WorldWideScience

Sample records for trust management system

  1. Building trusted national identity management systems: Presenting the privacy concern-trust (PCT) model

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    systems. We adopted a qualitative research approach in our analysis of data that was gathered through a series of interviews and a stakeholder workshop in Ghana. Our findings indicate that, beyond the threshold level of trust, societal information privacy concern is low; hence, trust is high, thereby......This paper discusses the effect of trust and information privacy concerns on citizens’ attitude towards national identity management systems. We introduce the privacyconcerns- trust model, which shows the role of trust in mediating and moderating citizens’ attitude towards identity management...... encouraging further institutional collaboration and acceptance of citizens’ informational self-determination....

  2. DualTrust: A Trust Management Model for Swarm-Based Autonomic Computing Systems

    Energy Technology Data Exchange (ETDEWEB)

    Maiden, Wendy M. [Washington State Univ., Pullman, WA (United States)

    2010-05-01

    Trust management techniques must be adapted to the unique needs of the application architectures and problem domains to which they are applied. For autonomic computing systems that utilize mobile agents and ant colony algorithms for their sensor layer, certain characteristics of the mobile agent ant swarm -- their lightweight, ephemeral nature and indirect communication -- make this adaptation especially challenging. This thesis looks at the trust issues and opportunities in swarm-based autonomic computing systems and finds that by monitoring the trustworthiness of the autonomic managers rather than the swarming sensors, the trust management problem becomes much more scalable and still serves to protect the swarm. After analyzing the applicability of trust management research as it has been applied to architectures with similar characteristics, this thesis specifies the required characteristics for trust management mechanisms used to monitor the trustworthiness of entities in a swarm-based autonomic computing system and describes a trust model that meets these requirements.

  3. Research on Trust Propagation Models in Reputation Management Systems

    Directory of Open Access Journals (Sweden)

    Zhiyuan Su

    2014-01-01

    Full Text Available Feedback based reputation systems continue to gain popularity in eCommerce and social media systems today and reputation management in large social networks needs to manage cold start and sparseness in terms of feedback. Trust propagation has been widely recognized as an effective mechanism to handle these problems. In this paper we study the characterization of trust propagation models in the context of attack resilience. We characterize trust propagation models along three dimensions: (i uniform propagation and conditional propagation, (ii jump strategies for breaking unwanted cliques, and (iii decay factors for differentiating recent trust history from remote past history. We formally and experimentally show that feedback similarity is a critical measure for countering colluding attacks in reputation systems. Without feedback similarity guided control, trust propagations are vulnerable to different types of colluding attacks.

  4. Trust Management V

    DEFF Research Database (Denmark)

    2011-01-01

    from 42 submissions. The papers feature both theoretical research and real-world case studies from academia, business and government focusing on areas such as: trust models, social and behavioral aspects of trust, trust in networks, mobile systems and cloud computation, privacy, reputation systems......, and identity management....

  5. FUZZY BASED TRUST MANAGEMENT SYSTEM FOR CLOUD ENVIRONMENT

    Directory of Open Access Journals (Sweden)

    Sunil Kumar

    2016-06-01

    Full Text Available Cloud computing is a business model with high degree of flexibility, scalability in providing infrastructure, platform and software as a service over the internet. Cloud promises for easiness and reduced expense to service providers and consumers. However, a lack of trust between these two stakeholders has hindered the universal acceptance of cloud for outsourced services. In this paper, a fuzzy based trust management system is proposed to facilitate cloud consumers in identifying trustworthy providers. The performance of proposed system is validated through a simulation using CloudAnalyst and Simulink.

  6. Trust on the Ratee: A Trust Management System for Social Internet of Vehicles

    Directory of Open Access Journals (Sweden)

    Fangyu Gai

    2017-01-01

    Full Text Available The integration of social networking concepts with Internet of Vehicles (IoV has led to the novel paradigm “Social Internet of Vehicles (SIoV,” which enables vehicles to establish social relationships autonomously to improve traffic conditions and service discovery. There is a growing requirement for effective trust management in the SIoV, considering the critical consequences of acting on misleading information spread by malicious nodes. However, most existing trust models are rater-based, where the reputation information of each node is stored in other nodes it has interacted with. This is not suitable for vehicular environment due to the ephemeral nature of the network. To fill this gap, we propose a Ratee-based Trust Management (RTM system, where each node stores its own reputation information rated by others during past transactions, and a credible CA server is introduced to ensure the integrality and the undeniability of the trust information. RTM is built based on the concept of SIoV, so that the relationships established between nodes can be used to increase the accuracy of the trustworthiness. Experimental results demonstrate that our scheme achieves faster information propagation and higher transaction success rate than the rater-based method, and the time cost when calculating trustworthiness can meet the demand of vehicular networks.

  7. Trust on the Ratee: A Trust Management System for Social Internet of Vehicles

    OpenAIRE

    Fangyu Gai; Jiexin Zhang; Peidong Zhu; Xinwen Jiang

    2017-01-01

    The integration of social networking concepts with Internet of Vehicles (IoV) has led to the novel paradigm “Social Internet of Vehicles (SIoV),” which enables vehicles to establish social relationships autonomously to improve traffic conditions and service discovery. There is a growing requirement for effective trust management in the SIoV, considering the critical consequences of acting on misleading information spread by malicious nodes. However, most existing trust models are rater-based,...

  8. Trust Management: Literature Review

    Directory of Open Access Journals (Sweden)

    Joanna Olga Paliszkiewicz

    2011-12-01

    Full Text Available The concept of trust has become popular in public debate andacademic analysis. In high income countries this interest is associatedwith concern for the decline of trust in governments andprofessionals, and in developing countries has been promptedby debates around the motion of social capital. Trust has beenidentified as a major factor influencing such things as capital investment,relationship marketing, cross-cultural communication,learning and various types of cooperation. Trust management isbecoming also very important inside the organization. The studywill review empirical research on organizational trust. The purposeof the study will be also evaluation of the advancements andsetbacks in current empirical research in terms of managementorganizational trust. This paper will analyze the theoretical approach,the conceptualization and the measurement issues coveredin studies on management organizational trust. Althoughtrust has emerged as an important factor in organizational relationships,there are still major conceptual and methodologicalchallenges to be met when studying this complex concept.

  9. Academic Panel: Can Self-Managed Systems be trusted?

    NARCIS (Netherlands)

    de Lemos, Rogerio; McCann, Julie A.; Rana, Omar F.; Wombacher, Andreas

    Trust can be defined as to have confidence or faith in; a form of reliance or certainty based on past experience; to allow without fear; believe; hope: expect and wish; and extend credit to. The issue of trust in computing has always been a hot topic, especially notable with the proliferation of

  10. Trust management in cloud services

    CERN Document Server

    Noor, Talal H; Bouguettaya, Athman

    2014-01-01

    This book describes the design and implementation of Cloud Armor, a novel approach for credibility-based trust management and automatic discovery of cloud services in distributed and highly dynamic environments. This book also helps cloud users to understand the difficulties of establishing trust in cloud computing and the best criteria for selecting a service cloud. The techniques have been validated by a prototype system implementation and experimental studies using a collection of real world trust feedbacks on cloud services.The authors present the design and implementation of a novel pro

  11. Trust Management in P2P systems using Standard TuLiP

    NARCIS (Netherlands)

    Czenko, M.R.; Doumen, J.M.; Etalle, Sandro

    2008-01-01

    In this paper we introduce Standard TuLiP - a new logic based Trust Management system. In Standard TuLiP, security decisions are based on security credentials, which can be issued by different entities and stored at different locations. Standard TuLiP directly supports the distributed credential

  12. Trust Management in P2P Systems Using Standard TuLiP

    NARCIS (Netherlands)

    Czenko, M.R.; Doumen, J.M.; Etalle, Sandro

    2008-01-01

    In this paper we introduce Standard TuLiP - a new logic based Trust Management system. In Standard TuLiP, security decisions are based on security credentials, which can be issued by different entities and stored at different locations. Standard TuLiP directly supports the distributed credential

  13. Trust Management in P2P systems using Standard TuLiP

    OpenAIRE

    Czenko, M.R.; Doumen, J.M.; Etalle, Sandro

    2008-01-01

    In this paper we introduce Standard TuLiP - a new logic based Trust Management system. In Standard TuLiP, security decisions are based on security credentials, which can be issued by different entities and stored at different locations. Standard TuLiP directly supports the distributed credential storage by providing a sound and complete Lookup and Inference AlgoRithm (LIAR). In this paper we focus on (a) the language of Standard TuLiP and (b) on the practical considerations which arise when d...

  14. Enhancing role-based trust management with a reputation system for MANETs

    Directory of Open Access Journals (Sweden)

    Akbani Rehan

    2011-01-01

    Full Text Available Abstract We start with role-based trust management (RBTM and address some of the challenges associated with using RBTM in mobile ad hoc networks (MANETs. We then enhance RBTM with reputation systems (RSs, and propose a new hybrid trust management system (HTMS. In HTMS, the privilege level of an entity is determined not only by its role in the system, but also by its reputation score, which in turn is based on its behavior. If a privileged node becomes compromised and conducts several malicious or risky transactions, then its privilege level is quickly reduced to limit its access to resources and minimize the damage it can inflict further. The system uses a global, network-wide perspective to thwart global attacks. Such fine-grained variations of access control and dynamically assigning privilege levels would be very difficult to accomplish manually. We evaluated HTMS by comparing an implementation of it against an ideal response. We show that HTMS performs very close to the ideal if we can accurately estimate the proportion of malicious nodes in the network. We suggest using sampling to estimate this proportion. However, even if this estimate is not accurate, the results are still much better than using RBTM by itself. EDICS: SYS-ARCH; SYS-PROT; FOR-DETE; SYS-INTR.

  15. Maintaining control while delegating trust: Integrity constraints in trust management

    NARCIS (Netherlands)

    Etalle, Sandro; Winsborough, William H.

    2009-01-01

    We introduce the use, monitoring, and enforcement of integrity constraints in trust management-style authorization systems. We consider what portions of the policy state must be monitored to detect violations of integrity constraints. Then, we address the fact that not all participants in a

  16. Integrity Constraints in Trust Management

    NARCIS (Netherlands)

    Etalle, Sandro; Winsborough, William H.

    We introduce the use, monitoring, and enforcement of integrity constraints in trust managementstyle authorization systems. We consider what portions of the policy state must be monitored to detect violations of integrity constraints. Then we address the fact that not all participants in a trust

  17. HonestPeer: An enhanced EigenTrust algorithm for reputation management in P2P systems

    Directory of Open Access Journals (Sweden)

    Heba A. Kurdi

    2015-07-01

    Full Text Available The visible success of the Peer to Peer (P2P paradigm is associated with many challenges in finding trustworthy peers as reliable communication partners. Reputation management systems are emerging in the face of these challenges. The EigenTrust reputation management system is among the most known and successful reputation systems. On the other hand, a main drawback of this system is its reliance on a set of pre-trusted peers which causes nodes to center around them. As a consequence, other peers are ranked low despite being honest, marginalizing their effect in the system. To tackle this problem, this paper proposed enhancing the EigenTrust algorithm by giving peers with high reputation values (honest peers a role in calculating the global reputation of other peers. Rather than solely depending on the static group of pre-trusted peers, the proposed algorithm, HonestPeer, selects the most reputable nodes, honest peers, dynamically based on the quality of the provided files. This makes HonestPeer more robust to the increase in the number of files and nodes in the system. Through simulation, it has been shown that HonestPeer has successfully maintained higher success rate and lower percentage of inauthentic downloads when compared to the original algorithm.

  18. TRUST MODEL FOR INFORMATION SECURITY OF MULTI-AGENT ROBOTIC SYSTEMS WITH A DECENTRALIZED MANAGEMENT

    Directory of Open Access Journals (Sweden)

    I. A. Zikratov

    2014-03-01

    Full Text Available The paper deals with the issues on protection of multi-agent robotic systems against attacks by robots-saboteurs. The operation analysis of such systems with decentralized control is carried out. Concept of harmful information impact (attack from a robot-saboteur to the multi-agent robotic system is given. The class of attacks is considered using interception of messages, formation and transfer of misinformation to group of robots, and also carrying out other actions with vulnerabilities of multiagent algorithms without obviously identified signs of invasion of robots-saboteurs. The model of information security is developed, in which robots-agents work out trust levels to each other analyzing the events occurring in the system. The idea of trust model consists in the analysis of transferred information by each robot and the executed actions of other members in a group, comparison of chosen decision on iteration step k with objective function of the group. Distinctive feature of the trust model in comparison with the closest analogue - Buddy Security Model in which the exchange between the agents security tokens is done — is involvement of the time factor during which agents have to "prove" by their actions the usefulness in achievement of a common goal to members of the group. Variants of this model realization and ways of an assessment of trust levels for agents in view of the security policy accepted in the group are proposed.

  19. A Formal Model for Trust Lifecycle Management

    DEFF Research Database (Denmark)

    Wagealla, Waleed; Carbone, Marco; English, Colin

    2003-01-01

    We propose a formal model of trust informed by the Global Computing scenario and focusing on the aspects of trust formation, evolution, and propagation. The model is based on a novel notion of trust structures which, building on concepts from trust management and domain theory, feature at the sam...

  20. A flexible architecture for privacy-aware trust management

    NARCIS (Netherlands)

    Böhm, Klemens; Etalle, Sandro; den Hartog, Jeremy; Hütter, Christian; Trabelsi, Slim; Trivellato, Daniel; Zannone, Nicola

    In service-oriented systems a constellation of services cooperate, sharing potentially sensitive information and responsibilities. Cooperation is only possible if the different participants trust each other. As trust may depend on many different factors, in a flexible framework for Trust Management

  1. Banking system trust, bank trust, and bank loyalty

    NARCIS (Netherlands)

    van Esterik-Plasmeijer, P.; van Raaij, W.F.

    2017-01-01

    Purpose The purpose of this paper is to test a model of banking system trust as an antecedent of bank trust and bank loyalty. Six determinants of trust and loyalty are included: competence, stability, integrity, customer orientation, transparency, and value congruence. The study provides insights

  2. GEM: A distributed goal evaluation algorithm for trust management

    NARCIS (Netherlands)

    Trivellato, Daniel; Zannone, Nicola; Etalle, Sandro

    Trust management is an approach to access control in distributed systems where access decisions are based on policy statements issued by multiple principals and stored in a distributed manner. In trust management, the policy statements of a principal can refer to other principals' statements; thus,

  3. Protecting Mobile Crowd Sensing against Sybil Attacks Using Cloud Based Trust Management System

    Directory of Open Access Journals (Sweden)

    Shih-Hao Chang

    2016-01-01

    Full Text Available Mobile crowd sensing (MCS arises as a new sensing paradigm, which leverages citizens for large-scale sensing by various mobile devices to efficiently collect and share local information. Unlike other MCS application challenges that consider user privacy and data trustworthiness, this study focuses on the network trustworthiness problem, namely, Sybil attacks in MCS network. The Sybil attack in computer security is a type of security attack, which illegally forges multiple identities in peer-to-peer networks, namely, Sybil identities. These Sybil identities will falsify multiple identities that negatively influence the effectiveness of sensing data in this MCS network or degrading entire network performance. To cope with this problem, a cloud based trust management scheme (CbTMS was proposed to detect Sybil attacks in the MCS network. The CbTMS was proffered for performing active and passive checking scheme, in addition to the mobile PCS trustworthiness management, and includes a decision tree algorithm, to verify the covered nodes in the MCS network. Simulation studies show that our CbTMS can efficiently detect the malicious Sybil nodes in the network and cause 6.87 Wh power reduction compared with other malicious Sybil node attack mode.

  4. Decoupling, re-Engaging: managing trust relationships in implementation projects

    DEFF Research Database (Denmark)

    Rose, Jeremy; Schlichter, Bjarne Rerup

    2012-01-01

    An important aspect of the successful implementation of large information systems (such as ERP systems) is trust. These implementations impact the legitimate interests of many groups of stakeholders, and trust is a critical factor for success. Trust in the project is contingent upon many factors......, and the complex demands of managing those fluctuations. We investigate evolving trust relationships in a longitudinal case analysis of a large Integrated Hospital System implementation for the Faroe Islands. Trust relationships suffered various breakdowns, but the project was able to recover and eventually meet...... its goals. Based on concepts from Giddens’ later work on modernity, we develop two approaches for managing dynamic trust relationships in implementation projects: decoupling and re-engaging....

  5. Trust and Online Reputation Systems

    Science.gov (United States)

    Kwan, Ming; Ramachandran, Deepak

    Web 2.0 technologies provide organizations with unprecedented opportunities to expand and solidify relationships with their customers, partners, and employees—while empowering firms to define entirely new business models focused on sharing information in online collaborative environments. Yet, in and of themselves, these technologies cannot ensure productive online interactions. Leading enterprises that are experimenting with social networks and online communities are already discovering this fact and along with it, the importance of establishing trust as the foundation for online collaboration and transactions. Just as today's consumers must feel secure to bank, exchange personal information and purchase products and services online; participants in Web 2.0 initiatives will only accept the higher levels of risk and exposure inherent in e-commerce and Web collaboration in an environment of trust. Indeed, only by attending to the need to cultivate online trust with customers, partners and employees will enterprises ever fully exploit the expanded business potential posed by Web 2.0. But developing online trust is no easy feat. While various preliminary attempts have occurred, no definitive model for establishing or measuring it has yet been established. To that end, nGenera has identified three, distinct dimensions of online trust: reputation (quantitative-based); relationship (qualitative-based) and process (system-based). When considered together, they form a valuable model for understanding online trust and a toolbox for cultivating it to support Web 2.0 initiatives.

  6. TRUST MANAGEMENT MODEL FOR CLOUD COMPUTING ENVIRONMENT

    Directory of Open Access Journals (Sweden)

    Somesh Kumar Prajapati

    2013-04-01

    Full Text Available Software as a service or (SaaS is a new software development and deployment paradigm over the cloud and offers Information Technology services dynamically as “on-demand” basis over the internet. Trust is one of the fundamental security concepts on storing and delivering such services. In general, trust factors are integrated into such existent security frameworks in order to add a security level to entities collaborations through the trust relationship. However, deploying trust factor in the secured cloud environment are more complex engineering task due to the existence of heterogeneous types of service providers and consumers. In this paper, a formal trust management model has been introduced to manage the trust and its properties for SaaS in cloud computing environment. The model is capable to represent the direct trust, recommended trust, reputation etc, formally. For the analysis of the trust properties in the cloud environment, the proposed approach estimates the trust value and uncertainty of each peer by computing decay function, number of positive interactions, reputation factor and satisfaction level for the collected information.

  7. Cryptographic Trust Management Requirements Specification: Version 1.1

    Energy Technology Data Exchange (ETDEWEB)

    Edgar, Thomas W.

    2009-09-30

    The Cryptographic Trust Management (CTM) Project is being developed for Department of Energy, OE-10 by the Pacific Northwest National Laboratory (PNNL). It is a component project of the NSTB Control Systems Security R&D Program.

  8. Trust is a must: What is involved in trusting those who manage forest fires?

    Science.gov (United States)

    Adam Liljeblad; Bill Borrie; Alan Watson

    2010-01-01

    Trust is a complicated emotion. In the past, many social scientists have studied trust. They discovered that trust involves a number of beliefs and emotions. The scientists in this study were interested in learning more about trust. They believed that forest managers can do a better job if people trust them to do what is best for citizens and the environment (figure 1...

  9. ReTrust: attack-resistant and lightweight trust management for medical sensor networks.

    Science.gov (United States)

    He, Daojing; Chen, Chun; Chan, Sammy; Bu, Jiajun; Vasilakos, Athanasios V

    2012-07-01

    Wireless medical sensor networks (MSNs) enable ubiquitous health monitoring of users during their everyday lives, at health sites, without restricting their freedom. Establishing trust among distributed network entities has been recognized as a powerful tool to improve the security and performance of distributed networks such as mobile ad hoc networks and sensor networks. However, most existing trust systems are not well suited for MSNs due to the unique operational and security requirements of MSNs. Moreover, similar to most security schemes, trust management methods themselves can be vulnerable to attacks. Unfortunately, this issue is often ignored in existing trust systems. In this paper, we identify the security and performance challenges facing a sensor network for wireless medical monitoring and suggest it should follow a two-tier architecture. Based on such an architecture, we develop an attack-resistant and lightweight trust management scheme named ReTrust. This paper also reports the experimental results of the Collection Tree Protocol using our proposed system in a network of TelosB motes, which show that ReTrust not only can efficiently detect malicious/faulty behaviors, but can also significantly improve the network performance in practice.

  10. Integrity Constraints in Trust Management (Extended Abstract)

    NARCIS (Netherlands)

    Etalle, Sandro; Winsborough, William H.; Ahn, G-J.

    We introduce the use, monitoring, and enforcement of integrity constraints in trust managementstyle authorization systems. We consider what portions of the policy state must be monitored to detect violations of integrity constraints. Then we address the fact that not all participants in a trust

  11. Trust in hybrid closed loop among people with diabetes: Perspectives of experienced system users.

    Science.gov (United States)

    Tanenbaum, Molly L; Iturralde, Esti; Hanes, Sarah J; Suttiratana, Sakinah C; Ambrosino, Jodie M; Ly, Trang T; Maahs, David M; Naranjo, Diana; Walders-Abramson, Natalie; Weinzimer, Stuart A; Buckingham, Bruce A; Hood, Korey K

    2017-07-01

    Automated closed loop systems will greatly change type 1 diabetes management; user trust will be essential for acceptance of this new technology. This qualitative study explored trust in 32 individuals following a hybrid closed loop trial. Participants described how context-, system-, and person-level factors influenced their trust in the system. Participants attempted to override the system when they lacked trust, while trusting the system decreased self-management burdens and decreased stress. Findings highlight considerations for fostering trust in closed loop systems. Systems may be able to engage users by offering varying levels of controls to match trust preferences.

  12. Trust enhances IT service management.

    Science.gov (United States)

    2007-08-01

    ITIL process adoption may be a prerequisite for the National Programme for IT (NPfIT), but implementation is far from straightforward. IT services company Plan-Net has been assisting Barts and The London NHS Trust with implementing its ambitious ITIL processes deployment.

  13. A Calculus for Trust Management

    DEFF Research Database (Denmark)

    Carbone, Marco; Nielsen, Mogens; Sassone, Vladimiro

    2004-01-01

    principals to policies. We elect to formalise policies using a Datalog-like logic, and to express protocols in the process algebra style. This yields an expressive calculus very suitable for the global computing scenarios, and provides a formalisation of notions such as trust evolution. For ctm we define...

  14. A multi-domain trust management model for supporting RFID applications of IoT.

    Directory of Open Access Journals (Sweden)

    Xu Wu

    Full Text Available The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system, in which trust establishment among entities from heterogeneous domains without past interaction or prior agreed policy, is a challenge. The current trust management mechanisms in the literature do not meet the specific requirements in multi-domain RFID systems. Therefore, this paper analyzes the special challenges on trust management in multi-domain RFID systems, and identifies the implications and the requirements of the challenges on the solutions to the trust management of multi-domain RFID systems. A multi-domain trust management model is proposed, which provides a hierarchical trust management framework include a diversity of trust evaluation and establishment approaches. The simulation results and analysis show that the proposed method has excellent ability to deal with the trust relationships, better security, and higher accuracy rate.

  15. A multi-domain trust management model for supporting RFID applications of IoT.

    Science.gov (United States)

    Wu, Xu; Li, Feng

    2017-01-01

    The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system, in which trust establishment among entities from heterogeneous domains without past interaction or prior agreed policy, is a challenge. The current trust management mechanisms in the literature do not meet the specific requirements in multi-domain RFID systems. Therefore, this paper analyzes the special challenges on trust management in multi-domain RFID systems, and identifies the implications and the requirements of the challenges on the solutions to the trust management of multi-domain RFID systems. A multi-domain trust management model is proposed, which provides a hierarchical trust management framework include a diversity of trust evaluation and establishment approaches. The simulation results and analysis show that the proposed method has excellent ability to deal with the trust relationships, better security, and higher accuracy rate.

  16. Recovering from trust breakdowns in large system implementations

    DEFF Research Database (Denmark)

    Rerup Schlichter, Bjarne Rerup; Andersen, Povl Erik Rostgård

    2011-01-01

    On the basis of experiences from the Faroese large-scale implementation of integrated healthcare information systems and insights into dynamic aspects of trust, we offer the following lessons learned for the successful management and recovery of trust (breakdowns) in large system implementations:...

  17. Trust dynamics in a large system implementation

    DEFF Research Database (Denmark)

    Schlichter, Bjarne Rerup; Rose, Jeremy

    2013-01-01

    outcomes, but largely ignored the dynamics of trust relations. Giddens, as part of his study of modernity, theorises trust dynamics in relation to abstract social systems, though without focusing on information systems. We use Giddens’ concepts to investigate evolving trust relationships in a longitudinal...

  18. Trust Dynamics in a Large System Implementation

    DEFF Research Database (Denmark)

    Schlichter, Bjarne Rerup; Rose, Jeremy

    2013-01-01

    the dynamics of trust relations. Giddens, as part of his study of modernity, theorises trust dynamics in relation to abstract social systems, though without focusing on information systems. We use Gid-dens’ concepts to investigate evolving trust relationships in a longitudinal case analysis of a large...

  19. A Security Architecture Based on Trust Management for Pervasive Computing Systems

    Science.gov (United States)

    2005-01-01

    the services provided by the nearest Centaurus Service Manager (SM) via some short-range communi- cation. The SM acts as an active proxy by executing...themselves nor does it allow the Service Manager to serve exclu- sively as a cache. This approach is at a disadvantage because as the complexity of...assigned dynamically to users without creating a new role. There are six functional components within the Vigil archi- tecture: Service Manager , Communication

  20. Dynamic Trust Management for Mobile Networks and Its Applications

    Science.gov (United States)

    Bao, Fenye

    2013-01-01

    Trust management in mobile networks is challenging due to dynamically changing network environments and the lack of a centralized trusted authority. In this dissertation research, we "design" and "validate" a class of dynamic trust management protocols for mobile networks, and demonstrate the utility of dynamic trust management…

  1. Trusted computing for embedded systems

    CERN Document Server

    Soudris, Dimitrios; Anagnostopoulos, Iraklis

    2015-01-01

    This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. Case studies are used to present new techniques designed as industrial security solutions. Coverage includes development of tamper resistant hardware and firmware mechanisms for lightweight embedded devices, as well as those serving as security anchors for embedded platforms required by applications such as smart power grids, smart networked and home appliances, environmental and infrastructure sensor networks, etc. ·         Enables readers to address a variety of security threats to embedded hardware and software; ·         Describes design of secure wireless sensor networks, to address secure authen...

