WorldWideScience

Sample records for trust management system

  1. Trust Management System for Opportunistic Cloud Services

    DEFF Research Database (Denmark)

    Kuada, Eric

    2013-01-01

    We have over the past three years been working on the feasibility of Opportunistic Cloud Services (OCS) for enterprises. OCS is about enterprises strategically contributing and utilizing spare IT resources as cloud services. One of the major challenges that such a platform faces is data security...... and trust management issues. This paper presents a trust management system for OCS platforms. It models the concept of trust and applies it to OCS platforms. The trust model and the trust management system are verified through the simulation of the computation of the trust values with Infrastructure...

  2. DualTrust: A Trust Management Model for Swarm-Based Autonomic Computing Systems

    Energy Technology Data Exchange (ETDEWEB)

    Maiden, Wendy M. [Washington State Univ., Pullman, WA (United States)

    2010-05-01

    Trust management techniques must be adapted to the unique needs of the application architectures and problem domains to which they are applied. For autonomic computing systems that utilize mobile agents and ant colony algorithms for their sensor layer, certain characteristics of the mobile agent ant swarm -- their lightweight, ephemeral nature and indirect communication -- make this adaptation especially challenging. This thesis looks at the trust issues and opportunities in swarm-based autonomic computing systems and finds that by monitoring the trustworthiness of the autonomic managers rather than the swarming sensors, the trust management problem becomes much more scalable and still serves to protect the swarm. After analyzing the applicability of trust management research as it has been applied to architectures with similar characteristics, this thesis specifies the required characteristics for trust management mechanisms used to monitor the trustworthiness of entities in a swarm-based autonomic computing system and describes a trust model that meets these requirements.

  3. Building trusted national identity management systems: Presenting the privacy concern-trust (PCT) model

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    This paper discusses the effect of trust and information privacy concerns on citizens’ attitude towards national identity management systems. We introduce the privacyconcerns- trust model, which shows the role of trust in mediating and moderating citizens’ attitude towards identity management...... systems. We adopted a qualitative research approach in our analysis of data that was gathered through a series of interviews and a stakeholder workshop in Ghana. Our findings indicate that, beyond the threshold level of trust, societal information privacy concern is low; hence, trust is high, thereby...

  4. Trust Management in Open Systems (TMOS)

    National Research Council Canada - National Science Library

    Jones, Vicki

    2002-01-01

    .... The problem considered in the Trust Management in Open Systems (TMOS) project is management of the exchange of sensitive credentials between strangers for the purpose of property-based authentication and authorization...

  5. Research on Trust Propagation Models in Reputation Management Systems

    Directory of Open Access Journals (Sweden)

    Zhiyuan Su

    2014-01-01

    Full Text Available Feedback based reputation systems continue to gain popularity in eCommerce and social media systems today and reputation management in large social networks needs to manage cold start and sparseness in terms of feedback. Trust propagation has been widely recognized as an effective mechanism to handle these problems. In this paper we study the characterization of trust propagation models in the context of attack resilience. We characterize trust propagation models along three dimensions: (i uniform propagation and conditional propagation, (ii jump strategies for breaking unwanted cliques, and (iii decay factors for differentiating recent trust history from remote past history. We formally and experimentally show that feedback similarity is a critical measure for countering colluding attacks in reputation systems. Without feedback similarity guided control, trust propagations are vulnerable to different types of colluding attacks.

  6. Trust on the Ratee: A Trust Management System for Social Internet of Vehicles

    Directory of Open Access Journals (Sweden)

    Fangyu Gai

    2017-01-01

    Full Text Available The integration of social networking concepts with Internet of Vehicles (IoV has led to the novel paradigm “Social Internet of Vehicles (SIoV,” which enables vehicles to establish social relationships autonomously to improve traffic conditions and service discovery. There is a growing requirement for effective trust management in the SIoV, considering the critical consequences of acting on misleading information spread by malicious nodes. However, most existing trust models are rater-based, where the reputation information of each node is stored in other nodes it has interacted with. This is not suitable for vehicular environment due to the ephemeral nature of the network. To fill this gap, we propose a Ratee-based Trust Management (RTM system, where each node stores its own reputation information rated by others during past transactions, and a credible CA server is introduced to ensure the integrality and the undeniability of the trust information. RTM is built based on the concept of SIoV, so that the relationships established between nodes can be used to increase the accuracy of the trustworthiness. Experimental results demonstrate that our scheme achieves faster information propagation and higher transaction success rate than the rater-based method, and the time cost when calculating trustworthiness can meet the demand of vehicular networks.

  7. ReTrust: attack-resistant and lightweight trust management for medical sensor networks.

    Science.gov (United States)

    He, Daojing; Chen, Chun; Chan, Sammy; Bu, Jiajun; Vasilakos, Athanasios V

    2012-07-01

    Wireless medical sensor networks (MSNs) enable ubiquitous health monitoring of users during their everyday lives, at health sites, without restricting their freedom. Establishing trust among distributed network entities has been recognized as a powerful tool to improve the security and performance of distributed networks such as mobile ad hoc networks and sensor networks. However, most existing trust systems are not well suited for MSNs due to the unique operational and security requirements of MSNs. Moreover, similar to most security schemes, trust management methods themselves can be vulnerable to attacks. Unfortunately, this issue is often ignored in existing trust systems. In this paper, we identify the security and performance challenges facing a sensor network for wireless medical monitoring and suggest it should follow a two-tier architecture. Based on such an architecture, we develop an attack-resistant and lightweight trust management scheme named ReTrust. This paper also reports the experimental results of the Collection Tree Protocol using our proposed system in a network of TelosB motes, which show that ReTrust not only can efficiently detect malicious/faulty behaviors, but can also significantly improve the network performance in practice.

  8. Decoupling, re-Engaging: managing trust relationships in implementation projects

    DEFF Research Database (Denmark)

    Rose, Jeremy; Schlichter, Bjarne Rerup

    2012-01-01

    , and the complex demands of managing those fluctuations. We investigate evolving trust relationships in a longitudinal case analysis of a large Integrated Hospital System implementation for the Faroe Islands. Trust relationships suffered various breakdowns, but the project was able to recover and eventually meet...... its goals. Based on concepts from Giddens’ later work on modernity, we develop two approaches for managing dynamic trust relationships in implementation projects: decoupling and re-engaging.......An important aspect of the successful implementation of large information systems (such as ERP systems) is trust. These implementations impact the legitimate interests of many groups of stakeholders, and trust is a critical factor for success. Trust in the project is contingent upon many factors...

  9. Trust-based Service Management of Internet of Things Systems and Its Applications

    OpenAIRE

    Guo, Jia

    2018-01-01

    A future Internet of Things (IoT) system will consist of a huge quantity of heterogeneous IoT devices, each capable of providing services upon request. It is of utmost importance for an IoT device to know if another IoT service is trustworthy when requesting it to provide a service. In this dissertation research, we develop trust-based service management techniques applicable to distributed, centralized, and hybrid IoT environments. For distributed IoT systems, we develop a trust protocol...

  10. Trust management in cloud services

    CERN Document Server

    Noor, Talal H; Bouguettaya, Athman

    2014-01-01

    This book describes the design and implementation of Cloud Armor, a novel approach for credibility-based trust management and automatic discovery of cloud services in distributed and highly dynamic environments. This book also helps cloud users to understand the difficulties of establishing trust in cloud computing and the best criteria for selecting a service cloud. The techniques have been validated by a prototype system implementation and experimental studies using a collection of real world trust feedbacks on cloud services.The authors present the design and implementation of a novel pro

  11. A multi-domain trust management model for supporting RFID applications of IoT.

    Directory of Open Access Journals (Sweden)

    Xu Wu

    Full Text Available The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system, in which trust establishment among entities from heterogeneous domains without past interaction or prior agreed policy, is a challenge. The current trust management mechanisms in the literature do not meet the specific requirements in multi-domain RFID systems. Therefore, this paper analyzes the special challenges on trust management in multi-domain RFID systems, and identifies the implications and the requirements of the challenges on the solutions to the trust management of multi-domain RFID systems. A multi-domain trust management model is proposed, which provides a hierarchical trust management framework include a diversity of trust evaluation and establishment approaches. The simulation results and analysis show that the proposed method has excellent ability to deal with the trust relationships, better security, and higher accuracy rate.

  12. Trust Management V

    DEFF Research Database (Denmark)

    2011-01-01

    from 42 submissions. The papers feature both theoretical research and real-world case studies from academia, business and government focusing on areas such as: trust models, social and behavioral aspects of trust, trust in networks, mobile systems and cloud computation, privacy, reputation systems...

  13. Perceptions of trust in physician-managers.

    Science.gov (United States)

    Cregård, Anna; Eriksson, Nomie

    2015-01-01

    The purpose of this paper is to explore the dual role of physician-managers through an examination of perceptions of trust and distrust in physician-managers. The healthcare sector needs physicians to lead. Physicians in part-time managerial positions who continue their medical practice are called part-time physician-managers. This paper explores this dual role through an examination of perceptions of trust and distrust in physician-managers. The study takes a qualitative research approach in which interviews and focus group discussions with physician-managers and nurse-managers provide the empirical data. An analytical model, with the three elements of ability, benevolence and integrity, was used in the analysis of trust and distrust in physician-managers. The respondents (physician-managers and nurse-managers) perceived both an increase and a decrease in physicians' trust in the physician-managers. Because elements of distrust were more numerous and more severe than elements of trust, the physician-managers received negative perceptions of their role. This paper's findings are based on perceptions of perceptions. The physicians were not interviewed on their trust and distrust of physician-managers. The healthcare sector must pay attention to the diverse expectations of the physician-manager role that is based on both managerial and medical logics. Hospital management should provide proper support to physician-managers in their dual role to ensure their willingness to continue to assume managerial responsibilities. The paper takes an original approach in its research into the dual role of physician-managers who work under two conflicting logics: the medical logic and the managerial logic. The focus on perceived trust and distrust in physician-managers is a new perspective on this complicated role.

  14. Trust-based information system architecture for personal wellness.

    Science.gov (United States)

    Ruotsalainen, Pekka; Nykänen, Pirkko; Seppälä, Antto; Blobel, Bernd

    2014-01-01

    Modern eHealth, ubiquitous health and personal wellness systems take place in an unsecure and ubiquitous information space where no predefined trust occurs. This paper presents novel information model and an architecture for trust based privacy management of personal health and wellness information in ubiquitous environment. The architecture enables a person to calculate a dynamic and context-aware trust value for each service provider, and using it to design personal privacy policies for trustworthy use of health and wellness services. For trust calculation a novel set of measurable context-aware and health information-sensitive attributes is developed. The architecture enables a person to manage his or her privacy in ubiquitous environment by formulating context-aware and service provider specific policies. Focus groups and information modelling was used for developing a wellness information model. System analysis method based on sequential steps that enable to combine results of analysis of privacy and trust concerns and the selection of trust and privacy services was used for development of the information system architecture. Its services (e.g. trust calculation, decision support, policy management and policy binding services) and developed attributes enable a person to define situation-aware policies that regulate the way his or her wellness and health information is processed.

  15. Maintaining control while delegating trust: Integrity constraints in trust management

    NARCIS (Netherlands)

    Etalle, S.; Winsborough, W.H.

    2009-01-01

    We introduce the use, monitoring, and enforcement of integrity constraints in trust management-style authorization systems. We consider what portions of the policy state must be monitored to detect violations of integrity constraints. Then, we address the fact that not all participants in a

  16. Trust Management in P2P systems using Standard TuLiP

    NARCIS (Netherlands)

    Czenko, M.R.; Doumen, J.M.; Etalle, Sandro

    2008-01-01

    In this paper we introduce Standard TuLiP - a new logic based Trust Management system. In Standard TuLiP, security decisions are based on security credentials, which can be issued by different entities and stored at different locations. Standard TuLiP directly supports the distributed credential

  17. Trust management in P2P systems using standard TuLiP

    NARCIS (Netherlands)

    Czenko, M.; Doumen, J.M.; Etalle, S.; Karabulut, Y.; Mitchell, J.C.; Herrmann, P.; Jensen, C.D.

    2008-01-01

    In this paper we introduce Standard TuLiP - a new logic based Trust Management system. In Standard TuLiP, security decisions are based on security credentials, which can be issued by different entities and stored at different locations. Standard TuLiP directly supports the distributed credential

  18. Trust Management in P2P Systems Using Standard TuLiP

    NARCIS (Netherlands)

    Czenko, M.R.; Doumen, J.M.; Etalle, Sandro

    2008-01-01

    In this paper we introduce Standard TuLiP - a new logic based Trust Management system. In Standard TuLiP, security decisions are based on security credentials, which can be issued by different entities and stored at different locations. Standard TuLiP directly supports the distributed credential

  19. Beyond the Hype: On Using Blockchains in Trust Management for Authentication

    OpenAIRE

    Alexopoulos, Nikolaos; Daubert, Jörg; Mühlhäuser, Max; Habib, Sheikh Mahbub

    2017-01-01

    Trust Management (TM) systems for authentication are vital to the security of online interactions, which are ubiquitous in our everyday lives. Various systems, like the Web PKI (X.509) and PGP's Web of Trust are used to manage trust in this setting. In recent years, blockchain technology has been introduced as a panacea to our security problems, including that of authentication, without sufficient reasoning, as to its merits.In this work, we investigate the merits of using open distributed le...

  20. Requirements engineering for trust management: Model, methodology, and reasoning

    NARCIS (Netherlands)

    Giorgini, P.; Massacci, F.; Mylopoulos, J.; Zannone, N.

    2006-01-01

    A number of recent proposals aim to incorporate security engineering into mainstream software engineering. Yet, capturing trust and security requirements at an organizational level, as opposed to an IT system level, and mapping these into security and trust management policies is still an open

  1. Distributed Trust Management for Validating SLA Choreographies

    Science.gov (United States)

    Haq, Irfan Ul; Alnemr, Rehab; Paschke, Adrian; Schikuta, Erich; Boley, Harold; Meinel, Christoph

    For business workflow automation in a service-enriched environment such as a grid or a cloud, services scattered across heterogeneous Virtual Organizations (VOs) can be aggregated in a producer-consumer manner, building hierarchical structures of added value. In order to preserve the supply chain, the Service Level Agreements (SLAs) corresponding to the underlying choreography of services should also be incrementally aggregated. This cross-VO hierarchical SLA aggregation requires validation, for which a distributed trust system becomes a prerequisite. Elaborating our previous work on rule-based SLA validation, we propose a hybrid distributed trust model. This new model is based on Public Key Infrastructure (PKI) and reputation-based trust systems. It helps preventing SLA violations by identifying violation-prone services at service selection stage and actively contributes in breach management at the time of penalty enforcement.

  2. The quality of interaction between managers and clinicians: a question of trust

    NARCIS (Netherlands)

    Brown, P.; Alaszewski, A.; Pilgrim, D.; Calnan, M.

    2011-01-01

    A lack of trust between clinicians and junior/middle managers is well documented in health care systems but under-theorized. Face-to-face interactions between clinicians and managers, through which trust is constructed, are vitally shaped by assumptions drawn from local organizational

  3. XML Based Adaptive IPSEC Policy Management in a Trust Management Context

    National Research Council Canada - National Science Library

    Mohan, R

    2002-01-01

    ... the level of security service "on-the-fly" to respond to changing network and operational conditions, The IPsec implementation in OpenESD works in conjunction with the Trust Management System, KeyNote...

  4. Recovering from trust breakdowns in large system implementations

    DEFF Research Database (Denmark)

    Rerup Schlichter, Bjarne Rerup; Andersen, Povl Erik Rostgård

    2011-01-01

    On the basis of experiences from the Faroese large-scale implementation of integrated healthcare information systems and insights into dynamic aspects of trust, we offer the following lessons learned for the successful management and recovery of trust (breakdowns) in large system implementations......: restore relations by turning towards face-to-face events and procedures, assure a well-functioning and available support organization, demonstrate trust in actors to enhance their own self-confidence and celebrate successes, even the smallest or ones injected by yourself. The propositions are based on a 6...

  5. Dynamic Trust Management for Mobile Networks and Its Applications

    Science.gov (United States)

    Bao, Fenye

    2013-01-01

    Trust management in mobile networks is challenging due to dynamically changing network environments and the lack of a centralized trusted authority. In this dissertation research, we "design" and "validate" a class of dynamic trust management protocols for mobile networks, and demonstrate the utility of dynamic trust management…

  6. Managing Trust in Online Social Networks

    Science.gov (United States)

    Bhuiyan, Touhid; Josang, Audun; Xu, Yue

    In recent years, there is a dramatic growth in number and popularity of online social networks. There are many networks available with more than 100 million registered users such as Facebook, MySpace, QZone, Windows Live Spaces etc. People may connect, discover and share by using these online social networks. The exponential growth of online communities in the area of social networks attracts the attention of the researchers about the importance of managing trust in online environment. Users of the online social networks may share their experiences and opinions within the networks about an item which may be a product or service. The user faces the problem of evaluating trust in a service or service provider before making a choice. Recommendations may be received through a chain of friends network, so the problem for the user is to be able to evaluate various types of trust opinions and recommendations. This opinion or recommendation has a great influence to choose to use or enjoy the item by the other user of the community. Collaborative filtering system is the most popular method in recommender system. The task in collaborative filtering is to predict the utility of items to a particular user based on a database of user rates from a sample or population of other users. Because of the different taste of different people, they rate differently according to their subjective taste. If two people rate a set of items similarly, they share similar tastes. In the recommender system, this information is used to recommend items that one participant likes, to other persons in the same cluster. But the collaborative filtering system performs poor when there is insufficient previous common rating available between users; commonly known as cost start problem. To overcome the cold start problem and with the dramatic growth of online social networks, trust based approach to recommendation has emerged. This approach assumes a trust network among users and makes recommendations

  7. Trust Management - Building Trust for International Cross Disciplinary Collaboration on Climate Change

    Science.gov (United States)

    Oakley, K. V.; Gurney, R. J.

    2014-12-01

    Successful communication and collaboration entails mutual understanding, and transfer, of information. The risk of misunderstanding and/or miscommunication between collaborating groups is tackled in different ways around the globe; some are well documented whereas others may be unknown outside particular groups, whether defined geographically or by specialism. For example; in some countries legally binding contracts define the terms of collaboration. Some regions place greater emphasis on developing trust relationships, and sometimes an official agreement is implied, such as many electronic data transfers on the web. International collaboration on climate change increasingly involves electronic data exchange (e.g. open access publications, shared documents, data repositories etc.) and with this increased reliance on electronic data a need has arisen for scientists to collaborate both internationally and cross-disciplinarily particularly with information technology and data management specialists. Trust of data and metadata on the internet (e.g. privacy, legitimacy etc.) varies, possibly due to a lack of internationally agreed standards for data governance and management, leaving many national, regional and institutional practices tailored to the needs of that group only. It is proposed that building trust relationships between cross-disciplinary and international groups could help facilitate further communication, understanding and benefits from the relationship, while still maintaining independence as separate groups. Complex international cross-disciplinary group relationship dynamics are not easily mapped and producing a set of trust building rules that can be applied to any current and future collaboration with equal validity may be unfeasible. An alternative to such a set of rules may be found in a Trust Manager, whose role is to improve mutually beneficial knowledge exchange between groups, build trust and increase future collaborative potential. This

  8. Trust is a must: What is involved in trusting those who manage forest fires?

    Science.gov (United States)

    Adam Liljeblad; Bill Borrie; Alan Watson

    2010-01-01

    Trust is a complicated emotion. In the past, many social scientists have studied trust. They discovered that trust involves a number of beliefs and emotions. The scientists in this study were interested in learning more about trust. They believed that forest managers can do a better job if people trust them to do what is best for citizens and the environment (figure 1...

  9. Cryptographic Trust Management Requirements Specification: Version 1.1

    Energy Technology Data Exchange (ETDEWEB)

    Edgar, Thomas W.

    2009-09-30

    The Cryptographic Trust Management (CTM) Project is being developed for Department of Energy, OE-10 by the Pacific Northwest National Laboratory (PNNL). It is a component project of the NSTB Control Systems Security R&D Program.

  10. A Distributed Energy-Aware Trust Management System for Secure Routing in Wireless Sensor Networks

    Science.gov (United States)

    Stelios, Yannis; Papayanoulas, Nikos; Trakadas, Panagiotis; Maniatis, Sotiris; Leligou, Helen C.; Zahariadis, Theodore

    Wireless sensor networks are inherently vulnerable to security attacks, due to their wireless operation. The situation is further aggravated because they operate in an infrastructure-less environment, which mandates the cooperation among nodes for all networking tasks, including routing, i.e. all nodes act as “routers”, forwarding the packets generated by their neighbours in their way to the sink node. This implies that malicious nodes (denying their cooperation) can significantly affect the network operation. Trust management schemes provide a powerful tool for the detection of unexpected node behaviours (either faulty or malicious). Once misbehaving nodes are detected, their neighbours can use this information to avoid cooperating with them either for data forwarding, data aggregation or any other cooperative function. We propose a secure routing solution based on a novel distributed trust management system, which allows for fast detection of a wide set of attacks and also incorporates energy awareness.

  11. An Analysis of Behavioral Intention to use Thai Internet Banking with Quality Management and Trust

    OpenAIRE

    Namahoot KS; Laohavichien T

    2015-01-01

    This research explores the effects of quality management and trust towards behavioural intention of Thai consumers to use internet banking. It specifically investigates whether the quality management dimensions of information quality, system quality and service quality affect the level of trust of Thai consumers towards internet banking, and whether this trust correspondingly affect their intention to use the system. This study has been conducted in Thailand and focused on the users of intern...

  12. Hierarchical Trust Management of COI in Heterogeneous Mobile Networks

    Science.gov (United States)

    2017-08-01

    Report: Hierarchical Trust Management of COI in Heterogeneous Mobile Networks The views, opinions and/or findings contained in this report are those of...Institute & State University Title: Hierarchical Trust Management of COI in Heterogeneous Mobile Networks Report Term: 0-Other Email: irchen@vt.edu...Reconfigurability, Survivability and Intrusion Tolerance for Community of Interest (COI) Applications – Our proposed COI trust management protocol will

  13. Public Trust in Health Information Sharing: A Measure of System Trust.

    Science.gov (United States)

    Platt, Jodyn E; Jacobson, Peter D; Kardia, Sharon L R

    2018-04-01

    To measure public trust in a health information sharing in a broadly defined health system (system trust), inclusive of health care, public health, and research; to identify individual characteristics that predict system trust; and to consider these findings in the context of national health initiatives (e.g., learning health systems and precision medicine) that will expand the scope of data sharing. Survey data (n = 1,011) were collected in February 2014. We constructed a composite index of four dimensions of system trust-competency, fidelity, integrity, and trustworthiness. The index was used in linear regression evaluating demographic and psychosocial predictors of system trust. Data were collected by GfK Custom using a nationally representative sample and analyzed in Stata 13.0. Our findings suggest the public's trust may not meet the needs of health systems as they enter an era of expanded data sharing. We found that a majority of the U.S. public does not trust the organizations that have health information and share it (i.e., the health system) in one or more dimensions. Together, demographic and psychosocial factors accounted for ~18 percent of the observed variability in system trust. Future research should consider additional predictors of system trust such as knowledge, attitudes, and beliefs to inform policies and practices for health data sharing. © Health Research and Educational Trust.

  14. Trust Management in P2P systems using Standard TuLiP

    OpenAIRE

    Czenko, M.R.; Doumen, J.M.; Etalle, Sandro

    2008-01-01

    In this paper we introduce Standard TuLiP - a new logic based Trust Management system. In Standard TuLiP, security decisions are based on security credentials, which can be issued by different entities and stored at different locations. Standard TuLiP directly supports the distributed credential storage by providing a sound and complete Lookup and Inference AlgoRithm (LIAR). In this paper we focus on (a) the language of Standard TuLiP and (b) on the practical considerations which arise when d...

  15. Banking system trust, bank trust, and bank loyalty

    NARCIS (Netherlands)

    van Esterik-Plasmeijer, P.; van Raaij, W.F.

    2017-01-01

    Purpose The purpose of this paper is to test a model of banking system trust as an antecedent of bank trust and bank loyalty. Six determinants of trust and loyalty are included: competence, stability, integrity, customer orientation, transparency, and value congruence. The study provides insights

  16. Trust and trust relations from the providers' perspective: the case of the healthcare system in India.

    Science.gov (United States)

    Kane, Sumit; Calnan, Michael; Radkar, Anjali

    2015-01-01

    Commentators suggest that there is an erosion of trust in the relations between different actors in the health system in India. This paper presents the results of an exploratory study of the situation of providers in an urban setting in western India, the nature of their relations in terms of trust and what influences these relations. The data on relationships of trust were collected through interviews and focus group discussions with key informants, including public and private providers, regulators, managers and societal actors, such as patients/citizens, politicians and the media.

  17. Nonmonotonic Trust Management for P2P Applications

    NARCIS (Netherlands)

    Czenko, M.R.; Tran, H.M.; Doumen, J.M.; Etalle, Sandro; Hartel, Pieter H.; den Hartog, Jeremy

    Community decisions about access control in virtual communities are non-monotonic in nature. This means that they cannot be expressed in current, monotonic trust management languages such as the family of Role Based Trust Management languages (RT). To solve this problem we propose RTo, which adds a

  18. Trust, but verify: social media models for disaster management.

    Science.gov (United States)

    Mehta, Amisha M; Bruns, Axel; Newton, Judith

    2017-07-01

    A lack of trust in the information exchanged via social media may significantly hinder decisionmaking by community members and emergency services during disasters. The need for timely information at such times, though, challenges traditional ways of establishing trust. This paper, building on a multi-year research project that combined social media data analysis and participant observation within an emergency management organisation and in-depth engagement with stakeholders across the sector, pinpoints and examines assumptions governing trust and trusting relationships in social media disaster management. It assesses three models for using social media in disaster management-information gathering, quasi-journalistic verification, and crowdsourcing-in relation to the guardianship of trust to highlight the verification process for content and source and to identify the role of power and responsibilities. The conclusions contain important implications for emergency management organisations seeking to enhance their mechanisms for incorporating user-generated information from social media sources in their disaster response efforts. © 2017 The Author(s). Disasters © Overseas Development Institute, 2017.

  19. Trust and responsible eco managing. The case of state controlled repacking

    DEFF Research Database (Denmark)

    Rittenhofer, Iris

    systems. It takes a postmodern stance and discusses the case from the perspective of trust, responsible management, cosmopolitanization, the ‘transparent society’ and ‘green growth’ strategies. In the concluding section, the implications for the further development of a concept ‘responsible management......The paper is concerned with a case of local management of eco certification. With outset in a case study, the paper explores the relation of eco certification to economy, society and culture. The paper emphasizes the multidimensional quality of local eco management of global organic agrifood......’ are discussed and suggestions for future research are made. The paper draws on multidisciplinary research from management and business studies, intercultural and cross-cultural communication, trust research, cultural studies, philosophy and discourse studies....

  20. Trust and controlling

    Directory of Open Access Journals (Sweden)

    Bieńkowska Agnieszka

    2016-12-01

    Full Text Available The purpose of this study is to discuss the trust within and towards an organisation in the context of implementation of controlling therein. In this context the essence of trust and its importance in organisation management was presented, as well as trust in the contemporary management methods and concepts. Controlling as a trust-building factor inside an organisation was pointed out. Especially controlling and control were described. Moreover management by considering deviations in controlling and the teamwork in controlling were described. The role of controlling in process of trust-building to an organisation was presented. Establishing relations with the environment and systems of measurement of organisation’s achievements were presented, too.

  1. Mobile Location-Based Services for Trusted Information in Disaster Management

    Science.gov (United States)

    Ragia, Lemonia; Deriaz, Michel; Seigneur, Jean-Marc

    The goal of the present chapter is to provide location-based services for disaster management. The application involves services related to the safety of the people due to an unexpected event. The current prototype is implemented for a specific issue of disaster management which is road traffic control. The users can ask requests on cell phones or via Internet to the system and get an answer in a display or in textual form. The data are in a central database and every user can input data via virtual tags. The system is based on spatial messages which can be sent from any user to any other in a certain distance. In this way all the users and not a separate source provide the necessary information for a dangerous situation. To avoid any contamination problems we use trust security to check the input to the system and a trust engine model to provide information with a considerable reliability.

  2. Relationship between islamic human resources management (IHRM practices and trust: An empirical study

    Directory of Open Access Journals (Sweden)

    Nik Mutasim Nik Ab. Rahman

    2013-09-01

    Full Text Available Purpose: The purpose of this study is to explore and examines the theoretical frameworks of Islamic human resource management practices and trust in organization. Additionally, to investigate the extent to which Islamic HRM practices inspire and revival employees trust in organization.Design/methodology/approach: This study comprised sample of 236 Islamic Bank employees in Bangladesh. A cross-sectional research design was used to examine the relationship between Islamic Human Resource Management practices and trust. Data were gathered based on personal administered questionnaire.Findings and Originality/value: This study results show that knowledge, understanding and practices of Islamic principles, recruitment and selection, training and development, and reward system significantly related to the trust. But performance appraisal are found have insignificant relationship.Research limitations/implications: The data for this study are collected by self-administered questionnaire, a method with well-known shortcomings. Second, this study concentrated on the Islamic bank employees in Bangladesh.Practical implications: An important implication of this research is that the interesting findings give some insight to the management of Islamic bank to focus on improving Islamic Human Resource Management practices, in their all kind of management, as that could improve their trust in the bank.Originality/value: The findings are original and unique and are based on the literature from different researches. The results are based on a sample of Islamic Bank employees in Bangladesh. The research findings are useful to academics and management of Islamic bank all over the world.

  3. System reliability, performance and trust in adaptable automation.

    Science.gov (United States)

    Chavaillaz, Alain; Wastell, David; Sauer, Jürgen

    2016-01-01

    The present study examined the effects of reduced system reliability on operator performance and automation management in an adaptable automation environment. 39 operators were randomly assigned to one of three experimental groups: low (60%), medium (80%), and high (100%) reliability of automation support. The support system provided five incremental levels of automation which operators could freely select according to their needs. After 3 h of training on a simulated process control task (AutoCAMS) in which the automation worked infallibly, operator performance and automation management were measured during a 2.5-h testing session. Trust and workload were also assessed through questionnaires. Results showed that although reduced system reliability resulted in lower levels of trust towards automation, there were no corresponding differences in the operators' reliance on automation. While operators showed overall a noteworthy ability to cope with automation failure, there were, however, decrements in diagnostic speed and prospective memory with lower reliability. Copyright © 2015. Published by Elsevier Ltd.

  4. Trust Management Considerations For the Cooperative Infrastructure Defense Framework: Trust Relationships, Evidence, and Decisions

    Energy Technology Data Exchange (ETDEWEB)

    Maiden, Wendy M.

    2009-12-01

    Cooperative Infrastructure Defense (CID) is a hierarchical, agent-based, adaptive, cyber-security framework designed to collaboratively protect multiple enclaves or organizations participating in a complex infrastructure. CID employs a swarm of lightweight, mobile agents called Sensors designed to roam hosts throughout a security enclave to find indications of anomalies and report them to host-based Sentinels. The Sensors’ findings become pieces of a larger puzzle, which the Sentinel puts together to determine the problem and respond per policy as given by the enclave-level Sergeant agent. Horizontally across multiple enclaves and vertically within each enclave, authentication and access control technologies are necessary but insufficient authorization mechanisms to ensure that CID agents continue to fulfill their roles in a trustworthy manner. Trust management fills the gap, providing mechanisms to detect malicious agents and offering more robust mechanisms for authorization. This paper identifies the trust relationships throughout the CID hierarchy, the types of trust evidence that could be gathered, and the actions that the CID system could take if an entity is determined to be untrustworthy.

  5. Trust dynamics in a large system implementation

    DEFF Research Database (Denmark)

    Schlichter, Bjarne Rerup; Rose, Jeremy

    2013-01-01

    outcomes, but largely ignored the dynamics of trust relations. Giddens, as part of his study of modernity, theorises trust dynamics in relation to abstract social systems, though without focusing on information systems. We use Giddens’ concepts to investigate evolving trust relationships in a longitudinal......A large information systems implementation (such as Enterprise Resource Planning systems) relies on the trust of its stakeholders to succeed. Such projects impact diverse groups of stakeholders, each with their legitimate interests and expectations. Levels of stakeholder trust can be expected...... case analysis of a large Integrated Hospital System implementation for the Faroe Islands. Trust relationships suffered a serious breakdown, but the project was able to recover and meet its goals. We develop six theoretical propositions theorising the relationship between trust and project outcomes...

  6. Academic Panel: Can Self-Managed Systems be trusted?

    NARCIS (Netherlands)

    de Lemos, Rogerio; McCann, Julie A.; Rana, Omar F.; Wombacher, Andreas

    Trust can be defined as to have confidence or faith in; a form of reliance or certainty based on past experience; to allow without fear; believe; hope: expect and wish; and extend credit to. The issue of trust in computing has always been a hot topic, especially notable with the proliferation of

  7. Trust and automation: the influence of automation malfunctions and system feedback on operator trust

    International Nuclear Information System (INIS)

    Strand, Stine

    2001-10-01

    Level of operator trust in an automatic system, which is not in accordance with the reliability of the system, might impose serious threats concerning issues of safety, productivity and the well being of the operator. Operator trust is therefore regarded as an important variable in man-machine interaction. The focus of this study was the influence of automatic malfunctions and amount of feedback provided by the automatic system on level of operator trust. The study was conducted in conjunction with the Human Centred Automation 2000-experiment. Two questionnaires attempting to measure operator trust were developed, designed to reflect the dimensions of predictability, dependability and faith. Analysis of the questionnaires demonstrated that they were reliable tools for measurement of operator trust. Factor analysis did not completely confirm the theoretical dimensions of trust, but indicated partial support. Operator trust correlated negatively with workload across situations, and positively with performance in complex situations. The results of the hypotheses tests demonstrated that operator trust gradually decreased after introduction of malfunctions. The effect of different malfunctions was however the opposite of what was expected, with obvious malfunctions reducing trust more than more camouflaged and safety critical malfunctions. Trust in the automatic system in general was lower than trust in specific malfunctioning components. Different interfaces providing different amount of feedback to the operator did not significantly influence level of operator trust. (Author)

  8. Integrated Social and Quality of Service Trust Management of Mobile Groups in Ad Hoc Networks

    Science.gov (United States)

    2013-01-01

    high resiliency to malicious attacks and misbehaving nodes. Keywords—trust management; mobile ad hoc networks; QoS trust; social trust; trust...paper we address an importance issue of trust management protocol design for MANETs: trust bias minimization despite misbehaving nodes performing

  9. Agent Based Trust Management Model Based on Weight Value Model for Online Auctions

    OpenAIRE

    Sathiyamoorthy, E.; Iyenger, N. Ch. Sriman Narayana; Ramachandran, V.

    2010-01-01

    This paper is aimed at the stipulations which arise in the traditional online auctions as a result of various anomalies in the reputation and trust calculation mechanism. We try to improve the scalability andefficiency of the online auctions by providing efficient trust management methodology considering several factors into consideration. A comparison between the performance of the auctions system with and without the agent methodology is done with good results.

  10. Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker

    Directory of Open Access Journals (Sweden)

    Ahmad Samer Wazan

    2017-01-01

    Full Text Available A Public Key Infrastructure (PKI is considered one of the most important techniques used to propagate trust in authentication over the Internet. This technology is based on a trust model defined by the original X.509 (1988 standard and is composed of three entities: the certification authority (CA, the certificate holder (or subject, and the Relying Party (RP. The CA plays the role of a trusted third party between the certificate holder and the RP. In many use cases, this trust model has worked successfully. However, we argue that the application of this model on the Internet implies that web users need to depend on almost anyone in the world in order to use PKI technology. Thus, we believe that the current TLS system is not fit for purpose and must be revisited as a whole. In response, the latest draft edition of X.509 has proposed a new trust model by adding new entity called the Trust Broker (TB. In this paper, we present an implementation approach that a Trust Broker could follow in order to give RPs trust information about a CA by assessing the quality of its issued certificates. This is related to the quality of the CA’s policies and procedures and its commitment to them. Finally, we present our Trust Broker implementation that demonstrates how RPs can make informed decisions about certificate holders in the context of the global web, without requiring large processing resources themselves.

  11. Trust and the transformation of energy systems

    Energy Technology Data Exchange (ETDEWEB)

    Rayner, Steve [James Martin Institute for Science and Civilization, Said Business School, Park End Street, Oxford, OX1 1HP (United Kingdom)

    2010-06-15

    The author looks at diverse concepts and roles of trust in the challenge of decarbonising energy systems, drawing on 25 years of personal experience in the fields of energy and environmental policy research. The paper focuses on three issues-public trust in science, institutional trust in making technology choices, and the idea that high-trust societies are more sustainable than those exhibiting low-trust. While trust is a key concept in understanding the public acceptability of technology choices, it is only one of a suite of interrelated concepts that must be addressed, which also includes liability, consent, and fairness. Furthermore, rational distrust among competing institutional world views may be critical in understanding the role of social capital in socioeconomic and technological development. Thus the concept of trust has become a portmanteau, carrying a diverse range of ideas and conditions for sustainable energy systems. The paper concludes with three emphases for decision makers. First, the issue is the energy system, not particular generating technologies. Second, the energy system must be recognized to be as much a social system as it is a technical one. Third, the system requires incorporation of the minimum level of diversity of engineering technologies and social actors to be sustainable. (author)

  12. Trust and the transformation of energy systems

    International Nuclear Information System (INIS)

    Rayner, Steve

    2010-01-01

    The author looks at diverse concepts and roles of trust in the challenge of decarbonising energy systems, drawing on 25 years of personal experience in the fields of energy and environmental policy research. The paper focuses on three issues-public trust in science, institutional trust in making technology choices, and the idea that high-trust societies are more sustainable than those exhibiting low-trust. While trust is a key concept in understanding the public acceptability of technology choices, it is only one of a suite of interrelated concepts that must be addressed, which also includes liability, consent, and fairness. Furthermore, rational distrust among competing institutional world views may be critical in understanding the role of social capital in socioeconomic and technological development. Thus the concept of trust has become a portmanteau, carrying a diverse range of ideas and conditions for sustainable energy systems. The paper concludes with three emphases for decision makers. First, the issue is the energy system, not particular generating technologies. Second, the energy system must be recognized to be as much a social system as it is a technical one. Third, the system requires incorporation of the minimum level of diversity of engineering technologies and social actors to be sustainable.

  13. The Double-System Architecture for Trusted OS

    Science.gov (United States)

    Zhao, Yong; Li, Yu; Zhan, Jing

    With the development of computer science and technology, current secure operating systems failed to respond to many new security challenges. Trusted operating system (TOS) is proposed to try to solve these problems. However, there are no mature, unified architectures for the TOS yet, since most of them cannot make clear of the relationship between security mechanism and the trusted mechanism. Therefore, this paper proposes a double-system architecture (DSA) for the TOS to solve the problem. The DSA is composed of the Trusted System (TS) and the Security System (SS). We constructed the TS by establishing a trusted environment and realized related SS. Furthermore, we proposed the Trusted Information Channel (TIC) to protect the information flow between TS and SS. In a word, the double system architecture we proposed can provide reliable protection for the OS through the SS with the supports provided by the TS.

  14. Facing the Incompleteness of Epistemic Trust: Managing Dependence in Scientific Practice

    DEFF Research Database (Denmark)

    Wagenknecht, Susann

    2014-01-01

    Based on an empirical study of a research team in natural science, the author argues that collaborating scientists do not trust each other completely. Due to the inherent incompleteness of trust, epistemic trust among scientists is not sufficient to manage epistemic dependency in research teams....... To mitigate the limitations of epistemic trust, scientists resort to specific strategies of indirect assessment such as dialoguing practices and the probing of explanatory responsiveness. Furthermore, they rely upon impersonal trust and deploy practices of hierarchical authorship....

  15. 78 FR 48205 - Ranger Alternative Management, L.P. and Ranger Funds Investment Trust; Notice of Application

    Science.gov (United States)

    2013-08-07

    ... Alternative Management, L.P. and Ranger Funds Investment Trust; Notice of Application August 1, 2013. AGENCY... Management, L.P. (``Ranger'') and Ranger Funds Investment Trust (the ``Trust''). Summary of Application... (e) certain registered management investment companies and unit investment trusts outside of the same...

  16. 77 FR 67029 - Arden Investment Series Trust and Arden Asset Management LLC; Notice of Application

    Science.gov (United States)

    2012-11-08

    ... Investment Series Trust and Arden Asset Management LLC; Notice of Application November 2, 2012. AGENCY... disclosure requirements. Applicants: Arden Investment Series Trust (the ``Trust'') and Arden Asset Management... Company Regulation, Division of Investment Management). SUPPLEMENTARY INFORMATION: The following is a...

  17. Exploring the Change from Low-Trust to High-Trust Organizations

    DEFF Research Database (Denmark)

    Jagd, Søren

    what the notion of high-trust organization actually means, and that the change process in the direction of high trust organizations involves not only a quantitative growth in trust, but may involve important qualitative changes in the organization, especially concerning the relations between management......A growing body of literature point to the increasing importance of trust for organizations and for the explicit use of trust as a management tool. The explicit or implicit message in both management literature and research literature on trust as a management tool is that managers should pursue...... projects of personal and organizational change leading to high-trust organizations. In this paper I explore how we may understand this change towards high-trust organizations: What does it mean, what is the content of such a change, and what may be the consequences. I show that it is still rather unclear...

  18. 78 FR 54298 - Horizons ETFs Management (USA) LLC and Horizons ETF Trust; Notice of Application

    Science.gov (United States)

    2013-09-03

    ... ETFs Management (USA) LLC and Horizons ETF Trust; Notice of Application August 27, 2013. AGENCY... Management (USA) LLC (``Horizons'') and Horizons ETF Trust (the ``Trust''). Summary of Application... of the Trust will be the Horizons Active Global Dividend ETF (the ``Initial Fund''), which will seek...

  19. 78 FR 19542 - Neuberger Berman ETF Trust and Neuberger Berman Management LLC; Notice of Application

    Science.gov (United States)

    2013-04-01

    ...] Neuberger Berman ETF Trust and Neuberger Berman Management LLC; Notice of Application March 25, 2013. AGENCY... ETF Trust (the ``Trust'') and Neuberger Berman Management LLC (``NBM'' or [[Page 19543

  20. CROWN: A service grid middleware with trust management mechanism

    Institute of Scientific and Technical Information of China (English)

    HUAI Jinpeng; HU Chunming; LI Jianxin; SUN Hailong; WO Tianyu

    2006-01-01

    Based on a proposed Web service-based grid architecture, a service grid middleware system called CROWN is designed in this paper. As the two kernel points of the middleware, the overlay-based distributed grid resource management mechanism is proposed, and the policy-based distributed access control mechanism with the capability of automatic negotiation of the access control policy and trust management and negotiation is also discussed in this paper. Experience of CROWN testbed deployment and application development shows that the middleware can support the typical scenarios such as computing-intensive applications, data-intensive applications and mass information processing applications.

  1. Trust matters: A narrative literature review of the role of trust in health care systems in sub-Saharan Africa.

    Science.gov (United States)

    Østergaard, Lise Rosendal

    2015-10-01

    This article makes a contribution to the debate about health service utilisation and the role of trust in fostering demand for health services in sub-Saharan Africa. It is framed as a narrative literature review based on a thematic analysis of nine empirical, qualitative studies. For the purposes of this article trust is defined as a voluntary course of action, which involves the optimistic expectation that the trustee will do no harm to the trustor and is increasingly perceived as an important influence on health system functioning. The article looks at trust issues in interpersonal, intergroup and institutional situations. The findings of the review point to four elements that are important for trust to develop in health sector relationships: the sensitive use of discretionary power by health workers, perceived empathy by patients of the health workers, the quality of medical care and workplace collegiality. When trust works in health sector encounters, it reduces the social complexity and inherent uneven distribution of power between clients and providers. The article concludes that understanding and supporting trust processes between patients and providers, as well as between co-workers and managers, will improve health sector collaboration and stimulate demand for health care services.

  2. Research of Trust Chain of Operating System

    Science.gov (United States)

    Li, Hongjiao; Tian, Xiuxia

    Trust chain is one of the key technologies in designing secure operating system based on TC technology. Constructions of trust chain and trust models are analyzed. Future works in these directions are discussed.

  3. Effect of Board Management and Governmental Model on Zakat Payers’ Trust on Zakat Institutions

    OpenAIRE

    Erlane K Ghani; Asmah Abdul Aziz; Sakinah Mohamed Tajularifin; Nahla Samargandi

    2018-01-01

    Trust among zakat payers is important as it contributes to the success of zakat institutions. Zakat payers, are reluctant to pay zakat through zakat institutions due to lack of trust. This study examines whether perceived board management and governmental model may influence zakat payers’ trust on zakat institutions. Using questionnaire survey on 184 zakat payers, this study shows that perceived board management influences zakat payers’ trust on zakat institution...

  4. TRUST MODEL FOR INFORMATION SECURITY OF MULTI-AGENT ROBOTIC SYSTEMS WITH A DECENTRALIZED MANAGEMENT

    Directory of Open Access Journals (Sweden)

    I. A. Zikratov

    2014-03-01

    Full Text Available The paper deals with the issues on protection of multi-agent robotic systems against attacks by robots-saboteurs. The operation analysis of such systems with decentralized control is carried out. Concept of harmful information impact (attack from a robot-saboteur to the multi-agent robotic system is given. The class of attacks is considered using interception of messages, formation and transfer of misinformation to group of robots, and also carrying out other actions with vulnerabilities of multiagent algorithms without obviously identified signs of invasion of robots-saboteurs. The model of information security is developed, in which robots-agents work out trust levels to each other analyzing the events occurring in the system. The idea of trust model consists in the analysis of transferred information by each robot and the executed actions of other members in a group, comparison of chosen decision on iteration step k with objective function of the group. Distinctive feature of the trust model in comparison with the closest analogue - Buddy Security Model in which the exchange between the agents security tokens is done — is involvement of the time factor during which agents have to "prove" by their actions the usefulness in achievement of a common goal to members of the group. Variants of this model realization and ways of an assessment of trust levels for agents in view of the security policy accepted in the group are proposed.

  5. Facilitating a just and trusting culture.

    Science.gov (United States)

    Pattison, Jill; Kline, Theresa

    2015-01-01

    The purpose of this paper is to identify managerial and organizational characteristics and behaviors that facilitate the fostering of a just and trusting culture within the healthcare system. Two studies were conducted. The initial qualitative one was used to identify themes based on interviews with health care workers that facilitate a just and trusting culture. The quantitative one used a policy-capturing design to determine which factors were most likely to predict outcomes of manager and organizational trust. The factors of violation type (ability vs integrity), providing an explanation or not, blame vs no blame by manager, and blame vs no blame by organization were all significant predictors of perceptions of trust. Limitations to the generalizability of findings included both a small and non-representative sample from one health care region. The present findings can be useful in developing training systems for managers and organizational executive teams for managing medical error events in a manner that will help develop a just and trusting culture. A just and trusting culture should enhance the likelihood of reporting medical errors. Improved reporting, in turn, should enhance patient safety. This is the first field study experimentally manipulating aspects of organizational trust within the health care sector. The use of policy-capturing is a unique feature that sheds light into the decision-making of health care workers as to the efficaciousness of particular managerial and organizational characteristics that impact a just and trusting culture.

  6. A Cache Considering Role-Based Access Control and Trust in Privilege Management Infrastructure

    Institute of Scientific and Technical Information of China (English)

    ZHANG Shaomin; WANG Baoyi; ZHOU Lihua

    2006-01-01

    PMI(privilege management infrastructure) is used to perform access control to resource in an E-commerce or E-government system. With the ever-increasing need for secure transaction, the need for systems that offer a wide variety of QoS (quality-of-service) features is also growing. In order to improve the QoS of PMI system, a cache based on RBAC(Role-based Access Control) and trust is proposed. Our system is realized based on Web service. How to design the cache based on RBAC and trust in the access control model is described in detail. The algorithm to query role permission in cache and to add records in cache is dealt with. The policy to update cache is introduced also.

  7. System-wide versus component-specific trust using multiple aids.

    Science.gov (United States)

    Keller, David; Rice, Stephen

    2010-01-01

    Previous research in operator trust toward automated aids has focused primarily on single aids. The current study focuses on how operator trust is affected by the presence of multiple aids. Two competing theories of multiple-trust are presented. A component-specific trust theory predicts that operators will differentially place their trust in automated aids that vary in reliability. A system-wide trust theory predicts that operators will treat multiple imperfect aids as one "system" and merge their trust across aids despite differences in the aids' reliability. A simulated flight task was used to test these theories, whereby operators performed a pursuit tracking task while concurrently monitoring multiple system gauges that were augmented with perfect or imperfect automated aids. The data revealed that a system-wide trust theory best predicted the data; operators merged their trust across both aids, behaving toward a perfectly reliable aid in the same manner as they did towards unreliable aids.

  8. 77 FR 65025 - Trust for Professional Managers and Collins Capital Investments, LLC; Notice of Application

    Science.gov (United States)

    2012-10-24

    ... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 30235; 812-14012] Trust for Professional Managers and Collins Capital Investments, LLC; Notice of Application October 18, 2012. AGENCY...: Trust for Professional Managers (the ``Trust'') and Collins Capital Investments, LLC (the ``Advisor...

  9. Developing a trust model for assisting management during change

    Directory of Open Access Journals (Sweden)

    Nico Martins

    2000-06-01

    Full Text Available This study investigates the relation of the "Big Five" personality dimensions and managerial practices to the dimension of trust relationships between managers and employees. The "Big Five" dimensions are conscientiousness, agreeableness, emotional stability, resourcefulness and extraversion. Managerial practices are credibility, team management, information sharing and work support. Results indicate that managerial practices have an influence on the trust relationships between managers and employees. For the "Big Five" personality dimensions, a weaker relationship with the dimension of trust was obtained. Although there appears to be a weaker relationship between the "Big Five" and the dimension of trust relationships, the relatively good fit of the model indicates that an overall implication of the model is that both managerial practices and the "Big Five" personality aspects of the manager might influence his/her subordinates indirectly. These findings have numerous implications for the relationships between managers and employees, especially in the selection, recruitment and appointment of managers and the role of managers during transformation. Opsomming Die studie ondersoek die verhouding tussen die Groot Vyf ("Big Five" persoonlikheidsdimensies en bestuurspraktyke en die dimensie van vertroue tussen bestuur en werknemers. Die Groot Vyf dimensies is konsensieusheid, eenstemmigheid, emosionele stabiliteit, vernuftigheid en ekstroversie. Die bestuurspraktyke is kredietwaardigheid, spanbestuur, die deel van inligting en werksondersteuning. Die resultate dui aan dat die bestuurspraktyke 'n invloed het op die verhouding tussen bestuur en werknemers. Wat die Groot Vyf dimensies aanbetref, is n swakker verhouding met die dimensie van vertroue bevind. Alhoewel dit skyn as of daar n swakker verhouding tussen die Groot Vyf en die dimensie van vertroue is, toon die relatiewe goeie passing van die model dat beide die bestuurspraktyke en die Groot Vyf

  10. The Swift Trust Partnership: A Project Management Exercise Investigating the Effects of Trust and Distrust in Outsourcing Relationships

    Science.gov (United States)

    Adler, Terry R.

