-01-01

    Probabilistic trust has been adopted as an approach to taking security sensitive decisions in modern global computing environments. Existing probabilistic trust frameworks either assume fixed behaviour for the principals or incorporate the notion of ‘decay' as an ad hoc approach to cope...... with their dynamic behaviour. Using Hidden Markov Models (HMMs) for both modelling and approximating the behaviours of principals, we introduce the HMM-based trust model as a new approach to evaluating trust in systems exhibiting dynamic behaviour. This model avoids the fixed behaviour assumption which is considered...... the major limitation of existing Beta trust model. We show the consistency of the HMM-based trust model and contrast it against the well known Beta trust model with the decay principle in terms of the estimation precision....

  8. Verification Account Management System (VAMS)

    Data.gov (United States)

    Social Security Administration — The Verification Account Management System (VAMS) is the centralized location for maintaining SSA's verification and data exchange accounts. VAMS account management...

  9. Strategic Alliance Poker: Demonstrating the Importance of Complementary Resources and Trust in Strategic Alliance Management

    Science.gov (United States)

    Reutzel, Christopher R.; Worthington, William J.; Collins, Jamie D.

    2012-01-01

    Strategic Alliance Poker (SAP) provides instructors with an opportunity to integrate the resource based view with their discussion of strategic alliances in undergraduate Strategic Management courses. Specifically, SAP provides Strategic Management instructors with an experiential exercise that can be used to illustrate the value creation…

  10. HLT configuration management system

    CERN Document Server

    Daponte, Vincenzo

    2015-01-01

    The CMS High Level Trigger (HLT) is implemented running a streamlined version of the CMS offline reconstruction software running on thousands of CPUs. The CMS software is written mostly in C++, using Python as its configuration language through an embedded CPython interpreter. The configuration of each process is made up of hundreds of modules, organized in sequences and paths. As an example, the HLT configurations used for 2011 data taking comprised over 2200 different modules, organized in more than 400 independent trigger paths. The complexity of the HLT configurations and the large number of configuration produced require the design of a suitable data management system. The present work describes the designed solution to manage the considerable number of configurations developed and to assist the editing of new configurations. The system is required to be remotely accessible and OS-independent as well as easly maintainable easy to use. To meet these requirements a three-layers architecture has been choose...

  11. Data Management System

    Science.gov (United States)

    1997-01-01

    CENTRA 2000 Inc., a wholly owned subsidiary of Auto-trol technology, obtained permission to use software originally developed at Johnson Space Center for the Space Shuttle and early Space Station projects. To support their enormous information-handling needs, a product data management, electronic document management and work-flow system was designed. Initially, just 33 database tables comprised the original software, which was later expanded to about 100 tables. This system, now called CENTRA 2000, is designed for quick implementation and supports the engineering process from preliminary design through release-to-production. CENTRA 2000 can also handle audit histories and provides a means to ensure new information is distributed. The product has 30 production sites worldwide.

  12. The mental models of vaccination, trust in health care system and parental attitudes towards childhood vaccination

    Directory of Open Access Journals (Sweden)

    Bojan Gjorgjievski

    2016-11-01

    Full Text Available Many contradictory notions have been appearing in the area of health care in recent years, including those related to attitudes towards vaccination. On the basis of their understanding of the phenomenon some parents oppose to the vaccination. The purpose of this study was to compare mental models of laymen with expert models and examine the correlation of the mental models of vaccination and the trust in doctors and healthcare system with the parental attitudes on childhood vaccination. In doing so, we have considered the demographic characteristics of the parents and cultural differences between parents from Slovenia and Macedonia. We were also interested in the role of compulsory and optional vaccination, because in the latter the behavioral intention is expressed more clearly. The methods used in our study of mental models was based on the approach of Morgan, Fischhoff, Bostrom and Atman (2002 which has three phases: (1 obtaining expert mental models, (2 getting mental models of the laymen (e.g., parents and (3 comparison of both mental models. Expert models of vaccination were obtained from five doctors from Slovenia and five doctors from Macedonia. Laymen models of vaccination were obtained in structured interviews with 33 parents from Slovenia and 30 from Macedonia. Based on comparisons of expert and laymental models it can be concluded that the mental models of vaccination from parents of one-year old children differ from expert mental models. Most parents, both Macedonian and Slovenian, have also responded that they have greater confidence in the doctors rather than the healthcare system, mainly due to positive experiences with the selected pediatrician. In some Slovenian parents, a tendency to identify compulsory vaccination with force was noticed.

  13. Environmental management systems

    OpenAIRE

    Misiak, Małgorzata

    2016-01-01

    Considering environmental protection requirements in business operations may, in the long run, determine if a lasting comparative advantage can be achieved. That is why our textbook, rich in case studies, identifies not only the threats a business may pose to the environment but stresses the ways of reducing its negative impact. It discusses, among other things, the concept of corporate social responsibility, environmental management systems, methods and the importance of eco-labelling goods ...

  14. The Role of Organizational Control Systems in Employees' Organizational Trust and Performance Outcomes.

    Science.gov (United States)

    Verburg, Robert M; Nienaber, Ann-Marie; Searle, Rosalind H; Weibel, Antoinette; Den Hartog, Deanne N; Rupp, Deborah E

    2018-04-01

    This study examined how organizational control is related to employees' organizational trust. We specifically focus on how different forms of control (process, outcome, and normative) relate to employees' trust in their employing organizations and examine whether such trust in turn relates positively to employee job performance (task performance and organizational citizenship behavior). In addition, and in response to the recommendations of past research, we examined these relationships in a high control and compliance-based cultural context. Using data from 105 employee-supervisor dyads from professional services firms in Singapore, we find support for our hypothesized model. The implications of the results for theory and practice, and directions for future research, are discussed.

  15. The Role of Organizational Control Systems in Employees’ Organizational Trust and Performance Outcomes

    Science.gov (United States)

    Verburg, Robert M.; Nienaber, Ann-Marie; Searle, Rosalind H.; Weibel, Antoinette; Den Hartog, Deanne N.; Rupp, Deborah E.

    2017-01-01

    This study examined how organizational control is related to employees’ organizational trust. We specifically focus on how different forms of control (process, outcome, and normative) relate to employees’ trust in their employing organizations and examine whether such trust in turn relates positively to employee job performance (task performance and organizational citizenship behavior). In addition, and in response to the recommendations of past research, we examined these relationships in a high control and compliance-based cultural context. Using data from 105 employee–supervisor dyads from professional services firms in Singapore, we find support for our hypothesized model. The implications of the results for theory and practice, and directions for future research, are discussed. PMID:29568213

  16. Trusted computing strengthens cloud authentication.

    Science.gov (United States)

    Ghazizadeh, Eghbal; Zamani, Mazdak; Ab Manan, Jamalul-lail; Alizadeh, Mojtaba

    2014-01-01

    Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM). Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM) are great technologies for solving the trust and security concerns in the cloud identity environment. Single sign-on (SSO) and OpenID have been released to solve security and privacy problems for cloud identity. This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in .Net environment. Security analyzing, simulation, and BLP confidential model are three ways to evaluate and analyze our proposed model.

  17. Trusted Computing Strengthens Cloud Authentication

    Directory of Open Access Journals (Sweden)

    Eghbal Ghazizadeh

    2014-01-01

    Full Text Available Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM. Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM are great technologies for solving the trust and security concerns in the cloud identity environment. Single sign-on (SSO and OpenID have been released to solve security and privacy problems for cloud identity. This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in .Net environment. Security analyzing, simulation, and BLP confidential model are three ways to evaluate and analyze our proposed model.

  18. Trusted Computing Strengthens Cloud Authentication

    Science.gov (United States)

    2014-01-01

    Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM). Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM) are great technologies for solving the trust and security concerns in the cloud identity environment. Single sign-on (SSO) and OpenID have been released to solve security and privacy problems for cloud identity. This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in .Net environment. Security analyzing, simulation, and BLP confidential model are three ways to evaluate and analyze our proposed model. PMID:24701149

  19. Mediating Trust in Terrorism Coverage

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    crisis. While the framework is presented in the context of television coverage of a terror-related crisis situation, it can equally be used in connection with all other forms of mediated trust. Key words: National crisis, risk communication, crisis management, television coverage, mediated trust.......Mass mediated risk communication can contribute to perceptions of threats and fear of “others” and/or to perceptions of trust in fellow citizens and society to overcome problems. This paper outlines a cross-disciplinary holistic framework for research in mediated trust building during an acute...

  20. Application of Fuzzy Comprehensive Evaluation Method in Trust Quantification

    Directory of Open Access Journals (Sweden)

    Shunan Ma

    2011-10-01

    Full Text Available Trust can play an important role for the sharing of resources and information in open network environments. Trust quantification is thus an important issue in dynamic trust management. By considering the fuzziness and uncertainty of trust, in this paper, we propose a fuzzy comprehensive evaluation method to quantify trust along with a trust quantification algorithm. Simulation results show that the trust quantification algorithm that we propose can effectively quantify trust and the quantified value of an entity's trust is consistent with the behavior of the entity.

  1. Know what you trust: Analyzing and designing trust policies with Scoll

    NARCIS (Netherlands)

    Spiessens, F.; Hartog, den J.I.; Etalle, S.; Degano, P.; Guttman, J.; Martinelli, F.

    2009-01-01

    In Decentralized Trust Management (DTM) authorization decisions are made by multiple principals who can also delegate decisions to each other. Therefore, a policy change of one principal will often affect who gets authorized by another principal. In such a system of influenceable authorization a

  2. Environmental Compliance Management System

    International Nuclear Information System (INIS)

    Brownson, L.W.; Krsul, T.; Peralta, R.A.; Knudson, D.A.; Rosignolo, C.L.

    1992-01-01

    Argonne National Laboratory (ANL) is developing the Environmental Compliance Management System (ECMS) as a comprehensive, cost-effective tool to ensure (1) that the Laboratory complies with all applicable federal and state environmental laws and regulations, (2) that environmental issues and concerns are recognized and considered in the early phases of projects; and (3) that Laboratory personnel conduct Laboratory operations in the most environmentally acceptable manner. The ECMS is an expert computer system which is designed to allow project engineers to perform an environmental evaluation of their projects. The system includes a Master Program which collects basic project information, provide utility functions, and access the environmental expert modules, environmental expert system modules for each federal and state environmental law which allows the user to obtain specific information on how an individual law may affect his project; and site-specific databases which contain information necessary for effective management of the site under environmental regulations. The ECMS will have the capability to complete and print many of the necessary environmental forms required by federal and state agencies, including the Department of Energy

  3. Simulator configuration management system

    International Nuclear Information System (INIS)

    Faulent, J.; Brooks, J.G.

    1990-01-01

    The proposed revisions to ANS 3.5-1985 (Section 5) require Utilities to establish a simulator Configuration Management System (CMS). The proposed CMS must be capable of: Establishing and maintaining a simulator design database. Identifying and documenting differences between the simulator and its reference plant. Tracking the resolution of identified differences. Recording data to support simulator certification, testing and maintenance. This paper discusses a CMS capable of meeting the proposed requirements contained in ANS 3.5. The system will utilize a personal computer and a relational database management software to construct a simulator design database. The database will contain records to all reference nuclear plant data used in designing the simulator, as well as records identifying all the software, hardware and documentation making up the simulator. Using the relational powers of the database management software, reports will be generated identifying the impact of reference plant changes on the operation of the simulator. These reports can then be evaluated in terms of training needs to determine if changes are required for the simulator. If a change is authorized, the CMS will track the change through to its resolution and then incorporate the change into the simulator design database

  4. Development of the environmental data management system

    International Nuclear Information System (INIS)

    Tatebe, Kazuaki; Suzuki, Yurina; Shirato, Seiichi; Sato, Yoshinori

    2012-02-01

    The recent society requires business activities with environmental consideration to every enterprise. Also, Japanese laws require those activities. For example, 'Law Concerning the Promotion of Business Activities with Environmental Consideration by Specified Corporations, etc, by Facilitating Access to Environmental Information, and Other Measures' (Environmental Consideration Law) mandates publication of a report relating to the activities of environmental consideration to each enterprise above designated size. 'Act on the Rational Use of Energy' mandates the report of the results of energy consumption and the long-term plan of the rational use of energy. Moreover, 'Act on Promotion of Global Warming Countermeasures' mandates the report of the greenhouse gas emissions. In addition to those, 'Water Pollution Control Law', 'Waste Management and Public Cleaning Law' and other environmental laws as well as environmental ordinances require business activities with environmental consideration to all companies. So, it is very important for Japan Atomic Energy Agency (JAEA) to report business activities with environmental consideration in order to build up trustful relations with the nation and communities. The Environmental Data Management System has been developed as the data base of business activities with environmental consideration in JAEA and as the means to promote the activities at every site and office of JAEA. This report summarizes the structure of the Environmental Data Management System, kinds of environmental performance data treated by the system, and gathering methods of the data. (author)

  5. Bank Customers Management System

    Directory of Open Access Journals (Sweden)

    Ebubeogu Amarachukwu Felix

    2015-08-01

    Full Text Available ABSTRACT The purpose of this project is in partial fulfilment of the requirements of Bachelor of Science Hon in Information Technology. The Design and development of this Bank customers Management system provides a more secured approach in managing bank customers information which strengthens the relationships between banks and their customers by providing the right solutions that uses a multi-level security to improve customer satisfaction. The technology used in developing this project is ASP.NET and the programming language used to develop this project is C and the IDE used is Microsoft Visual Studio 2013 professional in designing the front end while the back end uses Microsoft SQL Server 2012.