  2. An Introduction to the Role Based Trust Management Framework RT

    NARCIS (Netherlands)

    Czenko, M.R.; Etalle, Sandro; Li, Dongyi; Winsborough, William H.

    2007-01-01

    Trust Management (TM) is a novel flexible approach to access control in distributed systems, where the access control decisions are based on the policy statements, called credentials, made by different principals and stored in a distributed manner. In this chapter we present an introduction to TM

  3. Trust-based information system architecture for personal wellness.

    Science.gov (United States)

    Ruotsalainen, Pekka; Nykänen, Pirkko; Seppälä, Antto; Blobel, Bernd

    2014-01-01

    Modern eHealth, ubiquitous health and personal wellness systems take place in an unsecure and ubiquitous information space where no predefined trust occurs. This paper presents novel information model and an architecture for trust based privacy management of personal health and wellness information in ubiquitous environment. The architecture enables a person to calculate a dynamic and context-aware trust value for each service provider, and using it to design personal privacy policies for trustworthy use of health and wellness services. For trust calculation a novel set of measurable context-aware and health information-sensitive attributes is developed. The architecture enables a person to manage his or her privacy in ubiquitous environment by formulating context-aware and service provider specific policies. Focus groups and information modelling was used for developing a wellness information model. System analysis method based on sequential steps that enable to combine results of analysis of privacy and trust concerns and the selection of trust and privacy services was used for development of the information system architecture. Its services (e.g. trust calculation, decision support, policy management and policy binding services) and developed attributes enable a person to define situation-aware policies that regulate the way his or her wellness and health information is processed.

  4. XML Based Adaptive IPSEC Policy Management in a Trust Management Context

    National Research Council Canada - National Science Library

    Mohan, R

    2002-01-01

    ... the level of security service "on-the-fly" to respond to changing network and operational conditions, The IPsec implementation in OpenESD works in conjunction with the Trust Management System, KeyNote...

  5. Recovering from trust breakdowns in large system Implementations

    DEFF Research Database (Denmark)

    Schlichter, Bjarne Rerup; Andersen, Povl Erik Rostgård

    On the basis of experiences from the Faroese large-scale implementation of integrated healthcare information systems and insights into dynamic aspects of trust, we offer the following lessons learned for the successful management and recovery of trust (breakdowns) in large system implementations......: restore relations by turning towards face-to-face events and procedures, assure a well-functioning and available support organisation, demonstrate trust in actors to enhance their own self-confidence and celebrate successes, even the smallest or ones injected by yourself. The propositions are based on a 6...

  6. An Analysis of Behavioral Intention to use Thai Internet Banking with Quality Management and Trust

    OpenAIRE

    Namahoot KS; Laohavichien T

    2015-01-01

    This research explores the effects of quality management and trust towards behavioural intention of Thai consumers to use internet banking. It specifically investigates whether the quality management dimensions of information quality, system quality and service quality affect the level of trust of Thai consumers towards internet banking, and whether this trust correspondingly affect their intention to use the system. This study has been conducted in Thailand and focused on the users of intern...

  7. Trust and the transformation of energy systems

    International Nuclear Information System (INIS)

    Rayner, Steve

    2010-01-01

    The author looks at diverse concepts and roles of trust in the challenge of decarbonising energy systems, drawing on 25 years of personal experience in the fields of energy and environmental policy research. The paper focuses on three issues-public trust in science, institutional trust in making technology choices, and the idea that high-trust societies are more sustainable than those exhibiting low-trust. While trust is a key concept in understanding the public acceptability of technology choices, it is only one of a suite of interrelated concepts that must be addressed, which also includes liability, consent, and fairness. Furthermore, rational distrust among competing institutional world views may be critical in understanding the role of social capital in socioeconomic and technological development. Thus the concept of trust has become a portmanteau, carrying a diverse range of ideas and conditions for sustainable energy systems. The paper concludes with three emphases for decision makers. First, the issue is the energy system, not particular generating technologies. Second, the energy system must be recognized to be as much a social system as it is a technical one. Third, the system requires incorporation of the minimum level of diversity of engineering technologies and social actors to be sustainable.

  8. Analyzing Trust Perceptions in System Implementations

    DEFF Research Database (Denmark)

    Schlichter, Bjarne Rerup; Rose, Jeremy

    2009-01-01

    mount, trust relations become strained, leading to a circle of suspicion and disbelief which is both destructive and hard to break out of. This case study analyses trust relations during a problematic period of time in the implementation of the Faroese integrated healthcare information system, using...... a framework based on Giddens´ theory of modernity. The framework theorizes dynamic elements of the evolution of trust, not previously investigated in this context. The data collection involves 4 actors interviewed twice in 2006 and 2007; and the data analysis strategy is content analysis using Nvivo software...

  9. The quality of interaction between managers and clinicians: a question of trust

    NARCIS (Netherlands)

    Brown, P.; Alaszewski, A.; Pilgrim, D.; Calnan, M.

    2011-01-01

    A lack of trust between clinicians and junior/middle managers is well documented in health care systems but under-theorized. Face-to-face interactions between clinicians and managers, through which trust is constructed, are vitally shaped by assumptions drawn from local organizational

  10. Trust Management Considerations For the Cooperative Infrastructure Defense Framework: Trust Relationships, Evidence, and Decisions

    Energy Technology Data Exchange (ETDEWEB)

    Maiden, Wendy M.

    2009-12-01

    Cooperative Infrastructure Defense (CID) is a hierarchical, agent-based, adaptive, cyber-security framework designed to collaboratively protect multiple enclaves or organizations participating in a complex infrastructure. CID employs a swarm of lightweight, mobile agents called Sensors designed to roam hosts throughout a security enclave to find indications of anomalies and report them to host-based Sentinels. The Sensors’ findings become pieces of a larger puzzle, which the Sentinel puts together to determine the problem and respond per policy as given by the enclave-level Sergeant agent. Horizontally across multiple enclaves and vertically within each enclave, authentication and access control technologies are necessary but insufficient authorization mechanisms to ensure that CID agents continue to fulfill their roles in a trustworthy manner. Trust management fills the gap, providing mechanisms to detect malicious agents and offering more robust mechanisms for authorization. This paper identifies the trust relationships throughout the CID hierarchy, the types of trust evidence that could be gathered, and the actions that the CID system could take if an entity is determined to be untrustworthy.

  11. Trust and automation: the influence of automation malfunctions and system feedback on operator trust

    International Nuclear Information System (INIS)

    Strand, Stine

    2001-10-01

    Level of operator trust in an automatic system, which is not in accordance with the reliability of the system, might impose serious threats concerning issues of safety, productivity and the well being of the operator. Operator trust is therefore regarded as an important variable in man-machine interaction. The focus of this study was the influence of automatic malfunctions and amount of feedback provided by the automatic system on level of operator trust. The study was conducted in conjunction with the Human Centred Automation 2000-experiment. Two questionnaires attempting to measure operator trust were developed, designed to reflect the dimensions of predictability, dependability and faith. Analysis of the questionnaires demonstrated that they were reliable tools for measurement of operator trust. Factor analysis did not completely confirm the theoretical dimensions of trust, but indicated partial support. Operator trust correlated negatively with workload across situations, and positively with performance in complex situations. The results of the hypotheses tests demonstrated that operator trust gradually decreased after introduction of malfunctions. The effect of different malfunctions was however the opposite of what was expected, with obvious malfunctions reducing trust more than more camouflaged and safety critical malfunctions. Trust in the automatic system in general was lower than trust in specific malfunctioning components. Different interfaces providing different amount of feedback to the operator did not significantly influence level of operator trust. (Author)

  12. Security, privacy and trust in cloud systems

    CERN Document Server

    Nepal, Surya

    2013-01-01

    The book compiles technologies for enhancing and provisioning security, privacy and trust in cloud systems based on Quality of Service requirements. It is a timely contribution to a field that is gaining considerable research interest, momentum, and provides a comprehensive coverage of technologies related to cloud security, privacy and trust. In particular, the book includes - Cloud security fundamentals and related technologies to-date, with a comprehensive coverage of evolution, current landscape, and future roadmap. - A smooth organization with introductory, advanced and specialist content

  13. Trust management for e-transactions

    Indian Academy of Sciences (India)

    R. Narasimhan (Krishtel eMaging) 1461 1996 Oct 15 13:05:22

    Based on the severity of perceived risk associated with applications, users enter into collaboration with one of the four distinguishable regions of following figure 1 as the initial trust value. For example, in transactions of high financial value, users might not trust the communicating peer easily and may initiate the negotiation ...

  14. Exploring a Dynamic Model of Trust Management

    Science.gov (United States)

    2014-06-01

    indicators (ability, benevolence, and integrity) in both collectivistic and individualistic cultures. Klein (2004) had suggested several cultural...trusting choices of individualists , but less for collectivists . This is because collectivistic cultures such as Japan- of which discourages the display...hinder trust formation in collectivistic than individualistic culture. In other words, collectivists may either automatically screen trustees based

  15. A generic solution for unwanted traffic control through trust management

    Science.gov (United States)

    Yan, Zheng; Kantola, Raimo; Shen, Yue

    2014-01-01

    The Internet has dramatically changed our daily life. But it is also bogged down by unwanted traffic, which is malicious, harmful or unexpected for its receivers. In order to control the unwanted traffic over the Internet, especially the mobile Internet, in this paper, we propose a generic unwanted traffic control (UTC) solution through trust management. It can control unwanted traffic from its source to destinations in a personalized manner according to trust evaluation at a Global Trust Operator, traffic and behavior analysis at hosts and traffic observation in the Internet. Thus, it can conduct UTC by integrating distributed and centralized functions and supporting both defensive and offensive approaches. Simulation based evaluation shows that the solution is effective with regard to accuracy and efficiency for botnet intrusion and DDoS intrusion via reflectors. It is also robust against a number of malicious system attacks, such as hide evidence attack, bad mouthing attack, on-off attack, malicious attack by an Internet Service Provider and combinations of the above, playing in conjunction with traffic intrusions. Meanwhile, the solution can provide a personalized UTC based on unwanted traffic detection behaviors.

  16. Development of trust during large scale system implementation

    DEFF Research Database (Denmark)

    Schlichter, Bjarne Rerup

    2010-01-01

      Implementations of information systems are complex and problematic with a reputation for being delayed and exceeding budget. A critical factor in implementations is trust in the system, trust in the project and trust between the various stakeholders. This case charts the evolution of trust...... in the implementation of the Faroese integrated healthcare system and shows how trust relations at various points in the project became difficult, what the causes and consequences of these trust difficulties were, and how they were successfully resolved in the project....

  17. SMEs: Trust and judicial system

    Directory of Open Access Journals (Sweden)

    Marilene Lorizio

    2016-06-01

    Full Text Available Italian SMEs share capabilities and routines that permit them to reach high level of competition. But in a global system that is affected by structural deficiencies and negative performance of judicial system, it is very hard to maintain high performances. In this work, starting from the resilience capacity of a group of SMEs of surviving to the crisis, we try to analyse the quality of the expectations of a sample of resilient firms. Our study leads to the hypothesis that the economic crisis is in line with a crisis of confidence in the judicial system. This is all the more serious when considering that this distrust is rooted in those firms located in Southern Italy, where the inefficiency of the judicial system is particularly pronounced.

  18. Trust Management - Building Trust for International Cross Disciplinary Collaboration on Climate Change

    Science.gov (United States)

    Oakley, K. V.; Gurney, R. J.

    2014-12-01

    Successful communication and collaboration entails mutual understanding, and transfer, of information. The risk of misunderstanding and/or miscommunication between collaborating groups is tackled in different ways around the globe; some are well documented whereas others may be unknown outside particular groups, whether defined geographically or by specialism. For example; in some countries legally binding contracts define the terms of collaboration. Some regions place greater emphasis on developing trust relationships, and sometimes an official agreement is implied, such as many electronic data transfers on the web. International collaboration on climate change increasingly involves electronic data exchange (e.g. open access publications, shared documents, data repositories etc.) and with this increased reliance on electronic data a need has arisen for scientists to collaborate both internationally and cross-disciplinarily particularly with information technology and data management specialists. Trust of data and metadata on the internet (e.g. privacy, legitimacy etc.) varies, possibly due to a lack of internationally agreed standards for data governance and management, leaving many national, regional and institutional practices tailored to the needs of that group only. It is proposed that building trust relationships between cross-disciplinary and international groups could help facilitate further communication, understanding and benefits from the relationship, while still maintaining independence as separate groups. Complex international cross-disciplinary group relationship dynamics are not easily mapped and producing a set of trust building rules that can be applied to any current and future collaboration with equal validity may be unfeasible. An alternative to such a set of rules may be found in a Trust Manager, whose role is to improve mutually beneficial knowledge exchange between groups, build trust and increase future collaborative potential. This

  19. Continuous Calibration of Trust in Automated Systems

    Science.gov (United States)

    2014-01-01

    subject pool was not operating, participants were recruited via direct contact with psychology and business professors. This sample was 72.5% female and... Business and Psychology, 27, 421-436. Merritt, S. M., Heimbaugh, H., LaChapell, J., & Lee, D. (2013). I Trust it, but I don’t know Why: Effects of... Etiquette in High-Criticality Automated Systems. The Communications of the ACM, 47, 51-55. Parasuraman, R., & Riley, V. (1997). Humans and Automation: Use

  20. Do Reputation Systems Undermine Trust? Divergent Effects of Enforcement Type on Generalized Trust and Trustworthiness.

    Science.gov (United States)

    Kuwabara, Ko

    2015-03-01

    Research shows that enforcing cooperation using contracts or tangible sanctions can backfire, undermining people's intrinsic motivation to cooperate: when the enforcement is removed, people are less trusting or trustworthy than when there is no enforcement to begin with. The author examines whether reputation systems have similar consequences for generalized trust and trustworthiness. Using a web-based experiment simulating online market transactions (studies 1 and 2), he shows that reputation systems can reinforce generalized trust and trustworthiness, unlike contractual enforcement or relational enforcement based on repeated interactions. In a survey experiment (study 3), he finds that recalling their eBay feedback scores made participants more trusting and trustworthy. These results are predicated on the diffuse nature of reputational enforcement to reinforce perceptions of trust and trustworthiness. These results have implications for understanding how different forms of governance affect generalized trust and trustworthiness.

  1. A trust based approach to mobile multi-agent systems.

    OpenAIRE

    Jones, Kevin I.

    2010-01-01

    This thesis undertakes to provide an architecture and understanding of the incorporation of trust into the paradigm of mobile multi-agent systems. Trust deliberation is a soft security approach to the problem of mobile agent security whereby an agent is protected from the malicious behaviour of others within the system. Using a trust approach capitalises on observing malicious behaviour rather than preventing it. We adopt an architectural approach to trust such than we do not provide a mod...

  2. Trust management for e-transactions

    Indian Academy of Sciences (India)

    R. Narasimhan (Krishtel eMaging) 1461 1996 Oct 15 13:05:22

    of different fields, including the social sciences, economics and philosophy. An important observation from all these sources is ... some of the technology has been accepted socially to be trustworthy. The large question is to see how the ..... Trust is about expectations of the future. Also, a principal's intentions behind collab-.

  3. Managing Trust Relationships: Calculative, Affective, Belief and Performance

    Directory of Open Access Journals (Sweden)

    Danny Pimentel Claro

    2008-10-01

    Full Text Available There is an ongoing concern among managers and scholars: how can firms develop trust and achieve performance? Our paper aims to review the emerging perspective of trust and propose mechanisms to build trust in channel relationships. In the literature, we identified six mechanisms: calculative, affective, belief, embeddedness, continuity and capability. A central hypothesis focuses on the direct impact of these mechanisms on firm performance. We conducted a survey (n=132 in the Brazilian Distribution Market of agrochemical products. OLS regression estimation was employed to test the hypothesis. Results show the impact of the mechanisms of calculative, affective, belief on performance. The findings highlight that, even though environment leads to suspicion and doubts, managers seek trust relationships and try to develop them using a combination of few mechanisms to overcome difficulties and perform well.

  4. Trust matters: A narrative literature review of the role of trust in health care systems in sub-Saharan Africa.

    Science.gov (United States)

    Østergaard, Lise Rosendal

    2015-10-01

    This article makes a contribution to the debate about health service utilisation and the role of trust in fostering demand for health services in sub-Saharan Africa. It is framed as a narrative literature review based on a thematic analysis of nine empirical, qualitative studies. For the purposes of this article trust is defined as a voluntary course of action, which involves the optimistic expectation that the trustee will do no harm to the trustor and is increasingly perceived as an important influence on health system functioning. The article looks at trust issues in interpersonal, intergroup and institutional situations. The findings of the review point to four elements that are important for trust to develop in health sector relationships: the sensitive use of discretionary power by health workers, perceived empathy by patients of the health workers, the quality of medical care and workplace collegiality. When trust works in health sector encounters, it reduces the social complexity and inherent uneven distribution of power between clients and providers. The article concludes that understanding and supporting trust processes between patients and providers, as well as between co-workers and managers, will improve health sector collaboration and stimulate demand for health care services.

  5. Security management based on trust determination in cognitive radio networks

    Science.gov (United States)

    Li, Jianwu; Feng, Zebing; Wei, Zhiqing; Feng, Zhiyong; Zhang, Ping

    2014-12-01

    Security has played a major role in cognitive radio networks. Numerous researches have mainly focused on attacking detection based on source localization and detection probability. However, few of them took the penalty of attackers into consideration and neglected how to implement effective punitive measures against attackers. To address this issue, this article proposes a novel penalty mechanism based on cognitive trust value. The main feature of this mechanism has been realized by six functions: authentication, interactive, configuration, trust value collection, storage and update, and punishment. Data fusion center (FC) and cluster heads (CHs) have been put forward as a hierarchical architecture to manage trust value of cognitive users. Misbehaving users would be punished by FC by declining their trust value; thus, guaranteeing network security via distinguishing attack users is of great necessity. Simulation results verify the rationality and effectiveness of our proposed mechanism.

  6. Agent Based Trust Management Model Based on Weight Value Model for Online Auctions

    OpenAIRE

    Sathiyamoorthy, E.; Iyenger, N. Ch. Sriman Narayana; Ramachandran, V.

    2010-01-01

    This paper is aimed at the stipulations which arise in the traditional online auctions as a result of various anomalies in the reputation and trust calculation mechanism. We try to improve the scalability andefficiency of the online auctions by providing efficient trust management methodology considering several factors into consideration. A comparison between the performance of the auctions system with and without the agent methodology is done with good results.

  7. tertiary education trust fund (tetfund) and the management of ...

    African Journals Online (AJOL)

    PROF EKWUEME

    The paper examines the role of the Tertiary Education Trust Fund (TETFund) in the management of. University education in Nigeria. A brief history of University education in Nigeria as well as the creation of TETFund was examined. Also the paper was guided with the use the Management by Objectives theory developed by ...

  8. Trust, but verify: social media models for disaster management.

    Science.gov (United States)

    Mehta, Amisha M; Bruns, Axel; Newton, Judith

    2017-07-01

    A lack of trust in the information exchanged via social media may significantly hinder decisionmaking by community members and emergency services during disasters. The need for timely information at such times, though, challenges traditional ways of establishing trust. This paper, building on a multi-year research project that combined social media data analysis and participant observation within an emergency management organisation and in-depth engagement with stakeholders across the sector, pinpoints and examines assumptions governing trust and trusting relationships in social media disaster management. It assesses three models for using social media in disaster management-information gathering, quasi-journalistic verification, and crowdsourcing-in relation to the guardianship of trust to highlight the verification process for content and source and to identify the role of power and responsibilities. The conclusions contain important implications for emergency management organisations seeking to enhance their mechanisms for incorporating user-generated information from social media sources in their disaster response efforts. © 2017 The Author(s). Disasters © Overseas Development Institute, 2017.

  9. Analyzing Trust Perceptions in System Implementations

    DEFF Research Database (Denmark)

    Schlichter, Bjarne Rerup; Rose, Jeremy

    2009-01-01

    a framework based on Giddens´ theory of modernity. The framework theorizes dynamic elements of the evolution of trust, not previously investigated in this context. The data collection involves 4 actors interviewed twice in 2006 and 2007; and the data analysis strategy is content analysis using Nvivo software......' perceptions of trust relations influence future actions, and in this way have both negative and positive consequences. We also conclude that Giddens' theories of trust provide a promising insight into the dynamic aspects of trust relations in implementation projects, which go further than trust theories...

  10. An Experimental Testbed for Evaluation of Trust and Reputation Systems

    Science.gov (United States)

    Kerr, Reid; Cohen, Robin

    To date, trust and reputation systems have often been evaluated using methods of their designers’ own devising. Recently, we demonstrated that a number of noteworthy trust and reputation systems could be readily defeated, revealing limitations in their original evaluations. Efforts in the trust and reputation community to develop a testbed have yielded a successful competition platform, ART. This testbed, however, is less suited to general experimentation and evaluation of individual trust and reputation technologies. In this paper, we propose an experimentation and evaluation testbed based directly on that used in our investigations into security vulnerabilities in trust and reputation systems for marketplaces. We demonstrate the advantages of this design, towards the development of more thorough, objective evaluations of trust and reputation systems.

  11. Relationship between islamic human resources management (IHRM practices and trust: An empirical study

    Directory of Open Access Journals (Sweden)

    Nik Mutasim Nik Ab. Rahman

    2013-09-01

    Full Text Available Purpose: The purpose of this study is to explore and examines the theoretical frameworks of Islamic human resource management practices and trust in organization. Additionally, to investigate the extent to which Islamic HRM practices inspire and revival employees trust in organization.Design/methodology/approach: This study comprised sample of 236 Islamic Bank employees in Bangladesh. A cross-sectional research design was used to examine the relationship between Islamic Human Resource Management practices and trust. Data were gathered based on personal administered questionnaire.Findings and Originality/value: This study results show that knowledge, understanding and practices of Islamic principles, recruitment and selection, training and development, and reward system significantly related to the trust. But performance appraisal are found have insignificant relationship.Research limitations/implications: The data for this study are collected by self-administered questionnaire, a method with well-known shortcomings. Second, this study concentrated on the Islamic bank employees in Bangladesh.Practical implications: An important implication of this research is that the interesting findings give some insight to the management of Islamic bank to focus on improving Islamic Human Resource Management practices, in their all kind of management, as that could improve their trust in the bank.Originality/value: The findings are original and unique and are based on the literature from different researches. The results are based on a sample of Islamic Bank employees in Bangladesh. The research findings are useful to academics and management of Islamic bank all over the world.

  12. Making partnerships work: issues of risk, trust and control for managers and service providers.

    Science.gov (United States)

    Walker, Rae; Smith, Penny; Adam, Jenny

    2009-03-01

    Trust is widely recognised is a core feature of partnership relationships and one that facilitates joint work. It is an issue that must be addressed if partnerships are to enhance service system integration. In recent literature trust has been linked to concepts of risk and control. In this study of trust within a Primary Care Partnership (PCP) in Australia the experiences of risk and uncertainty, and control, of participants in different structural positions, were explored in detail. The data used in this paper was qualitative, derived from 63 interviews with managers and service providers participating in committees of the PCP. This paper reports on the differences in the experience of risk and uncertainty, trust and control, of managers and service providers working as boundary spanners through the committees of a PCP. For managers there were significant risks and uncertainties, and trust and control were important. For service providers there were few risks and uncertainties, and trust and control were of much less importance. Some policy implications of the differences in perspective are discussed, as are important areas for further research.

  13. Trust management support for context-aware service platforms

    NARCIS (Netherlands)

    Neisse, R.; Wegdam, M.; van Sinderen, Marten J.; Aldini, A.; Bogliolo, A.

    High quality context information retrieved from trustworthy context providers allows a more reliable context-aware service adaption but also implies a higher risk for the service users in case of privacy violations. In this chapter we present a trust management model that support users and providers

  14. Core TuLiP - Logic Programming for Trust Management

    NARCIS (Netherlands)

    Czenko, M.R.; Etalle, Sandro; Dahl, V.; Niemelä, I.

    2007-01-01

    We propose CoreTuLiP - the core of a trust management language based on Logic Programming. CoreTuLiP is based on a subset of moded logic programming, but enjoys the features of TM languages such as RT; in particular clauses are issued by different authorities and stored in a distributed manner. We

  15. The intersection of trust and recreation management

    Science.gov (United States)

    Patricia L. Winter; George T. Cvetkovich

    2013-01-01

    The management of public land as venues for a wide variety of outdoor recreation interests is a highly complex professional field. Understanding of the relationship between the visitor, general public values, the natural resource base and the politics of management policies requires training, experience and savvy. Recreation planning for forest, park, preserve,...

  16. Building a framework to manage trust in automation

    Science.gov (United States)

    Metcalfe, J. S.; Marathe, A. R.; Haynes, B.; Paul, V. J.; Gremillion, G. M.; Drnec, K.; Atwater, C.; Estepp, J. R.; Lukos, J. R.; Carter, E. C.; Nothwang, W. D.

    2017-05-01

    All automations must, at some point in their lifecycle, interface with one or more humans. Whether operators, end-users, or bystanders, human responses can determine the perceived utility and acceptance of an automation. It has been long believed that human trust is a primary determinant of human-automation interactions and further presumed that calibrating trust can lead to appropriate choices regarding automation use. However, attempts to improve joint system performance by calibrating trust have not yet provided a generalizable solution. To address this, we identified several factors limiting the direct integration of trust, or metrics thereof, into an active mitigation strategy. The present paper outlines our approach to addressing this important issue, its conceptual underpinnings, and practical challenges encountered in execution. Among the most critical outcomes has been a shift in focus from trust to basic interaction behaviors and their antecedent decisions. This change in focus inspired the development of a testbed and paradigm that was deployed in two experiments of human interactions with driving automation that were executed in an immersive, full-motion simulation environment. Moreover, by integrating a behavior and physiology-based predictor within a novel consequence-based control system, we demonstrated that it is possible to anticipate particular interaction behaviors and influence humans towards more optimal choices about automation use in real time. Importantly, this research provides a fertile foundation for the development and integration of advanced, wearable technologies for sensing and inferring critical state variables for better integration of human elements into otherwise fully autonomous systems.