    2005-01-01

    The Swift Trust exercise provides instructors with the opportunity to discuss the issues of managing trust and distrust perceptions in a team-based design. Lewicki, McAllister, and Bies's (1998) framework is used to allow students to experience the difficulties of deriving a common set of contract requirements based on team dynamics and…

  11. An exploratory study of the role of trust in medication management within mental health services.

    Science.gov (United States)

    Maidment, Ian D; Brown, Patrick; Calnan, Michael

    2011-08-01

    To develop understandings of the nature and influence of trust in the safe management of medication within mental health services. Mental health services in the UK. Qualitative methods were applied through focus groups across three different categories of service user--older adult, adults living in the community and forensic services. An inductive thematic analysis was carried out, using the method of constant comparison derived from grounded theory. Participants' views on the key factors influencing trust and the role of trust in safe medication management. The salient factors impacting trust were: the therapeutic relationship; uncertainty and vulnerability; and social control. Users of mental health services may be particularly vulnerable to adverse events and these can damage trust. Safe management of medication is facilitated by trust. However, this trust may be difficult to develop and maintain, exposing service users to adverse events and worsening adherence. Practice and policy should be oriented towards developing trust.

  12. SoundMeGood: A Trust Model Supporting Preliminary Trust Establishment Between Mutually Unknown Entities

    Czech Academy of Sciences Publication Activity Database

    Špánek, Roman; Tyl, P.

    2013-01-01

    Roč. 1, č. 1 (2013), s. 10-14 ISSN 2320-401X R&D Projects: GA ČR GAP202/10/0761 Grant - others:ČVUT(CZ) SGS 2011/7821 Institutional support: RVO:67985807 Keywords : trust * social network * trust management systems * distributed systems Subject RIV: IN - Informatics, Computer Science http://www.isaet.org/images/extraimages/IJCSEE%200101303.pdf

  13. 77 FR 50185 - LoCorr Fund Management, LLC and LoCorr Investment Trust; Notice of Application

    Science.gov (United States)

    2012-08-20

    ... Fund Management, LLC and LoCorr Investment Trust; Notice of Application August 14, 2012. AGENCY.... Applicants: LoCorr Fund Management, LLC (``LFM'' or the ``Adviser'') and LoCorr Investment Trust (the ``Trust... Mary Kay Frech, Branch Chief, at (202) 551-6821 (Division of Investment Management, Office of...

  14. 77 FR 34095 - Federated Investment Management Company and Federated ETF Trust; Notice of Application

    Science.gov (United States)

    2012-06-08

    ... Investment Management Company and Federated ETF Trust; Notice of Application June 1, 2012. AGENCY: Securities... (e) certain registered management investment companies and unit investment trusts outside of the same... Daniele Marchesani, Branch Chief, at (202) 551-6821 (Division of Investment Management, Office of...

  15. Methods for reliability evaluation of trust and reputation systems

    Science.gov (United States)

    Janiszewski, Marek B.

    2016-09-01

    Trust and reputation systems are a systematic approach to build security on the basis of observations of node's behaviour. Exchange of node's opinions about other nodes is very useful to indicate nodes which act selfishly or maliciously. The idea behind trust and reputation systems gets significance because of the fact that conventional security measures (based on cryptography) are often not sufficient. Trust and reputation systems can be used in various types of networks such as WSN, MANET, P2P and also in e-commerce applications. Trust and reputation systems give not only benefits but also could be a thread itself. Many attacks aim at trust and reputation systems exist, but such attacks still have not gain enough attention of research teams. Moreover, joint effects of many of known attacks have been determined as a very interesting field of research. Lack of an acknowledged methodology of evaluation of trust and reputation systems is a serious problem. This paper aims at presenting various approaches of evaluation such systems. This work also contains a description of generalization of many trust and reputation systems which can be used to evaluate reliability of such systems in the context of preventing various attacks.

  16. Personalized Trust Management for Open and Flat P2P Communities

    Institute of Scientific and Technical Information of China (English)

    ZUO Min; LI Jian-hua

    2008-01-01

    A personalized trust management scheme is proposed to help peers build up trust between each other in open and flat P2P communities. This scheme totally abandons the attempt to achieve a global view. It evaluates trust from a subjective point of view and gives personalized decision support to each peer. Simulation experiments prove its three advantages: free of central control, stronger immunity to misleading recommendations, and limited traffic overload.

  17. Trust in management as a buffer of the relationships between overload and strain.

    Science.gov (United States)

    Harvey, Steve; Kelloway, E Kevin; Duncan-Leiper, Leslie

    2003-10-01

    This study examined the role of trust in management as a moderating factor in work overload's impact on personal strain (i.e., burnout, psychological strain, and work's interference with family). Participants were 94 employees of an accounting firm responding to a survey. The results were supportive of all study propositions. Both work overload and trust in management had the expected negative and positive main effects on the outcomes variables, respectively. The impact of work overload on the outcome variables was moderated by employees' trust in management. The significance of these results and areas of future research are discussed. 2003 APA

  18. Do Reputation Systems Undermine Trust? Divergent Effects of Enforcement Type on Generalized Trust and Trustworthiness.

    Science.gov (United States)

    Kuwabara, Ko

    2015-03-01

    Research shows that enforcing cooperation using contracts or tangible sanctions can backfire, undermining people's intrinsic motivation to cooperate: when the enforcement is removed, people are less trusting or trustworthy than when there is no enforcement to begin with. The author examines whether reputation systems have similar consequences for generalized trust and trustworthiness. Using a web-based experiment simulating online market transactions (studies 1 and 2), he shows that reputation systems can reinforce generalized trust and trustworthiness, unlike contractual enforcement or relational enforcement based on repeated interactions. In a survey experiment (study 3), he finds that recalling their eBay feedback scores made participants more trusting and trustworthy. These results are predicated on the diffuse nature of reputational enforcement to reinforce perceptions of trust and trustworthiness. These results have implications for understanding how different forms of governance affect generalized trust and trustworthiness.

  19. Trust between man and machine in a teleoperation system

    International Nuclear Information System (INIS)

    Dassonville, I.; Jolly, D.; Desodt, A.M.

    1996-01-01

    The work we present deals with the trust of man in a teleoperation system. Trust is important because it is linked to stress which modifies human reliability. We are trying to quantify trust. In this paper, we'll present the theory of trust in relationships, and its extension for a man-machine system. Then, we explain the links between trust and human reliability. Then, we introduce our experimental process and the first results concerning selfconfidence

  20. Enhancing Trust Management for Wireless Intrusion Detection via Traffic Sampling in the Era of Big Data

    DEFF Research Database (Denmark)

    Meng, Weizhi; Li, Wenjuan; Su, Chunhua

    2017-01-01

    many kinds of information among sensors, whereas such network is vulnerable to a wide range of attacks, especially insider attacks, due to its natural environment and inherent unreliable transmission. To safeguard its security, intrusion detection systems (IDSs) are widely adopted in a WSN to defend...... against insider attacks through implementing proper trustbased mechanisms. However, in the era of big data, sensors may generate excessive information and data, which could degrade the effectiveness of trust computation. In this paper, we focus on this challenge and propose a way of combining Bayesian......-based trust management with traffic sampling for wireless intrusion detection under a hierarchical structure. In the evaluation, we investigate the performance of our approach in both a simulated and a real network environment. Experimental results demonstrate that packet-based trust management would become...

  1. Understanding and managing trust at the climate science-policy interface

    Science.gov (United States)

    Lacey, Justine; Howden, Mark; Cvitanovic, Christopher; Colvin, R. M.

    2018-01-01

    Climate change effects are accelerating, making the need for appropriate actions informed by sound climate knowledge ever more pressing. A strong climate science-policy relationship facilitates the effective integration of climate knowledge into local, national and global policy processes, increases society's responsiveness to a changing climate, and aligns research activity to policy needs. This complex science-policy relationship requires trust between climate science `producers' and `users', but our understanding of trust at this interface remains largely uncritical. To assist climate scientists and policymakers, this Perspective provides insights into how trust develops and operates at the interface of climate science and policy, and examines the extent to which trust can manage — or even create — risk at this interface.

  2. Trust and controlling

    OpenAIRE

    Bieńkowska Agnieszka; Zabłocka-Kluczka Anna

    2016-01-01

    The purpose of this study is to discuss the trust within and towards an organisation in the context of implementation of controlling therein. In this context the essence of trust and its importance in organisation management was presented, as well as trust in the contemporary management methods and concepts. Controlling as a trust-building factor inside an organisation was pointed out. Especially controlling and control were described. Moreover management by considering deviations in controll...

  3. Loan managers' decisions and trust in entrepreneurs in different institutional contexts

    DEFF Research Database (Denmark)

    Moro, Andrea; Fink, Matthias; Maresch, Daniela

    2018-01-01

    Loan managers’ trust in entrepreneurs can be a useful tool for overcoming entrepreneurial firms’ opaqueness. Nevertheless, the possibility for loan managers to leverage trust can be affected by differences in the regulative institutions within the banks (type of bank) and by place-bound normative...

  4. 77 FR 74884 - Cambria Investment Management, L.P. and Cambria ETF Trust; Notice of Application

    Science.gov (United States)

    2012-12-18

    ... Investment Management, L.P. and Cambria ETF Trust; Notice of Application December 12, 2012. AGENCY... request an order that permits: (a) Actively-managed series of certain open-end management investment... registered management investment companies and unit investment trusts outside of the same group of investment...

  5. Effect of Board Management and Governmental Model on Zakat Payers’ Trust on Zakat Institutions

    Directory of Open Access Journals (Sweden)

    Erlane K Ghani

    2018-01-01

    Full Text Available Trust among zakat payers is important as it contributes to the success of zakat institutions. Zakat payers, are reluctant to pay zakat through zakat institutions due to lack of trust. This study examines whether perceived board management and governmental model may influence zakat payers’ trust on zakat institutions. Using questionnaire survey on 184 zakat payers, this study shows that perceived board management influences zakat payers’ trust on zakat institutions. By contrast, perceived governmental model does not influence zakat payers’ trust on zakat institutions. These findings imply that zakat institutions should focus on strengthening the efficiency of their institutions to increase the trust level among zakat payers. In doing so, the zakat payers are driven to pay zakat diligently, thereby ensuring the sustainability of zakat institutions particularly in developing countries such as Malaysia.

  6. A Dynamic Active Multicast Group Access Control Framework Based on Trust Management System

    Institute of Scientific and Technical Information of China (English)

    YANG Chang; CHEN Xiaolin; ZHANG Huanguo

    2006-01-01

    The current multicast model provides no access control mechanism. Any host can send data directly to a multicast address or join a multicast group to become a member, which brings safety problems to multicast. In this paper, we present a new active multicast group access control mechanism that is founded on trust management. This structure can solve the problem that exists in multicast members' access control and distributing authorization of traditional IP multicast.

  7. TrustRank: a Cold-Start tolerant recommender system

    Science.gov (United States)

    Zou, Haitao; Gong, Zhiguo; Zhang, Nan; Zhao, Wei; Guo, Jingzhi

    2015-02-01

    The explosive growth of the World Wide Web leads to the fast advancing development of e-commerce techniques. Recommender systems, which use personalised information filtering techniques to generate a set of items suitable to a given user, have received considerable attention. User- and item-based algorithms are two popular techniques for the design of recommender systems. These two algorithms are known to have Cold-Start problems, i.e., they are unable to effectively handle Cold-Start users who have an extremely limited number of purchase records. In this paper, we develop TrustRank, a novel recommender system which handles the Cold-Start problem by leveraging the user-trust networks which are commonly available for e-commerce applications. A user-trust network is formed by friendships or trust relationships that users specify among them. While it is straightforward to conjecture that a user-trust network is helpful for improving the accuracy of recommendations, a key challenge for using user-trust network to facilitate Cold-Start users is that these users also tend to have a very limited number of trust relationships. To address this challenge, we propose a pre-processing propagation of the Cold-Start users' trust network. In particular, by applying the personalised PageRank algorithm, we expand the friends of a given user to include others with similar purchase records to his/her original friends. To make this propagation algorithm scalable to a large amount of users, as required by real-world recommender systems, we devise an iterative computation algorithm of the original personalised TrustRank which can incrementally compute trust vectors for Cold-Start users. We conduct extensive experiments to demonstrate the consistently improvement provided by our proposed algorithm over the existing recommender algorithms on the accuracy of recommendations for Cold-Start users.

  8. From risk perception to social trust: an outline of recent contributions of psychology to risk management

    International Nuclear Information System (INIS)

    Earle, T.C.

    2002-01-01

    As with many developing areas of inquiry, the psychology of risk management has progressed from an initial focus on proximal effects to an exploration of more stable distal factors, from risk perception to social trust. Risk perception is concerned with disruptions in the relations between individuals and their physical environments, specifically with the varying negative effects experienced by individuals. These effects have been found to be socially constructed, with systematic variations among groups (e.g., lay-person and experts; among various groups of experts; men and women; those with economic interests and those without; etc.). The focus of risk perception research has shifted over time: from the likelihood of specific health effects; to the likelihood of a wide range of effects, including emotional effects, varying with context; and, finally, to general emotional effects, positive and negative affect. This shift can be seen to be from cognitive/rational to affective; from expert/technical to public. The second stage of inquiry moved away from the surface effects of risk perception to the study of confidence. Confidence is concerned with constancy, the underlying, not directly experienced order of the relations between individuals and their social/physical environments. Disruptions in confidence lead to concern with risk. Initially, confidence was said to be based on past performance and systems of control, objectively defined; the appropriate response to disruptions was risk communication, the provision of correct information. Failures in risk communication indicated that confidence must be based on subjective judgements of past performance and systems of control. The third, and present, stage of inquiry moved back from confidence, and from the physical environment, to the study of social trust. Social trust is concerned with the relations between individuals within social groups. Individuals tend to trust others whom they judge to be similar to themselves

  9. Trust makers, breakers and brokers: building trust in the Australian food system.

    Science.gov (United States)

    Wilson, Annabelle; Coveney, John; Henderson, Julie; Meyer, Samantha; Calnan, Michael; Caraher, Martin; Webb, Trevor; Elliott, Anthony; Ward, Paul

    2013-03-15

    The importance of consumer trust in the food supply has previously been identified, and dimensions of consumer trust in food-who they trust and the type of trust that they exhibit-has been explored. However, there is a lack of research about the mechanisms through which consumer trust in the food supply is developed, maintained, broken and repaired. This study seeks to address this gap by exploring if, and how, consumer trust in the food supply is considered by the media, food industry and governments when responding to food scares. The aim of the research is to develop models of trust building that can be implemented following food scares. Semi-structured interviews will be undertaken with media, public relations officials and policy makers in Australia, New Zealand and the United Kingdom. Participants will be recruited through purposive sampling and will be asked to discuss a hypothetical case study outlining a food incident, and any experiences of specific food scares. Models of trust development, maintenance and repair will be developed from interview data. Comment on these models will be sought from experts in food-related organizations through a Delphi study, where participants will be asked to consider the usefulness of the models. Participants' comments will be used to revise the models until consensus is reached on the suitability and usability of the models. This study will contribute to the literature about systems-based trust, and explore trust as a social and regulatory process. The protocol and results will be of interest and use to the food industry, food regulators, consumer advocate groups, media seeking to report food-related issues and policy makers concerned with public health and consumer health and well-being. This research represents an important contribution to the translation of the theoretical conceptualizations of trust into practical use in the context of food.

  10. Trust and Online Reputation Systems

    Science.gov (United States)

    Kwan, Ming; Ramachandran, Deepak

    Web 2.0 technologies provide organizations with unprecedented opportunities to expand and solidify relationships with their customers, partners, and employees—while empowering firms to define entirely new business models focused on sharing information in online collaborative environments. Yet, in and of themselves, these technologies cannot ensure productive online interactions. Leading enterprises that are experimenting with social networks and online communities are already discovering this fact and along with it, the importance of establishing trust as the foundation for online collaboration and transactions. Just as today's consumers must feel secure to bank, exchange personal information and purchase products and services online; participants in Web 2.0 initiatives will only accept the higher levels of risk and exposure inherent in e-commerce and Web collaboration in an environment of trust. Indeed, only by attending to the need to cultivate online trust with customers, partners and employees will enterprises ever fully exploit the expanded business potential posed by Web 2.0. But developing online trust is no easy feat. While various preliminary attempts have occurred, no definitive model for establishing or measuring it has yet been established. To that end, nGenera has identified three, distinct dimensions of online trust: reputation (quantitative-based); relationship (qualitative-based) and process (system-based). When considered together, they form a valuable model for understanding online trust and a toolbox for cultivating it to support Web 2.0 initiatives.

  11. 77 FR 73089 - Cambria Investment Management, L.P. and Cambria ETF Trust; Notice of Application

    Science.gov (United States)

    2012-12-07

    ... Investment Management, L.P. and Cambria ETF Trust; Notice of Application November 30, 2012. AGENCY... (e) certain registered management investment companies and unit investment trusts outside of the same... Jennifer L. Sawin, Branch Chief, at (202) 551-6821 (Division of Investment Management, Office of Investment...

  12. Relationship Between Cybernetics Management and Organizational Trust Among Librarians of Mazandaran University of Medical Sciences.

    Science.gov (United States)

    Ghiasi, Mitra; Shahrabi, Afsaneh; Siamian, Hasan

    2017-12-01

    Organization must keep current skills, abilities, and in the current field of competition, and move one step ahead of other competitors; for this purpose, must be a high degree of trust inside the organization. Cybernetic management is a new approach in management of organizations that its main task according to internal issues. This study aimed to investigate the relationship between cybernetics management and organizational trust among librarians of Mazandaran University of Medical Sciences. This is applied and analytical survey. which its population included all librarians of Mazandaran University of Medical Sciences, amounting to 42 people which were selected by census and participated in this research. There has no relationship between components of Cybernetics management (participative decision making, commitment, pay equity, Correct flow of information, develop a sense of ownership, online education) with organizational trust amongst librarians of Mazandaran University of Medical Sciences. And there has a significant relationship between flat Structure of cybernetics management and organizational trust. For data analysis was used Kolmogorov-Smirnov test and linear regression. There is no significant relationship between Cybernetic management and organizational trust amongst librarians of Mazandaran University of Medical Sciences.

  13. Trust Account Fraud And Effective Information Security Management

    Directory of Open Access Journals (Sweden)

    Sameera Mubarak

    2010-09-01

    Full Text Available The integrity of lawyers trust accounts has come under scrutiny in the last few years. There are strong possibilities of information technology security breaches happening within the firms, either accidental or deliberate. The damage caused by these security breaches could be extreme. For example, a trust account fund in an Australian law firm was misused in a security breach in which Telstra charged. A$50,000 for phone usage, mainly for ISD calls to Hong Kong.Our study involved interviewing principles of ten law companies to find out solicitors attitudes to computer security and the possibility of breaches of their trust accounts. We simultaneously carried out a survey to see if the trends identified in our case-studies could be backed up with broader quantitative data. We have also conducted in-depth interviews of 5 trust account regulators from the Law society of South Australia to know their view points on security threats on trust accounts. An overall finding highlights that law firms were not current with technology to combat computer crime, and inadequate access control was a major concern in safeguarding account data. Our conclusions revealed the urgent need for law firms to adopt security controls, implement information security policies and procedures and obtain cooperation from management to communicate these policies to staff.

  14. Research of trust model base on P2P and grid system

    International Nuclear Information System (INIS)

    Jiang Zhuoming; Wu Huan; Xu Rongsheng

    2009-01-01

    Orienting to the characteristic of P2P and Grid system in architecture and service, a trust management model (PG-TM) based on cluster partition is presented. In this model, the protocol is described that trustworthiness is computed before service interaction, and recommendation values will be fed back after interaction. About the trustworthiness, some arithmetic is compared and geometric mean is brought up for the non-linear trust principle. In addition, it is also considered that the trustworthiness is adjusted by the produce contribution rate,network stability and history accumulation. Finally, the factors of maintaining management server and cluster are discussed. PG-TM model can ensure the security and availability in computation and storage of high energy physics experiments. (authors)

  15. Dependence on Supplier, Supplier Trust and Green Supplier Integration: The Moderating Role of Contract Management Difficulty

    Directory of Open Access Journals (Sweden)

    Xuesong Zhao

    2018-05-01

    Full Text Available This study aims to investigate the impacts of dependence on supplier and supplier trust on green supplier integration, and the moderating role of contract management difficulty. In this study, we develop a dependence-trust-integration model based on resource dependence theory, social capital theory and transaction cost theory. We examine the hypothesized relationships using hierarchical regression analyses based on data collected from 187 Chinese firms. Our findings suggest that dependence on supplier has positive impacts on green supplier integration and supplier trust. Supplier trust partially mediates the relationship between dependence on supplier and green supplier integration. In addition, contract management difficulty negatively moderates the relationship between supplier trust and green supplier integration. This research contributes to the literature by offering empirical evidence concerning the indirect relationship between dependence on supplier and green supplier integration via supplier trust, and the trust-integration link depends on the level of contract management difficulty.

  16. ComTrustO: Composite Trust-Based Ontology Framework for Information and Decision Fusion

    Science.gov (United States)

    2015-07-06

    11] presents a methodological approach for ontology management allowing development of extensible ontologies and the mapping from ontologies to...ComTrustO: Composite Trust-based Ontology Framework for Information and Decision Fusion Alessandro Oltramari Carnegie Mellon University Pittsburgh... ontology -based framework for information fusion, as a support system for human decision makers. In particular, we build upon the concept of composite

  17. Trust and management-to-employee communication in Slovenian companies: Some evidence from the current economic crisis

    Directory of Open Access Journals (Sweden)

    Maja Makovec Brenčič

    2011-01-01

    Full Text Available This paper analyzes the importance of trust and management-to-employee communication among top Slovenian employers from the Golden Thread Survey. The paper analyzes the changes and impact of the deteriorating external economic situation on (a company-employee relational trust, and on the (b perceived importance of “trust and long-term relationships with the company in the eyes of the customer” by respondent managers. Furthermore, our analysis also looks at the impact of management-to-employee communication on both trust perspectives. The results show a stable level of company-employee relational trust in the face of the current economic crisis, despite a high level of perceived organizational process changes and a sharp decline in financial performance. On the other hand, the perceived importance of “trust and long-term relationships with the company in the eyes of the customer” has increased substantially as the crisis has deepened, supporting our claim that relationships and the external relationship orientation gain importance in the time of crisis. There is also a strong link between the degree of open and frequent management-to-employee communication, and both perspectives of measured trust among top Slovenian employers.

  18. [Crises of trust].

    Science.gov (United States)

    Chen, Thai-Form; Tseng, Hsing-Chau

    2006-02-01

    Extensive media coverage is warning of a crisis of trust that has emerged as a serious issue in our society. This article explores the meaning of "crisis," concepts of crisis management, mechanisms for building trust, and the underlying significance of trust and distrust. Evidence is adduced to testify to the erosion of trust and factors in our society that reflect the potential for crises of trust. Organizational decision makers, including hospital managers, are urged to identify and reflect upon weaknesses in their organizations in order that remedial action can be taken to preempt such crises.

  19. Security management based on trust determination in cognitive radio networks

    Science.gov (United States)

    Li, Jianwu; Feng, Zebing; Wei, Zhiqing; Feng, Zhiyong; Zhang, Ping

    2014-12-01

    Security has played a major role in cognitive radio networks. Numerous researches have mainly focused on attacking detection based on source localization and detection probability. However, few of them took the penalty of attackers into consideration and neglected how to implement effective punitive measures against attackers. To address this issue, this article proposes a novel penalty mechanism based on cognitive trust value. The main feature of this mechanism has been realized by six functions: authentication, interactive, configuration, trust value collection, storage and update, and punishment. Data fusion center (FC) and cluster heads (CHs) have been put forward as a hierarchical architecture to manage trust value of cognitive users. Misbehaving users would be punished by FC by declining their trust value; thus, guaranteeing network security via distinguishing attack users is of great necessity. Simulation results verify the rationality and effectiveness of our proposed mechanism.

  20. Building a framework to manage trust in automation

    Science.gov (United States)

    Metcalfe, J. S.; Marathe, A. R.; Haynes, B.; Paul, V. J.; Gremillion, G. M.; Drnec, K.; Atwater, C.; Estepp, J. R.; Lukos, J. R.; Carter, E. C.; Nothwang, W. D.

    2017-05-01

    All automations must, at some point in their lifecycle, interface with one or more humans. Whether operators, end-users, or bystanders, human responses can determine the perceived utility and acceptance of an automation. It has been long believed that human trust is a primary determinant of human-automation interactions and further presumed that calibrating trust can lead to appropriate choices regarding automation use. However, attempts to improve joint system performance by calibrating trust have not yet provided a generalizable solution. To address this, we identified several factors limiting the direct integration of trust, or metrics thereof, into an active mitigation strategy. The present paper outlines our approach to addressing this important issue, its conceptual underpinnings, and practical challenges encountered in execution. Among the most critical outcomes has been a shift in focus from trust to basic interaction behaviors and their antecedent decisions. This change in focus inspired the development of a testbed and paradigm that was deployed in two experiments of human interactions with driving automation that were executed in an immersive, full-motion simulation environment. Moreover, by integrating a behavior and physiology-based predictor within a novel consequence-based control system, we demonstrated that it is possible to anticipate particular interaction behaviors and influence humans towards more optimal choices about automation use in real time. Importantly, this research provides a fertile foundation for the development and integration of advanced, wearable technologies for sensing and inferring critical state variables for better integration of human elements into otherwise fully autonomous systems.

  1. 25 CFR 1200.3 - What is the Department's policy on tribal management of trust funds?

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false What is the Department's policy on tribal management of..., DEPARTMENT OF THE INTERIOR AMERICAN INDIAN TRUST FUND MANAGEMENT REFORM ACT General Provisions § 1200.3 What is the Department's policy on tribal management of trust funds? (a) We will give tribes as much...

  2. Studies of transformational leadership in consumer service: leadership trust and the mediating-moderating role of cooperative conflict management.

    Science.gov (United States)

    Yang, Yi-Feng

    2012-02-01

    This is the third in a series of studies evaluating how transformational leadership is associated with related variables such as job satisfaction, change commitment, leadership trust, cooperative conflict management, and market orientation. The present paper evaluates the effects of transformational leadership and cooperative conflict management along with their mediating and moderating of leadership trust in the life insurance industry for two sample groups, sales managers and sales employees. The main effect of leadership trust was mediated and moderated by cooperative conflict management. Cooperative conflict management made a more important contribution than transformational leadership or the moderating effect (interaction), but these three together were the most important variables predicting highest leadership trust. Transformational leadership has an indirect influence on leadership trust. This work summarizes the specific contribution and importance of building successful leadership trust associations with employees in relation to leadership and satisfaction with change commitment.

  3. A Trusted Computing Architecture of Embedded System Based on Improved TPM

    Directory of Open Access Journals (Sweden)

    Wang Xiaosheng

    2017-01-01

    Full Text Available The Trusted Platform Module (TPM currently used by PCs is not suitable for embedded systems, it is necessary to improve existing TPM. The paper proposes a trusted computing architecture with new TPM and the cryptographic system developed by China for the embedded system. The improved TPM consists of the Embedded System Trusted Cryptography Module (eTCM and the Embedded System Trusted Platform Control Module (eTPCM, which are combined and implemented the TPM’s autonomous control, active defense, high-speed encryption/decryption and other function through its internal bus arbitration module and symmetric and asymmetric cryptographic engines to effectively protect the security of embedded system. In our improved TPM, a trusted measurement method with chain model and star type model is used. Finally, the improved TPM is designed by FPGA, and it is used to a trusted PDA to carry out experimental verification. Experiments show that the trusted architecture of the embedded system based on the improved TPM is efficient, reliable and secure.

  4. 78 FR 69147 - Ranger Alternative Management, L.P. and Ranger Funds Investment Trust; Notice of Application

    Science.gov (United States)

    2013-11-18

    ...] Ranger Alternative Management, L.P. and Ranger Funds Investment Trust; Notice of Application November 12... Application: Applicants request an order that would permit (a) certain open-end management investment... Units; and (e) certain registered management investment companies and unit investment trusts outside of...

  5. Trust management support for context-aware service platforms

    NARCIS (Netherlands)

    Neisse, R.; Wegdam, M.; van Sinderen, Marten J.; Aldini, A.; Bogliolo, A.

    High quality context information retrieved from trustworthy context providers allows a more reliable context-aware service adaption but also implies a higher risk for the service users in case of privacy violations. In this chapter we present a trust management model that support users and providers

  6. Trust and management-to-employee communication in Slovenian companies: Some evidence from the current economic crisis

    OpenAIRE

    Matevž Rašković; Maja Makovec Brenčič; Barbara Moerec

    2011-01-01

    This paper analyzes the importance of trust and management-to-employee communication among top Slovenian employers from the Golden Thread Survey. The paper analyzes the changes and impact of the deteriorating external economic situation on (a) company-employee relational trust, and on the (b) perceived importance of “trust and long-term relationships with the company in the eyes of the customer” by respondent managers. Furthermore, our analysis also looks at the impact of management-to-employ...

  7. Social Trust and Confidence in the Management of Long Lived Radioactive Wastes: Qualitative Data from France

    Energy Technology Data Exchange (ETDEWEB)

    Mays, Claire [Inst. Symlog, Cachan (France); Charron, Sylvie; Brenot, Jean [IRSN-DPHD-SEGR, Fontenay-aux-Roses (France)

    2003-10-01

    Our qualitative study brought confirmation to Petts' finding that trust components may be of variable significance to different populations in different risk contexts. When we asked interviewees simply to talk about LLiRW (long-lived radioactive wastes management), social trust and confidence were frequently addressed (more than any other of our seven study themes). However, the themes' status appears to differ according to study sample. For the Limousine interviewees, these concepts are central and deeply tied into the uncertainty evoked by LLiRWM. Some interviewees explicitly described how social trust in waste managers, and confidence in the RWM system, are challenged by the very long term, and by the unpredictability of health effects from ionizing radiation. Limousine interviewees ask themselves questions about trust and confidence every time they think about the issues of mine and mill tailings in their community. While managers can draw guidance on how to ameliorate their performance on e.g. openness and credibility, residents suggest that there are structural limits to how far social trust can suffice in a RWM system. In such a context, improving system confidence may reside not so much in convincing residents that institutional actors are more trustworthy, as in fostering a dialogue among all these stakeholders on how to address long term, uncertain risks and their impacts. This is in alignment with Bradbury et al. who with reference to Webler recommend that 'increasing trust and decreasing distrust' be viewed primarily as a basis for initiating and sustaining a more effective (fair and competent) dialogue with the goal of developing consensus on risk management policies. Uninvolved urban samples also talked about trust and confidence, especially during the group interviews. In contrast, however, participants seemed to use these themes as a tool to spark animated discussion on a risk topic - LLiRWM - of which they had not necessarily

  8. Social Trust and Confidence in the Management of Long Lived Radioactive Wastes: Qualitative Data from France

    International Nuclear Information System (INIS)

    Mays, Claire; Charron, Sylvie; Brenot, Jean

    2003-01-01

    Our qualitative study brought confirmation to Petts' finding that trust components may be of variable significance to different populations in different risk contexts. When we asked interviewees simply to talk about LLiRW (long-lived radioactive wastes management), social trust and confidence were frequently addressed (more than any other of our seven study themes). However, the themes' status appears to differ according to study sample. For the Limousine interviewees, these concepts are central and deeply tied into the uncertainty evoked by LLiRWM. Some interviewees explicitly described how social trust in waste managers, and confidence in the RWM system, are challenged by the very long term, and by the unpredictability of health effects from ionizing radiation. Limousine interviewees ask themselves questions about trust and confidence every time they think about the issues of mine and mill tailings in their community. While managers can draw guidance on how to ameliorate their performance on e.g. openness and credibility, residents suggest that there are structural limits to how far social trust can suffice in a RWM system. In such a context, improving system confidence may reside not so much in convincing residents that institutional actors are more trustworthy, as in fostering a dialogue among all these stakeholders on how to address long term, uncertain risks and their impacts. This is in alignment with Bradbury et al. who with reference to Webler recommend that 'increasing trust and decreasing distrust' be viewed primarily as a basis for initiating and sustaining a more effective (fair and competent) dialogue with the goal of developing consensus on risk management policies. Uninvolved urban samples also talked about trust and confidence, especially during the group interviews. In contrast, however, participants seemed to use these themes as a tool to spark animated discussion on a risk topic - LLiRWM - of which they had not necessarily given much thought in

  9. The Process of Trust Development

    DEFF Research Database (Denmark)

    Jagd, Søren; Højland, Jeppe

    in management among employees. Trust is found to be higher among employees interacting regularly with managers, as in the project coordination group. It is found that personal relations are very important for the development of trust. The success of the project may be explained by the involvement of an ‘elite...... and discuss with colleagues from other departments and develop personal knowledge of each other....... by high trust and co-operation? In this paper we explore the process of trust development during an organisational change project in a Danish SME by looking at two kinds of trust relations: employee trust in management and trust relations among employees. We find substantial differences in trust...

  10. Public trust in the healthcare system in a developing country.

    Science.gov (United States)

    Peters, Dexnell; Youssef, Farid F

    2016-04-01

    Broadly defined, trust in the healthcare system is concerned with how the public perceives the system and the actors therein as it pertains to their ability to both deliver services and seek the best interests of their clientele. Trust is important because it impacts upon a range of health behaviors including compliance and ultimately affects the ability of the healthcare system to meet its goals. While several studies exist on public trust within the developed world, few studies have explored this issue in developing countries. This paper therefore assesses public trust in the healthcare system of a developing small island nation, Trinidad and Tobago. A cross-sectional survey of adults was conducted using a questionnaire that has been successfully used across Europe. We report that trust levels in the healthcare system in Trinidad and Tobago are relatively low with less than 50% of persons indicating fair trust in the healthcare system. In addition, individual health professionals also did not score highly with lowest scores found for nurses and complementary therapists. Results on four out of five dimensions of trust also demonstrated scores significantly lower than those reported in more developed nations. Open-ended comments supported these findings with the majority of persons indicating a lack of confidence in the healthcare system. These results may reflect the reality in the wider developing world, and we suggest that bolstering trust is a needed area of focus in the delivery of healthcare services throughout the nation. Copyright © 2014 John Wiley & Sons, Ltd. Copyright © 2014 John Wiley & Sons, Ltd.

  11. Chemical Manufacturing and Refining Industry Legitimacy: Reflective Management, Trust, Precrisis Communication to Achieve Community Efficacy.

    Science.gov (United States)

    Heath, Robert L; Lee, Jaesub

    2016-06-01

    Calls for emergency right-to-know in the 1980s, and, in the 1990s, risk management planning, motivated U.S. chemical manufacturing and refining industries to operationalize a three-pronged approach to risk minimization and communication: reflective management to increase legitimacy, operational safety programs to raise trust, and community engagement designed to facilitate citizens' emergency response efficacy. To assess these management, operational, and communication initiatives, communities (often through Local Emergency Planning Committees) monitored the impact of such programs. In 2012, the fourth phase of a quasi-longitudinal study was conducted to assess the effectiveness of operational change and community outreach in one bellwether community. This study focuses on legitimacy, trust, and response efficacy to suggest that an industry can earn legitimacy credits by raising its safety and environmental impact standards, by building trust via that change, and by communicating emergency response messages to near residents to raise their response efficacy. As part of its campaign to demonstrate its concern for community safety through research, planning, and implementation of safe operations and viable emergency response systems, this industry uses a simple narrative of risk/emergency response-shelter-in-place-communicated by a spokes-character: Wally Wise Guy. © 2015 Society for Risk Analysis.

  12. Balancing Trust and Control

    DEFF Research Database (Denmark)

    Jagd, Søren

    This paper focuses on the leadership challenge of balancing trust and control. The relation between trust and control has for a long time been a puzzling issue for management researchers. In the paper I first show that there has been a dramatic change in the way the relation between trust...... and control has been conceptualized in trust research. While the relation between trust and control earlier was conceptualized as a more or less stable balance between trust and control, more recent research conceptualizes the relation between trust and control more as a dynamical process that involves...... an ongoing process of balancing the relation between trust and control. Second, taking the departure in the recent conceptualization of the balance between trust and control as an interactive process I discuss the challenges for management in handling this more subtle balancing of trust and control...

  13. Trust information-based privacy architecture for ubiquitous health.

    Science.gov (United States)

    Ruotsalainen, Pekka Sakari; Blobel, Bernd; Seppälä, Antto; Nykänen, Pirkko

    2013-10-08

    Ubiquitous health is defined as a dynamic network of interconnected systems that offers health services independent of time and location to a data subject (DS). The network takes place in open and unsecure information space. It is created and managed by the DS who sets rules that regulate the way personal health information is collected and used. Compared to health care, it is impossible in ubiquitous health to assume the existence of a priori trust between the DS and service providers and to produce privacy using static security services. In ubiquitous health features, business goals and regulations systems followed often remain unknown. Furthermore, health care-specific regulations do not rule the ways health data is processed and shared. To be successful, ubiquitous health requires novel privacy architecture. The goal of this study was to develop a privacy management architecture that helps the DS to create and dynamically manage the network and to maintain information privacy. The architecture should enable the DS to dynamically define service and system-specific rules that regulate the way subject data is processed. The architecture should provide to the DS reliable trust information about systems and assist in the formulation of privacy policies. Furthermore, the architecture should give feedback upon how systems follow the policies of DS and offer protection against privacy and trust threats existing in ubiquitous environments. A sequential method that combines methodologies used in system theory, systems engineering, requirement analysis, and system design was used in the study. In the first phase, principles, trust and privacy models, and viewpoints were selected. Thereafter, functional requirements and services were developed on the basis of a careful analysis of existing research published in journals and conference proceedings. Based on principles, models, and requirements, architectural components and their interconnections were developed using system

  14. Trust and cooperation relations in environmental management of Lebanon

    NARCIS (Netherlands)

    Abbas, Nivine; van der Molen, I.; Nader, M.R.; Lovett, Jonathan Cranidge

    2014-01-01

    This paper investigates trust and cooperation in the context of environmental management in Lebanon. Literature already indicated increasing environmental problems in this area that suffered from repeated episodes of armed conflict. The Lebanese government has been faced by many difficulties to

  15. Trust in Digital Repositories

    Directory of Open Access Journals (Sweden)

    Elizabeth Yakel

    2013-06-01

    Full Text Available ISO 16363:2012, Space Data and Information Transfer Systems - Audit and Certification of Trustworthy Digital Repositories (ISO TRAC, outlines actions a repository can take to be considered trustworthy, but research examining whether the repository’s designated community of users associates such actions with trustworthiness has been limited. Drawing from this ISO document and the management and information systems literatures, this paper discusses findings from interviews with 66 archaeologists and quantitative social scientists. We found similarities and differences across the disciplines and among the social scientists. Both disciplinary communities associated trust with a repository’s transparency. However, archaeologists mentioned guarantees of preservation and sustainability more frequently than the social scientists, who talked about institutional reputation. Repository processes were also linked to trust, with archaeologists more frequently citing metadata issues and social scientists discussing data selection and cleaning processes. Among the social scientists, novices mentioned the influence of colleagues on their trust in repositories almost twice as much as the experts. We discuss the implications our findings have for identifying trustworthy repositories and how they extend the models presented in the management and information systems literatures.

  16. Building on the trust of management: overcoming the paradoxes of principles based regulation

    OpenAIRE

    Ojo, Marianne

    2010-01-01

    This paper illustrates how trust in management can be consolidated through the order and mode of application of enforcement measures (negotiating and punitive enforcement measures) which are employed in facilitating and maximising compliance with rules. “Whilst negotiating strategies are introduced initially to develop trust between the regulator and the regulated, resort is made to more punitive strategies where an absence of trust in the compliance activity has been confirmed.” In consi...

  17. Trustsim - A Simulator for Trust Relationships in Grid Systems

    DEFF Research Database (Denmark)

    2006-01-01

    This report describes the use of Trustsim for simulation of trust- and reputation-based phenomena in small or large scale distributed systems. The trust mechanisms which can be simulated are incremental, in the sense that good behaviour is rewarded by a higher degree of trust and bad behaviour...

  18. Designing High-Trust Organizations

    DEFF Research Database (Denmark)

    Jagd, Søren

    The specific problem considered in this paper is what are the key issues to consider for managers involved in designing high-trust organizations, a design problem still not properly explored. This paper intends to take the first step in filling this lacuna. In the paper, I first present...... the existing management and research literature on building high-trust organizations. Then I explore Alan Fox’s (1974) analysis of low-trust vs. high-trust dynamics which, I argue, may serve as a theoretically stronger basis for understanding the issues management have to consider when designing hightrust...... organizations...

  19. TrustBuilder2: A Reconfigurable Framework for Trust Negotiation

    Science.gov (United States)

    Lee, Adam J.; Winslett, Marianne; Perano, Kenneth J.

    To date, research in trust negotiation has focused mainly on the theoretical aspects of the trust negotiation process, and the development of proof of concept implementations. These theoretical works and proofs of concept have been quite successful from a research perspective, and thus researchers must now begin to address the systems constraints that act as barriers to the deployment of these systems. To this end, we present TrustBuilder2, a fully-configurable and extensible framework for prototyping and evaluating trust negotiation systems. TrustBuilder2 leverages a plug-in based architecture, extensible data type hierarchy, and flexible communication protocol to provide a framework within which numerous trust negotiation protocols and system configurations can be quantitatively analyzed. In this paper, we discuss the design and implementation of TrustBuilder2, study its performance, examine the costs associated with flexible authorization systems, and leverage this knowledge to identify potential topics for future research, as well as a novel method for attacking trust negotiation systems.

  20. Trust-Based Information Risk Management in a Supply Chain Network

    OpenAIRE

    Yanjun Zuo; Wen-Chen Hu

    2009-01-01

    Information risk management is crucial for an organization operating in an increasingly integrated and intensively communicated environment to mitigate risks and ensure core business functions. Given the open and dynamic nature of a supply chain network, information risk management is challenging and various factors must be considered. This article introduces a trust-based approach to facilitate supply chain participants to perform effective risk management. The major components of the propos...

  1. Assess and enhance public trust

    Science.gov (United States)

    Patricia Winter; James Absher; Alan Watson

    2007-01-01

    Trust is a form of social capital, facilitating effective land management, communication and collaboration. Although trust in the Forest Service is at least moderately high for most publics, evidence of a lack of trust and outright distrust has been found in some communities. However, the amount, types, and conditions of trust necessary for effective management to...

  2. Trusted Domain

    DEFF Research Database (Denmark)

    Hjorth, Theis Solberg; Torbensen, Rune

    2012-01-01

    remote access via IP-based devices such as smartphones. The Trusted Domain platform fits existing legacy technologies by managing their interoperability and access controls, and it seeks to avoid the security issues of relying on third-party servers outside the home. It is a distributed system...... of wireless standards, limited resources of embedded systems, etc. Taking these challenges into account, we present a Trusted Domain home automation platform, which dynamically and securely connects heterogeneous networks of Short-Range Wireless devices via simple non-expert user. interactions, and allows......In the digital age of home automation and with the proliferation of mobile Internet access, the intelligent home and its devices should be accessible at any time from anywhere. There are many challenges such as security, privacy, ease of configuration, incompatible legacy devices, a wealth...

  3. Relationship Between Cybernetics Management and Organizational Trust Among Librarians of Mazandaran University of Medical Sciences

    OpenAIRE

    Ghiasi, Mitra; Shahrabi, Afsaneh; Siamian, Hasan

    2017-01-01

    Background and purpose: Organization must keep current skills, abilities, and in the current field of competition, and move one step ahead of other competitors; for this purpose, must be a high degree of trust inside the organization. Cybernetic management is a new approach in management of organizations that its main task according to internal issues. This study aimed to investigate the relationship between cybernetics management and organizational trust among librarians of Mazandaran Univer...

  4. Know what you trust: Analyzing and designing trust policies with Scoll

    NARCIS (Netherlands)

    Spiessens, F.; Hartog, den J.I.; Etalle, S.; Degano, P.; Guttman, J.; Martinelli, F.

    2009-01-01

    In Decentralized Trust Management (DTM) authorization decisions are made by multiple principals who can also delegate decisions to each other. Therefore, a policy change of one principal will often affect who gets authorized by another principal. In such a system of influenceable authorization a

  5. An Appraisal Of The Operation And Management Of Unit Trust ...

    African Journals Online (AJOL)

    An Appraisal Of The Operation And Management Of Unit Trust Schemes In Nigeria. ... Open Access DOWNLOAD FULL TEXT ... instead of being invested in shares or in money market instruments as a result of widespread financial illiteracy.

  6. Exploring pathways for building trust in vaccination and strengthening health system resilience

    Directory of Open Access Journals (Sweden)

    Sachiko Ozawa

    2016-11-01

    Full Text Available Abstract Background Trust is critical to generate and maintain demand for vaccines in low and middle income countries. However, there is little documentation on how health system insufficiencies affect trust in vaccination and the process of re-building trust once it has been compromised. We reflect on how disruptions to immunizations systems can affect trust in vaccination and can compromise vaccine utilization. We then explore key pathways for overcoming system vulnerabilities in order to restore trust, to strengthen the resilience of health systems and communities, and to promote vaccine utilization. Methods Utilizing secondary data and a review of the literature, we developed a causal loop diagram (CLD to map the determinants of building trust in immunizations. Using the CLD, we devised three scenarios to illustrate common vulnerabilities that compromise trust and pathways to strengthen trust and utilization of vaccines, specifically looking at weak health systems, harmful communication channels, and role of social capital. Spill-over effects, interactions and other dynamics in the CLD were then examined to assess leverage points to counter these vulnerabilities. Results Trust in vaccination arises from the interactions among experiences with the health system, the various forms of communication and social capital – both external and internal to communities. When experiencing system-wide shocks such as the case in Ebola-affected countries, distrust is reinforced by feedback between the health and immunization systems where distrust often lingers even after systems are restored and spills over beyond vaccination in the broader health system. Vaccine myths or anti-vaccine movements reinforce distrust. Social capital – the collective value of social networks of community members – plays a central role in increasing levels of trust. Conclusions Trust is important, yet underexplored, in the context of vaccine utilization. Using a CLD to

  7. Measurement of worker perceptions of trust and safety climate in managers and supervisors at commercial grain elevators.

    Science.gov (United States)

    Mosher, G A; Keren, N; Freeman, S A; Hurburgh, C R

    2013-04-01

    The safety climate of an agricultural workplace may be affected by several things, including the level of trust that workers have in their work group supervisor and organizational management. Safety climate has been used by previous safety researchers as a measure of worker perceptions of the relative importance of safety as compared with other operational goals. Trust has been linked to several positive safety outcomes, particularly in hazardous work environments, but has not been examined relative to safety climate in the perennially hazardous work environment of a commercial grain elevator. In this study, 177 workers at three Midwest grain elevator companies completed online surveys measuring their perceptions of trust and safety at two administrative levels: organizational management and work group supervisors. Positive and significant relationships were noted between trust and safety climate perceptions for organizational managers and for work group supervisors. Results from this research suggest that worker trust in organizational management and work group supervisors has a positive influence on the employees' perceptions of safety climate at the organizational and work group levels in an agricultural workplace.

  8. Trust and risk: a model for medical education.

    Science.gov (United States)

    Damodaran, Arvin; Shulruf, Boaz; Jones, Philip

    2017-09-01

    Health care delivery, and therefore medical education, is an inherently risky business. Although control mechanisms, such as external audit and accreditation, are designed to manage risk in clinical settings, another approach is 'trust'. The use of entrustable professional activities (EPAs) represents a deliberate way in which this is operationalised as a workplace-based assessment. Once engaged with the concept, clinical teachers and medical educators may have further questions about trust. This narrative overview of the trust literature explores how risk, trust and control intersect with current thinking in medical education, and makes suggestions for potential directions of enquiry. Beyond EPAs, the importance of trust in health care and medical education is reviewed, followed by a brief history of trust research in the wider literature. Interpersonal and organisational levels of trust and a model of trust from the management literature are used to provide the framework with which to decipher trust decisions in health care and medical education, in which risk and vulnerability are inherent. In workplace learning and assessment, the language of 'trust' may offer a more authentic and practical vocabulary than that of 'competency' because clinical and professional risks are explicitly considered. There are many other trust relationships in health care and medical education. At the most basic level, it is helpful to clearly delineate who is the trustor, the trustee, and for what task. Each relationship has interpersonal and organisational elements. Understanding and considered utilisation of trust and control mechanisms in health care and medical education may lead to systems that maturely manage risk while actively encouraging trust and empowerment. © 2017 John Wiley & Sons Ltd and The Association for the Study of Medical Education.

  9. Earning public trust and confidence: Requisites for managing radioactive wastes. Final report

    Energy Technology Data Exchange (ETDEWEB)

    1993-11-01

    The Task Force on Radioactive Waste Management was created in April 1991 by former Secretary James D. Watkins, who asked the group to analyze the critical institutional question of how the Department of Energy (DOE) might strengthen public trust and confidence in the civilian radioactive waste management program. The panel met eight times over a period of 27 months and heard formal presentations from nearly 100 representatives of state and local governments, non-governmental organizations, and senior DOE Headquarters and Field Office managers. The group also commissioned a variety of studies from independent experts, contracted with the National Academy of Sciences and the National Academy of Public Administration to hold workshops on designing and leading trust-evoking organizations, and carried out one survey of parties affected by the Department`s radioactive waste management activities and a second one of DOE employees and contractors.

  10. Earning public trust and confidence: Requisites for managing radioactive wastes. Final report

    International Nuclear Information System (INIS)

    1993-11-01

    The Task Force on Radioactive Waste Management was created in April 1991 by former Secretary James D. Watkins, who asked the group to analyze the critical institutional question of how the Department of Energy (DOE) might strengthen public trust and confidence in the civilian radioactive waste management program. The panel met eight times over a period of 27 months and heard formal presentations from nearly 100 representatives of state and local governments, non-governmental organizations, and senior DOE Headquarters and Field Office managers. The group also commissioned a variety of studies from independent experts, contracted with the National Academy of Sciences and the National Academy of Public Administration to hold workshops on designing and leading trust-evoking organizations, and carried out one survey of parties affected by the Department's radioactive waste management activities and a second one of DOE employees and contractors

  11. Technology Trust and E-Banking Adoption: The Mediating Effect of Customer Relationship Management Performance

    Directory of Open Access Journals (Sweden)

    Samsudin Wahab

    2012-01-01

    Full Text Available The electronic revolution in the Malaysian banking sector has started in the 1970's. The first visible form of electronic innovation in the Malaysian banking industry was the introduction of Automated Teller Machines in 1981. Finally, on June 1, 2000, the Malaysian Central Bank gave the green light for locally owned commercial banks to offer Internet banking services. Due to the drastic changes in the business environment, it leads financial institutions to revise their marketing strategies to stress long-lasting relationships with customers. Relationships is important criteria in the selection of private bank. In many conditions, customer satisfaction mediates the relationship between antecedent’s factors and marketing performance. Hence, CRM performance is about maintaining good relationship and repurchases behavior, word-of-mouth and customer retention. Trust has been studied in traditional physical commercial environments. In the marketing and management literatures, trust is strongly associated with attitudes toward products, services, and purchasing behaviors. So that, the main objective of this research paper is to investigate the role of CRM performance as the mediator in the relationship between trust and E-Banking adoption. Hence, this empirical paper confirmed the role of customer relationship management performance as the mediators in the relationship between trust and electronic banking adoption.Key words: Trust, Customer Relationship Management Performance, E-Banking Adoption

  12. Identity Management and Trust Services: Foundations for Cloud Computing

    Science.gov (United States)

    Suess, Jack; Morooney, Kevin

    2009-01-01

    Increasingly, IT organizations will move from providing IT services locally to becoming an integrator of IT services--some provided locally and others provided outside the institution. As a result, institutions must immediately begin to plan for shared services and must understand the essential role that identity management and trust services play…

  13. Building Trust in Natural Resource Management Within Local Communities: A Case Study of the Midewin National Tallgrass Prairie

    Science.gov (United States)

    Davenport, Mae A.; Leahy, Jessica E.; Anderson, Dorothy H.; Jakes, Pamela J.