  6. Building trust

    International Nuclear Information System (INIS)

    Lewis, Meriel

    1995-01-01

    'Activate' is the energy magazine for secondary schools and is part of the Education Programme which is managed on behalf of the British Nuclear Industry Forum by AEA Technology. activate is the flagship communication device between the British Nuclear Industry Forum's Education Programme and secondary schools in the UK. It was developed from a previous publication, Nuclear Bulletin. There is a need for the nuclear industry to build trust with teachers and students in the UK, where for a long time, everything that the industry has said, written or printed has been disregarded by school teachers as propaganda. Over the last few years the industry has put in a great deal of effort to position itself as a provider of educationally sound and socially acceptable information. 'Activate' was an evolution of this idea and there was a hole in the market for a lively, activity and article based magazine that could be used in the classroom. The target audience is principally teachers of science, mathematics and geography, but also includes teachers of art,, English and history with students of between 11 and 18. The results were very positive in that teachers appreciated the colourful and lively nature of activate and they felt that it provided information and opinions in an un biased and non-propagandist way. Their comments about layout, number of activities style of presentation were taken into account and during the summer of 1994 activate was remodelled ready for re launch in September. The feedback so far is good with more teachers signing up every week to receive their own free copy

  7. In acceptance we trust? Conceptualising acceptance as a viable approach to NGO security management.

    Science.gov (United States)

    Fast, Larissa A; Freeman, C Faith; O'Neill, Michael; Rowley, Elizabeth

    2013-04-01

    This paper documents current understanding of acceptance as a security management approach and explores issues and challenges non-governmental organisations (NGOs) confront when implementing an acceptance approach to security management. It argues that the failure of organisations to systematise and clearly articulate acceptance as a distinct security management approach and a lack of organisational policies and procedures concerning acceptance hinder its efficacy as a security management approach. The paper identifies key and cross-cutting components of acceptance that are critical to its effective implementation in order to advance a comprehensive and systematic concept of acceptance. The key components of acceptance illustrate how organisational and staff functions affect positively or negatively an organisation's acceptance, and include: an organisation's principles and mission, communications, negotiation, programming, relationships and networks, stakeholder and context analysis, staffing, and image. The paper contends that acceptance is linked not only to good programming, but also to overall organisational management and structures. © 2013 The Author(s). Journal compilation © Overseas Development Institute, 2013.

  8. Beneficiaries of conflict: a qualitative study of people’s trust in the private health care system in Mogadishu, Somalia

    Directory of Open Access Journals (Sweden)

    Gele AA

    2017-08-01

    Full Text Available Abdi A Gele,1–3 Mohamed Yusuf Ahmed,4 Prabhjot Kour,2 Sadiyo Ali Moallim,5 Abdulwahab Moallim Salad,3 Bernadette Kumar2 1Institute of Nursing and Health Promotion, Department of Health, Oslo and Akershus University College of Applied Science, 2Department for Research, Norwegian Centre for Minority Health Research, Oslo, Norway; 3Center for Health Research, Somali National University, 4Department of Business Management, Simad University, 5Faculty of Medicine, Benadir University, Mogadishu, Somalia Background: In 2005, the World Health Conference called for all nations to move toward universal health coverage, which is defined as “access to adequate health care for all at an affordable price”. Despite this, an estimated 90% of Somalia’s largely impoverished population use private health care. Therefore, considering that the private health care system is the dominant health care system in Mogadishu, Somalia, exploring the accessibility to, as well as people’s trust in, the private sector is essential to help contribute an equitable and affordable health care system in the country.Methods: A qualitative study using unstructured interviews was conducted in Mogadishu from August to November of 2016. A purposive sampling approach was used to recruit 23 participants, including seven medical doctors who own private health centers, eight patients, five medical students and three senior officials who work for the Ministry of Health. Data were analyzed using a thematic analysis.Results: Our findings show that the private health care system in Mogadishu is not only unregulated but also expensive, with the cost of health care often unaffordable for the majority of the country’s citizens. There is evidence of prescription of inappropriate treatment, tendency to conduct unnecessary laboratory tests, excessive use of higher diagnostic technologies and overcharging – including the widespread practice of further appointments for follow-up – which

  9. Management Information Systems at CERN

    CERN Document Server

    Ferguson, J

    1986-01-01

    The specific areas addressed in the study are 1.Management decision support (data presentation, data base management systems â" DBMS, modeling) 2.Text processing, 3.Electronic communication for management purposes, 4.Office automation, 5.Administrative use of Management Information Systems (MIS) and in particular Administrative Data Processing (ADP).

  10. Can we trust robots?

    NARCIS (Netherlands)

    Coeckelbergh, Mark

    2011-01-01

    Can we trust robots? Responding to the literature on trust and e-trust, this paper asks if the question of trust is applicable to robots, discusses different approaches to trust, and analyses some preconditions for trust. In the course of the paper a phenomenological-social approach to trust is

  11. Exploring the Change from Low-Trust to High-Trust Organizations

    DEFF Research Database (Denmark)

    Jagd, Søren

    what the notion of high-trust organization actually means, and that the change process in the direction of high trust organizations involves not only a quantitative growth in trust, but may involve important qualitative changes in the organization, especially concerning the relations between management......A growing body of literature point to the increasing importance of trust for organizations and for the explicit use of trust as a management tool. The explicit or implicit message in both management literature and research literature on trust as a management tool is that managers should pursue...... projects of personal and organizational change leading to high-trust organizations. In this paper I explore how we may understand this change towards high-trust organizations: What does it mean, what is the content of such a change, and what may be the consequences. I show that it is still rather unclear...

  12. The ability of SMEs to use trust in managing offshore activities

    NARCIS (Netherlands)

    Gellert, Franz Jozef; Velthuijsen, Hugo

    2013-01-01

    Small and medium-sized enterprises have found their way into multi-cultural relations to outsource or offshore their business processes. Relationships are built either from an economic or emotional point of view. Our study particularly focused on how SMEs owner/managers build, maintain, and –when

  13. Goals, trust, participation, and feedback: Linking internal management with performance outcomes

    NARCIS (Netherlands)

    Favero, Nathan; Meier, Kenneth J.; O'Toole, Laurence J.

    2016-01-01

    Much recent work in the study of public administration has emphasized new challenges and relatively unusual aspects of management. However, it is likely that the core features of traditional public administration play a crucial role, particularly regarding the delivery of performance. The most

  14. Pollution management system

    DEFF Research Database (Denmark)

    2015-01-01

    A pollution management system comprises an array of one or more inlets and at least one outlet. The one or more inlets are arranged to collect polluted air and supply said polluted air to a polluted air treatment element. The one or more inlets each comprise a respective inlet sensor for measuring...... a level of pollution at the inlet, and the at least one outlet comprises an outlet sensor for measuring a level of pollution at the outlet. The inlet sensors and the outlet sensor are arranged to provide feedback to the polluted air treatment element....

  15. Pembangunan Model Restaurant Management System

    OpenAIRE

    Fredy Jingga; Natalia Limantara

    2014-01-01

    Model design for Restaurant Management System aims to help in restaurant business process, where Restaurant Management System (RMS) help the waitress and chef could interact each other without paper limitation.  This Restaurant Management System Model develop using Agile Methodology and developed based on PHP Programming Langguage. The database management system is using MySQL. This web-based application model will enable the waitress and the chef to interact in realtime, from the time they a...

  16. Environmental management system

    International Nuclear Information System (INIS)

    2004-01-01

    An Environmental Management System was implemented in ANAV in 1999, including the two nuclear sites of the Asco and Vandellos II nuclear power plants. This implementation entailed formulation of the ANAV Environmental Policy, preparation of an Environmental Management Plan (PLAGMA) supported by the Environmental Aspects Manuals (MASMA) of each site and their operating procedures, modification of the organizational structure to create the Environment Unit, in charge of implementing the SIGEMA, and the Environment Committee, the governing body that reviews the results obtained and environmental goals to be achieved, and direct involvement of all the different ANAV organization in continuous improvement of the SIGEMA implementation. Special attention is paid to evolution of the environmental indicators, to communication and specific training in environmental issues, and to waste management and the different programs for increasing waste recycling and assessment, as well as to minimization programs. The article details the different approaches used to improve the environmental results in these last five years, which have allowed ANAV to maintain the ISO-14001 Certification since 1999. (Author)

  17. CONTENT MANAGEMENT SYSTEMS (CMS OPEN SOURCE WEBSITES

    Directory of Open Access Journals (Sweden)

    Marinela Lăzărică

    2013-01-01

    Full Text Available Firms need flexible software applications, which may be adaptable to dynamic changes of the modern business environment; they also need more control over their software costs, security and trust in purchased and implemented software. Moreover, they need to be free of individual software vendors and license costs for the software, etc. The solution of this problem consisted in open source applications and open source technology has proven that it can often provide high-quality software being a challenge for old models of software development and maintenance. The first content management system was announced in the late 90s. The offer of such software systems is varied and each of them has its own characteristics. This requires a comparative analysis of viable open-source systems in order to choose the most appropriate imposed goals. In this context, the paper illustrates the use of an open source content management system, like WordPress, to develop a content site in design of websites and analyzeits characteristics.

  18. Management information systems

    Energy Technology Data Exchange (ETDEWEB)

    1991-01-01

    This contract was for the development of a new range of colliery information computer systems (CIS) using a VAX 11/730 computer. The report details the selection of the system and the set-up of the hardware and software. The first application of these systems was to monitor production and delays from longwall faces. A trial installation was implemented at Shirebrook Colliery and this proved so successful that British Coal are now installing many similar systems. The key features of the production monitoring application are that delays are automatically detected in real time and the operator is prompted for the root cause of the delay. This is done through a linked series of questions and answere from a linked set of possible delay causes. Ad hoc and regular reports are produced giving local colliery management visibility of coal face performance, thus enabling informed decisions and corrective action to be taken. Following the successful application to production monitoring, the system was extended to heading/drivages, coal clearance/conveyors, mine air environment and fixed plant. Those applications were operational during the contract but have since been extended.