  17. The Double-System Architecture for Trusted OS

    Science.gov (United States)

    Zhao, Yong; Li, Yu; Zhan, Jing

    With the development of computer science and technology, current secure operating systems failed to respond to many new security challenges. Trusted operating system (TOS) is proposed to try to solve these problems. However, there are no mature, unified architectures for the TOS yet, since most of them cannot make clear of the relationship between security mechanism and the trusted mechanism. Therefore, this paper proposes a double-system architecture (DSA) for the TOS to solve the problem. The DSA is composed of the Trusted System (TS) and the Security System (SS). We constructed the TS by establishing a trusted environment and realized related SS. Furthermore, we proposed the Trusted Information Channel (TIC) to protect the information flow between TS and SS. In a word, the double system architecture we proposed can provide reliable protection for the OS through the SS with the supports provided by the TS.

  18. From risk perception to social trust: an outline of recent contributions of psychology to risk management

    International Nuclear Information System (INIS)

    Earle, T.C.

    2002-01-01

    As with many developing areas of inquiry, the psychology of risk management has progressed from an initial focus on proximal effects to an exploration of more stable distal factors, from risk perception to social trust. Risk perception is concerned with disruptions in the relations between individuals and their physical environments, specifically with the varying negative effects experienced by individuals. These effects have been found to be socially constructed, with systematic variations among groups (e.g., lay-person and experts; among various groups of experts; men and women; those with economic interests and those without; etc.). The focus of risk perception research has shifted over time: from the likelihood of specific health effects; to the likelihood of a wide range of effects, including emotional effects, varying with context; and, finally, to general emotional effects, positive and negative affect. This shift can be seen to be from cognitive/rational to affective; from expert/technical to public. The second stage of inquiry moved away from the surface effects of risk perception to the study of confidence. Confidence is concerned with constancy, the underlying, not directly experienced order of the relations between individuals and their social/physical environments. Disruptions in confidence lead to concern with risk. Initially, confidence was said to be based on past performance and systems of control, objectively defined; the appropriate response to disruptions was risk communication, the provision of correct information. Failures in risk communication indicated that confidence must be based on subjective judgements of past performance and systems of control. The third, and present, stage of inquiry moved back from confidence, and from the physical environment, to the study of social trust. Social trust is concerned with the relations between individuals within social groups. Individuals tend to trust others whom they judge to be similar to themselves

  19. Developing a trust model for assisting management during change

    Directory of Open Access Journals (Sweden)

    Nico Martins

    2000-06-01

    Full Text Available This study investigates the relation of the "Big Five" personality dimensions and managerial practices to the dimension of trust relationships between managers and employees. The "Big Five" dimensions are conscientiousness, agreeableness, emotional stability, resourcefulness and extraversion. Managerial practices are credibility, team management, information sharing and work support. Results indicate that managerial practices have an influence on the trust relationships between managers and employees. For the "Big Five" personality dimensions, a weaker relationship with the dimension of trust was obtained. Although there appears to be a weaker relationship between the "Big Five" and the dimension of trust relationships, the relatively good fit of the model indicates that an overall implication of the model is that both managerial practices and the "Big Five" personality aspects of the manager might influence his/her subordinates indirectly. These findings have numerous implications for the relationships between managers and employees, especially in the selection, recruitment and appointment of managers and the role of managers during transformation. Opsomming Die studie ondersoek die verhouding tussen die Groot Vyf ("Big Five" persoonlikheidsdimensies en bestuurspraktyke en die dimensie van vertroue tussen bestuur en werknemers. Die Groot Vyf dimensies is konsensieusheid, eenstemmigheid, emosionele stabiliteit, vernuftigheid en ekstroversie. Die bestuurspraktyke is kredietwaardigheid, spanbestuur, die deel van inligting en werksondersteuning. Die resultate dui aan dat die bestuurspraktyke 'n invloed het op die verhouding tussen bestuur en werknemers. Wat die Groot Vyf dimensies aanbetref, is n swakker verhouding met die dimensie van vertroue bevind. Alhoewel dit skyn as of daar n swakker verhouding tussen die Groot Vyf en die dimensie van vertroue is, toon die relatiewe goeie passing van die model dat beide die bestuurspraktyke en die Groot Vyf

  20. System reliability, performance and trust in adaptable automation.

    Science.gov (United States)

    Chavaillaz, Alain; Wastell, David; Sauer, Jürgen

    2016-01-01

    The present study examined the effects of reduced system reliability on operator performance and automation management in an adaptable automation environment. 39 operators were randomly assigned to one of three experimental groups: low (60%), medium (80%), and high (100%) reliability of automation support. The support system provided five incremental levels of automation which operators could freely select according to their needs. After 3 h of training on a simulated process control task (AutoCAMS) in which the automation worked infallibly, operator performance and automation management were measured during a 2.5-h testing session. Trust and workload were also assessed through questionnaires. Results showed that although reduced system reliability resulted in lower levels of trust towards automation, there were no corresponding differences in the operators' reliance on automation. While operators showed overall a noteworthy ability to cope with automation failure, there were, however, decrements in diagnostic speed and prospective memory with lower reliability. Copyright © 2015. Published by Elsevier Ltd.

  1. 77 FR 25210 - Advisors Series Trust and Orinda Asset Management, LLC; Notice of Application

    Science.gov (United States)

    2012-04-27

    ... Series Trust and Orinda Asset Management, LLC; Notice of Application April 23, 2012. AGENCY: Securities.... APPLICANTS: Advisors Series Trust (the ``Trust'') and Orinda Asset Management, LLC (the ``Advisor''). FILING... Street, Milwaukee, WI 53202 and Orinda Asset Management, LLC, 4 Orinda Way, Suite 100B, Orinda, CA 94563...

  2. 77 FR 67029 - Arden Investment Series Trust and Arden Asset Management LLC; Notice of Application

    Science.gov (United States)

    2012-11-08

    ... Investment Series Trust and Arden Asset Management LLC; Notice of Application November 2, 2012. AGENCY... disclosure requirements. Applicants: Arden Investment Series Trust (the ``Trust'') and Arden Asset Management..., 375 Park Avenue, 32nd Floor, New York, New York 10152 and Arden Asset Management LLC, 375 Park Avenue...

  3. 78 FR 53487 - Equinox Funds Trust and Equinox Institutional Asset Management LP; Notice of Application

    Science.gov (United States)

    2013-08-29

    ... Funds Trust and Equinox Institutional Asset Management LP; Notice of Application August 23, 2013. AGENCY...: Equinox Funds Trust (the ``Trust'') and Equinox Institutional Asset Management LP (the ``Initial Adviser... Institutional Asset Management LP, 47 Hulfish Street, Suite 510, Princeton, NJ 08542; Daniel Prezioso, Equinox...

  4. Managing the aftermaths of contracting in public transit organizations : employee perception of job security, organizational commitment and trust

    Science.gov (United States)

    2001-08-01

    This study assesses how to manage the effects or outcomes of organizational change on job security and employee commitment in transit systems using trust-building, empowerment, employee reassurance, and job redesign strategies. The major findings are...

  5. Methods for reliability evaluation of trust and reputation systems

    Science.gov (United States)

    Janiszewski, Marek B.

    2016-09-01

    Trust and reputation systems are a systematic approach to build security on the basis of observations of node's behaviour. Exchange of node's opinions about other nodes is very useful to indicate nodes which act selfishly or maliciously. The idea behind trust and reputation systems gets significance because of the fact that conventional security measures (based on cryptography) are often not sufficient. Trust and reputation systems can be used in various types of networks such as WSN, MANET, P2P and also in e-commerce applications. Trust and reputation systems give not only benefits but also could be a thread itself. Many attacks aim at trust and reputation systems exist, but such attacks still have not gain enough attention of research teams. Moreover, joint effects of many of known attacks have been determined as a very interesting field of research. Lack of an acknowledged methodology of evaluation of trust and reputation systems is a serious problem. This paper aims at presenting various approaches of evaluation such systems. This work also contains a description of generalization of many trust and reputation systems which can be used to evaluate reliability of such systems in the context of preventing various attacks.

  6. Towards a Formal Notion of Trust

    DEFF Research Database (Denmark)

    Nielsen, Mogens; Krukow, Karl Kristian

    2003-01-01

    Trust management systems have been proposed as an alternative to traditional security mechanisms in Global Computing. We present some challenges in establishing a formal foundation for the notion of trust, and some preliminary ideas towards a category of trust models.......Trust management systems have been proposed as an alternative to traditional security mechanisms in Global Computing. We present some challenges in establishing a formal foundation for the notion of trust, and some preliminary ideas towards a category of trust models....

  7. Enhancing Trust Management for Wireless Intrusion Detection via Traffic Sampling in the Era of Big Data

    DEFF Research Database (Denmark)

    Meng, Weizhi; Li, Wenjuan; Su, Chunhua

    2017-01-01

    many kinds of information among sensors, whereas such network is vulnerable to a wide range of attacks, especially insider attacks, due to its natural environment and inherent unreliable transmission. To safeguard its security, intrusion detection systems (IDSs) are widely adopted in a WSN to defend...... against insider attacks through implementing proper trustbased mechanisms. However, in the era of big data, sensors may generate excessive information and data, which could degrade the effectiveness of trust computation. In this paper, we focus on this challenge and propose a way of combining Bayesian......-based trust management with traffic sampling for wireless intrusion detection under a hierarchical structure. In the evaluation, we investigate the performance of our approach in both a simulated and a real network environment. Experimental results demonstrate that packet-based trust management would become...

  8. TrustRank: a Cold-Start tolerant recommender system

    Science.gov (United States)

    Zou, Haitao; Gong, Zhiguo; Zhang, Nan; Zhao, Wei; Guo, Jingzhi

    2015-02-01

    The explosive growth of the World Wide Web leads to the fast advancing development of e-commerce techniques. Recommender systems, which use personalised information filtering techniques to generate a set of items suitable to a given user, have received considerable attention. User- and item-based algorithms are two popular techniques for the design of recommender systems. These two algorithms are known to have Cold-Start problems, i.e., they are unable to effectively handle Cold-Start users who have an extremely limited number of purchase records. In this paper, we develop TrustRank, a novel recommender system which handles the Cold-Start problem by leveraging the user-trust networks which are commonly available for e-commerce applications. A user-trust network is formed by friendships or trust relationships that users specify among them. While it is straightforward to conjecture that a user-trust network is helpful for improving the accuracy of recommendations, a key challenge for using user-trust network to facilitate Cold-Start users is that these users also tend to have a very limited number of trust relationships. To address this challenge, we propose a pre-processing propagation of the Cold-Start users' trust network. In particular, by applying the personalised PageRank algorithm, we expand the friends of a given user to include others with similar purchase records to his/her original friends. To make this propagation algorithm scalable to a large amount of users, as required by real-world recommender systems, we devise an iterative computation algorithm of the original personalised TrustRank which can incrementally compute trust vectors for Cold-Start users. We conduct extensive experiments to demonstrate the consistently improvement provided by our proposed algorithm over the existing recommender algorithms on the accuracy of recommendations for Cold-Start users.

  9. System-Level Autonomy Trust Enabler (SLATE), Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — This SBIR project will achieve trusted, reconfigurable, intelligent autonomy through system-level validation. The goal is to design and develop a representation and...

  10. Achieving Optimal Privacy in Trust-Aware Social Recommender Systems

    Science.gov (United States)

    Dokoohaki, Nima; Kaleli, Cihan; Polat, Huseyin; Matskin, Mihhail

    Collaborative filtering (CF) recommenders are subject to numerous shortcomings such as centralized processing, vulnerability to shilling attacks, and most important of all privacy. To overcome these obstacles, researchers proposed for utilization of interpersonal trust between users, to alleviate many of these crucial shortcomings. Till now, attention has been mainly paid to strong points about trust-aware recommenders such as alleviating profile sparsity or calculation cost efficiency, while least attention has been paid on investigating the notion of privacy surrounding the disclosure of individual ratings and most importantly protection of trust computation across social networks forming the backbone of these systems. To contribute to addressing problem of privacy in trust-aware recommenders, within this paper, first we introduce a framework for enabling privacy-preserving trust-aware recommendation generation. While trust mechanism aims at elevating recommender's accuracy, to preserve privacy, accuracy of the system needs to be decreased. Since within this context, privacy and accuracy are conflicting goals we show that a Pareto set can be found as an optimal setting for both privacy-preserving and trust-enabling mechanisms. We show that this Pareto set, when used as the configuration for measuring the accuracy of base collaborative filtering engine, yields an optimized tradeoff between conflicting goals of privacy and accuracy. We prove this concept along with applicability of our framework by experimenting with accuracy and privacy factors, and we show through experiment how such optimal set can be inferred.

  11. A Model of Trust for Developing Trustworthy Systems From Untrustworthy Actors

    National Research Council Canada - National Science Library

    Ray, Indrajit; Ray, Indrakshi

    2007-01-01

    The objective of this effort is to develop a new model of trust that allowed one to reason about trust relationships in information systems with special emphasis on trust as it related to integrity and availability...

  12. Facing the Incompleteness of Epistemic Trust: Managing Dependence in Scientific Practice

    DEFF Research Database (Denmark)

    Wagenknecht, Susann

    2014-01-01

    Based on an empirical study of a research team in natural science, the author argues that collaborating scientists do not trust each other completely. Due to the inherent incompleteness of trust, epistemic trust among scientists is not sufficient to manage epistemic dependency in research teams...

  13. Process and impact of mergers of NHS trusts: multicentre case study and management cost analysis.

    Science.gov (United States)

    Fulop, Naomi; Protopsaltis, Gerasimos; Hutchings, Andrew; King, Annette; Allen, Pauline; Normand, Charles; Walters, Rhiannon

    2002-08-03

    To study the processes involved in and impact of mergers between NHS trusts, including the effect on management costs. Cross sectional study involving in depth interviews and documentary analysis; case study to compare savings in management costs between case trusts and control trusts. Nine trusts (cross sectional study) and four trusts (case study) in London. 96 interviews with trust board members, other senior managers, clinicians, service managers, and representatives of health authorities, regional office, community health councils, local authorities, other trusts in the area, and primary care groups and trusts. Stated and unstated drivers, and impact of merger on delivery and development of services, management structures, and staff recruitment, retention, and morale. Effects of difference in trust size before and after the merger. Savings in management costs two years after merger. Some important drivers for merger are not publicly stated. Mergers had a negative effect on delivery of services because of a loss of managerial focus on services. Planned developments in services were delayed by at least 18 months. Trusts' larger sizes after mergers had unintended negative consequences, as well as predicted advantages. The tendency for one trust's management team to dominate over the other resulted in tension. No improvement in recruitment or retention of clinical and managerial staff was reported. Perceived differences in organisational culture were an important barrier to bringing together two or more organisations. Two years after merger, merged trusts had not achieved the objective of saving pound 500 000 a year in management costs. Important unintended consequences need to be accounted for when mergers are planned. Mergers can cause considerable disruptions to services, and require greater management support than previously acknowledged. Other organisations undergoing restructuring, such as primary care groups developing into primary care trusts and health

  14. Trust and Reputation Management for Critical Infrastructure Protection

    Science.gov (United States)

    Caldeira, Filipe; Monteiro, Edmundo; Simões, Paulo

    Today's Critical Infrastructures (CI) depend of Information and Communication Technologies (ICT) to deliver their services with the required level of quality and availability. ICT security plays a major role in CI protection and risk prevention for single and also for interconnected CIs were cascading effects might occur because of the interdependencies that exist among different CIs. This paper addresses the problem of ICT security in interconnected CIs. Trust and reputation management using the Policy Based Management paradigm is the proposed solution to be applied at the CI interconnection points for information exchange. The proposed solution is being applied to the Security Mediation Gateway being developed in the European FP7 MICIE project, to allow for information exchange among interconnected CIs.

  15. A Survey on Trust Management for Mobile Ad Hoc Networks

    Science.gov (United States)

    2011-11-01

    than the employee trusts the supervisor. Fifth, trust is context-dependent [33]. For example, A may trust B as a wine expert but not as a car fixer... deposited at nodes by mobile agents called ”ants” and provide the mechanism for information exchange and interactions. These ”ants” can identify the

  16. Investigation of the Relation between Trust in the Manager and Organizational Justice

    Science.gov (United States)

    Bayraktar, Hatice Vatansever; Girgin, Sinan

    2017-01-01

    The aim of this study is to show the perception of trust in the manager of teachers working at public primary schools, secondary schools and high schools, and their perception of organizational justice, and reveal whether there is a correlation between the perception of trust in the manager and the perception of organizational justice. The study…

  17. 77 FR 65025 - Trust for Professional Managers and Collins Capital Investments, LLC; Notice of Application

    Science.gov (United States)

    2012-10-24

    ... Professional Managers and Collins Capital Investments, LLC; Notice of Application October 18, 2012. AGENCY...: Trust for Professional Managers (the ``Trust'') and Collins Capital Investments, LLC (the ``Advisor..., allocates assets to and oversees the Subadvisors, and makes recommendations about their hiring, termination...

  18. Chemical Manufacturing and Refining Industry Legitimacy: Reflective Management, Trust, Precrisis Communication to Achieve Community Efficacy.

    Science.gov (United States)

    Heath, Robert L; Lee, Jaesub

    2016-06-01

    Calls for emergency right-to-know in the 1980s, and, in the 1990s, risk management planning, motivated U.S. chemical manufacturing and refining industries to operationalize a three-pronged approach to risk minimization and communication: reflective management to increase legitimacy, operational safety programs to raise trust, and community engagement designed to facilitate citizens' emergency response efficacy. To assess these management, operational, and communication initiatives, communities (often through Local Emergency Planning Committees) monitored the impact of such programs. In 2012, the fourth phase of a quasi-longitudinal study was conducted to assess the effectiveness of operational change and community outreach in one bellwether community. This study focuses on legitimacy, trust, and response efficacy to suggest that an industry can earn legitimacy credits by raising its safety and environmental impact standards, by building trust via that change, and by communicating emergency response messages to near residents to raise their response efficacy. As part of its campaign to demonstrate its concern for community safety through research, planning, and implementation of safe operations and viable emergency response systems, this industry uses a simple narrative of risk/emergency response-shelter-in-place-communicated by a spokes-character: Wally Wise Guy. © 2015 Society for Risk Analysis.

  19. Innovation systems, saving, trust, and economic development in Africa

    NARCIS (Netherlands)

    Pamuk, H.

    2014-01-01

    The five essays in the dissertation explore the interaction between economic development in Africa and three economic concepts from different fields: decentralized agricultural innovation systems, trust and saving practices. A relatively new view to boost agricultural growth is the implementation of

  20. Trust in the justice system: A comparative view across Europe

    NARCIS (Netherlands)

    S.G.J. Van de Walle (Steven)

    2009-01-01

    textabstractThe justice system is not one of the most trusted institutions in the UK. While most citizens consider it fair, they also think it is out of touch in specific cases, and many consider it relatively inefficient. The UK is not alone. Many governments throughout Europe and the wider world

  1. Values, trust and science - building trust in today's food system in an era of radical transparency.

    Science.gov (United States)

    Arnot, Charlie; Vizzier-Thaxton, Yvonne; Scanes, Colin G

    2016-07-21

    Public concern exists globally about the food system and both the practices and the intensification of animal agriculture. Examples are presented of public opinion in North America, the European Union, and the People's Republic of China. Negative perceptions increase with distance from production agriculture. Even animal science faculty members do not uniformly support present production practices. Public trust in the food system is based on consumers' or public confidence (shared values based on corporate and institutional social responsibility or their fiduciary responsibility), competence of the people or groups providing the information and the influence of others (e.g., friends and family). Producer or company discussion of issues has focused on competency and "the science" when confidence is markedly more important to consumers and more effective. It is argued that the food system largely escapes regulation by federal and state governments by a social license based on public confidence. However, a tipping point(s) exists such that a crisis could greatly diminish public confidence and end the social license and bring with it increases in regulation. Advocacy for production agriculture (poultry and livestock) needs to incorporate recognition of the need to reaffirm the public's trust, assuring shared values together with an emphasis on good science. © 2016 Poultry Science Association Inc.

  2. Social Trust and Confidence in the Management of Long Lived Radioactive Wastes: Qualitative Data from France

    International Nuclear Information System (INIS)

    Mays, Claire; Charron, Sylvie; Brenot, Jean

    2003-01-01

    Our qualitative study brought confirmation to Petts' finding that trust components may be of variable significance to different populations in different risk contexts. When we asked interviewees simply to talk about LLiRW (long-lived radioactive wastes management), social trust and confidence were frequently addressed (more than any other of our seven study themes). However, the themes' status appears to differ according to study sample. For the Limousine interviewees, these concepts are central and deeply tied into the uncertainty evoked by LLiRWM. Some interviewees explicitly described how social trust in waste managers, and confidence in the RWM system, are challenged by the very long term, and by the unpredictability of health effects from ionizing radiation. Limousine interviewees ask themselves questions about trust and confidence every time they think about the issues of mine and mill tailings in their community. While managers can draw guidance on how to ameliorate their performance on e.g. openness and credibility, residents suggest that there are structural limits to how far social trust can suffice in a RWM system. In such a context, improving system confidence may reside not so much in convincing residents that institutional actors are more trustworthy, as in fostering a dialogue among all these stakeholders on how to address long term, uncertain risks and their impacts. This is in alignment with Bradbury et al. who with reference to Webler recommend that 'increasing trust and decreasing distrust' be viewed primarily as a basis for initiating and sustaining a more effective (fair and competent) dialogue with the goal of developing consensus on risk management policies. Uninvolved urban samples also talked about trust and confidence, especially during the group interviews. In contrast, however, participants seemed to use these themes as a tool to spark animated discussion on a risk topic - LLiRWM - of which they had not necessarily given much thought in

  3. Social Trust and Confidence in the Management of Long Lived Radioactive Wastes: Qualitative Data from France

    Energy Technology Data Exchange (ETDEWEB)

    Mays, Claire [Inst. Symlog, Cachan (France); Charron, Sylvie; Brenot, Jean [IRSN-DPHD-SEGR, Fontenay-aux-Roses (France)

    2003-10-01

    Our qualitative study brought confirmation to Petts' finding that trust components may be of variable significance to different populations in different risk contexts. When we asked interviewees simply to talk about LLiRW (long-lived radioactive wastes management), social trust and confidence were frequently addressed (more than any other of our seven study themes). However, the themes' status appears to differ according to study sample. For the Limousine interviewees, these concepts are central and deeply tied into the uncertainty evoked by LLiRWM. Some interviewees explicitly described how social trust in waste managers, and confidence in the RWM system, are challenged by the very long term, and by the unpredictability of health effects from ionizing radiation. Limousine interviewees ask themselves questions about trust and confidence every time they think about the issues of mine and mill tailings in their community. While managers can draw guidance on how to ameliorate their performance on e.g. openness and credibility, residents suggest that there are structural limits to how far social trust can suffice in a RWM system. In such a context, improving system confidence may reside not so much in convincing residents that institutional actors are more trustworthy, as in fostering a dialogue among all these stakeholders on how to address long term, uncertain risks and their impacts. This is in alignment with Bradbury et al. who with reference to Webler recommend that 'increasing trust and decreasing distrust' be viewed primarily as a basis for initiating and sustaining a more effective (fair and competent) dialogue with the goal of developing consensus on risk management policies. Uninvolved urban samples also talked about trust and confidence, especially during the group interviews. In contrast, however, participants seemed to use these themes as a tool to spark animated discussion on a risk topic - LLiRWM - of which they had not necessarily

  4. Dynamic interplay between merger process justice and cognitive trust in top management: A longitudinal study.

    Science.gov (United States)

    Kaltiainen, Janne; Lipponen, Jukka; Holtz, Brian C

    2017-04-01

    This study examines two fundamental concerns in the context of organizational change: employees' perceptions of merger process justice and cognitive trust in the top management team. Our main purpose is to better understand the nature of reciprocal relations between these important constructs through a significant change event. Previous research, building mainly on social exchange theory, has framed trust as a consequence of justice perceptions. More recently, scholars have suggested that this view may be overly simplistic and that trust-related cognitions may also represent an important antecedent of justice perceptions. Using 3-wave longitudinal survey data (N = 622) gathered during a merger process, we tested reciprocal relations over time between cognitive trust in the top management team and perceptions of the merger process justice. In contrast to the conventional unidirectional notion of trust or trust-related cognitions as outcomes of perceived justice, our results show positive reciprocal relations over time between cognitive trust and justice. Our findings also revealed that the positive influence of cognitive trust on subsequent justice perceptions was slightly more robust than the opposite direction. By examining cross-lagged longitudinal relations between these critical psychological reactions, this study contributes across multiple domains of the management literature including trust, justice, and organizational mergers. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  5. A Conceptual Trust Model for Managing E-Commerce Environment ...

    African Journals Online (AJOL)

    E-commerce helps businesses to increase production flexibility by ensuring timely availability of components from suppliers. However, of paramount concern is the issue of trust. Some trust models such as Pretty Good Privacy (PGP) and Public Key Infrastructure based on X.509 (PKIX) are based on the notion of delegation ...

  6. Exploring a Dynamic Model of Trust Management Presentation

    Science.gov (United States)

    2013-08-01

    individualistic and collectivistic nations – Participants recruited from local universities • Measures – Audio recording – Trust Propensity (8-item...are while you are making the judgment – By culture e.g. individualistic vs. collectivistic cultural influences – competence vs. benevolence...trust factors: ability, benevolence, integrity – Cultural: Malaysian, Australian, American ( collectivistic , individualistic )  Behavioural Measures

  7. 77 FR 60732 - PACE Select Advisors Trust and UBS Global Asset Management (Americas) Inc.; Notice of Application

    Science.gov (United States)

    2012-10-04

    ... Select Advisors Trust and UBS Global Asset Management (Americas) Inc.; Notice of Application September 27... Hutchins Asset Management, Inc., Investment Company Act Release Nos. 24823 (Jan. 11, 2001) (notice) and...) (order). Applicants: PACE Select Advisors Trust (the ``Trust'') and UBS Global Asset Management (Americas...