    2007-03-01

    Communities neighboring federally protected natural areas regularly weigh the costs and benefits of the administering agency’s programs and policies. While most agencies integrate public opinion into decision making, efforts to standardize and formalize public involvement have left many local communities feeling marginalized, spurring acrimony and opposition. A significant body of research has examined barriers to effective public participation as well as strategies for relationship building in planning processes; many of which point to trust as a key factor. Trust is especially tenuous in local communities. This paper explores perceptions of trust, expectations for management, as well as constraints to building trust. In-depth interviews were conducted with 21 community members and USDA Forest Service personnel at the Midewin National Tallgrass Prairie in northeastern Illinois. The interviews revealed that trust is perceived as important to effective management. Distinct expectations for management outcomes and processes emerged, including the values, knowledge, and capacity demonstrated in management decisions and actions and opportunities provided for communication, collaboration, and cooperation within the agency-community relationship. The case study identified several constraints to building trust, including competing values, knowledge gaps, limited community engagement, and staff turnover.

  14. A management approach that drives actions strategically: balanced scorecard in a mental health trust case study.

    Science.gov (United States)

    Schmidt, Stefan; Bateman, Ian; Breinlinger-O'Reilly, Jochen; Smith, Peter

    2006-01-01

    Achieving excellence is a current preoccupation in U.K. public health organisations. This article aims to use a case study to explain how a mental health trust delivers excellent performance using a balanced scorecard (BSC) management approach. Reports a project to implement a BSC approach in the South West Yorkshire Mental Health NHS Trust to achieve its "excellence" objectives. The authors were participants in the project. The design of the pilot project was informed theoretically by the work of Kaplan and Norton and practically by in-house discussions on a strategy to achieve excellence. Explains the process of building a BSC strategy step-by-step. Discusses how the vision and strategies of a mental health trust can be translated into tangible measures, which are the basis for actions that are driven strategically. There are many possibilities for a BSC management approach and this case study is specific to mental health trusts in the UK, although it is believed that the case has a universally applicable modus operandi. This article will help healthcare managers to evaluate the benefits of a BSC management approach. This article explains how actions can be structured in connection with a BSC management approach.

  15. 78 FR 23318 - Trust for Professional Managers and Aurora Investment Management L.L.C.; Notice of Application

    Science.gov (United States)

    2013-04-18

    ... subadvisory agreements (``Subadvisory Agreements'') with Chicago Fundamental Investment Partners, LLC, First... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 30460; 812-14113] Trust for Professional Managers and Aurora Investment Management L.L.C.; Notice of Application April 12, 2013. AGENCY...

  16. The relationship between servant leadership and employee empowerment, commitment, trust and innovative behaviour: A project management perspective

    Directory of Open Access Journals (Sweden)

    Camilla L. Krog

    2015-10-01

    Full Text Available Orientation: Understanding the relationship between a project sponsor’s servant leadership traits and employee commitment, trust and innovative behaviour. Research purpose: This study aimed to understand the relationship, if any, between a project sponsor’s servant leadership traits of altruistic calling, emotional healing, wisdom, persuasive mapping and organisational stewardship and a project team’s empowerment, commitment, trust and innovative behaviour. Motivation of the study: Most project leadership studies focus on understanding the role and power position of the project manager, with very little research being dedicated to understanding the effect the leadership style has on the project team and project success. Research approach: A survey was conducted amongst a non-probability sample of 48 project team members from amongst a population of 257, comprising project managers, business analysts and IT staff of a medium sized fleet management organisation that is in the process of implementing an entirely new enterprise resource planning system. Main findings: Through inferential statistical analysis, using structural equation modelling and path analysis, it was determined that persuasive mapping has the strongest impact on employee innovative behaviour, followed by employee commitment and trust via the mediator of employee perceived empowerment. Wisdom and organisational stewardship had a negative impact on employee perceived empowerment. Practical/managerial implications: Project sponsors need to exhibit persuasive mapping, altruistic calling and emotional healing traits due to the significant influence that these have on employee innovative behaviour, commitment and trust, albeit through their perceived empowerment. Contribution/value-add: This study contributes to knowledge of leadership, more especially servant leadership and its significance in project management, which knowledge may contribute to project success

  17. Trust in Co-sourced Software Development

    DEFF Research Database (Denmark)

    Schlichter, Bjarne Rerup; Persson, John Stouby

    2014-01-01

    Software development projects are increasingly geographical distributed with offshoring. Co-sourcing is a highly integrative and cohesive approach, seen successful, to software development offshoring. However, research of how dynamic aspects of trust are shaped in co-sourcing activities is limite...... understanding or personal trust relations. The paper suggests how certain work practices among developers and managers can be explained using a dynamic trust lens based on Abstract Systems, especially dis- and re-embedding mechanisms......Software development projects are increasingly geographical distributed with offshoring. Co-sourcing is a highly integrative and cohesive approach, seen successful, to software development offshoring. However, research of how dynamic aspects of trust are shaped in co-sourcing activities is limited...

  18. Core TuLiP - Logic Programming for Trust Management

    NARCIS (Netherlands)

    Czenko, M.R.; Etalle, Sandro; Dahl, V.; Niemelä, I.

    2007-01-01

    We propose CoreTuLiP - the core of a trust management language based on Logic Programming. CoreTuLiP is based on a subset of moded logic programming, but enjoys the features of TM languages such as RT; in particular clauses are issued by different authorities and stored in a distributed manner. We

  19. Trust makers, breakers and brokers: building trust in the Australian food system

    OpenAIRE

    Wilson, Annabelle; Coveney, John; Henderson, Julie; Meyer, Samantha; Calnan, Michael; Caraher, Martin; Webb, Trevor; Elliott, Anthony; Ward, Paul

    2013-01-01

    Background The importance of consumer trust in the food supply has previously been identified, and dimensions of consumer trust in food?who they trust and the type of trust that they exhibit?has been explored. However, there is a lack of research about the mechanisms through which consumer trust in the food supply is developed, maintained, broken and repaired. This study seeks to address this gap by exploring if, and how, consumer trust in the food supply is considered by the media, food indu...

  20. Modelling End-User of Electronic-Government Service: The Role of Information quality, System Quality and Trust

    Science.gov (United States)

    Witarsyah Jacob, Deden; Fudzee, Mohd Farhan Md; Aizi Salamat, Mohamad; Kasim, Shahreen; Mahdin, Hairulnizam; Azhar Ramli, Azizul

    2017-08-01

    Many governments around the world increasingly use internet technologies such as electronic government to provide public services. These services range from providing the most basic informational website to deploying sophisticated tools for managing interactions between government agencies and beyond government. Electronic government (e-government) aims to provide a more accurate, easily accessible, cost-effective and time saving for the community. In this study, we develop a new model of e-government adoption service by extending the Unified Theory of Acceptance and Use of Technology (UTAUT) through the incorporation of some variables such as System Quality, Information Quality and Trust. The model is then tested using a large-scale, multi-site survey research of 237 Indonesian citizens. This model will be validated by using Structural Equation Modeling (SEM). The result indicates that System Quality, Information Quality and Trust variables proven to effect user behavior. This study extends the current understanding on the influence of System Quality, Information Quality and Trust factors to researchers, practitioners, and policy makers.

  1. Trusted computing for embedded systems

    CERN Document Server

    Soudris, Dimitrios; Anagnostopoulos, Iraklis

    2015-01-01

    This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. Case studies are used to present new techniques designed as industrial security solutions. Coverage includes development of tamper resistant hardware and firmware mechanisms for lightweight embedded devices, as well as those serving as security anchors for embedded platforms required by applications such as smart power grids, smart networked and home appliances, environmental and infrastructure sensor networks, etc. ·         Enables readers to address a variety of security threats to embedded hardware and software; ·         Describes design of secure wireless sensor networks, to address secure authen...

  2. A Model of Trust for Developing Trustworthy Systems From Untrustworthy Actors

    National Research Council Canada - National Science Library

    Ray, Indrajit; Ray, Indrakshi

    2007-01-01

    The objective of this effort is to develop a new model of trust that allowed one to reason about trust relationships in information systems with special emphasis on trust as it related to integrity and availability...

  3. Know what you trust

    NARCIS (Netherlands)

    Spiessens, F.; den Hartog, Jeremy; Etalle, Sandro; Degano, P.; Guttman, J. D.; Martinelli, F.

    2009-01-01

    In Decentralized Trust Management (DTM) authorization decisions are made by multiple principals who can also delegate decisions to each other. Therefore, a policy change of one principal will often affect who gets authorized by another principal. In such a system of influenceable authorization a

  4. The effect of system aesthetics on trust, cooperation, satisfaction and annoyance in an imperfect automated system.

    Science.gov (United States)

    Weinstock, Alona; Oron-Gilad, Tal; Parmet, Yisrael

    2012-01-01

    Lack of system reliability has been repeatedly identified as a factor that decreases trust. However, aesthetics has an important role in the development of trust. Most of the research concerning the connection between aesthetics and trust focused on mobile commerce and websites while very little has been done in examining aesthetics in automated systems. This study integrated aesthetics manipulations into an imperfect in-vehicle automation system and focused on the power of aesthetics to decrease the negative effects of errors on trust, satisfaction, annoyance, and human-automation cooperation perceptions. Participants used the navigation system in either 100% or 85% accuracy levels with an aesthetic or non aesthetic system (4 conditions). In both aesthetic and non aesthetic systems, perceptions of trust, satisfaction and human automation cooperation were decreased in the imperfect system compared to the perfect one. However, in the annoyance rating, this trend was found only in the aesthetic system while in the non-aesthetic system no difference was found between the two levels of accuracy. This single effect may indicate upon the possibility that in automated systems aesthetics affects trust and satisfaction more moderately compared to mobile commerce applications and websites. However, more research is needed to assess this assumption.

  5. A Cloud Theory-Based Trust Computing Model in Social Networks

    Directory of Open Access Journals (Sweden)

    Fengming Liu

    2016-12-01

    Full Text Available How to develop a trust management model and then to efficiently control and manage nodes is an important issue in the scope of social network security. In this paper, a trust management model based on a cloud model is proposed. The cloud model uses a specific computation operator to achieve the transformation from qualitative concepts to quantitative computation. Additionally, this can also be used to effectively express the fuzziness, randomness and the relationship between them of the subjective trust. The node trust is divided into reputation trust and transaction trust. In addition, evaluation methods are designed, respectively. Firstly, the two-dimension trust cloud evaluation model is designed based on node’s comprehensive and trading experience to determine the reputation trust. The expected value reflects the average trust status of nodes. Then, entropy and hyper-entropy are used to describe the uncertainty of trust. Secondly, the calculation methods of the proposed direct transaction trust and the recommendation transaction trust involve comprehensively computation of the transaction trust of each node. Then, the choosing strategies were designed for node to trade based on trust cloud. Finally, the results of a simulation experiment in P2P network file sharing on an experimental platform directly reflect the objectivity, accuracy and robustness of the proposed model, and could also effectively identify the malicious or unreliable service nodes in the system. In addition, this can be used to promote the service reliability of the nodes with high credibility, by which the stability of the whole network is improved.

  6. Achieving Optimal Privacy in Trust-Aware Social Recommender Systems

    Science.gov (United States)

    Dokoohaki, Nima; Kaleli, Cihan; Polat, Huseyin; Matskin, Mihhail

    Collaborative filtering (CF) recommenders are subject to numerous shortcomings such as centralized processing, vulnerability to shilling attacks, and most important of all privacy. To overcome these obstacles, researchers proposed for utilization of interpersonal trust between users, to alleviate many of these crucial shortcomings. Till now, attention has been mainly paid to strong points about trust-aware recommenders such as alleviating profile sparsity or calculation cost efficiency, while least attention has been paid on investigating the notion of privacy surrounding the disclosure of individual ratings and most importantly protection of trust computation across social networks forming the backbone of these systems. To contribute to addressing problem of privacy in trust-aware recommenders, within this paper, first we introduce a framework for enabling privacy-preserving trust-aware recommendation generation. While trust mechanism aims at elevating recommender's accuracy, to preserve privacy, accuracy of the system needs to be decreased. Since within this context, privacy and accuracy are conflicting goals we show that a Pareto set can be found as an optimal setting for both privacy-preserving and trust-enabling mechanisms. We show that this Pareto set, when used as the configuration for measuring the accuracy of base collaborative filtering engine, yields an optimized tradeoff between conflicting goals of privacy and accuracy. We prove this concept along with applicability of our framework by experimenting with accuracy and privacy factors, and we show through experiment how such optimal set can be inferred.

  7. Security, privacy and trust in cloud systems

    CERN Document Server

    Nepal, Surya

    2013-01-01

    The book compiles technologies for enhancing and provisioning security, privacy and trust in cloud systems based on Quality of Service requirements. It is a timely contribution to a field that is gaining considerable research interest, momentum, and provides a comprehensive coverage of technologies related to cloud security, privacy and trust. In particular, the book includes - Cloud security fundamentals and related technologies to-date, with a comprehensive coverage of evolution, current landscape, and future roadmap. - A smooth organization with introductory, advanced and specialist content

  8. An Operational Semantics for Trust Policies

    DEFF Research Database (Denmark)

    Krukow, Karl

    2006-01-01

    In the trust-structure framework for trust management, principals specify their trusting relationships in terms of trust policies. In their paper on trust structures, Carbone et al. present a language for such policies, and provide a suitable denotational semantics. The semantics ensures that for......In the trust-structure framework for trust management, principals specify their trusting relationships in terms of trust policies. In their paper on trust structures, Carbone et al. present a language for such policies, and provide a suitable denotational semantics. The semantics ensures...... that for any collection of policies, there is always a unique global trust-state, compatible with all the policies, specifying everyone's degree of trust in everyone else. However, as the authors themselves point out, the language lacks an operational model: the global trust-state is a well......-defined mathematical object, but it is not clear how principals can actually compute it. This becomes even more apparent when one considers the intended application environment: vast numbers of autonomous principals, distributed and possibly mobile. We provide a compositional operational semantics for a language...

  9. Trust-Based Leadership in the Making

    DEFF Research Database (Denmark)

    Bentzen, Tina Øllgaard; Jagd, Søren

    I spite of the popularity of trust-based leadership in consultancy and popular management writings empirical research on the transformation from traditional top-down to trust-based leadership is still limited. In this paper we study the implementation of a trust-based leadership reform in the City...... of Copenhagen taking place since 2012. We focus on understanding the trust dynamics in this major transformation. We show that the implementation of trust-based leadership should be seen as an emergent process involving a variety of actors within the organization. The case study reveals that the Trust Reform...... indicates that the implementation of a radical management reform involves a complex interplay of trust relations between actors at multiple levels of the organization....

  10. Trust

    OpenAIRE

    Söllner, Matthias; Benbasat, Izak; Gefen, David; Leimeister, Jan Marco; Pavlou, Paul A.

    2016-01-01

    Trust is the enabler of social interaction. Although the origins of research on trust traditionally lie outside the Information Systems (IS) domain, the importance of trust for IS research rapidly grew in the late 1990s, and it is still growing with the increasing ubiquity and advancement of technology in organizations, virtual teams, online markets, and user-technology interactions. Theoretically, the central role of trust is tied to the growing social change that Information and Communicati...

  11. Analyzing Trust Perceptions in System Implementations

    DEFF Research Database (Denmark)

    Schlichter, Bjarne Rerup; Rose, Jeremy

    2009-01-01

    ' perceptions of trust relations influence future actions, and in this way have both negative and positive consequences. We also conclude that Giddens' theories of trust provide a promising insight into the dynamic aspects of trust relations in implementation projects, which go further than trust theories...... a framework based on Giddens´ theory of modernity. The framework theorizes dynamic elements of the evolution of trust, not previously investigated in this context. The data collection involves 4 actors interviewed twice in 2006 and 2007; and the data analysis strategy is content analysis using Nvivo software...

  12. Trust and management : Explaining cross-national differences in work autonomy

    NARCIS (Netherlands)

    van Hoorn, A.A.J.

    2013-01-01

    We open the black box of what goes on in firms in terms of management of their operations. Work autonomy is a key aspect of firm organization and we test the hypothesis that societal trust affects the level of autonomy that firms grant to their employees. Analysis of up to 189,213 individuals from

  13. Trust that binds: the impact of collective felt trust on organizational performance.

    Science.gov (United States)

    Salamon, Sabrina Deutsch; Robinson, Sandra L

    2008-05-01

    The impact of employees' collective perceptions of being trusted by management was examined with a longitudinal study involving 88 retail stores. Drawing on the appropriateness framework (March, 1994; Weber, Kopelman, & Messick, 2004), the authors develop and test a model showing that when employees in an organization perceive they are trusted by management, increases in the presence of responsibility norms, as well as in the sales performance and customer service performance of the organization, are observed. Moreover, the relationship between perceptions of being trusted and sales performance is fully mediated by responsibility norms. PsycINFO Database Record (c) 2008 APA, all rights reserved.

  14. Trust Threshold Based Public Key Management in Mobile Ad Hoc Networks

    Science.gov (United States)

    2016-03-05

    detection 49 [6,7] , authentication, access control, key management, iso- 50 lating misbehaving nodes for effective routing [6,8,9] , and 51 many other...83 84 85 aims to achieve: (a) resiliency against misbehaving nodes 86 in the network to maintain minimum security vulnerabil- 87 ity; (b...neighbor will decreas the misbehaving node’s direct competence trust. Fur thermore, this neighbor when acting as a recommended public key management in

  15. Supporting reputation based trust management enhancing security layer for cloud service models

    Science.gov (United States)

    Karthiga, R.; Vanitha, M.; Sumaiya Thaseen, I.; Mangaiyarkarasi, R.

    2017-11-01

    In the existing system trust between cloud providers and consumers is inadequate to establish the service level agreement though the consumer’s response is good cause to assess the overall reliability of cloud services. Investigators recognized the significance of trust can be managed and security can be provided based on feedback collected from participant. In this work a face recognition system that helps to identify the user effectively. So we use an image comparison algorithm where the user face is captured during registration time and get stored in database. With that original image we compare it with the sample image that is already stored in database. If both the image get matched then the users are identified effectively. When the confidential data are subcontracted to the cloud, data holders will become worried about the confidentiality of their data in the cloud. Encrypting the data before subcontracting has been regarded as the important resources of keeping user data privacy beside the cloud server. So in order to keep the data secure we use an AES algorithm. Symmetric-key algorithms practice a shared key concept, keeping data secret requires keeping this key secret. So only the user with private key can decrypt data.

  16. Towards Trust-based Cognitive Networks: A Survey of Trust Management for Mobile Ad Hoc Networks

    Science.gov (United States)

    2009-06-01

    of trust. First, social trust refers to properties derived from social relationships . Examples of social networks are strong social ... relationships such as colleagues or relatives or loose social relationships such as school alumni or friends with common interests [44]. Social trust may...also use social relationships in evaluating the trust metric among group members by employing the concept of social networks. Yu et al. [44] define

  17. Trusted computing strengthens cloud authentication.

    Science.gov (United States)

    Ghazizadeh, Eghbal; Zamani, Mazdak; Ab Manan, Jamalul-lail; Alizadeh, Mojtaba

    2014-01-01

    Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM). Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM) are great technologies for solving the trust and security concerns in the cloud identity environment. Single sign-on (SSO) and OpenID have been released to solve security and privacy problems for cloud identity. This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in .Net environment. Security analyzing, simulation, and BLP confidential model are three ways to evaluate and analyze our proposed model.

  18. Trusted Computing Strengthens Cloud Authentication

    Directory of Open Access Journals (Sweden)

    Eghbal Ghazizadeh

    2014-01-01

    Full Text Available Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM. Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM are great technologies for solving the trust and security concerns in the cloud identity environment. Single sign-on (SSO and OpenID have been released to solve security and privacy problems for cloud identity. This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in .Net environment. Security analyzing, simulation, and BLP confidential model are three ways to evaluate and analyze our proposed model.

  19. Trusted Computing Strengthens Cloud Authentication

    Science.gov (United States)

    2014-01-01

    Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM). Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM) are great technologies for solving the trust and security concerns in the cloud identity environment. Single sign-on (SSO) and OpenID have been released to solve security and privacy problems for cloud identity. This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in .Net environment. Security analyzing, simulation, and BLP confidential model are three ways to evaluate and analyze our proposed model. PMID:24701149

  20. Trust in management, communication and organisational commitment: Factors influencing readiness for change management in organisation

    Science.gov (United States)

    Ahmad, Mohd Hafis; Ismail, Syuhaida; Rani, Wan Nurul Mardiah Wan Mohd; Wahab, Mohammad Hussaini

    2017-10-01

    Organisational change occurs when an organisation makes a transition from its current state to some desired future state in minimising employee resistance and cost to the organisation while simultaneously maximising the effectiveness of the change effort. This paper, aims at appraising the change management of organisation in Malaysia since limited research has been done to examine readiness for change by the employees in the organisation. This paper is materialising its objectives of (1) investigating the current practice of organisation and employees in the organisation towards change management and (2) assessing the factors influencing readiness of organisation and employees in the organisation towards change management. It is found via literature review that change management is a structured approach for ensuring that changes are thoroughly and smoothly implemented to transitioning individuals, teams, and organisations to a desired future state by focusing on the wider impacts of change, particularly on people, where change does not happen in isolation and it impacts the whole organisation. Furthermore, it is found that current practice of organisation and employees in the organisation towards change management involved in three main factors, namely trust in management, communication and organisational commitment; with the factor for trust in management is the positive vision for the future by management team, meanwhile for communication, it is found that there is good communication between supervisors and employees about the organisation's policy toward the changes. The factor found in organisational commitment is employees enjoying discussing about their organisation with outsiders. The findings of this paper provide a positive impact on change management planning, which ultimately help in ensuring more effective change programme implementation in the organisation in Malaysia.

  1. Overview of royalty trusts

    International Nuclear Information System (INIS)

    Panarites, P.

    1996-01-01

    The nature of royalty trusts as a means of financing exploration, development, production, and refining of oil sand and heavy oil to produce competitively marketable petroleum products, was reviewed. Attributes of the two distinct classes of royalty trusts - reflexive class and the fundamental class royalty trusts - and the considerations underlying each one, were summarized. The overall conclusion was that the future performance of conventional oil and gas royalty trusts (reflexive class) will depend heavily on interest rate levels and management's ability to complete acquisitions financed with new trust unit issues. Fundamental class royalty trusts also offer long term pure exposure to the underlying business, in addition to yield

  2. A Smart Trust Management Method to Detect On-Off Attacks in the Internet of Things

    Directory of Open Access Journals (Sweden)

    Jean Caminha

    2018-01-01

    Full Text Available Internet of Things (IoT resources cooperate with themselves for requesting and providing services. In heterogeneous and complex environments, those resources must trust each other. On-Off attacks threaten the IoT trust security through nodes performing good and bad behaviors randomly, to avoid being rated as a menace. Some countermeasures demand prior levels of trust knowledge and time to classify a node behavior. In some cases, a malfunctioning node can be mismatched as an attacker. In this paper, we introduce a smart trust management method, based on machine learning and an elastic slide window technique that automatically assesses the IoT resource trust, evaluating service provider attributes. In simulated and real-world data, this method was able to identify On-Off attackers and fault nodes with a precision up to 96% and low time consumption.

  3. Communication Management and Trust: Their Role in Building Resilience to "Surprises" Such As Natural Disasters, Pandemic Flu, and Terrorism

    Directory of Open Access Journals (Sweden)

    P. H. Longstaff

    2008-06-01

    Full Text Available In times of public danger such as natural disasters and health emergencies, a country's communication systems will be some of its most important assets because access to information will make individuals and groups more resilient. Communication by those charged with dealing with the situation is often critical. We analyzed reports from a wide variety of crisis incidents and found a direct correlation between trust and an organization's preparedness and internal coordination of crisis communication and the effectiveness of its leadership. Thus, trust is one of the most important variables in effective communication management in times of "surprise."

  4. I trust it, but I don't know why: effects of implicit attitudes toward automation on trust in an automated system.

    Science.gov (United States)

    Merritt, Stephanie M; Heimbaugh, Heather; LaChapell, Jennifer; Lee, Deborah

    2013-06-01

    This study is the first to examine the influence of implicit attitudes toward automation on users' trust in automation. Past empirical work has examined explicit (conscious) influences on user level of trust in automation but has not yet measured implicit influences. We examine concurrent effects of explicit propensity to trust machines and implicit attitudes toward automation on trust in an automated system. We examine differential impacts of each under varying automation performance conditions (clearly good, ambiguous, clearly poor). Participants completed both a self-report measure of propensity to trust and an Implicit Association Test measuring implicit attitude toward automation, then performed an X-ray screening task. Automation performance was manipulated within-subjects by varying the number and obviousness of errors. Explicit propensity to trust and implicit attitude toward automation did not significantly correlate. When the automation's performance was ambiguous, implicit attitude significantly affected automation trust, and its relationship with propensity to trust was additive: Increments in either were related to increases in trust. When errors were obvious, a significant interaction between the implicit and explicit measures was found, with those high in both having higher trust. Implicit attitudes have important implications for automation trust. Users may not be able to accurately report why they experience a given level of trust. To understand why users trust or fail to trust automation, measurements of implicit and explicit predictors may be necessary. Furthermore, implicit attitude toward automation might be used as a lever to effectively calibrate trust.

  5. 76 FR 45198 - Indian Trust Management Reform-Implementation of Statutory Changes

    Science.gov (United States)

    2011-07-28

    ... Parts 4, 30 [Docket ID BIA-2009-0001] RIN 1076-AF07 Indian Trust Management Reform--Implementation of Statutory Changes AGENCY: Bureau of Indian Affairs, Office of the Secretary, Interior. ACTION: Final rule... February 10, 2011, to implement the latest statutory changes to the Indian Land Consolidation Act, as...

  6. Trust and Reputation Management for Critical Infrastructure Protection

    Science.gov (United States)

    Caldeira, Filipe; Monteiro, Edmundo; Simões, Paulo

    Today's Critical Infrastructures (CI) depend of Information and Communication Technologies (ICT) to deliver their services with the required level of quality and availability. ICT security plays a major role in CI protection and risk prevention for single and also for interconnected CIs were cascading effects might occur because of the interdependencies that exist among different CIs. This paper addresses the problem of ICT security in interconnected CIs. Trust and reputation management using the Policy Based Management paradigm is the proposed solution to be applied at the CI interconnection points for information exchange. The proposed solution is being applied to the Security Mediation Gateway being developed in the European FP7 MICIE project, to allow for information exchange among interconnected CIs.

  7. Protecting Mobile Crowd Sensing against Sybil Attacks Using Cloud Based Trust Management System

    Directory of Open Access Journals (Sweden)

    Shih-Hao Chang

    2016-01-01

    Full Text Available Mobile crowd sensing (MCS arises as a new sensing paradigm, which leverages citizens for large-scale sensing by various mobile devices to efficiently collect and share local information. Unlike other MCS application challenges that consider user privacy and data trustworthiness, this study focuses on the network trustworthiness problem, namely, Sybil attacks in MCS network. The Sybil attack in computer security is a type of security attack, which illegally forges multiple identities in peer-to-peer networks, namely, Sybil identities. These Sybil identities will falsify multiple identities that negatively influence the effectiveness of sensing data in this MCS network or degrading entire network performance. To cope with this problem, a cloud based trust management scheme (CbTMS was proposed to detect Sybil attacks in the MCS network. The CbTMS was proffered for performing active and passive checking scheme, in addition to the mobile PCS trustworthiness management, and includes a decision tree algorithm, to verify the covered nodes in the MCS network. Simulation studies show that our CbTMS can efficiently detect the malicious Sybil nodes in the network and cause 6.87 Wh power reduction compared with other malicious Sybil node attack mode.

  8. The Effects of Parental Involvement, Trust in Parents, Trust in Students and Pupil Control Ideology on Conflict Management Strategies of Early Childhood Teachers

    Science.gov (United States)

    Karakus, Mehmet; Savas, Ahmet Cezmi

    2012-01-01

    In this study it was aimed to determine the effects of parental involvement, teachers' trust in parents and students, and teachers' pupil control ideology on the conflict management strategies used by teachers in classroom management. Data were collected from a sample of 254 teachers through paper and pencil questionnaires. Data were analyzed with…

  9. Fording Canadian Coal Trust

    Energy Technology Data Exchange (ETDEWEB)

    Popowich, J.; Millos, R. [Elk Valley Coal Corporation, Calgary, AB (Canada)

    2004-07-01

    This is the first of five slide/overhead presentations presented at the Fording Canadian Coal Trust and Tech Cominco Ltd. investor day and mine tour. The Fording Canadian Coal Trust is described. The Trust's assets comprise six Elk Valley metallurgical coal mines and six wollastonite operations (in the NYCO Group). Trust structure, corporate responsibility, organizational structure, reserves and resources, management philosophy, operating strategies, steel market dynamics, coal market, production expansion, sales and distribution are outlined. 15 figs., 5 tabs.

  10. 36 CFR 1011.9 - When will the Presidio Trust transfer a debt to the Financial Management Service for collection?

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false When will the Presidio Trust transfer a debt to the Financial Management Service for collection? 1011.9 Section 1011.9 Parks, Forests... When will the Presidio Trust transfer a debt to the Financial Management Service for collection? (a...

  11. Balancing Trust and Control

    DEFF Research Database (Denmark)

    Jagd, Søren

    2010-01-01

    of balancing trust and control becomes an issue that deserve ongoing attention. This paper adds to the discussion on the relation between trust and control by showing that the process perspective reframes the problem of balancing trust and control. More generally, by demonstrating the importance of the process......The purpose of this paper is to show that conceptualizing trust and control as interactively related processes, as opposed to more static conceptualizations of the two concepts and the relations between them, adds importantly towards understanding the challenges involved in balancing of trust...... on trust and control made the problem of finding a balance between trust and control a once and for all decision the process perspective introduced here implies that balancing trust and control is an ongoing process of balancing and rebalancing. The implication for management is that the problem...

  12. Public Trust in Health Information Sharing: Implications for Biobanking and Electronic Health Record Systems

    Directory of Open Access Journals (Sweden)

    Jodyn Platt

    2015-02-01

    Full Text Available Biobanks are made all the more valuable when the biological samples they hold can be linked to health information collected in research, electronic health records, or public health practice. Public trust in such systems that share health information for research and health care practice is understudied. Our research examines characteristics of the general public that predict trust in a health system that includes researchers, health care providers, insurance companies and public health departments. We created a 119-item survey of predictors and attributes of system trust and fielded it using Amazon’s MTurk system (n = 447. We found that seeing one’s primary care provider, having a favorable view of data sharing and believing that data sharing will improve the quality of health care, as well as psychosocial factors (altruism and generalized trust were positively and significantly associated with system trust. As expected, privacy concern, but counterintuitively, knowledge about health information sharing were negatively associated with system trust. We conclude that, in order to assure the public’s trust, policy makers charged with setting best practices for governance of biobanks and access to electronic health records should leverage critical access points to engage a diverse public in joint decision making.

  13. Nuclear Waste Management, Nuclear Power, and Energy Choices Public Preferences, Perceptions, and Trust

    CERN Document Server

    Greenberg, Michael

    2013-01-01

    Hundreds of studies have investigated public perceptions and preferences about nuclear power, waste management, and technology. However there is clear lack of uniformity in the style, aims and methods applied.  Consequently, the body of results is inconsistent and it is difficult to isolate relevant patterns or interpretations. Nuclear Waste Management, Nuclear Power and Energy Choices: Public Preferences, Perceptions and Trust presents a theoretical base for public reactions then classifies and reviews the large body of surveys carried out over the past decade.   Particular focus is placed on residents within 50 miles US nuclear waste facilities due to the disproportionate presence of nuclear factors in their lives such as the legacy of nuclear waste disposal and job dependency. The motivations and reasons for their views such as fear, attraction to the economic benefits, trust of site managers and federal agencies, cultural views, personal history, and demographic attributes of the people are also conside...

  14. 77 FR 60732 - PACE Select Advisors Trust and UBS Global Asset Management (Americas) Inc.; Notice of Application

    Science.gov (United States)

    2012-10-04

    ....; Institutional Capital, LLC; J.P. Morgan Investment Management, Inc.; Kayne Anderson Rudnick Investment...; Standish Mellon Asset Management Company, LLC; Systematic Financial Management, L.P.; Wellington Management... Select Advisors Trust and UBS Global Asset Management (Americas) Inc.; Notice of Application September 27...

  15. Framework model and principles for trusted information sharing in pervasive health.

    Science.gov (United States)

    Ruotsalainen, Pekka; Blobel, Bernd; Nykänen, Pirkko; Seppälä, Antto; Sorvari, Hannu

    2011-01-01

    Trustfulness (i.e. health and wellness information is processed ethically, and privacy is guaranteed) is one of the cornerstones for future Personal Health Systems, ubiquitous healthcare and pervasive health. Trust in today's healthcare is organizational, static and predefined. Pervasive health takes place in an open and untrusted information space where person's lifelong health and wellness information together with contextual data are dynamically collected and used by many stakeholders. This generates new threats that do not exist in today's eHealth systems. Our analysis shows that the way security and trust are implemented in today's healthcare cannot guarantee information autonomy and trustfulness in pervasive health. Based on a framework model of pervasive health and risks analysis of ubiquitous information space, we have formulated principles which enable trusted information sharing in pervasive health. Principles imply that the data subject should have the right to dynamically verify trust and to control the use of her health information, as well as the right to set situation based context-aware personal policies. Data collectors and processors have responsibilities including transparency of information processing, and openness of interests, policies and environmental features. Our principles create a base for successful management of privacy and information autonomy in pervasive health. They also imply that it is necessary to create new data models for personal health information and new architectures which support situation depending trust and privacy management.

  16. The Main Approaches to Using the Concept of Trust-Based Marketing in Trade Enterprises

    Directory of Open Access Journals (Sweden)

    Albina Basova

    2017-12-01

    Full Text Available The concept of trust and the main factors affecting it are analyzed. The essence of trust-based marketing and its tasks, the main strategies of building trust to an organization from the clients’ side are considered. The CRM system has been explored as a tool for managing customer relationships, and contemporary marketing technologies such as crowdsourcing and collaboration that develop trust are considered.

  17. Trust in automation: integrating empirical evidence on factors that influence trust.

    Science.gov (United States)

    Hoff, Kevin Anthony; Bashir, Masooda

    2015-05-01

    We systematically review recent empirical research on factors that influence trust in automation to present a three-layered trust model that synthesizes existing knowledge. Much of the existing research on factors that guide human-automation interaction is centered around trust, a variable that often determines the willingness of human operators to rely on automation. Studies have utilized a variety of different automated systems in diverse experimental paradigms to identify factors that impact operators' trust. We performed a systematic review of empirical research on trust in automation from January 2002 to June 2013. Papers were deemed eligible only if they reported the results of a human-subjects experiment in which humans interacted with an automated system in order to achieve a goal. Additionally, a relationship between trust (or a trust-related behavior) and another variable had to be measured. All together, 101 total papers, containing 127 eligible studies, were included in the review. Our analysis revealed three layers of variability in human-automation trust (dispositional trust, situational trust, and learned trust), which we organize into a model. We propose design recommendations for creating trustworthy automation and identify environmental conditions that can affect the strength of the relationship between trust and reliance. Future research directions are also discussed for each layer of trust. Our three-layered trust model provides a new lens for conceptualizing the variability of trust in automation. Its structure can be applied to help guide future research and develop training interventions and design procedures that encourage appropriate trust. © 2014, Human Factors and Ergonomics Society.

  18. Trust, performance and well-being in Nordic working life and management research

    DEFF Research Database (Denmark)

    Sørensen, Ole Henning; Hasle, Peter; Madsen, Christian Uhrenholdt

    2014-01-01

    In the last decades there has been a growing focus in working life and management research on sustainable organizational development that simultaneously improve organizational outcomes such as productivity and quality and employee outcomes such as well-being and job-satisfaction. Research has...... pointed to trust as an important component of participatory management practices having simultaneous positive outcomes for organizational productivity and employee well-being. The aim of this paper is to establish an overview of the results of Nordic working life and man-agement research inquiring...

  19. Trust and social representations of the management of threatened and endangered species

    Science.gov (United States)

    George Cvetkovich; Patricia L. Winter

    2003-01-01

    Using quantitative analysis of questionnaire responses, observations during focus group discussions, and qualitative assessment of discussion statements, the present study examined trust and social representations of the U.S. Forest Service's management of Southern California national forests for the protection of endangered species. Supporting expectations based...

  20. THE IMPACT OF TRUST ON KNOWLEDGE TRANSFER IN INTERNATIONAL BUSINESS SYSTEMS

    Directory of Open Access Journals (Sweden)

    Konstantinos P. ROTSIOS

    2012-12-01

    Full Text Available Over the last decade, international business alliances have emerged as one of the most important strategies for firms to expand in international markets. In addition, knowledge transfer has been determined as one of the key factors that lead to the creation of sustainable competitive advantage for firms and to the success of learning alliances. Furthermore, trust enhances the effectiveness of this process. The growing volume of published research in recent years has indubitably revealed the significant role of trust on knowledge transfer in International Business (IB Systems and in particular in International Strategic Alliances (ISAs and International Joint Ventures (IJVs. This paper consists of an in depth review of the most recent literature about the impact of trust on transfer of various types of knowledge in IB Systems with reference to the relevant theoretical models and the applications in the international context. The first section contains the theoretical background of the concept of trust, the different types of knowledge and the process of knowledge transfer. The main section refers to a few contemporary and distinguished scientific articles about the impact of trust as a determinant factor of knowledge transfer from the most recent international literature. The conclusions of the literature review and testable propositions related to the creation of trust among IJV partners and their impact on knowledge transfer are presented at the final section of the paper.

  1. Characterizing Economic and Social Properties of Trust and Reputation Systems in P2P Environment

    Institute of Scientific and Technical Information of China (English)

    Yu-Feng Wang; Yoshiaki Hori; Kouichi Sakurai

    2008-01-01

    Considering the fact that P2P (Peer-to-Peer) systems are self-organized and autonomous, social-control mechanism (like trust and reputation) is essential to evaluate the trustworthiness of participating peers and to combat the selfish, dishonest and malicious peer behaviors. So, naturally, we advocate that P2P systems that gradually act as an important information infrastructure should be multi-disciplinary research topic, and reflect certain features of our society. So, from economic and social perspective, this paper designs the incentive-compatible reputation feedback scheme based on well-known economic model, and characterizes the social features of trust network in terms of efficiency and cost. Specifically, our framework has two distinctive purposes: first, from high-level perspective, we argue trust system is a special kind of social network, and an accurate characterization of the structural properties of the network can be of fundamental importance to understand the dynamics of the system. Thus, inspired by the concept of weighted small-world, this paper proposes new measurements to characterize the social properties of trust system, that is, highg lobal and local efficiency, and low cost; then, from relative low-level perspective, we argue that reputation feedback is a special kind of information, and it is not free. So, based on economic model, VCG (Vickrey-Clarke-Grove)-like reputation remuneration mechanism is proposed to stimulate rational peers not only to provide reputation feedback, but truthfully offer feedback. Furthermore, considering that trust and reputation is subjective, we classify the trust into functional trust and referral trust, and extend the referral trust to include two factors: similarity and truthfulness, which can efficiently reduce the trust inference error. The preliminary simulation results show the benefits of our proposal and the emergence of certain social properties in trust network.

  2. Handbook for the Computer Security Certification of Trusted Systems

    National Research Council Canada - National Science Library

    Weissman, Clark

    1995-01-01

    Penetration testing is required for National Computer Security Center (NCSC) security evaluations of systems and products for the B2, B3, and A1 class ratings of the Trusted Computer System Evaluation Criteria (TCSEC...

  3. Consumer Trust in E-commerce

    OpenAIRE

    Gustavsson, Malin; Johansson, Anne-Marie

    2006-01-01

    An often mentioned reason for consumers not purchasing from Internet vendors, is the lack of trust. The lack of physical clues and physical interaction in the online environment make it more difficult to establish trust with the consumers. So, it is important for companies to learn how to manage consumers’ trust in e-commerce. Although, building consumer trust on the Internet is a challenge for online vendors. The purpose with this dissertation was to get a better understanding of consumer t...

  4. Why are Industrial Relations in Spain Competitive? Trust in Management, Union Support and Conflict Behaviour in Worker Representatives

    Directory of Open Access Journals (Sweden)

    Patricia Elgoibar

    2013-04-01

    Full Text Available In the current context of limited resources and economic, social and labour changes, organizational conflicts are becoming more and more competitive. Two possible explanations for this approach to conflict in Spain are the low trust between unions and management and the long tradition of confrontation in industrial relations. In this study we analyse the conflict pattern from worker representatives and the relation to trust in management and union support. The hypotheses are tested in a quantitative study of 719 representatives. Results show that a representatives use a competitive conflict style; b trust is negatively related to this style; and c union support is positively related to the style. We explore how societal culture and historical industrial relations tradition explain these relations.

  5. Trust management for e-transactions

    Indian Academy of Sciences (India)

    R. Narasimhan (Krishtel eMaging) 1461 1996 Oct 15 13:05:22

    medium for disseminating information, doing commerce and business. ..... intensity of effect on individual's decision making is subjective. In next section .... that takes into account all the factors in trust formation, enhancement and enforcement.

  6. Social trust and ionizing radiation

    Energy Technology Data Exchange (ETDEWEB)

    Meadd, E. [Faculty of Environmental Studies, York University, Toronto, Ontario (Canada)

    2002-07-01

    The linkages that exist between the environmental risks associated with nuclear energy production (both perceived and real) and the myriad of social and political issues and processes that influence social trust are a current issue in literature, but are not well explored, particularly for the Canadian context. This paper will examine one particular issue and its relationship with social trust: ionizing radiation and public health. Social trust is defined for this paper as including interpersonal trust, but having a much broader focus, extending to public trust in governments, institutions, corporations, and the power elite, and across whole societies. Of particular interest for the nuclear energy issue is how waning social trust may impact the functioning of democratic decision-making processes, particularly those associated with the siting of waste facilities. Social trust is a central issue in the management of environmental risks, particularly those related to high technology; its absence is seen as a major cause of intractable conflict in decisions related to nuclear power generation and waste disposal. Understanding the dynamics of social trust is important if a resolution is to be found to the nuclear waste management debate in Canada, that is, one that involves broad public, or social, support. For instance, what factors cause distrust to emerge, and when distrust emerges, what authorities do members of affected communities seek out for information and support? This paper begins to examine social trust in relation to human health and ionizing radiation, particularly low dose radiation from radioactive wastes resulting from uranium and radium processing activities in Port Hope, Ontario. These activities date back to the 1930s and are of great concern to community members. This paper looks at some of the roots of public concern, for example, scientific uncertainty around whether or not human health is compromised by exposure to low dose ionizing radiation

  7. Social trust and ionizing radiation

    International Nuclear Information System (INIS)

    Meadd, E.

    2002-01-01

    The linkages that exist between the environmental risks associated with nuclear energy production (both perceived and real) and the myriad of social and political issues and processes that influence social trust are a current issue in literature, but are not well explored, particularly for the Canadian context. This paper will examine one particular issue and its relationship with social trust: ionizing radiation and public health. Social trust is defined for this paper as including interpersonal trust, but having a much broader focus, extending to public trust in governments, institutions, corporations, and the power elite, and across whole societies. Of particular interest for the nuclear energy issue is how waning social trust may impact the functioning of democratic decision-making processes, particularly those associated with the siting of waste facilities. Social trust is a central issue in the management of environmental risks, particularly those related to high technology; its absence is seen as a major cause of intractable conflict in decisions related to nuclear power generation and waste disposal. Understanding the dynamics of social trust is important if a resolution is to be found to the nuclear waste management debate in Canada, that is, one that involves broad public, or social, support. For instance, what factors cause distrust to emerge, and when distrust emerges, what authorities do members of affected communities seek out for information and support? This paper begins to examine social trust in relation to human health and ionizing radiation, particularly low dose radiation from radioactive wastes resulting from uranium and radium processing activities in Port Hope, Ontario. These activities date back to the 1930s and are of great concern to community members. This paper looks at some of the roots of public concern, for example, scientific uncertainty around whether or not human health is compromised by exposure to low dose ionizing radiation

  8. An Operational Semantics for Trust Policies

    DEFF Research Database (Denmark)

    Krukow, Karl Kristian

    2005-01-01

    In the trust-structure model of trust management, principals specify their trusting relationships with other principals in terms of trust policies. In their paper on trust structures, Carbone et al. present a language for trust policies, and provide a suitable denotational semantics. The semantics...... ensures that for any collection of trust policies, there is always a unique global trust-state, compatible with all the policies, specifying everyone's degree of trust in everyone else. However, as the authors themselves point out, the language lacks an operational model: the global trust-state is a well......-defined mathematical object, but it is not clear how principals can actually compute it. This becomes even more apparent when one considers the intended application environment: vast numbers of autonomous principals, distributed and possibly mobile. We provide a compositional operational semantics for a language...

  9. Trust Management for Encounter-Based Routing in Delay Tolerant Networks

    Science.gov (United States)

    2010-05-15

    8217 4 O-i 0.5 E 1.6 a 90% M 300 i / fc -vfc 0.8:0.2 « 2 1 IDS 6OO5 Oil (0, 2] mis D WS p/DS 0.5% Eo [12,24] hrs I/;.• [160,320 480] min. Below we...34 IEEE Infocom, Barcelona , Spain, Apr. 2006, pp. 1-11. [3] J.H. Cho, A. Swami and I.R. Chen, "Modeling and Analysis of Trust Management for Cognitive

  10. Improved Trust Prediction in Business Environments by Adaptive Neuro Fuzzy Inference Systems

    Directory of Open Access Journals (Sweden)

    Ali Azadeh

    2015-06-01

    Full Text Available Trust prediction turns out to be an important challenge when cooperation among intelligent agents with an impression of trust in their mind, is investigated. In other words, predicting trust values for future time slots help partners to identify the probability of continuing a relationship. Another important case to be considered is the context of trust, i.e. the services and business commitments for which a relationship is defined. Hence, intelligent agents should focus on improving trust to provide a stable and confident context. Modelling of trust between collaborating parties seems to be an important component of the business intelligence strategy. In this regard, a set of metrics have been considered by which the value of confidence level for predicted trust values has been estimated. These metrics are maturity, distance and density (MD2. Prediction of trust for future mutual relationships among agents is a problem that is addressed in this study. We introduce a simulation-based model which utilizes linguistic variables to create various scenarios. Then, future trust values among agents are predicted by the concept of adaptive neuro-fuzzy inference system (ANFIS. Mean absolute percentage errors (MAPEs resulted from ANFIS are compared with confidence levels which are determined by applying MD2. Results determine the efficiency of MD2 for forecasting trust values. This is the first study that utilizes the concept of MD2 for improvement of business trust prediction.

  11. The Relationship among Interactional Justice, Manager Trust and Teachers' Organizational Silence Behavior

    Science.gov (United States)

    Yangin, Demet; Elma, Cevat

    2017-01-01

    The purpose of this study was to determine the relationship between the manager trust and interactional justice perceptions and organizational silence behaviors of those teachers who work in primary and secondary schools. The research is based on the survey model and the population consists of 4761 teachers who worked in Samsun, Turkey. The sample…

  12. A model for (re)building consumer trust in the food system.

    Science.gov (United States)

    Wilson, Annabelle M; Withall, Elizabeth; Coveney, John; Meyer, Samantha B; Henderson, Julie; McCullum, Dean; Webb, Trevor; Ward, Paul R

    2017-12-01

    The article presents a best practice model that can be utilized by food system actors to assist with (re)building trust in the food system, before, during and after a food incident defined as 'any situation within the food supply chain where there is a risk or potential risk of illness or confirmed illness or injury associated with the consumption of a food or foods' (Commonwealth of Australia. National Food Incident Response Protocol. Commonwealth of Australia, Canberra, 2012). Interviews were undertaken with 105 actors working within the media, food industry and food regulatory settings across Australia, New Zealand (NZ) and the United Kingdom (UK). Interview data produced strategy statements, which indicated participant views on how to (re)build consumer trust in the food system. These included: (i) be transparent, (ii) have protocols and procedures in place, (iii) be credible, (iv) be proactive, (v) put consumers first, (vi) collaborate with stakeholders, (vii) be consistent, (viii) educate stakeholders and consumers, (ix) build your reputation and (x) keep your promises. A survey was designed to enable participants to indicate their agreement/disagreement with the ideas, rate their importance and provide further comment. The five strategies considered key to (re)building consumer trust were used to develop a model demonstrating best practice strategies for (re)building consumer trust in the food system before, during and after a food incident. In a world where the food system is increasingly complex, strategies for (re)building and fostering consumer trust are important. This study offers a model to do so which is derived from the views and experiences of actors working across the food industry, food regulation and the media. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  13. Mediating Trust in Terrorism Coverage

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    crisis. While the framework is presented in the context of television coverage of a terror-related crisis situation, it can equally be used in connection with all other forms of mediated trust. Key words: National crisis, risk communication, crisis management, television coverage, mediated trust.......Mass mediated risk communication can contribute to perceptions of threats and fear of “others” and/or to perceptions of trust in fellow citizens and society to overcome problems. This paper outlines a cross-disciplinary holistic framework for research in mediated trust building during an acute...

  14. 25 CFR 1200.5 - What are the advantages and disadvantages of managing trust funds under the options in § 1200.4?

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false What are the advantages and disadvantages of managing trust funds under the options in § 1200.4? 1200.5 Section 1200.5 Indians OFFICE OF THE SPECIAL TRUSTEE... General Provisions § 1200.5 What are the advantages and disadvantages of managing trust funds under the...

  15. Distance in schools : The influence of psychological and structural distance from management on teachers’ trust in management, organisational commitment, and organisational citizenship behaviour

    NARCIS (Netherlands)

    Thomsen, M.; Karsten, S.; Oort, F.J.

    2016-01-01

    This study aimed to examine the relationship between teachers’ perceived psychological distance and structural distance from management and teachers’ affective organisational commitment (AOC) and organisational citizenship behaviour (OCB). Teachers’ trust in management was expected to mediate these

  16. Trusted Computing Technologies, Intel Trusted Execution Technology.

    Energy Technology Data Exchange (ETDEWEB)

    Guise, Max Joseph; Wendt, Jeremy Daniel

    2011-01-01

    We describe the current state-of-the-art in Trusted Computing Technologies - focusing mainly on Intel's Trusted Execution Technology (TXT). This document is based on existing documentation and tests of two existing TXT-based systems: Intel's Trusted Boot and Invisible Things Lab's Qubes OS. We describe what features are lacking in current implementations, describe what a mature system could provide, and present a list of developments to watch. Critical systems perform operation-critical computations on high importance data. In such systems, the inputs, computation steps, and outputs may be highly sensitive. Sensitive components must be protected from both unauthorized release, and unauthorized alteration: Unauthorized users should not access the sensitive input and sensitive output data, nor be able to alter them; the computation contains intermediate data with the same requirements, and executes algorithms that the unauthorized should not be able to know or alter. Due to various system requirements, such critical systems are frequently built from commercial hardware, employ commercial software, and require network access. These hardware, software, and network system components increase the risk that sensitive input data, computation, and output data may be compromised.

  17. Secure Trust Based Key Management Routing Framework for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jugminder Kaur

    2016-01-01

    Full Text Available Security is always a major concern in wireless sensor networks (WSNs. Several trust based routing protocols are designed that play an important role in enhancing the performance of a wireless network. However they still have some disadvantages like limited energy resources, susceptibility to physical capture, and little protection against various attacks due to insecure wireless communication channels. This paper presents a secure trust based key management (STKF routing framework that establishes a secure trustworthy route depending upon the present and past node to node interactions. This route is then updated by isolating the malicious or compromised nodes from the route, if any, and a dedicated link is created between every pair of nodes in the selected route with the help of “q” composite random key predistribution scheme (RKPS to ensure data delivery from source to destination. The performance of trust aware secure routing framework (TSRF is compared with the proposed routing scheme. The results indicate that STKF provides an effective mechanism for finding out a secure route with better trustworthiness than TSRF which avoids the data dropping, thereby increasing the data delivery ratio. Also the distance required to reach the destination in the proposed protocol is less hence effectively utilizing the resources.