  19. Big data privacy protection model based on multi-level trusted system

    Science.gov (United States)

    Zhang, Nan; Liu, Zehua; Han, Hongfeng

    2018-05-01

    This paper introduces and inherit the multi-level trusted system model that solves the Trojan virus by encrypting the privacy of user data, and achieve the principle: "not to read the high priority hierarchy, not to write the hierarchy with low priority". Thus ensuring that the low-priority data privacy leak does not affect the disclosure of high-priority data privacy. This paper inherits the multi-level trustworthy system model of Trojan horse and divides seven different risk levels. The priority level 1˜7 represent the low to high value of user data privacy, and realize seven kinds of encryption with different execution efficiency Algorithm, the higher the priority, the greater the value of user data privacy, at the expense of efficiency under the premise of choosing a more encrypted encryption algorithm to ensure data security. For enterprises, the price point is determined by the unit equipment users to decide the length of time. The higher the risk sub-group algorithm, the longer the encryption time. The model assumes that users prefer the lower priority encryption algorithm to ensure efficiency. This paper proposes a privacy cost model for each of the seven risk subgroups. Among them, the higher the privacy cost, the higher the priority of the risk sub-group, the higher the price the user needs to pay to ensure the privacy of the data. Furthermore, by introducing the existing pricing model of economics and the human traffic model proposed by this paper and fluctuating with the market demand, this paper improves the price of unit products when the market demand is low. On the other hand, when the market demand increases, the profit of the enterprise will be guaranteed under the guidance of the government by reducing the price per unit of product. Then, this paper introduces the dynamic factors of consumers' mood and age to optimize. At the same time, seven algorithms are selected from symmetric and asymmetric encryption algorithms to define the enterprise

  20. TFTR data management system

    International Nuclear Information System (INIS)

    Randerson, L.; Chu, J.; Ludescher, C.; Malsbury, J.; Stark, W.

    1986-01-01

    Developments in the tokamak fusion test reactor (TFTR) data-management system supporting data acquisition and off-line physics data reduction are described. Data from monitor points, timing channels, transient recorder channels, and other devices are acquired and stored for use by on-line tasks. Files are transferred off line automatically. A configuration utility determines data acquired and files transferred. An event system driven by file arrival activates off-line reduction processes. A post-run process transfers files not shipped during runs. Files are archived to tape and are retrievable by digraph and shot number. Automatic skimming based on most recent access, file type, shot numbers, and user-set protections maintains the files required for post-run data reduction

  1. Trusted Computing Technologies, Intel Trusted Execution Technology.

    Energy Technology Data Exchange (ETDEWEB)

    Guise, Max Joseph; Wendt, Jeremy Daniel

    2011-01-01

    We describe the current state-of-the-art in Trusted Computing Technologies - focusing mainly on Intel's Trusted Execution Technology (TXT). This document is based on existing documentation and tests of two existing TXT-based systems: Intel's Trusted Boot and Invisible Things Lab's Qubes OS. We describe what features are lacking in current implementations, describe what a mature system could provide, and present a list of developments to watch. Critical systems perform operation-critical computations on high importance data. In such systems, the inputs, computation steps, and outputs may be highly sensitive. Sensitive components must be protected from both unauthorized release, and unauthorized alteration: Unauthorized users should not access the sensitive input and sensitive output data, nor be able to alter them; the computation contains intermediate data with the same requirements, and executes algorithms that the unauthorized should not be able to know or alter. Due to various system requirements, such critical systems are frequently built from commercial hardware, employ commercial software, and require network access. These hardware, software, and network system components increase the risk that sensitive input data, computation, and output data may be compromised.

  2. Trust in Diverse Teams

    DEFF Research Database (Denmark)

    Clausen, Lisbeth

    , maintaining team cohesiveness in multicultural teams to collaborate effectively presents a number of challenges. The present study employs the concept of trust to explore influences on team collaboration in high performing teams. The study is based on observation of teams in seven multinational corporations...... and interviews with managers from the US, Europe, China and Japan. The study presents a conceptual framework - a ‘trust buffer’ – which enables analysis and exemplification of the dynamics and challenges of teams as drivers of change. Each team has strategically important tasks, unique capacities and deal...... with change in particular ways: Each team is analyzed in relation to its global (HQ) mandate, local (national) stakeholders and organizational context. It is found that communication energy, resources and team mandate underscore the sense of trust in high performing teams. Diversity is understood...

  3. TrustBuilder2: A Reconfigurable Framework for Trust Negotiation

    Science.gov (United States)

    Lee, Adam J.; Winslett, Marianne; Perano, Kenneth J.

    To date, research in trust negotiation has focused mainly on the theoretical aspects of the trust negotiation process, and the development of proof of concept implementations. These theoretical works and proofs of concept have been quite successful from a research perspective, and thus researchers must now begin to address the systems constraints that act as barriers to the deployment of these systems. To this end, we present TrustBuilder2, a fully-configurable and extensible framework for prototyping and evaluating trust negotiation systems. TrustBuilder2 leverages a plug-in based architecture, extensible data type hierarchy, and flexible communication protocol to provide a framework within which numerous trust negotiation protocols and system configurations can be quantitatively analyzed. In this paper, we discuss the design and implementation of TrustBuilder2, study its performance, examine the costs associated with flexible authorization systems, and leverage this knowledge to identify potential topics for future research, as well as a novel method for attacking trust negotiation systems.

  4. Risk Management in the Nigerian Banking Industry: A Case Study of Guaranty Trust Bank

    OpenAIRE

    Usman, Fatima

    2014-01-01

    Every organisation exists to provide value of its stakeholders, as a result they have to take make decisions that involves risks and they also have to take on some risks in order to deliver returns. Also, all banking institutions in the process of providing services face financial risk and failure to manage these risks can result in loss in earnings, failure to meet business objectives, these factors in general may hinder a bank’s inability to conduct its on-going business and business surviv...

  5. Consumer Trust in E-commerce

    OpenAIRE

    Gustavsson, Malin; Johansson, Anne-Marie

    2006-01-01

    An often mentioned reason for consumers not purchasing from Internet vendors, is the lack of trust. The lack of physical clues and physical interaction in the online environment make it more difficult to establish trust with the consumers. So, it is important for companies to learn how to manage consumers’ trust in e-commerce. Although, building consumer trust on the Internet is a challenge for online vendors. The purpose with this dissertation was to get a better understanding of consumer t...

  6. An Operational Semantics for Trust Policies

    DEFF Research Database (Denmark)

    Krukow, Karl

    2006-01-01

    In the trust-structure framework for trust management, principals specify their trusting relationships in terms of trust policies. In their paper on trust structures, Carbone et al. present a language for such policies, and provide a suitable denotational semantics. The semantics ensures that for......In the trust-structure framework for trust management, principals specify their trusting relationships in terms of trust policies. In their paper on trust structures, Carbone et al. present a language for such policies, and provide a suitable denotational semantics. The semantics ensures...... that for any collection of policies, there is always a unique global trust-state, compatible with all the policies, specifying everyone's degree of trust in everyone else. However, as the authors themselves point out, the language lacks an operational model: the global trust-state is a well......-defined mathematical object, but it is not clear how principals can actually compute it. This becomes even more apparent when one considers the intended application environment: vast numbers of autonomous principals, distributed and possibly mobile. We provide a compositional operational semantics for a language...

  7. Developing Human-Machine Interfaces to Support Appropriate Trust and Reliance on Automated Combat Identification Systems

    Science.gov (United States)

    2007-09-17

    Signal Detection Theory (SDT) (Macmillan & Creelman , 1991; Wickens & Hollands, 2000). In SDT, the participants’ performance is characterized by two...probability, whereas their sensitivity will stay constant (Macmillan & Creelman , 1991; Wickens & Hollands, 2000). If this hypothesis holds, it will...Macmillan & Creelman , 1991, p273), and it was also the measure used in Dzindolet et al.’s study (2001a). Thus, C was used in the analysis HMIs for Trust and

  8. System Security Management in SNMP

    OpenAIRE

    P. Deivendran; Dr. R. Dhanapal Ph.D

    2010-01-01

    We present a framework for managing system security, based on a SNMP Management Information Base (MIB), namely the System Security MIB (SSEC MIB), We have defined managed objects and completed the ASN.1 description of the MIB that embeds them. The related security management functions are mainly focused on monitoring external script execution for system security scanning and access control. The main goal of this work is to introduce the semantics and a standard interface that will allow the r...

  9. Web Based Project Management System

    OpenAIRE

    Aadamsoo, Anne-Mai

    2010-01-01

    To increase an efficiency of a product, nowadays many web development companies are using different project management systems. A company may run a number of projects at a time, and requires input from a number of individuals, or teams for a multi level development plan, whereby a good project management system is needed. Project management systems represent a rapidly growing technology in IT industry. As the number of users, who utilize project management applications continues to grow, w...

  10. The influences of patient's satisfaction with medical service delivery, assessment of medical service, and trust in health delivery system on patient's life satisfaction in China.

    Science.gov (United States)

    Tang, Liyang

    2012-09-14

    Patient's satisfaction with medical service delivery/assessment of medical service/trust in health delivery system may have significant influence on patient's life satisfaction in China's health delivery system/in various kinds of hospitals.The aim of this study was to test whether and to what extent patient's satisfaction with medical service delivery/patient's assessments of various major aspects of medical service/various major aspects of patient's trust in health delivery system influenced patient's life satisfaction in China's health delivery system/in various kinds of hospitals. This study collaborated with National Bureau of Statistics of China to carry out a 2008 national urban resident household survey in 17 provinces, autonomous regions, and municipalities directly under the central government (N = 3,386), and specified ordered probit models were established to analyze dataset from this household survey. The key considerations in generating patient's life satisfaction involved patient's overall satisfaction with medical service delivery, assessment of doctor-patient communication, assessment of medical cost, assessment of medical treatment process, assessment of medical facility and hospital environment, assessment of waiting time for medical service, trust in prescription, trust in doctor, and trust in recommended medical examination. But the major considerations in generating patient's life satisfaction were different among low level public hospital, high level public hospital, and private hospital. The promotion of patient's overall satisfaction with medical service delivery, the improvement of doctor-patient communication, the reduction of medical cost, the improvement of medical treatment process, the promotion of medical facility and hospital environment, the reduction of waiting time for medical service, the promotion of patient's trust in prescription, the promotion of patient's trust in doctor, and the promotion of patient's trust in

  11. Cryptographic Key Management System

    Energy Technology Data Exchange (ETDEWEB)

    No, author

    2014-02-21

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  12. Trust as a Critical Concept

    DEFF Research Database (Denmark)

    Bordum, Anders

    2004-01-01

    In this articlei I will argue that trust is a fundamental and critical concept because trust is the direct or transcendental constitutive ground of most social phenomena, as well as applicable as an operational method in critical theory. There are two different but overlapping positions on trust I...... address in this article. One is the standpoint we find in business strategy, that trust is naïve to show, and control or contracts are presumed better. In the strategy game the idealistic good guys seems to lose (Arrow 1974), (Williamson 1975). The other position is the position taken by systems theory...

  13. ENVIRONMENTAL MANAGEMENT SYSTEMS CERTIFICATION

    Directory of Open Access Journals (Sweden)

    Aniko Miler-Virc

    2012-12-01

    Full Text Available ISO 14001 prescribes the requirements for a system, not environmental performance itself. Similarly, certification is of the management system itself, not environmental performance. An audit is not conducted to ascertain whether your flue gas emissions are less than X part per million nitrous oxide or that your wastewater effluent contains less that Y milligrams of bacteria per litre. Consequently, the procces of auditing the system for compliance to the standard entails checking to see that all of the necessary components of a functioning system are present and working properly.           A company can have a complete and fully functional EMS as prescribed by ISO 14001 without being certified. As certification can add to the time and expense of EMS development, it is important for you to establish, in advance, whether certification is of net benefit to you. Although most companies that develop an EMS do in fact certify, there are cases where certification does not add immediate value. Certification is not always beneficial to small and medium sized companies. Certification is not always necessary for companies with one or two large clients with environmental demands who are satisfied that you have a functional EMS (second-party declaration. Whatever decision you make, it is important to remember that just as a driver′s licence does not automatically make you a good driver, ISO 14001 certification does not automatically make your company environmentally benign or ensure that you will continually improve environmental performance. The system is only as good as the people who operate it.

  14. Alarm management system

    International Nuclear Information System (INIS)

    Woods, D.D.; Elm, W.C.; Lipner, M.H.; Butterworth, G.E.; Easter, J.R.