  8. Normative Multiagent Systems and Trust Dynamics

    OpenAIRE

    Boella, Guido; Torre, Leon

    2005-01-01

    htmlabstractIn this paper we use recursive modelling to formalize sanction-based obligations in a qualitative game theory. In particular, we formalize an agent who attributes mental attitudes such as goals and desires to the normative system which creates and enforces its obligations. The wishes (goals, desires) of the normative system are the commands (obligations) of the agent. Since the agent is able to reason about the normative system’s behavior, our model accounts for many ways in which...

  9. Loan managers' decisions and trust in entrepreneurs in different institutional contexts

    DEFF Research Database (Denmark)

    Moro, Andrea; Fink, Matthias; Maresch, Daniela

    2018-01-01

    Loan managers’ trust in entrepreneurs can be a useful tool for overcoming entrepreneurial firms’ opaqueness. Nevertheless, the possibility for loan managers to leverage trust can be affected by differences in the regulative institutions within the banks (type of bank) and by place-bound normative...

  10. Normative Multiagent Systems and Trust Dynamics

    NARCIS (Netherlands)

    G. Boella (Guido); L.W.N. van der Torre (Leon)

    2005-01-01

    htmlabstractIn this paper we use recursive modelling to formalize sanction-based obligations in a qualitative game theory. In particular, we formalize an agent who attributes mental attitudes such as goals and desires to the normative system which creates and enforces its obligations. The wishes

  11. The impact of leader behaviour on trust in management and co-workers

    Directory of Open Access Journals (Sweden)

    Deanne N. den Hartog

    2002-10-01

    Full Text Available Within organizations, trust is essential for cooperation. One important form of trust is employees’ generalizing of trust in management and co-workers. Leaders may have an important role in enhancing such trust. Previous studies have linked transformational leadership with employees’ trust in their leader. In this study, we test whether such leadership is also related to trust in generalized others (management and co-workers. As expected, trust in the leader and management were highly positively related to transformational and less so to transactional. The same pattern was found for trust in colleagues, although these relationships were less strong. Opsomming Vertroue is onontbeerlik vir samewerking in organisasies. Een vorm van vertroue wat belangrik is, is werknemers se veralgemening van vertroue in bestuur en medewerkers. Bestuur mag ‘n belangrike rol hê om dié vertroue te versterk. Vorige studies het transformasieleierskap gekoppel aan werknemers se vertroue in hul bestuurder. In hierdie studie word getoets of transformasieleierskap ‘n verband toon met die veralgemening van vertroue (bestuur en medewerkers. Soos verwag, het vertroue in die leier en vertroue in medewerkers ‘n hoogs positiewe verband getoon met transformasieleierskap. Dieselfde patroon het voorgekom by vertroue in medewerkers, alhoewel die verhouding minder sterk is.

  12. Social trust and the management of threatened and endangered species: A study of communities of interest and communities of place.

    Science.gov (United States)

    George T. Cvetkovich; Patricia L Winter

    2002-01-01

    Social trust, the willingness to rely on those with formal responsibility to develop policies and make decisions, facilitates effective management of environmental issues, including wildlife management. National polls suggest that the public trusts government agencies to solve environmental problems, yet such trust is low (or non-existent) in areas of controversy, such...

  13. Trust Evaluation for Embedded Systems Security research challenges identified from an incident network scenario

    OpenAIRE

    Gehrmann, Christian; Löfvenberg , Jacob

    2011-01-01

    This paper is about trust establishment and trust evaluations techniques. A short background about trust, trusted computing and security in embedded systems is given. An analysis has been done of an incident network scenario with roaming users and a set of basic security needs has been identified. These needs have been used to derive security requirements for devices and systems, supporting the considered scenario. Using the requirements, a list of major security challenges for...

  14. Incorporating Behavioral Trust Theory Into System Development for Ubiquitous Applications

    OpenAIRE

    Hoffmann, Holger; Söllner, Matthias

    2014-01-01

    Trust has been shown to be a key factor for technology adoption by users, that is, users prefer to use applications they trust. While existing literature on trust originating in computer science mostly revolves around aspects of information security, authentication, etc., research on trust in automation-originating from behavioral sciences-almost exclusively focuses on the sociotechnical context in which applications are embedded. The behavioral theory of trust in automation aims at explainin...

  15. Understanding Alignment of Trust Behaviors and Their Effect on Organizational Trust at the Tank-Automotive and Armaments Command Life Cycle Management Command (TACOM LCMC)

    Science.gov (United States)

    2013-03-20

    trust, organizational commitment and personal need non-fulfillment. Journal of Occupational Psychology , 53, 39-52. Covey, S. M. (2006). The speed...L., & Perles, G. S. M. (2011). Towards a more humanistic understanding of organizational trust. Journal of Management Development, 30(6), 605- 614

  16. Trust and controlling

    Directory of Open Access Journals (Sweden)

    Bieńkowska Agnieszka

    2016-12-01

    Full Text Available The purpose of this study is to discuss the trust within and towards an organisation in the context of implementation of controlling therein. In this context the essence of trust and its importance in organisation management was presented, as well as trust in the contemporary management methods and concepts. Controlling as a trust-building factor inside an organisation was pointed out. Especially controlling and control were described. Moreover management by considering deviations in controlling and the teamwork in controlling were described. The role of controlling in process of trust-building to an organisation was presented. Establishing relations with the environment and systems of measurement of organisation’s achievements were presented, too.

  17. Communication Management and Trust: Their Role in Building Resilience to "Surprises" Such As Natural Disasters, Pandemic Flu, and Terrorism

    Directory of Open Access Journals (Sweden)

    P. H. Longstaff

    2008-06-01

    Full Text Available In times of public danger such as natural disasters and health emergencies, a country's communication systems will be some of its most important assets because access to information will make individuals and groups more resilient. Communication by those charged with dealing with the situation is often critical. We analyzed reports from a wide variety of crisis incidents and found a direct correlation between trust and an organization's preparedness and internal coordination of crisis communication and the effectiveness of its leadership. Thus, trust is one of the most important variables in effective communication management in times of "surprise."

  18. Using TPM Secure Storage in Trusted High Availability Systems

    OpenAIRE

    Hell, Martin; Karlsson, Linus; Smeets, Ben; Mirosavljevic, Jelena

    2014-01-01

    We consider the problem of providing trusted computing functionality in high availability systems. We consider the case where data is required to be encrypted with a TPM protected key. For redundancy, and to facilitate high availability, the same TPM key is stored in multiple computational units, each one ready to take over if the main unit breaks down. This requires the TPM key to be migratable. We show how such systems can be realized using the secure storage of the TPM. Hundreds of million...

  19. An Appraisal Of The Operation And Management Of Unit Trust ...

    African Journals Online (AJOL)

    A lot of money is held by the public instead of being invested in shares or in money market instruments as a result of widespread financial illiteracy. Many people do not know that not only well-to-do people can invest in the shares of companies. This is because they are not aware of schemes like unit trust through which ...

  20. The effect of system aesthetics on trust, cooperation, satisfaction and annoyance in an imperfect automated system.

    Science.gov (United States)

    Weinstock, Alona; Oron-Gilad, Tal; Parmet, Yisrael

    2012-01-01

    Lack of system reliability has been repeatedly identified as a factor that decreases trust. However, aesthetics has an important role in the development of trust. Most of the research concerning the connection between aesthetics and trust focused on mobile commerce and websites while very little has been done in examining aesthetics in automated systems. This study integrated aesthetics manipulations into an imperfect in-vehicle automation system and focused on the power of aesthetics to decrease the negative effects of errors on trust, satisfaction, annoyance, and human-automation cooperation perceptions. Participants used the navigation system in either 100% or 85% accuracy levels with an aesthetic or non aesthetic system (4 conditions). In both aesthetic and non aesthetic systems, perceptions of trust, satisfaction and human automation cooperation were decreased in the imperfect system compared to the perfect one. However, in the annoyance rating, this trend was found only in the aesthetic system while in the non-aesthetic system no difference was found between the two levels of accuracy. This single effect may indicate upon the possibility that in automated systems aesthetics affects trust and satisfaction more moderately compared to mobile commerce applications and websites. However, more research is needed to assess this assumption.

  1. Trust Threshold Based Public Key Management in Mobile Ad Hoc Networks

    Science.gov (United States)

    2016-03-05

    detection 49 [6,7] , authentication, access control , key management, iso- 50 lating misbehaving nodes for effective routing [6,8,9] , and 51 many other...providing a public key requested. The reasons we pic the above three trust components are (1) with competenc trust , we assure fast propagation of...classification. As a future work direction, we 1238 plan to investigate more sophisticated fuzzy failure crite- 1239 ria as in [44–46] to further

  2. Trust in management, communication and organisational commitment: Factors influencing readiness for change management in organisation

    Science.gov (United States)

    Ahmad, Mohd Hafis; Ismail, Syuhaida; Rani, Wan Nurul Mardiah Wan Mohd; Wahab, Mohammad Hussaini

    2017-10-01

    Organisational change occurs when an organisation makes a transition from its current state to some desired future state in minimising employee resistance and cost to the organisation while simultaneously maximising the effectiveness of the change effort. This paper, aims at appraising the change management of organisation in Malaysia since limited research has been done to examine readiness for change by the employees in the organisation. This paper is materialising its objectives of (1) investigating the current practice of organisation and employees in the organisation towards change management and (2) assessing the factors influencing readiness of organisation and employees in the organisation towards change management. It is found via literature review that change management is a structured approach for ensuring that changes are thoroughly and smoothly implemented to transitioning individuals, teams, and organisations to a desired future state by focusing on the wider impacts of change, particularly on people, where change does not happen in isolation and it impacts the whole organisation. Furthermore, it is found that current practice of organisation and employees in the organisation towards change management involved in three main factors, namely trust in management, communication and organisational commitment; with the factor for trust in management is the positive vision for the future by management team, meanwhile for communication, it is found that there is good communication between supervisors and employees about the organisation's policy toward the changes. The factor found in organisational commitment is employees enjoying discussing about their organisation with outsiders. The findings of this paper provide a positive impact on change management planning, which ultimately help in ensuring more effective change programme implementation in the organisation in Malaysia.

  3. Relationship Between Cybernetics Management and Organizational Trust Among Librarians of Mazandaran University of Medical Sciences.

    Science.gov (United States)

    Ghiasi, Mitra; Shahrabi, Afsaneh; Siamian, Hasan

    2017-12-01

    Organization must keep current skills, abilities, and in the current field of competition, and move one step ahead of other competitors; for this purpose, must be a high degree of trust inside the organization. Cybernetic management is a new approach in management of organizations that its main task according to internal issues. This study aimed to investigate the relationship between cybernetics management and organizational trust among librarians of Mazandaran University of Medical Sciences. This is applied and analytical survey. which its population included all librarians of Mazandaran University of Medical Sciences, amounting to 42 people which were selected by census and participated in this research. There has no relationship between components of Cybernetics management (participative decision making, commitment, pay equity, Correct flow of information, develop a sense of ownership, online education) with organizational trust amongst librarians of Mazandaran University of Medical Sciences. And there has a significant relationship between flat Structure of cybernetics management and organizational trust. For data analysis was used Kolmogorov-Smirnov test and linear regression. There is no significant relationship between Cybernetic management and organizational trust amongst librarians of Mazandaran University of Medical Sciences.

  4. Supporting reputation based trust management enhancing security layer for cloud service models

    Science.gov (United States)

    Karthiga, R.; Vanitha, M.; Sumaiya Thaseen, I.; Mangaiyarkarasi, R.

    2017-11-01

    In the existing system trust between cloud providers and consumers is inadequate to establish the service level agreement though the consumer’s response is good cause to assess the overall reliability of cloud services. Investigators recognized the significance of trust can be managed and security can be provided based on feedback collected from participant. In this work a face recognition system that helps to identify the user effectively. So we use an image comparison algorithm where the user face is captured during registration time and get stored in database. With that original image we compare it with the sample image that is already stored in database. If both the image get matched then the users are identified effectively. When the confidential data are subcontracted to the cloud, data holders will become worried about the confidentiality of their data in the cloud. Encrypting the data before subcontracting has been regarded as the important resources of keeping user data privacy beside the cloud server. So in order to keep the data secure we use an AES algorithm. Symmetric-key algorithms practice a shared key concept, keeping data secret requires keeping this key secret. So only the user with private key can decrypt data.

  5. Trusted Domain

    DEFF Research Database (Denmark)

    Hjorth, Theis Solberg; Torbensen, Rune

    2012-01-01

    In the digital age of home automation and with the proliferation of mobile Internet access, the intelligent home and its devices should be accessible at any time from anywhere. There are many challenges such as security, privacy, ease of configuration, incompatible legacy devices, a wealth...... of wireless standards, limited resources of embedded systems, etc. Taking these challenges into account, we present a Trusted Domain home automation platform, which dynamically and securely connects heterogeneous networks of Short-Range Wireless devices via simple non-expert user. interactions, and allows...... remote access via IP-based devices such as smartphones. The Trusted Domain platform fits existing legacy technologies by managing their interoperability and access controls, and it seeks to avoid the security issues of relying on third-party servers outside the home. It is a distributed system...

  6. Trust Management System for Opportunistic Cloud Services

    DEFF Research Database (Denmark)

    Kuada, Eric

    2013-01-01

    We have over the past three years been working on the feasibility of Opportunistic Cloud Services (OCS) for enterprises. OCS is about enterprises strategically contributing and utilizing spare IT resources as cloud services. One of the major challenges that such a platform faces is data security...

  7. Understanding and managing trust at the climate science-policy interface

    Science.gov (United States)

    Lacey, Justine; Howden, Mark; Cvitanovic, Christopher; Colvin, R. M.

    2018-01-01

    Climate change effects are accelerating, making the need for appropriate actions informed by sound climate knowledge ever more pressing. A strong climate science-policy relationship facilitates the effective integration of climate knowledge into local, national and global policy processes, increases society's responsiveness to a changing climate, and aligns research activity to policy needs. This complex science-policy relationship requires trust between climate science `producers' and `users', but our understanding of trust at this interface remains largely uncritical. To assist climate scientists and policymakers, this Perspective provides insights into how trust develops and operates at the interface of climate science and policy, and examines the extent to which trust can manage — or even create — risk at this interface.

  8. Studies of transformational leadership in consumer service: leadership trust and the mediating-moderating role of cooperative conflict management.

    Science.gov (United States)

    Yang, Yi-Feng

    2012-02-01

    This is the third in a series of studies evaluating how transformational leadership is associated with related variables such as job satisfaction, change commitment, leadership trust, cooperative conflict management, and market orientation. The present paper evaluates the effects of transformational leadership and cooperative conflict management along with their mediating and moderating of leadership trust in the life insurance industry for two sample groups, sales managers and sales employees. The main effect of leadership trust was mediated and moderated by cooperative conflict management. Cooperative conflict management made a more important contribution than transformational leadership or the moderating effect (interaction), but these three together were the most important variables predicting highest leadership trust. Transformational leadership has an indirect influence on leadership trust. This work summarizes the specific contribution and importance of building successful leadership trust associations with employees in relation to leadership and satisfaction with change commitment.

  9. Trust Relationships, Naming, and Secure Communication in Large Distributed Computer Systems.

    Science.gov (United States)

    Rangan, P. Venkata

    Computing systems are evolving into distributed systems that interconnect competing organizations and individuals, and even countries, using high-speed global networks. The relationships among these entities are characterized by the need for competition and cooperation without a common trusted agent. To build such distributed systems that incorporate lack of global trust in them, it is necessary first to understand precisely what trust consists of and then to categorize it. This thesis develops an axiomatic theory of trust in distributed systems. The theory is based on model logics of belief. We present systematic methods for synthesizing protocols that implement a given trust specification. Trust is primarily required to establish channels for secure communication. We present methods for reasoning about trusts required by various channel establishment mechanisms. Channel establishment mechanisms are commonly based on either public key encryption (PKE) or single key encryption (SKE). PKE-based mechanisms require ternary trust relationships known as authenticity trusts. SKE -based mechanisms have much larger trust requirements. Starting from the differences in trust requirements of PKE and SKE, we derive several advantages of the former over the latter. Our analyses provide insight into the trust structure and limitations of various mechanisms. We show that a distributed system must provide a tree of channels at system configuration time, and that this tree also represents the system's global name space. We develop polynomial-time algorithms for synthesizing name spaces so as to satisfy an a priori given set of trust specifications. We present some interesting duality results and NP-completeness results with regard to some variations of the synthesis problems. Sample runs of the polynomial -time algorithms show that small differences in trust relationships can cause substantial differences in the structure of the name spaces. Trust requirements and the performance

  10. Technology Trust and E-Banking Adoption: The Mediating Effect of Customer Relationship Management Performance

    Directory of Open Access Journals (Sweden)

    Samsudin Wahab

    2012-01-01

    Full Text Available The electronic revolution in the Malaysian banking sector has started in the 1970's. The first visible form of electronic innovation in the Malaysian banking industry was the introduction of Automated Teller Machines in 1981. Finally, on June 1, 2000, the Malaysian Central Bank gave the green light for locally owned commercial banks to offer Internet banking services. Due to the drastic changes in the business environment, it leads financial institutions to revise their marketing strategies to stress long-lasting relationships with customers. Relationships is important criteria in the selection of private bank. In many conditions, customer satisfaction mediates the relationship between antecedent’s factors and marketing performance. Hence, CRM performance is about maintaining good relationship and repurchases behavior, word-of-mouth and customer retention. Trust has been studied in traditional physical commercial environments. In the marketing and management literatures, trust is strongly associated with attitudes toward products, services, and purchasing behaviors. So that, the main objective of this research paper is to investigate the role of CRM performance as the mediator in the relationship between trust and E-Banking adoption. Hence, this empirical paper confirmed the role of customer relationship management performance as the mediators in the relationship between trust and electronic banking adoption.Key words: Trust, Customer Relationship Management Performance, E-Banking Adoption

  11. Gaining Legitimacy and Losing Trust: Stakeholder Participation in Ecological Risk Assessment for Marine Protected Area Management

    OpenAIRE

    Raphael Treffny; Ruth Beilin

    2011-01-01

    This study examines the application of a qualitative Ecological Risk Assessment (ERA) tool to initiate management planning and community engagement in newly legislated Marine Protected Areas. Scientists and the agency expected the participatory element to increase the legitimacy of management by achieving consensus about management priorities as well as to engender trust in science and agency procedures. We point to the complex nature of participatory engagement when expert and lay knowledge ...

  12. Trust-Based Information Risk Management in a Supply Chain Network

    OpenAIRE

    Yanjun Zuo; Wen-Chen Hu

    2009-01-01

    Information risk management is crucial for an organization operating in an increasingly integrated and intensively communicated environment to mitigate risks and ensure core business functions. Given the open and dynamic nature of a supply chain network, information risk management is challenging and various factors must be considered. This article introduces a trust-based approach to facilitate supply chain participants to perform effective risk management. The major components of the propos...

  13. A management approach that drives actions strategically: balanced scorecard in a mental health trust case study.

    Science.gov (United States)

    Schmidt, Stefan; Bateman, Ian; Breinlinger-O'Reilly, Jochen; Smith, Peter

    2006-01-01

    Achieving excellence is a current preoccupation in U.K. public health organisations. This article aims to use a case study to explain how a mental health trust delivers excellent performance using a balanced scorecard (BSC) management approach. Reports a project to implement a BSC approach in the South West Yorkshire Mental Health NHS Trust to achieve its "excellence" objectives. The authors were participants in the project. The design of the pilot project was informed theoretically by the work of Kaplan and Norton and practically by in-house discussions on a strategy to achieve excellence. Explains the process of building a BSC strategy step-by-step. Discusses how the vision and strategies of a mental health trust can be translated into tangible measures, which are the basis for actions that are driven strategically. There are many possibilities for a BSC management approach and this case study is specific to mental health trusts in the UK, although it is believed that the case has a universally applicable modus operandi. This article will help healthcare managers to evaluate the benefits of a BSC management approach. This article explains how actions can be structured in connection with a BSC management approach.

  14. The Effects of Parental Involvement, Trust in Parents, Trust in Students and Pupil Control Ideology on Conflict Management Strategies of Early Childhood Teachers

    Science.gov (United States)

    Karakus, Mehmet; Savas, Ahmet Cezmi

    2012-01-01

    In this study it was aimed to determine the effects of parental involvement, teachers' trust in parents and students, and teachers' pupil control ideology on the conflict management strategies used by teachers in classroom management. Data were collected from a sample of 254 teachers through paper and pencil questionnaires. Data were analyzed with…

  15. 78 FR 23318 - Trust for Professional Managers and Aurora Investment Management L.L.C.; Notice of Application

    Science.gov (United States)

    2013-04-18

    ... subadvisory agreements (``Subadvisory Agreements'') with Chicago Fundamental Investment Partners, LLC, First... COMMISSION Trust for Professional Managers and Aurora Investment Management L.L.C.; Notice of Application... application under section 6(c) of the Investment Company Act of 1940 (``Act'') for an exemption from section...

  16. 36 CFR 1011.9 - When will the Presidio Trust transfer a debt to the Financial Management Service for collection?

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false When will the Presidio Trust transfer a debt to the Financial Management Service for collection? 1011.9 Section 1011.9 Parks, Forests... When will the Presidio Trust transfer a debt to the Financial Management Service for collection? (a...

  17. Trust and management : Explaining cross-national differences in work autonomy

    NARCIS (Netherlands)

    van Hoorn, A.A.J.

    2013-01-01

    We open the black box of what goes on in firms in terms of management of their operations. Work autonomy is a key aspect of firm organization and we test the hypothesis that societal trust affects the level of autonomy that firms grant to their employees. Analysis of up to 189,213 individuals from

  18. The Relationship among Interactional Justice, Manager Trust and Teachers' Organizational Silence Behavior

    Science.gov (United States)

    Yangin, Demet; Elma, Cevat

    2017-01-01

    The purpose of this study was to determine the relationship between the manager trust and interactional justice perceptions and organizational silence behaviors of those teachers who work in primary and secondary schools. The research is based on the survey model and the population consists of 4761 teachers who worked in Samsun, Turkey. The sample…

  19. Secure grid-based computing with social-network based trust management in the semantic web

    Czech Academy of Sciences Publication Activity Database

    Špánek, Roman; Tůma, Miroslav

    2006-01-01

    Roč. 16, č. 6 (2006), s. 475-488 ISSN 1210-0552 R&D Projects: GA AV ČR 1ET100300419; GA MŠk 1M0554 Institutional research plan: CEZ:AV0Z10300504 Keywords : semantic web * grid computing * trust management * reconfigurable network s * security * hypergraph model * hypergraph algorithms Subject RIV: IN - Informatics, Computer Science

  20. 78 FR 54298 - Horizons ETFs Management (USA) LLC and Horizons ETF Trust; Notice of Application

    Science.gov (United States)

    2013-09-03

    ... be marketed as an ``actively managed exchange-traded fund''. In any advertising material where... is little legislative history regarding section 22(d), its provisions, as well as those of rule 22c... Trust nor any Fund will be advertised or marketed as an open-end investment company or a mutual fund...

  1. Trust and social representations of the management of threatened and endangered species

    Science.gov (United States)

    George Cvetkovich; Patricia L. Winter

    2003-01-01

    Using quantitative analysis of questionnaire responses, observations during focus group discussions, and qualitative assessment of discussion statements, the present study examined trust and social representations of the U.S. Forest Service's management of Southern California national forests for the protection of endangered species. Supporting expectations based...

  2. 76 FR 7500 - Indian Trust Management Reform-Implementation of Statutory Changes

    Science.gov (United States)

    2011-02-10

    ... Parts 4, 30 [Docket ID: BIA-2009-0001] RIN 1076-AF07 Indian Trust Management Reform--Implementation of Statutory Changes AGENCY: Bureau of Indian Affairs, Office of the Secretary, Interior. ACTION: Interim final... changes to the Indian Land Consolidation Act, as amended by the 2004 American Indian Probate Reform Act...

  3. 76 FR 45198 - Indian Trust Management Reform-Implementation of Statutory Changes

    Science.gov (United States)

    2011-07-28

    ... Parts 4, 30 [Docket ID BIA-2009-0001] RIN 1076-AF07 Indian Trust Management Reform--Implementation of Statutory Changes AGENCY: Bureau of Indian Affairs, Office of the Secretary, Interior. ACTION: Final rule... February 10, 2011, to implement the latest statutory changes to the Indian Land Consolidation Act, as...

  4. The relationship between servant leadership and employee empowerment, commitment, trust and innovative behaviour: A project management perspective

    Directory of Open Access Journals (Sweden)

    Camilla L. Krog

    2015-10-01

    Full Text Available Orientation: Understanding the relationship between a project sponsor’s servant leadership traits and employee commitment, trust and innovative behaviour. Research purpose: This study aimed to understand the relationship, if any, between a project sponsor’s servant leadership traits of altruistic calling, emotional healing, wisdom, persuasive mapping and organisational stewardship and a project team’s empowerment, commitment, trust and innovative behaviour. Motivation of the study: Most project leadership studies focus on understanding the role and power position of the project manager, with very little research being dedicated to understanding the effect the leadership style has on the project team and project success. Research approach: A survey was conducted amongst a non-probability sample of 48 project team members from amongst a population of 257, comprising project managers, business analysts and IT staff of a medium sized fleet management organisation that is in the process of implementing an entirely new enterprise resource planning system. Main findings: Through inferential statistical analysis, using structural equation modelling and path analysis, it was determined that persuasive mapping has the strongest impact on employee innovative behaviour, followed by employee commitment and trust via the mediator of employee perceived empowerment. Wisdom and organisational stewardship had a negative impact on employee perceived empowerment. Practical/managerial implications: Project sponsors need to exhibit persuasive mapping, altruistic calling and emotional healing traits due to the significant influence that these have on employee innovative behaviour, commitment and trust, albeit through their perceived empowerment. Contribution/value-add: This study contributes to knowledge of leadership, more especially servant leadership and its significance in project management, which knowledge may contribute to project success

  5. Influence of Data and Formulas on Trust in Information from Journal Articles in an Operating Room Management Course.

    Science.gov (United States)

    Dexter, Franklin; Van Swol, Lyn M

    2016-06-01

    To make good decisions, operating room (OR) managers often act autocratically after obtaining expert advice. When such advice is provided by e-mail, attachments of research articles can be included. We performed a quasi-experimental study using an evaluation of 4 articles used in a 50-hour OR management course to assess how their content influences trust in the article's content, including its quality, usefulness, and reliability. There were (a) 2 articles containing data with specific examples of application for health systems and 2 without and (b) 2 articles containing appendices of formulas and 2 without. Some of the formulas in the readings were relatively complicated (e.g., stochastic optimization using the Lagrange method) and unlikely to be used by the subjects (i.e., they show what does not need to be done). Content complexity (±data, ±formulas) served both as sources of limitation in understanding the content and potentially as peripheral cues influencing perception of the content. The 2-page evaluation forms were generated with random sequences of articles and response items. The N = 17 subjects each completed 9 items about each of the 4 articles (i.e., answered 36 questions). The 9-item assessment of trust provided a unidimensional construct (Cronbach α, 0.94). Formulas in the articles significantly increased trust in the information (P = 0.0019). Presence of data did not significantly influence trust (P = 0.15). Therefore, when an expert sends e-mail to a manager who has completed this basic OR management science and asks a question, choosing a paper with formulas has no disadvantage.