  18. Data management strategies for multinational large-scale systems biology projects.

    Science.gov (United States)

    Wruck, Wasco; Peuker, Martin; Regenbrecht, Christian R A

    2014-01-01

    Good accessibility of publicly funded research data is essential to secure an open scientific system and eventually becomes mandatory [Wellcome Trust will Penalise Scientists Who Don't Embrace Open Access. The Guardian 2012]. By the use of high-throughput methods in many research areas from physics to systems biology, large data collections are increasingly important as raw material for research. Here, we present strategies worked out by international and national institutions targeting open access to publicly funded research data via incentives or obligations to share data. Funding organizations such as the British Wellcome Trust therefore have developed data sharing policies and request commitment to data management and sharing in grant applications. Increased citation rates are a profound argument for sharing publication data. Pre-publication sharing might be rewarded by a data citation credit system via digital object identifiers (DOIs) which have initially been in use for data objects. Besides policies and incentives, good practice in data management is indispensable. However, appropriate systems for data management of large-scale projects for example in systems biology are hard to find. Here, we give an overview of a selection of open-source data management systems proved to be employed successfully in large-scale projects.

  19. WILDLIFE HEALTH AND PUBLIC TRUST RESPONSIBILITIES FOR WILDLIFE RESOURCES.

    Science.gov (United States)

    Decker, Daniel J; Schuler, Krysten; Forstchen, Ann B; Wild, Margaret A; Siemer, William F

    2016-10-01

    A significant development in wildlife management is the mounting concern of wildlife professionals and the public about wildlife health and diseases. Concurrently, the wildlife profession is reexamining implications of managing wildlife populations as a public trust and the concomitant obligation to ensure the quality (i.e., health) and sustainability of wildlife. It is an opportune time to emphasize the importance of wildlife health, specifically to advocate for comprehensive and consistent integration of wildlife health in wildlife management. We summarize application of public trust ideas in wildlife population management in the US. We argue that wildlife health is essential to fulfilling public trust administration responsibilities with respect to wildlife, due to the central responsibility of trustees for ensuring the well-being of wildlife species (i.e., the core resources of the trust). Because both health of wildlife and risk perceptions regarding threats posed by wildlife disease to humans and domestic animals are issues of growing concern, managing wildlife disease and risk communication vis-à-vis wildlife health is critical to wildlife trust administration. We conclude that wildlife health professionals play a critical role in protecting the wildlife trust and that current conditions provide opportunities for important contributions by wildlife health professionals in wildlife management.

  20. Trust and Credit

    DEFF Research Database (Denmark)

    Harste, Gorm

    The present paper is an answer to the question, how did trust and credit emerge. The systems of trust and credit reduce the environmental and contextual complexities in which trust and credit are embedded. The paper analyses the forms of this reduction in a number of stages in the evolution...... of history from the present risk of modern systems back to early modernity, the Reformation and the high medieval Revolutions in law, organization and theology. It is not a history of economics, but a history of the conditions of some communication codes used in economic systems....

  1. On the role of trust types and levels on inventory replenishment decision

    OpenAIRE

    Darvish, M.; Kaboli, A.; Cheikhrouhou, N.; Glardon, R.

    2014-01-01

    Using a participatory simulation platform, this paper investigates the inventory replenishment decisions made under different trust categories. Depending on the type of trust (trust in supplier versus trust in customer) and level of trust (high versus low), each decision is categorized and analyzed. We investigate how the inventory manager`s ordering behavior varies regarding their type and level of trust. This study provides evidence for the role of trust in inventory replenishment decision....

  2. With directed study before a 4-day operating room management course, trust in the content did not change progressively during the classroom time.

    Science.gov (United States)

    Dexter, Franklin; Epstein, Richard H; Fahy, Brenda G; Van Swol, Lyn M

    2017-11-01

    A 4-day course in operating room (OR) management is sufficient to provide anesthesiologists with the knowledge and problem solving skills needed to participate in projects of the systems-based-practice competency. Anesthesiologists may need to learn fewer topics when the objective is, instead, limited to comprehension of decision-making on the day of surgery, We tested the hypothesis that trust in course content would not increase further after completion of topics related to OR decision-making on the day of surgery. Panel survey. A 4-day 35hour course in OR management. Mandatory assignments before classes were: 1) review of statistics at a level slightly less than required of anesthesiology residents by the American Board of Anesthesiology; and 2) reading of peer-reviewed published articles while learning the scientific vocabulary. N=31 course participants who each attended 1 of 4 identical courses. At the end of each of the 4days, course participants completed a 9-item scale assessing trust in the course content, namely, its quality, usefulness, and reliability. Cronbach alpha for the 1 to 7 trust scale was 0.94. The means±SD of scores were 5.86±0.80 after day #1, 5.81±0.76 after day #2, 5.80±0.77 after day #3, and 5.97±0.76 after day #4. Multiple methods of statistical analysis all found that there was no significant effect of the number of days of the course on trust in the content (all P≥0.30). Trust in the course content did not increase after the end of the 1st day. Therefore, statistics review, reading, and the 1st day of the course appear sufficient when the objective of teaching OR management is not that participants will learn how to make the decisions, but will comprehend them and trust in the information underlying knowledgeable decision-making. Copyright © 2017 Elsevier Inc. All rights reserved.

  3. Distance in Schools: The Influence of Psychological and Structural Distance from Management on Teachers' Trust in Management, Organisational Commitment, and Organisational Citizenship Behaviour

    Science.gov (United States)

    Thomsen, Maren; Karsten, Sjoerd; Oort, Frans J.

    2016-01-01

    This study aimed to examine the relationship between teachers' perceived psychological distance and structural distance from management and teachers' affective organisational commitment (AOC) and organisational citizenship behaviour (OCB). Teachers' trust in management was expected to mediate these relationships. Furthermore, the adequacy and…

  4. The Relationship between Teamwork and Organizational Trust

    Directory of Open Access Journals (Sweden)

    Musab Işık

    2015-04-01

    Full Text Available The aim of this study is to investigate the relationship between teamwork and organizational trust. In the implementation section the data from the survey of 250 workers is employed in call centers in Erzurum by using relevant statistical methods. Consequently, it is found that there is a positive and significant relationship between teamwork and organizational trust. Thus, the hypothesis of the study is supported as it was expected. Besides, it is found that there are positive and significant relationships between communication, openness to innovation, participation-trust in teamwork and organizational trust, trust in management, trust in co-workers, and trust in workplace.

  5. Analysis of the Factors Affecting Resistance to Changes in Management Accounting Systems

    Directory of Open Access Journals (Sweden)

    Rodrigo Angonese

    2014-12-01

    Full Text Available Despite changes in the environment and management accounting practices, studies indicate that management accounting systems do not change or change at a much slower rate than expected. The stability of the management accounting systems used by companies may relate to resistance to changing these systems. This study analyzes the factors that contribute to resistance to implementing an integrated management system from the perspective of institutional theory, grounded in the old institutional economics. Methodologically, this study provides a qualitative assessment of the problem and a descriptive analysis of the resistance factors through a case-study approach. The data were collected using semi-structured interviews and analyzed through content analysis. Two companies were selected for this study due to their differing characteristics. The following seven factors were analyzed for resistance to implementing integrated management systems: institutional power, ontological insecurity, trust, inertia, lack of knowledge, acceptance of routines and decoupling. However, there was no evidence to characterize hierarchical power. The research findings indicate that changing management accounting systems, through the implementation of an integrated management system, faces internal resistance in these organizations. Each factor varies in intensity but is permanently present in these companies, such as ontological insecurity, trust, inertia, lack of knowledge, acceptance of routines and decoupling. These factors are awakened when the change process begins and, if they gather enough force, can stop the change.

  6. Incremental Trust in Grid Computing

    DEFF Research Database (Denmark)

    Brinkløv, Michael Hvalsøe; Sharp, Robin

    2007-01-01

    This paper describes a comparative simulation study of some incremental trust and reputation algorithms for handling behavioural trust in large distributed systems. Two types of reputation algorithm (based on discrete and Bayesian evaluation of ratings) and two ways of combining direct trust and ...... of Grid computing systems....

  7. Trust and Society: Suggestions for Further Development of Niklas Luhmann's Theory of Trust.

    Science.gov (United States)

    Morgner, Christian

    2018-05-01

    This paper addresses an apparent gap in the work of Niklas Luhmann. While the issue of trust continues to receive widespread attention in the social sciences, Luhmann's interest in this topic declined following the development of his systems theory. It is argued that this decline does not reflect any diminished relevance of trust for systems theory, but rather that the architectural remodeling of theory cannot easily be applied to the issue of trust. Here, the issue of trust is reconceptualized as a connection medium. This entails a reconstruction of Luhmann's early theory of trust, especially with regard to function and social positioning. In this context, trust can in turn be linked to the concept of medium in Luhmann's late work. As a connection medium, trust mediates between the different levels of sociality-interaction, organization, and society. These theoretical considerations are employed to develop a more applied framework for empirical research, with a brief case study from southern Italy. From this perspective, the idea of trust as society's glue is seen to be overly simplistic. The common ethical understanding that more trust leads to a better society is also questioned on the grounds that social cooperation can also lead to social sclerosis. Finally, risk and trust are shown to accommodate the formation of different cultures of trust. The paper shows how Luhmann's updated version of trust can inspire current research and enhance our understanding of how trust operates in contemporary society. © 2018 Canadian Sociological Association/La Société canadienne de sociologie.

  8. 25 CFR 115.813 - Is there a limit to the amount of trust funds OTFM will disburse from a tribal trust account?

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Is there a limit to the amount of trust funds OTFM will... Investing and Managing Tribal Trust Funds § 115.813 Is there a limit to the amount of trust funds OTFM will disburse from a tribal trust account? OTFM will only disburse the available balance of the trust funds in a...

  9. Rethinking trust.

    Science.gov (United States)

    Kramer, Roderick M

    2009-06-01

    Will we ever learn? We'd barely recovered from Enron and WorldCom before we faced the subprime mortgage meltdown and more scandals that shook our trust in businesspeople. Which raises the question: Do we trust too much? In this article, Stanford professor and social psychologist Kramer explores the reasons we trust so easily--and, often, so unwisely. He explains that genetics and childhood learning make us predisposed to trust and that it's been a good survival mechanism. That said, our willingness to trust makes us vulnerable. Our sense of trust kicks in on remarkably simple cues, such as when people look like us or are part of our social group. We also rely on third parties to verify the character of others, sometimes to our detriment (as the victims of Bernard Madoff learned). Add in our illusions of invulnerability and our tendencies to see what we want to see and to overestimate our own judgment, and the bottom line is that we're often easily fooled. We need to develop tempered trust. For those who trust too much, that means reading cues better; for the distrustful, it means developing more receptive behaviors. Everyone should start with small acts of trust that encourage reciprocity and build up. Having a hedge against potential abuses also helps. Hollywood scriptwriters, for instance, register their treatments with the Writers Guild of America to prevent their ideas from being stolen by the executives they pitch. To attract the right relationships, people must strongly signal their own honesty, proactively allay concerns, and, if their trust is abused, retaliate. Trusting individuals in certain roles, which essentially means trusting the system that selects and trains them, also works but isn't foolproof. And don't count on due diligence alone for protection; constant vigilance is needed to make sure the landscape hasn't changed.

  10. Towards a Model of Open and Reliable Cognitive Multiagent Systems: Dealing with Trust and Emotions

    Directory of Open Access Journals (Sweden)

    Ricardo SILVEIRA

    2016-06-01

    Full Text Available  Open multiagent systems are those in which the agents can enter or leave the system freely. In these systems any entity with unknown intention can occupy the environment. For this scenario trust and reputation mechanisms should be used to choose partners in order to request services or delegate tasks. Trust and reputation models have been proposed in the Multiagent Systems area as a way to assist agents to select good partners in order to improve interactions between them. Most of the trust and reputation models proposed in the literature take into account their functional aspects, but not how they affect the reasoning cycle of the agent. That is, under the perspective of the agent, a trust model is usually just a “black box” and the agents usually does not take into account their emotional state to make decisions as well as humans often do. As well as trust, agent’s emotions also have been studied with the aim of making the actions and reactions of the agents more like those of humans being in order to imitate their reasoning and decision making mechanisms. In this paper we analyse some proposed models found in the literature and propose a BDI and multi-context based agent model which includes emotional reasoning to lead trust and reputation in open multiagent systems.

  11. Acceptance of selective contracting: the role of trust in the health insurer.

    Science.gov (United States)

    Bes, Romy E; Wendel, Sonja; Curfs, Emile C; Groenewegen, Peter P; de Jong, Judith D

    2013-10-02

    In a demand oriented health care system based on managed competition, health insurers have incentives to become prudent buyers of care on behalf of their enrolees. They are allowed to selectively contract care providers. This is supposed to stimulate competition between care providers and both increase the quality of care and contain costs in the health care system. However, health insurers are reluctant to implement selective contracting; they believe their enrolees will not accept this. One reason, insurers believe, is that enrolees do not trust their health insurer. However, this has never been studied. This paper aims to study the role played by enrolees' trust in the health insurer on their acceptance of selective contracting. An online survey was conducted among 4,422 people insured through a large Dutch health insurance company. Trust in the health insurer, trust in the purchasing strategy of the health insurer and acceptance of selective contracting were measured using multiple item scales. A regression model was constructed to analyse the results. Trust in the health insurer turned out to be an important prerequisite for the acceptance of selective contracting among their enrolees. The association of trust in the purchasing strategy of the health insurer with acceptance of selective contracting is stronger for older people than younger people. Furthermore, it was found that men and healthier people accepted selective contracting by their health insurer more readily. This was also true for younger people with a low level of trust in their health insurer. This study provides insight into factors that influence people's acceptance of selective contracting by their health insurer. This may help health insurers to implement selective contracting in a way their enrolees will accept and, thus, help systems of managed competition to develop.

  12. Acceptance of selective contracting: the role of trust in the health insurer

    Science.gov (United States)

    2013-01-01

    Background In a demand oriented health care system based on managed competition, health insurers have incentives to become prudent buyers of care on behalf of their enrolees. They are allowed to selectively contract care providers. This is supposed to stimulate competition between care providers and both increase the quality of care and contain costs in the health care system. However, health insurers are reluctant to implement selective contracting; they believe their enrolees will not accept this. One reason, insurers believe, is that enrolees do not trust their health insurer. However, this has never been studied. This paper aims to study the role played by enrolees’ trust in the health insurer on their acceptance of selective contracting. Methods An online survey was conducted among 4,422 people insured through a large Dutch health insurance company. Trust in the health insurer, trust in the purchasing strategy of the health insurer and acceptance of selective contracting were measured using multiple item scales. A regression model was constructed to analyse the results. Results Trust in the health insurer turned out to be an important prerequisite for the acceptance of selective contracting among their enrolees. The association of trust in the purchasing strategy of the health insurer with acceptance of selective contracting is stronger for older people than younger people. Furthermore, it was found that men and healthier people accepted selective contracting by their health insurer more readily. This was also true for younger people with a low level of trust in their health insurer. Conclusion This study provides insight into factors that influence people’s acceptance of selective contracting by their health insurer. This may help health insurers to implement selective contracting in a way their enrolees will accept and, thus, help systems of managed competition to develop. PMID:24083663

  13. 78 FR 2363 - Notification of Deletion of a System of Records; Automated Trust Funds Database

    Science.gov (United States)

    2013-01-11

    ... [Docket No. APHIS-2012-0041] Notification of Deletion of a System of Records; Automated Trust Funds Database AGENCY: Animal and Plant Health Inspection Service, USDA. ACTION: Notice of deletion of a system... establishing the Automated Trust Funds (ATF) database system of records. The Federal Information Security...

  14. Application of Fuzzy Comprehensive Evaluation Method in Trust Quantification

    Directory of Open Access Journals (Sweden)

    Shunan Ma

    2011-10-01

    Full Text Available Trust can play an important role for the sharing of resources and information in open network environments. Trust quantification is thus an important issue in dynamic trust management. By considering the fuzziness and uncertainty of trust, in this paper, we propose a fuzzy comprehensive evaluation method to quantify trust along with a trust quantification algorithm. Simulation results show that the trust quantification algorithm that we propose can effectively quantify trust and the quantified value of an entity's trust is consistent with the behavior of the entity.

  15. Trust Trust Me (The Additivity)

    OpenAIRE

    Mano , Ken; Sakurada , Hideki; Tsukada , Yasuyuki

    2017-01-01

    Part 4: Trust Metrics; International audience; We present a mathematical formulation of a trust metric using a quality and quantity pair. Under a certain assumption, we regard trust as an additive value and define the soundness of a trust computation as not to exceed the total sum. Moreover, we point out the importance of not only soundness of each computed trust but also the stability of the trust computation procedure against changes in trust value assignment. In this setting, we define tru...

  16. Trust in agile teams in distributed software development

    DEFF Research Database (Denmark)

    Tjørnehøj, Gitte; Fransgård, Mette; Skalkam, Signe

    2012-01-01

    Distributed software development (DSD) is becoming everyday practice in the software market. Difficult challenges and difficulty reaching the expected benefits are well documented. Recently agile software development has become common in DSD, even though important incompatibilities between...... that leads to team success. This article reports from a study of two agile DSD teams with very different organization and collaboration patterns. It addresses the role of trust and distrust in DSD by analyzing how the team members’ trust developed and erode through the lifetime of the two collaborations...... and how management actions influenced this. We find that some agile practice can empower teams to take over responsibility for managing their own trust building and sustaining and that management neglect of trust-building in other situations can hinder the development of beneficial balanced agile DSD...

  17. A Calculus for Trust Management

    DEFF Research Database (Denmark)

    Carbone, Marco; Nielsen, Mogens; Sassone, Vladimiro

    2004-01-01

    principals to policies. We elect to formalise policies using a Datalog-like logic, and to express protocols in the process algebra style. This yields an expressive calculus very suitable for the global computing scenarios, and provides a formalisation of notions such as trust evolution. For ctm we define...

  18. The Relationship between Teamwork and Organizational Trust

    Directory of Open Access Journals (Sweden)

    Musab Isik

    2016-01-01

    Full Text Available The aim of this study is to investigate the relationship between teamwork and organizational trust. In the implementation section the data from the survey of 250 workers is employed in call centers in Erzurum by using relevant statistical  methods. Consequently, it is found that there is a positive and significant relationship between teamwork and organizational trust. Thus, the hypothesis of the study is supported as it was expected. Besides, it is found that there are positive and significant relationships between communication, openness to innovation, participation-trust in teamwork and organizational trust, trust in management, trust in co-workers, and trust in workplace.

  19. African migrant patients' trust in Chinese physicians: a social ecological approach to understanding patient-physician trust.

    Science.gov (United States)

    McLaughlin, Megan M; Simonson, Louis; Zou, Xia; Ling, Li; Tucker, Joseph D

    2015-01-01

    Patient trust in physicians is a critical determinant of health seeking behaviors, medication adherence, and health outcomes. A crisis of interpersonal trust exists in China, extending throughout multiple social spheres, including the healthcare system. At the same time, with increased migration from Africa to China in the last two decades, Chinese physicians must establish mutual trust with an increasingly diverse patient population. We undertook a qualitative study to identify factors affecting African migrants' trust in Chinese physicians and to identify potential mechanisms for promoting trust. We conducted semi-structured, in-depth interviews with 40 African migrants in Guangzhou, China. A modified version of the social ecological model was used as a theoretical framework. At the patient-physician level, interpersonal treatment, technical competence, perceived commitment and motive, and language concordance were associated with enhanced trust. At the health system level, two primary factors influenced African migrants' trust in their physicians: the fee-for-service payment system and lack of continuity with any one physician. Patients' social networks and the broader socio-cultural context of interactions between African migrants and Chinese locals also influenced patients' trust of their physicians. These findings demonstrate the importance of factors beyond the immediate patient-physician interaction and suggest opportunities to promote trust through health system interventions.

  20. African migrant patients' trust in Chinese physicians: a social ecological approach to understanding patient-physician trust.

    Directory of Open Access Journals (Sweden)

    Megan M McLaughlin

    Full Text Available Patient trust in physicians is a critical determinant of health seeking behaviors, medication adherence, and health outcomes. A crisis of interpersonal trust exists in China, extending throughout multiple social spheres, including the healthcare system. At the same time, with increased migration from Africa to China in the last two decades, Chinese physicians must establish mutual trust with an increasingly diverse patient population. We undertook a qualitative study to identify factors affecting African migrants' trust in Chinese physicians and to identify potential mechanisms for promoting trust.We conducted semi-structured, in-depth interviews with 40 African migrants in Guangzhou, China. A modified version of the social ecological model was used as a theoretical framework. At the patient-physician level, interpersonal treatment, technical competence, perceived commitment and motive, and language concordance were associated with enhanced trust. At the health system level, two primary factors influenced African migrants' trust in their physicians: the fee-for-service payment system and lack of continuity with any one physician. Patients' social networks and the broader socio-cultural context of interactions between African migrants and Chinese locals also influenced patients' trust of their physicians.These findings demonstrate the importance of factors beyond the immediate patient-physician interaction and suggest opportunities to promote trust through health system interventions.

  1. Trust and Control in Public Sector Reform

    DEFF Research Database (Denmark)

    Vallentin, Steen; Thygesen, Niels Thyge

    2017-01-01

    to a substitution view when it comes to accounting for public sector reform as structure and process. Also, we propose a widening of the theoretical lens in the form of an emergent view of how trust and control, instead of being beforehand determinable and more or less stable identities, emerge in multiple......This paper provides an analysis of trust-based management reform in the Danish public sector from the point of view of the trust–control nexus. Based on a qualitative case study of home care in the municipality of Copenhagen we argue that a complementary view of trust and control is superior...... and singular ways from multiple events in the organisation. Noticing a dearth of research that explicitly addresses trust issues with regard to public sector management and organisation, the paper is a response to the call for more studies of trust as an institutionally embedded phenomenon....

  2. Operating Security System Support for Run-Time Security with a Trusted Execution Environment

    DEFF Research Database (Denmark)

    Gonzalez, Javier

    Software services have become an integral part of our daily life. Cyber-attacks have thus become a problem of increasing importance not only for the IT industry, but for society at large. A way to contain cyber-attacks is to guarantee the integrity of IT systems at run-time. Put differently......, it is safe to assume that any complex software is compromised. The problem is then to monitor and contain it when it executes in order to protect sensitive data and other sensitive assets. To really have an impact, any solution to this problem should be integrated in commodity operating systems...... sensitive assets at run-time that we denote split-enforcement, and provide an implementation for ARM-powered devices using ARM TrustZone security extensions. We design, build, and evaluate a prototype Trusted Cell that provides trusted services. We also present the first generic TrustZone driver...

  3. You Present like a Drug Addict: Patient and Clinician Perspectives on Trust and Trustworthiness in Chronic Pain Management

    Science.gov (United States)

    Ho, Anita; Illes, Judy

    2016-01-01

    Objective. Past research has demonstrated that trust is central to an effective therapeutic relationship, but the role of trust in chronic pain management is not well understood. The objective of this study was to provide an in-depth examination of how adults living with chronic pain negotiate trust and demonstrate trustworthiness with clinicians in therapeutic encounters. Methods. This qualitative study focused on adults living in an urban setting in British Columbia, Canada. Semi-structured interviews (N = 27) were conducted with participants with chronic low back pain. The results were triangulated by two feedback groups comprising re-contacted interview participants (n = 4) and physicians with expertise in pain and addiction management (n = 6). Results. Grounded theory analysis of the adult patient interviews and feedback groups yielded four major themes: 1) threats to trustworthiness and iatrogenic suffering; 2) communicating the invisible and subjective condition of chronic pain; 3) motive, honesty, and testimony; and 4) stigmatized identities. The following two themes emerged from the analysis of the physician feedback group: 1) challenges of the practice context, and 2) complicated clinical relationships. Conclusions. We found that perceived trustworthiness is important in therapeutic encounters as it helps to negotiate tensions with respect to subjective pain symptoms, addiction, and prescription opioid use. An attitude of epistemic humility may help both clinicians and patients cultivate a trustworthy clinical environment, manage the challenges associated with uncertain testimony, place trust wisely, and promote optimal pain care. PMID:26759389

  4. Understanding Factors That Influence Stakeholder Trust of Natural Resource Science and Institutions

    Science.gov (United States)

    Gray, Steven; Shwom, Rachael; Jordan, Rebecca

    2012-03-01

    Building trust between resource users and natural resource institutions is essential when creating conservation policies that rely on stakeholders to be effective. Trust can enable the public and agencies to engage in cooperative behaviors toward shared goals and address shared problems. Despite the increasing attention that trust has received recently in the environmental management literature, the influence that individual cognitive and behavioral factors may play in influencing levels of trust in resource management institutions, and their associated scientific assessments, remains unclear. This paper uses the case of fisheries management in the northeast to explore the relationships between an individual's knowledge of the resource, perceptions of resource health, and participatory experience on levels of trust. Using survey data collected from 244 avid recreational anglers in the Northeast U.S., we test these relationships using structural equation modeling. Results indicate that participation in fisheries management is associated with increased trust across all aspects of fisheries management. In addition, higher ratings of resource health by anglers are associated with higher levels of trust of state and regional institutions, but not federal institutions or scientific methods.

  5. Information pricing based on trusted system

    Science.gov (United States)

    Liu, Zehua; Zhang, Nan; Han, Hongfeng

    2018-05-01

    Personal information has become a valuable commodity in today's society. So our goal aims to develop a price point and a pricing system to be realistic. First of all, we improve the existing BLP system to prevent cascading incidents, design a 7-layer model. Through the cost of encryption in each layer, we develop PI price points. Besides, we use association rules mining algorithms in data mining algorithms to calculate the importance of information in order to optimize informational hierarchies of different attribute types when located within a multi-level trusted system. Finally, we use normal distribution model to predict encryption level distribution for users in different classes and then calculate information prices through a linear programming model with the help of encryption level distribution above.

  6. Trust and Influence

    Science.gov (United States)

    2013-03-06

    the behavior or attitudes of others). LIST SUB-AREAS IN PORTFOLIO: Science of Reliance • Trust in Autonomous Systems/ Autonomy – identify the...error •Humans have trust biases (Lyons & Stokes, 2012) •Little is known about how human trust principles apply to autonomy /robotics...for the model in western context (Colquitt et al., 2007) • Some evidence that benevolence is favored by collectivist culture (Branzei et al., 2007

  7. The Impact of Consumer Knowledge Bias on Narrow-Scope Trust, Broad-Scope Trust, and Relationship Satisfaction

    DEFF Research Database (Denmark)

    Hansen, Torben; Grønholdt, Lars; Josiassen, Alexander

    2016-01-01

    This study investigates how consumer knowledge bias - defined as knowledge over/underconfidence (O/U) - influences two types of trust (broad-scope trust and narrow-scope trust) and consumer relationship satisfaction. Based on a survey comprising 756 mutual fund investors, the contribution...... of this study to the marketing literature is twofold. First, taking a marketing relationship approach this study suggests and demonstrates that knowledge O/U positively influences relationship satisfaction and narrow-scope trust such that the more knowledge O/U a customer becomes, the higher/lower the level...... is low compared to high. Notably, the study findings strongly suggest that marketing managers should carry out their relationship satisfaction and trust improvement efforts relative to the combination of customers‟ subjective and objective knowledge....

  8. Innovation systems, saving, trust, and economic development in Africa

    NARCIS (Netherlands)

    Pamuk, H.

    2014-01-01

    The five essays in the dissertation explore the interaction between economic development in Africa and three economic concepts from different fields: decentralized agricultural innovation systems, trust and saving practices. A relatively new view to boost agricultural growth is the implementation of

  9. Trust-distrust Balance

    DEFF Research Database (Denmark)

    Jukka, Minna; Blomqvist, Kirsimarja; Li, Peter Ping

    2017-01-01

    notion of "guanxi" as personal ties. In contrast, the Finnish managers' view of trustworthiness was more associated with depersonalized organizational attributes. They emphasized the dimension of integrity, especially promise-keeping. In addition, tentative signs of trust ambivalence, as a balance...... opposites constitute a duality to be managed from the perspective of yin-yang balancing....

  10. Anomaly Detection for Internet of Vehicles: A Trust Management Scheme with Affinity Propagation

    Directory of Open Access Journals (Sweden)

    Shu Yang

    2016-01-01

    Full Text Available Anomaly detection is critical for intelligent vehicle (IV collaboration. Forming clusters/platoons, IVs can work together to accomplish complex jobs that they are unable to perform individually. To improve security and efficiency of Internet of Vehicles, IVs’ anomaly detection has been extensively studied and a number of trust-based approaches have been proposed. However, most of these proposals either pay little attention to leader-based detection algorithm or ignore the utility of networked Roadside-Units (RSUs. In this paper, we introduce a trust-based anomaly detection scheme for IVs, where some malicious or incapable vehicles are existing on roads. The proposed scheme works by allowing IVs to detect abnormal vehicles, communicate with each other, and finally converge to some trustworthy cluster heads (CHs. Periodically, the CHs take responsibility for intracluster trust management. Moreover, the scheme is enhanced with a distributed supervising mechanism and a central reputation arbitrator to assure robustness and fairness in detecting process. The simulation results show that our scheme can achieve a low detection failure rate below 1%, demonstrating its ability to detect and filter the abnormal vehicles.

  11. HMM-based Trust Model

    DEFF Research Database (Denmark)

    ElSalamouny, Ehab; Nielsen, Mogens; Sassone, Vladimiro

    2010-01-01

    Probabilistic trust has been adopted as an approach to taking security sensitive decisions in modern global computing environments. Existing probabilistic trust frameworks either assume fixed behaviour for the principals or incorporate the notion of ‘decay' as an ad hoc approach to cope...... with their dynamic behaviour. Using Hidden Markov Models (HMMs) for both modelling and approximating the behaviours of principals, we introduce the HMM-based trust model as a new approach to evaluating trust in systems exhibiting dynamic behaviour. This model avoids the fixed behaviour assumption which is considered...... the major limitation of existing Beta trust model. We show the consistency of the HMM-based trust model and contrast it against the well known Beta trust model with the decay principle in terms of the estimation precision....

  12. Is Trust in Banks in Slovenia Put to the Test?

    Directory of Open Access Journals (Sweden)

    Taškar Beloglavec Sabina

    2015-06-01

    Full Text Available The question of the banking system’s stability in connection to trust since the 2008 crisis has been the subject of many debates seeking to find permanent solutions to banking system problems, as the current situation affects bank customers’ behavior. This article examined trust in banks during the financial crisis and offers, via demographic variables, explanations as tow whether or not customers tend to withdraw their deposits during a crisis. The results contribute to banks’ decision-making regarding deposits management and understanding customers’ behavior, especially during a crisis. The results show a negative relationship between trust and deposit withdrawal intention, where gender and education level play an important role.

  13. Trusted computing platforms TPM2.0 in context

    CERN Document Server

    Proudler, Graeme; Dalton, Chris

    2015-01-01

    In this book the authors first describe the background of trusted platforms and trusted computing and speculate about the future. They then describe the technical features and architectures of trusted platforms from several different perspectives, finally explaining second-generation TPMs, including a technical description intended to supplement the Trusted Computing Group's TPM2 specifications. The intended audience is IT managers and engineers and graduate students in information security.

  14. Towards trusted tradelanes

    NARCIS (Netherlands)

    Hulstijn, Joris; Hofman, W.; Zomer, G.; Tan, Yao-Hua; Scholl, H. J.; Glassey, O.; Janssen, M.

    Customs administrations are exploring system-based approaches to regulatory supervision, taking the entire set of controls in a process into account. In addition to Trusted Traders, which are recognized by a certification process, customs are considering to identify so called Trusted Trade Lanes:

  15. Supply Chain Collaboration Roles of Interorganizational Systems, Trust, and Collaborative Culture

    CERN Document Server

    Cao, Mei

    2013-01-01

    To survive and thrive in the competition, firms have strived to achieve greater supply chain collaboration to leverage the resources and knowledge of suppliers and customers.  Internet based technologies, particularly interorganizational systems, further extend the firms’ opportunities to strengthen their supply chain partnerships and share real-time information to optimize their operations.  Supply Chain Collaboration: Roles of Interorganizational Systems, Trust, and Collaborative Culture explores the nature and characteristics, antecedents, and consequences of supply chain collaboration from multiple theoretical perspectives.  Supply Chain Collaboration: Roles of Interorganizational Systems, Trust, and Collaborative Culture conceptualizes supply chain collaboration as seven interconnecting elements including information sharing, incentive alignment, goal congruence, decision synchronization, resource sharing, as well as communication and joint knowledge creation. These seven components define the occur...

  16. The Influence of Trust on Project Management Practice within the Construction Industry

    Directory of Open Access Journals (Sweden)

    Scott Strahorn

    2017-03-01

    Full Text Available Given that any construction project is inherently a human endeavour, it follows that issues of trust are significant in terms of the stakeholder interactions that deliver eventual project outcomes.  Previous research indicates that the relational basis upon which projects are undertaken are intended to influence the likelihood of trusting relationships between stakeholders.  Thus, experiences of trust in a construction project environment are likely to be influenced by the contextual specifics of respective transactional and relational contracting (RC procurement mechanisms, given the divergent theoretical principles upon which they are founded.  The influence of trust has therefore been examined through the lived experiences of construction practitioners.  A phenomenological interview study consisting of thirty-five (35 participants was conducted with sensitivity to the procurement of experiences being recounted. Issues of trust were shown to be integral to stakeholder experiences in both procurement environments, with the benefits of trust acknowledged in many instances.  However, little understanding was evident regarding methods for building and maintaining trust, nor for repairing trust when problems arose. Importantly, despite the differing principles that underpin transactional and relational procurement, and particularly the contention that relational procurement would increase trust between trading partners, this was not evident; with individual personalities and appropriate risk apportionment shown to be greater influences upon the likelihood of trusting relationships.  It is reasonable to conjecture that relational contracts actually diminish the need for trust, given that the objective is to reduce uncertainty through formulaic approaches to risk distribution and reward; the absence of risk negates the need for trust.  Ultimately, the potential to deliver improved project outcomes as a result of proactive approaches to

  17. The relationship between organisational trust and quality of work life

    Directory of Open Access Journals (Sweden)

    Yolandi van der Berg

    2013-01-01

    Full Text Available Orientation: Managers within organisations should be more attentive regarding their managerial practices, the quality of work life (QWL and trust relationships, as experienced by employees.Research purpose: The aim of the study was to determine the relationship between organisational trust and QWL.Motivation for the study: Recent organisational changes have refocused attention on the productivity and performance of sales representatives. These changes have brought about a re-evaluation of their QWL and the organisational trust they experience.Research design, approach and method: An Internet-based survey methodology was used to collect primary data from a probability sample of 282 sales representatives; a 72% response rate was obtained. Responses were analysed using quantitative techniques and structural equation modelling.Main findings: Results confirmed a positive relationship between managerial practices with organisational trust and QWL and a lower relationship between the personality dimensions, organisational trust and the QWL.Practical/managerial implications: The study accentuated how important it is for management to be constantly aware of employees’ trust and their experience of a QWL, as these factors can lead to severe consequences if not properly managed.Contribution/value add: The study focused attention on the importance of building good trust relationships within an organisation, as it seems as though the personality traits and managerial practices of managers influence not only the trust relationship experienced by employees, but also their experience of a QWL.

  18. The decision to trust: how leaders create high-trust organizations

    National Research Council Canada - National Science Library

    Hurley, Robert F

    2012-01-01

    ... the government, big business, and large institutions. In The Decision to Trust, Robert Hurley explains how this new culture of cynicism and distrust creates many problems, and why it is almost impossible to manage an organization well if its people...

  19. Collaboration management framework for OEM - suppliers relationships: a trust-based conceptual approach

    Science.gov (United States)

    Belkadi, Farouk; Messaadia, Mourad; Bernard, Alain; Baudry, David

    2017-08-01

    Due to the increased competitiveness and the diversity of requirements in today's markets, manufacturing companies need to join their competencies and resources to propose innovative solutions for each specific market, with the possibility to transpose these solutions to another market, by means of slight adaptations. Thus, manufacturing firms must constantly conduct new collaborations with known partners in most cases, but also with new partners. The critical question for managers in this latter case is how to define the best collaborative strategy according to the goals of the project and the specificity of the target market. This paper tackles the problem by proposing a conceptual framework for supporting the management of collaborative situations in the case of Original equipment manufacturers (OEMs). Based on the concept of trust level, the framework proposes a classification of different collaboration modes to be adopted in various contexts of inter-enterprise relationships, in manufacturing sector. The aim is to support the flexible navigation between different collaborative situations by taking into account all decision-making levels from the strategy to the implementation of the information technologies (IT) systems at the operational level.

  20. Trusting the state, trusting each other?

    DEFF Research Database (Denmark)

    Sønderskov, Kim Mannemar; Dinesen, Peter Thisted

    2016-01-01

    Trust in state institutions is a prominent explanation of social trust. However, previous—mainly cross-sectional—analyses provide limited causal evidence regarding the relationship between institutional trust and social trust and it is thus essentially unknown whether an observed relationship...... reflects reverse causality (social trust forming institutional trust), or both forms of trust reflecting deep-seated dispositions (common confounding). Against the backdrop of the shortcomings of previous cross-sectional analyses, this paper utilizes two Danish panel surveys containing measures of both...... types of trust for the same individuals surveyed at multiple points in time over a long time-span (up to 18 years) to address the potentially reverse and/or spurious relationship. Using individual fixed effects and cross-lagged panel models, the results provide strong evidence of trust in state...

  1. The Impact of Trust on Job Performance in Organisations

    OpenAIRE

    Ana Nešić; Danijela Lalić

    2016-01-01

    In circumstances governed by consistent change in all aspects of business, trust represents a significant factor in the behavioural patterns of organisations. Of great importance for a successful communication in organisations is understanding the levels of trust among staff, employees and their management, and trust in the organisation itself. Trust is a cohesive and motivating factor in work groups. Also, based on trust are identification and commitment to the organisation, as well as the r...

  2. New information and social trust: asymmetry and perseverance of attributions about hazard managers.

    Science.gov (United States)

    Cvetkovich, George; Siegrist, Michael; Murray, Rachel; Tragesser, Sarah

    2002-04-01

    It has been argued that news about negative events has a much stronger effect on decreasing social trust than does news about positive events on increasing it. This asymmetry principle of trust was investigated in two surveys that also investigated the perseverance of trust. The possibility that established trust attributions persevere in the face of new information raises questions about the limits of trust asymmetry. The two studies yielded evidence that both type of news (good versus bad) and initial general trust in the nuclear power industry or the food supply industry affected level of trust. Compared to individuals trusting the industry, those distrusting the industry exhibited less trust following both bad and good news events. Study I also found that judged informativeness and judged positiveness of news events were affected by type of news and general trust of the industry. Individuals low in general trust of the nuclear power industry judged both bad news and good news as less positive than did those high in general trust. Those low in general trust judged bad news as more informative than good news and than did those high in general trust. An important implication of the perseverance of trust is to focus attention on including not only the effects of information about specific events and actions, but also on the judgment processes underlying social trust. The Salient Value Similarity model is suggested as one way of accounting for these psychological processes.

  3. A Survey on Trust Management for Mobile Ad Hoc Networks

    Science.gov (United States)

    2011-11-01

    expects, trust is dangerous implying the possible betrayal of trust. In his comments on Lagerspetz’s book titled Trust: The Tacit Demand, Lahno [24...AODV Zouridaki et al. (2005 ) [79] (2006) [80] Secure routing Direct observation [79][80] Reputation by secondhand information [80] Packet dropping...areas of signal processing, wireless communications, sensor and mobile ad hoc networks. He is co-editor of the book Wireless Sensor Networks: Signal

  4. Trust matters

    DEFF Research Database (Denmark)

    Østergaard, Lise Rosendal

    2015-01-01

    This article makes a contribution to the debate about health service utilisation and the role of trust in fostering demand for health services in sub-Saharan Africa. It is framed as a narrative literature review based on a thematic analysis of nine empirical, qualitative studies. For the purposes...... of this article trust is defined as a voluntary course of action, which involves the optimistic expectation that the trustee will do no harm to the trustor and is increasingly perceived as an important influence on health system functioning. The article looks at trust issues in interpersonal, intergroup...... and institutional situations. The findings of the review point to four elements that are important for trust to develop in health sector relationships: the sensitive use of discretionary power by health workers, perceived empathy by patients of the health workers, the quality of medical care and workplace...

  5. Trust Pathways, Trust Catalysts, Theory of Change and Citizen Science: A COASST Case Study

    Science.gov (United States)

    Burgess, H. K.; Parrish, J.; Dolliver, J.; Metes, J.; Ballard, H. L.

    2017-12-01

    Environmental challenges, from local water quality to the effects of global climate change, are overwhelming the mainstream science community. We need help. Citizen science offers one solution pathway - in the ideal, thousands of participants engaged in authentic science that delivers high quality information not otherwise obtainable. But in the real world, are citizen science data used? And more broadly: what are the interactions between citizen science and natural resource management in service of conserving or protecting system structure and function? The Coastal Observation and Seabird Survey Team (COASST) is a rigoros citizen science program focused on documenting patterns of beached bird and marine debris abundance on beaches along the coast of the Pacific Northwest and Alaska. Housed at the University of Washington, COASST partners directly with a wide range of local, tribal, state and federal agencies to effect positive change and a wide range of scientific, community and educational outcomes. Following from years of trial, error and adaptive management, we propose a "trust pathway" between citizen science and agencies that moves from an initial contact and multiple interaction types to eventual partnership and capacity sharing. Along the way are trust catalysts, including but not limited to: stakeholder engagement, data QA/QC, interactive data analysis, housing at an academic institution, and timely, repeated communication. In this presentation, we will discuss strategies and outcomes employed by COASST for fostering trust and successful partnerships, drawing on 20 years of program experience as well as reflections from a variety of partners and stakholdres.

  6. Control and trust impact on outsourcing

    DEFF Research Database (Denmark)

    Herbert-Hansen, Zaza Nadja Lee; Rasmussen, Lauge Baungaard; Schmidt, Andreas Strøjer Tynan

    This paper examines the relationships between control, trust and inter-organizational learning in outsourcing relationships, focusing on the question: How do different trust and control strategies affect the sharing and withholding of knowledge between client and vendor? Four studies are conducted......; one, large international client company and three of its vendors. Based on these cases and a literature review, various trust and control strategies are examined, and factors influencing the mutual knowledge interaction are identified. The results show an internal disagreement among managers...

  7. TEE-Based Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe

    Today, it is safe to assume that any program or data can be compromised, if they are not protected by hardware within a secure area. Systems based on crypto-processors (e.g., a trusted platform module, a smart card or a hardware security module) rely on the properties of tamper resistant hardware...... to establish a tight security parameter around a reduced set of predefined functionalities. Such systems are very secure, but they impose strong constraints on the functionalities, the connectivity or the resources available within the secure area. They have not proven versatile enough to provide mainstream...... trusted storage for personal data. We believe that this role can be taken over by systems equipped with Trusted Execution Environments (TEE), such as ARM’s TrustZone. Indeed, even if TEEs provide weaker security guarantees than crypto-processors, they already provide a secure area on many personal devices...

  8. A general definition of trust

    OpenAIRE

    O'Hara, Kieron

    2012-01-01

    In this paper a definition and conceptual analysis of trust is given in terms of trustworthiness. Its focus will be as wide as possible, and will not be restricted to any particular type of trust. The aim is to show the key parameters that enable us to investigate and understand trust, thereby facilitating the development of systems, institutions and technologies to support, model or mimic trust. The paper will also show the strong connection between trust and trustworthiness, showing how the...

  9. Group Recommendation Systems Based on External Social-Trust Networks

    Directory of Open Access Journals (Sweden)

    Guang Fang

    2018-01-01

    Full Text Available With the development of social networks and online mobile communities, group recommendation systems support users’ interaction with similar interests or purposes with others. We often provide some advices to the close friends, such as listening to favorite music and sharing favorite dishes. However, users’ personalities have been ignored by the traditional group recommendation systems while the majority is satisfied. In this paper, a method of group recommendation based on external social-trust networks is proposed, which builds a group profile by analyzing not only users’ preferences, but also the social relationships between members inside and outside of the group. We employ the users’ degree of disagreement to adjust group preference rating by external information of social-trust network. Moreover, having a discussion about different social network utilization ratio, we proposed a method to work for smaller group size. The experimental results show that the proposed method has consistently higher precision and leads to satisfactory recommendations for groups.

  10. 区块链与可信数据管理:问题与方法%Research Problems and Methods in Blockchain and Trusted Data Management

    Institute of Scientific and Technical Information of China (English)

    钱卫宁; 邵奇峰; 朱燕超; 金澈清; 周傲英

    2018-01-01

    As a supporting technology of Bitcoin for decentralized ledger management,blockchain has gain much attention in financial domain.Blockchain achieves trusted data management in not fully trusted computation environments.It has the advantage of decentralization,immutability,strong consistency and integrity,however,also suffers from poor performance with high latency and low throughput.With ever growing Internet technology and applications,the success of blockchain technology in cryptocurrency may shed light on the research of new trusted data management theories,technologies and systems.This paper introduces the blockchain related technologies,including distributed consensus,smart contract and data provenance,from the perspective of trusted data management.The requirements and research challenges of trusted data management are also analyzed.%作为支撑比特币实现无中心高可信的账本管理的技术,区块链在金融领域得到了广泛关注,区块链实现了不完全可信环境中的可信数据管理,具有去中心化、防篡改、不可抵赖、强一致和完整性等特性,但同时也存在高延迟和低吞吐率的性能问题,在互联网技术发展、新型应用层出不穷的大背景下,借鉴区块链在数字加密货币应用中的成功经验,探索可信数据管理的理论、技术,并设计、实现系统,是学术界所面临的重要问题.从可信数据管理角度,介绍了区块链相关的技术和研究进展,包括分布式共识、智能合约、数据溯源等,并分析了应用对可信数据管理所提出的需求和研究挑战.

  11. Trust in agile teams

    DEFF Research Database (Denmark)

    Tjørnehøj, Gitte; Fransgård, Mette; Skalkam, Signe

    2012-01-01

    actions influenced this. We see two important lessons from the analysis. First the agile practices of daily Scrum and self organizing team can empower DSD teams to manage their own development of trust and thereby alleviate the obstacles of DSD. Second if management fails to support the development...

  12. Secure grid-based computing with social-network based trust management in the semantic web

    Czech Academy of Sciences Publication Activity Database

    Špánek, Roman; Tůma, Miroslav

    2006-01-01

    Roč. 16, č. 6 (2006), s. 475-488 ISSN 1210-0552 R&D Projects: GA AV ČR 1ET100300419; GA MŠk 1M0554 Institutional research plan: CEZ:AV0Z10300504 Keywords : semantic web * grid computing * trust management * reconfigurable networks * security * hypergraph model * hypergraph algorithms Subject RIV: IN - Informatics, Computer Science

  13. The Influence Of Franchisors Brand Image On Franchisee Trust And Its Impact On Franchisee Intention To Remain In Franchise System

    Directory of Open Access Journals (Sweden)

    Erlinda

    2015-08-01

    Full Text Available Franchisee is the party that play important role in the franchising because most of franchise outlets managed and operated by franchisees. Nevertheless in the process of business operating there would be the conflict of interests between franchisor as the owner of brand with the franchisee as the buyer of franchisors brand to operating retail outlet.and bound with futures contract. Therefore franchisee trust is needed in order to maintain franchisee intention to remain in franchise system. One of the most important elements in franchising is franchisors brand image because basically franchise is selling the brand. Therefore this study aims to examine franchisee intention to remain in franchise system through franchisee trust that influenced by franchisors brand image. This study is conducted in Aceh province Indonesia. Using causality-explanatory approach with primary data in the form of perception opinions and attitude of 134 franchisees as individual research object. The method of data collection is survey using questionnaire. Regarding time dimension is one shot study. Partial Least Square is used to analyze the data. The result shows that franchisors brand image have a positive significant influence greater through franchisee trust than a direct influence of franchisors brand image to franchisee intention to remain in franchise system.

  14. Pharmaceutical industry gifts to physicians: patient beliefs and trust in physicians and the health care system.

    Science.gov (United States)

    Grande, David; Shea, Judy A; Armstrong, Katrina

    2012-03-01

    Pharmaceutical industry gifts to physicians are common and influence physician behavior. Little is known about patient beliefs about the prevalence of these gifts and how these beliefs may influence trust in physicians and the health care system. To measure patient perceptions about the prevalence of industry gifts and their relationship to trust in doctors and the health care system. Cross sectional random digit dial telephone survey. African-American and White adults in 40 large metropolitan areas. Respondents' beliefs about whether their physician and physicians in general receive industry gifts, physician trust, and health care system distrust. Overall, 55% of respondents believe their physician receives gifts, and 34% believe almost all doctors receive gifts. Respondents of higher socioeconomic status (income, education) and younger age were more likely to believe their physician receives gifts. In multivariate analyses, those that believe their personal physician receives gifts were more likely to report low physician trust (OR 2.26, 95% CI 1.56-3.30) and high health care system distrust (OR 2.03, 95% CI 1.49-2.77). Similarly, those that believe almost all doctors accept gifts were more likely to report low physician trust (OR 1.69, 95% CI 1.25-2.29) and high health care system distrust (OR 2.57, 95% CI 1.82-3.62). Patients perceive physician-industry gift relationships as common. Patients that believe gift relationships exist report lower levels of physician trust and higher rates of health care system distrust. Greater efforts to limit industry-physician gifts could have positive effects beyond reducing influences on physician behavior.

  15. Relationship between perceived organizational politics, organizational trust, human resource management practices and turnover intention among Nigerian nurses

    Directory of Open Access Journals (Sweden)

    Ramatu Abdulkareem Abubakar

    2014-09-01

    Full Text Available Prior research has indicated that employee turnover is detrimental to both individuals and organisations. Because a turnover intention in the workplace is detrimental, several factors have been suggested to better understand the reasons why employees may decide to leave their organisations. Some of the organizational-related factors that have been considered by previous research include perceived organizational justice, job satisfaction, perceived psychological contract breach, and perceived organizational support, among others. Despite these empirical studies, literatures indicate that less attention has been paid to the influence of perceived organisational politics, organizational trust, and perceived human resource practices management (HRM practices on employee turnover. Hence, the present study fills in the gap by examining the relationship between perceived organisational politics, organizational trust, perceived human resource management practices and employee turnover among Registered Nurses in Nigerian public hospitals using multiple regression analysis technique. One hundred and seventy five Registered Nurses participated in the study. Result indicated that perceived organisational politics was significantly and positively related to turnover intentions. The result also showed that both organizational trust and perceived human resource practices were significantly and negatively related to turnover intentions. Theoretical and practical implications of the results are discussed.

  16. Trust-based approaches to safety and production

    NARCIS (Netherlands)

    Conchie, Stacey M.; Woodcock, Helena E.; Taylor, Paul J.; Clarke, Sharon; Probst, Tahira M.; Guldenmund, Frank; Passmore, Jonathan

    2015-01-01

    This chapter discusses the importance of interpersonal trust in the creation of a safe work environment. It highlights that trust is important in increasing employee engagement in safety, willingness to comply with management requests, and propensity to take the initiative. The chapter commences

  17. Trust-Based Cooperative Social System Applied to a Carpooling Platform for Smartphones

    Directory of Open Access Journals (Sweden)

    Cándido Caballero-Gil

    2017-01-01

    Full Text Available One of the worst traffic problems today is the existence of huge traffic jams in almost any big city, produced by the large number of commuters using private cars. This problem has led to an increase in research on the optimization of vehicle occupancy in urban areas as this would help to solve the problem that most cars are occupied by single passengers. The solution of sharing the available seats in cars, known as carpooling, is already available in major cities around the world. However, carpooling is still not considered a safe and reliable solution for many users. With the widespread use of mobile technology and social networks, it is possible to create a trust-based platform to promote carpooling through a convenient, fast and secure system. The main objective of this work is the design and implementation of a carpool system that improves some important aspects of previous systems, focusing on trust between users, and on the security of the system. The proposed system guarantees user privacy and measures trust levels through a new reputation algorithm. In addition to this, the proposal has been developed as a mobile application for devices using the Android Open Source Project.