    1989-01-01

    An alarm management system is described, comprising: a light water pressurized nuclear power plant; sensors coupled to the plant indicating the state of the plant; a sensor signal processor, operatively connected to the sensors, for producing state signals indicating the state of the sensors monitoring the power plant from the sensor signals and for combining the state signals using rule based algorithms to produce abnormality indication signals; a message processor, operatively connected to the sensor signal processor for receiving the abnormality indication signals; a spatially dedicated parallel display for each function, operatively connected to the message processor, for displaying the portion of the messages simultaneously; and a serial display, operatively connected to the message processor, for displaying the message in the queues in priority order within category within function upon request, the message processor outputting messages from the queue to the parallel display as display space becomes available on the parallel display due to an abnormality being resolved

  15. Managing Distributed Knowledge Systems

    DEFF Research Database (Denmark)

    Sørensen, Brian Vejrum; Gelbuda, Modestas

    2005-01-01

    . This paper contributes to the research on organizations as distributed knowledge systems by addressing two weaknesses of the social practice literature. Firstly, it downplays the importance of formal structure and organizational design and intervention efforts by key organizational members. Secondly, it does......The article argues that the growth of de novo knowledge-based organization depends on managing and coordinating increasingly growing and, therefore, distributed knowledge. Moreover, the growth in knowledge is often accompanied by an increasing organizational complexity, which is a result...... of integrating new people, building new units and adding activities to the existing organization. It is argued that knowledge is not a stable capacity that belongs to any actor alone, but that it is rather an ongoing social accomplishment, which is created and recreated as actors engage in mutual activities...

  16. Environmental management system in companies

    International Nuclear Information System (INIS)

    Bonanno, C.

    1995-01-01

    The environmental management system, as the whole coordinated initiatives 'environmental oriented' introduced by companies in their organization, is discussed. Strategic weight that companies have to be present at the environmental management system is enlisted. Finally, the new professional figures of environmental technicians and environmental manager is discussed

  17. Accountable priority setting for trust in health systems - the need for research into a new approach for strengthening sustainable health action in developing countries

    Directory of Open Access Journals (Sweden)

    Olsen Øystein E

    2009-10-01

    Full Text Available Abstract Despite multiple efforts to strengthen health systems in low and middle income countries, intended sustainable improvements in health outcomes have not been shown. To date most priority setting initiatives in health systems have mainly focused on technical approaches involving information derived from burden of disease statistics, cost effectiveness analysis, and published clinical trials. However, priority setting involves value-laden choices and these technical approaches do not equip decision-makers to address a broader range of relevant values - such as trust, equity, accountability and fairness - that are of concern to other partners and, not least, the populations concerned. A new focus for priority setting is needed. Accountability for Reasonableness (AFR is an explicit ethical framework for legitimate and fair priority setting that provides guidance for decision-makers who must identify and consider the full range of relevant values. AFR consists of four conditions: i relevance to the local setting, decided by agreed criteria; ii publicizing priority-setting decisions and the reasons behind them; iii the establishment of revisions/appeal mechanisms for challenging and revising decisions; iv the provision of leadership to ensure that the first three conditions are met. REACT - "REsponse to ACcountable priority setting for Trust in health systems" is an EU-funded five-year intervention study started in 2006, which is testing the application and effects of the AFR approach in one district each in Kenya, Tanzania and Zambia. The objectives of REACT are to describe and evaluate district-level priority setting, to develop and implement improvement strategies guided by AFR and to measure their effect on quality, equity and trust indicators. Effects are monitored within selected disease and programme interventions and services and within human resources and health systems management. Qualitative and quantitative methods are being

  18. Accountable priority setting for trust in health systems--the need for research into a new approach for strengthening sustainable health action in developing countries.

    Science.gov (United States)

    Byskov, Jens; Bloch, Paul; Blystad, Astrid; Hurtig, Anna-Karin; Fylkesnes, Knut; Kamuzora, Peter; Kombe, Yeri; Kvåle, Gunnar; Marchal, Bruno; Martin, Douglas K; Michelo, Charles; Ndawi, Benedict; Ngulube, Thabale J; Nyamongo, Isaac; Olsen, Oystein E; Onyango-Ouma, Washington; Sandøy, Ingvild F; Shayo, Elizabeth H; Silwamba, Gavin; Songstad, Nils Gunnar; Tuba, Mary

    2009-10-24

    Despite multiple efforts to strengthen health systems in low and middle income countries, intended sustainable improvements in health outcomes have not been shown. To date most priority setting initiatives in health systems have mainly focused on technical approaches involving information derived from burden of disease statistics, cost effectiveness analysis, and published clinical trials. However, priority setting involves value-laden choices and these technical approaches do not equip decision-makers to address a broader range of relevant values - such as trust, equity, accountability and fairness - that are of concern to other partners and, not least, the populations concerned. A new focus for priority setting is needed.Accountability for Reasonableness (AFR) is an explicit ethical framework for legitimate and fair priority setting that provides guidance for decision-makers who must identify and consider the full range of relevant values. AFR consists of four conditions: i) relevance to the local setting, decided by agreed criteria; ii) publicizing priority-setting decisions and the reasons behind them; iii) the establishment of revisions/appeal mechanisms for challenging and revising decisions; iv) the provision of leadership to ensure that the first three conditions are met.REACT - "REsponse to ACcountable priority setting for Trust in health systems" is an EU-funded five-year intervention study started in 2006, which is testing the application and effects of the AFR approach in one district each in Kenya, Tanzania and Zambia. The objectives of REACT are to describe and evaluate district-level priority setting, to develop and implement improvement strategies guided by AFR and to measure their effect on quality, equity and trust indicators. Effects are monitored within selected disease and programme interventions and services and within human resources and health systems management. Qualitative and quantitative methods are being applied in an action research

  19. Systems management of facilities agreements

    International Nuclear Information System (INIS)

    Blundell, A.

    1998-01-01

    The various types of facilities agreements, the historical obstacles to implementation of agreement management systems and the new opportunities emerging as industry is beginning to make an effort to overcome these obstacles, are reviewed. Barriers to computerized agreement management systems (lack of consistency, lack of standards, scarcity of appropriate computer software) are discussed. Characteristic features of a model facilities agreement management system and the forces driving the changing attitudes towards such systems (e.g. mergers) are also described

  20. TB-CA: A hybrid method based on trust and context-aware for recommender system in social networks

    Directory of Open Access Journals (Sweden)

    Fateme Keikha

    2015-05-01

    Full Text Available Recommender systems help users faced with the problem of information overflow and provide personalized recommendations. Social networks are used for providing variety of business or social activities, or sometimes a combination of both. In this paper, by considering social network of users and according to users’ context and items, a new method is introduced that is based on trust and context aware for recommender systems in social networks. The purpose of this paper is to create a recommender system which increases precision of predicted ratings for all users especially for cold start users. In the proposed method, walking on web of trust is done by neighbor users for finding rating of similar items and users’ preference is gotten of items’ context. The results show that suitable recommendation with user’s context is provided by using this method. Also, this system can increase precision of predicted rating for all users and cold starts too and however, do not decrease the rating’s coverage.

  1. The Role of Trust in Computer Security

    DEFF Research Database (Denmark)

    Jensen, Christian D.

    2012-01-01

    technologies and show how many of them concern the placement of trust on human or system agents. We argue that making such assumptions about trust explicit is an essential requirement for the future of system security and argue why the formalisation of computational trust is necessary when we wish to reason...

  2. Manpower management information system /MIS/

    Science.gov (United States)

    Gravette, M. C.; King, W. L.

    1971-01-01

    System of programs capable of building and maintaining data bank provides all levels of management with regular manpower evaluation reports and data source for special management exercises on manpower.

  3. System management and quality assurance

    International Nuclear Information System (INIS)

    Sastry, A.M.

    1989-01-01

    This paper describes the principles of system management and shows the relationship to quality assurance. It discusses the need for balanced attention to all the project management controls required for project success

  4. Project management and Enterprise systems

    DEFF Research Database (Denmark)

    Koch, Christian; Buhl, Henrik

    2006-01-01

    Implementing and Operating integrated Enterprise Systems are a multidimensional effort. It seriously challenges the IT supplier as well as the professional service provider client. The paper discuss these issues in a project management perspective. A framework for supporting project management...

  5. Trusting families: Responding to Mary Ann Meeker, "Responsive care management: family decision makers in advanced cancer".

    Science.gov (United States)

    Nelson, James Lindemann

    2011-01-01

    Mary Ann Meeker's article admirably reminds readers that family members are involved in--or "responsively manage"--the care of relatives with severe illness in ways that run considerably beyond the stereotypes at play in many bioethical discussions of advance directives. Her observations thus make thinking about the role of families in healthcare provision more adequate to the facts, and this is an important contribution. There's reason to be worried, however, that one explicit aim of the article--to ease the standing anxieties that many clinicians and ethicists have about the reliability of family members as proxy decision makers--will be frustrated by its very success. Those already inclined to suspicion may tend to think that the more intricate and pervasive the ways in which families influence the healthcare decision making of their sick, the more chances they have for altering the connection between patients' interests and the actions of professional providers. To determine whether and when such alterations are something to be concerned about, we'll need to supplement a better grasp of the pertinent facts with a deeper sense of how human agency works and why we value it. We may also need some reminders about the defensibility of diverse moral understandings. Although both professionals and family members may profess an ethic that sets patients' interests above those of non-patients--as Meeker's own results suggest--any strict allegiance to such a framework may be more notional than normative--as her findings also hint. The actual working norms (among professionals, as well as within families) will likely be more complex, but not necessarily any the less defensible for that.

  6. Trust information-based privacy architecture for ubiquitous health.

    Science.gov (United States)

    Ruotsalainen, Pekka Sakari; Blobel, Bernd; Seppälä, Antto; Nykänen, Pirkko

    2013-10-08

    Ubiquitous health is defined as a dynamic network of interconnected systems that offers health services independent of time and location to a data subject (DS). The network takes place in open and unsecure information space. It is created and managed by the DS who sets rules that regulate the way personal health information is collected and used. Compared to health care, it is impossible in ubiquitous health to assume the existence of a priori trust between the DS and service providers and to produce privacy using static security services. In ubiquitous health features, business goals and regulations systems followed often remain unknown. Furthermore, health care-specific regulations do not rule the ways health data is processed and shared. To be successful, ubiquitous health requires novel privacy architecture. The goal of this study was to develop a privacy management architecture that helps the DS to create and dynamically manage the network and to maintain information privacy. The architecture should enable the DS to dynamically define service and system-specific rules that regulate the way subject data is processed. The architecture should provide to the DS reliable trust information about systems and assist in the formulation of privacy policies. Furthermore, the architecture should give feedback upon how systems follow the policies of DS and offer protection against privacy and trust threats existing in ubiquitous environments. A sequential method that combines methodologies used in system theory, systems engineering, requirement analysis, and system design was used in the study. In the first phase, principles, trust and privacy models, and viewpoints were selected. Thereafter, functional requirements and services were developed on the basis of a careful analysis of existing research published in journals and conference proceedings. Based on principles, models, and requirements, architectural components and their interconnections were developed using system

  7. Informational system. Documents management

    Directory of Open Access Journals (Sweden)

    Vladut Iacob

    2009-12-01

    Full Text Available Productivity growing, as well as reducing of operational costs in a company can be achieved by adopting a document management solutions. Such application will allow management and structured and efficient transmission of information within the organization.

  8. Towards trusted trade-lanes

    NARCIS (Netherlands)

    Hulstijn, J.; Hofman, W.; Zomer, G.; Tan, Y.H.

    2016-01-01

    Customs administrations are exploring system-based approaches to regulatory supervision, taking the entire set of controls in a process into account. In addition to Trusted Traders, which are recognized by a certification process, customs are considering to identify so called Trusted Trade Lanes:

  9. New type radiation management system

    International Nuclear Information System (INIS)

    Mogi, Kenichi; Uranaka, Yasuo; Fujita, Kazuhiko

    2001-01-01

    The radiation management system is a system to carry out entrance and leaving room management of peoples into radiation management area, information management on radiation obtained from a radiation testing apparatus, and so on. New type radiation management system developed by the Mitsubishi Electric Corp. is designed by concepts of superior maintenance and system practice by using apparatus and its interface with standard specification, upgrading of processing response by separating exposure management processing from radiation monitoring processing on a computer, and a backup system not so as to lose its function by a single accident of the constructed computer. Therefore, the system is applied by the newest hardware, package software, and general use LAN, and can carry out a total system filled with requirements and functions for various radiation management of customers by preparing a basic system from radiation testing apparatus to entrance and leaving room management system. Here were described on outline of the new type management system, concept of the system, and functions of every testing apparatus. (G.K.)