  6. Earning public trust and confidence: Requisites for managing radioactive wastes. Final report

    International Nuclear Information System (INIS)

    1993-11-01

    The Task Force on Radioactive Waste Management was created in April 1991 by former Secretary James D. Watkins, who asked the group to analyze the critical institutional question of how the Department of Energy (DOE) might strengthen public trust and confidence in the civilian radioactive waste management program. The panel met eight times over a period of 27 months and heard formal presentations from nearly 100 representatives of state and local governments, non-governmental organizations, and senior DOE Headquarters and Field Office managers. The group also commissioned a variety of studies from independent experts, contracted with the National Academy of Sciences and the National Academy of Public Administration to hold workshops on designing and leading trust-evoking organizations, and carried out one survey of parties affected by the Department's radioactive waste management activities and a second one of DOE employees and contractors

  7. Earning public trust and confidence: Requisites for managing radioactive wastes. Final report

    Energy Technology Data Exchange (ETDEWEB)

    1993-11-01

    The Task Force on Radioactive Waste Management was created in April 1991 by former Secretary James D. Watkins, who asked the group to analyze the critical institutional question of how the Department of Energy (DOE) might strengthen public trust and confidence in the civilian radioactive waste management program. The panel met eight times over a period of 27 months and heard formal presentations from nearly 100 representatives of state and local governments, non-governmental organizations, and senior DOE Headquarters and Field Office managers. The group also commissioned a variety of studies from independent experts, contracted with the National Academy of Sciences and the National Academy of Public Administration to hold workshops on designing and leading trust-evoking organizations, and carried out one survey of parties affected by the Department`s radioactive waste management activities and a second one of DOE employees and contractors.

  8. A Trusted Computing Architecture of Embedded System Based on Improved TPM

    Directory of Open Access Journals (Sweden)

    Wang Xiaosheng

    2017-01-01

    Full Text Available The Trusted Platform Module (TPM currently used by PCs is not suitable for embedded systems, it is necessary to improve existing TPM. The paper proposes a trusted computing architecture with new TPM and the cryptographic system developed by China for the embedded system. The improved TPM consists of the Embedded System Trusted Cryptography Module (eTCM and the Embedded System Trusted Platform Control Module (eTPCM, which are combined and implemented the TPM’s autonomous control, active defense, high-speed encryption/decryption and other function through its internal bus arbitration module and symmetric and asymmetric cryptographic engines to effectively protect the security of embedded system. In our improved TPM, a trusted measurement method with chain model and star type model is used. Finally, the improved TPM is designed by FPGA, and it is used to a trusted PDA to carry out experimental verification. Experiments show that the trusted architecture of the embedded system based on the improved TPM is efficient, reliable and secure.

  9. Trust-Enhanced Recommender Systems for Efficient On-Line Collaboration

    Science.gov (United States)

    Pitsilis, Georgios

    Trust has been explored by many researchers in the past as a solution for assisting the process of recommendation production. In this work we are examining the feasibility of building networks of trusted users using the existing evidence that would be provided by a standard recommender system. As there is lack of models today that could help in finding the relationship between trust and similarity we build our own that uses a set of empirical equations to map similarity metrics into Subjective Logic trust. In this paper we perform evaluation of the proposed model as being a part of a complete recommender system. Finally, we present the interesting results from this evaluation that shows the performance and benefits of our trust modeling technique as well as its impact on the user community as it evolves over time.

  10. Nuclear Waste Management, Nuclear Power, and Energy Choices Public Preferences, Perceptions, and Trust

    CERN Document Server

    Greenberg, Michael

    2013-01-01

    Hundreds of studies have investigated public perceptions and preferences about nuclear power, waste management, and technology. However there is clear lack of uniformity in the style, aims and methods applied.  Consequently, the body of results is inconsistent and it is difficult to isolate relevant patterns or interpretations. Nuclear Waste Management, Nuclear Power and Energy Choices: Public Preferences, Perceptions and Trust presents a theoretical base for public reactions then classifies and reviews the large body of surveys carried out over the past decade.   Particular focus is placed on residents within 50 miles US nuclear waste facilities due to the disproportionate presence of nuclear factors in their lives such as the legacy of nuclear waste disposal and job dependency. The motivations and reasons for their views such as fear, attraction to the economic benefits, trust of site managers and federal agencies, cultural views, personal history, and demographic attributes of the people are also conside...

  11. Rethinking trust.

    Science.gov (United States)

    Kramer, Roderick M

    2009-06-01

    Will we ever learn? We'd barely recovered from Enron and WorldCom before we faced the subprime mortgage meltdown and more scandals that shook our trust in businesspeople. Which raises the question: Do we trust too much? In this article, Stanford professor and social psychologist Kramer explores the reasons we trust so easily--and, often, so unwisely. He explains that genetics and childhood learning make us predisposed to trust and that it's been a good survival mechanism. That said, our willingness to trust makes us vulnerable. Our sense of trust kicks in on remarkably simple cues, such as when people look like us or are part of our social group. We also rely on third parties to verify the character of others, sometimes to our detriment (as the victims of Bernard Madoff learned). Add in our illusions of invulnerability and our tendencies to see what we want to see and to overestimate our own judgment, and the bottom line is that we're often easily fooled. We need to develop tempered trust. For those who trust too much, that means reading cues better; for the distrustful, it means developing more receptive behaviors. Everyone should start with small acts of trust that encourage reciprocity and build up. Having a hedge against potential abuses also helps. Hollywood scriptwriters, for instance, register their treatments with the Writers Guild of America to prevent their ideas from being stolen by the executives they pitch. To attract the right relationships, people must strongly signal their own honesty, proactively allay concerns, and, if their trust is abused, retaliate. Trusting individuals in certain roles, which essentially means trusting the system that selects and trains them, also works but isn't foolproof. And don't count on due diligence alone for protection; constant vigilance is needed to make sure the landscape hasn't changed.

  12. Lack of Trust in the Health-Care System After Losing a Child to Suicide.

    Science.gov (United States)

    Pettersen, Rossana; Omerov, Pernilla; Steineck, Gunnar; Titelman, David; Dyregrov, Atle; Nyberg, Tommy; Nyberg, Ullakarin

    2015-01-01

    Lack of trust in the health-care system after losing a child to suicide may prevent bereaved parents from seeking professional treatment when needed, thus diminishing their chances of recovery. This is the first large study to aim at evaluating the incidence of lack of trust in the health-care system and associated variables in suicide-bereaved parents. This nationwide population-based survey included 569 parents who lost a child to suicide 2-5 years earlier and a matched comparison group of 326 nonbereaved parents. Using a study-specific questionnaire, we asked bereaved and nonbereaved parents if they trusted the health-care system and measured psychological and background variables. Prevalence of lack of trust in the health-care system differed between the bereaved (46.5%) and the nonbereaved parents (18.3%), giving a relative risk of 2.5 (95% CI = 2.0-3.3). After multivariable modeling, high scores of depression, living in big cities, and being single were identified as variables associated with lack of trust in suicide-bereaved parents. Suicide-bereaved parents show lack of trust in the health-care system. We present possible effect modifiers that may be considered in professional interventions aiming at influencing suicide-bereaved parents' level of trust.

  13. Exploring pathways for building trust in vaccination and strengthening health system resilience

    Directory of Open Access Journals (Sweden)

    Sachiko Ozawa

    2016-11-01

    Full Text Available Abstract Background Trust is critical to generate and maintain demand for vaccines in low and middle income countries. However, there is little documentation on how health system insufficiencies affect trust in vaccination and the process of re-building trust once it has been compromised. We reflect on how disruptions to immunizations systems can affect trust in vaccination and can compromise vaccine utilization. We then explore key pathways for overcoming system vulnerabilities in order to restore trust, to strengthen the resilience of health systems and communities, and to promote vaccine utilization. Methods Utilizing secondary data and a review of the literature, we developed a causal loop diagram (CLD to map the determinants of building trust in immunizations. Using the CLD, we devised three scenarios to illustrate common vulnerabilities that compromise trust and pathways to strengthen trust and utilization of vaccines, specifically looking at weak health systems, harmful communication channels, and role of social capital. Spill-over effects, interactions and other dynamics in the CLD were then examined to assess leverage points to counter these vulnerabilities. Results Trust in vaccination arises from the interactions among experiences with the health system, the various forms of communication and social capital – both external and internal to communities. When experiencing system-wide shocks such as the case in Ebola-affected countries, distrust is reinforced by feedback between the health and immunization systems where distrust often lingers even after systems are restored and spills over beyond vaccination in the broader health system. Vaccine myths or anti-vaccine movements reinforce distrust. Social capital – the collective value of social networks of community members – plays a central role in increasing levels of trust. Conclusions Trust is important, yet underexplored, in the context of vaccine utilization. Using a CLD to

  14. 77 FR 34095 - Federated Investment Management Company and Federated ETF Trust; Notice of Application

    Science.gov (United States)

    2012-06-08

    ... other participant in the Continuous Net Settlement System of the National Securities Clearing... procedures described below and will generally be redeemed in-kind. However, the Trust reserves the right to...; (b) for minor differences when rounding is necessary to eliminate fractional shares or lots that are...

  15. Review of Trusted Computer System Evaluation Criteria of Some Countries (USA, Canada, EC

    Directory of Open Access Journals (Sweden)

    Natalia Mikhailovna Nikiforova

    2013-02-01

    Full Text Available In the paper a brief review of the evolution in developing and designing trusted computer system evaluation criteria from specific national to common international standards is given/suggested.

  16. Information Technology Convergence, Secure and Trust Computing, and Data Management ITCS 2012 & STA 2012

    CERN Document Server

    Kim, Jongsung; Zou, Deqing; Lee, Yang

    2012-01-01

    ITCS 2012 and STA 2012 address the various theories and practical applications of information technology convergence, secure and trust computing, and data management in future environments. It will present important results of significant value to solve the application services and various problems within the scope of ITCS 2012 & STA 2012. In addition, we expect it will trigger further related research and technology developments which will improve our lives in the future.

  17. Self-organized key management with trusted certificate exchange in MANET

    Directory of Open Access Journals (Sweden)

    Saju P John

    2015-03-01

    Full Text Available In MANET, security is more challenging due to problems related to key exchange. It is necessary to secure the exchanges in MANETs for assuring the development of services in the network. The self-organized MANET is visualized as a key communication technology enabler for application such as network centric warfare, disaster relief operations, emergency situations, and intelligent transportation systems. In this paper, we propose a self-organized key management technique coupled with trusted certificate exchange for mobile ad hoc networks. The proposed architecture consists of one coordinator node, servers and normal mobile nodes. The coordinator acts as a mediator for transmitting the message among the servers and mobile nodes. Each node generates its own public/private key pairs using server-signed public keying technique. Then multi-path certificate exchange technique is employed where public key of the nodes is certified by different nodes. Those nodes that issued the certificates are validated using the Eigen Vector Reputation Centrality. By simulation results, we show that the proposed approach improves security.

  18. Trust in Social Computing

    Science.gov (United States)

    2014-04-07

    items that match their preferences ─ Only depending on users’ past behaviors ─ Memory -based CF and Model-based CF Trust in Social Computing Arizona...Systems  Memory -based Trust-aware Recommender Systems Evaluation Trust in Social Computing Arizona State University Data Mining and Machine...Recommender Systems  Memory -based Trust-aware Recommender Systems Evaluation Trust in Social Sciences Computational Understanding of

  19. Trust and management-to-employee communication in Slovenian companies: Some evidence from the current economic crisis

    Directory of Open Access Journals (Sweden)

    Maja Makovec Brenčič

    2011-01-01

    Full Text Available This paper analyzes the importance of trust and management-to-employee communication among top Slovenian employers from the Golden Thread Survey. The paper analyzes the changes and impact of the deteriorating external economic situation on (a company-employee relational trust, and on the (b perceived importance of “trust and long-term relationships with the company in the eyes of the customer” by respondent managers. Furthermore, our analysis also looks at the impact of management-to-employee communication on both trust perspectives. The results show a stable level of company-employee relational trust in the face of the current economic crisis, despite a high level of perceived organizational process changes and a sharp decline in financial performance. On the other hand, the perceived importance of “trust and long-term relationships with the company in the eyes of the customer” has increased substantially as the crisis has deepened, supporting our claim that relationships and the external relationship orientation gain importance in the time of crisis. There is also a strong link between the degree of open and frequent management-to-employee communication, and both perspectives of measured trust among top Slovenian employers.

  20. Towards a Model of Open and Reliable Cognitive Multiagent Systems: Dealing with Trust and Emotions

    Directory of Open Access Journals (Sweden)

    Ricardo SILVEIRA

    2016-06-01

    Full Text Available  Open multiagent systems are those in which the agents can enter or leave the system freely. In these systems any entity with unknown intention can occupy the environment. For this scenario trust and reputation mechanisms should be used to choose partners in order to request services or delegate tasks. Trust and reputation models have been proposed in the Multiagent Systems area as a way to assist agents to select good partners in order to improve interactions between them. Most of the trust and reputation models proposed in the literature take into account their functional aspects, but not how they affect the reasoning cycle of the agent. That is, under the perspective of the agent, a trust model is usually just a “black box” and the agents usually does not take into account their emotional state to make decisions as well as humans often do. As well as trust, agent’s emotions also have been studied with the aim of making the actions and reactions of the agents more like those of humans being in order to imitate their reasoning and decision making mechanisms. In this paper we analyse some proposed models found in the literature and propose a BDI and multi-context based agent model which includes emotional reasoning to lead trust and reputation in open multiagent systems.

  1. Online reputation systems: The effects of feedback comments and reactions on building and rebuilding trust in online auctions

    NARCIS (Netherlands)

    Utz, S.; Matzat, U.; Snijders, C.

    2009-01-01

    Previous research on reputation systems primarily focused on their trust-building function. The present research addresses their trust-rebuilding function-specifically, the role of the short text comments given in reaction to negative feedback. Rebuilding trust is often necessary because on-line

  2. Dynamic trust in  implementation of large information systems -  conceptualized by features from Giddens Theory of Modernity

    DEFF Research Database (Denmark)

    Schlichter, Bjarne Rerup

    2010-01-01

    in which trust is created. This paper suggests a dynamic model, based on features of Anthony Giddens's theory of modernity, to provide insight into how trust is created dynamically and how trust influences the implementation of Integrated Healthcare Information Systems in a Faroese healthcare case...

  3. Trust and Punishment

    NARCIS (Netherlands)

    Etalle, Sandro; den Hartog, Jeremy; Marsh, S.

    2007-01-01

    In recent years we have witnessed a great increase in the interest in Trust Management (TM) techniques both from the industrial and the academic sectors. The booming research has also determined a duality in the very definition of TM system which can lead to confusion. In one of the two categories

  4. Know what you trust

    NARCIS (Netherlands)

    Spiessens, F.; den Hartog, Jeremy; Etalle, Sandro; Degano, P.; Guttman, J. D.; Martinelli, F.

    2009-01-01

    In Decentralized Trust Management (DTM) authorization decisions are made by multiple principals who can also delegate decisions to each other. Therefore, a policy change of one principal will often affect who gets authorized by another principal. In such a system of influenceable authorization a

  5. Trust and controlling

    OpenAIRE

    Bieńkowska Agnieszka; Zabłocka-Kluczka Anna

    2016-01-01

    The purpose of this study is to discuss the trust within and towards an organisation in the context of implementation of controlling therein. In this context the essence of trust and its importance in organisation management was presented, as well as trust in the contemporary management methods and concepts. Controlling as a trust-building factor inside an organisation was pointed out. Especially controlling and control were described. Moreover management by considering deviations in controll...

  6. Survey of Customers’ Conceptions of Security and Trust in E-Payment System

    OpenAIRE

    Fakhraddin Maroofi; Reza Hashemi; Zohre Nargesi

    2012-01-01

    In this study, we examine issues related to e-payment security from the viewpoint of customers. This study proposes a conceptual model that delineates the determinants of consumers’ observed security and observed trust, as well as the effects of observed security and observed trust on the use of e-payment systems. To test the model, structural equation modeling is employed to analyze data collected from 219 respondents in Iran. This research provides a theoretical foundation for academics and...

  7. Trust in Automated Systems: The Effect of Automation Level on Trust Calibration

    Science.gov (United States)

    2011-06-01

    Verplank, 1978) ..................... 2  Table 2.  Fitts ’ List (From Fitts , 1951) ................................................................ 10...automation may not be programmed to adapt, leading to a catastrophic failure for which the human supervisor is not prepared. For example, the DoD UAS...systems” (DAF, 2009b). According to the Defense Acquisition University, training program design uses “analyses, methods, and tools to ensure systems

  8. Secure Trust Based Key Management Routing Framework for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jugminder Kaur

    2016-01-01

    Full Text Available Security is always a major concern in wireless sensor networks (WSNs. Several trust based routing protocols are designed that play an important role in enhancing the performance of a wireless network. However they still have some disadvantages like limited energy resources, susceptibility to physical capture, and little protection against various attacks due to insecure wireless communication channels. This paper presents a secure trust based key management (STKF routing framework that establishes a secure trustworthy route depending upon the present and past node to node interactions. This route is then updated by isolating the malicious or compromised nodes from the route, if any, and a dedicated link is created between every pair of nodes in the selected route with the help of “q” composite random key predistribution scheme (RKPS to ensure data delivery from source to destination. The performance of trust aware secure routing framework (TSRF is compared with the proposed routing scheme. The results indicate that STKF provides an effective mechanism for finding out a secure route with better trustworthiness than TSRF which avoids the data dropping, thereby increasing the data delivery ratio. Also the distance required to reach the destination in the proposed protocol is less hence effectively utilizing the resources.

  9. Anomaly Detection for Internet of Vehicles: A Trust Management Scheme with Affinity Propagation

    Directory of Open Access Journals (Sweden)

    Shu Yang

    2016-01-01

    Full Text Available Anomaly detection is critical for intelligent vehicle (IV collaboration. Forming clusters/platoons, IVs can work together to accomplish complex jobs that they are unable to perform individually. To improve security and efficiency of Internet of Vehicles, IVs’ anomaly detection has been extensively studied and a number of trust-based approaches have been proposed. However, most of these proposals either pay little attention to leader-based detection algorithm or ignore the utility of networked Roadside-Units (RSUs. In this paper, we introduce a trust-based anomaly detection scheme for IVs, where some malicious or incapable vehicles are existing on roads. The proposed scheme works by allowing IVs to detect abnormal vehicles, communicate with each other, and finally converge to some trustworthy cluster heads (CHs. Periodically, the CHs take responsibility for intracluster trust management. Moreover, the scheme is enhanced with a distributed supervising mechanism and a central reputation arbitrator to assure robustness and fairness in detecting process. The simulation results show that our scheme can achieve a low detection failure rate below 1%, demonstrating its ability to detect and filter the abnormal vehicles.

  10. 75 FR 51507 - WisdomTree Asset Management, Inc., and WisdomTree Trust; Notice of Application

    Science.gov (United States)

    2010-08-20

    ...] WisdomTree Asset Management, Inc., and WisdomTree Trust; Notice of Application August 13, 2010. AGENCY... subadvisory agreements without shareholder approval. Applicants: WisdomTree Asset Management, Inc (``WTAM'' or... investment program for each Fund and providing continuous investment management for each Fund's assets. As...

  11. Building Trust in Natural Resource Management Within Local Communities: A Case Study of the Midewin National Tallgrass Prairie

    Science.gov (United States)

    Davenport, Mae A.; Leahy, Jessica E.; Anderson, Dorothy H.; Jakes, Pamela J.

    2007-03-01

    Communities neighboring federally protected natural areas regularly weigh the costs and benefits of the administering agency’s programs and policies. While most agencies integrate public opinion into decision making, efforts to standardize and formalize public involvement have left many local communities feeling marginalized, spurring acrimony and opposition. A significant body of research has examined barriers to effective public participation as well as strategies for relationship building in planning processes; many of which point to trust as a key factor. Trust is especially tenuous in local communities. This paper explores perceptions of trust, expectations for management, as well as constraints to building trust. In-depth interviews were conducted with 21 community members and USDA Forest Service personnel at the Midewin National Tallgrass Prairie in northeastern Illinois. The interviews revealed that trust is perceived as important to effective management. Distinct expectations for management outcomes and processes emerged, including the values, knowledge, and capacity demonstrated in management decisions and actions and opportunities provided for communication, collaboration, and cooperation within the agency-community relationship. The case study identified several constraints to building trust, including competing values, knowledge gaps, limited community engagement, and staff turnover.

  12. Analogical Trust Reasoning

    Science.gov (United States)

    Tavakolifard, Mozhgan; Herrmann, Peter; Öztürk, Pinar

    Trust is situation-specific and the trust judgment problem with which the truster is confronted might be, in some ways, similar but not identical to some problems the truster has previously encountered. The truster then may draw information from these past experiences useful for the current situation. We present a knowledge-intensive and model-based case-based reasoning framework that supports the truster to infer such information. The suggested method augments the typically sparse trust information by inferring the missing information from other situational conditions, and can better support situation-aware trust management. Our framework can be coupled with existing trust management models to make them situation-aware. It uses the underlying model of trust management to transfer trust information between situations. We validate the proposed framework for Subjective Logic trust management model and evaluate it by conducting experiments on a large real dataset.

  13. THE TRUST INSTITUTION ROLE IN THE MANAGEMENT OF COMMUNICATIONS IN SOCIAL PROJECT

    Directory of Open Access Journals (Sweden)

    Ирина Николаевна КАДЫКОВА

    2015-05-01

    Full Text Available The authors propose expansion of the social projects classification on the basis of the magnitude of the projects products impact on the society, focusing on their role in the development of the state. The authors accept Russell D. Archibald projects classification as a whole, and expand it. Two subcategory are allocated ("social applied projects" and "socio-forming projects". Comparison was conducted on a number of indicators (project volume, project complexity, level of project risk and so on.. The innovativeness of innovative social-forming projects is identified. They are innovative in that aim formation / change of public opinion. The role of the institute of trust in building of effective system of social project communication is defined. The trust has a significant impact on the timing of the socio-forming projects. Identify priority communication channel for innovative projects of the social spectrum - online social network.

  14. 78 FR 2363 - Notification of Deletion of a System of Records; Automated Trust Funds Database

    Science.gov (United States)

    2013-01-11

    ... Database AGENCY: Animal and Plant Health Inspection Service, USDA. ACTION: Notice of deletion of a system... establishing the Automated Trust Funds (ATF) database system of records. The Federal Information Security... Integrity Act of 1982, Public Law 97-255, provided authority for the system. The ATF database has been...

  15. Trust matters

    DEFF Research Database (Denmark)

    Østergaard, Lise Rosendal

    2015-01-01

    This article makes a contribution to the debate about health service utilisation and the role of trust in fostering demand for health services in sub-Saharan Africa. It is framed as a narrative literature review based on a thematic analysis of nine empirical, qualitative studies. For the purposes...... of this article trust is defined as a voluntary course of action, which involves the optimistic expectation that the trustee will do no harm to the trustor and is increasingly perceived as an important influence on health system functioning. The article looks at trust issues in interpersonal, intergroup...... and institutional situations. The findings of the review point to four elements that are important for trust to develop in health sector relationships: the sensitive use of discretionary power by health workers, perceived empathy by patients of the health workers, the quality of medical care and workplace...

  16. Modelling End-User of Electronic-Government Service: The Role of Information quality, System Quality and Trust

    Science.gov (United States)

    Witarsyah Jacob, Deden; Fudzee, Mohd Farhan Md; Aizi Salamat, Mohamad; Kasim, Shahreen; Mahdin, Hairulnizam; Azhar Ramli, Azizul

    2017-08-01

    Many governments around the world increasingly use internet technologies such as electronic government to provide public services. These services range from providing the most basic informational website to deploying sophisticated tools for managing interactions between government agencies and beyond government. Electronic government (e-government) aims to provide a more accurate, easily accessible, cost-effective and time saving for the community. In this study, we develop a new model of e-government adoption service by extending the Unified Theory of Acceptance and Use of Technology (UTAUT) through the incorporation of some variables such as System Quality, Information Quality and Trust. The model is then tested using a large-scale, multi-site survey research of 237 Indonesian citizens. This model will be validated by using Structural Equation Modeling (SEM). The result indicates that System Quality, Information Quality and Trust variables proven to effect user behavior. This study extends the current understanding on the influence of System Quality, Information Quality and Trust factors to researchers, practitioners, and policy makers.

  17. The Influence Of Franchisors Brand Image On Franchisee Trust And Its Impact On Franchisee Intention To Remain In Franchise System

    Directory of Open Access Journals (Sweden)

    Erlinda

    2015-08-01

    Full Text Available Franchisee is the party that play important role in the franchising because most of franchise outlets managed and operated by franchisees. Nevertheless in the process of business operating there would be the conflict of interests between franchisor as the owner of brand with the franchisee as the buyer of franchisors brand to operating retail outlet.and bound with futures contract. Therefore franchisee trust is needed in order to maintain franchisee intention to remain in franchise system. One of the most important elements in franchising is franchisors brand image because basically franchise is selling the brand. Therefore this study aims to examine franchisee intention to remain in franchise system through franchisee trust that influenced by franchisors brand image. This study is conducted in Aceh province Indonesia. Using causality-explanatory approach with primary data in the form of perception opinions and attitude of 134 franchisees as individual research object. The method of data collection is survey using questionnaire. Regarding time dimension is one shot study. Partial Least Square is used to analyze the data. The result shows that franchisors brand image have a positive significant influence greater through franchisee trust than a direct influence of franchisors brand image to franchisee intention to remain in franchise system.