  18. Trust-Based Cooperative Social System Applied to a Carpooling Platform for Smartphones.

    Science.gov (United States)

    Caballero-Gil, Cándido; Caballero-Gil, Pino; Molina-Gil, Jezabel; Martín-Fernández, Francisco; Loia, Vincenzo

    2017-01-27

    One of the worst traffic problems today is the existence of huge traffic jams in almost any big city, produced by the large number of commuters using private cars. This problem has led to an increase in research on the optimization of vehicle occupancy in urban areas as this would help to solve the problem that most cars are occupied by single passengers. The solution of sharing the available seats in cars, known as carpooling, is already available in major cities around the world. However, carpooling is still not considered a safe and reliable solution for many users. With the widespread use of mobile technology and social networks, it is possible to create a trust-based platform to promote carpooling through a convenient, fast and secure system. The main objective of this work is the design and implementation of a carpool system that improves some important aspects of previous systems, focusing on trust between users, and on the security of the system. The proposed system guarantees user privacy and measures trust levels through a new reputation algorithm. In addition to this, the proposal has been developed as a mobile application for devices using the Android Open Source Project.

  19. Enterprise’s Online Trust Crisis Management: A Life Cycle View

    OpenAIRE

    Zeng , Yitang; Tan , Chunhui

    2014-01-01

    Part 3: Digital Business; International audience; Online trust is the vital mechanism for the development of e-commerce, and the significance of online trust has become a consensus. Undeniably, an obscure message may be magnified indefinitely and evolve into the enterprise’s online trust crisis, which will affect the image of the enterprise, threaten the survival and development of the enterprise, or make the enterprise into a doomed situation that can never be recovered. We study the develop...

  20. Trust and Distrust in E-Commerce

    Directory of Open Access Journals (Sweden)

    Suk-Joo Lee

    2018-03-01

    Full Text Available Trust is the key ingredient for sustainable transactions. In the concept of trust, the trustor trusts the trustees. In e-commerce, the trustor is the buyer and the trustees are the intermediaries and the seller. Intermediaries provide the web-based infrastructure that enables buyers and sellers to make transactions. Trust is the buyer’s judgment and comprises two distinct concepts; both trust and distrust reside in the trustor. The purpose of this study was to examine the complicated effects of trust and distrust on a buyer’s purchase intentions. Previous studies have provided theoretical frameworks illustrating co-existent trust and distrust, trust transfers from one to another, and trust in buyer-intermediary-seller relationships. Based on these frameworks, this study (i presented a holistic model that contained the judgment of buyers resulting in trust or distrust in the intermediary and the seller; (ii investigated trust and distrust transfer from the intermediary to the seller, and (iii explored the effects of various antecedents that affect trust and distrust. To validate the proposed model, we employed Partial Least Squares (PLS. A summary of key findings are as follows. First, buyer’s trust in an intermediary positively affected his or her trust in the seller, positively influencing purchase intention. In other words, we found the trust transfer from an intermediary to its seller. Second, distrust in an intermediary directly impacted on the buyer’s perceived risk, negatively influencing his or her purchase intentions. Third, structural assurance and perceived website quality of an intermediary gave a positive impact on buyer’s trust in the intermediary. The results of this study shed light on the necessity of managing both trust and distrust to facilitate sales in e-commerce.

  1. Managerial trust in new product development projects : its antecedents and consequences

    NARCIS (Netherlands)

    Dayan, M.; Benedetto, Di A.C.; Colak, M.

    2009-01-01

    Purpose - To explore managerial trust in new product development (NPD) projects. Design/methodology/approach - Touches on studies into managerial trust, observing few in the articles in the NPD area. Connects trust, interactional justice, management trust and NPD team performance within a conceptual

  2. Modeling trust context in networks

    CERN Document Server

    Adali, Sibel

    2013-01-01

    We make complex decisions every day, requiring trust in many different entities for different reasons. These decisions are not made by combining many isolated trust evaluations. Many interlocking factors play a role, each dynamically impacting the others.? In this brief, 'trust context' is defined as the system level description of how the trust evaluation process unfolds.Networks today are part of almost all human activity, supporting and shaping it. Applications increasingly incorporate new interdependencies and new trust contexts. Social networks connect people and organizations throughout

  3. The Impact of Trust on Job Performance in Organisations

    Directory of Open Access Journals (Sweden)

    Ana Nešić

    2016-04-01

    Full Text Available In circumstances governed by consistent change in all aspects of business, trust represents a significant factor in the behavioural patterns of organisations. Of great importance for a successful communication in organisations is understanding the levels of trust among staff, employees and their management, and trust in the organisation itself. Trust is a cohesive and motivating factor in work groups. Also, based on trust are identification and commitment to the organisation, as well as the relationships of employees. In successful organisations special attention is given to the problems of trust and mistrust. This work considers different theoretical concepts of how trust is created and maintained in organisations, different dimensions of organisational trust, as well as the effects of trust in organisational performance.

  4. Verification of Triple Modular Redundancy (TMR) Insertion for Reliable and Trusted Systems

    Science.gov (United States)

    Berg, Melanie; LaBel, Kenneth A.

    2016-01-01

    We propose a method for TMR insertion verification that satisfies the process for reliable and trusted systems. If a system is expected to be protected using TMR, improper insertion can jeopardize the reliability and security of the system. Due to the complexity of the verification process, there are currently no available techniques that can provide complete and reliable confirmation of TMR insertion. This manuscript addresses the challenge of confirming that TMR has been inserted without corruption of functionality and with correct application of the expected TMR topology. The proposed verification method combines the usage of existing formal analysis tools with a novel search-detect-and-verify tool. Field programmable gate array (FPGA),Triple Modular Redundancy (TMR),Verification, Trust, Reliability,

  5. Familiarity Vs Trust: A Comparative Study of Domain Scientists' Trust in Visual Analytics and Conventional Analysis Methods.

    Science.gov (United States)

    Dasgupta, Aritra; Lee, Joon-Yong; Wilson, Ryan; Lafrance, Robert A; Cramer, Nick; Cook, Kristin; Payne, Samuel

    2017-01-01

    Combining interactive visualization with automated analytical methods like statistics and data mining facilitates data-driven discovery. These visual analytic methods are beginning to be instantiated within mixed-initiative systems, where humans and machines collaboratively influence evidence-gathering and decision-making. But an open research question is that, when domain experts analyze their data, can they completely trust the outputs and operations on the machine-side? Visualization potentially leads to a transparent analysis process, but do domain experts always trust what they see? To address these questions, we present results from the design and evaluation of a mixed-initiative, visual analytics system for biologists, focusing on analyzing the relationships between familiarity of an analysis medium and domain experts' trust. We propose a trust-augmented design of the visual analytics system, that explicitly takes into account domain-specific tasks, conventions, and preferences. For evaluating the system, we present the results of a controlled user study with 34 biologists where we compare the variation of the level of trust across conventional and visual analytic mediums and explore the influence of familiarity and task complexity on trust. We find that despite being unfamiliar with a visual analytic medium, scientists seem to have an average level of trust that is comparable with the same in conventional analysis medium. In fact, for complex sense-making tasks, we find that the visual analytic system is able to inspire greater trust than other mediums. We summarize the implications of our findings with directions for future research on trustworthiness of visual analytic systems.

  6. On Propagating Interpersonal Trust in Social Networks

    Science.gov (United States)

    Ziegler, Cai-Nicolas

    The age of information glut has fostered the proliferation of data and documents on the Web, created by man and machine alike. Hence, there is an enormous wealth of minable knowledge that is yet to be extracted, in particular, on the Semantic Web. However, besides understanding information stated by subjects, knowing about their credibility becomes equally crucial. Hence, trust and trust metrics, conceived as computational means to evaluate trust relationships between individuals, come into play. Our major contribution to Semantic Web trust management through this work is twofold. First, we introduce a classification scheme for trust metrics along various axes and discuss advantages and drawbacks of existing approaches for Semantic Web scenarios. Hereby, we devise an advocacy for local group trust metrics, guiding us to the second part, which presents Appleseed, our novel proposal for local group trust computation. Compelling in its simplicity, Appleseed borrows many ideas from spreading activation models in psychology and relates their concepts to trust evaluation in an intuitive fashion. Moreover, we provide extensions for the Appleseed nucleus that make our trust metric handle distrust statements.

  7. Understanding Is Key: An Analysis of Factors Pertaining to Trust in a Real-World Automation System.

    Science.gov (United States)

    Balfe, Nora; Sharples, Sarah; Wilson, John R

    2018-06-01

    This paper aims to explore the role of factors pertaining to trust in real-world automation systems through the application of observational methods in a case study from the railway sector. Trust in automation is widely acknowledged as an important mediator of automation use, but the majority of the research on automation trust is based on laboratory work. In contrast, this work explored trust in a real-world setting. Experienced rail operators in four signaling centers were observed for 90 min, and their activities were coded into five mutually exclusive categories. Their observed activities were analyzed in relation to their reported trust levels, collected via a questionnaire. The results showed clear differences in activity, even when circumstances on the workstations were very similar, and significant differences in some trust dimensions were found between groups exhibiting different levels of intervention and time not involved with signaling. Although the empirical, lab-based studies in the literature have consistently found that reliability and competence of the automation are the most important aspects of trust development, understanding of the automation emerged as the strongest dimension in this study. The implications are that development and maintenance of trust in real-world, safety-critical automation systems may be distinct from artificial laboratory automation. The findings have important implications for emerging automation concepts in diverse industries including highly automated vehicles and Internet of things.

  8. Impact of nurses' job satisfaction on organizational trust.

    Science.gov (United States)

    Williams, Lauren L

    2005-01-01

    The matter of organization trust is gaining widespread attention because its perceived value and its erosion. Rampant organizational change has reportedly left nurses feeling betrayed, stressed, and vulnerable. This case study identifies specific aspects of job satisfaction that contribute to organizational trust. Findings offer guidance to the manager intending to create a culture of trust and subsequently promote organizational effectiveness.

  9. Trust Measurement using Multimodal Behavioral Analysis and Uncertainty Aware Trust Calibration

    Science.gov (United States)

    2018-01-05

    From the study we have found that: 1) people can correctly perceive the accuracy of the system and adjust their trust accordingly; 2) there exists a...Mailing Address : Level 5, 13 Garden Street , Eveleigh NSW 2015, Australia - Phone : +61 2 9490 5601 Period of Performance: September/30/2016 – September...system accuracy, and human trust in predictive decision making. From the study we have found that: 1) people can correctly perceive the accuracy of the

  10. The relationship between organisational trust and quality of work life

    Directory of Open Access Journals (Sweden)

    Yolandi van der Berg

    2013-01-01

    Research purpose: The aim of the study was to determine the relationship between organisational trust and QWL. Motivation for the study: Recent organisational changes have refocused attention on the productivity and performance of sales representatives. These changes have brought about a re-evaluation of their QWL and the organisational trust they experience. Research design, approach and method: An Internet-based survey methodology was used to collect primary data from a probability sample of 282 sales representatives; a 72% response rate was obtained. Responses were analysed using quantitative techniques and structural equation modelling. Main findings: Results confirmed a positive relationship between managerial practices with organisational trust and QWL and a lower relationship between the personality dimensions, organisational trust and the QWL. Practical/managerial implications: The study accentuated how important it is for management to be constantly aware of employees’ trust and their experience of a QWL, as these factors can lead to severe consequences if not properly managed. Contribution/value add: The study focused attention on the importance of building good trust relationships within an organisation, as it seems as though the personality traits and managerial practices of managers influence not only the trust relationship experienced by employees, but also their experience of a QWL.

  11. Institutional trust in the national social security and municipal healthcare systems for the elderly in Japan.

    Science.gov (United States)

    Murayama, Hiroshi; Taguchi, Atsuko; Ryu, Shuhei; Nagata, Satoko; Murashima, Sachiyo

    2012-09-01

    Japanese social security systems and institutions for the elderly, as well as the general attitude toward elderly care services among the Japanese population, have been undergoing a dramatic change. By examining the association between institutional trust, which is a representative element of social capital, and anxiety regarding receiving elderly care, we can uncover clues toward building a more robust social security system for the elderly. This study examines the relationship between institutional trust, in the national social security and municipal healthcare systems for the elderly, and anxiety with respect to receiving elderly care among the general Japanese population. A cross-sectional survey was conducted using a self-administered questionnaire that was returned by mail in January and February 2005. The target population was 4735 community residents aged 20-75 years, who lived in the city of Koka, Shiga, Japan. A total of 2264 questionnaires were included in the analysis. A binominal logistic regression analysis showed that responses of 'trust' [odds ratio (OR): 2.09, 95% confidence interval (95% CI): 1.01-4.30] and 'strongly trust' (OR: 3.80, 95% CI: 1.55-9.31) for the national system were associated with not having anxiety regarding elderly care, compared with the reference category of feeling strongly distrust. However, trust in the municipal system showed no association with this anxiety. These results indicate the importance of developing strategies to increase a common trust in the national care services for the elderly to reduce the anxiety people feel regarding whether they will be able to receive elderly care when required.

  12. Do you trust? Whom do you trust? When do you trust?

    NARCIS (Netherlands)

    Snijders, C.C.P.; Keren, G.; Thye, S.R.; Lawler, E.J.; Macy, M.W.; Walker, H.A.

    2001-01-01

    We try to provide a broader view on the factors that infiuence the decision to trust and honor trust. Using the "Trust Game" as our experimental paradigm, we consider three classes offactors that may he related to trust issues. The first one considers individual differences with regard to the

  13. 78 FR 13917 - Self-Regulatory Organizations; The Depository Trust Company; Notice of Filing Amendment No. 1 and...

    Science.gov (United States)

    2013-03-01

    ... financial stability by, among other things, promoting uniform risk management standards for systemically.... Introduction On December 28, 2012, The Depository Trust Company (``DTC'') filed with the Securities and... systemic risk since the reversals may override DTC's risk management controls such as the Collateral...

  14. Trust conceptualized as a corporate knowledge asset

    OpenAIRE

    Rodgers, Waymond; Gago Rodríguez, Susana

    2006-01-01

    To most individuals, "trust" can be viewed as a knowledge corporate asset that may add, or rest, value to the company. The role of knowledge in achieving a competitive advantage is becoming and increasingly important management issue in all business and non-business sectors. As such, our Throughput Modeling approach indicates how six different trust behaviors can be guided, how trust decision making can be improved and made defensible, and how special problems facing individuals can be dealt ...

  15. Public trust doctrine, research and responsible wildlife management in South Africa

    Directory of Open Access Journals (Sweden)

    Andrew C. Blackmore

    2017-06-01

    Full Text Available A significant proportion of South African biodiversity occurs in extensive private wildlife areas. As such, the continuance of these private reserves is paramount to conservation of the country’s biodiversity. The areas are, however, vulnerable to being divided into smaller camps as landowners enter into the new and rapidly growing industry of selective breeding and intensive management of antelope and predators. Concerns are being raised as to the long-term consequences of the products and impacts of this industry on, inter alia, integrity and conservation of the country’s wildlife, and the landscapes these facilities are located in, as well as the country’s reputation as a free ranging and fair chase hunting destination. Using the public trust doctrine as a foundation, this article characterises the relationship between the country’s environmental law and the roles played by government as the regulator, the wildlife industry, research and the public in achieving responsible wildlife management and the long-term conservation of this resource. These relationships are seen to be finely balanced between the provision of robust science, and evidence-based and cautious or risk-averse decision-making. It is concluded that the public trust doctrine is a powerful tool to limit the impacts of unsustainable and parochial use of wildlife on the conservation of biodiversity. It is also concluded that an improved understanding of the doctrine by researchers, public and the wildlife industry would lead to a greater relevance of research, and in turn sound evidence-based decision-making and ultimately sustainable use of wildlife.

  16. Recommendation based on trust diffusion model.

    Science.gov (United States)

    Yuan, Jinfeng; Li, Li

    2014-01-01

    Recommender system is emerging as a powerful and popular tool for online information relevant to a given user. The traditional recommendation system suffers from the cold start problem and the data sparsity problem. Many methods have been proposed to solve these problems, but few can achieve satisfactory efficiency. In this paper, we present a method which combines the trust diffusion (DiffTrust) algorithm and the probabilistic matrix factorization (PMF). DiffTrust is first used to study the possible diffusions of trust between various users. It is able to make use of the implicit relationship of the trust network, thus alleviating the data sparsity problem. The probabilistic matrix factorization (PMF) is then employed to combine the users' tastes with their trusted friends' interests. We evaluate the algorithm on Flixster, Moviedata, and Epinions datasets, respectively. The experimental results show that the recommendation based on our proposed DiffTrust + PMF model achieves high performance in terms of the root mean square error (RMSE), Recall, and F Measure.

  17. The Importance of Trust in Electronic Commerce.

    Science.gov (United States)

    Ratnasingham, Pauline

    1998-01-01

    Introduces the new concept of trust and how it influences the process of managing the security of an organization operating in an electronic commerce environment. Theoretically, the study aims to develop a framework of trust and security to provide a set of guidelines for secure electronic commerce. (Author/LRW)

  18. Trust and Social Commerce

    OpenAIRE

    Julia Y. Lee

    2016-01-01

    Internet commerce has transformed the marketing of goods and services. The separation between point of sale and seller, and the presence of geographically dispersed sellers who do not engage in repeated transactions with the same customers challenge traditional mechanisms for building the trust required for commercial exchanges. In this changing environment, legal rules and institutions play a diminished role in building trust. Instead, new systems and methods are emerging to foster trust in ...

  19. Understanding Is Key: An Analysis of Factors Pertaining to Trust in a Real-World Automation System

    Science.gov (United States)

    Balfe, Nora; Sharples, Sarah; Wilson, John R.

    2018-01-01

    Objective: This paper aims to explore the role of factors pertaining to trust in real-world automation systems through the application of observational methods in a case study from the railway sector. Background: Trust in automation is widely acknowledged as an important mediator of automation use, but the majority of the research on automation trust is based on laboratory work. In contrast, this work explored trust in a real-world setting. Method: Experienced rail operators in four signaling centers were observed for 90 min, and their activities were coded into five mutually exclusive categories. Their observed activities were analyzed in relation to their reported trust levels, collected via a questionnaire. Results: The results showed clear differences in activity, even when circumstances on the workstations were very similar, and significant differences in some trust dimensions were found between groups exhibiting different levels of intervention and time not involved with signaling. Conclusion: Although the empirical, lab-based studies in the literature have consistently found that reliability and competence of the automation are the most important aspects of trust development, understanding of the automation emerged as the strongest dimension in this study. The implications are that development and maintenance of trust in real-world, safety-critical automation systems may be distinct from artificial laboratory automation. Application: The findings have important implications for emerging automation concepts in diverse industries including highly automated vehicles and Internet of things. PMID:29613815

  20. Relationship between nurses' organizational trust levels and their organizational citizenship behaviors.

    Science.gov (United States)

    Altuntas, Serap; Baykal, Ulku

    2010-06-01

    This research used a descriptive and explorative design to determine the levels of nurses' organizational trust and organizational citizenship and to investigate relationships between the levels of organizational trust and organizational citizenship behaviors. Nurses who had completed their orientation from a total of 11 hospitals with bed capacities of 100 and located in the European district of Istanbul were included in the sample for this study. Formal, written applications and approval of the ethical committee were obtained from concerned institutions before proceeding with the data collection step. The Organizational Trust Inventory and the Organizational Citizenship Level Scale, a questionnaire form including five questions regarding nurses' personal characteristics, were used in data collection. Data collection tools were distributed to 900 nurses in total, and usable data were obtained from 482 nurses. Number and percentage calculations and Pearson correlation analysis were used to assess research data. The results of the present research showed that nurses had a higher than average level of trust in their managers and coworkers and they trusted more in their managers and coworkers than their institutions. The Organizational Citizenship Level Scale indicated that the behavior most frequently demonstrated by the nurses was conscientiousness, followed by courtesy and civic virtue, whereas sportsmanship was displayed to an average extent. An analysis of relationships between nurses' level of organizational trust and their organizational citizenship behaviors revealed that nurses who trust in their managers, institutions, and coworkers demonstrated the organizational citizenship behaviors of conscientiousness, civic virtue, courtesy, and altruism more frequently. The findings attained in this study indicated that the organizational trust the staff had in their institutions, managers, and coworkers influenced the organizational citizenship behaviors of

  1. Early experiences with the multidose drug dispensing system – A matter of trust?

    Science.gov (United States)

    Wekre, Liv Johanne; Melby, Line; Grimsmo, Anders

    2011-01-01

    Objective To study early experiences with multidose drug dispensing (MDD) among different groups of health personnel. Design Qualitative study based on focus-group interviews. Setting Primary health care, Trondheim, Norway. Main outcome The importance of trust in the technology and in collaborating partners is actualized in the early implementation of MDD. Results GPs, home-care nurses, pharmacists, and medical secretaries trusted the new MDD technology. The quality of the GPs’ medication records improved. However, health personnel, including the GPs themselves, would not always trust the medication records of the GPs. Checking the multidose bags arriving from the pharmacy was considered unnecessary in the written routines dealing with MDD. However, home-care nurses experienced errors and continued to manually check the bags. Nurses in the home-care service felt a loss of knowledge with regard to the patients’ medications and in turn experienced reduced ability to give medical information to patients and to observe the effects of the drugs. The home-care services’ routines for drug handling were not always trusted by the other groups of health personnel involved. Conclusion Health personnel faced some challenges during the implementation of the MDD system, but most of them remained confident in the new system. Building trust has to be a process that runs in parallel with the introduction of new technology and the establishment of new routines for improving the quality in handling of medicines and to facilitate better cooperation and communication. PMID:21323496

  2. Building Trust in High-Performing Teams

    Directory of Open Access Journals (Sweden)

    Aki Soudunsaari

    2012-06-01

    Full Text Available Facilitation of growth is more about good, trustworthy contacts than capital. Trust is a driving force for business creation, and to create a global business you need to build a team that is capable of meeting the challenge. Trust is a key factor in team building and a needed enabler for cooperation. In general, trust building is a slow process, but it can be accelerated with open interaction and good communication skills. The fast-growing and ever-changing nature of global business sets demands for cooperation and team building, especially for startup companies. Trust building needs personal knowledge and regular face-to-face interaction, but it also requires empathy, respect, and genuine listening. Trust increases communication, and rich and open communication is essential for the building of high-performing teams. Other building materials are a shared vision, clear roles and responsibilities, willingness for cooperation, and supporting and encouraging leadership. This study focuses on trust in high-performing teams. It asks whether it is possible to manage trust and which tools and operation models should be used to speed up the building of trust. In this article, preliminary results from the authors’ research are presented to highlight the importance of sharing critical information and having a high level of communication through constant interaction.

  3. 78 FR 70959 - Commission on Indian Trust Administration and Reform

    Science.gov (United States)

    2013-11-27

    ... DEPARTMENT OF THE INTERIOR Office of the Secretary [DR.5A311.IA000514] Commission on Indian Trust Administration and Reform AGENCY: Office of the Secretary, Interior. ACTION: Notice of Renewal of the Commission... administration system to support a reasoned and factually based set of options for potential management...

  4. Towards trusted trade-lanes

    NARCIS (Netherlands)

    Hulstijn, J.; Hofman, W.; Zomer, G.; Tan, Y.H.

    2016-01-01

    Customs administrations are exploring system-based approaches to regulatory supervision, taking the entire set of controls in a process into account. In addition to Trusted Traders, which are recognized by a certification process, customs are considering to identify so called Trusted Trade Lanes:

  5. Exploring trust relationships during times of change

    Directory of Open Access Journals (Sweden)

    Hartmut Von der Ohe

    2010-10-01

    Research purpose: The objective of this study was to explore the impact of different variables such as demographics on trust relationships in South African organisations. Motivation for the study: Anecdotal evidence and preliminary data collected for a national trust indicator seemed to suggest a shift in trust levels in organisations. Research design: A trust questionnaire was administered to a convenience sample of 307 respondents in all economic sectors. Parametric and nonparametric analyses were used to determine significant differences among economic sectors, job levels and sample periods. Main findings: No significant differences were found for job levels or the different sample periods. However, significant differences were found for the economic sectors and, specifically, between government participants and other sectors for the dimensions of change, team management, organisational trust, information sharing and credibility. Practical implications: In times of change, leadership in organisations need to be aware of the impact on trust levels. It is therefore important that leaders in government focus more on trust-enhancing behaviours needed to repair mistrust in organisations. Contribution: Although the effect of time on trust levels is inconclusive, the clearly differing levels of trust in various economic sectors point to the importance of appropriate and fitting approaches to building trust and not a ‘one-size-fits-all’ attitude.

  6. Online reputation systems: The effects of feedback comments and reactions on building and rebuilding trust in online auctions

    NARCIS (Netherlands)

    Utz, S.; Matzat, U.; Snijders, C.

    2009-01-01

    Previous research on reputation systems primarily focused on their trust-building function. The present research addresses their trust-rebuilding function-specifically, the role of the short text comments given in reaction to negative feedback. Rebuilding trust is often necessary because on-line

  7. Trust metrics in information fusion

    Science.gov (United States)

    Blasch, Erik

    2014-05-01

    Trust is an important concept for machine intelligence and is not consistent across many applications. In this paper, we seek to understand trust from a variety of factors: humans, sensors, communications, intelligence processing algorithms and human-machine displays of information. In modeling the various aspects of trust, we provide an example from machine intelligence that supports the various attributes of measuring trust such as sensor accuracy, communication timeliness, machine processing confidence, and display throughput to convey the various attributes that support user acceptance of machine intelligence results. The example used is fusing video and text whereby an analyst needs trust information in the identified imagery track. We use the proportional conflict redistribution rule as an information fusion technique that handles conflicting data from trusted and mistrusted sources. The discussion of the many forms of trust explored in the paper seeks to provide a systems-level design perspective for information fusion trust quantification.

  8. The Role of Trust in Computer Security

    DEFF Research Database (Denmark)

    Jensen, Christian D.

    2012-01-01

    technologies and show how many of them concern the placement of trust on human or system agents. We argue that making such assumptions about trust explicit is an essential requirement for the future of system security and argue why the formalisation of computational trust is necessary when we wish to reason...

  9. On the Tradeoff Between Altruism and Selfishness in MANET Trust Management

    Science.gov (United States)

    2016-04-07

    network deployment, we assume that there is no predefined trust . Without prior interactions, the initial bootstrapping will establish a shallow level of...a challenge/response process (e.g., public key authentication). Over time, partic- ipating nodes will establish a stronger trust level with more...periodically. This will enable each node to compute trust values of other nodes considering the original recommen- dations from the 1-hop neighbors of

  10. Trust transitivity in social networks.

    Directory of Open Access Journals (Sweden)

    Oliver Richters

    Full Text Available Non-centralized recommendation-based decision making is a central feature of several social and technological processes, such as market dynamics, peer-to-peer file-sharing and the web of trust of digital certification. We investigate the properties of trust propagation on networks, based on a simple metric of trust transitivity. We investigate analytically the percolation properties of trust transitivity in random networks with arbitrary in/out-degree distributions, and compare with numerical realizations. We find that the existence of a non-zero fraction of absolute trust (i.e. entirely confident trust is a requirement for the viability of global trust propagation in large systems: The average pair-wise trust is marked by a discontinuous transition at a specific fraction of absolute trust, below which it vanishes. Furthermore, we perform an extensive analysis of the Pretty Good Privacy (PGP web of trust, in view of the concepts introduced. We compare different scenarios of trust distribution: community- and authority-centered. We find that these scenarios lead to sharply different patterns of trust propagation, due to the segregation of authority hubs and densely-connected communities. While the authority-centered scenario is more efficient, and leads to higher average trust values, it favours weakly-connected "fringe" nodes, which are directly trusted by authorities. The community-centered scheme, on the other hand, favours nodes with intermediate in/out-degrees, in detriment of the authorities and its "fringe" peers.

  11. Trust Transitivity in Social Networks

    Science.gov (United States)

    Richters, Oliver; Peixoto, Tiago P.

    2011-01-01

    Non-centralized recommendation-based decision making is a central feature of several social and technological processes, such as market dynamics, peer-to-peer file-sharing and the web of trust of digital certification. We investigate the properties of trust propagation on networks, based on a simple metric of trust transitivity. We investigate analytically the percolation properties of trust transitivity in random networks with arbitrary in/out-degree distributions, and compare with numerical realizations. We find that the existence of a non-zero fraction of absolute trust (i.e. entirely confident trust) is a requirement for the viability of global trust propagation in large systems: The average pair-wise trust is marked by a discontinuous transition at a specific fraction of absolute trust, below which it vanishes. Furthermore, we perform an extensive analysis of the Pretty Good Privacy (PGP) web of trust, in view of the concepts introduced. We compare different scenarios of trust distribution: community- and authority-centered. We find that these scenarios lead to sharply different patterns of trust propagation, due to the segregation of authority hubs and densely-connected communities. While the authority-centered scenario is more efficient, and leads to higher average trust values, it favours weakly-connected “fringe” nodes, which are directly trusted by authorities. The community-centered scheme, on the other hand, favours nodes with intermediate in/out-degrees, in detriment of the authorities and its “fringe” peers. PMID:21483683

  12. Incorporating Trust into Department of Defense Acquisition Risk Management

    Science.gov (United States)

    2014-09-01

    taken from Chiles and McMackin (1996, 85) where they define trust as ‘‘the expectation that an exchange partner will not engage in opportunistic...short-term 53 incentives and uncertainty about long-term benefits” ( Chiles and McMackin 1996, 85). Trust is a positive term and vulnerability is...center for immigration and industry in the 1920s, which allotted it various ethnical backgrounds and poverty levels for the university social researchers

  13. Trust in Leadership DEOCS 4.1 Construct Validity Summary

    Science.gov (United States)

    2017-08-01

    Trust in Leadership DEOCS 4.1 Construct Validity Summary DEFENSE EQUAL OPPORTUNITY MANAGEMENT INSTITUTE...Report #04-18 1 Trust in Leadership DEOCS 4.1 Construct Validity Summary Background In 2014, DEOMI released DEOCS 4.0 for Department of Defense...and individual items on the DEOCS. The following details the efforts directed toward updating the factor of Trust in Leadership . Included is a review

  14. A formal model for classifying trusted Semantic Web Services

    OpenAIRE

    Galizia, Stefania; Gugliotta, Alessio; Pedrinaci, Carlos

    2008-01-01

    Semantic Web Services (SWS) aim to alleviate Web service limitations, by combining Web service technologies with the potential of Semantic Web. Several open issues have to be tackled yet, in order to enable a safe and efficient Web services selection. One of them is represented by trust. In this paper, we introduce a trust definition and formalize a model for managing trust in SWS. The model approaches the selection of trusted Web services as a classification problem, and it is realized by an...

  15. Trust in Diverse Teams

    DEFF Research Database (Denmark)

    Clausen, Lisbeth

    , maintaining team cohesiveness in multicultural teams to collaborate effectively presents a number of challenges. The present study employs the concept of trust to explore influences on team collaboration in high performing teams. The study is based on observation of teams in seven multinational corporations...... and interviews with managers from the US, Europe, China and Japan. The study presents a conceptual framework - a ‘trust buffer’ – which enables analysis and exemplification of the dynamics and challenges of teams as drivers of change. Each team has strategically important tasks, unique capacities and deal...... with change in particular ways: Each team is analyzed in relation to its global (HQ) mandate, local (national) stakeholders and organizational context. It is found that communication energy, resources and team mandate underscore the sense of trust in high performing teams. Diversity is understood...

  16. Introduction to Hardware Security and Trust

    CERN Document Server

    Wang, Cliff

    2012-01-01

    The emergence of a globalized, horizontal semiconductor business model raises a set of concerns involving the security and trust of the information systems on which modern society is increasingly reliant for mission-critical functionality. Hardware-oriented security and trust issues span a broad range including threats related to the malicious insertion of Trojan circuits designed, e.g.,to act as a ‘kill switch’ to disable a chip, to integrated circuit (IC) piracy,and to attacks designed to extract encryption keys and IP from a chip. This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade.  Coverage includes security and trust issues in all types of electronic devices and systems such as ASICs, COTS, FPGAs, microprocessors/DSPs, and embedded systems.  This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of,and trust in, modern society�...

  17. Talking about the boss : effects of generalized and interpersonal trust on workplace gossip

    NARCIS (Netherlands)

    Ellwardt, L.; Wittek, R.P.M.; Wielers, R.J.J.

    This study developed and tested a relational theory of positive and negative gossip about managers. It is argued that spreading information about managers depends on trust in organizations, more specifically the employees' generalized and interpersonal trust in managers and colleagues. Hypotheses

  18. We trust in government, just not in yours: race, partisanship, and political trust, 1958-2012.

    Science.gov (United States)

    Wilkes, Rima

    2015-01-01

    Although it is generally accepted that political trust is reflective of satisfaction with the performance of the incumbent administration, this is only considered true for White Americans. Because their trust reflects a larger discontent with the political system, Black Americans, it is held, do not respond in the same way in the short term. This argument has yet to be tested with over-time data. Time matters. Not only does the race gap in trust change over time but the impact of partisanship and political winning is, by definition, time-dependent. The results of an analysis of the 1958-2012 American National Election Studies data show that Black Americans and White Americans are equally likely to tie short-term performance to trust in government. However, the relationship between partisanship and political trust and, therefore, system discontent, clearly differs for the two groups. Aggregate models that do not take race-partisan sub-group differences into account will therefore be misleading. Copyright © 2014 Elsevier Inc. All rights reserved.

  19. Information Technology Convergence, Secure and Trust Computing, and Data Management ITCS 2012 & STA 2012

    CERN Document Server

    Kim, Jongsung; Zou, Deqing; Lee, Yang

    2012-01-01

    ITCS 2012 and STA 2012 address the various theories and practical applications of information technology convergence, secure and trust computing, and data management in future environments. It will present important results of significant value to solve the application services and various problems within the scope of ITCS 2012 & STA 2012. In addition, we expect it will trigger further related research and technology developments which will improve our lives in the future.

  20. Improving the radiologist–CAD interaction: designing for appropriate trust

    International Nuclear Information System (INIS)

    Jorritsma, W.; Cnossen, F.; Ooijen, P.M.A. van

    2015-01-01

    Computer-aided diagnosis (CAD) has great potential to improve radiologists' diagnostic performance. However, the reported performance of the radiologist–CAD team is lower than what might be expected based on the performance of the radiologist and the CAD system in isolation. This indicates that the interaction between radiologists and the CAD system is not optimal. An important factor in the interaction between humans and automated aids (such as CAD) is trust. Suboptimal performance of the human–automation team is often caused by an inappropriate level of trust in the automation. In this review, we examine the role of trust in the radiologist–CAD interaction and suggest ways to improve the output of the CAD system so that it allows radiologists to calibrate their trust in the CAD system more effectively. Observer studies of the CAD systems show that radiologists often have an inappropriate level of trust in the CAD system. They sometimes under-trust CAD, thereby reducing its potential benefits, and sometimes over-trust it, leading to diagnostic errors they would not have made without CAD. Based on the literature on trust in human–automation interaction and the results of CAD observer studies, we have identified four ways to improve the output of CAD so that it allows radiologists to form a more appropriate level of trust in CAD. Designing CAD systems for appropriate trust is important and can improve the performance of the radiologist–CAD team. Future CAD research and development should acknowledge the importance of the radiologist–CAD interaction, and specifically the role of trust therein, in order to create the perfect artificial partner for the radiologist. This review focuses on the role of trust in the radiologist–CAD interaction. The aim of the review is to encourage CAD developers to design for appropriate trust and thereby improve the performance of the radiologist–CAD team. - Highlights: • Radiologists often have an inappropriate

  1. Metadata trust in a personal video recorder

    NARCIS (Netherlands)

    Boertjes, E.M.

    2004-01-01

    Trust is the belief or confidence in someone that their recommendations will work for you, i.e. that you will like the TV-programs (or other content) that they recommend. Many systems incorporate some notion of trust. Trust is more than similarity in taste, which makes trust a broader concept than

  2. 78 FR 46596 - Secretarial Commission on Indian Trust Administration and Reform

    Science.gov (United States)

    2013-08-01

    ... Trust Administration and Reform (the Commission) will hold a public meeting on August 19, 2013. During.... The management consultant will be attending the upcoming Indian Trust Commission's meeting in... Indian Trust Administration and Reform AGENCY: Office of the Secretary, Interior. ACTION: Notice of...

  3. Task conflict and relationship conflict in top management teams: the pivotal role of intragroup trust.

    Science.gov (United States)

    Simons, T L; Peterson, R S

    2000-02-01

    Task conflict is usually associated with effective decisions, and relationship conflict is associated with poor decisions. The 2 conflict types are typically correlated in ongoing groups, however, which creates a prescriptive dilemma. Three explanations might account for this relationship--misattribution of task conflict as relationship conflict, harsh task conflict tactics triggering relationship conflict, and misattribution of relationship conflict as task conflict. The authors found that intragroup trust moderates the relationship between task conflict and relationship conflict in 70 top management teams. This result supports the "misattribution of task conflict" explanation. The authors also found a weak effect that is consistent with the argument that tactical choices drive the association between the 2 conflict types. We infer that trust is a key to gaining the benefits of task conflict without suffering the costs of relationship conflict.

  4. Heuritic Trust in IoT

    DEFF Research Database (Denmark)

    Kaur, Bipjeet; Tange, Henrik

    2015-01-01

    Increasing use of Internet of things in diverse fields has demanding association in security and trust of such services. The trust on the services cannot exist independent. It is greatly depended on the security of system at each layer. In this paper we analyze different existing trust algorithms...... to develop a combined reputation and trust algorithm. This algorithm is developed in view of developing trustworthy services in the agriculture field where the end users are cautious about their sensitive data but keen in trustworthy services to improve the efficiency of the product....

  5. LSOT: A Lightweight Self-Organized Trust Model in VANETs

    Directory of Open Access Journals (Sweden)

    Zhiquan Liu

    2016-01-01

    Full Text Available With the advances in automobile industry and wireless communication technology, Vehicular Ad hoc Networks (VANETs have attracted the attention of a large number of researchers. Trust management plays an important role in VANETs. However, it is still at the preliminary stage and the existing trust models cannot entirely conform to the characteristics of VANETs. This work proposes a novel Lightweight Self-Organized Trust (LSOT model which contains trust certificate-based and recommendation-based trust evaluations. Both the supernodes and trusted third parties are not needed in our model. In addition, we comprehensively consider three factor weights to ease the collusion attack in trust certificate-based trust evaluation, and we utilize the testing interaction method to build and maintain the trust network and propose a maximum local trust (MLT algorithm to identify trustworthy recommenders in recommendation-based trust evaluation. Furthermore, a fully distributed VANET scenario is deployed based on the famous Advogato dataset and a series of simulations and analysis are conducted. The results illustrate that our LSOT model significantly outperforms the excellent experience-based trust (EBT and Lightweight Cross-domain Trust (LCT models in terms of evaluation performance and robustness against the collusion attack.

  6. Playing Attack and Defense with Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe; Bouganim, Luc

    2014-01-01

    It is often convenient to assume in a data management platform that one or several computing devices are trusted, specially when the goal is to provide privacy guarantees over personal data. But what does it take for a computing device to be trusted? More specifically, how can a personal device...... provide trusted storage? This is the question we tackle in this demonstration. We describe how secure devices, equipped with a trusted execution environment, differ from general purpose devices. We illustrate with our demonstration scenario, that it is much more difficult to attack a storage service...... running on a secure device, than to attack the same service running on a general purpose device....

  7. 78 FR 29787 - ALPS ETF Trust, et al.;

    Science.gov (United States)

    2013-05-21

    ... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 30519; 812-13884] ALPS ETF...(d)(1)(A) and (B) of the Act. APPLICANTS: ALPS ETF Trust (``Trust''), ALPS Advisors, Inc. (``Adviser... actively managed exchange-traded fund (``ETF''). \\1\\ All entities that currently intend to rely on the...

  8. In what we trust? A multi-level study into political trust as an evaluation of state characteristics

    NARCIS (Netherlands)

    van der Meer, T.

    2010-01-01

    A basic level of trust in the political system is considered to be the cornerstone of modern-day democracy. Consequently, scholars and politicians have been concerned with low or declining levels of trust in political institutions. This article focuses on trust in parliament. Many theories have been

  9. The Dynamics of Trust in the Shanghai Water Supply Regime

    Science.gov (United States)

    Zhen, Nahui; Barnett, Jon; Webber, Michael

    2018-02-01

    Trust in natural resource managers and planners is recognized as a crucial component of the public's perception of environmental risks, including the risk of consuming water in cities. Although China is famous for its dubious water quality, public perception of the performance of water suppliers in China has scarcely been considered. Yet this is important, not least because improvements in urban water quality are most likely if the public perceives that there is a risk, which is a function of their levels of trust. We, therefore, examine the Shanghai public's trust in urban water authorities through analysis of the results from a face-to-face questionnaire that 5007 residents responded to. We find that although respondents show a moderate level of overall trust in water suppliers, they have less trust in the honesty and fairness of these organizations. In addition, we find that hukou status and education help explain the differences in people's trust in Shanghai's water authorities, and that these are more influential than factors such as gender and age. For water managers in Shanghai, this implies trust can be improved through a greater effort at public relations and increased transparency about decision making and levels of pollution.

  10. 78 FR 30324 - Secretarial Commission on Indian Trust Administration and Reform

    Science.gov (United States)

    2013-05-22

    ... improvement. The management consultant will also be assessing past trust reform efforts and capturing current... consultant will be attending the upcoming Indian Trust Commission's meeting in Oklahoma City and will be... Indian Trust Administration and Reform AGENCY: Office of the Secretary, Interior. ACTION: Notice of...

  11. A qualitative study of the role of workplace and interpersonal trust in shaping service quality and responsiveness in Zambian primary health centres.

    Science.gov (United States)

    Topp, Stephanie M; Chipukuma, Julien M

    2016-03-01

    Human decisions, actions and relationships that invoke trust are at the core of functional and productive health systems. Although widely studied in high-income settings, comparatively few studies have explored the influence of trust on health system performance in low- and middle-income countries. This study examines how workplace and inter-personal trust impact service quality and responsiveness in primary health services in Zambia. This multi-case study included four health centres selected for urban, peri-urban and rural characteristics. Case data included provider interviews (60); patient interviews (180); direct observation of facility operations (two weeks/centre) and key informant interviews (14) that were recorded and transcribed verbatim. Case-based thematic analysis incorporated inductive and deductive coding. Findings demonstrated that providers had weak workplace trust influenced by a combination of poor working conditions, perceptions of low pay and experiences of inequitable or inefficient health centre management. Weak trust in health centre managers' organizational capacity and fairness contributed to resentment amongst many providers and promoted a culture of blame-shifting and one-upmanship that undermined teamwork and enabled disrespectful treatment of patients. Although patients expressed a high degree of trust in health workers' clinical capacity, repeated experiences of disrespectful or unresponsive care undermined patients' trust in health workers' service values and professionalism. Lack of patient-provider trust prompted some patients to circumvent clinic systems in an attempt to secure better or more timely care. Lack of resourcing and poor leadership were key factors leading to providers' weak workplace trust and contributed to often-poor quality services, driving a perverse cycle of negative patient-provider relations across the four sites. Findings highlight the importance of investing in both structural factors and organizational

  12. Trust in the justice system: A comparative view across Europe

    NARCIS (Netherlands)

    S.G.J. Van de Walle (Steven)

    2009-01-01

    textabstractThe justice system is not one of the most trusted institutions in the UK. While most citizens consider it fair, they also think it is out of touch in specific cases, and many consider it relatively inefficient. The UK is not alone. Many governments throughout Europe and the wider world

  13. A Case for Implementation of Citizen Centric National Identity Management Systems

    DEFF Research Database (Denmark)

    Adjei, Joseph K.

    of trust in transacting parties. Policy makers are therefore trying to implement identity policies to prevent identity abuses, promote the seamless flow of business transactions, and provide citizens the ability to exercise informational self-determination. Previously, the design of identity management...... and exposure, and a high level of literacy. But in developing countries infrastructural challenges, low literacy level, and physical verification of credentials hamper the effective use of identity management systems. This PhD study adapts the DeLone and McLean model of information systems success to the case...

  14. Design of Remote Heat-Meter System Based on Trusted Technology

    Science.gov (United States)

    Yu, Changgeng; Lai, Liping

    2018-03-01

    This article presents a proposal of a heat meter and remote meter reading system for the disadvantages of the hackers very easily using eavesdropping, tampering, replay attack of traditional remote meter reading system. The system selects trusted technology such as, the identity authentication, integrity verifying, and data protection. By the experiments, it is proved that the remote meter reading system of the heat meter can be used to verify the feasibility of the technology, and verify the practicability and operability of data protection technology.

  15. Development and testing of the Multidimensional Trust in Health Care Systems Scale.

    Science.gov (United States)

    Egede, Leonard E; Ellis, Charles

    2008-06-01

    To describe the development and psychometric testing of the Multidimensional Trust in Health Care Systems Scale (MTHCSS). Scale development occurred in 2 phases. In phase 1, a pilot instrument with 70 items was generated from the review of the trust literature, focus groups, and expert opinion. The 70 items were pilot tested in a sample of 256 students. Exploratory factor analysis was used to derive an orthogonal set of correlated factors. In phase 2, the final scale was administered to 301 primary care patients to assess reliability and validity. Phase 2 participants also completed validated measures of patient-centered care, health locus of control, medication nonadherence, social support, and patient satisfaction. In phase 1, a 17-item scale (MTHCSS) was developed with 10 items measuring trust in health care providers, 4 items measuring trust in health care payers, and 3 items measuring trust in health care institutions. In phase 2, the 17-item MTHCSS had a mean score of 63.0 (SD 8.8); the provider subscale had a mean of 40.0 (SD 6.2); the payers subscale had a mean of 12.8 (SD 3.0); and the institutions subscale had a mean of 10.3 (SD 2.1). Cronbach's alpha for the MTHCSS was 0.89 and 0.92, 0.74, and 0.64 for the 3 subscales. The MTHCSS was significantly correlated with patient-centered care (r = .22 to .62), locus of control-chance (r = .42), medication nonadherence (r = -.22), social support (r = .25), and patient satisfaction (r = .67). The MTHCSS is a valid and reliable instrument for measuring the 3 objects of trust in health care and is correlated with patient-level health outcomes.

  16. CEO and Businesses are Losing Trust: Comparison of EU, USA, Czech and Slovak Republic

    Directory of Open Access Journals (Sweden)

    Denisa Kasl Kollmannová

    2012-06-01

    Full Text Available This article presents an in-depth study based on open-source data analysis (Edelman Trust Barometer and EuropeanCommunication Monitor concerning the general loss of trust, which both commercial companies, governments and,on a minor scale, also NGOs have been experiencing since the Global Financial Crisis in 2008. Trust is an essentialline of corporate communications, public relations and reputation management of companies and it is personalizedby the CEOs and top management. According to the data, the trust of CEOs saw the biggest decline in the U.S.while in Slovakia the trust is still quite high; on the contrary, in the E.U. in general, the level of trust of CEOs reacheda historical minimum of 30%. The overall shift from trusting the traditional authorities, such as government, CEOsand offi cial representatives to academics, stakeholders, employees and general “vox populi” can be seen globally.The aim of this article is to defi ne trust and the social and communications context of building trust as a key factorin a company´s reputation. Finally, clear managerial implications on reputation management focusing on Czech andSlovak CEOs and businesses will be given.

  17. The Influence of Trust and Security in the Use of Electronic Payment System in Manado

    OpenAIRE

    Tani, Frangky

    2015-01-01

    Electronic payment is the way to make in the process of buying and selling customers in real estate market or online market easier. Electronic payments give innovation to consumer with transaction overseas like online shopping. This study aims to determine the influence of trust and security in the use of electronic payment system. Where the independent variables are trust and security influence in using electronic payment system as the dependent variable. This research used quantitative meth...

  18. A trust fund approach to accelerating deployment of CCS: options and considerations

    Energy Technology Data Exchange (ETDEWEB)

    Naomi Pena; Edward S. Rubin

    2008-01-15

    The paper discusses one possible avenue to accelerate deployment of carbon dioxide capture and sequestration (CCS) technologies: use of a special-purpose CCS Trust Fund. A CCS Trust Fund financed, for example, through fees on coal-based or fossil fuel-based electricity generation may have a role in reducing CO{sub 2} emissions from power plants because it could: raise funds at the scale needed to support a significant number (e.g., 10 to 30) of commercial-scale CCS projects; ensure that the funds raised would be used to demonstrate CCS at commercial scale for a full range of systems applicable to U.S. power plants; establish the true costs, reliability, and operability of power plants with CCS; utilize private-sector business standards for project selection and management to ensure program cost effectiveness; and significantly reduce CCS costs within 10 to 15 years by supporting approximately 30 demonstrations, yielding substantial national economic benefits as CCS becomes widely deployed. The United States has considerable experience with trust funds. While no single existing fund illustrates all the features that might be desirable for a CCS Trust Fund, lessons from prior U.S. experience can be used to design an effective, efficient mechanism for advancing commercial-scale deployment of CCS. In particular, experience has indicated the importance of financial self-sufficiency, private-sector management standards, insulation from the annual Congressional appropriations process, and termination upon completion of objectives. Carefully crafted enabling legislation and, most likely, use of a quasi-public or private entity to manage a CCS Trust Fund will be needed to incorporate these and other desirable features. 25 refs., 1 tab., 1 app.

  19. The relationship between trust in mass media and the healthcare system and individual health: evidence from the AsiaBarometer Survey

    Directory of Open Access Journals (Sweden)

    Tokuda Yasuharu

    2009-01-01

    Full Text Available Abstract Background Vertical and horizontal trust, as dimensions of social capital, may be important determinants of health. As mass media campaigns have been used extensively to promote healthy lifestyles and convey health-related information, high levels of individual trust in the media may facilitate the success of such campaigns and, hence, have a positive influence on health. However, few studies have investigated the relationship between trust levels in mass media, an aspect of vertical trust, and health. Methods Based on cross-sectional data of the general population from the AsiaBarometer Survey (2003–2006, we analyzed the relationship between self-rated health and trust in mass media, using a multilevel logistic model, adjusted for age, gender, marital status, income, education, occupation, horizontal trust, and trust in the healthcare system. Results In a total of 39082 participants (mean age 38; 49% male, 26808 (69% were classified as in good health. By the levels of trust in mass media, there were 6399 (16% who reported that they trust a lot, 16327 (42% reporting trust to a degree, 9838 (25% who do not really trust, 3307 (9% who do not trust at all, and 191 (0.5% who have not thought about it. In the multilevel model, trust in mass media was associated with good health (do not trust at all as the base group: the odds ratios (OR of 1.16 (95% confidence interval (CI = 1.05–1.27 for do not really trust; OR of 1.35 (95% CI = 1.23–1.49 for trust to a degree, and 1.57 (95% CI = 1.36–1.81 for trust a lot. Horizontal trust and trust in the healthcare system were also associated with health. Conclusion Vertical trust in mass media is associated with better health in Asian people. Since mass media is likely an important arena for public health, media trust should be enhanced to make people healthier.

  20. 78 FR 66376 - Secretarial Commission on Indian Trust Administration and Reform

    Science.gov (United States)

    2013-11-05

    ... Trust Administration and Reform (the Commission) will hold a public webinar meeting on November 20, 2013...'s management and administration of the trust assets within a two-year period and will offer... Indian Trust Administration and Reform AGENCY: Office of the Secretary, Interior. ACTION: Notice of...