  10. Trusted Objects

    International Nuclear Information System (INIS)

    CAMPBELL, PHILIP L.; PIERSON, LYNDON G.; WITZKE, EDWARD L.

    1999-01-01

    In the world of computers a trusted object is a collection of possibly-sensitive data and programs that can be allowed to reside and execute on a computer, even on an adversary's machine. Beyond the scope of one computer we believe that network-based agents in high-consequence and highly reliable applications will depend on this approach, and that the basis for such objects is what we call ''faithful execution.''

  11. On the role of trust types and levels on inventory replenishment decision

    OpenAIRE

    Darvish, M.; Kaboli, A.; Cheikhrouhou, N.; Glardon, R.

    2014-01-01

    Using a participatory simulation platform, this paper investigates the inventory replenishment decisions made under different trust categories. Depending on the type of trust (trust in supplier versus trust in customer) and level of trust (high versus low), each decision is categorized and analyzed. We investigate how the inventory manager`s ordering behavior varies regarding their type and level of trust. This study provides evidence for the role of trust in inventory replenishment decision....

  12. Impact Through Trust

    DEFF Research Database (Denmark)

    Mayoral, Juan A.

    of its rulings and legal mandates in national judiciaries and legal systems? This question is crucial if we understand that national courts are the key decentralised enforcers of the European Union (EU) law responsible for ensuring the effectiveness of EU law and the rulings and mandates imposed...... by the Court. EU scholars have already offered several legalist and institutionalist responses to why national courts participate in this process of legal integration in the EU and, most importantly, why the follow the mandates and rulings from the CJEU. This chapter innovates in this regard by introducing...... trust between judges as a new mechanism for enhancing the cooperation and compliance by national courts with the CJEU jurisprudence and EU legal mandates. The chapter describes the conditions under which national judges trust the CJEU to identify how the Court can promote trust in its role as a supreme...

  13. CEFR information management system solution

    International Nuclear Information System (INIS)

    Lu Fei; Zhao Jia'ning

    2011-01-01

    Based on finished information resources planning scheme for China sodium cooled experimental fast breeder reactor and the advanced information resources management solution concepts were applied, we got the building solution of CEFR information management systems. At the same time, the technical solutions of systems structures, logic structures, physical structures, development platforms and operation platforms for information resources management system in fast breeder reactors were developed, which provided programmatic introductions for development works in future. (authors)

  14. Perceptions of work-time and leisure-time among managers and field staff in a UK primary health care trust.

    Science.gov (United States)

    Brown, Reva Berman; Adebayo, Shirley A

    2004-09-01

    The aims of the research were to explore the issues around the perception of District Nurses in an inner London Primary Health Care Trust of their use of work-time and leisure-time, and to reveal how the boundaries between these two aspects can become blurred and impinge on each other. Time use is helpful in considerations of wider issues such as satisfaction at work and work-life balance. The data were collected by a questionnaire to seek the views of managers and field staff on issues such as the impact on the quality of patient care of the nurses' perception of work-time and leisure-time. The research identified the different perception of "work-time" that employees have in relation to their place within the hierarchical structure. The findings answered the question of whether time is perceived differently, dependent on one's occupation within the Trust.

  15. Environmental asset management: Risk management systems

    CSIR Research Space (South Africa)

    Naudé, Brian

    2017-07-01

    Full Text Available bnaude@csir.co.za Charl Petzer Council for Scientific and Industrial Research PO Box 395 Pretoria 0001 South Africa +2712 841 4292 CPetzer1@csir.co.za Copyright © 2017 by B Naudé, C Petzer. Published and used by INCOSE with permission.... Charl Petzer is registered professional engineer with 30 years of programme/project management as well as systems engineering experience in military and other environments. He has been the lead systems engineer, as well as programme manager on several...

  16. Trust and Distrust in E-Commerce

    Directory of Open Access Journals (Sweden)

    Suk-Joo Lee

    2018-03-01

    Full Text Available Trust is the key ingredient for sustainable transactions. In the concept of trust, the trustor trusts the trustees. In e-commerce, the trustor is the buyer and the trustees are the intermediaries and the seller. Intermediaries provide the web-based infrastructure that enables buyers and sellers to make transactions. Trust is the buyer’s judgment and comprises two distinct concepts; both trust and distrust reside in the trustor. The purpose of this study was to examine the complicated effects of trust and distrust on a buyer’s purchase intentions. Previous studies have provided theoretical frameworks illustrating co-existent trust and distrust, trust transfers from one to another, and trust in buyer-intermediary-seller relationships. Based on these frameworks, this study (i presented a holistic model that contained the judgment of buyers resulting in trust or distrust in the intermediary and the seller; (ii investigated trust and distrust transfer from the intermediary to the seller, and (iii explored the effects of various antecedents that affect trust and distrust. To validate the proposed model, we employed Partial Least Squares (PLS. A summary of key findings are as follows. First, buyer’s trust in an intermediary positively affected his or her trust in the seller, positively influencing purchase intention. In other words, we found the trust transfer from an intermediary to its seller. Second, distrust in an intermediary directly impacted on the buyer’s perceived risk, negatively influencing his or her purchase intentions. Third, structural assurance and perceived website quality of an intermediary gave a positive impact on buyer’s trust in the intermediary. The results of this study shed light on the necessity of managing both trust and distrust to facilitate sales in e-commerce.

  17. Army Healthcare Enterprise Management System

    National Research Council Canada - National Science Library

    2001-01-01

    .... The complaint alleged that the Army Healthcare Enterprise Management System was not properly competed, potential conflicts of interest existed, and possible contract performance problems existed...

  18. Privacy Management and Networked PPD Systems - Challenges Solutions.

    Science.gov (United States)

    Ruotsalainen, Pekka; Pharow, Peter; Petersen, Francoise

    2015-01-01

    Modern personal portable health devices (PPDs) become increasingly part of a larger, inhomogeneous information system. Information collected by sensors are stored and processed in global clouds. Services are often free of charge, but at the same time service providers' business model is based on the disclosure of users' intimate health information. Health data processed in PPD networks is not regulated by health care specific legislation. In PPD networks, there is no guarantee that stakeholders share same ethical principles with the user. Often service providers have own security and privacy policies and they rarely offer to the user possibilities to define own, or adapt existing privacy policies. This all raises huge ethical and privacy concerns. In this paper, the authors have analyzed privacy challenges in PPD networks from users' viewpoint using system modeling method and propose the principle "Personal Health Data under Personal Control" must generally be accepted at global level. Among possible implementation of this principle, the authors propose encryption, computer understandable privacy policies, and privacy labels or trust based privacy management methods. The latter can be realized using infrastructural trust calculation and monitoring service. A first step is to require the protection of personal health information and the principle proposed being internationally mandatory. This requires both regulatory and standardization activities, and the availability of open and certified software application which all service providers can implement. One of those applications should be the independent Trust verifier.

  19. Trust-Based Leadership in the Making

    DEFF Research Database (Denmark)

    Bentzen, Tina Øllgaard; Jagd, Søren

    I spite of the popularity of trust-based leadership in consultancy and popular management writings empirical research on the transformation from traditional top-down to trust-based leadership is still limited. In this paper we study the implementation of a trust-based leadership reform in the City...... of Copenhagen taking place since 2012. We focus on understanding the trust dynamics in this major transformation. We show that the implementation of trust-based leadership should be seen as an emergent process involving a variety of actors within the organization. The case study reveals that the Trust Reform...... indicates that the implementation of a radical management reform involves a complex interplay of trust relations between actors at multiple levels of the organization....

  20. Managing Temporal Knowledge in Port Management Systems

    Directory of Open Access Journals (Sweden)

    Anita Gudelj

    2006-05-01

    Full Text Available Large ports need to deal with a number of disparate activities:the movement of ships, containers and other cargo, theloading and unloading of ships and containers, customs activities.As well as human resources, anchorages, channels, lighters,tugs, berths, warehouse and other storage spaces have to beallocated and released. The efficient management of a port involvesmanaging these activities and resources, managing theflows of money involved between the agents providing and usingthese resources, and providing management information.Many information systems will be involved.Many applications have to deal with a large amount of datawhich not only represent the perceived state of the real world atpresent, but also past and/or future states. These applicationsare not served adequately by today's computer managementand database systems. In particular, deletions and updates insuch systems have destructive semantics. This means that previousdatabase contents (representing previous perceived statesof the real world cannot be accessed anymore.A review of how define temporal data models, based ongeneralizing a non-temporal data model in to a temporal one toimprove port management is presented. This paper describes apractical experiment which supports managing temporal dataalong with the corresponding prototype implementations.

  1. Lighting system with thermal management system

    Science.gov (United States)

    Arik, Mehmet; Weaver, Stanton; Stecher, Thomas; Seeley, Charles; Kuenzler, Glenn; Wolfe, Jr., Charles; Utturkar, Yogen; Sharma, Rajdeep; Prabhakaran, Satish; Icoz, Tunc

    2013-05-07

    Lighting systems having unique configurations are provided. For instance, the lighting system may include a light source, a thermal management system and driver electronics, each contained within a housing structure. The light source is configured to provide illumination visible through an opening in the housing structure. The thermal management system is configured to provide an air flow, such as a unidirectional air flow, through the housing structure in order to cool the light source. The driver electronics are configured to provide power to each of the light source and the thermal management system.

  2. Managing organizational culture within a management system

    International Nuclear Information System (INIS)

    Comeau, L.; Watts, G.

    2009-01-01

    The Point Lepreau Generating Station (PLGS) is currently undergoing a major refurbishment of its nuclear reactor. At the same time, a small team is designing the organization that will operate the plant after refurbishment. This paper offers a high level overview of the Post-Refurbishment Organization (PRO) project and will focus primarily on the approach used to address organizational culture and human system dynamics. We will describe how various tools, used to assess organization culture, team performance, and individual self-understanding, are used collectively to place the right person in the right position. We will explain how the career system, Pathfinder, is used to integrate these tools to support a comprehensive model for organization design and development. Finally, we demonstrate how the management of organizational cultural and human system dynamics are integrated into the PLGS Integrated Management System. (author)

  3. Hospital managers need management information systems.

    Science.gov (United States)

    Davis, S; Freeman, J R

    1976-01-01

    A new hospital director seeking to bring his institution to the brink of solvency found himself with ten pounds of data but no "information"--at least, not the kind of information he could use as a basis for management decisions. What he needed was a system that would not only present data, but the meaning of the data. Such a system is the integrated MIS.

  4. Respect, trust, and the management of sickle cell disease pain in hospital: comparative analysis of concern-raising behaviors, preliminary model, and agenda for international collaborative research to inform practice

    Science.gov (United States)

    Elander, James; Beach, Mary Catherine; Haywood, Carlton

    2011-01-01

    Background/objectives Qualitative interview studies suggest that adult patients’ experiences of hospital treatment for sickle cell disease (SCD) pain reflect an absence of respect by providers for patients, and an absence or breakdown of trust. Systematic comparisons between treatment settings could help identify contextual influences on respect and trust. Design Quantitative comparison of concern-raising behaviors (pain treatment outcomes indicating breakdowns of trust) among adult SCD patients in Baltimore, Maryland, USA, and London, UK, followed by analysis of potential explanations for differences, including socio-cultural and behavioral factors, with a preliminary model of the processes leading to concern-raising behaviors. Results Rates of concern-raising behaviors were significantly higher in Baltimore than London. The model identifies respect and trust as key factors which could be targeted in efforts to improve the quality of SCD pain management in hospital. Conclusion An agenda for international, interdisciplinary research to improve the treatment of SCD pain in hospital should include: comparative analyses between countries and treatment settings of factors that could influence respect and trust; research to test hypotheses derived from models about the roles of respect and trust in the treatment of pain; studies of the impact of healthcare structures and policy on patients’ experiences of care; research focusing on developmental and interpersonal processes related to respect and trust; applications of attribution and other social psychology theories; and development and evaluation of interventions to improve the hospital treatment of SCD pain by increasing respect and trust. PMID:21797726

  5. An experimental maintenance management system.

    Science.gov (United States)

    1979-01-01

    The purpose of this study was to evaluate Virginia's maintenance management system and to recommend modifications directed at improving it. The study revealed that (1) the current system of allocating maintenance monies is based upon centerline milea...