  18. Early experiences with the multidose drug dispensing system – A matter of trust?

    Science.gov (United States)

    Wekre, Liv Johanne; Melby, Line; Grimsmo, Anders

    2011-01-01

    Objective To study early experiences with multidose drug dispensing (MDD) among different groups of health personnel. Design Qualitative study based on focus-group interviews. Setting Primary health care, Trondheim, Norway. Main outcome The importance of trust in the technology and in collaborating partners is actualized in the early implementation of MDD. Results GPs, home-care nurses, pharmacists, and medical secretaries trusted the new MDD technology. The quality of the GPs’ medication records improved. However, health personnel, including the GPs themselves, would not always trust the medication records of the GPs. Checking the multidose bags arriving from the pharmacy was considered unnecessary in the written routines dealing with MDD. However, home-care nurses experienced errors and continued to manually check the bags. Nurses in the home-care service felt a loss of knowledge with regard to the patients’ medications and in turn experienced reduced ability to give medical information to patients and to observe the effects of the drugs. The home-care services’ routines for drug handling were not always trusted by the other groups of health personnel involved. Conclusion Health personnel faced some challenges during the implementation of the MDD system, but most of them remained confident in the new system. Building trust has to be a process that runs in parallel with the introduction of new technology and the establishment of new routines for improving the quality in handling of medicines and to facilitate better cooperation and communication. PMID:21323496

  19. From transformative learning to social change? Using action research to explore and improve informal complaints management in an NHS trust

    Directory of Open Access Journals (Sweden)

    Anki Odelius

    2015-05-01

    Full Text Available Background: The number of complaints from patients and/or carers concerning aspects of care has increased over time. Yet, in spite of a growing body of national and international literature on healthcare complaints, there is a lack of knowledge around how nurses and midwives manage informal complaints at ward level, or staff needs in relation to this. Aim: Using an action research approach with mixed methods, four phases and four cycles, the aim was to explore informal complaints management by nurses and midwives at ward level. We discuss the action research process primarily in connection with learning and service change, drawing from the qualitative data in this paper. Findings: The analysis of the collected qualitative data resulted in three main themes, related to the complexities of complaints and complaints management, staff support needs and the existing ambiguous complaints systems, which are hard for staff and service users to negotiate. The action research approach facilitated learning and change in participants in relation to complaints management, in the collaborating trust. Conclusions: The extant body of research on complaints does not sufficiently recognise the complexity of complaints and informal complaints management, or the complaints systems that are in place. Needs-based staff training can help support staff to manage informal complaints more effectively. Implications for practice: • There needs to be recognition of the complexities involved in complaints management • Complaints systems need to be clearer for the benefit of service users and staff • Staff need training and support that is tailored to their needs to improve their response to complaints, leading to a better patient experience • Limited interventions, informed by staff needs, can lead to change and act as a catalyst for a wider change in informal complaints management

  20. RELATIONSHIP BETWEEN THE ORGANIZATIONAL COMMITMENT WITH THE TRUST TO MANAGEMENT OF THE ATHLETES

    Directory of Open Access Journals (Sweden)

    Ercan ZORBA

    2015-08-01

    Full Text Available The aim of this study is to determine whether the relationship between organizational trust and organizational commitment. In order words, is intended to determine whether an effective factor on organizational commitment of the trusth levels to management of athletes. As research data collection tool is used the short form of Organizational trust Inventory developed by Bromiley and Cummings (1996. Tüzün (2006 has turned the Turkish and has tested of scale reliability and validity using the varimax rotated factor analysis. According to Alpha (Cronbach's alpha is designated as the reliability coefficient of 0.84. The obtained data are calculated frequency and percent values. In the analysis of data was used independent sample t tes t and One - way analysis of variance (ANOVA. In addition, is used "Personal Information Form" prepared by the researcher to achieve to some personal information of participants. The universe of this study, is creating licensed athletes in sports clubs, samp le; who voluntarily agree to participate in research constitutes 240 licensed athletes from sports club in Muğla. When examined by gender and organizational commitment status, although a have higher women than men organizational commitment scores, there is no commitment levels significant difference at the 0.05 level. Organizational commitment status was higher married participants than single participants also p <0.05 level has a significant difference. According to the education level, has a significant difference p<0.05 level among organizational commitment scores. As a result, a tendency to participate in high - level statements about the participants' emotional and cognitive organizational trust can say they play. We can say that the statements were und ecided about emotional commitment. Statements regarding the normative commitment and high level of participation is seen as unstable and exhibits a high level of participation towards their continued

  1. Quality management system

    International Nuclear Information System (INIS)

    Lee, Mu Sung

    2009-08-01

    This book deals with ISO9001 quality management system which includes summary of this system such as classification of quality, principle of quality management, and definition, requirement and procedure of quality management system, introduction of ISO9001 system like model of ISO9001 quality management system, ISO certificate system, structure of ISO9001 standard, requirement of ISO9001 quality management system, process approach and documentation of system, propel cases of ISO9001 quality management system.

  2. Trust Evaluation of a System for an Activity with Subjective Logic

    OpenAIRE

    Alhadad , Nagham; Busnel , Yann; Serrano-Alvarado , Patricia; Lamarre , Philippe

    2014-01-01

    International audience; Recently,trust emerged as a momentous aspect to evaluate resources, services or persons. In our work, the trust notion focuses on a system as a whole and from the point of view of a particular user to do a particular digital activity as editing a document, mailing, chatting, etc. Our general goals are (i) to enable users to have a personal comparison of applications allowing them to do an activity such that they can choose the one satisfying their personal expectations...

  3. About the mutual trust of the employees of the penal system and convicts women

    Directory of Open Access Journals (Sweden)

    Uzlov N.D.

    2017-04-01

    Full Text Available The article presents the results of a study of trust between employees of a penal colony (inspectors and employees of the production zone, and women who are serving sentences for the crimes of 1 small and moderate, 2 such grave and particularly grave crimes. There were used a modification of the methods of assessment of trust/distrust by A. B. Kupreychenko, M. Rosenberg's Faith in People Scale, Acceptance of Others Scale by William F. Fey and J. Campbell’s Benevolence Scale. The fact of greater confidence on the part of employees of the production department to the women who are serving a sentence for a grave or especially grave crime was fixed, it was explained the specifics of their interaction in the work. The general trend to exercise greater trust by inmates to employees of the penal system was detected than their response reaction that appear of a greater degree of distrust.

  4. Trust and monitoring in governance processes: lessons from landscape management by farmers in a Dutch municipality

    NARCIS (Netherlands)

    Eshuis, J.; Woerkum, van C.M.J.

    2003-01-01

    An increasing number of scholars have recognized trust as an important factor in governance processes. However, theoretical and empirical analyses of process trust, or trust in the course and outcome of policy processes, are scarce. This paper builds a theoretical framework to further the

  5. F3TM: Flooding Factor based Trust Management Framework for secure data transmission in MANETs

    Directory of Open Access Journals (Sweden)

    Malik N. Ahmed

    2017-07-01

    Full Text Available Due to the absence of infrastructure support, secure data dissemination is a challenging task in scalable mobile ad hoc networks (MANETs environment. In most of the traditional routing techniques for MANETs, either security has not been taken into account or only one aspect of security concern has been addressed without optimizing the routing performance. This paper proposes Flooding Factor based Framework for Trust Management (F3TM in MANETs. True flooding approach is utilized to identify attacker nodes based on the calculation of trust value. Route Discovery Algorithm is developed to discover an efficient and secure path for data forwarding using Experimental Grey Wolf algorithm for validating network nodes. Enhanced Multi-Swarm Optimization is used to optimize the identified delivery path. Simulations are carried out in ns2 to assess and compare the performance of F3TM with the state-of-the-art frameworks: CORMAN and PRIME considering the metrics including delay, packet delivery ration, overhead and throughput. The performance assessment attests the reliable security of F3TM compared to the state-of-the-art frameworks.

  6. Why are Industrial Relations in Spain Competitive? Trust in Management, Union Support and Conflict Behaviour in Worker Representatives

    Directory of Open Access Journals (Sweden)

    Patricia Elgoibar

    2013-04-01

    Full Text Available In the current context of limited resources and economic, social and labour changes, organizational conflicts are becoming more and more competitive. Two possible explanations for this approach to conflict in Spain are the low trust between unions and management and the long tradition of confrontation in industrial relations. In this study we analyse the conflict pattern from worker representatives and the relation to trust in management and union support. The hypotheses are tested in a quantitative study of 719 representatives. Results show that a representatives use a competitive conflict style; b trust is negatively related to this style; and c union support is positively related to the style. We explore how societal culture and historical industrial relations tradition explain these relations.

  7. A model for (re)building consumer trust in the food system.

    Science.gov (United States)

    Wilson, Annabelle M; Withall, Elizabeth; Coveney, John; Meyer, Samantha B; Henderson, Julie; McCullum, Dean; Webb, Trevor; Ward, Paul R

    2017-12-01

    The article presents a best practice model that can be utilized by food system actors to assist with (re)building trust in the food system, before, during and after a food incident defined as 'any situation within the food supply chain where there is a risk or potential risk of illness or confirmed illness or injury associated with the consumption of a food or foods' (Commonwealth of Australia. National Food Incident Response Protocol. Commonwealth of Australia, Canberra, 2012). Interviews were undertaken with 105 actors working within the media, food industry and food regulatory settings across Australia, New Zealand (NZ) and the United Kingdom (UK). Interview data produced strategy statements, which indicated participant views on how to (re)build consumer trust in the food system. These included: (i) be transparent, (ii) have protocols and procedures in place, (iii) be credible, (iv) be proactive, (v) put consumers first, (vi) collaborate with stakeholders, (vii) be consistent, (viii) educate stakeholders and consumers, (ix) build your reputation and (x) keep your promises. A survey was designed to enable participants to indicate their agreement/disagreement with the ideas, rate their importance and provide further comment. The five strategies considered key to (re)building consumer trust were used to develop a model demonstrating best practice strategies for (re)building consumer trust in the food system before, during and after a food incident. In a world where the food system is increasingly complex, strategies for (re)building and fostering consumer trust are important. This study offers a model to do so which is derived from the views and experiences of actors working across the food industry, food regulation and the media. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  8. Semiotic Models of Trust and Usability for Agent-Managed Grid Services

    Science.gov (United States)

    French, Tim; Huang, Wei; Hill, Richard; Polovina, Simon

    This paper seeks to build upon existing work concerning the role of "soft" issues including trust and usability in the context of Grid services. Previous research has suggested that there is a trust 'gap'. Without seeking to engender intangible trust, usability needs cannot be met effectively. Trust formation is a precursor of usability not only at the point of first contact with Grid services but also as an integral part of the user experience. Whilst tangible security aspects of Grid services are relatively well understood, intangible aspects of trust, are less well developed. The contribution offered here aims to fill the trust 'gap' using Stamper's semiotic ladder. Consequently, a tailored HCI is identified to meet the usability and trust needs of a potentially diverse Grid user-community. The use of this approach is accordingly offered as means of satisfying the demands of a user-centric agent to fulfil this role.

  9. Verification of Triple Modular Redundancy Insertion for Reliable and Trusted Systems

    Science.gov (United States)

    Berg, Melanie; LaBel, Kenneth

    2016-01-01

    If a system is required to be protected using triple modular redundancy (TMR), improper insertion can jeopardize the reliability and security of the system. Due to the complexity of the verification process and the complexity of digital designs, there are currently no available techniques that can provide complete and reliable confirmation of TMR insertion. We propose a method for TMR insertion verification that satisfies the process for reliable and trusted systems.

  10. Exploring HRD in two Welsh NHS Trusts: analysing the discursive resources used by senior managers.

    Science.gov (United States)

    Sambrook, Sally

    2007-01-01

    The purpose of this paper is to examine human resource development (HRD) in the UK National Health Service (NHS), and particularly in two Welsh NHS Trusts, to help illuminate the various ways in which learning, training and development are talked about. The NHS is a complex organisation, not least with its recent devolution and separation into the four distinct countries of the UK. Within this, there are multiple and often conflicting approaches to human resource development associated with the various forms of employee, professional (nursing, medical etc.), managerial and organisational development. How people are developed is crucial to developing a modern health service, and yet, with the diverse range of health workers, HRD is a complex process, and one which receives little attention. Managers have a key role and their perceptions of HRD can be analysed through the discursive resources they employ. From an interpretivist stance, the paper employs semi-structured interviews with seven Directorate-General Managers, and adopts discourse analysis to explore how HRD is talked about in two Welsh NHS Trusts. The paper finds some of the different discourses used by different managers, including those with a nursing background and those without. It examines how they talk about HRD, and also explores their own (management) development and the impact this has had on their sense of identity. The paper highlights some of the tensions associated with HRD in the NHS, including ambiguities between professional and managerial development, the functional and physical fragmentation of HRD, conflict between a focus on performance/service delivery and the need to learn, discursive dissonance between the use of the terms training and learning, a delicate balance between "going on courses" and informal, work-related learning, inequities regarding "protected time" and discourses shifting between competition and cooperation. These tensions are exposed to help develop a shared

  11. The Influence of Trust on Project Management Practice within the Construction Industry

    Directory of Open Access Journals (Sweden)

    Scott Strahorn

    2017-03-01

    Full Text Available Given that any construction project is inherently a human endeavour, it follows that issues of trust are significant in terms of the stakeholder interactions that deliver eventual project outcomes.  Previous research indicates that the relational basis upon which projects are undertaken are intended to influence the likelihood of trusting relationships between stakeholders.  Thus, experiences of trust in a construction project environment are likely to be influenced by the contextual specifics of respective transactional and relational contracting (RC procurement mechanisms, given the divergent theoretical principles upon which they are founded.  The influence of trust has therefore been examined through the lived experiences of construction practitioners.  A phenomenological interview study consisting of thirty-five (35 participants was conducted with sensitivity to the procurement of experiences being recounted. Issues of trust were shown to be integral to stakeholder experiences in both procurement environments, with the benefits of trust acknowledged in many instances.  However, little understanding was evident regarding methods for building and maintaining trust, nor for repairing trust when problems arose. Importantly, despite the differing principles that underpin transactional and relational procurement, and particularly the contention that relational procurement would increase trust between trading partners, this was not evident; with individual personalities and appropriate risk apportionment shown to be greater influences upon the likelihood of trusting relationships.  It is reasonable to conjecture that relational contracts actually diminish the need for trust, given that the objective is to reduce uncertainty through formulaic approaches to risk distribution and reward; the absence of risk negates the need for trust.  Ultimately, the potential to deliver improved project outcomes as a result of proactive approaches to

  12. Bridge Management Systems

    DEFF Research Database (Denmark)

    Thoft-Christensen, Palle

    In this paper bridge management systems are discussed with special emphasis on management systems for reinforced concrete bridges. Management systems for prestressed concrete bridges, steel bridges, or composite bridges can be developed in a similar way.......In this paper bridge management systems are discussed with special emphasis on management systems for reinforced concrete bridges. Management systems for prestressed concrete bridges, steel bridges, or composite bridges can be developed in a similar way....

  13. 78 FR 48205 - Ranger Alternative Management, L.P. and Ranger Funds Investment Trust; Notice of Application

    Science.gov (United States)

    2013-08-07

    ... Fund will be marketed as an ``actively-managed exchange-traded fund.'' In any advertising material... proposed method of pricing Shares. Applicants maintain that while there is little legislative history... Exchange. 2. Neither the Trust nor any Fund will be advertised or marketed as an open-end investment...

  14. Development of a trusted healthcare service to support self-management and a physically active lifestyle in COPD patients

    NARCIS (Netherlands)

    Tabak, Monique; Flierman, I.; van Schooten, B.W.; Hermens, Hermanus J.

    2013-01-01

    Introduction: In chronic disease management, such as in chronic obstructive pulmonary disease (COPD), technology can play an important role to increase the quality and efficiency of care. In the THeCS project, which is part of the large Dutch COMMIT programme, we aim to develop a trusted healthcare

  15. Privacy and user trust in context-aware systems

    NARCIS (Netherlands)

    Koldijk, S.J.; Koot, G.; Neerincx, M.A.; Kraaij, W.

    2014-01-01

    Context-aware systems (CAS) that collect personal information are a general trend. This leads to several privacy considerations, which we outline in this paper. We present as use-case the SWELL system, which collects information from various contextual sensors to provide support for well-being at

  16. Applying Trusted Network Technology To Process Control Systems

    Science.gov (United States)

    Okhravi, Hamed; Nicol, David

    Interconnections between process control networks and enterprise networks expose instrumentation and control systems and the critical infrastructure components they operate to a variety of cyber attacks. Several architectural standards and security best practices have been proposed for industrial control systems. However, they are based on older architectures and do not leverage the latest hardware and software technologies. This paper describes new technologies that can be applied to the design of next generation security architectures for industrial control systems. The technologies are discussed along with their security benefits and design trade-offs.

  17. System-Level Autonomy Trust Enabler (SLATE), Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — This SBIR addresses the problem that current V&V technology provides component guarantees, but does not do well on system properties. Human acceptance of...

  18. Balancing Trust and Control

    DEFF Research Database (Denmark)

    Jagd, Søren

    This paper focuses on the leadership challenge of balancing trust and control. The relation between trust and control has for a long time been a puzzling issue for management researchers. In the paper I first show that there has been a dramatic change in the way the relation between trust....... The paper concludes by illustrating how this more fine grained understanding of the intertwining of trust and control is helpful for the understanding of the interplay of trust, control and self-control in new forms of organizations....

  19. Management Data Used to Manage the Foreign Military Sales Trust Fund

    National Research Council Canada - National Science Library

    McKinney, Terry

    1994-01-01

    The overall objective of the audit was to determine whether critical management data were available, accurate, and provided to Fund managers to operate, evaluate, and make major financial and nonfinancial decisions...

  20. Supply Chain Collaboration Roles of Interorganizational Systems, Trust, and Collaborative Culture

    CERN Document Server

    Cao, Mei

    2013-01-01

    To survive and thrive in the competition, firms have strived to achieve greater supply chain collaboration to leverage the resources and knowledge of suppliers and customers.  Internet based technologies, particularly interorganizational systems, further extend the firms’ opportunities to strengthen their supply chain partnerships and share real-time information to optimize their operations.  Supply Chain Collaboration: Roles of Interorganizational Systems, Trust, and Collaborative Culture explores the nature and characteristics, antecedents, and consequences of supply chain collaboration from multiple theoretical perspectives.  Supply Chain Collaboration: Roles of Interorganizational Systems, Trust, and Collaborative Culture conceptualizes supply chain collaboration as seven interconnecting elements including information sharing, incentive alignment, goal congruence, decision synchronization, resource sharing, as well as communication and joint knowledge creation. These seven components define the occur...

  1. Verification of Triple Modular Redundancy (TMR) Insertion for Reliable and Trusted Systems

    Science.gov (United States)

    Berg, Melanie; LaBel, Kenneth A.

    2016-01-01

    We propose a method for TMR insertion verification that satisfies the process for reliable and trusted systems. If a system is expected to be protected using TMR, improper insertion can jeopardize the reliability and security of the system. Due to the complexity of the verification process, there are currently no available techniques that can provide complete and reliable confirmation of TMR insertion. This manuscript addresses the challenge of confirming that TMR has been inserted without corruption of functionality and with correct application of the expected TMR topology. The proposed verification method combines the usage of existing formal analysis tools with a novel search-detect-and-verify tool. Field programmable gate array (FPGA),Triple Modular Redundancy (TMR),Verification, Trust, Reliability,

  2. The importance of trust and collaboration between companies to mitigate the bullwhip effect in supply chain management

    Directory of Open Access Journals (Sweden)

    Marly Mizue Kaibara de Almeida

    2017-05-01

    Full Text Available The aim of the paper is to develop a theoretical construct about the mitigation of the bullwhip effect, considering trust and collaboration in managing the supply chain. The study presents a qualitative research based on the systematic literature review, which is tested through field research, involving companies in the medical and hospital area belonging to the same supply chain. The bullwhip effect has been observed throughout the industry for many years. Several academic studies have assigned to operating causes the reason for its occurrence. Few studies have focused behavioral causes. Through this study, it appears that affective trust (honesty, mutual understanding, credibility, respect and compliance and trust in the competence (knowledge/technique, commitment in the relationship are both necessary for keeping the relationship, but without affective trust, the relationship does not develop. Moreover, an organizational culture based on trust and collaboration exchange, and knowledge related to processes and technology among businesses, contributing to the joint planning and collaboration in the information sharing occurs. Thus, aspects of behavior toward partners of supply chain companies can mitigate the operational causes of the bullwhip effect by improving information and knowledge sharing, demand forecasting, replenishment policy, and reducing the risk coordination among the chain participants.

  3. You Present like a Drug Addict: Patient and Clinician Perspectives on Trust and Trustworthiness in Chronic Pain Management

    Science.gov (United States)

    Ho, Anita; Illes, Judy

    2016-01-01

    Objective. Past research has demonstrated that trust is central to an effective therapeutic relationship, but the role of trust in chronic pain management is not well understood. The objective of this study was to provide an in-depth examination of how adults living with chronic pain negotiate trust and demonstrate trustworthiness with clinicians in therapeutic encounters. Methods. This qualitative study focused on adults living in an urban setting in British Columbia, Canada. Semi-structured interviews (N = 27) were conducted with participants with chronic low back pain. The results were triangulated by two feedback groups comprising re-contacted interview participants (n = 4) and physicians with expertise in pain and addiction management (n = 6). Results. Grounded theory analysis of the adult patient interviews and feedback groups yielded four major themes: 1) threats to trustworthiness and iatrogenic suffering; 2) communicating the invisible and subjective condition of chronic pain; 3) motive, honesty, and testimony; and 4) stigmatized identities. The following two themes emerged from the analysis of the physician feedback group: 1) challenges of the practice context, and 2) complicated clinical relationships. Conclusions. We found that perceived trustworthiness is important in therapeutic encounters as it helps to negotiate tensions with respect to subjective pain symptoms, addiction, and prescription opioid use. An attitude of epistemic humility may help both clinicians and patients cultivate a trustworthy clinical environment, manage the challenges associated with uncertain testimony, place trust wisely, and promote optimal pain care. PMID:26759389

  4. Trust-Based Cooperative Social System Applied to a Carpooling Platform for Smartphones

    Directory of Open Access Journals (Sweden)

    Cándido Caballero-Gil

    2017-01-01

    Full Text Available One of the worst traffic problems today is the existence of huge traffic jams in almost any big city, produced by the large number of commuters using private cars. This problem has led to an increase in research on the optimization of vehicle occupancy in urban areas as this would help to solve the problem that most cars are occupied by single passengers. The solution of sharing the available seats in cars, known as carpooling, is already available in major cities around the world. However, carpooling is still not considered a safe and reliable solution for many users. With the widespread use of mobile technology and social networks, it is possible to create a trust-based platform to promote carpooling through a convenient, fast and secure system. The main objective of this work is the design and implementation of a carpool system that improves some important aspects of previous systems, focusing on trust between users, and on the security of the system. The proposed system guarantees user privacy and measures trust levels through a new reputation algorithm. In addition to this, the proposal has been developed as a mobile application for devices using the Android Open Source Project.

  5. Understanding Is Key: An Analysis of Factors Pertaining to Trust in a Real-World Automation System.

    Science.gov (United States)

    Balfe, Nora; Sharples, Sarah; Wilson, John R

    2018-03-01

    This paper aims to explore the role of factors pertaining to trust in real-world automation systems through the application of observational methods in a case study from the railway sector. Trust in automation is widely acknowledged as an important mediator of automation use, but the majority of the research on automation trust is based on laboratory work. In contrast, this work explored trust in a real-world setting. Experienced rail operators in four signaling centers were observed for 90 min, and their activities were coded into five mutually exclusive categories. Their observed activities were analyzed in relation to their reported trust levels, collected via a questionnaire. The results showed clear differences in activity, even when circumstances on the workstations were very similar, and significant differences in some trust dimensions were found between groups exhibiting different levels of intervention and time not involved with signaling. Although the empirical, lab-based studies in the literature have consistently found that reliability and competence of the automation are the most important aspects of trust development, understanding of the automation emerged as the strongest dimension in this study. The implications are that development and maintenance of trust in real-world, safety-critical automation systems may be distinct from artificial laboratory automation. The findings have important implications for emerging automation concepts in diverse industries including highly automated vehicles and Internet of things.

  6. Quantifying Trust, Distrust, and Suspicion in Human-System Interactions

    Science.gov (United States)

    2015-10-26

    random music (on web) Error potential in EEG data[6]. Introduction of sudden animation (on web) Error potential in EEG data[6]. Improper symbol...Factors in Computing Systems. 2008. Florence, Italy . 3. Berka, C., et al., Real-Time Analysis of EEG Indexes of Alertness, Cognition, and Memory Acquired...Reliable Short- Form of the Positive and Negative Affect Schedule (PANAS). Journal of Cross- Cultural Psychology, 2007. 38(2). 26. Bracley, M. and P.J

  7. With directed study before a 4-day operating room management course, trust in the content did not change progressively during the classroom time.

    Science.gov (United States)

    Dexter, Franklin; Epstein, Richard H; Fahy, Brenda G; Van Swol, Lyn M

    2017-11-01

    A 4-day course in operating room (OR) management is sufficient to provide anesthesiologists with the knowledge and problem solving skills needed to participate in projects of the systems-based-practice competency. Anesthesiologists may need to learn fewer topics when the objective is, instead, limited to comprehension of decision-making on the day of surgery, We tested the hypothesis that trust in course content would not increase further after completion of topics related to OR decision-making on the day of surgery. Panel survey. A 4-day 35hour course in OR management. Mandatory assignments before classes were: 1) review of statistics at a level slightly less than required of anesthesiology residents by the American Board of Anesthesiology; and 2) reading of peer-reviewed published articles while learning the scientific vocabulary. N=31 course participants who each attended 1 of 4 identical courses. At the end of each of the 4days, course participants completed a 9-item scale assessing trust in the course content, namely, its quality, usefulness, and reliability. Cronbach alpha for the 1 to 7 trust scale was 0.94. The means±SD of scores were 5.86±0.80 after day #1, 5.81±0.76 after day #2, 5.80±0.77 after day #3, and 5.97±0.76 after day #4. Multiple methods of statistical analysis all found that there was no significant effect of the number of days of the course on trust in the content (all P≥0.30). Trust in the course content did not increase after the end of the 1st day. Therefore, statistics review, reading, and the 1st day of the course appear sufficient when the objective of teaching OR management is not that participants will learn how to make the decisions, but will comprehend them and trust in the information underlying knowledgeable decision-making. Copyright © 2017 Elsevier Inc. All rights reserved.