  1. Trust us Trust Thorp Campaign

    International Nuclear Information System (INIS)

    Kane, John

    1995-01-01

    The history of the nuclear industry in the UK has been dominated by Sellafield reprocessing site in west Cumbria. The site, formerly owned by the United Kingdom Atomic Energy Authority was transferred to the newly-formed British Nuclear Fuels plc in 1971. Although trade union representation existed at Sellafield before the emergence of BNFL, it is only after this date that collective trade union activity began to emerge. In 1977, after a long running dispute with management about the issue of radiation dose uptake, the workforce went on strike, forcing the management to question their previous 'need to know' attitude and to improve industrial relations. In 1984, it was recognised that the lobbying influence of trade unions within politics, and especially the Labour party could be used to greater effect to challenge potentially -damaging influence of anti-nuclear campaigners. The National Campaign for the Nuclear Industry (NCNI) was born, combining nine industrial and non-industrial trade unions within the nuclear industry. Its task during the last ten years has been to put forward the interests of its members collectively and to secure the, role of nuclear power. within a balanced energy policy in the political arena. In dome so, it has gained a credible voice within both the trade union movement and the Labour party. The new Thermal Oxide Reprocessing Plant (THORP) received strong support from the NCNI during its construction and commissioning phases. When it became clear that the anti-nuclear lobby had gained the upper hand and were beginning to seriously delay the necessary legal instruments required to start the plant, the power of collective action was once again recognised, and the TRUST US campaign was born. The campaign was run and organised by a clerks committee and fronted by the Trade Unions at Sellafield., and turned out to be one of the most successful] trade union campaigns in recent history. The first task involved getting, the entire workforce on

  2. Secure multi-party communication with quantum key distribution managed by trusted authority

    Science.gov (United States)

    Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

    2013-07-09

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  3. Secure multi-party communication with quantum key distribution managed by trusted authority

    Science.gov (United States)

    Hughes, Richard John; Nordholt, Jane Elizabeth; Peterson, Charles Glen

    2017-06-14

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  4. How Much Do You Trust Me? Learning a Case-Based Model of Inverse Trust

    Science.gov (United States)

    2014-10-01

    metric does not take into account factors of the robot’s behavior that increase trust. The inverse trust metric we use is based on the number of times the...sets contain identical behav- iors. To account for this, the similarity function looks at the overlap between the two sets and ignores behaviors that...155–156 5. Jian, J.Y., Bisantz, A.M., Drury , C.G.: Foundations for an empirically determined scale of trust in automated systems. International

  5. 25 CFR 115.711 - How is money in a trust account invested?

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false How is money in a trust account invested? 115.711 Section 115.711 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR FINANCIAL ACTIVITIES TRUST FUNDS... § 115.711 How is money in a trust account invested? OTFM manages trust fund investments and its...

  6. Trust as a Critical Concept

    DEFF Research Database (Denmark)

    Bordum, Anders

    2004-01-01

    In this articlei I will argue that trust is a fundamental and critical concept because trust is the direct or transcendental constitutive ground of most social phenomena, as well as applicable as an operational method in critical theory. There are two different but overlapping positions on trust I...... address in this article. One is the standpoint we find in business strategy, that trust is naïve to show, and control or contracts are presumed better. In the strategy game the idealistic good guys seems to lose (Arrow 1974), (Williamson 1975). The other position is the position taken by systems theory...

  7. Verification of Triple Modular Redundancy Insertion for Reliable and Trusted Systems

    Science.gov (United States)

    Berg, Melanie; LaBel, Kenneth

    2016-01-01

    If a system is required to be protected using triple modular redundancy (TMR), improper insertion can jeopardize the reliability and security of the system. Due to the complexity of the verification process and the complexity of digital designs, there are currently no available techniques that can provide complete and reliable confirmation of TMR insertion. We propose a method for TMR insertion verification that satisfies the process for reliable and trusted systems.

  8. SecGRID: Model for Maintaining Trust in Large-scale Dynamic Environments

    Czech Academy of Sciences Publication Activity Database

    Špánek, Roman

    2009-01-01

    Roč. 1, č. 2 (2009), s. 146-158 ISSN 1741-847X R&D Projects: GA AV ČR 1ET100300419; GA MŠk 1M0554 Institutional research plan: CEZ:AV0Z10300504 Keywords : distributed systems * hypergraphs * security * trust management Subject RIV: IN - Informatics, Computer Science

  9. Trust models for efficient communication in Mobile Cloud Computing and their applications to e-Commerce

    Science.gov (United States)

    Pop, Florin; Dobre, Ciprian; Mocanu, Bogdan-Costel; Citoteanu, Oana-Maria; Xhafa, Fatos

    2016-11-01

    Managing the large dimensions of data processed in distributed systems that are formed by datacentres and mobile devices has become a challenging issue with an important impact on the end-user. Therefore, the management process of such systems can be achieved efficiently by using uniform overlay networks, interconnected through secure and efficient routing protocols. The aim of this article is to advance our previous work with a novel trust model based on a reputation metric that actively uses the social links between users and the model of interaction between them. We present and evaluate an adaptive model for the trust management in structured overlay networks, based on a Mobile Cloud architecture and considering a honeycomb overlay. Such a model can be useful for supporting advanced mobile market-share e-Commerce platforms, where users collaborate and exchange reliable information about, for example, products of interest and supporting ad-hoc business campaigns

  10. ITrace: An implicit trust inference method for trust-aware collaborative filtering

    Science.gov (United States)

    He, Xu; Liu, Bin; Chen, Kejia

    2018-04-01

    The growth of Internet commerce has stimulated the use of collaborative filtering (CF) algorithms as recommender systems. A CF algorithm recommends items of interest to the target user by leveraging the votes given by other similar users. In a standard CF framework, it is assumed that the credibility of every voting user is exactly the same with respect to the target user. This assumption is not satisfied and thus may lead to misleading recommendations in many practical applications. A natural countermeasure is to design a trust-aware CF (TaCF) algorithm, which can take account of the difference in the credibilities of the voting users when performing CF. To this end, this paper presents a trust inference approach, which can predict the implicit trust of the target user on every voting user from a sparse explicit trust matrix. Then an improved CF algorithm termed iTrace is proposed, which takes advantage of both the explicit and the predicted implicit trust to provide recommendations with the CF framework. An empirical evaluation on a public dataset demonstrates that the proposed algorithm provides a significant improvement in recommendation quality in terms of mean absolute error.

  11. Waste Oriented Innovation Culture-Transparency-Public Trust Cycle : Success Key for Nuclear Facility Management in Indonesia

    International Nuclear Information System (INIS)

    Susetyo Hario Putero; Haryono B Santosa

    2007-01-01

    Radioactive matter that is a primary material in a nuclear facility, including nuclear power generation, is a part of hazardous materials. Its existence will lead a controversy, although the precise management system for handling it is available. Public sometimes reject the nuclear technology due to the lack of understanding and wrong perception on that technology, especially the radioactive waste treatment. So, strategies should be designed for correcting public perception, until public acceptance on utilization of nuclear technology in Indonesia increase. The innovation development on radioactive waste management was studied by observing and interviewing managements and operators of Japan Atomic Energy Agency (JAEA), Japan. The constructing of concept was based on study result. Based on assumption that the current state of the radioactive waste treatment is suitable and there is serious improvement of technology, therefore systematic and precise oriented corrective efforts of public perception could be done. Transparency, intensive communication, and public participation that show responsible action for emerging mutual trust are basic of strategy that should be developed. High level public acceptance on utilization of nuclear technology is expected to be able for stimulating and supporting sustainable technology innovation culture. (author)

  12. Measuring Trust

    OpenAIRE

    Glaeser, Edward Ludwig; Laibson, David I.; Scheinkman, Jose A.; Soutter, Christine L.

    2000-01-01

    We combine two experiments and a survey to measure trust and trustworthiness—two key components of social capital. Standard attitudinal survey questions about trust predict trustworthy behavior in our experiments much better than they predict trusting behavior. Trusting behavior in the experiments is predicted by past trusting behavior outside of the experiments. When individuals are closer socially, both trust and trustworthiness rise. Trustworthiness declines when partners are of differen...

  13. CONTENT MANAGEMENT SYSTEMS (CMS OPEN SOURCE WEBSITES

    Directory of Open Access Journals (Sweden)

    Marinela Lăzărică

    2013-01-01

    Full Text Available Firms need flexible software applications, which may be adaptable to dynamic changes of the modern business environment; they also need more control over their software costs, security and trust in purchased and implemented software. Moreover, they need to be free of individual software vendors and license costs for the software, etc. The solution of this problem consisted in open source applications and open source technology has proven that it can often provide high-quality software being a challenge for old models of software development and maintenance. The first content management system was announced in the late 90s. The offer of such software systems is varied and each of them has its own characteristics. This requires a comparative analysis of viable open-source systems in order to choose the most appropriate imposed goals. In this context, the paper illustrates the use of an open source content management system, like WordPress, to develop a content site in design of websites and analyzeits characteristics.

  14. Trust in the context of management relationships: an empirical study.

    OpenAIRE

    Atkinson, Sally; Butcher, David

    2003-01-01

    This paper responds to calls for exploration of the dynamics of trust in the embedded context of interpersonal managerial relationships. Building on theoretical distinctions between different types of interpersonal relationships established in social psychology, the paper proposes a generic typology of interpersonal managerial relationships, along with associated hypotheses and implications for trust. The later part of the paper then reports the results from an initial explorat...

  15. Trust

    OpenAIRE

    Fojtů, Dominik

    2015-01-01

    This rigorous thesis is focused on a status of trust in an application practise in a Czech legislation with a context of historical aspects of institutes similar to trusts as well as actual legislation. The thesis includes also analyses of more difficult provisions concerning the trust, including economic impacts representing accounting and tax consequences. Also comparison with established modifications trusts in Europe and their possible utilization of the Czech point of view of the settlor...

  16. The Influence Of Franchisors Brand Image On Franchisee Trust And Its Impact On Franchisee Intention To Remain In Franchise System

    OpenAIRE

    Erlinda; Yuyus Suryana; Faisal Afiff; Arief Helmi

    2015-01-01

    Franchisee is the party that play important role in the franchising because most of franchise outlets managed and operated by franchisees. Nevertheless in the process of business operating there would be the conflict of interests between franchisor as the owner of brand with the franchisee as the buyer of franchisors brand to operating retail outlet.and bound with futures contract. Therefore franchisee trust is needed in order to maintain franchisee intention to remain in franchise system. O...

  17. A Formal Model of Trust Chain based on Multi-level Security Policy

    OpenAIRE

    Kong Xiangying

    2013-01-01

    Trust chain is the core technology of trusted computing. A formal model of trust chain based on finite state automata theory is proposed. We use communicating sequential processes to describe the system state transition in trust chain and by combining with multi-level security strategy give the definition of trust system and trust decision theorem of trust chain transfer which is proved meantime. Finally, a prototype system is given to show the efficiency of the model.

  18. The Enterprise Data Trust at Mayo Clinic: a semantically integrated warehouse of biomedical data.

    Science.gov (United States)

    Chute, Christopher G; Beck, Scott A; Fisk, Thomas B; Mohr, David N

    2010-01-01

    Mayo Clinic's Enterprise Data Trust is a collection of data from patient care, education, research, and administrative transactional systems, organized to support information retrieval, business intelligence, and high-level decision making. Structurally it is a top-down, subject-oriented, integrated, time-variant, and non-volatile collection of data in support of Mayo Clinic's analytic and decision-making processes. It is an interconnected piece of Mayo Clinic's Enterprise Information Management initiative, which also includes Data Governance, Enterprise Data Modeling, the Enterprise Vocabulary System, and Metadata Management. These resources enable unprecedented organization of enterprise information about patient, genomic, and research data. While facile access for cohort definition or aggregate retrieval is supported, a high level of security, retrieval audit, and user authentication ensures privacy, confidentiality, and respect for the trust imparted by our patients for the respectful use of information about their conditions.

  19. Trust, accreditation and Philanthropy in the Netherlands

    OpenAIRE

    Bekkers, R.H.F.P.

    2003-01-01

    Given the increasing numbers of scandals, the awareness among fund-raisers that the public’s trust is crucial for the nonprofit sector is growing. This study investigates the relationship between trust and charitable giving. Charitable organizations can increase the public’s trust by signaling their trustworthiness. The example of the Netherlands shows how a system of accreditation can be an instrument for signaling trustworthiness to the public. Donors aware of the accreditation system have ...

  20. On-line reputation systems : the effects of feedback comments and reactions on building and rebuilding trust in on-line auctions

    NARCIS (Netherlands)

    Utz, S.; Matzat, U.; Snijders, C.C.P.

    2009-01-01

    Previous research on reputation systems primarily focused on their trust-building function. The present research addresses their trust-rebuilding function-specifically, the role of the short text comments given in reaction to negative feedback. Rebuilding trust is often necessary because on-line

  1. The Influence of Trust on Project Management Practice within the Construction Industry

    OpenAIRE

    Strahorn, Scott; Brewer, Graham; Gajendran, Thayaparan

    2017-01-01

    Given that any construction project is inherently a human endeavour, it follows that issues of trust are significant in terms of the stakeholder interactions that deliver eventual project outcomes.  Previous research indicates that the relational basis upon which projects are undertaken are intended to influence the likelihood of trusting relationships between stakeholders.  Thus, experiences of trust in a construction project environment are likely to be influenced by the contextual specific...

  2. Measuring physicians' trust: A scoping review with implications for public policy.

    Science.gov (United States)

    Wilk, Adam S; Platt, Jodyn E

    2016-09-01

    Increasingly, physicians are expected to work in productive, trusting relationships with other health system stakeholders to improve patient and system outcomes. A better understanding of physicians' trust is greatly needed. This study assesses the state of the literature on physicians' trust in patients, other health care providers, institutions, and data systems or technology, and identifies key themes, dimensions of trust considered, quantitative measures used, and opportunities for further development via a scoping review. Peer-reviewed, English-language research articles were identified for inclusion in this study based on systematic searches of the Ovid/Medline, Pubmed, Proquest, Scopus, Elsevier, and Web of Science databases. Search terms included "trust" along with "physician," "doctor," "primary care provider," "family practitioner," "family practice," "generalist," "general practitioner," "general practice," "internist," "internal medicine," or "health professional," and plausible variants. Among the relevant articles identified (n = 446), the vast majority focused on patient trust in physicians (81.2%). Among articles examining physicians' trust, rigorous investigations of trust are rare, narrowly focused, and imprecise in their discussion of trust. Robust investigations of the effects of trust or distrust-as opposed to trust's determinants-and studies using validated quantitative trust measures are particularly rare. Studies typically measured trust using the language of confidence, effective communication, or cooperation, rarely or never capturing other important dimensions of trust, such as fidelity, the trustee's reputation, social capital, vulnerability, and acceptance. Research employing new, validated measures of physicians' trust, especially trust in institutions, may be highly informative to health system leaders and policymakers seeking to hone and enhance tools for improving the effectiveness and efficiency of the health care system

  3. THE TRUST INSTITUTION ROLE IN THE MANAGEMENT OF COMMUNICATIONS IN SOCIAL PROJECT

    Directory of Open Access Journals (Sweden)

    Ирина Николаевна КАДЫКОВА

    2015-05-01

    Full Text Available The authors propose expansion of the social projects classification on the basis of the magnitude of the projects products impact on the society, focusing on their role in the development of the state. The authors accept Russell D. Archibald projects classification as a whole, and expand it. Two subcategory are allocated ("social applied projects" and "socio-forming projects". Comparison was conducted on a number of indicators (project volume, project complexity, level of project risk and so on.. The innovativeness of innovative social-forming projects is identified. They are innovative in that aim formation / change of public opinion. The role of the institute of trust in building of effective system of social project communication is defined. The trust has a significant impact on the timing of the socio-forming projects. Identify priority communication channel for innovative projects of the social spectrum - online social network.

  4. Transparency in Supply Chains: Is Trust a Limiting Factor?

    OpenAIRE

    Frentrup, Mechthild; Theuvsen, Ludwig

    2006-01-01

    Transparency has gained much relevance in food chains. This paper summarizes the determinants of transparency and points out that transparency in the sense of effective information exchange needs trust as a mediator in order to become a powerful tool in supply chain management. In addition to that this paper analyses the characteristics of trust and highlights the reciprocal and dynamic mechanisms of trust on transparency and vice versa. It is argued that both constructs should be enhanced at...

  5. Temperament Constructs Related to Betrayal of Trust

    Science.gov (United States)

    1991-12-01

    disintegrate. The interrelatedness between system trust and interpersonal trust has been noted by Durkheim (1933), who predicted a loss of trust in others...and suspicion. Journal of Conflict Resolution, 2, 265-279. Durkheim , E. (1933). The division of labor in societ’. New York: Free Press of Glencoe

  6. A fuzzy expert system to Trust-Based Access Control in crowdsourcing environments

    Directory of Open Access Journals (Sweden)

    Olusegun Folorunso

    2015-07-01

    Full Text Available Crowdsourcing has been widely accepted across a broad range of application areas. In crowdsourcing environments, the possibility of performing human computation is characterized with risks due to the openness of their web-based platforms where each crowd worker joins and participates in the process at any time, causing serious effect on the quality of its computation. In this paper, a combination of Trust-Based Access Control (TBAC strategy and fuzzy-expert systems was used to enhance the quality of human computation in crowdsourcing environment. A TBAC-fuzzy algorithm was developed and implemented using MATLAB 7.6.0 to compute trust value (Tvalue, priority value as evaluated by fuzzy inference system (FIS and finally generate access decision to each crowd-worker. In conclusion, the use of TBAC is feasible in improving quality of human computation in crowdsourcing environments.

  7. Evaluation of social interaction, task management, and trust among dental hygiene students in a collaborative learning environment.

    Science.gov (United States)

    Saylor, Catherine D; Keselyak, Nancy T; Simmer-Beck, Melanie; Tira, Daniel

    2011-02-01

    The purpose of this study was to evaluate the impact of collaborative learning on the development of social interaction, task management, and trust in dental hygiene students. These three traits were assessed with the Teamwork Assessment Scale in two different learning environments (traditional lecture/lab and collaborative learning environment). A convenience sample of fifty-six entry-level dental hygiene students taking an introductory/preclinic course at two metropolitan area dental hygiene programs provided comparable experimental and control groups. Factor scores were computed for the three traits, and comparisons were conducted using the Ryan-Einot-Gabriel-Welsh multiple comparison procedure among specific cell comparisons generated from a two-factor repeated measures ANOVA. The results indicate that the collaborative learning environment influenced dental hygiene students positively regarding the traits of social interaction, task management, and trust. However, comparing dental hygiene students to undergraduate students overall indicates that dental hygiene students already possess somewhat higher levels of these traits. Future studies on active learning strategies should examine factors such as student achievement and explore other possible active learning methodologies.

  8. Patient-physician trust: an exploratory study.

    Science.gov (United States)

    Thom, D H; Campbell, B

    1997-02-01

    Patients' trust in their physicians has recently become a focus of concern, largely owing to the rise of managed care, yet the subject remains largely unstudied. We undertook a qualitative research study of patients' self-reported experiences with trust in a physician to gain further understanding of the components of trust in the context of the patient-physician relationship. Twenty-nine patients participants, aged 26 to 72, were recruited from three diverse practice sites. Four focus groups, each lasting 1.5 to 2 hours, were conducted to explore patients' experiences with trust. Focus groups were audio-recorded, transcribed, and coded by four readers, using principles of grounded theory. The resulting consensus codes were grouped into seven categories of physician behavior, two of which related primarily to technical competence (thoroughness in evaluation and providing appropriate and effective treatment) and five of which were interpersonal (understanding patient's individual experience, expressing caring, communicating clearly and completely, building partnership/sharing power and honesty/respect for patient). Two additional categories were predisposing factors and structural/staffing factors. Each major category had multiple subcategories. Specific examples from each major category are provided. These nine categories of physician behavior encompassed the trust experiences related by the 29 patients. These categories and the specific examples provided by patients provide insights into the process of trust formation and suggest ways in which physicians could be more effective in building and maintaining trust.

  9. 77 FR 65425 - Legg Mason ETF Trust, et al.; Notice of Application

    Science.gov (United States)

    2012-10-26

    ... Mason ETF Trust, et al.; Notice of Application October 22, 2012. AGENCY: Securities and Exchange...)(1)(A) and (B) of the Act. Applicants: Legg Mason ETF Trust (the ``Trust''), Legg Mason Partners Fund... offer three actively-managed investment series: Legg Mason Western Asset Ultra-Short Duration ETF, Legg...

  10. Development of a trusted healthcare service to support self-management and a physically active lifestyle in COPD patients

    NARCIS (Netherlands)

    Tabak, Monique; Flierman, I.; van Schooten, B.W.; Hermens, Hermanus J.

    2013-01-01

    Introduction: In chronic disease management, such as in chronic obstructive pulmonary disease (COPD), technology can play an important role to increase the quality and efficiency of care. In the THeCS project, which is part of the large Dutch COMMIT programme, we aim to develop a trusted healthcare

  11. 'Trust my doctor, trust my pancreas': trust as an emergent quality of social practice.

    Science.gov (United States)

    Cohn, Simon

    2015-06-11

    Growing attention is being paid to the importance of trust, and its corollaries such as mistrust and distrust, in health service and the central place they have in assessments of quality of care. Although initially focussing on doctor-patient relationships, more recent literature has broadened its remit to include trust held in more abstract entities, such as organisations and institutions. There has consequently been growing interest to develop rigorous and universal measures of trust. Drawing on illustrative ethnographic material from observational research in a UK diabetes clinic, this paper supports an approach that foregrounds social practice and resists conceiving trust as solely a psychological state that can be divorced from its context. Beyond exploring the less-than-conscious nature of trust, the interpretations attend to the extent to which trust practices are distributed across a range of actors. Data from clinical encounters reveal the extent to which matters of trust can emerge from the relationships between people, and sometimes people and things, as a result of a wide range of pragmatic concerns, and hence can usefully be conceived of as an extended property of a situation rather than a person. Trust is rarely explicitly articulated, but remains a subtle feature of experience that is frequently ineffable. A practice approach highlights some of the problems with adopting a general psychological or intellectualist conception of trust. In particular, assuming it is a sufficiently stable internal state that can be stored or measured not only transforms a diffuse and often ephemeral quality into a durable thing, but ultimately presents it as a generic state that has meaning independent of the specific relationships and context that achieve it. Emphasising the context-specific nature of trust practices does not dismiss the potential of matters of trust, when they emerge, to be transposed to other contexts. But it does highlight how, on each occasion

  12. Perceptions from the public and private sector on trust and cooperation in the field of environmental management in Lebanon

    NARCIS (Netherlands)

    Abbas, Nivine; van der Molen, I.; Nader, M.; Lovett, Jonathan Cranidge

    2013-01-01

    This paper positions trust and cooperation in the context of environmental management in Lebanon. Previous studies indicated increasing environmental problems in this area. The effectiveness of the Lebanese government to address these challenges has been reported to be constrained by large varieties

  13. Review of Trusted Computer System Evaluation Criteria of Some Countries (USA, Canada, EC

    Directory of Open Access Journals (Sweden)

    Natalia Mikhailovna Nikiforova

    2013-02-01

    Full Text Available In the paper a brief review of the evolution in developing and designing trusted computer system evaluation criteria from specific national to common international standards is given/suggested.

  14. The Chinese community patient’s life satisfaction, assessment of community medical service, and trust in community health delivery system

    Science.gov (United States)

    2013-01-01

    Background Although the Chinese government put a lot of effort into promoting the community patient’s life satisfaction, there still lacked the holistic and systematic approaches to promote the community patient’s life satisfaction in various regions of China. On the basis of the literature, it was found that both the community patient’s assessment of community medical service and trust in community health delivery system were important considerations when the community patient comprehensively evaluated community medical service to generate life satisfaction. So this study was set up to test whether and to what extent the community patient’s assessments of various major aspects of community medical service/various major aspects of the community patient’s trust in community health delivery system influenced life satisfaction in whole China/in various regions of China. Methods In order to explore the situation of China’s community health delivery system before 2009 and provide a reference for China’s community health delivery system reform, the data that could comprehensively and accurately reflect the community patient’s life satisfaction, assessment of community medical service, and trust in community health delivery system in various regions of China was needed, so this study collaborated with the National Bureau of Statistics of China to carry out a large-scale 2008 national community resident household survey (N = 3,306) for the first time in China. And the specified ordered probit models were established to analyze the dataset from this household survey. Results Among major aspects of community medical service, the medical cost (particularly in developed regions), the doctor-patient communication (particularly in developed regions), the medical facility and hospital environment (particularly in developed regions), and the medical treatment process (particularly in underdeveloped regions) were all key considerations (ppatient’s life

  15. MODEL OF THE QUALITY MANAGEMENT SYSTEM OF A MACHINE TOOL COMPANY

    Directory of Open Access Journals (Sweden)

    Катерина Вікторівна КОЛЕСНІКОВА

    2016-02-01

    Full Text Available Development of models and methods such that would improve the competitive position of enterprises by improving management processes is an important task of project management. Lack of project management within the information technology and continuous improvement of methods for the management of the environment, interaction, community, value and trust, based on the strategic objectives of enterprises and based on models that take into account the relationship of the system, resulting in significant material and resource costs. In the current work the improvement of the quality management system machine-tool company HC MIKRON® and proved that the introduction of new processes critical analysis requirements for products, support processes of the products to consumers and enterprises in the formation of a system of responsibility, division of responsibilities and reporting (according to ISO 9001: 2009 is an important scientific and reasonable step to improve the level of technological maturity and structural modernization of enterprise management. For the improved structure of the analysis model and test the properties of ergodicity, as a condition of efficiency, a new quality management system.

  16. Analysis of Privacy-Enhancing Identity Management Systems

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    Privacy has become a major issue for policy makers. This has been impelled by the rapid development of technologies that facilitate collection, distribution, storage, and manipulation of personal information. Business organizations are finding new ways of leveraging the value derived from consumer...... is an attempt to understand the relationship between individuals’ intentions to disclose personal information, their actual personal information disclosure behaviours, and how these can be leveraged to develop privacy-enhancing identity management systems (IDMS) that users can trust. Legal, regulatory...... and technological aspects of privacy and technology adoption are also discussed....

  17. Organisational culture and trust as influences over the implementation of equity-oriented policy in two South African case study hospitals.

    Science.gov (United States)

    Erasmus, Ermin; Gilson, Lucy; Govender, Veloshnee; Nkosi, Moremi

    2017-09-15

    This paper uses the concepts of organisational culture and organisational trust to explore the implementation of equity-oriented policies - the Uniform Patient Fee Schedule (UPFS) and Patients' Rights Charter (PRC) - in two South African district hospitals. It contributes to the small literatures on organisational culture and trust in low- and middle-income country health systems, and broader work on health systems' people-centeredness and "software". The research entailed semi-structured interviews (Hospital A n = 115, Hospital B n = 80) with provincial, regional, district and hospital managers, as well as clinical and non-clinical hospital staff, hospital board members, and patients; observations of policy implementation, organisational functioning, staff interactions and patient-provider interactions; and structured surveys operationalising the Competing Values Framework for measuring organisational culture (Hospital A n = 155, Hospital B n = 77) and Organisational Trust Inventory (Hospital A n = 185, Hospital B n = 92) for assessing staff-manager trust. Regarding the UPFS, the hospitals' implementation approaches were similar in that both primarily understood it to be about revenue generation, granting fee exemptions was not a major focus, and considerable activity, facility management support, and provincial support was mobilised behind the UPFS. The hospitals' PRC paths diverged quite significantly, as Hospital A was more explicit in communicating and implementing the PRC, while the policy also enjoyed stronger managerial support in Hospital A than Hospital B. Beneath these experiences lie differences in how people's values, decisions and relationships influence health system functioning and in how the nature of policies, culture, trust and power dynamics can combine to create enabling or disabling micro-level implementation environments. Achieving equity in practice requires managers to take account of "unseen" but important factors such as

  18. Building Trusting Relationships in the Medical Practice Team: Thirty Rules to Live By for You and Your Staff.

    Science.gov (United States)

    Hills, Laura

    2015-01-01

    A medical practice team without trust isn't really a team; it's just a group of individuals who work together in a medical practice, often making disappointing progress. This is true no matter how capable or talented the individuals are. Your staff may never reach its full potential if trust is not present. This article offers medical practice managers 30 rules for building trust in their practices: 15 rules that will help them in their leadership roles, and 15 rules to teach and discuss with their employees. It suggests a trust-building screening question to include in job interviews to determine if applicants have a high capacity for trust. It also describes Reina and Reina's "Three C's of Trust," a model that practice managers may find useful as they develop trust competencies in their staffs. This article also includes 10 inspiring quotes that will help medical practice employees build trust and five easy-to-facilitate trust-building exercises that managers can use with the medical practice team.

  19. Culture on trust within organizations between China and the UK

    OpenAIRE

    Chen, K. G.

    2006-01-01

    This research paper looks into the social aspect of the topic "Trust" in between the Chinese and British construction industry. It will also see how culture affects trust in the relationships between management levels within contracting organisations. Many theories by other scholars have looked upon and developed on further. The research consists of analysis of questionnaires filled out by different management levels in many organisations between China and the UK, and are presented in graphs ...

  20. Trust me, I am Robot!

    DEFF Research Database (Denmark)

    Stoyanova, Angelina; Drefeld, Jonas; Tanev, Stoyan

    of the emerging trust relationship is a key component of the use value of the robotic system and of the value proposition of the robotic system producers. The study is based on a qualitative research approach combining the phenomenological research paradigm with a grounded theory building approach based......The aim of this paper is to discuss some of the issues regarding the emergence of trust within the context of the interaction between human patients and medical rehabilitation technology based on robot system solutions. The starting assumption of the analysis is that the articulation...

  1. Quantifying and Qualifying Trust: Spectral Decomposition of Trust Networks

    NARCIS (Netherlands)

    Pavlovic, Dusko; Degano, Pierpaolo; Etalle, Sandro; Guttman, Joshua

    In a previous FAST paper, I presented a quantitative model of the process of trust building, and showed that trust is accumulated like wealth: the rich get richer. This explained the pervasive phenomenon of adverse selection of trust certificates, as well as the fragility of trust networks in

  2. Research on Linux Trusted Boot Method Based on Reverse Integrity Verification

    Directory of Open Access Journals (Sweden)

    Chenlin Huang

    2016-01-01

    Full Text Available Trusted computing aims to build a trusted computing environment for information systems with the help of secure hardware TPM, which has been proved to be an effective way against network security threats. However, the TPM chips are not yet widely deployed in most computing devices so far, thus limiting the applied scope of trusted computing technology. To solve the problem of lacking trusted hardware in existing computing platform, an alternative security hardware USBKey is introduced in this paper to simulate the basic functions of TPM and a new reverse USBKey-based integrity verification model is proposed to implement the reverse integrity verification of the operating system boot process, which can achieve the effect of trusted boot of the operating system in end systems without TPMs. A Linux operating system booting method based on reverse integrity verification is designed and implemented in this paper, with which the integrity of data and executable files in the operating system are verified and protected during the trusted boot process phase by phase. It implements the trusted boot of operation system without TPM and supports remote attestation of the platform. Enhanced by our method, the flexibility of the trusted computing technology is greatly improved and it is possible for trusted computing to be applied in large-scale computing environment.

  3. Privacy Management and Networked PPD Systems - Challenges Solutions.

    Science.gov (United States)

    Ruotsalainen, Pekka; Pharow, Peter; Petersen, Francoise

    2015-01-01

    Modern personal portable health devices (PPDs) become increasingly part of a larger, inhomogeneous information system. Information collected by sensors are stored and processed in global clouds. Services are often free of charge, but at the same time service providers' business model is based on the disclosure of users' intimate health information. Health data processed in PPD networks is not regulated by health care specific legislation. In PPD networks, there is no guarantee that stakeholders share same ethical principles with the user. Often service providers have own security and privacy policies and they rarely offer to the user possibilities to define own, or adapt existing privacy policies. This all raises huge ethical and privacy concerns. In this paper, the authors have analyzed privacy challenges in PPD networks from users' viewpoint using system modeling method and propose the principle "Personal Health Data under Personal Control" must generally be accepted at global level. Among possible implementation of this principle, the authors propose encryption, computer understandable privacy policies, and privacy labels or trust based privacy management methods. The latter can be realized using infrastructural trust calculation and monitoring service. A first step is to require the protection of personal health information and the principle proposed being internationally mandatory. This requires both regulatory and standardization activities, and the availability of open and certified software application which all service providers can implement. One of those applications should be the independent Trust verifier.

  4. BIOS Security Analysis and a Kind of Trusted BIOS

    Science.gov (United States)

    Zhou, Zhenliu; Xu, Rongsheng

    The BIOS's security threats to computer system are analyzed and security requirements for firmware BIOS are summarized in this paper. Through discussion about TCG's trust transitivity, a new approach about CRTM implementation based on BIOS is developed. In this paper, we also put forward a new trusted BIOS architecture-UTBIOS which is built on Intel Framework for EFI/UEFI. The trustworthiness of UTBIOS is based on trusted hardware TPM. In UTBIOS, trust encapsulation and trust measurement are used to construct pre-OS trust chain. Performance of trust measurement is also analyzed in the end.

  5. Secure OpenID Authentication Model by Using Trusted Computing

    Directory of Open Access Journals (Sweden)

    E. Ghazizadeh

    2014-01-01

    Full Text Available The growth of Internet online services has been very quick in recent years. Each online service requires Internet users to create a new account to use the service. The problem can be seen when each user usually needs more than one service and, consequently, has numerous accounts. These numerous accounts have to be managed in a secure and simple way to be protected against identity theft. Single sign-on (SSO and OpenID have been used to decrease the complexity of managing numerous accounts required in the Internet identity environment. Trusted Platform Module (TPM and Trust Multitenancy are great trusted computing-based technologies to solve security concerns in the Internet identity environment. Since trust is one of the pillars of security in the cloud, this paper analyzes the existing cloud identity techniques in order to investigate their strengths and weaknesses. This paper proposes a model in which One Time Password (OTP, TPM, and OpenID are used to provide a solution against phishing as a common identity theft in cloud environment.

  6. 26 CFR 26.2654-1 - Certain trusts treated as separate trusts.

    Science.gov (United States)

    2010-04-01

    ... trusts under local law, treatment of a single trust as separate trusts under this paragraph (a)(1) does... applicable state law, then each resulting trust is treated as a separate trust for purposes of Chapter 13... Internal Revenue Code, if those portions are not treated as separate trusts under local law. Also...

  7. The success of international development projects, trust and communication: an African perspective

    Energy Technology Data Exchange (ETDEWEB)

    Diallo, A.; Thuillier, D. [Universite du Quebec a Montreal (Canada). Dept. Management et Technologie

    2005-04-01

    Project success is strongly linked to communication and cooperation between stakeholders. This research explores the relationship between trust and communication and tests the influence of these factors upon project success and success criteria for international development projects financed by multilateral institutions in sub-Saharan Africa. The research analyses the coordinators' perceptions of project success, communication climate and interpersonal relationship between himself and his stakeholders (task manager in the multilateral agency, national supervisor) and within the project team. Data were collected from questionnaires completed by project coordinators of development projects. The statistical analysis confirms that trust and communication between players are proxy variables. Trust between the task manager and the coordinator is the key success factor, whereas team cohesion is the second most important factor. Trust between the coordinator and his national supervisor does not play a prominent role, although the task manager considers significant local autonomy for the coordinator a prerequisite for funding a subsequent phase when the project comes to an end. (author)

  8. The Need to Trust and to Trust More Wisely in Academe

    Science.gov (United States)

    Bowman, Richard F.

    2012-01-01

    Where trust is an issue, there is no trust. Trust in diverse organizations has never been lower. A shadow of doubt stalks one's every decision to trust collegially and institutionally. Still, colleagues sense intuitively that institutions cannot function optimally without a bedrock level of trust. In academic life, trust is a form of social…

  9. Trust, confidence, and the 2008 global financial crisis.

    Science.gov (United States)

    Earle, Timothy C

    2009-06-01

    The 2008 global financial crisis has been compared to a "once-in-a-century credit tsunami," a disaster in which the loss of trust and confidence played key precipitating roles and the recovery from which will require the restoration of these crucial factors. Drawing on the analogy between the financial crisis and environmental and technological hazards, recent research on the role of trust and confidence in the latter is used to provide a perspective on the former. Whereas "trust" and "confidence" are used interchangeably and without explicit definition in most discussions of the financial crisis, this perspective uses the TCC model of cooperation to clearly distinguish between the two and to demonstrate how this distinction can lead to an improved understanding of the crisis. The roles of trust and confidence-both in precipitation and in possible recovery-are discussed for each of the three major sets of actors in the crisis, the regulators, the banks, and the public. The roles of trust and confidence in the larger context of risk management are also examined; trust being associated with political approaches, confidence with technical. Finally, the various stances that government can take with regard to trust-such as supportive or skeptical-are considered. Overall, it is argued that a clear understanding of trust and confidence and a close examination of the specific, concrete circumstances of a crisis-revealing when either trust or confidence is appropriate-can lead to useful insights for both recovery and prevention of future occurrences.

  10. Calculativeness and trust

    DEFF Research Database (Denmark)

    Frederiksen, Morten

    2014-01-01

    Williamson’s characterisation of calculativeness as inimical to trust contradicts most sociological trust research. However, a similar argument is found within trust phenomenology. This paper re-investigates Williamson’s argument from the perspective of Løgstrup’s phenomenological theory of trust....... Contrary to Williamson, however, Løgstrup’s contention is that trust, not calculativeness, is the default attitude and only when suspicion is awoken does trust falter. The paper argues that while Williamson’s distinction between calculativeness and trust is supported by phenomenology, the analysis needs...... to take actual subjective experience into consideration. It points out that, first, Løgstrup places trust alongside calculativeness as a different mode of engaging in social interaction, rather conceiving of trust as a state or the outcome of a decision-making process. Secondly, the analysis must take...

  11. THE EFFECTS OF INTERNAL MARKETING ON ORGANIZATIONAL TRUST: A RESEARCH IN HOTEL INDUSTRY

    Directory of Open Access Journals (Sweden)

    Mustafa KESEN

    2018-01-01

    Full Text Available The aim of this study is to determine how internal marketing would affect trust in the organization and trust in the executive dimensions of organizational trust. The study population consists of employees working in hotels operating in the town of Kuşadası in the province of Aydın, one of the oldest touristic regions of Turkey. For this purpose, a survey application was carried out on 148 employees of 7 hotels in total. The acquired survey data was evaluated via confirmatory factor analyses, reliability analyses, correlation analyses and regression analyses. According to the findings obtained from the research, internal marketing affects trust in the manager and trust in the organization positively. Despite some limitations, the research findings are considered to present some important assistance to the managers, employees and researchers.

  12. Trust and Leadership

    DEFF Research Database (Denmark)

    Bordum, Anders

    2005-01-01

    The concept and phenomenon of trust and its relation to leadership has recently come into focus. What role does trust play? Can trust be created strategically? Questions like these are often raised. How we conceive of and conceptualize trust is not as often discussed. Among those conceptualizations...... flexibility of form for example, the idea that one with leadership tools can consciously bring forth trust. In the conclusion, the question about trust communication is addressed. In this section I argue that trust is positively value-laden, becausesincerity is a functional and pragmatic condition...

  13. A qualitative study of the role of workplace and interpersonal trust in shaping service quality and responsiveness in Zambian primary health centres

    Science.gov (United States)

    Topp, Stephanie M; Chipukuma, Julien M

    2016-01-01

    Background: Human decisions, actions and relationships that invoke trust are at the core of functional and productive health systems. Although widely studied in high-income settings, comparatively few studies have explored the influence of trust on health system performance in low- and middle-income countries. This study examines how workplace and inter-personal trust impact service quality and responsiveness in primary health services in Zambia. Methods: This multi-case study included four health centres selected for urban, peri-urban and rural characteristics. Case data included provider interviews (60); patient interviews (180); direct observation of facility operations (two weeks/centre) and key informant interviews (14) that were recorded and transcribed verbatim. Case-based thematic analysis incorporated inductive and deductive coding. Results: Findings demonstrated that providers had weak workplace trust influenced by a combination of poor working conditions, perceptions of low pay and experiences of inequitable or inefficient health centre management. Weak trust in health centre managers’ organizational capacity and fairness contributed to resentment amongst many providers and promoted a culture of blame-shifting and one-upmanship that undermined teamwork and enabled disrespectful treatment of patients. Although patients expressed a high degree of trust in health workers’ clinical capacity, repeated experiences of disrespectful or unresponsive care undermined patients’ trust in health workers’ service values and professionalism. Lack of patient–provider trust prompted some patients to circumvent clinic systems in an attempt to secure better or more timely care. Conclusion: Lack of resourcing and poor leadership were key factors leading to providers’ weak workplace trust and contributed to often-poor quality services, driving a perverse cycle of negative patient–provider relations across the four sites. Findings highlight the importance

  14. Nuclear decommissioning trusts: A case for convertible bonds

    International Nuclear Information System (INIS)

    Nichols, R.W.

    1992-01-01

    Asset-liability management is studied with special emphasis on application of the author's findings to the management of nuclear decommissioning trusts (NDTs). The trust themselves are investment vehicles established to accumulate and build funds to be used to defray future decommissioning costs. Decommissioning, in turn, is the process of dismantling the shell of a nuclear reactor and the surrounding concrete structures, followed by disposal of the radioactive material, the objective being to return the site to a greenfield state i.e. the site is freed up for unrestricted use. Unfortunately, the assets of NDTs are not so easily managed. The liability that the trusts have been established to fund is a highly uncertain moving target for which little historical data is available. This study first develops a framework for selecting portfolios when the investment objective is to invest against a future liability. The challenge then is to build an investment strategy around an uncertain liability, in the presence of taxes and miscellaneous portfolio constraints. The study then explores the viability of convertible bonds for liability-driven investment strategies because of the hybrid debt/equity nature of these instruments

  15. Trusted Operations on Sensor Data †

    Directory of Open Access Journals (Sweden)

    Hassaan Janjua

    2018-04-01

    Full Text Available The widespread use of mobile devices has allowed the development of participatory sensing systems that capture various types of data using the existing or external sensors attached to mobile devices. Gathering data from such anonymous sources requires a mechanism to establish the integrity of sensor readings. In many cases, sensor data need to be preprocessed on the device itself before being uploaded to the target server while ensuring the chain of trust from capture to the delivery of the data. This can be achieved by a framework that provides a means to implement arbitrary operations to be performed on trusted sensor data, while guaranteeing the security and integrity of the data. This paper presents the design and implementation of a framework that allows the capture of trusted sensor data from both external and internal sensors on a mobile phone along with the development of trusted operations on sensor data while providing a mechanism for performing predefined operations on the data such that the chain of trust is maintained. The evaluation shows that the proposed system ensures the security and integrity of sensor data with minimal performance overhead.

  16. Dimensions of trust

    DEFF Research Database (Denmark)

    Frederiksen, Morten

    2012-01-01

    Georg Simmel is the seminal author on trust within sociology, but though inspired by Simmel, subsequent studies of intersubjective trust have failed to address Simmel’s suggestion that trust is as differentiated as the social relations of which it is part. Rather, trust has been studied within...... limited sets of exchange or work relations. This article revisits Simmel’s concept of trust as social form in order to investigate this differentiation. From an interview study, the differentiation and limits of trust are analysed within different types of social relations. Trust is found to vary greatly...... in scope and mode influenced by the intersecting dimensions of relations, objects and situations. Furthermore, trust exists between an outer threshold of expected deceit and an inner threshold of confident reliance. The findings from the qualitative study contribute new knowledge on the diversity of trust...

  17. Impact Through Trust

    DEFF Research Database (Denmark)

    Mayoral, Juan A.

    of its rulings and legal mandates in national judiciaries and legal systems? This question is crucial if we understand that national courts are the key decentralised enforcers of the European Union (EU) law responsible for ensuring the effectiveness of EU law and the rulings and mandates imposed...... by the Court. EU scholars have already offered several legalist and institutionalist responses to why national courts participate in this process of legal integration in the EU and, most importantly, why the follow the mandates and rulings from the CJEU. This chapter innovates in this regard by introducing...... trust between judges as a new mechanism for enhancing the cooperation and compliance by national courts with the CJEU jurisprudence and EU legal mandates. The chapter describes the conditions under which national judges trust the CJEU to identify how the Court can promote trust in its role as a supreme...

  18. [Trust in organizations concerned with risks of the Great East Japan Earthquake].

    Science.gov (United States)

    Nakayachi, Kazuya; Kudo, Daisuke; Ozaki, Taku

    2014-06-01

    This study investigated the levels of public trust in organizations associated with the Great East Japan Earthquake. In Study 1 (N = 639), the levels of trust in eight organizations as well as the determinants of trust--perceived salient value similarity (SVS), ability, and motivation--were measured twice, first immediately after the earthquake and then a year later. The results indicated that the trust levels for six of the eight organizations had been preserved, supporting the double asymmetric effect of trust. The results of structural equation modeling (SEM) revealed that SVS explained trust more when the organization had been less trusted. Trust in the organization explains well the perceived reduction of the target risk. The results of SEM in Study 2 (N = 1,030) replicated those of Study 1, suggesting the stability of the explanatory power of the determinants of trust. Implications of the study for risk management practices are discussed.

  19. Learning to Trust

    NARCIS (Netherlands)

    Nooteboom, B.

    2005-01-01

    Trust is full of puzzle and paradox.Trust is both rational and emotional. Trust can go beyond calculative self-interest, but has its limits.People may want to trust, while they may also feel threatened by it.If trust is not in place prior to a relationship, on the basis of institutions, prior

  20. The Distinctive Effects of Dual-Level Leadership Behaviors on Employees’ Trust in Leadership

    DEFF Research Database (Denmark)

    Bai, Yuntao; Li, Peter Ping; Xi, Youmin

    2012-01-01

    of transformational leadership behaviors on employees’ trust in leadership at both top management and supervisory levels, respectively. The empirical evidence based on a sample of 357 Chinese employees and their supervisors supports the proposed model. Both theoretical and practical implications of our findings......The loss of trust within and between organizations has become serious worldwide, especially in China. In this study, we seek to explain why as well as how leaders at two different levels (i.e., the top management and the supervisory levels) affect employees’ trust in leadership at the two levels...

  1. Organizational and technological correlates of nurses' trust in a smart intravenous pump.

    Science.gov (United States)

    Montague, Enid; Asan, Onur; Chiou, Erin

    2013-03-01

    The aim of this study was to understand technology and system characteristics that contribute to nurses' ratings of trust in a smart intravenous pump. Nurses' trust in new technologies can influence how technologies are used. Trust in technology is defined as a person's belief that a technology will not fail them. Potential outcomes of trust in technology are appropriate trust, overtrust, distrust, and mistrust. Trust in technology is also related to several use-specific outcomes, including appropriate use and inappropriate use such as overreliance, disuse or rejection, or misuse. Understanding trust in relation to outcomes can contribute to designs that facilitate appropriate trust in new technologies. A survey was completed by 391 nurses a year after the implementation of a new smart intravenous pump. The survey assessed trust in the intravenous pump and other elements of the sociotechnical system, individual characteristics, technology characteristics, and organizational characteristics. Results show that perceptions of usefulness, safety, ease of use, and usability are related to ratings of trust in smart intravenous pumps. Other work systemfactors such as perception of work environment, age, experience, quality of work, and perception of work performance are also related to ratings of trust. Nurses' trust in smart intravenous pumps is influenced by both characteristics of the technology and the sociotechnical system. Findings from this research have implications for the design of future smart intravenous pumps and health systems. Recommendations for appropriately trustworthy smart intravenous pumps are discussed. Findings also have implications for how trust in health technologies can be measured and conceptualized in complex sociotechnical systems.

  2. Trust-based hexagonal clustering for efficient certificate ...

    Indian Academy of Sciences (India)

    Clustering; certificate management; MANET; security; trust; Voronoi. ... terms of effectiveness of revocation scheme (with respect to revocation rate and time), security, ... Engineering, Thiagarajar College of Engineering, Madurai 625015, India ...

  3. RELATIONSHIP BETWEEN THE ORGANIZATIONAL COMMITMENT WITH THE TRUST TO MANAGEMENT OF THE ATHLETES

    Directory of Open Access Journals (Sweden)

    Ercan ZORBA

    2015-08-01

    Full Text Available The aim of this study is to determine whether the relationship between organizational trust and organizational commitment. In order words, is intended to determine whether an effective factor on organizational commitment of the trusth levels to management of athletes. As research data collection tool is used the short form of Organizational trust Inventory developed by Bromiley and Cummings (1996. Tüzün (2006 has turned the Turkish and has tested of scale reliability and validity using the varimax rotated factor analysis. According to Alpha (Cronbach's alpha is designated as the reliability coefficient of 0.84. The obtained data are calculated frequency and percent values. In the analysis of data was used independent sample t tes t and One - way analysis of variance (ANOVA. In addition, is used "Personal Information Form" prepared by the researcher to achieve to some personal information of participants. The universe of this study, is creating licensed athletes in sports clubs, samp le; who voluntarily agree to participate in research constitutes 240 licensed athletes from sports club in Muğla. When examined by gender and organizational commitment status, although a have higher women than men organizational commitment scores, there is no commitment levels significant difference at the 0.05 level. Organizational commitment status was higher married participants than single participants also p <0.05 level has a significant difference. According to the education level, has a significant difference p<0.05 level among organizational commitment scores. As a result, a tendency to participate in high - level statements about the participants' emotional and cognitive organizational trust can say they play. We can say that the statements were und ecided about emotional commitment. Statements regarding the normative commitment and high level of participation is seen as unstable and exhibits a high level of participation towards their continued

  4. Closed-Loop Feedback Computation Model of Dynamical Reputation Based on the Local Trust Evaluation in Business-to-Consumer E-Commerce

    Directory of Open Access Journals (Sweden)

    Bo Tian

    2016-02-01

    Full Text Available Trust and reputation are important factors that influence the success of both traditional transactions in physical social networks and modern e-commerce in virtual Internet environments. It is difficult to define the concept of trust and quantify it because trust has both subjective and objective characteristics at the same time. A well-reported issue with reputation management system in business-to-consumer (BtoC e-commerce is the “all good reputation” problem. In order to deal with the confusion, a new computational model of reputation is proposed in this paper. The ratings of each customer are set as basic trust score events. In addition, the time series of massive ratings are aggregated to formulate the sellers’ local temporal trust scores by Beta distribution. A logical model of trust and reputation is established based on the analysis of the dynamical relationship between trust and reputation. As for single goods with repeat transactions, an iterative mathematical model of trust and reputation is established with a closed-loop feedback mechanism. Numerical experiments on repeated transactions recorded over a period of 24 months are performed. The experimental results show that the proposed method plays guiding roles for both theoretical research into trust and reputation and the practical design of reputation systems in BtoC e-commerce.

  5. Social capital and trust in providers.

    Science.gov (United States)

    Ahern, Melissa M; Hendryx, Michael S

    2003-10-01

    Trust in providers has been in decline in recent decades. This study attempts to identify sources of trust in characteristics of health care systems and the wider community. The design is cross-sectional. Data are from (1) the 1996 Household Survey of the Community Tracking Study, drawn from 24 Metropolitan Statistical Areas; (2) a 1996 multi-city broadcast media marketing database including key social capital indicators; (3) Interstudy; (4) the American Hospital Association; and (5) the American Medical Association. Independent variables include individual socio-demographic variables, HMO enrollment, community-level health sector variables, and social capital. The dependent variable is self-reported trust in physicians. Data are merged from the various sources and analyzed using SUDAAN. Subjects include adults in the Household Survey who responded to the items on trust in physicians (N=17,653). Trust in physicians is independently predicted by community social capital (pSocial capital plays a role in how health care is perceived by citizens, and how health care is delivered by providers. Efforts to build trust and collaboration in a community may improve trust in physicians, health care quality, access, and preserve local health care control.