  6. Cargo Data Management Demonstration System

    Science.gov (United States)

    1974-02-01

    Delays in receipt and creation of cargo documents are a problem in international trade. The work described demonstrates some of the advantages and capabilities of a computer-based cargo data management system. A demonstration system for data manageme...

  7. Temperament Constructs Related to Betrayal of Trust

    Science.gov (United States)

    1991-12-01

    disintegrate. The interrelatedness between system trust and interpersonal trust has been noted by Durkheim (1933), who predicted a loss of trust in others...and suspicion. Journal of Conflict Resolution, 2, 265-279. Durkheim , E. (1933). The division of labor in societ’. New York: Free Press of Glencoe

  8. System analysis for radwaste management

    International Nuclear Information System (INIS)

    Lennemann, W.L.

    1987-01-01

    The most logical approach to evaluating radioactive waste management processes and their options is to consider radioactive waste management, handling, and disposal as a complete and complex system from the waste arisings to their disposition. The principal elements that should be considered or taken into account when making a decision involving one or more components of a radwaste management system essentially concern radiation doses or detriments- both radiological and industrial safety and both capital investments and operating costs. This paper discusses the system analysis of the low- and medium-level radioactive waste management

  9. Car insurance information management system

    OpenAIRE

    Sun, Yu

    2015-01-01

    A customer information system is a typical information management system. It involves three aspects, the backstage database establishment, the application development and the system maintenance. A car insurance information management system is based on browser/server structure. Microsoft SQL Server establishes the backstage database. Active Server Pages, from Microsoft as well is used as the interface layer. The objective of this thesis was to apply ASP to the dynamic storage of a web page...

  10. IT Asset Management System -

    Data.gov (United States)

    Department of Transportation — ITAMS provides a web frontend for the managing of all HW Assets lifecycle data purchased by ATO since 2006. In addition it contains much of our Enterprise SW license...

  11. Password Management Systems

    OpenAIRE

    Fiala, Lukáš

    2010-01-01

    The goal is to describe and compare password management utilities and applications for individuals or small teams. Examples of such applications are KeePass, Password Safe, CodeWallet Pro and eWallet. On-line password managers like LastPass or RoboForm are another group of applications. Support for synchronization, sharing passwords in a team or protection against keyloggers (when filling in automatically) may also be included in the criteria.

  12. Analysis of Privacy-Enhancing Identity Management Systems

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    Privacy has become a major issue for policy makers. This has been impelled by the rapid development of technologies that facilitate collection, distribution, storage, and manipulation of personal information. Business organizations are finding new ways of leveraging the value derived from consumer...... is an attempt to understand the relationship between individuals’ intentions to disclose personal information, their actual personal information disclosure behaviours, and how these can be leveraged to develop privacy-enhancing identity management systems (IDMS) that users can trust. Legal, regulatory...... and technological aspects of privacy and technology adoption are also discussed....

  13. Equilibrium Trust

    OpenAIRE

    Luca Anderlini; Daniele Terlizzese

    2009-01-01

    We build a simple model of trust as an equilibrium phenomenon, departing from standard "selfish" preferences in a minimal way. Agents who are on the receiving end of an other to transact can choose whether to cheat and take away the entire surplus, taking into account a "cost of cheating." The latter has an idiosyncratic component (an agent's type), and a socially determined one. The smaller the mass of agents who cheat, the larger the cost of cheating suffered by those who cheat. Depending o...

  14. Enacting Trust

    OpenAIRE

    Campbell, Brian

    2012-01-01

    Small and removed from the Spanish mainland, the Enclave of Ceuta has always depended\\ud on flows of goods and labour out of the Moroccan hinterland, with individuals from\\ud different ethnic and religious groups forming informal, flexible and personal economic\\ud bonds based on mutual ‘confianza’ (trust). Since its entry into the European Union in 1986,\\ud the Spanish government has erected a border-wall around the enclave, and introduced new\\ud migration policies branding many informal work...

  15. Autonomously managed electrical power systems

    Science.gov (United States)

    Callis, Charles P.

    1986-01-01

    The electric power systems for future spacecraft such as the Space Station will necessarily be more sophisticated and will exhibit more nearly autonomous operation than earlier spacecraft. These new power systems will be more reliable and flexible than their predecessors offering greater utility to the users. Automation approaches implemented on various power system breadboards are investigated. These breadboards include the Hubble Space Telescope power system test bed, the Common Module Power Management and Distribution system breadboard, the Autonomusly Managed Power System (AMPS) breadboard, and the 20 kilohertz power system breadboard. Particular attention is given to the AMPS breadboard. Future plans for these breadboards including the employment of artificial intelligence techniques are addressed.

  16. THE INTERVENING EFFECTS OF PROCEDURAL FAIRNESS AND INTERPERSONAL TRUST ON THE RELATIONSHIPS BETWEEN MULTIPLE MEASURES-BASED PERFORMANCE EVALUATION AND MANAGERS' JOB SATISFACTION

    Directory of Open Access Journals (Sweden)

    Mahfud Sholihin

    2003-08-01

    Full Text Available Criticisms directed at the use of financial measures alone for performance evaluation have led to much interest in the use of nonfinancial performance measures to balance the financial measures. Hence, much recent research has been directed to investigate the effectiveness sand behavioral consequences of a mix of financial and nonfinancial measures (e.g. the Balanced Scorecard approach in contemporary settings. However, there is evidence from prior studies to suggest that the manner or how performance measures are used may affect the subordinates' behavior and work-related attitudes indirectly through the subordinates' perception of the justness of these measures and the interpersonal trust these measures promote. There is also evidence to indicate that it is the extent of the subordinates' agreement with the performance measures used in the evaluation, rather than the measures per se, which affects their behavior and work-related attitudes. Subordinates are more likely to agree with performance measures which they regard as fair and which enhance their trust in their superiors. This study therefore investigates if the effects of a mix of financial and nonfinancial measures (such as those used in the Balanced Scorecard approach on subordinates' job satisfaction are indirect through the subordinates' perception of the greater extent of fairness (justness in the evaluation process and the greater extent of trust such a mix of measures promotes. The results, based on a sample of 70 managers, support the expectation that a mix of financial and nonfinancial has no direct effect on subordinates’ job satisfaction. Instead, the effects of such a mix of performance measures on subordinates’ job satisfaction are indirect through the enhancement of the subordinates’ favorable perceptions of procedural fairness and interpersonal trust.

  17. Trusting the state, trusting each other?

    DEFF Research Database (Denmark)

    Sønderskov, Kim Mannemar; Dinesen, Peter Thisted

    2016-01-01

    Trust in state institutions is a prominent explanation of social trust. However, previous—mainly cross-sectional—analyses provide limited causal evidence regarding the relationship between institutional trust and social trust and it is thus essentially unknown whether an observed relationship...... reflects reverse causality (social trust forming institutional trust), or both forms of trust reflecting deep-seated dispositions (common confounding). Against the backdrop of the shortcomings of previous cross-sectional analyses, this paper utilizes two Danish panel surveys containing measures of both...... types of trust for the same individuals surveyed at multiple points in time over a long time-span (up to 18 years) to address the potentially reverse and/or spurious relationship. Using individual fixed effects and cross-lagged panel models, the results provide strong evidence of trust in state...

  18. Intelligent Integrated System Health Management

    Science.gov (United States)

    Figueroa, Fernando

    2012-01-01

    Intelligent Integrated System Health Management (ISHM) is the management of data, information, and knowledge (DIaK) with the purposeful objective of determining the health of a system (Management: storage, distribution, sharing, maintenance, processing, reasoning, and presentation). Presentation discusses: (1) ISHM Capability Development. (1a) ISHM Knowledge Model. (1b) Standards for ISHM Implementation. (1c) ISHM Domain Models (ISHM-DM's). (1d) Intelligent Sensors and Components. (2) ISHM in Systems Design, Engineering, and Integration. (3) Intelligent Control for ISHM-Enabled Systems

  19. Medical-Information-Management System

    Science.gov (United States)

    Alterescu, Sidney; Friedman, Carl A.; Frankowski, James W.

    1989-01-01

    Medical Information Management System (MIMS) computer program interactive, general-purpose software system for storage and retrieval of information. Offers immediate assistance where manipulation of large data bases required. User quickly and efficiently extracts, displays, and analyzes data. Used in management of medical data and handling all aspects of data related to care of patients. Other applications include management of data on occupational safety in public and private sectors, handling judicial information, systemizing purchasing and procurement systems, and analyses of cost structures of organizations. Written in Microsoft FORTRAN 77.

  20. Underground risk management information systems

    Energy Technology Data Exchange (ETDEWEB)

    Matsuyama, S.; Inoue, M.; Sakai, T.

    2006-03-15

    JCOAL has conducted Joint Research on an Underground Communication and Risk Management Information System with CSIRO of Australia under a commissioned study project for the promotion of coal use starting in fiscal 2002. The goal of this research project is the establishment of a new Safety System focusing on the comprehensive risk management information system by the name of Nexsys. The main components of the system are the Ethernet type underground communication system that represents the data communication base, and the risk management information system that permits risk analysis in real-time and provides decision support based on the collected data. The Nexsys is an open system and is a core element of the underground monitoring system. Using a vast amount of underground data, it is capable of accommodating a wide range of functions that were not available in the past. Because of it, it is possible to construct an advanced underground safety system. 14 figs., 4 tabs.

  1. Learning to Trust

    NARCIS (Netherlands)

    Nooteboom, B.

    2005-01-01

    Trust is full of puzzle and paradox.Trust is both rational and emotional. Trust can go beyond calculative self-interest, but has its limits.People may want to trust, while they may also feel threatened by it.If trust is not in place prior to a relationship, on the basis of institutions, prior

  2. Management systems in production operations

    International Nuclear Information System (INIS)

    Walters, K.B.; Henderson, G.

    1993-01-01

    The Cullen Enquiry into the Piper Alpha disaster in the U.K. North Sea recommended that an operator should formally present it's company Management System and demonstrate how safety is achieved throughout the life cycle of a platform, from design through operation to abandonment. Brunei Shell Petroleum has prepared a corporate level Safety Management System. As part of Safety Case work, the corporate system is being extended to include the development of specific Management Systems with particular emphasis on offshore production operations involving integrated oil and gas facilities. This paper will describe the development of Management Systems, which includes an intensive Business Process Analysis and will comment upon it's applicability and relationship to ISO 9000. The paper will further describe the applicability and benefits of Management Systems and offer guidance on required effort. The paper will conclude that development of structured Management Systems for safety critical business processes is worthwhile but prioritization of effort will be necessary. As such the full adoption of Management Systems will be directional in nature

  3. Integrating the radioactive waste management system into other management systems

    International Nuclear Information System (INIS)

    Silva, Ana Cristina Lourenco da; Nunes Neto, Carlos Antonio

    2007-01-01

    Radioactive waste management is to be included in the Integrated Management System (IMS) which pursues the continuous improvement of the company's quality, occupational safety and health, and environment protection processes. Radioactive waste management is based on the following aspects: optimization of human and material resources for execution of tasks, including the provision of a radiation protection supervisor to watch over the management of radioactive waste; improved documentation (management plan and procedures); optimization of operational levels for waste classification and release; maintenance of generation records and history through a database that facilitates traceability of information; implementation of radioactive waste segregation at source (source identification, monitoring and decontamination) activities intended to reduce the amount of radioactive waste; licensing of initial storage site for radioactive waste control and storage; employee awareness training on radioactive waste generation; identification and evaluation of emergency situations and response planning; implementation of preventive maintenance program for safety related items; development and application of new, advanced treatment methodologies or systems. These aspects are inherent in the concepts underlying quality management (establishment of administrative controls and performance indicators), environment protection (establishment of operational levels and controls for release), occupational health and safety (establishment of operational controls for exposure in emergency and routine situations and compliance with strict legal requirements and standards). It is noted that optimizing the addressed aspects of a radioactive waste management system further enhances the efficiency of the Integrated Management System for Quality, Environment, and Occupational Safety and Health. (author)

  4. Information systems for risk management

    OpenAIRE

    Michael S. Gibson

    1997-01-01

    Risk management information systems are designed to overcome the problem of aggregating data across diverse trading units. The design of an information system depends on the risk measurement methodology that a firm chooses. Inherent in the design of both a risk management information system and a risk measurement methodology is a tradeoff between the accuracy of the resulting measures of risk and the burden of computing them. Technical progress will make this tradeoff more favorable over time...