  8. Trust and Recommendations

    Science.gov (United States)

    Victor, Patricia; de Cock, Martine; Cornelis, Chris

    Recommendation technologies and trust metrics constitute the two pillars of trust-enhanced recommender systems. We discuss and illustrate the basic trust concepts such as trust and distrust modeling, propagation and aggregation. These concepts are needed to fully grasp the rationale behind the trust-enhanced recommender techniques that are discussed in the central part of the chapter, which focuses on the application of trust metrics and their operators in recommender systems. We explain the benefits of using trust in recommender algorithms and give an overview of state-of-the-art approaches for trust-enhanced recommender systems. Furthermore, we explain the details of three well-known trust-based systems and provide a comparative analysis of their performance. We conclude with a discussion of some recent developments and open challenges, such as visualizing trust relationships in a recommender system, alleviating the cold start problem in a trust network of a recommender system, studying the effect of involving distrust in the recommendation process, and investigating the potential of other types of social relationships.

  9. A fuzzy expert system to Trust-Based Access Control in crowdsourcing environments

    Directory of Open Access Journals (Sweden)

    Olusegun Folorunso

    2015-07-01

    Full Text Available Crowdsourcing has been widely accepted across a broad range of application areas. In crowdsourcing environments, the possibility of performing human computation is characterized with risks due to the openness of their web-based platforms where each crowd worker joins and participates in the process at any time, causing serious effect on the quality of its computation. In this paper, a combination of Trust-Based Access Control (TBAC strategy and fuzzy-expert systems was used to enhance the quality of human computation in crowdsourcing environment. A TBAC-fuzzy algorithm was developed and implemented using MATLAB 7.6.0 to compute trust value (Tvalue, priority value as evaluated by fuzzy inference system (FIS and finally generate access decision to each crowd-worker. In conclusion, the use of TBAC is feasible in improving quality of human computation in crowdsourcing environments.

  10. Trust in Digital Repositories

    Directory of Open Access Journals (Sweden)

    Elizabeth Yakel

    2013-06-01

    Full Text Available ISO 16363:2012, Space Data and Information Transfer Systems - Audit and Certification of Trustworthy Digital Repositories (ISO TRAC, outlines actions a repository can take to be considered trustworthy, but research examining whether the repository’s designated community of users associates such actions with trustworthiness has been limited. Drawing from this ISO document and the management and information systems literatures, this paper discusses findings from interviews with 66 archaeologists and quantitative social scientists. We found similarities and differences across the disciplines and among the social scientists. Both disciplinary communities associated trust with a repository’s transparency. However, archaeologists mentioned guarantees of preservation and sustainability more frequently than the social scientists, who talked about institutional reputation. Repository processes were also linked to trust, with archaeologists more frequently citing metadata issues and social scientists discussing data selection and cleaning processes. Among the social scientists, novices mentioned the influence of colleagues on their trust in repositories almost twice as much as the experts. We discuss the implications our findings have for identifying trustworthy repositories and how they extend the models presented in the management and information systems literatures.

  11. TRUST AND REPUTATION MODEL DESIGN FOR OBJECTS OF MULTI-AGENT ROBOTICS SYSTEMS WITH DECENTRALIZED CONTROL

    Directory of Open Access Journals (Sweden)

    I. A. Zikratov

    2014-03-01

    Full Text Available The problem of mechanisms design for protection of multi-agent robotics systems from attacks of robots-saboteurs is considered. Functioning analysis of these systems with decentralized control is carried out. The type of the so-called soft attacks using interception of messages, misinformation formation and transmission to group of robots which are also realizing other actions without identified signs of invasion of robots-saboteurs. Analysis of existing information security models of the system based on the trust level computation, calculated in the process of agents’ interaction is carried out. Information security model is offered in which robots-agents produce the trust levels to each other on the basis of situation analysis emerging on a certain step of iterative algorithm with usage of onboard sensor devices. On the basis of calculated trust levels, recognition of “saboteur” objects in the group of legitimate robots-agents is done. For measure of likeness (adjacency increase for objects from the same category (“saboteur” or “legitimate agent”, calculation algorithm for agents reputation is offered as a measure of public opinion about qualities of this or that agent-subject. Implementation alternatives of the algorithms for detection of saboteurs on the example of the basic algorithm for distribution of purposes in the group of robots are considered.

  12. Secure multi-party communication with quantum key distribution managed by trusted authority

    Science.gov (United States)

    Hughes, Richard John; Nordholt, Jane Elizabeth; Peterson, Charles Glen

    2017-06-14

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  13. Secure multi-party communication with quantum key distribution managed by trusted authority

    Science.gov (United States)

    Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

    2013-07-09

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  14. The Moderating Role of Performance in the Link From Interactional Justice Climate to Mutual Trust Between Managers and Team Members.

    Science.gov (United States)

    Martínez-Tur, Vicente; Gracia, Esther; Moliner, Carolina; Molina, Agustín; Kuster, Inés; Vila, Natalia; Ramos, José

    2016-06-01

    The main goal of this study was to examine the interaction between team members' performance and interactional justice climate in predicting mutual trust between managers and team members. A total of 93 small centers devoted to the attention of people with intellectual disability participated in the study. In each center, the manager (N = 93) and a group of team members (N = 746) were surveyed. On average, team members were 36.2 years old (SD = 9.3), whereas managers were 41.2 years old (SD = 8.8). The interaction between interactional justice climate and performance was statistically significant. Team members' performance strengthened the link from interactional justice climate to mutual trust. © The Author(s) 2016.

  15. A Trust Model for Ubiquitous Healthcare Environment on the Basis of Adaptable Fuzzy-Probabilistic Inference System.

    Science.gov (United States)

    Athanasiou, Georgia; Anastasopoulos, George C; Tiritidou, Eleni; Lymberopoulos, Dimitrios

    2017-07-28

    Trust is considered to be a determinant on psychologist selection which can ensure patient satisfaction. Hence, trust concept is essential to be introduced into Ubiquitous Healthcare (UH) environment oriented on patients with anxiety disorders. This is accomplished by Trust Model estimating psychologists' trustworthiness, a priory to service delivery, with the use of patient's and his/her acquaintances testimonies, i.e. Personal Interaction Experience (PIE) and Reputation (R). In this paper, Trust Model is proposed to be materialized via an Adaptable Cloud Inference System (ACIS) that performs Trust Value (TV) estimation. Taking advantage of cloud theory, the introduced ACIS estimates TVs via fuzzy-probabilistic reasoning incorporating a cloud relation operator (soft AND) which is proposed to be tuned by trust information sources consistency and coherency. Theoretical analysis along with comparative study conducted within MATLAB environment and experimental investigation verify the effectiveness of the proposed ACIS materialization under different conditions. Especially, the innovative features of ACIS enable TV to be estimated with 45.5% and 62% on average higher accuracy to that providing state-of-the-art Trust Models, within clean environment and under the influence of large scale collusive malicious attacks, respectively. The enhanced robustness permits the untrustworthy UH Providers to be discriminated with True Positive Rate at the range of 0.9 although 40% of R testimonies are erroneous. Finally, experimental investigation validates that the adoption of the proposed Trust Model for psychologists trustworthiness estimation facilitates patient satisfaction to be achieved into UH environment.

  16. Design of Remote Heat-Meter System Based on Trusted Technology

    Science.gov (United States)

    Yu, Changgeng; Lai, Liping

    2018-03-01

    This article presents a proposal of a heat meter and remote meter reading system for the disadvantages of the hackers very easily using eavesdropping, tampering, replay attack of traditional remote meter reading system. The system selects trusted technology such as, the identity authentication, integrity verifying, and data protection. By the experiments, it is proved that the remote meter reading system of the heat meter can be used to verify the feasibility of the technology, and verify the practicability and operability of data protection technology.

  17. The Process of Trust Development

    DEFF Research Database (Denmark)

    Jagd, Søren; Højland, Jeppe

    by high trust and co-operation? In this paper we explore the process of trust development during an organisational change project in a Danish SME by looking at two kinds of trust relations: employee trust in management and trust relations among employees. We find substantial differences in trust...... in management among employees. Trust is found to be higher among employees interacting regularly with managers, as in the project coordination group. It is found that personal relations are very important for the development of trust. The success of the project may be explained by the involvement of an ‘elite...... group' of employees in the project coordination group, by a change of attitude towards employees by management during the project, by the specific actions taken by management as a response to employee complains and by the creation of occasions such as employee seminars where employees can meet...

  18. Managing controversy through consultation: a qualitative study of communication and trust around MMR vaccination decisions.

    Science.gov (United States)

    McMurray, Robert; Cheater, Francine M; Weighall, Anna; Nelson, Carolyn; Schweiger, Martin; Mukherjee, Suzanne

    2004-07-01

    Controversy over the measles, mumps, and rubella (MMR) vaccine has reduced uptake, raising concerns of a future disease epidemic. To explore parents' accounts of decision making relating to the MMR vaccine controversy, identifying uptake determinants and education needs. Qualitative interviews analysed using the 'framework' approach. Five general practices in the Leeds area, 2002-2003. Sixty-nine interviews conducted with parents of children aged between 4 and 5 years, and 12 interviews with primary care practitioners, managers and immunisation coordinators serving participating sites. Participants were interviewed one-to-one in a place of their choice. The vaccination decision is primarily a function of parental assessments of the relative acceptability and likelihood of possible outcomes. For most parents the evidence of science and medicine plays little role in the decision. Although local general practitioners and health visitors are trusted information sources, the influence of primary care providers on the vaccination decision is limited by concerns over consultation legitimacy, discussion opportunity, and perceptions of financial and political partiality. Parents and practitioners identify a need for new approaches to support decisions and learning when faced with this and similar healthcare controversies. These include new collaborative approaches to information exchange designed to transform rather than supplant existing parent knowledge as part of an ongoing learning process. The study identified new ways in which parents and practitioners need to be supported in order to increase understanding of medical science and secure more informed decisions in the face of health controversy.

  19. SecureCore Software Architecture: Trusted Management Layer (TML) Kernel Extension Module Interface Specification

    National Research Council Canada - National Science Library

    Shifflett, David J; Clark, Paul C; Irvine, Cynthia E; Nguyen, Thuy D; Vidas, Timothy M; Levin, Timothy E

    2008-01-01

    .... The purpose of the SecureCore research project is to investigate fundamental architectural features required for the trusted operation of mobile computing devices such as smart cards, embedded...

  20. SecureCore Software Architecture: Trusted Management Layer (TML) Kernel Extension Module Integration Guide

    National Research Council Canada - National Science Library

    Shifflett, David J; Clark, Paul C; Irvine, Cynthia E; Nguyen, Thuy D; Vidas, Timothy M; Levin, Timothy E

    2007-01-01

    .... The purpose of the SecureCore research project is to investigate fundamental architectural features required for the trusted operation of mobile computing devices such as smart cards, embedded...

  1. Trust in Management under Post-bureaucratic Conditions: The Case of Finnish Civil Servants

    Directory of Open Access Journals (Sweden)

    Jaakko Koivumäki

    2013-12-01

    Full Text Available The Finnish state administration has recently undergone a wave of reforms towards decentralized decision-making and increased flexibility in organizing work. Traditional bureaucracy, however, has its virtues. Based on a survey and qualitative interview material, the results presented in this paper indicate that many characteristics of bureaucracy, such as well-defined work roles and hierarchical control, facilitate trust among employees. In contrast, the current post-bureaucratic model of organizing work may increase insecurity and decrease trust.

  2. Human Resource Management System

    OpenAIRE

    Navaz, A. S. Syed; Fiaz, A. S. Syed; Prabhadevi, C.; Sangeetha, V.; Gopalakrishnan, S.

    2013-01-01

    The paper titled HUMAN RESOURCE MANAGEMENT SYSTEM is basically concerned with managing the Administrator of HUMAN RESOURCE Department in a company. A Human Resource Management System, refers to the systems and processes at the intersection between human resource management and information technology. It merges HRM as a discipline and in particular its basic HR activities and processes with the information technology field, whereas the programming of data processing systems evolved into standa...

  3. The impact of the customer relationship management on organizational productivity, customer trust and satisfaction by using the structural equation model: A study in the Iranian hospitals.

    Science.gov (United States)

    Yaghoubi, Maryam; Asgari, Hamed; Javadi, Marzieh

    2017-01-01

    One of the challenges in the fiercely competitive space of health organizations is responding to customers and building trust and satisfaction in them in the shortest time, with best quality and highest productivity. Hence the aim of this study is to survey the impact of customer relationship management (CRM) on organizational productivity, customer loyalty, satisfaction and trust in selected hospitals of Isfahan (in Iran). This study is a correlation descriptive research. Study population was the nurses in selected hospitals of Isfahan and the sampling has been conducted using stratified random method. Data collection tool is a researcher-made questionnaire of CRM and its effects (organizational productivity, customer loyalty, satisfaction and trust) which its validity and reliability has been confirmed by researchers. Structural equation method was used to determine the impact of variables. Data analysis method was structural equation modeling and the software used was SPSS version 16 (IBM, SPSS, 2007 Microsoft Corp., Bristol, UK) and AMOS version 18 (IBM, SPSS, 2010 Microsoft Corp, Bristol, UK). Among the dimensions of CRM, diversification had the highest impact (0.83) and customer acquisition had the lowest (0.57) CRM, had the lowest impact on productivity (0.59) and the highest effect on customer satisfaction (0.83). For the implementation of CRM, it is necessary that the studied hospitals improve strategies of acquiring information about new customers, attracting new customers and keeping them and communication with patients outside the hospital and improve the system of measuring patient satisfaction and loyalty.

  4. Autonomous emergency braking systems adapted to snowy road conditions improve drivers' perceived safety and trust.

    Science.gov (United States)

    Koglbauer, Ioana; Holzinger, Jürgen; Eichberger, Arno; Lex, Cornelia

    2018-04-03

    This study investigated drivers' evaluation of a conventional autonomous emergency braking (AEB) system on high and reduced tire-road friction and compared these results to those of an AEB system adaptive to the reduced tire-road friction by earlier braking. Current automated systems such as the AEB do not adapt the vehicle control strategy to the road friction; for example, on snowy roads. Because winter precipitation is associated with a 19% increase in traffic crashes and a 13% increase in injuries compared to dry conditions, the potential of conventional AEB to prevent collisions could be significantly improved by including friction in the control algorithm. Whereas adaption is not legally required for a conventional AEB system, higher automated functions will have to adapt to the current tire-road friction because human drivers will not be required to monitor the driving environment at all times. For automated driving functions to be used, high levels of perceived safety and trust of occupants have to be reached with new systems. The application case of an AEB is used to investigate drivers' evaluation depending on the road condition in order to gain knowledge for the design of future driving functions. In a driving simulator, the conventional, nonadaptive AEB was evaluated on dry roads with high friction (μ = 1) and on snowy roads with reduced friction (μ = 0.3). In addition, an AEB system adapted to road friction was designed for this study and compared with the conventional AEB on snowy roads with reduced friction. Ninety-six drivers (48 males, 48 females) assigned to 5 age groups (20-29, 30-39, 40-49, 50-59, and 60-75 years) drove with AEB in the simulator. The drivers observed and evaluated the AEB's braking actions in response to an imminent rear-end collision at an intersection. The results show that drivers' safety and trust in the conventional AEB were significantly lower on snowy roads, and the nonadaptive autonomous braking strategy was

  5. Avionics System Performance Management

    National Research Council Canada - National Science Library

    Damania, Bhavesh

    1998-01-01

    .... The reasons for improved performance management include advances in processor technology and architectures, increasingly integrated systems, and the requirement of reducing costs in developing and deploying the systems...

  6. Credit Management System

    Data.gov (United States)

    US Agency for International Development — Credit Management System. Outsourced Internet-based application. CMS stores and processes data related to USAID credit programs. The system provides information...

  7. The Main Approaches to Using the Concept of Trust-Based Marketing in Trade Enterprises

    Directory of Open Access Journals (Sweden)

    Albina Basova

    2017-12-01

    Full Text Available The concept of trust and the main factors affecting it are analyzed. The essence of trust-based marketing and its tasks, the main strategies of building trust to an organization from the clients’ side are considered. The CRM system has been explored as a tool for managing customer relationships, and contemporary marketing technologies such as crowdsourcing and collaboration that develop trust are considered.

  8. Worldviews and trust of sources for health information on electronic nicotine delivery systems: Effects on risk perceptions and use ☆

    OpenAIRE

    Weaver, Scott R.; Jazwa, Amelia; Popova, Lucy; Slovic, Paul; Rothenberg, Richard B.; Eriksen, Michael P.

    2017-01-01

    Public health agencies, the news media, and the tobacco/vapor industry have issued contradictory statements about the health effects of electronic nicotine delivery systems (ENDS). We investigated the levels of trust that consumers place in different information sources and how trust is associated with cultural worldviews, risk perceptions, ENDS use, and sociodemographic characteristics using a nationally representative sample of 6051 U.S. adults in 2015. Seventeen percent of adults were unce...

  9. Trust in Co-sourced Software Development

    DEFF Research Database (Denmark)

    Schlichter, Bjarne Rerup; Persson, John Stouby

    2014-01-01

    . We present a case study of how the co-sourcing relationship between a certified CMMI-level 5 Danish software company and an offshoring supplier can be conceptualized as an Abstract System. An Abstract System is a dis-embedded social system (such as banking) that is trusted despite lack of detailed...... understanding or personal trust relations. The paper suggest how certain work practices among developers and managers can be explained using a dynamic trust lens based on Abstract Systems, especially dis- and re-embedding mechanisms.......Software development projects are increasingly geographical distributed with offshoring. Co-sourcing is a highly integrative and cohesive approach, seen successful, to software development offshoring. However, research of how dynamic aspects of trust are shaped in co-sourcing activities is limited...

  10. Maintenance and management system

    International Nuclear Information System (INIS)

    Ando, Yasumasa.

    1992-01-01

    Since highly reliable operation is required in a nuclear power plant, monitoring during operation and periodical inspection are conducted carefully. The present invention provides maintenance and management systems for providing an aid so that these systems are combined effectively and operated rationally based on unified information management. That is, the system contains data bases comprising information for the design of the equipments and pipelines of a plant, information for the exchange of equipment parts, information for the history of plant operation, information for the monitoring and inspection, and information for the management of repair operation. In addition, it has an equipment part history management sub-system for managing equipment part exchange information, an operation history management sub-system for managing the operation state of the plant, an operation history management sub-system for managing equipment monitoring inspection data and operation management sub-system for managing periodical inspection/ repairing operation. These sub-systems are collectively combined to manage the maintenance and management jobs of the plant unitarily. (I.S.)

  11. Relationship between perceived organizational politics, organizational trust, human resource management practices and turnover intention among Nigerian nurses

    Directory of Open Access Journals (Sweden)

    Ramatu Abdulkareem Abubakar

    2014-09-01

    Full Text Available Prior research has indicated that employee turnover is detrimental to both individuals and organisations. Because a turnover intention in the workplace is detrimental, several factors have been suggested to better understand the reasons why employees may decide to leave their organisations. Some of the organizational-related factors that have been considered by previous research include perceived organizational justice, job satisfaction, perceived psychological contract breach, and perceived organizational support, among others. Despite these empirical studies, literatures indicate that less attention has been paid to the influence of perceived organisational politics, organizational trust, and perceived human resource practices management (HRM practices on employee turnover. Hence, the present study fills in the gap by examining the relationship between perceived organisational politics, organizational trust, perceived human resource management practices and employee turnover among Registered Nurses in Nigerian public hospitals using multiple regression analysis technique. One hundred and seventy five Registered Nurses participated in the study. Result indicated that perceived organisational politics was significantly and positively related to turnover intentions. The result also showed that both organizational trust and perceived human resource practices were significantly and negatively related to turnover intentions. Theoretical and practical implications of the results are discussed.

  12. Maintenance management systems

    International Nuclear Information System (INIS)

    Rohan, M. de

    1989-01-01

    This paper is concerned principally with Maintenance Management systems and their effective introduction into organisations. Maintenance improvement is basically a problem of managing the maintenance department in the broadest sense. Improvement does not only lie in the area of special techniques, systems or procedures; although they are valuable tools, but rather in a balanced attack, carefully guided by management. Over recent years, maintenance systems have received the major emphasis and in many instances the selection of the system has become a pre-occupation, whereas the importance of each maintenance function must be recognised and good management practices applied to all maintenance activities. The ingredients for success in the implementation of maintenance management systems are summarised as: having a management committee, clear objectives, project approach using project management techniques and an enthusiastic leader, user managed and data processing supported project, realistic budget and an understanding of the financial audit requirements. (author)

  13. Trust Dynamics in WSNs: An Evolutionary Game-Theoretic Approach

    Directory of Open Access Journals (Sweden)

    Shigen Shen

    2016-01-01

    Full Text Available A sensor node (SN in Wireless Sensor Networks (WSNs can decide whether to collaborate with others based on a trust management system (TMS by making a trust decision. In this paper, we study the trust decision and its dynamics that play a key role to stabilize the whole network using evolutionary game theory. When SNs are making their decisions to select action Trust or Mistrust, a WSNs trust game is created to reflect their utilities. An incentive mechanism bound with one SN’s trust degree is incorporated into this trust game and effectively promotes SNs to select action Trust. The replicator dynamics of SNs’ trust evolution, illustrating the evolutionary process of SNs selecting their actions, are given. We then propose and prove the theorems indicating that evolutionarily stable strategies can be attained under different parameter values, which supply theoretical foundations to devise a TMS for WSNs. Moreover, we can find out the conditions that will lead SNs to choose action Trust as their final behavior. In this manner, we can assure WSNs’ security and stability by introducing a trust mechanism to satisfy these conditions. Experimental results have confirmed the proposed theorems and the effects of the incentive mechanism.

  14. SoundMeGood: A Trust Model Supporting Preliminary Trust Establishment Between Mutually Unknown Entities

    Czech Academy of Sciences Publication Activity Database

    Špánek, Roman; Tyl, P.

    2013-01-01

    Roč. 1, č. 1 (2013), s. 10-14 ISSN 2320-401X R&D Projects: GA ČR GAP202/10/0761 Grant - others:ČVUT(CZ) SGS 2011/7821 Institutional support: RVO:67985807 Keywords : trust * social network * trust management systems * distributed systems Subject RIV: IN - Informatics, Computer Science http://www.isaet.org/images/extraimages/IJCSEE%200101303.pdf

  15. The Chinese community patient’s life satisfaction, assessment of community medical service, and trust in community health delivery system

    Science.gov (United States)

    2013-01-01

    Background Although the Chinese government put a lot of effort into promoting the community patient’s life satisfaction, there still lacked the holistic and systematic approaches to promote the community patient’s life satisfaction in various regions of China. On the basis of the literature, it was found that both the community patient’s assessment of community medical service and trust in community health delivery system were important considerations when the community patient comprehensively evaluated community medical service to generate life satisfaction. So this study was set up to test whether and to what extent the community patient’s assessments of various major aspects of community medical service/various major aspects of the community patient’s trust in community health delivery system influenced life satisfaction in whole China/in various regions of China. Methods In order to explore the situation of China’s community health delivery system before 2009 and provide a reference for China’s community health delivery system reform, the data that could comprehensively and accurately reflect the community patient’s life satisfaction, assessment of community medical service, and trust in community health delivery system in various regions of China was needed, so this study collaborated with the National Bureau of Statistics of China to carry out a large-scale 2008 national community resident household survey (N = 3,306) for the first time in China. And the specified ordered probit models were established to analyze the dataset from this household survey. Results Among major aspects of community medical service, the medical cost (particularly in developed regions), the doctor-patient communication (particularly in developed regions), the medical facility and hospital environment (particularly in developed regions), and the medical treatment process (particularly in underdeveloped regions) were all key considerations (ppatient’s life

  16. Integrated management systems

    CERN Document Server

    Bugdol, Marek

    2015-01-01

    Examining the challenges of integrated management, this book explores the importance and potential benefits of using an integrated approach as a cross-functional concept of management. It covers not only standardized management systems (e.g. International Organization for Standardization), but also models of self-assessment, as well as different types of integration. Furthermore, it demonstrates how processes and systems can be integrated, and how management efficiency can be increased. The major part of this book focuses on management concepts which use integration as a key tool of management processes (e.g. the systematic approach, supply chain management, virtual and network organizations, processes management and total quality management). Case studies, illustrations, and tables are also provided to exemplify and illuminate the content, as well as examples of successful and failed integrations. Providing a particularly useful resource to managers and specialists involved in the improvement of organization...

  17. Audit Information Management System

    Data.gov (United States)

    US Agency for International Development — USAID/OIG has initiated its new Audit Information Management System (AIMS) to track OIG's audit recommendations and USAID's management decisions. OIG's in-house...

  18. Information systems project management

    CERN Document Server

    Olson, David

    2014-01-01

    Information Systems Project Management addresses project management in the context of information systems. It deals with general project management principles, with focus on the special characteristics of information systems. It is based on an earlier text, but shortened to focus on essential project management elements.This updated version presents various statistics indicating endemic problems in completing information system projects on time, within budget, at designed functionality. While successful completion of an information systems project is a challenge, there are some things that ca

  19. Operating Security System Support for Run-Time Security with a Trusted Execution Environment

    DEFF Research Database (Denmark)

    Gonzalez, Javier

    sensitive assets at run-time that we denote split-enforcement, and provide an implementation for ARM-powered devices using ARM TrustZone security extensions. We design, build, and evaluate a prototype Trusted Cell that provides trusted services. We also present the first generic TrustZone driver....... In this thesis we introduce run-time security primitives that enable a number of trusted services in the context of Linux. These primitives mediate any action involving sensitive data or sensitive assets in order to guarantee their integrity and confidentiality. We introduce a general mechanism to protect...