  6. Revolt and Remember: How the Shimshal Nature Trust Develops and Sustains Social-Ecological Resilience in Northern Pakistan

    Directory of Open Access Journals (Sweden)

    Mehjabeen Abidi-Habib

    2007-12-01

    Full Text Available The Shimshal Nature Trust is an indigenous institution rooted in a thriving and dynamic culture that links the local ecology and society. It has deployed identity, traditional knowledge, science, and institutional innovation to adapt to outside challenges without destroying local commons management. This paper reviews scholarly debate on natural resource management and uses resilience theory to examine this complex adaptive system. Two disturbances to Shimshal resilience prompted by a national park and a new road are traced. Shimshali responses include social processes of learning, knowledge systems, and renewal. Ways in which adaptive renewal cycles involve Revolt, a short, fast reaction, and Remember, a larger, slower cascade, are put in perspective. Simple and powerful qualities that guide change are highlighted. We conclude that the Shimshal Nature Trust creates a resilient interface between the outside and inside worlds. Government, donors, and academics can participate in contextualized action-learning cycles that result in more informed and negotiated contributions to local institutions for commons management.

  7. Trust and Professional Skepticism in the Relationship between auditors and Clients

    DEFF Research Database (Denmark)

    Aschauer, Ewald; Fink, Matthias; Moro, Andrea

    2017-01-01

    This study empirically investigates the relationship between auditors' identification-based trust in client firm's managers and their perceptions of auditors' professional skepticism. We employ a multimethod approach broken Down into two studies. First, in study 1, we approached auditors...... collected from 233 real auditor-client dyads in Germany reveals that auditors' identification-based trust is positively Associated with their clients' perception of the auditors' professional skepticism. The identified coexistence of trust and professional skepticism in auditor-client dyads implies...... that regulatory measures that impede the evolution of trust between auditors and their clients will fail to enhance professional skepticism. instead, regulations should give auditors and their clients sufficient leeway to establish identification-based trust....

  8. Adequate trust avails, mistaken trust matters: on the moral responsibility of doctors as proxies for patients' trust in biobank research.

    Science.gov (United States)

    Johnsson, Linus; Helgesson, Gert; Hansson, Mats G; Eriksson, Stefan

    2013-11-01

    In Sweden, most patients are recruited into biobank research by non-researcher doctors. Patients' trust in doctors may therefore be important to their willingness to participate. We suggest a model of trust that makes sense of such transitions of trust between domains and distinguishes adequate trust from mistaken trust. The unique position of doctors implies, we argue, a Kantian imperfect duty to compensate for patients' mistaken trust. There are at least three kinds of mistaken trust, each of which requires a different set of countermeasures. First, trust is mistaken when necessary competence is lacking; the competence must be developed or the illusion dispelled. Second, trust is irrational whenever the patient is mistaken about his actual reasons for trusting. Care must therefore be taken to support the patient's reasoning and moral agency. Third, some patients inappropriately trust doctors to recommend only research that will benefit them directly. Such trust should be counteracted by nurturing a culture where patients expect to be asked occasionally to contribute to the common good. © 2012 John Wiley & Sons Ltd.

  9. Competence Utilization for Innovation Capabilities - A Question of Trust?

    Directory of Open Access Journals (Sweden)

    Britta BOLZERN-KONRAD

    2015-05-01

    Full Text Available The purpose of this paper is to show how trust as an organizational value contributes to employee competence utilization in the case of innovation capability. Thus, it is the objective of this paper to analyze the positive impacts, but also potential limits of trust in business management. The research paper uses two different quantitative empirical studies drawn from German and Austrian mid-sized companies to empirically test this interrelation. As a result, the paper determines particular aspects of trust such as accountability, shared norms and the ability to take responsibility to be interrelated with the usage of employee competences and underlines a positive connection between product innovation performance and trust. However, the trust concept needs enriching elements to be balanced towards a feeling of mutual reliance and support creativity instead; inclusions of bridging social capital, elements of distrust and a pioneering spirit are to be mentioned here.

  10. 75 FR 7637 - iShares Trust, et al.; Notice of Application

    Science.gov (United States)

    2010-02-22

    ... for short-term cash management purposes. For the Commission, by the Division of Investment Management... management investment companies (``Investing Management Companies'') and unit investment trusts (``Investing UITs,'' collectively with Investing Management Companies, ``Investing Funds'') to acquire shares of...

  11. Can we trust robots?

    NARCIS (Netherlands)

    Coeckelbergh, Mark

    2011-01-01

    Can we trust robots? Responding to the literature on trust and e-trust, this paper asks if the question of trust is applicable to robots, discusses different approaches to trust, and analyses some preconditions for trust. In the course of the paper a phenomenological-social approach to trust is

  12. Social Capital, IT Capability, and the Success of Knowledge Management Systems

    Directory of Open Access Journals (Sweden)

    Irene Y.L. Chen

    2009-03-01

    Full Text Available Many organizations have implemented knowledge management systems to support knowledge management. However, many of such systems have failed due to the lack of relationship networks and IT capability within organizations. Motivated by such concerns, this paper examines the factors that may facilitate the success of knowledge management systems. The ten constructs derived from social capital theory, resource-based view and IS success model are integrated into the current research model. Twenty-one hypotheses derived from the research model are empirically validated using a field survey of KMS users. The results suggest that social capital and organizational IT capability are important preconditions of the success of knowledge management systems. Among the posited relationships, trust, social interaction ties, IT capability do not significantly impact service quality, system quality and IT capability, respectively. Against prior expectation, service quality and knowledge quality do not significantly influence perceived KMS benefits and user satisfaction, respectively. Discussion of the results and conclusion are provided. This study then provides insights for future research avenue.

  13. Software Technology for Adaptable, Reliable Systems (STARS): UUS40 - Risk-Reduction Reasoning-Based Development Paradigm Tailored to Navy C2 Systems

    Science.gov (United States)

    1991-07-30

    4 Management reviews, engineering and WBS -Spiral 0 -5 *Risk Management Planning -Spiral 0-5 ,41.- Unrelsi ugt .Proper initial planning -Spiral 0.1...Reusability issues for trusted systems are associated closely with maintenance issues. Reuse theory and practice for highly trusted systems will require

  14. Predators and the public trust.

    Science.gov (United States)

    Treves, Adrian; Chapron, Guillaume; López-Bao, Jose V; Shoemaker, Chase; Goeckner, Apollonia R; Bruskotter, Jeremy T

    2017-02-01

    Many democratic governments recognize a duty to conserve environmental resources, including wild animals, as a public trust for current and future citizens. These public trust principles have informed two centuries of U.S.A. Supreme Court decisions and environmental laws worldwide. Nevertheless numerous populations of large-bodied, mammalian carnivores (predators) were eradicated in the 20th century. Environmental movements and strict legal protections have fostered predator recoveries across the U.S.A. and Europe since the 1970s. Now subnational jurisdictions are regaining management authority from central governments for their predator subpopulations. Will the history of local eradication repeat or will these jurisdictions adopt public trust thinking and their obligation to broad public interests over narrower ones? We review the role of public trust principles in the restoration and preservation of controversial species. In so doing we argue for the essential roles of scientists from many disciplines concerned with biological diversity and its conservation. We look beyond species endangerment to future generations' interests in sustainability, particularly non-consumptive uses. Although our conclusions apply to all wild organisms, we focus on predators because of the particular challenges they pose for government trustees, trust managers, and society. Gray wolves Canis lupus L. deserve particular attention, because detailed information and abundant policy debates across regions have exposed four important challenges for preserving predators in the face of interest group hostility. One challenge is uncertainty and varied interpretations about public trustees' responsibilities for wildlife, which have created a mosaic of policies across jurisdictions. We explore how such mosaics have merits and drawbacks for biodiversity. The other three challenges to conserving wildlife as public trust assets are illuminated by the biology of predators and the interacting

  15. From the general to the specific: How social trust motivates relational trust.

    Science.gov (United States)

    Robbins, Blaine G

    2016-01-01

    When people form beliefs about the trustworthiness of others with respect to particular matters (i.e., when individuals trust), theory suggests that they rely on preexistent cognitive schemas regarding the general cooperativeness of individuals and organizations (i.e., social trust). In spite of prior work, the impact of social trust on relational trust-or what Russell Hardin (2002) calls trust as a three-part relation where actor A trusts actor B with reference to matter Y-is not well established. Four vignette experiments were administered to Amazon.com Mechanical Turk workers (N = 1388 and N = 1419) and to public university undergraduate students (N = 995 and N = 956) in order to investigate the relationship between social trust and relational trust. Measures of general social trust and particular social trust produced statistically equivalent effects that were positively associated with relational trust. Political trust, however, was statistically unrelated to relational trust. These results support the idea that people rely on schemas and stereotypes concerned with the general cooperativeness and helpfulness of others when forming beliefs about another person's trustworthiness with respect to a particular matter at hand. Copyright © 2015 Elsevier Inc. All rights reserved.

  16. Savings in its sights for Somerset Trust.

    Science.gov (United States)

    Russell, Colin

    2011-10-01

    Colin Russell, healthcare specialist at Schneider Electric (pictured), explains how the company has recently worked with Taunton and Somerset NHS Foundation Trust to implement a major energy-saving project at the Trust's Musgrove Park Hospital in Taunton. He argues that, at a time when all areas of the service are being asked to reduce costs, such partnerships can potentially save the institution millions of pounds and significantly reduce carbon emissions, while "revitalising" parts of the NHS estate, and ensuring continuity of vital hospital services for facilities managers.

  17. A Method to Increase Drivers' Trust in Collision Warning Systems Based on Reliability Information of Sensor

    Science.gov (United States)

    Tsutsumi, Shigeyoshi; Wada, Takahiro; Akita, Tokihiko; Doi, Shun'ichi

    Driver's workload tends to be increased during driving under complicated traffic environments like a lane change. In such cases, rear collision warning is effective for reduction of cognitive workload. On the other hand, it is pointed out that false alarm or missing alarm caused by sensor errors leads to decrease of driver' s trust in the warning system and it can result in low efficiency of the system. Suppose that reliability information of the sensor is provided in real-time. In this paper, we propose a new warning method to increase driver' s trust in the system even with low sensor reliability utilizing the sensor reliability information. The effectiveness of the warning methods is shown by driving simulator experiments.

  18. From transformative learning to social change? Using action research to explore and improve informal complaints management in an NHS trust

    Directory of Open Access Journals (Sweden)

    Anki Odelius

    2015-05-01

    Full Text Available Background: The number of complaints from patients and/or carers concerning aspects of care has increased over time. Yet, in spite of a growing body of national and international literature on healthcare complaints, there is a lack of knowledge around how nurses and midwives manage informal complaints at ward level, or staff needs in relation to this. Aim: Using an action research approach with mixed methods, four phases and four cycles, the aim was to explore informal complaints management by nurses and midwives at ward level. We discuss the action research process primarily in connection with learning and service change, drawing from the qualitative data in this paper. Findings: The analysis of the collected qualitative data resulted in three main themes, related to the complexities of complaints and complaints management, staff support needs and the existing ambiguous complaints systems, which are hard for staff and service users to negotiate. The action research approach facilitated learning and change in participants in relation to complaints management, in the collaborating trust. Conclusions: The extant body of research on complaints does not sufficiently recognise the complexity of complaints and informal complaints management, or the complaints systems that are in place. Needs-based staff training can help support staff to manage informal complaints more effectively. Implications for practice: • There needs to be recognition of the complexities involved in complaints management • Complaints systems need to be clearer for the benefit of service users and staff • Staff need training and support that is tailored to their needs to improve their response to complaints, leading to a better patient experience • Limited interventions, informed by staff needs, can lead to change and act as a catalyst for a wider change in informal complaints management

  19. Exploring HRD in two Welsh NHS Trusts: analysing the discursive resources used by senior managers.

    Science.gov (United States)

    Sambrook, Sally

    2007-01-01

    The purpose of this paper is to examine human resource development (HRD) in the UK National Health Service (NHS), and particularly in two Welsh NHS Trusts, to help illuminate the various ways in which learning, training and development are talked about. The NHS is a complex organisation, not least with its recent devolution and separation into the four distinct countries of the UK. Within this, there are multiple and often conflicting approaches to human resource development associated with the various forms of employee, professional (nursing, medical etc.), managerial and organisational development. How people are developed is crucial to developing a modern health service, and yet, with the diverse range of health workers, HRD is a complex process, and one which receives little attention. Managers have a key role and their perceptions of HRD can be analysed through the discursive resources they employ. From an interpretivist stance, the paper employs semi-structured interviews with seven Directorate-General Managers, and adopts discourse analysis to explore how HRD is talked about in two Welsh NHS Trusts. The paper finds some of the different discourses used by different managers, including those with a nursing background and those without. It examines how they talk about HRD, and also explores their own (management) development and the impact this has had on their sense of identity. The paper highlights some of the tensions associated with HRD in the NHS, including ambiguities between professional and managerial development, the functional and physical fragmentation of HRD, conflict between a focus on performance/service delivery and the need to learn, discursive dissonance between the use of the terms training and learning, a delicate balance between "going on courses" and informal, work-related learning, inequities regarding "protected time" and discourses shifting between competition and cooperation. These tensions are exposed to help develop a shared

  20. To Trust or Not to Trust? What Drives Public Trust in Science in Social Media Engagement

    Science.gov (United States)

    Hwong, Y. L.; Oliver, C.; Van Kranendonk, M. J.

    2017-12-01

    The erosion of public trust in science is a serious concern today. This climate of distrust has real consequences, from the anti-vaccination movement to climate change denials. The age of social media promises opportunities for improved interactivity between scientists and the public, which experts hope will help improve public confidence in science. However, evidence linking social media engagement and public attitude towards science is scarce. Our study aimed to help fill this gap. We examined Twitter engagement and its impact on public trust in science, focusing on two related science issues: space science and climate change. Our datasets comprised of 10,000 randomly sampled tweets over a month's period in 2016. We used human annotation and machine learning to analyse the tweets. Results revealed the level of distrust was significantly higher in the climate change tweets. However, in the climate change network, people who engaged with science personalities trust science more than those who did not. This difference in trust levels was not present in the space science network. There the two clusters of people displayed similar levels of trust in science. Additionally, we used machine learning to predict the trust labels of tweets and conducted feature analysis to find the properties of trust-inspiring tweets. Our supervised learning algorithm was able to predict trust in science in our sample tweets with 84% accuracy. The strongest predictors of trust in science (as conveyed by tweets) were similarity, presence of URL and authenticity. Contrast this with the findings of our previous study investigating the features of highly engaging space science related social media messages, authenticity is the only feature that also inspires trust. This indicates that what works to promote engagement (e.g. `retweets', `Likes') does not necessarily build trust in science. Social media science communication is not as simple as `we engage, therefore they trust'. We suggest that

  1. TRUST AND REPUTATION MODEL DESIGN FOR OBJECTS OF MULTI-AGENT ROBOTICS SYSTEMS WITH DECENTRALIZED CONTROL

    Directory of Open Access Journals (Sweden)

    I. A. Zikratov

    2014-03-01

    Full Text Available The problem of mechanisms design for protection of multi-agent robotics systems from attacks of robots-saboteurs is considered. Functioning analysis of these systems with decentralized control is carried out. The type of the so-called soft attacks using interception of messages, misinformation formation and transmission to group of robots which are also realizing other actions without identified signs of invasion of robots-saboteurs. Analysis of existing information security models of the system based on the trust level computation, calculated in the process of agents’ interaction is carried out. Information security model is offered in which robots-agents produce the trust levels to each other on the basis of situation analysis emerging on a certain step of iterative algorithm with usage of onboard sensor devices. On the basis of calculated trust levels, recognition of “saboteur” objects in the group of legitimate robots-agents is done. For measure of likeness (adjacency increase for objects from the same category (“saboteur” or “legitimate agent”, calculation algorithm for agents reputation is offered as a measure of public opinion about qualities of this or that agent-subject. Implementation alternatives of the algorithms for detection of saboteurs on the example of the basic algorithm for distribution of purposes in the group of robots are considered.

  2. The Effects of Trust Transference, Mobile Attributes and Enjoyment on Mobile Trust

    Directory of Open Access Journals (Sweden)

    Cristiane Junqueira Giovannini

    2015-01-01

    Full Text Available Trust is essential in building relationships. In mobile commerce, as in electronic commerce, trust is even more valuable given the absence of human contact and direct observation of the service provider. Despite the importance of trust for mobile commerce, there has been little academic effort to study the relationships between mobile devices unique components of interactivity and customer trust, or the relationship between offline, online and mobile trust. This study proposes a trust-mediated model for customer attitude and transaction intentions in mobile commerce contexts that incorporates trust transference and unique factors present in mobile commerce. Data were collected in an online survey and analyzed via structural equations modeling. Results suggest that trust transferred from online contexts and ease of use have significant effects on mobile trust formation, while also indicating that mobile trust influences consumers’ attitudes and intentions to purchase using mobile devices.

  3. Looking for Trust

    DEFF Research Database (Denmark)

    Bøge, Ask Risom; Lauritsen, Peter

    Trust and surveillance are often seen as opposites. Trust is regularly characterized as the glue that holds society together, while surveillance is seen as corrosive. However, in Scandinavia high levels of trust and surveillance coexist. It is therefore interesting to investigate...... if there is a connection between these phenomena and ask what is the role of trust in the spread of surveillance in Scandinavia? The aim of this paper is: 1) to investigate the role of trust in the history of the Danish DNA database and 2) to experiment with Actor-Network-Theory (ANT) as an ap-proach in studies of trust....

  4. The Challenge of Researching Trust in Intercultural Cooperation

    Directory of Open Access Journals (Sweden)

    Ulrike Schwegler

    2009-01-01

    Full Text Available A critical element to the successful globalization of business requires the ability to cooperate across cultural borders. Thus, people of different cultural backgrounds are increasingly faced with the challenge of managing unfamiliar situations with unfamiliar people. Exactly this situation is where the ability to establish trusting relationships becomes a critical factor. Despite of the importance of the topic, little research exists on developing trust in intercultural settings. This article analyses the specific conditions of researching trusting relationships across cultures. Etic and emic research designs will be compared and discussed with respect to the specific conditions in cross-cultural and intercultural situations. A discussion is directed at to which extent different research approaches support our understanding of trust as a dynamic concept. The analyses will be used to identify implications relevant for further empirical research. URN: urn:nbn:de:0114-fqs0901486

  5. A Geographic Information System (GIS-Based Analysis of Social Capital Data: Landscape Factors That Correlate with Trust

    Directory of Open Access Journals (Sweden)

    Sohrab Rahimi

    2017-03-01

    Full Text Available The field of community sociology has yielded rich insights on how neighborhoods and individuals foster social capital and reap the benefits of interpersonal relationships and institutions alike. Traditionally, institutions and cultural factors have been lauded as catalysts of community social life and cohesion. Yet, the built environment and configuration of the landscape, including infrastructure, amenities and population density, may also contribute to community social capital. In this article, we embedded zip code-level responses from Harvard University’s Saguaro Seminar’s 2006 Social Capital Community Benchmark Survey with a geographic information system. Specifically, we correlated responses on residents’ general trust, trust of one’s neighbors, and trust of members of other racial groups with local urban environmental factors and infrastructural indicators such as housing and street conditions, land use, city form, amenity access (e.g., libraries and schools, home vacancy rates, and home value. We conducted these tests at the national level and for Rochester, NY, due to its many survey responses. We found that housing vacancies drive down levels of social trust, as captured by homeownership rates and tenure, yielding higher levels of social trust, and that certain urban facilities correlate with high trust among neighbors. Results can inform urban planners on the amenities that support sustainable community ties.

  6. Modelling security and trust with Secure Tropos

    NARCIS (Netherlands)

    Giorgini, P.; Mouratidis, H.; Zannone, N.; Mouratidis, H.; Giorgini, P.

    2006-01-01

    Although the concepts of security and trust play an important issue in the development of information systems, they have been mainly neglected by software engineering methodologies. In this chapter we present an approach that considers security and trust throughout the software development process.

  7. Interpersonal Trust across Six Asia-Pacific Countries: Testing and Extending the ‘High Trust Society’ and ‘Low Trust Society’ Theory

    Science.gov (United States)

    Ward, Paul R.; Mamerow, Loreen; Meyer, Samantha B.

    2014-01-01

    Background Trust is regarded as a necessary component for the smooth running of society, although societal and political modernising processes have been linked to an increase in mistrust, potentially signalling social and economic problems. Fukuyama developed the notion of ‘high trust’ and ‘low trust’ societies, as a way of understanding trust within different societies. The purpose of this paper is to empirically test and extend Fukuyama’s theory utilising data on interpersonal trust in Taiwan, Hong Kong, South Korea, Japan, Australia and Thailand. This paper focuses on trust in family, neighbours, strangers, foreigners and people with a different religion. Methods Cross-sectional surveys were undertaken in 2009–10, with an overall sample of 6331. Analyses of differences in overall levels of trust between countries were undertaken using Chi square analyses. Multivariate binomial logistic regression analysis was undertaken to identify socio-demographic predictors of trust in each country. Results Our data indicate a tripartite trust model: ‘high trust’ in Australia and Hong Kong; ‘medium trust’ in Japan and Taiwan; and ‘low trust’ in South Korea and Thailand. Trust in family and neighbours were very high across all countries, although trust in people with a different religion, trust in strangers and trust in foreigners varied considerably between countries. The regression models found a consistent group of subpopulations with low trust across the countries: people on low incomes, younger people and people with poor self-rated health. The results were conflicting for gender: females had lower trust in Thailand and Hong Kong, although in Australia, males had lower trust in strangers, whereas females had lower trust in foreigners. Conclusion This paper identifies high, medium and low trust societies, in addition to high and low trusting population subgroups. Our analyses extend the seminal work of Fukuyama, providing both corroboration and

  8. Relationship between trust and usability in virtual environments: An ongoing study

    NARCIS (Netherlands)

    Salanitri, Davide; Hare, Chrisminder; Borsci, Simone; Lawson, Glyn; Sharples, Sarah; Water Fi Eld, Brian; Kurosu, Masaaki

    2015-01-01

    Usability and trust have been observed to be related in several domains including web retail, information systems, and e-health. Trust in technology reflects beliefs about the attributes of a technology. Research has shown that trust is a key factor for the success of different systems – e.g.,

  9. Verifiability of electronic voting: between confidence and trust

    NARCIS (Netherlands)

    Pieters, Wolter; Gutwirth, Serge; Poullet, Yves; De Hert, Paul

    2010-01-01

    When computing scientists speak about electronic voting, it is often in terms of trust. But there are two contradictory statements. First, they argue that it should not be necessary to trust e-voting systems, which would be the case if they are provably secure. Second, for an e-voting system to be

  10. Trust-Based Working Time and Organizational Performance: Evidence from German Establishment-Level Panel Data

    OpenAIRE

    Michael Beckmann; Istvàn Hegedüs

    2011-01-01

    This paper empirically examines the impact of trust-based working time on firm performance using panel data from German establishments. Trust-based working time is a human resource management practice that involves a high degree of worker autonomy in terms of scheduling individual working time. From the theoretical viewpoint, trust-based working time may affect worker motivation positively as well as negatively. Therefore, at the establishment level the performance effects of trust-based work...

  11. Social trust aspects of rural electrification

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-10-01

    This report is a contribution to a growing body of work which acknowledges the importance of social considerations in the electricity industry, and provides an electricity industry perspective on the role of social trust, which is closely related to concepts such as social responsibility, corporate governance and corporate stewardship. The report provides a full explanation of the concept of social trust, defines its components (competence, commitment, consistency, fairness, respect, caring and empathy) and makes suggestions as to how each of these components could be implemented in a variety of settings and situations such as facility planning, construction and operation, risk management and customer relations.

  12. The role of organizational control systems in employees’ organizational trust and performance outcomes

    NARCIS (Netherlands)

    Verburg, R.M.; Nienaber, A.; Searle, R.H.; Weibel, A.; Den Hartog, D.N.; Rupp, D.E.

    2018-01-01

    This study examined how organizational control is related to employees’ organizational trust. We specifically focus on how different forms of control (process, outcome, and normative) relate to employees’ trust in their employing organizations and examine whether such trust in turn relates

  13. SecureCore Software Architecture: Trusted Path Application (TPA) Requirements

    National Research Council Canada - National Science Library

    Clark, Paul C; Irvine, Cynthia E; Levin, Timothy E; Nguyen, Thuy D; Vidas, Timothy M

    2007-01-01

    .... A high-level architecture is described to provide such features. In addition, a usage scenario is described for a potential use of the architecture, with emphasis on the trusted path, a non-spoofable user interface to the trusted components of the system. Detailed requirements for the trusted path are provided.

  14. Combining User Reputation and Provenance Analysis for Trust Assessment

    NARCIS (Netherlands)

    Ceolin, D.; Groth, P.T.; Maccatrozzo, V.; Fokkink, W.J.; van Hage, W.R.; Nottamkandath, A.

    2016-01-01

    Trust is a broad concept that in many systems is often reduced to user reputation alone. However, user reputation is just one way to determine trust. The estimation of trust can be tackled from other perspectives as well, including by looking at provenance. Here, we present a complete pipeline for

  15. Exploring a Dynamic Model of Trust Management

    Science.gov (United States)

    2014-06-01

    organisational justice and affective trust in a sample of employees working in Turkey and Kuwait. International Journal of Research in Organisational ...42.7% of males and 56.3% of females (missing value: 0.9%) whose age ranged from 18 to 48 years old (M = 20.77, SD = 3.47). See Table 1 for more...details. Australia. A total of 72 participants, comprised of 90.3% males and 9.7% females whose age ranged from 20 to 29 years old were recruited (M

  16. The Interplay Between Consumer Knowledge, Cognitive Effort, Financial Healthiness And Trust In The Financial Marketplace

    DEFF Research Database (Denmark)

    Hansen, Torben

    with a healthy financial behaviour than with the opposite. Hence, financial managers should be engaged with monitoring and influencing broad-scope trust. To conclude, by taking into account the contextual effect of broad-scope trust, the present study adds to our understanding of knowledge......While trust has long been regarded as one of the most critical variables for developing and maintaining well-functioning financial customer-seller relationships it can be suggested that trust not only relates to customer trust in individual companies (narrow-scope trust). Trust also relates...... to the broader business context in which consumers may carry out their financial behaviour (broad-scope trust). However, despite the well-recognized significance of trust in marketing research, only few studies have investigated the role of broad-scope trust in consumer financial behaviour. Moreover, as one...

  17. The Role of Organizational Control Systems in Employees’ Organizational Trust and Performance Outcomes

    NARCIS (Netherlands)

    Verburg, R.M.; Nienaber, Ann Marie; Searle, Rosalind H.; Weibel, Antoinette; Den Hartog, Deanne N.; Rupp, Deborah E.

    2018-01-01

    This study examined how organizational control is related to employees’ organizational trust. We specifically focus on how different forms of control (process, outcome, and normative) relate to employees’ trust in their employing organizations and examine whether such trust in turn relates

  18. 75 FR 33369 - EQ Advisors Trust, et al.; Notice of Application

    Science.gov (United States)

    2010-06-11

    ... investment company and offers multiple series (``Funds'').\\1\\ Each Trust is offered to (a) insurance company...(k) plan sponsored by the Manager and (c) series of each Trust. Certain Funds pursue their investment objectives through a master- feeder arrangement in reliance on section 12(d)(1)(E) of the Act.\\2\\ \\1...

  19. The impact of safety organizing, trusted leadership, and care pathways on reported medication errors in hospital nursing units.

    Science.gov (United States)

    Vogus, Timothy J; Sutcliffe, Kathleen M

    2011-01-01

    Prior research has found that safety organizing behaviors of registered nurses (RNs) positively impact patient safety. However, little research exists on the joint benefits of safety organizing and other contextual factors that help foster safety. Although we know that organizational practices often have more powerful effects when combined with other mutually reinforcing practices, little research exists on the joint benefits of safety organizing and other contextual factors believed to foster safety. Specifically, we examined the benefits of bundling safety organizing with leadership (trust in manager) and design (use of care pathways) factors on reported medication errors. A total of 1033 RNs and 78 nurse managers in 78 emergency, internal medicine, intensive care, and surgery nursing units in 10 acute-care hospitals in Indiana, Iowa, Maryland, Michigan, and Ohio who completed questionnaires between December 2003 and June 2004. Cross-sectional analysis of medication errors reported to the hospital incident reporting system for the 6 months after the administration of the survey linked to survey data on safety organizing, trust in manager, use of care pathways, and RN characteristics and staffing. Multilevel Poisson regression analyses indicated that the benefits of safety organizing on reported medication errors were amplified when paired with high levels of trust in manager or the use of care pathways. Safety organizing plays a key role in improving patient safety on hospital nursing units especially when bundled with other organizational components of a safety supportive system.

  20. Blockchain – The Gateway to Trust-Free Cryptographic Transactions

    DEFF Research Database (Denmark)

    Beck, Roman; Stenum Czepluch, Jacob; Lollike, Nikolaj

    2016-01-01

    Recently, the Bitcoin-underlying blockchain technology gained prominence as a solution that offers the realization of distributed trust-free systems, where economic transactions are guaranteed by the underlying blockchain. We are still at an early stage and thus require a deeper understanding...... of how the blockchain potentials can be realized, and what are the opportunities and challenges in so doing. Following a design science approach, we developed a proof of concept prototype that has the potential to replace a trust-based coffee shop payment solution that is based on an analogue, pre......-paid punch card solution. The demonstrator provides a starting point to evaluate the strengths and weaknesses of the blockchain technology when replacing a trust-based by a trust-free transaction system. We conclude that the secure and trust-free blockchain-based transaction has the potential to change many...

  1. Dimensionality of trust: An analysis of the relations between propensity, trustworthiness and trust

    Directory of Open Access Journals (Sweden)

    Marita Heyns

    2015-05-01

    Research purpose: This study examined the dynamic interplay between trust propensity, trustworthiness beliefs and the decision to trust, as perceived within dyadic workplace relationships. Motivation for the study: No studies, as far as the authors are aware, have ever attempted to use a combination of Mayer and Davis’s well-known assessment of trustworthiness and Gillespie’s measure of behavioural trust within the same study. By including measures of main antecedents and the actual decision to trust in the same study, the multidimensionality of trust can be established more concretely. Research approach, design and method: A cross-sectional survey design with a convenience sample (N = 539 was used. The Behavioural Trust Inventory and the Organisational Trust Instrument were administered. Main findings: Results confirmed the distinctness of propensity, trustworthiness and trust as separate main constructs. Trust was strongly associated with trustworthiness beliefs. Trustworthiness beliefs fully mediated the relationship between propensity and trust. The observed relations between propensity and trustworthiness suggest that individuals with a natural predisposition to trust others will be more inclined to perceive a specific trust referent as trustworthy. Practical/managerial implications: Leaders should realise that their attitudes and behaviour have a decisive impact on trust formation processes: if they are being perceived as trustworthy, followers will be likely to respond by engaging in trusting behaviours towards them. Tools to assess followers’ perceptions of the trustworthiness of the leader may provide useful feedback that can guide leaders. Contribution/value-add: This study contributes to scientific knowledge regarding the influence of propensity to trust and trustworthiness on trust of leaders.

  2. Do Research Participants Trust Researchers or Their Institution?

    Science.gov (United States)

    Guillemin, Marilys; Barnard, Emma; Allen, Anton; Stewart, Paul; Walker, Hannah; Rosenthal, Doreen; Gillam, Lynn

    2018-07-01

    Relationships of trust between research participants and researchers are often considered paramount to successful research; however, we know little about participants' perspectives. We examined whom research participants trusted when taking part in research. Using a qualitative approach, we interviewed 36 research participants, including eight Indigenous participants. Thematic analysis was used to analyze the data. This article focuses on findings related to non-Indigenous participants. In contrast to Indigenous participants, non-Indigenous participants placed their trust in research institutions because of their systems of research ethics, their reputation and prestige. Researchers working in non-Indigenous contexts need to be cognizant that the trust that participants place in them is closely connected with the trust that participants have in the institution.

  3. Online trust building through third party trust transfer and third party protection

    Science.gov (United States)

    Wandoko, Wanda; Saleh Abbas, Bahtiar; Budiastuti, Dyah; Kosala, Raymond

    2017-03-01

    The primary objective of this research is to develop an online trust building mechanism for SME (Small Medium Enterprise). Trust is very important in e-commerce. The nature of online shopping has a greater uncertainty than offline shopping. Seeing as there is an uncertainty that can produce risks, a prospective buyer’s trust is needed. A lot of people’s unwillingness to shop online is caused by their lack of trust toward e-commerce. E-commerce is said to be one of the ways for SME to compete with bigger companies. However, building trust requires immense time and cost. SME with limited resources may experience difficulties in building trust just with their own resources. Base on literature research that needs to be validated in next research, we found that trust can be built through trust transfer from the reputable and well-known trust-mark issuer, and third party protection such as escrow account service and credit card issuer.

  4. Studies of transformational leadership: evaluating two alternative models of trust and satisfaction.

    Science.gov (United States)

    Yang, Yi-Feng

    2014-06-01

    This study evaluates the influence of leadership style and employee trust in their leaders on job satisfaction. 341 personnel (164 men, 177 women; M age = 33.5 yr., SD = 5.1) from four large insurance companies in Taiwan completed the transformational leadership behavior inventory, the leadership trust scale and a short version of the Minnesota (Job) Satisfaction Questionnaire. A bootstrapping mediation and structural equation modeling revealed that the effect of transformational leadership on job satisfaction was mediated by leadership trust. This study highlights the importance of leadership trust in leadership-satisfaction relationships, and provides managers with practical ways to enhance job satisfaction.

  5. A Secure Trust Establishment Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Farruh Ishmanov

    2014-01-01

    Full Text Available Trust establishment is an important tool to improve cooperation and enhance security in wireless sensor networks. The core of trust establishment is trust estimation. If a trust estimation method is not robust against attack and misbehavior, the trust values produced will be meaningless, and system performance will be degraded. We present a novel trust estimation method that is robust against on-off attacks and persistent malicious behavior. Moreover, in order to aggregate recommendations securely, we propose using a modified one-step M-estimator scheme. The novelty of the proposed scheme arises from combining past misbehavior with current status in a comprehensive way. Specifically, we introduce an aggregated misbehavior component in trust estimation, which assists in detecting an on-off attack and persistent malicious behavior. In order to determine the current status of the node, we employ previous trust values and current measured misbehavior components. These components are combined to obtain a robust trust value. Theoretical analyses and evaluation results show that our scheme performs better than other trust schemes in terms of detecting an on-off attack and persistent misbehavior.

  6. Continuous Calibration of Trust in Automated Systems

    Science.gov (United States)

    2014-01-01

    Airlines Flight 214 in San Francisco. Therefore, understanding how users form, lose, and recover trust in imperfect automation is of critical...1997). Misuse and disuse can have fatal consequences; for example, inappropriate automation reliance has been implicated in the recent crash of Asiana

  7. Trust mediates conservation-related behaviors

    Science.gov (United States)

    Patricia L. Winter; George Cvetkovich

    2010-01-01

    In this article we explore the influence that a perceived connection between a natural resource management agency and individual citizens has upon conservation-related behaviors on public lands, offering an extension of psychology’s examination of environmental behaviors. Our emphasis is upon perceived value similarity and resulting trust between citizens and the USDA...

  8. Social trust, interpersonal trust and self-rated health in China: a multi-level study.

    Science.gov (United States)

    Feng, Zhixin; Vlachantoni, Athina; Liu, Xiaoting; Jones, Kelvyn

    2016-11-08

    Trust is important for health at both the individual and societal level. Previous research using Western concepts of trust has shown that a high level of trust in society can positively affect individuals' health; however, it has been found that the concepts and culture of trust in China are different from those in Western countries and research on the relationship between trust and health in China is scarce. The analyses use data from the national scale China General Social Survey (CGSS) on adults aged above 18 in 2005 and 2010. Two concepts of trust ("out-group" and "in-group" trust) are used to examine the relationship between trust and self-rated health in China. Multilevel logistical models are applied, examining the trust at the individual and societal level on individuals' self-rated health. In terms of interpersonal trust, both "out-group" and "in-group" trust are positively associated with good health in 2005 and 2010. At the societal level, the relationships between the two concepts of trust and health are different. In 2005, higher "out-group" social trust (derived from trust in strangers) is positively associated with better health; however, higher "in-group" social trust (derived from trust in most people) is negatively associated with good health in 2010. The cross-level interactions show that lower educated individuals (no education or only primary level), rural residents and those on lower incomes are the most affected groups in societies with higher "out-group" social trust; whereas people with lower levels of educational attainment, a lower income, and those who think that most people can be trusted are the most affected groups in societies with higher "in-group" social trust. High levels of interpersonal trust are of benefit to health. Higher "out-group" social trust is positively associated with better health; while higher "in-group" social trust is negatively associated with good health. Individuals with different levels of educational

  9. Introduction matters: Manipulating trust in automation and reliance in automated driving.

    Science.gov (United States)

    Körber, Moritz; Baseler, Eva; Bengler, Klaus

    2018-01-01

    Trust in automation is a key determinant for the adoption of automated systems and their appropriate use. Therefore, it constitutes an essential research area for the introduction of automated vehicles to road traffic. In this study, we investigated the influence of trust promoting (Trust promoted group) and trust lowering (Trust lowered group) introductory information on reported trust, reliance behavior and take-over performance. Forty participants encountered three situations in a 17-min highway drive in a conditionally automated vehicle (SAE Level 3). Situation 1 and Situation 3 were non-critical situations where a take-over was optional. Situation 2 represented a critical situation where a take-over was necessary to avoid a collision. A non-driving-related task (NDRT) was presented between the situations to record the allocation of visual attention. Participants reporting a higher trust level spent less time looking at the road or instrument cluster and more time looking at the NDRT. The manipulation of introductory information resulted in medium differences in reported trust and influenced participants' reliance behavior. Participants of the Trust promoted group looked less at the road or instrument cluster and more at the NDRT. The odds of participants of the Trust promoted group to overrule the automated driving system in the non-critical situations were 3.65 times (Situation 1) to 5 times (Situation 3) higher. In Situation 2, the Trust promoted group's mean take-over time was extended by 1154 ms and the mean minimum time-to-collision was 933 ms shorter. Six participants from the Trust promoted group compared to no participant of the Trust lowered group collided with the obstacle. The results demonstrate that the individual trust level influences how much drivers monitor the environment while performing an NDRT. Introductory information influences this trust level, reliance on an automated driving system, and if a critical take-over situation can be

  10. The role of organizational trust in safety climate's influence on organizational outcomes.

    Science.gov (United States)

    Kath, Lisa M; Magley, Vicki J; Marmet, Matthew

    2010-09-01

    Based on elements of social exchange theory and other conceptualizations of trust, a model was developed situating organizational trust as a central component to the relationship that safety climate has with organizational outcomes. Specifically, the model specified that two facets of safety climate--upward safety communication and management attitudes toward safety--would be positively related to organizational trust. Increased levels of trust would then predict increased motivation to engage in safe job-related behaviors, increased job satisfaction, and decreased turnover intentions. Another hypothesis investigated whether job safety relevance would moderate the relationship between safety climate and trust. Online survey research was conducted with 599 employees from 97 work groups across a New England grocery store chain. Hierarchical linear modeling indicated support for trust mediating the relationship between safety climate and organizational outcomes; further, the relationship between safety climate and trust was stronger within work groups where safety was more relevant. 2009 Elsevier Ltd. All rights reserved.

  11. The Role of Trust in Financial Customer-seller Relationships Before and After the Financial Crisis

    DEFF Research Database (Denmark)

    Hansen, Torben

    2014-01-01

    provider. Hence, as a direct managerial implication, financial service managers should consider investing additional resources in satisfying their customers in the after crisis era. In addition, it is suggested that managers should seek to rebuild the positive relationship between trust and loyalty......This study examines the role of trust in customer-seller relationships before and after the 2008 financial crisis. On the basis of two surveys comprising 1155 and 757 bank customers, respectively, it is shown that trust is less likely to mediate the relationship between satisfaction and loyalty...

  12. MULTILEVEL AND MULTIDIMENSIONAL SCALE FOR ONLINE TRUST

    Directory of Open Access Journals (Sweden)

    Encarnación González-Vázquez

    2014-02-01

    Full Text Available This paper examines the nature of the construct of consumers’ trust toward the electronic channel of their financial institution. Through a study of a total of 372 individual users of Internet banking in Spain, we have managed to develop a third-order measuring instrument that integrates a total of seven dimensions. The exploratory and confirmatory factor analyses were used to test the validation and reliability of the proposed scale. Findings provide useful information to professionals who seek to identify how customer's trust is formed in the online channel and in the financial sector.

  13. Making things happen through challenging goals: leader proactivity, trust, and business-unit performance.

    Science.gov (United States)

    Crossley, Craig D; Cooper, Cecily D; Wernsing, Tara S

    2013-05-01

    Building on decades of research on the proactivity of individual performers, this study integrates research on goal setting and trust in leadership to examine manager proactivity and business unit sales performance in one of the largest sales organizations in the United States. Results of a moderated-mediation model suggest that proactive senior managers establish more challenging goals for their business units (N = 50), which in turn are associated with higher sales performance. We further found that employees' trust in the manager is a critical contingency variable that facilitates the relationship between challenging sales goals and subsequent sales performance. This research contributes to growing literatures on trust in leadership and proactivity by studying their joint effects at a district-unit level of analysis while identifying district managers' tendency to set challenging goals as a process variable that helps translate their proactivity into the collective performance of their units. PsycINFO Database Record (c) 2013 APA, all rights reserved.

  14. Search for Trustful Leadership in Secondary Schools: Is Empowerment the Solution?

    Science.gov (United States)

    Freire, Carla; Fernandes, António

    2016-01-01

    The purpose of this study is to analyse how the access to structures of empowerment by teachers in primary and secondary education impacts on their trust of the headmaster of the school management board. Using the theoretical framework of empowerment and trust in the context of companies, one adapted the constructs of these scales to the reality…

  15. Debriefing in Moodle: Written Feedback on Trust and Knowledge Sharing in a Social Dilemma Game

    Science.gov (United States)

    Oertig, Margaret

    2010-01-01

    This article describes a new approach to debriefing that uses the discussion forum feature of the Moodle open source course management system to debrief a simulation game with undergraduate business students. The simulation game allowed the students to experience the fragility of trust when sharing knowledge in a global virtual project team. I…

  16. Exploring the influence of trust relationships on motivation in the health sector: a systematic review.

    Science.gov (United States)

    Okello, Dickson R O; Gilson, Lucy

    2015-03-31

    Dedicated and motivated health workers (HWs) play a major role in delivering efficient and effective health services that improve patients' experience of health care. Growing interest in HW motivation has led to a global focus on pay for performance strategies, but less attention has been paid to nurturing intrinsic motivation. Workplace trust relationships involve fair treatment and respectful interactions between individuals. Such relationships enable cooperation among HWs and their colleagues, supervisors, managers and patients and may act as a source of intrinsic motivation. This paper presents findings from a qualitative systematic review of empirical studies providing evidence on HW motivation, to consider what these studies suggest about the possible influence of workplace trust relationships over motivation. Five electronic databases were searched for articles reporting research findings about HW motivation for various cadres published in the 10-year period 2003 to 2013 and with available full free text in the English language. Data extraction involved consideration of the links between trust relationships and motivation, by identifying how studies directly or indirectly mention and discuss relevant factors. Twenty-three articles from low- and middle-income countries and eight from high-income countries that met predetermined quality and inclusion criteria were appraised and subjected to thematic synthesis. Workplace trust relationships with colleagues, supervisors and managers, employing organisation and patients directly and indirectly influence HW motivation. Motivational factors identified as linked to trust include respect; recognition, appreciation and rewards; supervision; teamwork; management support; autonomy; communication, feedback and openness; and staff shortages and resource inadequacy. To the authors' knowledge, this is the first systematic review on trust and motivation in the health sector. Evidence indicates that workplace trust

  17. Can consumer choice replace trust in the National Health Service in England? Towards developing an affective psychosocial conception of trust in health care.

    Science.gov (United States)

    Fotaki, Marianna

    2014-11-01

    Trust has long been regarded as a vitally important aspect of the relationship between health service providers and patients. Recently, consumer choice has been increasingly advocated as a means of improving the quality and effectiveness of health service provision. However, it is uncertain how the increase of information necessary to allow users of health services to exercise choice, and the simultaneous introduction of markets in public health systems, will affect various dimensions of trust, and how changing relations of trust will impact upon patients and services. This article employs a theory-driven approach to investigate conceptual and material links between choice, trust and markets in health care in the context of the National Health Service in England. It also examines the implications of patient choice on systemic, organisational and interpersonal trust. The article is divided into two parts. The first argues that the shift to marketisation in public health services might lead to an over-reliance on rational-calculative aspects of trust at the expense of embodied, relational and social attributes. The second develops an alternative psychosocial conception of trust: it focuses on the central role of affect and accounts for the material and symbolic links between choice, trust and markets in health care. © 2014 The Author. Sociology of Health & Illness © 2014 Foundation for the Sociology of Health & Illness/John Wiley & Sons Ltd.

  18. Trust framework for a secured routing in wireless sensor network

    Directory of Open Access Journals (Sweden)

    Ouassila Hoceini

    2015-11-01

    Full Text Available Traditional techniques to eliminate insider attacks developed for wired and wireless ad hoc networks are not well suited for wireless sensors networks due to their resource constraints nature. In order to protect WSNs against malicious and selfish behavior, some trust-based systems have recently been modeled. The resource efficiency and dependability of a trust system are the most fundamental requirements for any wireless sensor network (WSN. In this paper, we propose a Trust Framework for a Secured Routing in Wireless Sensor Network (TSR scheme, which works with clustered networks. This approach can effectively reduce the cost of trust evaluation and guarantee a better selection of safest paths that lead to the base station. Theoretical as well as simulation results show that our scheme requires less communication overheads and consumes less energy as compared to the current typical trust systems for WSNs. Moreover, it detects selfish and defective nodes and prevents us of insider attacks

  19. 77 FR 33790 - Hennion & Walsh, Inc. and Smart Trust; Notice of Application

    Science.gov (United States)

    2012-06-07

    ... for short- term cash management purposes. For the Commission, by the Division of Investment Management... trust (``UIT'') registered under the Act to acquire shares of registered management investment companies... Company Regulation, Division of Investment Management). SUPPLEMENTARY INFORMATION: The following is a...

  20. Trust and Contracting in Agri-Food Hybrid Structures

    OpenAIRE

    Martino, Gaetano

    2007-01-01

    The paper aims at examining the hypothesis that the influence of trust on contract can be thought of as a dynamic factor of organizational choices in supply chains. The relationship between contract and trust is delineated on the basis of institutional environment, contractual incompleteness, safeguards and restrictive provisions. The interaction between individual and system elements in the formation of trust and its influence in hybrid contracting is considered. According to a New Instituti...

  1. Beyond empathy, cultivating trust: keys for intercultural reunion

    Directory of Open Access Journals (Sweden)

    Gérard Marandon

    2003-06-01

    Full Text Available disagreements increases due to intercultural misunderstandings, and the difficulty of reaching a relationship of trust arises. To achieve this climate of trust it is advisable to previously examine certain general, theoretical problems in communication, and, in particular,those posed by intercultural situations. First, he discusses conflict and distinguishes between cognitive and affective conflict, to then go on to the psychosocial conditions of conflict management. What are the factors that condition the success of intercultural exchanges?Communication theories must be reconsidered in such a way that they can explain intercultural interactions. For the author, an intercultural situation is produced from the moment in which people or groups do not share the same universes of meaning and the same forms of expression for these meanings. A proposal for communication as well as for conflict management can be found in the theory of a provisional culture (culture tierce, which allows temporary adjustments to achieve common goals. In the creation of this space, trust plays a central role, since it is necessary in any exchange but, above all, it is crucial in intercultural situations, due to their complexity.

  2. Emergent Trust and Work Life Relationships: How to Approach the Relational Moment of Trust

    Directory of Open Access Journals (Sweden)

    Tone Bergljot Eikeland

    2015-10-01

    Full Text Available How do we trust? What does the basic mechanism of trust look like? These questions define the starting point for a comparison of the classic ideas of how trust works by Mayer et al. (1995, Möllering’s (2006 re-adaption of Giddens’, Simmel’s, and James’ classic ideas of trust, and a phenomenological approach focusing on “emergent trust.” Introducing the concept of emergent trust, the idea is to suggest a phenomenological approach to studies of trust in work-life relationships in professional organizations, as an alternative to trust as a cognitive attitude, where trust becomes a stable, individual possession. The term “emergent” demonstrates a trust that emerges in meetings between persons, it has an immediate, unconditional quality, and shows itself in situations of life where there is a potential for trust to appear. Trust’s basic relationality makes the person morally responsible for the other. Trust appears between persons, as an event, constituting risk and uncertainty as a natural and positive part of our lives. Still, in larger social settings, the responsibility of trust also disperses on to the work itself, and our wider social networks.

  3. Restoring trust in the rule of law

    NARCIS (Netherlands)

    Hirsch Ballin, Ernst

    The law as an abstract system of rules establishes the conditions under which people in large societies can live together in peace. This is not because they all have personal trust in each other (which is obviously impossible to establish) but because they trust that living up to the rules is what

  4. "You don't want to lose that trust that you've built with this patient...": (dis)trust, medical tourism, and the Canadian family physician-patient relationship.

    Science.gov (United States)

    Crooks, Valorie A; Li, Neville; Snyder, Jeremy; Dharamsi, Shafik; Benjaminy, Shelly; Jacob, Karen J; Illes, Judy

    2015-02-25

    Recent trends document growth in medical tourism, the private pursuit of medical interventions abroad. Medical tourism introduces challenges to decision-making that impact and are impacted by the physician-patient trust relationship-a relationship on which the foundation of beneficent health care lies. The objective of the study is to examine the views of Canadian family physicians about the roles that trust plays in decision-making about medical tourism, and the impact of medical tourism on the therapeutic relationship. We conducted six focus groups with 22 family physicians in the Canadian province of British Columbia. Data were analyzed thematically using deductive and inductive codes that captured key concepts across the narratives of participants. Family physicians indicated that they trust their patients to act as the lead decision-makers about medical tourism, but are conflicted when the information they are managing contradicts the best interests of the patients. They reported that patients distrust local health care systems when they experience insufficiencies in access to care and that this can prompt patients to consider going abroad for care. Trust fractures in the physician-patient relationship can arise from shame, fear and secrecy about medical tourism. Family physicians face diverse tensions about medical tourism as they must balance their roles in: (1) providing information about medical tourism within a context of information deficits; (2) supporting decision-making while distancing themselves from patients' decisions to engage in medical tourism; and (3) acting both as agents of the patient and of the domestic health care system. These tensions highlight the ongoing need for reliable third-party informational resources about medical tourism and the development of responsive policy.

  5. Designing and implementing a trust-wide quality assurance programme.

    Science.gov (United States)

    Coope, Sally-Ann

    2018-04-02

    Derbyshire Community Health Services (DCHS) NHS Foundation Trust provides a wide range of community-based health services. After the Care Quality Commission (CQC) found gaps in the trust's assurance process, its board decided to develop a method of continuous quality improvements that could be used as a basis for the trust's quality assurance system. The trust adapted and built on an acute model so it was suitable for community services. The final assurance system, Quality Always, has four elements: the clinical assessment and accreditation scheme; leadership development; 'champions' within clinical teams to support and promote the scheme; and dashboards to record and monitor progress. A system to recognise and reward achievement was essential for success. Quality Always has resulted in better care quality, an improved CQC rating, a sense of achievement among staff, the development of support networks, learning (especially among support staff) and good practice being shared.