  5. 78 FR 70959 - Commission on Indian Trust Administration and Reform

    Science.gov (United States)

    2013-11-27

    ... DEPARTMENT OF THE INTERIOR Office of the Secretary [DR.5A311.IA000514] Commission on Indian Trust Administration and Reform AGENCY: Office of the Secretary, Interior. ACTION: Notice of Renewal of the Commission... administration system to support a reasoned and factually based set of options for potential management...

  6. The Impact of Trust on Job Performance in Organisations

    OpenAIRE

    Ana Nešić; Danijela Lalić

    2016-01-01

    In circumstances governed by consistent change in all aspects of business, trust represents a significant factor in the behavioural patterns of organisations. Of great importance for a successful communication in organisations is understanding the levels of trust among staff, employees and their management, and trust in the organisation itself. Trust is a cohesive and motivating factor in work groups. Also, based on trust are identification and commitment to the organisation, as well as the r...

  7. The Relationship between Teamwork and Organizational Trust

    Directory of Open Access Journals (Sweden)

    Musab Isik

    2016-01-01

    Full Text Available The aim of this study is to investigate the relationship between teamwork and organizational trust. In the implementation section the data from the survey of 250 workers is employed in call centers in Erzurum by using relevant statistical  methods. Consequently, it is found that there is a positive and significant relationship between teamwork and organizational trust. Thus, the hypothesis of the study is supported as it was expected. Besides, it is found that there are positive and significant relationships between communication, openness to innovation, participation-trust in teamwork and organizational trust, trust in management, trust in co-workers, and trust in workplace.

  8. A Question of Ambiguity, Risk, and Trust: Do Auditors React Differently to Potential Accrual Transaction Earnings Management than to Potential Real Transaction Earnings Management?

    OpenAIRE

    Garner, Dana Porter

    2008-01-01

    This research study investigates the relationship between ambiguity, litigation risk, and auditor decision-making. In addition, this study investigates how auditor trust of his or her client may change these relationships. It is important to investigate the relationships of ambiguity, litigation risk, and client trust to auditor decision-making because auditors face these factors on a regular basis. This research uses a 2x2 experiment to investigate auditor reaction to ambiguity and li...

  9. Energy management systems in buildings

    Energy Technology Data Exchange (ETDEWEB)

    Lush, D. M.

    1979-07-01

    An investigation is made of the range of possibilities available from three types of systems (automatic control devices, building envelope, and the occupants) in buildings. The following subjects are discussed: general (buildings, design and personnel); new buildings (envelope, designers, energy and load calculations, plant design, general design parameters); existing buildings (conservation measures, general energy management, air conditioned buildings, industrial buildings); man and motivation (general, energy management and documentation, maintenance, motivation); automatic energy management systems (thermostatic controls, optimized plant start up, air conditioned and industrial buildings, building automatic systems). (MCW)

  10. Evaluating a Skills Management System

    International Nuclear Information System (INIS)

    Largier, A.

    2013-01-01

    In order to anticipate the large number of people due to retire in the next few years, and to optimize the workforce contribution, IRSN (Institute for radiation protection and nuclear safety) is setting up skill management. This poster presents the IRSN's skill management system. The skill management system is based on a 4 step approach: -) identifying and listing the necessary skills, -) assessing the skills available, -) defining and setting up solutions: training, recruitment, out-sourcing), and -) feedback about the efficiency of the system. It appears that it is important to take into account the way the organization considers individual ability in order to favour collective proficiency

  11. HTR-10 management information system

    International Nuclear Information System (INIS)

    Liu Ruoxiao; Wu Zhongwang; Xi Shuren

    2000-01-01

    The HTR-10 Management information system (REMIS) strengthens the managerial level and usage of the information of HTR-10, thereby enhances the ability and efficiency of the design and management work. REMIS is designed based on the Client/Server framework. Database management system is SQL Server 6.5 for NT, While the client side is developed by Borland C ++ Builder, and it is based on Windows 95/98. The network protocol is TCP/IP. REMIS collects date of the HTR-10 at four parameters: Reactor properties, Design parameters, Equipment properties Reactor system flow charts. Final discussing extended prospect of REMIS

  12. The CMS workload management system

    Energy Technology Data Exchange (ETDEWEB)

    Cinquilli, M. [CERN; Evans, D. [Fermilab; Foulkes, S. [Fermilab; Hufnagel, D. [Fermilab; Mascheroni, M. [CERN; Norman, M. [UC, San Diego; Maxa, Z. [Caltech; Melo, A. [Vanderbilt U.; Metson, S. [Bristol U.; Riahi, H. [INFN, Perugia; Ryu, S. [Fermilab; Spiga, D. [CERN; Vaandering, E. [Fermilab; Wakefield, Stuart [Imperial Coll., London; Wilkinson, R. [Caltech

    2012-01-01

    CMS has started the process of rolling out a new workload management system. This system is currently used for reprocessing and Monte Carlo production with tests under way using it for user analysis. It was decided to combine, as much as possible, the production/processing, analysis and T0 codebases so as to reduce duplicated functionality and make best use of limited developer and testing resources. This system now includes central request submission and management (Request Manager), a task queue for parcelling up and distributing work (WorkQueue) and agents which process requests by interfacing with disparate batch and storage resources (WMAgent).

  13. The CMS workload management system

    International Nuclear Information System (INIS)

    Cinquilli, M; Mascheroni, M; Spiga, D; Evans, D; Foulkes, S; Hufnagel, D; Ryu, S; Vaandering, E; Norman, M; Maxa, Z; Wilkinson, R; Melo, A; Metson, S; Riahi, H; Wakefield, S

    2012-01-01

    CMS has started the process of rolling out a new workload management system. This system is currently used for reprocessing and Monte Carlo production with tests under way using it for user analysis. It was decided to combine, as much as possible, the production/processing, analysis and T0 codebases so as to reduce duplicated functionality and make best use of limited developer and testing resources. This system now includes central request submission and management (Request Manager); a task queue for parcelling up and distributing work (WorkQueue) and agents which process requests by interfacing with disparate batch and storage resources (WMAgent).

  14. Customer relationship management system

    OpenAIRE

    Selenis, Laimonas

    2004-01-01

    Customer Relationship Management (CRM) is one of the biggest problems for many companies today. By analyzing history records (profiles) of its customers, organization can effectively adapt its business activity to users needs and create better products and services. Proper analysis of customer profiles can help to predict the behaviour of the customers. After grouping customer profiles by similar attributes, company can easier handle its interactions with similar users. Such group profiling c...

  15. Management systems for regulatory authorities

    International Nuclear Information System (INIS)

    Mpandanyama, Rujeko Lynette

    2015-02-01

    For a regulatory body to fulfil its statutory obligations, there is need to develop and implement a regulatory management system that has the necessary arrangements for achieving and maintaining high quality performance in regulating the safety of nuclear and radiation facilities under its authority. Hence, the regulatory management system needs to fully integrate the human resources, processes and physical resources of the organization. This study sought to provide an understanding of the concept, principles, policies and fundamentals of management systems as they relate to regulatory systems in the field of radiation protection and to make appropriate recommendations to ensure that an effective management system exists for the control of ionizing radiation and radiation sources and addresses all relevant stakeholders in Zimbabwe. A comparative analysis was done on the current management status and the ideal management system, which led to the identification of the gaps existing. The main key that was found to be of significance was lack of linkages between processes and management tools within the institution. (au)

  16. INTEGRATION OF ENVIRONMENTAL MANAGEMENT SYSTEM

    OpenAIRE

    Tomescu Ada Mirela

    2012-01-01

    The relevance of management as significant factor of business activity can be established on various management systems. These will help to obtain, organise, administrate, evaluate and control particulars: information, quality, environmental protection, health and safety, various resources (time, human, finance, inventory etc). The complexity of nowadays days development, forced us to think ‘integrated’. Sustainable development principles require that environment management policies and p...

  17. Information Security Management System toolkit

    OpenAIRE

    Καραμανλής, Μάνος; Karamanlis, Manos

    2016-01-01

    Secure management of information is becoming critical for any organization because information is one of the most valuable assets in organization’s business operations. An Information security management system (ISMS) consists of the policies, procedures, guidelines, and associated resources and activities, collectively managed by an organization, in the pursuit of protecting its information assets. An ISMS is a systematic approach for establishing, implementing, operating, mon...

  18. Quality management systems in radiology

    Directory of Open Access Journals (Sweden)

    Geoffrey K. Korir

    2013-08-01

    Objective: To assess the level of quality management systems in X-ray medical facilities in Kenya. Methods: Quality management inspection, quality control performance tests and patient radiation exposure were assessed in 54 representative X-ray medical facilities. Additionally, a survey of X-ray examination frequency was conducted in 140 hospitals across the country. Results: The overall findings placed the country’s X-ray imaging quality management systems at 61±3% out of a possible 100%. The most and the least quality assurance performance indicators were general radiography X-ray equipment quality control tests at 88±4%, and the interventional cardiology adult examinations below diagnostic reference level at 25±1%, respectively. Conclusions: The study used a systematic evidence-based approach for the assessment of national quality management systems in radiological practice in clinical application, technical conduct of the procedure, image quality criteria, and patient characteristics as part of the quality management programme.

  19. A Formal Model of Trust Chain based on Multi-level Security Policy

    OpenAIRE

    Kong Xiangying

    2013-01-01

    Trust chain is the core technology of trusted computing. A formal model of trust chain based on finite state automata theory is proposed. We use communicating sequential processes to describe the system state transition in trust chain and by combining with multi-level security strategy give the definition of trust system and trust decision theorem of trust chain transfer which is proved meantime. Finally, a prototype system is given to show the efficiency of the model.

  20. Management system of instrument database

    International Nuclear Information System (INIS)

    Zhang Xin

    1997-01-01

    The author introduces a management system of instrument database. This system has been developed using with Foxpro on network. The system has some characters such as clear structure, easy operation, flexible and convenient query, as well as the data safety and reliability

  1. An evaluation of a toolkit for the early detection, management, and control of carbapenemase-producing Enterobacteriaceae: a survey of acute hospital trusts in England.

    Science.gov (United States)

    Coope, C M; Verlander, N Q; Schneider, A; Hopkins, S; Welfare, W; Johnson, A P; Patel, B; Oliver, I

    2018-03-09

    Following hospital outbreaks of carbapenemase-producing Enterobacteriaceae (CPE), Public Health England published a toolkit in December 2013 to promote the early detection, management, and control of CPE colonization and infection in acute hospital settings. To examine awareness, uptake, implementation and usefulness of the CPE toolkit and identify potential barriers and facilitators to its adoption in order to inform future guidance. A cross-sectional survey of National Health Service (NHS) acute trusts was conducted in May 2016. Descriptive analysis and multivariable regression models were conducted, and narrative responses were analysed thematically and informed using behaviour change theory. Most (92%) acute trusts had a written CPE plan. Fewer (75%) reported consistent compliance with screening and isolation of CPE risk patients. Lower prioritization and weaker senior management support for CPE prevention were associated with poorer compliance. Awareness of the CPE toolkit was high and all trusts with patients infected or colonized with CPE had used the toolkit either as provided (32%), or to inform (65%) their own local CPE plan. Despite this, many respondents (80%) did not believe that the CPE toolkit guidance offered an effective means to prevent CPE or was practical to follow. CPE prevention and control requires robust IPC measures. Successful implementation can be hindered by a complex set of factors related to their practical execution, insufficient resources and a lack of confidence in the effectiveness of the guidance. Future CPE guidance would benefit from substantive user involvement, processes for ongoing feedback, and regular guidance updates. Copyright © 2018 The Healthcare Infection Society. All rights reserved.