  6. Structural equation modeling analysis of factors influencing architects' trust in project design teams

    Institute of Scientific and Technical Information of China (English)

    DING Zhi-kun; NG Fung-fai; WANG Jia-yuan

    2009-01-01

    This paper describes a structural equation modeling (SEM) analysis of factors influencing architects' trust in project design teams. We undertook a survey of architects, during which we distributed 193 questionnaires in 29 A-level architectural We used Amos 6.0 for SEM to identify significant personal construct based factors affecting interpersonal trust. The results show that only social interaction between architects significantly affects their interpersonal trust. The explained variance of trust is not very high in the model. Therefore, future research should add more factors into the current model. The practical implication is that team managers should promote the social interactions between team members such that the interpersonal trust level between team members can be improved.

  7. Automation trust and attention allocation in multitasking workspace.

    Science.gov (United States)

    Karpinsky, Nicole D; Chancey, Eric T; Palmer, Dakota B; Yamani, Yusuke

    2018-07-01

    Previous research suggests that operators with high workload can distrust and then poorly monitor automation, which has been generally inferred from automation dependence behaviors. To test automation monitoring more directly, the current study measured operators' visual attention allocation, workload, and trust toward imperfect automation in a dynamic multitasking environment. Participants concurrently performed a manual tracking task with two levels of difficulty and a system monitoring task assisted by an unreliable signaling system. Eye movement data indicate that operators allocate less visual attention to monitor automation when the tracking task is more difficult. Participants reported reduced levels of trust toward the signaling system when the tracking task demanded more focused visual attention. Analyses revealed that trust mediated the relationship between the load of the tracking task and attention allocation in Experiment 1, an effect that was not replicated in Experiment 2. Results imply a complex process underlying task load, visual attention allocation, and automation trust during multitasking. Automation designers should consider operators' task load in multitasking workspaces to avoid reduced automation monitoring and distrust toward imperfect signaling systems. Copyright © 2018. Published by Elsevier Ltd.

  8. Market Mavenism: Its Contribution in Building Consumer’s Trust

    Directory of Open Access Journals (Sweden)

    Jofi Puspa

    2009-01-01

    Full Text Available In globalization era, firms have to deal with multifaceted challenges. Dynamic changes in consumers’ demands and desires, technology, and new knowledge and innovative movement of competitors are some examples of the important tasks to be managed in order to be able to survive in the market. The role of communications and the presence of market maven cannot be ignored because both are salient elements for establishing a firm’s marketing strategy. Market maven has been well defined and studied. However, the participation of market maven in improving a consumer’s knowledge and trust in certain object is unclear. Therefore, this study aims to: (1 investigate the role of inherent personal knowledge in affecting trust, (2 investigate as to whether mavens play a role in improving a recipient’s knowledge level and trust. The authors conducted a study that involved a total of 134 students as respondents. The correlation between subjective knowledge and trust attains a medium level, while objective knowledge is related to trust at a very low level. Trust in the low maven group is the lowest compared to that in medium and high mavens. This study indicates that there are different results in terms of effects of information provided by three different maven groups.

  9. Trust in Effective International Business Cooperation: Mediating Effect of Work Engagement

    Directory of Open Access Journals (Sweden)

    Małgorzata Chrupała-Pniak

    2017-06-01

    Full Text Available Objective: This study aims to analyse the relationships between relational competence and its trust-building processes with individuals’ traits considered as psychological antecedents of inter-organizational relationships (IORs, outcomes. We hypothesize that organizational trust-building competence, situational trust, trust propensity, and autonomous motivation of cooperating teams and their managers influence IORs outcomes through work engagement of cooperating people. Research Design & Methods: We addressed 210 managers and 982 employees responsible for inter-organizational cooperation from medium and big companies. As explanatory model we adopted the job resources-demands (JR-D model. Correlation, regression, mediation analyses with bootstrapping, and structural equations modelling (SEM were used. Findings: Our analyses confirmed positive role of both organizational competences and psychological states of individuals, as valuable mediators in translating the potential of personal traits of teams and managers into IORs outcomes. Implications & Recommendations: As both psychological variables of people responsible for the course of IORs and relational competences of organizations play a vital role in reaching outcomes in IORs attention should be paid simultaneously to both aspects. Our findings highlight the necessity for interdisciplinary research in the field of IORs. Contribution & Value Added: We expose the multilevel and multifactor character of relationships between the antecedents of firms success in IORs, with the use of relationships theory in organization science, and theories proposed by psychology of work and organization.

  10. Trust and safety in the coal mining sector

    Energy Technology Data Exchange (ETDEWEB)

    Neil Gunningham; Darren Sinclair [Gunningham and Associates (Australia)

    2008-08-15

    This report examines the relationship between trust (and mistrust) and occupational health and safety (OHS) in the Australian coal mining sector. Previous research in Australian coal mining companies indicated that mistrust is deep-seated at a number of mines, and that these mines are usually the worst performers in terms of OHS. Mistrust also handicaps the ability of inspectors to worker together with mines sites to improve OHS outcomes. Given this, there is a compelling need to understand how mistrust comes about, and to identify practical steps that can be adopted by companies, mines sites and the inspectorate to foster the development of trust. The report builds on these earlier findings by investigating trust in a much more detailed and sophisticated fashion, drawing on an in-depth analysis at mines, across a number of coal mining companies, and in two state jurisdictions. Research revealed that a 'cluster of characteristics' are associated with the formation and maintenance of mistrust at mines with a lower OHS track-record. These findings, together with an analysis of the characteristics of mines with better OHS outcomes, enabled the report to outline a variety of ways in which mines may build trust within and between management and the workforce. It also considers the at times fractious relationship between trade unions and management, and flags some of the challenges confronting these two groups in working together to improve OHS performance in the coal mining sector. Finally, the report examines the rise and impact of mistrust on the operations of the New South Wales and Queensland inspectorates, and suggests ways in which a fairer and more just enforcement policy may help foster greater trust between inspectors and mines.

  11. Partisan strength, political trust and generalized trust in the United States: An analysis of the General Social Survey, 1972-2014.

    Science.gov (United States)

    Hooghe, Marc; Oser, Jennifer

    2017-11-01

    The literature on political parties suggests that strong partisan identities are associated with citizens' effective interaction with the political system, and with higher levels of political trust. Traditionally, party identity therefore is seen as a mechanism that allows for political integration. Simultaneously, however, political parties have gained recent attention for their role in promoting societal polarization by reinforcing competing and even antagonistic group identities. This article uses General Social Survey data from 1972 - 2014 to investigate the relationship between partisan strength and both political and generalized trust. The findings show that increases in partisan strength are positively related to political trust, but negatively related to generalized trust. This suggests that while partisan strength is indeed an important linkage mechanism for the political system, it is also associated with a tendency toward social polarization, and this corrosive effect thus far has not gained sufficient attention in literature on party identity. Copyright © 2017 Elsevier Inc. All rights reserved.

  12. Development of the environmental data management system

    International Nuclear Information System (INIS)

    Tatebe, Kazuaki; Suzuki, Yurina; Shirato, Seiichi; Sato, Yoshinori

    2012-02-01

    The recent society requires business activities with environmental consideration to every enterprise. Also, Japanese laws require those activities. For example, 'Law Concerning the Promotion of Business Activities with Environmental Consideration by Specified Corporations, etc, by Facilitating Access to Environmental Information, and Other Measures' (Environmental Consideration Law) mandates publication of a report relating to the activities of environmental consideration to each enterprise above designated size. 'Act on the Rational Use of Energy' mandates the report of the results of energy consumption and the long-term plan of the rational use of energy. Moreover, 'Act on Promotion of Global Warming Countermeasures' mandates the report of the greenhouse gas emissions. In addition to those, 'Water Pollution Control Law', 'Waste Management and Public Cleaning Law' and other environmental laws as well as environmental ordinances require business activities with environmental consideration to all companies. So, it is very important for Japan Atomic Energy Agency (JAEA) to report business activities with environmental consideration in order to build up trustful relations with the nation and communities. The Environmental Data Management System has been developed as the data base of business activities with environmental consideration in JAEA and as the means to promote the activities at every site and office of JAEA. This report summarizes the structure of the Environmental Data Management System, kinds of environmental performance data treated by the system, and gathering methods of the data. (author)

  13. Zero Trust Intrusion Containment for Telemedicine

    National Research Council Canada - National Science Library

    Sood, Arun

    2002-01-01

    .... Our objective is the design and analysis of 'zero-trust' Intrusion Tolerant Systems. These are systems built under the extreme assumption that all intrusion detection techniques will eventually fail...

  14. Trust-Based and Context-Aware Authentication in a Software Architecture for Context and Proximity-Aware Services

    Science.gov (United States)

    Lenzini, Gabriele

    We describe an existing software architecture for context and proximity aware services that enables trust-based and context-aware authentication. A service is proximity aware when it automatically detects the presence of entities in its proximity. Authentication is context-aware when it uses contextual information to discern among different identities and to evaluate to which extent they are authentic. The software architecture that we describe here is functioning in our Institute: It manages a sensor network to detect the presence and location of users and their devices. A context manager is responsible to merge the different sources of contextual information, to solve potential contradictions, and to determine the level of authentication of the identity of the person approaching one of the services offered in the coffee-break corners of our Institute. In our solution for context-aware authentication, sensors are managed as if they were recommenders having subjective belief, disbelief, and uncertainty (i.e., trust) on the position and identity of users. A sensor’s subjective trust depends on what it has been sensing in the environment. We discuss the results of an array of simulations that we conducted to validate our concept of trust-based and context-aware authentication. We use Subjective Logic to manage trust.

  15. Trust-aware recommendation for improving aggregate diversity

    Science.gov (United States)

    Liu, Haifeng; Bai, Xiaomei; Yang, Zhuo; Tolba, Amr; Xia, Feng

    2015-10-01

    Recommender systems are becoming increasingly important and prevalent because of the ability of solving information overload. In recent years, researchers are paying increasing attention to aggregate diversity as a key metric beyond accuracy, because improving aggregate recommendation diversity may increase long tails and sales diversity. Trust is often used to improve recommendation accuracy. However, how to utilize trust to improve aggregate recommendation diversity is unexplored. In this paper, we focus on solving this problem and propose a novel trust-aware recommendation method by incorporating time factor into similarity computation. The rationale underlying the proposed method is that, trustees with later creation time of trust relation can bring more diverse items to recommend to their trustors than other trustees with earlier creation time of trust relation. Through relevant experiments on publicly available dataset, we demonstrate that the proposed method outperforms the baseline method in terms of aggregate diversity while maintaining almost the same recall.

  16. Creating trust in a risk context. On social acceptance of risks in siting of repositories for radioactive and hazardous waste

    International Nuclear Information System (INIS)

    Lidskog, R.

    1993-01-01

    Taking Beck's and Giddens' recent formulation of the society's new conditions for gaining trust as theoretical point of departure, this article focusses trust and risk with regard to hazardous and radioactive waste disposal in Sweden. Seeing trust as intimately connected with cognitive understanding of risk, the information strategies of the companies with responsibility for hazardous and radioactive waste management are analyzed. Central in gaining trust is the creation of access points - points of connection between lay individuals or collectivities and the representatives of expert systems - at which trust can be built up or maintained. This article emphasizes that this kind of local conflict is to be seen as a struggle concerning the cognitive understanding of risk-generating activities, and the question is to what extent the cognitive understanding of nuclear companies will be accepted among the affected local population and to what extent the local population will develop and maintain an alternative cognitive understanding. 78 refs

  17. Trust in Scientific Publishing

    NARCIS (Netherlands)

    Hummels, Harry; Roosendaal, Hans E.

    2001-01-01

    Trust is an important phenomenon to reduce organisational complexity and uncertainty. In the literature many types of trust are distinguished. An important framework to understand the variety and development of trust in organisations is provided by Zucker. She distinguishes three types of trust:

  18. A Trusted Smart Phone and Its Applications in Electronic Payment

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    With the growing intelligence and popularity of mobile phones, and the trend of cellular network's convergence to IP based network, more and more mobile applications emerge on the market. For mission critical applications, like the electronic payment which will be discussed in this paper, the lack of trust in the underlying mobile infrastructure and secure interface to legacy systems (for this case, the banking systems) poses obstacles to their widespread presence in mobile services. Recently, the exposure of hacking of iPhone and other smart phones further emphasizes the criticality of establishing a trust platform for mobile applications. This paper analyzes the building blocks of the trusted smart phone, and proposes a framework to provide a trusted platform for mobile electronic payment. Such a proposed system may allow direct interface to the banking systems due to the banking industry recognized strong security, and hence, may enable its widespread use.

  19. The information systems security officer's guide establishing and managing an information protection program

    CERN Document Server

    Kovacich, Gerald L

    2003-01-01

    Information systems security continues to grow and change based on new technology and Internet usage trends. In order to protect your organization's confidential information, you need information on the latest trends and practical advice from an authority you can trust. The new ISSO Guide is just what you need. Information Systems Security Officer's Guide, Second Edition, from Gerald Kovacich has been updated with the latest information and guidance for information security officers. It includes more information on global changes and threats, managing an international information secur

  20. Trust Level and Routing Selection for Mobile Agents in a Smart Home

    NARCIS (Netherlands)

    Nasution, Sandy; Hartel, Pieter H.; Suryana, Nanna; Azman, Nur; Shahib, Shahrin

    The central security concern for systems where agents roam is how to establish trust in the agent. We present a Fuzzy Logic mechanism to calculate a level of trust and an optimal route for a mobile agent system in a smart home. The mechanism consists of two parts. The first part calculates a trust

  1. Leader-member exchange and safety citizenship behavior: The mediating role of coworker trust.

    Science.gov (United States)

    Jiang, Li; Li, Feng; Li, YongJuan; Li, Rui

    2017-01-01

    To achieve high safety levels, mere compliance with safety regulations is not sufficient; employees must be proactive and demonstrate safety citizenship behaviors. Trust is considered as a mechanism for facilitating the effects of a leader on employee citizenship behaviors. Increasingly research has focused on the role of trust in a safety context; however, the role of coworker trust has been overlooked. The mediating role of coworker trust in the relationship between the leader-member exchange and safety citizenship behavior is the focus of this field study. Front-line employees from an air traffic control center and an airline maintenance department completed surveys measuring leader-member exchange, co-worker trust, and safety citizenship behavior. Structural Equation Modeling revealed affective and cognitive trust in coworkers is influenced by leader-member exchange. A trust-based mediation model where cognitive trust and affective trust mediate the relationship between the leader-member exchange and safety citizenship behavior emerged. Results of this study add to our understanding of the relationship between leader-member exchange and safety behavior. The effect of co-worker trust and the extent to which employees participate in workplace safety practice were identified as critical factors. The findings show that managers need to focus on developing cognitive and affective coworker trust to improve safety citizenship behaviors.

  2. Worldviews and trust of sources for health information on electronic nicotine delivery systems: Effects on risk perceptions and use.

    Science.gov (United States)

    Weaver, Scott R; Jazwa, Amelia; Popova, Lucy; Slovic, Paul; Rothenberg, Richard B; Eriksen, Michael P

    2017-12-01

    Public health agencies, the news media, and the tobacco/vapor industry have issued contradictory statements about the health effects of electronic nicotine delivery systems (ENDS). We investigated the levels of trust that consumers place in different information sources and how trust is associated with cultural worldviews, risk perceptions, ENDS use, and sociodemographic characteristics using a nationally representative sample of 6051 U.S. adults in 2015. Seventeen percent of adults were uncertain about their trust for one or more potential sources. Among the rest, the Centers for Disease Control and Prevention (CDC), health experts, and the Food & Drug Administration (FDA) elicited the highest levels of trust. In contrast, tobacco and vapor manufacturers, vape shop employees, and, to a lesser extent, the news media were distrusted. Adults who had higher incomes and more education or espoused egalitarian and communitarian worldviews expressed more trust in health sources and the FDA, whereas those identifying as non-Hispanic Black or multiracial reported less trust. Current smokers, those who identified as non-Hispanic Black or other race, had lower incomes, and espoused hierarchy and individualism worldviews expressed less distrust toward the tobacco and vapor industry. Greater trust (or less distrust) toward the tobacco and vapor industry and an individualism worldview were associated with perceptions of lower risk of premature death from daily ENDS use, greater uncertainty about those risks, and greater odds of using ENDS. Public health and the FDA should consider consumer trust and worldviews in the design and regulation of public education campaigns regarding the potential health risks and benefits of ENDS.

  3. Worldviews and trust of sources for health information on electronic nicotine delivery systems: Effects on risk perceptions and use

    Directory of Open Access Journals (Sweden)

    Scott R. Weaver

    2017-12-01

    Full Text Available Public health agencies, the news media, and the tobacco/vapor industry have issued contradictory statements about the health effects of electronic nicotine delivery systems (ENDS. We investigated the levels of trust that consumers place in different information sources and how trust is associated with cultural worldviews, risk perceptions, ENDS use, and sociodemographic characteristics using a nationally representative sample of 6051 U.S. adults in 2015. Seventeen percent of adults were uncertain about their trust for one or more potential sources. Among the rest, the Centers for Disease Control and Prevention (CDC, health experts, and the Food & Drug Administration (FDA elicited the highest levels of trust. In contrast, tobacco and vapor manufacturers, vape shop employees, and, to a lesser extent, the news media were distrusted. Adults who had higher incomes and more education or espoused egalitarian and communitarian worldviews expressed more trust in health sources and the FDA, whereas those identifying as non-Hispanic Black or multiracial reported less trust. Current smokers, those who identified as non-Hispanic Black or other race, had lower incomes, and espoused hierarchy and individualism worldviews expressed less distrust toward the tobacco and vapor industry. Greater trust (or less distrust toward the tobacco and vapor industry and an individualism worldview were associated with perceptions of lower risk of premature death from daily ENDS use, greater uncertainty about those risks, and greater odds of using ENDS. Public health and the FDA should consider consumer trust and worldviews in the design and regulation of public education campaigns regarding the potential health risks and benefits of ENDS.

  4. How are homeless people treated in the healthcare system and other societal institutions? Study of their experiences and trust.

    Science.gov (United States)

    Irestig, Robert; Burström, Kristina; Wessel, Maja; Lynöe, Niels

    2010-05-01

    To elucidate the perceived treatment that the homeless have received from the healthcare and other societal organisations and to present homeless persons' trust in the healthcare system and suggestions of necessary changes for improving it. Homeless individuals in special houses and institutions in the County of Stockholm were asked to answer a short version of a public health survey, including added questions about how they experienced the healthcare providers' attitudes towards them and how much trust they had in the healthcare system. A total of 155 homeless persons (123 male and 32 female) were interviewed. Three-quarters of the participants stated that they had fairly or very high trust in healthcare services and also felt that they had been fairly or very well treated. Fewer females than males reported being treated well and they declared a lower degree of trust in the healthcare system. The homeless suggest that extra resources be set aside to organise their healthcare, including a higher level of knowledge of the medical problems prevailing in the group. Those who felt badly treated also asked for less neglect and disrespect from the healthcare staff. Even though a majority experience that they are being well treated within the healthcare system, the study also indicated disadvantages in the treatment of homeless persons in Sweden. The study also reveals an imbalance between the official ethical framework in Sweden and of the specific moral of some individual healthcare providers. One way to facilitate their entry into the healthcare system might be to create special surgeries for the homeless.

  5. Paradoxes in virtual team knowledge communication and trust building

    DEFF Research Database (Denmark)

    Petersen, Nils Braad

    2012-01-01

    This thesis proposal presents paradoxes within current trust and knowledge management literatures as a lens for understanding challenges in virtual teams working across organisational and geographic boundaries. By exposing contradictions within current virtual team research, the author proposes...... a need for a different, multi-level, multi-theoretical approach to virtual team research in order to overcome the paradoxes. A moderate constructionist research position building on Critical Realism is proposed. To situate the project within current literatures, trust, knowledge management and virtual...... team literatures are reviewed. These are used to support the paradoxes used as a lens for understanding. A research design is presented building on interviews, documentary analysis and observations analysed using Social Network Analysis and James Gee’s framework for discourse analysis. Finally...

  6. The influence of organisational rewards on workplace trust and work engagement

    Directory of Open Access Journals (Sweden)

    Janine Victor

    2017-05-01

    Full Text Available Orientation: In volatile and competitive business environments, organisations are faced with challenges to retain talented workers. Employees are increasingly leaving their jobs for a number of reasons, one of them being a perceived lack of adequate reward practices. Consequently, this has impacted on employee work engagement and confidence and trust in organisations. Research purpose: The study sought to determine whether there is a relationship between rewards, trust and engagement, as well as whether rewards are able to predict trust and engagement in the South African workplace. Motivation for the study: Organisations can no longer solely rely on extrinsic rewards to retain talent. Companies must draw on both extrinsic and intrinsic reward strategies to improve retention levels through endorsing higher levels of workplace trust and work engagement levels. Research design, approach and method: A quantitative, exploratory and cross-sectional research design was utilised. Non-probability sampling using questionnaires consisting of scales from the Job Satisfaction Survey, Intrinsic Motivation Inventory, Psychological Meaningfulness Scale, Basic Needs at Work Scale, Workplace Trust Survey and Utrecht Work Engagement Scale were administered to a sample (N = 251 of South African employees in various industries within the Gauteng region. Main findings: Results indicated that there is a moderate-to-strong positive relationship between the three constructs, and that rewards are able to predict trust and engagement. Practical and managerial implications: The findings provide insight for behavioural practitioners to potentially draw upon when improving talent management strategies. Both extrinsic and intrinsic rewards are important factors in keeping employees engaged and ultimately retaining them. Contribution: The study provided insight into the influence that organisational rewards may have on workplace trust, work engagement and retaining employees

  7. THE LEVEL OF THE CULTURE OF TRUST BY THE EXAMPLE OF TAMBOV

    Directory of Open Access Journals (Sweden)

    Irina Nikolaevna Shorina

    2013-09-01

    Full Text Available The objective. The analysis of the social survey results which reveal the level the culture of trust amongTambov citizens.Methodology. Questionnaire.Results. As the result of the study the conclusion about: the level of institutional trust, the ratio of institutional and interpersonal trust, factors which determine the level of the culture of trust - is made. For the majority of the respondents trust is associated with the expectation of favourable behaviour in which there is a time factor. The analysis of social processes, which are taking place inRussia, shows that the state only creates the illusion of a dialogue and trust connection between the state and society, whereas, in fact, the opposite is true.The area of application of the results. The results can be used for public management adjustment, for studying of the social institutions functioning, for the mechanisms of cooperation and dialogue between citizens and public institutions.DOI: http://dx.doi.org/10.12731/2218-7405-2013-8-19

  8. Perceived competence and warmth influence respect, liking and trust in work relations

    Directory of Open Access Journals (Sweden)

    Oleszkiewicz Anna

    2016-12-01

    Full Text Available Many studies confirmed the positive effect of trust on human relations and performance in organizations. As a social judgment, trust should be related to perceived competence and warmth as two basic dimensions of person perception. Surprisingly, to date no attempts have been made to examine the influence of attributed competence and warmth on social judgments in interpersonal relations at work. To this end, we examine the influence of perceived competence and warmth on trust, liking and respect in upward and downward work relations. A study involving 190 middle-stage managers revealed that the two fundamental dimensions of social cognition (competence and warmth influence respect, liking and trust. Competence had a stronger effect on respect than warmth; the opposite was true for liking. Trust was conditioned by both competence and warmth to an equal, high extent. At the same time, warmth expressed by supervisors led to higher results in liking, respect and trust in them than warmth expressed by subordinates.

  9. How Trust in Financial Supplier Information Impacts Young Adults' Financial Information Involvement

    DEFF Research Database (Denmark)

    Hansen, Torben

    2017-01-01

    Although consumers' risk-taking, supplier trust, social norms and information involvement are central to much of thought in the financial market and consumer economic literature, it is not known how the interplay between consumers' trust in supplier information, risk-taking behaviour and social n...... managers should especially consider investing additional resources in developing information trust for high-risk savings products and should also take social norms into account when considering young adults' high-risk-taking behaviour.......Although consumers' risk-taking, supplier trust, social norms and information involvement are central to much of thought in the financial market and consumer economic literature, it is not known how the interplay between consumers' trust in supplier information, risk-taking behaviour and social...... norm may influence information involvement. This research contributes to the consumer economic literature by investigating how product savings risk and social norm affect the relationship between young adults' trust in supplier information and their information involvement. On the basis of two samples...

  10. Adapting Autonomous Behavior Using an Inverse Trust Estimation

    Science.gov (United States)

    2014-07-01

    be undertrusting the agent so trust should be increased. It does not take into ac- count situations where overtrust may be occurring. To account for...Bisantz, A.M., Drury , C.G.: Foundations for an empirically determined scale of trust in automated systems. International Journal of Cognitive

  11. An examination of trust as a strategical factor of success in logistical firms

    Directory of Open Access Journals (Sweden)

    Judit Oláh

    2017-08-01

    Full Text Available The aim of this research is to examine the effect of the role and level of in-sector trust (involving clients, subcontractors, and other logistics providers and trust within firms in creating competitiveness in logistics service providers. The data were collected from 51 logistics service providers in Hungary. During our research we established that trust related to staff is decisive in the direction of the firm’s profitability, and the trust communicated by the top manager (trust in partners is essential in ensuring smooth operations and long term, stable flexible cooperation. The results of this paper effectively support logistics service providers in finding economic success factors, thanks to which they can completely satisfy the expectations of customers in the supply chain.

  12. Toward designing for trust in database automation

    Energy Technology Data Exchange (ETDEWEB)

    Duez, P. P.; Jamieson, G. A. [Cognitive Engineering Laboratory, Univ. of Toronto, 5 King' s College Rd., Toronto, Ont. M5S 3G8 (Canada)

    2006-07-01

    Appropriate reliance on system automation is imperative for safe and productive work, especially in safety-critical systems. It is unsafe to rely on automation beyond its designed use; conversely, it can be both unproductive and unsafe to manually perform tasks that are better relegated to automated tools. Operator trust in automated tools mediates reliance, and trust appears to affect how operators use technology. As automated agents become more complex, the question of trust in automation is increasingly important. In order to achieve proper use of automation, we must engender an appropriate degree of trust that is sensitive to changes in operating functions and context. In this paper, we present research concerning trust in automation in the domain of automated tools for relational databases. Lee and See have provided models of trust in automation. One model developed by Lee and See identifies three key categories of information about the automation that lie along a continuum of attributional abstraction. Purpose-, process-and performance-related information serve, both individually and through inferences between them, to describe automation in such a way as to engender r properly-calibrated trust. Thus, one can look at information from different levels of attributional abstraction as a general requirements analysis for information key to appropriate trust in automation. The model of information necessary to engender appropriate trust in automation [1] is a general one. Although it describes categories of information, it does not provide insight on how to determine the specific information elements required for a given automated tool. We have applied the Abstraction Hierarchy (AH) to this problem in the domain of relational databases. The AH serves as a formal description of the automation at several levels of abstraction, ranging from a very abstract purpose-oriented description to a more concrete description of the resources involved in the automated process

  13. Toward designing for trust in database automation

    International Nuclear Information System (INIS)

    Duez, P. P.; Jamieson, G. A.

    2006-01-01

    Appropriate reliance on system automation is imperative for safe and productive work, especially in safety-critical systems. It is unsafe to rely on automation beyond its designed use; conversely, it can be both unproductive and unsafe to manually perform tasks that are better relegated to automated tools. Operator trust in automated tools mediates reliance, and trust appears to affect how operators use technology. As automated agents become more complex, the question of trust in automation is increasingly important. In order to achieve proper use of automation, we must engender an appropriate degree of trust that is sensitive to changes in operating functions and context. In this paper, we present research concerning trust in automation in the domain of automated tools for relational databases. Lee and See have provided models of trust in automation. One model developed by Lee and See identifies three key categories of information about the automation that lie along a continuum of attributional abstraction. Purpose-, process-and performance-related information serve, both individually and through inferences between them, to describe automation in such a way as to engender r properly-calibrated trust. Thus, one can look at information from different levels of attributional abstraction as a general requirements analysis for information key to appropriate trust in automation. The model of information necessary to engender appropriate trust in automation [1] is a general one. Although it describes categories of information, it does not provide insight on how to determine the specific information elements required for a given automated tool. We have applied the Abstraction Hierarchy (AH) to this problem in the domain of relational databases. The AH serves as a formal description of the automation at several levels of abstraction, ranging from a very abstract purpose-oriented description to a more concrete description of the resources involved in the automated process

  14. Trust in vehicle technology

    OpenAIRE

    Walker, Guy, H.; Stanton, Neville, A.; Salmon, Paul

    2016-01-01

    Driver trust has potentially important implications for how vehicle technology is used and interacted with. In this paper it will be seen how driver trust functions and how it can be understood and manipulated by insightful vehicle design. It will review the theoretical literature to define steps that can be taken establish trust in vehicle technology in the first place, maintain trust in the long term, and even re-establish trust that has been lost along the way. The implication throughout i...

  15. TRUST AND DISTRUST: TWO NECESSARY FACTORS FOR THE DEVELOPMENT OF THE SOCIAL TRUST

    Directory of Open Access Journals (Sweden)

    RODRIGO YÁÑEZ GALLARDO

    2006-01-01

    Full Text Available Recent investigations argue that distrust is the absence of trust and it would be assumed that bothattitudes are independent; that would allow to distinguish between the naïve attitude and the wise attitudein the trust. It has been built a scale to measure the disposition to trust and the relationship has beenexamined among naïve and wise attitude when trusting. The sample was constituted by 575 universitystudents of both sexes, of four faculties and of different years of study. Through a factorial analysis itwas found that trust and distrust correspond to different factors. It was discussed the importance ofincrease an optimal trust in order to develop social abilities and to stimulate the social participation. Itwas questioned the validity of traditional surveys that measure the social trust.

  16. The Trust Project - Symbiotic Human Machine Teams: Social Cueing for Trust and Reliance

    Science.gov (United States)

    2016-06-30

    AFRL-RH-WP-TR-2016-0096 THE TRUST PROJECT - SYMBIOTIC HUMAN-MACHINE TEAMS: SOCIAL CUEING FOR TRUST & RELIANCE Susan Rivers, Monika Lohani, Marissa...30 JUN 2012 – 30 JUN 2016 4. TITLE AND SUBTITLE THE TRUST PROJECT - SYMBIOTIC HUMAN-MACHINE TEAMS: SOCIAL CUEING FOR TRUST & RELIANCE 5a. CONTRACT

  17. From Subjective Trust to Objective Trustworthiness in On-line Social Networks: Overview and Challenges

    Directory of Open Access Journals (Sweden)

    David Zejda

    2010-04-01

    Full Text Available Nowadays dozens of people share their content in the current Web 2.0 space, talk with friends in social networking sites such as Facebook and live on the Net in many other ways. They do all this quite naturally, forgetting the healthy cautiousness sometimes. In real life we rely on trusted people. Do we know how to reflect real-world trust mechanisms into on-line social software? In the article we focused to bring overview on state of the art in main ideas behind a trust processing in online social networking systems. What are common sources of subjective trust, how the trust emerges and what are the sources of trust dynamics? How can be trust captured into the systems, how can be explicit trust processed to infer indirect trust, the trust between users who do not know each other? And what are the ways to infer objective metrics of trust, the reputation or trustworthiness? Finally, we point out selected challenges related to the trust in current highly dynamic social networks.

  18. Trustful societies, trustful individuals, and health: An analysis of self-rated health and social trust using the World Value Survey.

    Science.gov (United States)

    Jen, Min Hua; Sund, Erik R; Johnston, Ron; Jones, Kelvyn

    2010-09-01

    This study analyses the relationships between self-rated health and both individual and mean national social trust, focusing on a variant of Wilkinson's hypothesis that individuals will be less healthy the greater the lack of social cohesion in a country. It employs multilevel modelling on World Values Survey data across 69 countries with a total sample of 160,436 individuals. The results show that self-rated health are positively linked to social trust at both country and individual levels after controlling for individual socio-demographic and income variables plus individual social trust; increased trust is associated with better health. Moreover, this analysis of social trust gives some insight into distinctive results for the former Soviet Bloc countries, which have high reported levels of poor health, alongside the Scandinavian countries which have high levels of trust and better health situations. Our results support and extend the Wilkinson hypothesis that the level of trust, an indicator of social cohesion, is predictive of individuals' health. Copyright 2010 Elsevier Ltd. All rights reserved.

  19. Influencing Trust for Human-Automation Collaborative Scheduling of Multiple Unmanned Vehicles.

    Science.gov (United States)

    Clare, Andrew S; Cummings, Mary L; Repenning, Nelson P

    2015-11-01

    We examined the impact of priming on operator trust and system performance when supervising a decentralized network of heterogeneous unmanned vehicles (UVs). Advances in autonomy have enabled a future vision of single-operator control of multiple heterogeneous UVs. Real-time scheduling for multiple UVs in uncertain environments requires the computational ability of optimization algorithms combined with the judgment and adaptability of human supervisors. Because of system and environmental uncertainty, appropriate operator trust will be instrumental to maintain high system performance and prevent cognitive overload. Three groups of operators experienced different levels of trust priming prior to conducting simulated missions in an existing, multiple-UV simulation environment. Participants who play computer and video games frequently were found to have a higher propensity to overtrust automation. By priming gamers to lower their initial trust to a more appropriate level, system performance was improved by 10% as compared to gamers who were primed to have higher trust in the automation. Priming was successful at adjusting the operator's initial and dynamic trust in the automated scheduling algorithm, which had a substantial impact on system performance. These results have important implications for personnel selection and training for futuristic multi-UV systems under human supervision. Although gamers may bring valuable skills, they may also be potentially prone to automation bias. Priming during training and regular priming throughout missions may be one potential method for overcoming this propensity to overtrust automation. © 2015, Human Factors and Ergonomics Society.

  20. Perceptions of work-time and leisure-time among managers and field staff in a UK primary health care trust.

    Science.gov (United States)

    Brown, Reva Berman; Adebayo, Shirley A

    2004-09-01

    The aims of the research were to explore the issues around the perception of District Nurses in an inner London Primary Health Care Trust of their use of work-time and leisure-time, and to reveal how the boundaries between these two aspects can become blurred and impinge on each other. Time use is helpful in considerations of wider issues such as satisfaction at work and work-life balance. The data were collected by a questionnaire to seek the views of managers and field staff on issues such as the impact on the quality of patient care of the nurses' perception of work-time and leisure-time. The research identified the different perception of "work-time" that employees have in relation to their place within the hierarchical structure. The findings answered the question of whether time is perceived differently, dependent on one's occupation within the Trust.

  1. Trust in Strategic Alliances

    DEFF Research Database (Denmark)

    Nielsen, Bo

    2011-01-01

    This article examines the dynamic and multi-dimensional nature of trust in strategic alliances. Adopting a co-evolutionary approach, I developed a framework to show how trust, conceptualised in different forms, plays distinct roles at various evolutionary stages of the alliance relationship....... Emphasising the multi-dimensional and dynamic role of trust, the framework illustrates how initial levels of a particular type of trust may co-evolve with the alliance and influence subsequent phases of the relationship – either on its own or in combination with other types or dimensions of trust....... The theoretical distinction between trust as antecedent, moderator and outcome during the evolution of the alliance relationship leads to research questions that may guide future empirical research....

  2. Trust-Building in Electronic Markets: Relative Importance and Interaction Effects of Trust-Building Mechanisms

    Science.gov (United States)

    Tams, Stefan

    We examine the relative and complementary effectiveness of trust-building strategies in online environments. While prior research has examined various antecedents to trust, we investigated two trust-building mechanisms more in depth: Web site trust and vendor reputation. We tried to understand the relative effectiveness of these two important mechanisms to provide online businesses with a clear recommendation of how to establish trust in an effective and efficient manner. Drawing from the literature on trust, we proposed vendor reputation to be more effective than Web site trust. Moreover, we examined a potential complementary effect of these mechanisms so as to provide online businesses with a deeper understanding of how to derive superior trust. We hypothesize a small such effect. The study proposes a laboratory experiment to test the model.

  3. 77 FR 16282 - Columbia Funds Master Investment Trust, LLC, et al.; Notice of Application

    Science.gov (United States)

    2012-03-20

    ... liability companies or Massachusetts business trusts, and are registered with the Commission as open-end... Trusts, each of which operates as a ``fund of funds.'' Columbia Management, a Minnesota limited liability... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 29980; File No. 812-13955...

  4. Brand trust and image: effects on customer satisfaction.

    Science.gov (United States)

    Khodadad Hosseini, Sayed Hamid; Behboudi, Leila

    2017-08-14

    Purpose The purpose of this paper is to investigate brand trust and brand image effects on healthcare service users. Nowadays, managers and health activists are showing increased tendency to marketing and branding to attract and satisfy customers. Design/methodology/approach The current study's design is based on a conceptual model examining brand trust and brand image effects on customer satisfaction. Data obtained from 240 questionnaires (310 respondents) were analyzed using path analysis. Findings Results revealed that the most effective items bearing the highest influence on customer satisfaction and on benefiting from healthcare services include brand image, staff sincerity to its patients, interactions with physicians and rapport. Research limitations/implications This study needs to be conducted in different hospitals and with different patients, which would lead to the model's expansion and its influence on the patient satisfaction. Originality/value Being the first study that simultaneously addresses brand trust and brand image effects on customer satisfaction, this research provides in-depth insights into healthcare marketing. Moreover, identifying significant components associated with healthcare branding helps managers and healthcare activists to create and protect their brands and, consequently, leading to an increased profitability resulting from the enhanced consumer satisfaction. Additionally, it would probably facilitate purchasing processes during the service selection.

  5. Social Trust and Fractionalization:

    DEFF Research Database (Denmark)

    Bjørnskov, Christian

    2008-01-01

    This paper takes a closer look at the importance of fractionalization for the creation of social trust. It first argues that the determinants of trust can be divided into two categories: those affecting individuals' trust radii and those affecting social polarization. A series of estimates using...... a much larger country sample than in previous literature confirms that fractionalization in the form of income inequality and political diversity adversely affects social trust while ethnic diversity does not. However, these effects differ systematically across countries, questioning standard...... interpretations of the influence of fractionalization on trust....

  6. Trust Discovery in Online Communities

    Science.gov (United States)

    Piorkowski, John

    2014-01-01

    This research aims to discover interpersonal trust in online communities. Two novel trust models are built to explain interpersonal trust in online communities drawing theories and models from multiple relevant areas, including organizational trust models, trust in virtual settings, speech act theory, identity theory, and common bond theory. In…

  7. Case-Based Behavior Adaptation Using an Inverse Trust Metric

    Science.gov (United States)

    2014-06-01

    Jian, Bisantz, and Drury 2000; Muir 1987), about how trust- worthy the robot was behaving. However, this might not be practical in situations that are...5). Carlson, M. S.; Desai, M.; Drury , J. L.; Kwak, H.; and Yanco, H. A. 2014. Identifying factors that influence trust in automated cars and medical...and Drury , C. G. 2000. Foundations for an empirically determined scale of trust in automated systems. International Journal of Cogni- tive Ergonomics

  8. Budget management in the system of solving ecological contradictions of development of the national economy: territorial approach

    Directory of Open Access Journals (Sweden)

    Petrushenko Mykola M.

    2013-03-01

    Full Text Available The article analyses organisational and economic factors and forms a theoretical and methodical approach to budget management in the system of solving ecological contradictions of development of territorial systems of the national economy. The article justifies improvement of processes of managing budgets, directed at overcoming ecological contradictions, on the basis of conceptual provisions of the budgeting oriented at the result. It develops a scheme-model of the organisational and structural solution of ecological contradictions, with reinforcement of the integration role of the budgeting method, in the system of managing an administrative and territorial unit using example of the Sumy oblast. The offered theoretical and methodical approach to improvement of the budget management in the territorial and economic system allows development of principles of the on trust management in the field of ecological and economic relations and also activation of practical introduction of managerial instruments of consensual solution of ecologically caused conflict situations with application of specialised management-consulting activity.

  9. Autonomous emergency braking systems adapted to snowy road conditions improve drivers' perceived safety and trust.

    Science.gov (United States)

    Koglbauer, Ioana; Holzinger, Jürgen; Eichberger, Arno; Lex, Cornelia

    2018-04-03

    This study investigated drivers' evaluation of a conventional autonomous emergency braking (AEB) system on high and reduced tire-road friction and compared these results to those of an AEB system adaptive to the reduced tire-road friction by earlier braking. Current automated systems such as the AEB do not adapt the vehicle control strategy to the road friction; for example, on snowy roads. Because winter precipitation is associated with a 19% increase in traffic crashes and a 13% increase in injuries compared to dry conditions, the potential of conventional AEB to prevent collisions could be significantly improved by including friction in the control algorithm. Whereas adaption is not legally required for a conventional AEB system, higher automated functions will have to adapt to the current tire-road friction because human drivers will not be required to monitor the driving environment at all times. For automated driving functions to be used, high levels of perceived safety and trust of occupants have to be reached with new systems. The application case of an AEB is used to investigate drivers' evaluation depending on the road condition in order to gain knowledge for the design of future driving functions. In a driving simulator, the conventional, nonadaptive AEB was evaluated on dry roads with high friction (μ = 1) and on snowy roads with reduced friction (μ = 0.3). In addition, an AEB system adapted to road friction was designed for this study and compared with the conventional AEB on snowy roads with reduced friction. Ninety-six drivers (48 males, 48 females) assigned to 5 age groups (20-29, 30-39, 40-49, 50-59, and 60-75 years) drove with AEB in the simulator. The drivers observed and evaluated the AEB's braking actions in response to an imminent rear-end collision at an intersection. The results show that drivers' safety and trust in the conventional AEB were significantly lower on snowy roads, and the nonadaptive autonomous braking strategy was

  10. 77 FR 67827 - Meeting of the Secretarial Commission on Indian Trust Administration and Reform

    Science.gov (United States)

    2012-11-14

    ... Indian Trust Administration and Reform (the Commission) will hold a public meeting on December 6 and 7, 2012. During the public meeting, the Commission will hear from invited speakers about: management and... Trust Administration and Reform AGENCY: Office of the Secretary, Interior. ACTION: Notice of meeting...

  11. The influences of patient's satisfaction with medical service delivery, assessment of medical service, and trust in health delivery system on patient's life satisfaction in China.

    Science.gov (United States)

    Tang, Liyang

    2012-09-14

    Patient's satisfaction with medical service delivery/assessment of medical service/trust in health delivery system may have significant influence on patient's life satisfaction in China's health delivery system/in various kinds of hospitals.The aim of this study was to test whether and to what extent patient's satisfaction with medical service delivery/patient's assessments of various major aspects of medical service/various major aspects of patient's trust in health delivery system influenced patient's life satisfaction in China's health delivery system/in various kinds of hospitals. This study collaborated with National Bureau of Statistics of China to carry out a 2008 national urban resident household survey in 17 provinces, autonomous regions, and municipalities directly under the central government (N = 3,386), and specified ordered probit models were established to analyze dataset from this household survey. The key considerations in generating patient's life satisfaction involved patient's overall satisfaction with medical service delivery, assessment of doctor-patient communication, assessment of medical cost, assessment of medical treatment process, assessment of medical facility and hospital environment, assessment of waiting time for medical service, trust in prescription, trust in doctor, and trust in recommended medical examination. But the major considerations in generating patient's life satisfaction were different among low level public hospital, high level public hospital, and private hospital. The promotion of patient's overall satisfaction with medical service delivery, the improvement of doctor-patient communication, the reduction of medical cost, the improvement of medical treatment process, the promotion of medical facility and hospital environment, the reduction of waiting time for medical service, the promotion of patient's trust in prescription, the promotion of patient's trust in doctor, and the promotion of patient's trust in

  12. Problems of judiciary trust

    Directory of Open Access Journals (Sweden)

    Vuković Slobodan

    2007-01-01

    Full Text Available Topic of the article is problem of trust in judiciary as a most important part of legal system. For all empirical researches so far have shown very law degree of this trust many authors were searching for the causes of this phenomenon. Among multifold causes some are special worth while to be mentioned here: historical inheritance, political pressures, delaying of judiciary decisions, respect of the laws, transferring of responsibility from political power to the judiciary, public comments of judiciary decisions, media pressures, efficiency of judiciary and police. Among inner factors author pays attention to competency of judges, modes of penal policy, modes of judges’ entitlement, problems of communication, involvement into criminal and corruptional affairs, etc.

  13. How Academic Health Systems Can Achieve Population Health in Vulnerable Populations Through Value-Based Care: The Critical Importance of Establishing Trusted Agency.

    Science.gov (United States)

    Wesson, Donald E; Kitzman, Heather E

    2018-01-16

    Improving population health may require health systems to proactively engage patient populations as partners in the implementation of healthy behaviors as a shared value using strategies that incentivize healthy outcomes for the population as a whole. The current reactive health care model, which focuses on restoring the health of individuals after it has been lost, will not achieve the goal of improved population health. To achieve this goal, health systems must proactively engage in partnerships with the populations they serve. Health systems will need the help of community entities and individuals who have the trust of the population being served to act on behalf of the health system if they are to achieve this effective working partnership. The need for these trusted agents is particularly pertinent for vulnerable and historically underserved segments of the population. In this Invited Commentary, the authors discuss ways by which health systems might identify, engage, and leverage trusted agents to improve the health of the population through value-based care.

  14. Understanding Trust in Financial Services

    DEFF Research Database (Denmark)

    Hansen, Torben

    2012-01-01

    Although the financial crisis has elevated the interest for factors such as consumer financial healthiness, broad-scope trust, financial knowledge, and consumer relationship satisfaction, no existing model describes how these factors may influence consumer financial relationship trust...... healthiness, broad-scope trust, knowledge, and satisfaction positively affect narrow-scope trust in financial services. Furthermore, it is found that broad-scope trust negatively moderates the relationships between financial healthiness and narrow-scope trust and between satisfaction and narrow-scope trust....... This research extends prior research by developing a conceptual framework explaining how these constructs affect consumers' trust in their financial service provider. Based on two surveys comprising 764 pension consumers and 892 mortgage consumers, respectively, the results of this study indicate that financial...

  15. Requirements and Design Guidelines for a Trusted Hypervisor Interface

    Science.gov (United States)

    Weber, Dirk; Weber, Arnd; Presti, Stéphane Lo

    Hypervisor technology in combination with tamper-resistant hardware such as Trusted Platform Modules has the potential of providing a significant new level of security for computers. These new systems will be able to protect legacy applications from applications such as malware, and they will enable the creation of new secure applications. This paper analyses the requirements for the graphical user interface (GUI) of such a system. First, application scenarios are presented to illustrate how extended Trusted Computing (TC) systems might be used in the future. Requirements for a trusted GUI are then derived from the analysis of articles on TC found in the media and from a survey of experts in information technology. These requirements are compared to existing proposals, showing how some of them are either inconvenient or insecure in the hands of end users. Based on this analysis, proposals are derived for the design of a trusted GUI suitable for laypersons and administrators, which uses familiar patterns, and yet protects against visual mimicry attacks. These proposals pave the way for hypervisors’ security-enhanced GUI.

  16. The Condition for Generous Trust.

    Directory of Open Access Journals (Sweden)

    Obayashi Shinya

    Full Text Available Trust has been considered the "cement" of a society and is much studied in sociology and other social sciences. Most studies, however, have neglected one important aspect of trust: it involves an act of forgiving and showing tolerance toward another's failure. In this study, we refer to this concept as "generous trust" and examine the conditions under which generous trust becomes a more viable option when compared to other types of trust. We investigate two settings. First, we introduce two types of uncertainties: uncertainty as to whether trustees have the intention to cooperate, and uncertainty as to whether trustees have enough competence to accomplish the entrusted tasks. Second, we examine the manner in which trust functions in a broader social context, one that involves matching and commitment processes. Since we expect generosity or forgiveness to work differently in the matching and commitment processes, we must differentiate trust strategies into generous trust in the matching process and that in the commitment process. Our analytical strategy is two-fold. First, we analyze the "modified" trust game that incorporates the two types of uncertainties without the matching process. This simplified setting enables us to derive mathematical results using game theory, thereby giving basic insight into the trust mechanism. Second, we investigate socially embedded trust relationships in contexts involving the matching and commitment processes, using agent-based simulation. Results show that uncertainty about partner's intention and competence makes generous trust a viable option. In contrast, too much uncertainty undermines the possibility of generous trust. Furthermore, a strategy that is too generous cannot stand alone. Generosity should be accompanied with moderate punishment. As for socially embedded trust relationships, generosity functions differently in the matching process versus the commitment process. Indeed, these two types of generous

  17. Trust in Management under Post-bureaucratic Conditions: The Case of Finnish Civil Servants

    Directory of Open Access Journals (Sweden)

    Jaakko Koivumäki

    2013-12-01

    Full Text Available The Finnish state administration has recently undergone a wave of reforms towards decentralized decision-making and increased flexibility in organizing work. Traditional bureaucracy, however, has its virtues. Based on a survey and qualitative interview material, the results presented in this paper indicate that many characteristics of bureaucracy, such as well-defined work roles and hierarchical control, facilitate trust among employees. In contrast, the current post-bureaucratic model of organizing work may increase insecurity and decrease trust.

  18. Social Trust and Value Similarity: the Relationship between Social Trust and Human Values in Europe

    Directory of Open Access Journals (Sweden)

    Mai Beilmann

    2015-12-01

    Full Text Available The purpose of the current paper is to test whether value similarity may foster social trust in society and whether people have higher levels of social trust when they emphasise the same values that prevail in their country. The relationship between social trust and human values was examined in a sample of 51,308 people across 29 European countries using data from the European Social Survey round 6. Results suggest that value similarity is more important in generating individual level social trust in countries where the overall levels of social trust are higher. There is a stronger positive relationship between value similarity and social trust in Scandinavian countries, which have high social trust levels, while in countries with a low level of social trust, congruity of the personal value structure with the country level value structure tends to decrease the individuals trustfulness

  19. The influence of ethical leadership on trust and work engagement: An exploratory study

    Directory of Open Access Journals (Sweden)

    Amos S. Engelbrecht

    2014-11-01

    Motivation for the study: The study on the role of ethical leadership practices on employee engagement was motivated by the need to create an engaged workforce and a trusting work environment. Research approach, design and method: Data was collected using an electronic web-based questionnaire comprising three scales, namely the Utrecht Work Engagement Scale (UWES,Leader Trust Scale (LTS and the Leadership of Ethics Scale (LES. In total, 204 completed questionnaires were returned. Data was analysed by means of item and confirmatory factor analysis conducted via structural equation modelling (SEM. Main findings: High levels of reliability were found for all the measurement scales used. The results from the structural equation modelling (SEM indicated positive relationships between trust in the leader and work engagement, between ethical leadership and work engagement and between ethical leadership and trust in the leader. Practical/managerial implications: The findings emphasise the role played by ethical leadership behaviour of managers in promoting work engagement through the creation of employee relationships anchored on trust. Future studies should develop the theoretical model further by identifying other variables that influence work engagement. Contribution/value-add: Organisations today still face the challenge of developing an effective strategy for achieving work engagement. The ethical leadership style of managers is likely to create an ethical and trusting work climate conducive to the work engagement of employees.This is likely to enhance productivity as well as employee creativity and innovation.

  20. TB-CA: A hybrid method based on trust and context-aware for recommender system in social networks

    Directory of Open Access Journals (Sweden)

    Fateme Keikha

    2015-05-01

    Full Text Available Recommender systems help users faced with the problem of information overflow and provide personalized recommendations. Social networks are used for providing variety of business or social activities, or sometimes a combination of both. In this paper, by considering social network of users and according to users’ context and items, a new method is introduced that is based on trust and context aware for recommender systems in social networks. The purpose of this paper is to create a recommender system which increases precision of predicted ratings for all users especially for cold start users. In the proposed method, walking on web of trust is done by neighbor users for finding rating of similar items and users’ preference is gotten of items’ context. The results show that suitable recommendation with user’s context is provided by using this method. Also, this system can increase precision of predicted rating for all users and cold starts too and however, do not decrease the rating’s coverage.