  2. TEE-Based Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe

    Today, it is safe to assume that any program or data can be compromised, if they are not protected by hardware within a secure area. Systems based on crypto-processors (e.g., a trusted platform module, a smart card or a hardware security module) rely on the properties of tamper resistant hardware...... to establish a tight security parameter around a reduced set of predefined functionalities. Such systems are very secure, but they impose strong constraints on the functionalities, the connectivity or the resources available within the secure area. They have not proven versatile enough to provide mainstream...... trusted storage for personal data. We believe that this role can be taken over by systems equipped with Trusted Execution Environments (TEE), such as ARM’s TrustZone. Indeed, even if TEEs provide weaker security guarantees than crypto-processors, they already provide a secure area on many personal devices...

  3. Nuclear database management systems

    International Nuclear Information System (INIS)

    Stone, C.; Sutton, R.

    1996-01-01

    The authors are developing software tools for accessing and visualizing nuclear data. MacNuclide was the first software application produced by their group. This application incorporates novel database management and visualization tools into an intuitive interface. The nuclide chart is used to access properties and to display results of searches. Selecting a nuclide in the chart displays a level scheme with tables of basic, radioactive decay, and other properties. All level schemes are interactive, allowing the user to modify the display, move between nuclides, and display entire daughter decay chains

  4. Army Healthcare Enterprise Management System

    National Research Council Canada - National Science Library

    2001-01-01

    ... to buy the Enterprise Management System. The Information Technology Business Center provides information technology services to Fort Sam Houston tenants which include the Army Medical Command and the Army Medical Department Center and School...

  5. Fault management and systems knowledge

    Science.gov (United States)

    2016-12-01

    Pilots are asked to manage faults during flight operations. This leads to the training question of the type and depth of system knowledge required to respond to these faults. Based on discussions with multiple airline operators, there is agreement th...

  6. Congestion Management System Process Report

    Science.gov (United States)

    1996-03-01

    In January 1995, the Indianapolis Metropolitan Planning Organization with the help of an interagency Study Review Committee began the process of developing a Congestion Management System (CMS) Plan resulting in this report. This report documents the ...

  7. Introducing Managers to Expert Systems.

    Science.gov (United States)

    Finlay, Paul N.; And Others

    1991-01-01

    Describes a short course to expose managers to expert systems, consisting of (1) introductory lecture; (2) supervised computer tutorial; (3) lecture and discussion about knowledge structuring and modeling; and (4) small group work on a case study using computers. (SK)

  8. Pembangunan Model Restaurant Management System

    Directory of Open Access Journals (Sweden)

    Fredy Jingga

    2014-12-01

    Full Text Available Model design for Restaurant Management System aims to help in restaurant business process, where Restaurant Management System (RMS help the waitress and chef could interact each other without paper limitation.  This Restaurant Management System Model develop using Agile Methodology and developed based on PHP Programming Langguage. The database management system is using MySQL. This web-based application model will enable the waitress and the chef to interact in realtime, from the time they accept the customer order until the chef could know what to cook and checklist for the waitress wheter the order is fullfill or not, until the cahsier that will calculate the bill and the payment that they accep from the customer.

  9. System Wide Information Management (SWIM)

    Science.gov (United States)

    Hritz, Mike; McGowan, Shirley; Ramos, Cal

    2004-01-01

    This viewgraph presentation lists questions regarding the implementation of System Wide Information Management (SWIM). Some of the questions concern policy issues and strategies, technology issues and strategies, or transition issues and strategies.

  10. Electronic Resource Management Systems

    Directory of Open Access Journals (Sweden)

    Mark Ellingsen

    2004-10-01

    Full Text Available Computer applications which deal with electronic resource management (ERM are quite a recent development. They have grown out of the need to manage the burgeoning number of electronic resources particularly electronic journals. Typically, in the early years of e-journal acquisition, library staff provided an easy means of accessing these journals by providing an alphabetical list on a web page. Some went as far as categorising the e-journals by subject and then grouping the journals either on a single web page or by using multiple pages. It didn't take long before it was recognised that it would be more efficient to dynamically generate the pages from a database rather than to continually edit the pages manually. Of course, once the descriptive metadata for an electronic journal was held within a database the next logical step was to provide administrative forms whereby that metadata could be manipulated. This in turn led to demands for incorporating more information and more functionality into the developing application.

  11. RIMS: Resource Information Management System

    Science.gov (United States)

    Symes, J.

    1983-01-01

    An overview is given of the capabilities and functions of the resource management system (RIMS). It is a simple interactive DMS tool which allows users to build, modify, and maintain data management applications. The RIMS minimizes programmer support required to develop/maintain small data base applications. The RIMS also assists in bringing the United Information Services (UIS) budget system work inhouse. Information is also given on the relationship between the RIMS and the user community.

  12. CLASSIFICATION OF LEARNING MANAGEMENT SYSTEMS

    Directory of Open Access Journals (Sweden)

    Yu. B. Popova

    2016-01-01

    Full Text Available Using of information technologies and, in particular, learning management systems, increases opportunities of teachers and students in reaching their goals in education. Such systems provide learning content, help organize and monitor training, collect progress statistics and take into account the individual characteristics of each user. Currently, there is a huge inventory of both paid and free systems are physically located both on college servers and in the cloud, offering different features sets of different licensing scheme and the cost. This creates the problem of choosing the best system. This problem is partly due to the lack of comprehensive classification of such systems. Analysis of more than 30 of the most common now automated learning management systems has shown that a classification of such systems should be carried out according to certain criteria, under which the same type of system can be considered. As classification features offered by the author are: cost, functionality, modularity, keeping the customer’s requirements, the integration of content, the physical location of a system, adaptability training. Considering the learning management system within these classifications and taking into account the current trends of their development, it is possible to identify the main requirements to them: functionality, reliability, ease of use, low cost, support for SCORM standard or Tin Can API, modularity and adaptability. According to the requirements at the Software Department of FITR BNTU under the guidance of the author since 2009 take place the development, the use and continuous improvement of their own learning management system.

  13. Automated Maintenance Management System -

    Data.gov (United States)

    Department of Transportation — To achieve the to-be state of a modernized supply chain infrastructure and the NextGen Mission Service Requirements, the System Information Modernization initiative...

  14. Impact Management System

    Data.gov (United States)

    US Agency for International Development — IMS (developed w/Iraq mission) is a system for conducting quality portfolio impact analysis, linking projects to strategy through integration of context data. IMS...

  15. Management Information Systems

    OpenAIRE

    Furduescu Bogdan-Alexandru

    2017-01-01

    Technology is the science that studies processes, methods and operations run or applied onto raw materials, matters or data, in order to obtain a certain product. Information is the material signal able to launch a material reaction of a dynamic auto-tuning system for which the system is conditioned and finalized. Information Technology is the technology needed for handling (procuring, processing, storing converting and transmitting) information, in particular, with the use of computers [Long...

  16. Evaluating safety management system implementation

    International Nuclear Information System (INIS)

    Preuss, M.

    2009-01-01

    Canada is committed to not only maintaining, but also improving upon our record of having one of the safest aviation systems in the world. The development, implementation and maintenance of safety management systems is a significant step towards improving safety performance. Canada is considered a world leader in this area and we are fully engaged in implementation. By integrating risk management systems and business practices, the aviation industry stands to gain better safety performance with less regulatory intervention. These are important steps towards improving safety and enhancing the public's confidence in the safety of Canada's aviation system. (author)

  17. Device configuration-management system

    International Nuclear Information System (INIS)

    Nowell, D.M.

    1981-01-01

    The Fusion Chamber System, a major component of the Magnetic Fusion Test Facility, contains several hundred devices which report status to the Supervisory Control and Diagnostic System for control and monitoring purposes. To manage the large number of diversity of devices represented, a device configuration management system was required and developed. Key components of this software tool include the MFTF Data Base; a configuration editor; and a tree structure defining the relationships between the subsystem devices. This paper will describe how the configuration system easily accomodates recognizing new devices, restructuring existing devices, and modifying device profile information

  18. Site systems engineering: Systems engineering management plan

    Energy Technology Data Exchange (ETDEWEB)

    Grygiel, M.L. [Westinghouse Hanford Co., Richland, WA (United States)

    1996-05-03

    The Site Systems Engineering Management Plan (SEMP) is the Westinghouse Hanford Company (WHC) implementation document for the Hanford Site Systems Engineering Policy, (RLPD 430.1) and Systems Engineering Criteria Document and Implementing Directive, (RLID 430.1). These documents define the US Department of Energy (DOE), Richland Operations Office (RL) processes and products to be used at Hanford to implement the systems engineering process at the site level. This SEMP describes the products being provided by the site systems engineering activity in fiscal year (FY) 1996 and the associated schedule. It also includes the procedural approach being taken by the site level systems engineering activity in the development of these products and the intended uses for the products in the integrated planning process in response to the DOE policy and implementing directives. The scope of the systems engineering process is to define a set of activities and products to be used at the site level during FY 1996 or until the successful Project Hanford Management Contractor (PHMC) is onsite as a result of contract award from Request For Proposal DE-RP06-96RL13200. Following installation of the new contractor, a long-term set of systems engineering procedures and products will be defined for management of the Hanford Project. The extent to which each project applies the systems engineering process and the specific tools used are determined by the project`s management.

  19. Management of Type 1 diabetes in a limited resource context: A study of the diabetes research education and management trust model in Nagpur, Central India

    Directory of Open Access Journals (Sweden)

    Caroline Sarah Zuijdwijk

    2017-01-01

    Full Text Available Background/Objective: Diabetes Research Education and Management (DREAM Trust (DT is a charitable organisation that offers free insulin and healthcare to children and youth with type 1 diabetes (T1D in central India. We systematically describe DT's model of care and evaluate medical and sociodemographic factors influencing glycaemic control in this resource-poor setting. Methods: Study of DT patients diagnosed with T1D <16 years old and followed at DT ≥1 year. Participants completed an interview, retrospective chart review and prospective haemoglobin A1c (HbA1c measurements. Uni- and multi-variate linear regressions determined factors associated with HbA1c. Percentage of underweight patients (as proxy for glycaemic control was compared at presentation to DT versus time of interview. Results: A total of 102 DT patients (51% female completed the interview and chart review. 74 had HbA1c measured. Median HbA1c was 10.4% (90.2 mmol/mol. In multivariate regression, higher HbA1c was independently associated with higher insulin dose/kg (P < 0.001 and holding a below the poverty line certificate (P = 0.004. There was no association between HbA1c and age, sex, caste, religion or experience of stigma. However, the psychosocial burden of T1D (expressed as concern about others learning about the diagnosis, and worry about the future, and experience of stigma were substantial. Percentage of patients with underweight body mass index was significantly lower at the time of study vs. presentation to DT (P = 0.005. Conclusions: The DT charitable programme overcomes social status, gender inequalities and experience of social stigma to provide life-saving treatment to children with T1D in central India. Glycaemic control remains inadequate however, with children living in extreme poverty most at risk.

  20. Interconnecting heterogeneous database management systems

    Science.gov (United States)

    Gligor, V. D.; Luckenbaugh, G. L.

    1984-01-01

    It is pointed out that there is still a great need for the development of improved communication between remote, heterogeneous database management systems (DBMS). Problems regarding the effective communication between distributed DBMSs are primarily related to significant differences between local data managers, local data models and representations, and local transaction managers. A system of interconnected DBMSs which exhibit such differences is called a network of distributed, heterogeneous DBMSs. In order to achieve effective interconnection of remote, heterogeneous DBMSs, the users must have uniform, integrated access to the different DBMs. The present investigation is mainly concerned with an analysis of the existing approaches to interconnecting heterogeneous DBMSs, taking into account four experimental DBMS projects.