  20. The relationship between trust in mass media and the healthcare system and individual health: evidence from the AsiaBarometer Survey

    Directory of Open Access Journals (Sweden)

    Tokuda Yasuharu

    2009-01-01

    Full Text Available Abstract Background Vertical and horizontal trust, as dimensions of social capital, may be important determinants of health. As mass media campaigns have been used extensively to promote healthy lifestyles and convey health-related information, high levels of individual trust in the media may facilitate the success of such campaigns and, hence, have a positive influence on health. However, few studies have investigated the relationship between trust levels in mass media, an aspect of vertical trust, and health. Methods Based on cross-sectional data of the general population from the AsiaBarometer Survey (2003–2006, we analyzed the relationship between self-rated health and trust in mass media, using a multilevel logistic model, adjusted for age, gender, marital status, income, education, occupation, horizontal trust, and trust in the healthcare system. Results In a total of 39082 participants (mean age 38; 49% male, 26808 (69% were classified as in good health. By the levels of trust in mass media, there were 6399 (16% who reported that they trust a lot, 16327 (42% reporting trust to a degree, 9838 (25% who do not really trust, 3307 (9% who do not trust at all, and 191 (0.5% who have not thought about it. In the multilevel model, trust in mass media was associated with good health (do not trust at all as the base group: the odds ratios (OR of 1.16 (95% confidence interval (CI = 1.05–1.27 for do not really trust; OR of 1.35 (95% CI = 1.23–1.49 for trust to a degree, and 1.57 (95% CI = 1.36–1.81 for trust a lot. Horizontal trust and trust in the healthcare system were also associated with health. Conclusion Vertical trust in mass media is associated with better health in Asian people. Since mass media is likely an important arena for public health, media trust should be enhanced to make people healthier.

  1. Worldviews and trust of sources for health information on electronic nicotine delivery systems: Effects on risk perceptions and use.

    Science.gov (United States)

    Weaver, Scott R; Jazwa, Amelia; Popova, Lucy; Slovic, Paul; Rothenberg, Richard B; Eriksen, Michael P

    2017-12-01

    Public health agencies, the news media, and the tobacco/vapor industry have issued contradictory statements about the health effects of electronic nicotine delivery systems (ENDS). We investigated the levels of trust that consumers place in different information sources and how trust is associated with cultural worldviews, risk perceptions, ENDS use, and sociodemographic characteristics using a nationally representative sample of 6051 U.S. adults in 2015. Seventeen percent of adults were uncertain about their trust for one or more potential sources. Among the rest, the Centers for Disease Control and Prevention (CDC), health experts, and the Food & Drug Administration (FDA) elicited the highest levels of trust. In contrast, tobacco and vapor manufacturers, vape shop employees, and, to a lesser extent, the news media were distrusted. Adults who had higher incomes and more education or espoused egalitarian and communitarian worldviews expressed more trust in health sources and the FDA, whereas those identifying as non-Hispanic Black or multiracial reported less trust. Current smokers, those who identified as non-Hispanic Black or other race, had lower incomes, and espoused hierarchy and individualism worldviews expressed less distrust toward the tobacco and vapor industry. Greater trust (or less distrust) toward the tobacco and vapor industry and an individualism worldview were associated with perceptions of lower risk of premature death from daily ENDS use, greater uncertainty about those risks, and greater odds of using ENDS. Public health and the FDA should consider consumer trust and worldviews in the design and regulation of public education campaigns regarding the potential health risks and benefits of ENDS.

  2. Worldviews and trust of sources for health information on electronic nicotine delivery systems: Effects on risk perceptions and use

    Directory of Open Access Journals (Sweden)

    Scott R. Weaver

    2017-12-01

    Full Text Available Public health agencies, the news media, and the tobacco/vapor industry have issued contradictory statements about the health effects of electronic nicotine delivery systems (ENDS. We investigated the levels of trust that consumers place in different information sources and how trust is associated with cultural worldviews, risk perceptions, ENDS use, and sociodemographic characteristics using a nationally representative sample of 6051 U.S. adults in 2015. Seventeen percent of adults were uncertain about their trust for one or more potential sources. Among the rest, the Centers for Disease Control and Prevention (CDC, health experts, and the Food & Drug Administration (FDA elicited the highest levels of trust. In contrast, tobacco and vapor manufacturers, vape shop employees, and, to a lesser extent, the news media were distrusted. Adults who had higher incomes and more education or espoused egalitarian and communitarian worldviews expressed more trust in health sources and the FDA, whereas those identifying as non-Hispanic Black or multiracial reported less trust. Current smokers, those who identified as non-Hispanic Black or other race, had lower incomes, and espoused hierarchy and individualism worldviews expressed less distrust toward the tobacco and vapor industry. Greater trust (or less distrust toward the tobacco and vapor industry and an individualism worldview were associated with perceptions of lower risk of premature death from daily ENDS use, greater uncertainty about those risks, and greater odds of using ENDS. Public health and the FDA should consider consumer trust and worldviews in the design and regulation of public education campaigns regarding the potential health risks and benefits of ENDS.

  3. A Geographic Information System (GIS-Based Analysis of Social Capital Data: Landscape Factors That Correlate with Trust

    Directory of Open Access Journals (Sweden)

    Sohrab Rahimi

    2017-03-01

    Full Text Available The field of community sociology has yielded rich insights on how neighborhoods and individuals foster social capital and reap the benefits of interpersonal relationships and institutions alike. Traditionally, institutions and cultural factors have been lauded as catalysts of community social life and cohesion. Yet, the built environment and configuration of the landscape, including infrastructure, amenities and population density, may also contribute to community social capital. In this article, we embedded zip code-level responses from Harvard University’s Saguaro Seminar’s 2006 Social Capital Community Benchmark Survey with a geographic information system. Specifically, we correlated responses on residents’ general trust, trust of one’s neighbors, and trust of members of other racial groups with local urban environmental factors and infrastructural indicators such as housing and street conditions, land use, city form, amenity access (e.g., libraries and schools, home vacancy rates, and home value. We conducted these tests at the national level and for Rochester, NY, due to its many survey responses. We found that housing vacancies drive down levels of social trust, as captured by homeownership rates and tenure, yielding higher levels of social trust, and that certain urban facilities correlate with high trust among neighbors. Results can inform urban planners on the amenities that support sustainable community ties.

  4. Managing hybrid marketing systems.

    Science.gov (United States)

    Moriarty, R T; Moran, U

    1990-01-01

    As competition increases and costs become critical, companies that once went to market only one way are adding new channels and using new methods - creating hybrid marketing systems. These hybrid marketing systems hold the promise of greater coverage and reduced costs. But they are also hard to manage; they inevitably raise questions of conflict and control: conflict because marketing units compete for customers; control because new indirect channels are less subject to management authority. Hard as they are to manage, however, hybrid marketing systems promise to become the dominant design, replacing the "purebred" channel strategy in all kinds of businesses. The trick to managing the hybrid is to analyze tasks and channels within and across a marketing system. A map - the hybrid grid - can help managers make sense of their hybrid system. What the chart reveals is that channels are not the basic building blocks of a marketing system; marketing tasks are. The hybrid grid forces managers to consider various combinations of channels and tasks that will optimize both cost and coverage. Managing conflict is also an important element of a successful hybrid system. Managers should first acknowledge the inevitability of conflict. Then they should move to bound it by creating guidelines that spell out which customers to serve through which methods. Finally, a marketing and sales productivity (MSP) system, consisting of a central marketing database, can act as the central nervous system of a hybrid marketing system, helping managers create customized channels and service for specific customer segments.

  5. Salient value similarity, social trust, and attitudes toward wildland fire management strategies

    Science.gov (United States)

    Jerry J. Vaske; James D. Absher; Alan D. Bright

    2007-01-01

    Using the salient value similarity (SVS) model, we predicted that social trust mediated the relationship between SVS and attitudes toward prescribed burns and mechanical thinning. Data were obtained from a mail survey (n = 532) of Colorado residents living in the wildland-urban interface. Results indicated that respondents shared the same values as U...

  6. Facility Environmental Management System

    Data.gov (United States)

    Federal Laboratory Consortium — This is the Web site of the Federal Highway Administration's (FHWA's) Turner-Fairbank Highway Research Center (TFHRC) facility Environmental Management System (EMS)....

  7. NASA's Risk Management System

    Science.gov (United States)

    Perera, Jeevan S.

    2011-01-01

    Leadership is key to success. Phased-approach for implementation of risk management is necessary. Risk management system will be simple, accessible and promote communication of information to all relevant stakeholders for optimal resource allocation and risk mitigation. Risk management should be used by all team members to manage risks -- risk office personnel. Each group is assigned Risk Integrators who are facilitators for effective risk management. Risks will be managed at the lowest-level feasible, elevate only those risks that require coordination or management from above. Risk reporting and communication is an essential element of risk management and will combine both qualitative and quantitative elements. Risk informed decision making should be introduced to all levels of management. Provide necessary checks and balances to insure that risks are caught/identified and dealt with in a timely manner. Many supporting tools, processes & training must be deployed for effective risk management implementation. Process improvement must be included in the risk processes.

  8. Learning Content Management Systems

    Directory of Open Access Journals (Sweden)

    Tache JURUBESCU

    2008-01-01

    Full Text Available The paper explains the evolution of e-Learning and related concepts and tools and its connection with other concepts such as Knowledge Management, Human Resources Management, Enterprise Resource Planning, and Information Technology. The paper also distinguished Learning Content Management Systems from Learning Management Systems and Content Management Systems used for general web-based content. The newest Learning Content Management System, very expensive and yet very little implemented is one of the best tools that helps us to cope with the realities of the 21st Century in what learning concerns. The debates over how beneficial one or another system is for an organization, can be driven by costs involved, efficiency envisaged, and availability of the product on the market.

  9. In regulation we trust.

    Science.gov (United States)

    Wiig, Siri; Tharaldsen, Jorunn Elise

    2012-01-01

    The role of trust has been argued to play an increasingly important role in modern, complex, and ambivalent risk societies. Trust within organizational research is anticipated to have a general strategic impact on aspects such as organizational performance, communication and knowledge exchange, and learning from accidents. Trust is also an important aspect related to regulation of risk. Diverse regulatory regimes, their contexts and risks influence regulators use of trust and distrust in regulatory practice. The aim of this paper is to discuss the relationship between risk regulation and trust across diverse risk regulation regimes. By drawing from studies of risk regulation, risk perception, and trust the purpose is to discuss how regulation and trust are linked and used in practice to control risk across system levels in socio-technical systems in high risk industries. This paper provides new knowledge on 1) how functional and dysfunctional trust and distrust are grounded in the empirical realities of high risk industries, 2) how different perspectives on trust and distrust act together and bring new knowledge on how society control risk.

  10. Environmental asset management: Risk management systems

    CSIR Research Space (South Africa)

    Naudé, Brian

    2017-07-01

    Full Text Available purposes until the assets are exhausted. This paper addresses elements of environmental crime and the risk management strategies as part of EAP, including risk management system functions. A unique implemented risk management system in the Kruger National...

  11. The decision to trust.

    Science.gov (United States)

    Hurley, Robert F

    2006-09-01

    Surveys have shown that 80% of Americans don't trust corporate executives and--worse--that roughly half of all managers don't trust their own leaders. Mergers, downsizing, and globalization have accelerated the pace of change in organizations, creating a crisis of trust that didn't exist a generation ago. Leaders who understand how trust is built can actively influence its development, resulting in a more supportive and productive work environment and, not incidentally, a competitive advantage in the war for talent. Building on research in social psychology, and on his 15 years of experience consulting on trust, the author has developed a model for predicting whether trust or distrust will be chosen in a given situation. It helps managers analyze ten factors at play in the decision-making process. Hundreds of top executives have used it to diagnose and address the root causes of distrust in their work relationships. Some of the factors in the model relate to the decision maker: How tolerant of risk, how well-adjusted, and how relatively powerful is he or she? Others relate to the specific situation: How closely aligned are the interests of the parties concerned? Does the person who is asking to be trusted demonstrate competence? Predictability and integrity? Frequent and honest communication? Sue, a relatively new VP of sales, used the trust model to manage her relationship with Joe, an employee nearing retirement who was not performing well in a new sales role. Fearing for his job, Joe wasn't initially inclined to trust her. Sue took concrete steps to communicate openly with Joe, explore other options for him, and show concern for his well-being. When joe was transferred, he let his former colleagues know how pleased he was with Sue's handling of the situation. As a result, the level of trust increased in Sue's department, even though it was experiencing major change.

  12. The enemies of trust.

    Science.gov (United States)

    Galford, Robert; Drapeau, Anne Seibold

    2003-02-01

    Researchers have established that trust is critical to organizational effectiveness. Being trustworthy yourself, however, does not guarantee that you are capable of building trust in an organization. That takes old-fashioned managerial virtues like consistency, clear communication, and a willingness to tackle awkward questions. It also requires a good defense: You must protect trust from its enemies. Any act of bad management erodes trust, so the list of potential enemies is endless. Among the most common enemies of trust, though, are inconsistent messages from top management, inconsistent standards, a willingness to tolerate incompetence or bad behavior, dishonest feedback, a failure to trust others to do good work, a tendency to ignore painful or politically charged situations, consistent corporate underperformance, and rumors. Fending off these enemies must be at the top of every chief executive's agenda. But even with constant vigilance, an organization and its leaders will sometimes lose people's trust. During a crisis, managers should enlist the help of an objective third party--chances are you won't be thinking clearly--and be available physically and emotionally. If you "go dark" in the face of a crisis, employees will worry about the company's survival, about their own capacity to cope, and about your abilities as a leader. And if trust has broken down so badly that your only choice is to start over, you can do so by figuring out exactly how the breach of trust happened, ascertaining the depth and breadth of the loss, owning up to the loss instead of downplaying it, and identifying as precisely as possible the specific changes you must make to rebuild trust.

  13. Predicting TUrnover Intentions of Hotel Employees: The Influence of Employee Development Human Resource Management Practices and Trust in Organization

    Directory of Open Access Journals (Sweden)

    Mohamad Abdullah Hemdi

    2006-01-01

    Full Text Available This study investigates the variables that may be predictive of hotel employees’ turnover intentions. The influence of trust in organization as a mediator in the proposed relationship is also examined. A total of 380 operational employees from 5-star rated hotels completed the questionnaires. Hierarchical regression analysis was used to test the relationships hypothesized in the model. Most of the hypotheses were supported. It is suggested that to enhance employees’ trust in organization and subsequently to reduce turnover intentions, hotels need to continue to provide training and development programs to their employees, conduct fair and formal appraisal system, and provide ample and clear career advancement to their employees. Limitations and suggestions for future studies are forwarded.

  14. The Chinese community patient's life satisfaction, assessment of community medical service, and trust in community health delivery system.

    Science.gov (United States)

    Tang, Liyang

    2013-02-13

    Although the Chinese government put a lot of effort into promoting the community patient's life satisfaction, there still lacked the holistic and systematic approaches to promote the community patient's life satisfaction in various regions of China. On the basis of the literature, it was found that both the community patient's assessment of community medical service and trust in community health delivery system were important considerations when the community patient comprehensively evaluated community medical service to generate life satisfaction. So this study was set up to test whether and to what extent the community patient's assessments of various major aspects of community medical service/various major aspects of the community patient's trust in community health delivery system influenced life satisfaction in whole China/in various regions of China. In order to explore the situation of China's community health delivery system before 2009 and provide a reference for China's community health delivery system reform, the data that could comprehensively and accurately reflect the community patient's life satisfaction, assessment of community medical service, and trust in community health delivery system in various regions of China was needed, so this study collaborated with the National Bureau of Statistics of China to carry out a large-scale 2008 national community resident household survey (N = 3,306) for the first time in China. And the specified ordered probit models were established to analyze the dataset from this household survey. Among major aspects of community medical service, the medical cost (particularly in developed regions), the doctor-patient communication (particularly in developed regions), the medical facility and hospital environment (particularly in developed regions), and the medical treatment process (particularly in underdeveloped regions) were all key considerations (psystem, trust in doctor (particularly in underdeveloped regions), trust

  15. Environmental compliance management system

    Energy Technology Data Exchange (ETDEWEB)

    Cason, A. [Dow Chemical Co., Midland, MI (United States); Larrinaga, L.

    1995-12-01

    A cross-functional team of environmental regulatory experts, plant managers, and plant engineers have been working since 1991 on the development, implementation and maintenance of the Environmental Compliance Management System. The Environmental Compliance Management System is a practical and accurate method of determining the applicability of the state and federal environmental regulations and of establishing standard and straightforward procedures to meet these requirements. The Environmental Compliance Management System allows individual manufacturing facilities to avoid the additional manpower that would be required to read, digest and decide on the applicability and plan of action to meet the requirements of all the environmental regulations.

  16. NASA's Risk Management System

    Science.gov (United States)

    Perera, Jeevan S.

    2013-01-01

    Phased-approach for implementation of risk management is necessary. Risk management system will be simple, accessible and promote communication of information to all relevant stakeholders for optimal resource allocation and risk mitigation. Risk management should be used by all team members to manage risks - not just risk office personnel. Each group/department is assigned Risk Integrators who are facilitators for effective risk management. Risks will be managed at the lowest-level feasible, elevate only those risks that require coordination or management from above. Risk informed decision making should be introduced to all levels of management. ? Provide necessary checks and balances to insure that risks are caught/identified and dealt with in a timely manner. Many supporting tools, processes & training must be deployed for effective risk management implementation. Process improvement must be included in the risk processes.

  17. Lithium battery management system

    Science.gov (United States)

    Dougherty, Thomas J [Waukesha, WI

    2012-05-08

    Provided is a system for managing a lithium battery system having a plurality of cells. The battery system comprises a variable-resistance element electrically connected to a cell and located proximate a portion of the cell; and a device for determining, utilizing the variable-resistance element, whether the temperature of the cell has exceeded a predetermined threshold. A method of managing the temperature of a lithium battery system is also included.

  18. Medical Information Management System

    Science.gov (United States)

    Alterescu, S.; Hipkins, K. R.; Friedman, C. A.

    1979-01-01

    On-line interactive information processing system easily and rapidly handles all aspects of data management related to patient care. General purpose system is flexible enough to be applied to other data management situations found in areas such as occupational safety data, judicial information, or personnel records.

  19. Metadata management staging system

    Energy Technology Data Exchange (ETDEWEB)

    2013-08-01

    Django application providing a user-interface for building a file and metadata management system. An evolution of our Node.js and CouchDb metadata management system. This one focuses on server functionality and uses a well-documented, rational and REST-ful API for data access.

  20. Archival Information Management System.

    Science.gov (United States)

    1995-02-01

    management system named Archival Information Management System (AIMS), designed to meet the audit trail requirement for studies completed under the...are to be archived to the extent that future reproducibility and interrogation of results will exist. This report presents a prototype information

  1. Quality Management and Integrated Management System

    OpenAIRE

    BŘICHÁČKOVÁ, Lenka

    2011-01-01

    Graduation theses is directed on the Management System and the characteristics of the company and its development since 2003. Theses is introduced on the Integrated Management System, which consists of the Quality Management System, the Environmental Management System and the Occupational Health and Safety Assessment Series. The theses is especially directed on the Occupational Health and Safety Assessment Series. Management System is analyzed and steps are recommended to improve these proces...

  2. Towards trusted tradelanes

    NARCIS (Netherlands)

    Hulstijn, Joris; Hofman, W.; Zomer, G.; Tan, Yao-Hua; Scholl, H. J.; Glassey, O.; Janssen, M.

    Customs administrations are exploring system-based approaches to regulatory supervision, taking the entire set of controls in a process into account. In addition to Trusted Traders, which are recognized by a certification process, customs are considering to identify so called Trusted Trade Lanes:

  3. Trust in Management under Post-bureaucratic Conditions: The Case of Finnish Civil Servants

    OpenAIRE

    Jaakko Koivumäki; Pasi Pyöriä

    2013-01-01

    The Finnish state administration has recently undergone a wave of reforms towards decentralized decision-making and increased flexibility in organizing work. Traditional bureaucracy, however, has its virtues. Based on a survey and qualitative interview material, the results presented in this paper indicate that many characteristics of bureaucracy, such as well-defined work roles and hierarchical control, facilitate trust among employees. In contrast, the current post-bureaucratic model of org...

  4. Trust us Trust Thorp Campaign

    International Nuclear Information System (INIS)

    Kane, John

    1995-01-01

    The history of the nuclear industry in the UK has been dominated by Sellafield reprocessing site in west Cumbria. The site, formerly owned by the United Kingdom Atomic Energy Authority was transferred to the newly-formed British Nuclear Fuels plc in 1971. Although trade union representation existed at Sellafield before the emergence of BNFL, it is only after this date that collective trade union activity began to emerge. In 1977, after a long running dispute with management about the issue of radiation dose uptake, the workforce went on strike, forcing the management to question their previous 'need to know' attitude and to improve industrial relations. In 1984, it was recognised that the lobbying influence of trade unions within politics, and especially the Labour party could be used to greater effect to challenge potentially -damaging influence of anti-nuclear campaigners. The National Campaign for the Nuclear Industry (NCNI) was born, combining nine industrial and non-industrial trade unions within the nuclear industry. Its task during the last ten years has been to put forward the interests of its members collectively and to secure the, role of nuclear power. within a balanced energy policy in the political arena. In dome so, it has gained a credible voice within both the trade union movement and the Labour party. The new Thermal Oxide Reprocessing Plant (THORP) received strong support from the NCNI during its construction and commissioning phases. When it became clear that the anti-nuclear lobby had gained the upper hand and were beginning to seriously delay the necessary legal instruments required to start the plant, the power of collective action was once again recognised, and the TRUST US campaign was born. The campaign was run and organised by a clerks committee and fronted by the Trade Unions at Sellafield., and turned out to be one of the most successful] trade union campaigns in recent history. The first task involved getting, the entire workforce on

  5. ComTrustO: Composite Trust-Based Ontology Framework for Information and Decision Fusion

    Science.gov (United States)

    2015-07-06

    ComTrustO: Composite Trust-based Ontology Framework for Information and Decision Fusion Alessandro Oltramari Carnegie Mellon University Pittsburgh... ontology -based framework for information fusion, as a support system for human decision makers. In particular, we build upon the concept of composite...multidimensional trust, we construct a composite trust ontology framework, called ComTrustO, that embraces four trust ontologies , one for each trust type. We

  6. Operations management system

    Science.gov (United States)

    Brandli, A. E.; Eckelkamp, R. E.; Kelly, C. M.; Mccandless, W.; Rue, D. L.

    1990-01-01

    The objective of an operations management system is to provide an orderly and efficient method to operate and maintain aerospace vehicles. Concepts are described for an operations management system and the key technologies are highlighted which will be required if this capability is brought to fruition. Without this automation and decision aiding capability, the growing complexity of avionics will result in an unmanageable workload for the operator, ultimately threatening mission success or survivability of the aircraft or space system. The key technologies include expert system application to operational tasks such as replanning, equipment diagnostics and checkout, global system management, and advanced man machine interfaces. The economical development of operations management systems, which are largely software, will require advancements in other technological areas such as software engineering and computer hardware.

  7. The impact of the customer relationship management on organizational productivity, customer trust and satisfaction by using the structural equation model: A study in the Iranian hospitals

    Science.gov (United States)

    Yaghoubi, Maryam; Asgari, Hamed; Javadi, Marzieh

    2017-01-01

    Context: One of the challenges in the fiercely competitive space of health organizations is responding to customers and building trust and satisfaction in them in the shortest time, with best quality and highest productivity. Hence the aim of this study is to survey the impact of customer relationship management (CRM) on organizational productivity, customer loyalty, satisfaction and trust in selected hospitals of Isfahan (in Iran). Materials and Methods: This study is a correlation descriptive research. Study population was the nurses in selected hospitals of Isfahan and the sampling has been conducted using stratified random method. Data collection tool is a researcher-made questionnaire of CRM and its effects (organizational productivity, customer loyalty, satisfaction and trust) which its validity and reliability has been confirmed by researchers. Structural equation method was used to determine the impact of variables. Data analysis method was structural equation modeling and the software used was SPSS version 16 (IBM, SPSS, 2007 Microsoft Corp., Bristol, UK) and AMOS version 18 (IBM, SPSS, 2010 Microsoft Corp, Bristol, UK). Results: Among the dimensions of CRM, diversification had the highest impact (0.83) and customer acquisition had the lowest (0.57) CRM, had the lowest impact on productivity (0.59) and the highest effect on customer satisfaction (0.83). Conclusions: For the implementation of CRM, it is necessary that the studied hospitals improve strategies of acquiring information about new customers, attracting new customers and keeping them and communication with patients outside the hospital and improve the system of measuring patient satisfaction and loyalty. PMID:28546971

  8. Program Management System manual

    International Nuclear Information System (INIS)

    1986-01-01

    The Program Management System (PMS), as detailed in this manual, consists of all the plans, policies, procedure, systems, and processes that, taken together, serve as a mechanism for managing the various subprograms and program elements in a cohesive, cost-effective manner. The PMS is consistent with the requirements of the Nuclear Waste Policy Act of 1982 and the ''Mission Plan for the Civilian Radioactive Waste Management Program'' (DOE/RW-0005). It is based on, but goes beyond, the Department of Energy (DOE) management policies and procedures applicable to all DOE programs by adapting these directives to the specific needs of the Civilian Radioactive Waste Management program. This PMS Manual describes the hierarchy of plans required to develop and maintain the cost, schedule, and technical baselines at the various organizational levels of the Civilian Radioactive Waste Management Program. It also establishes the management policies and procedures used in the implementation of the Program. These include requirements for internal reports, data, and other information; systems engineering management; regulatory compliance; safety; quality assurance; and institutional affairs. Although expanded versions of many of these plans, policies, and procedures are found in separate documents, they are an integral part of this manual. The PMS provides the basis for the effective management that is needed to ensure that the Civilian Radioactive Waste Management Program fulfills the mandate of the Nuclear Waste Policy Act of 1982. 5 figs., 2 tabs

  9. Evaluation of social interaction, task management, and trust among dental hygiene students in a collaborative learning environment.

    Science.gov (United States)

    Saylor, Catherine D; Keselyak, Nancy T; Simmer-Beck, Melanie; Tira, Daniel

    2011-02-01

    The purpose of this study was to evaluate the impact of collaborative learning on the development of social interaction, task management, and trust in dental hygiene students. These three traits were assessed with the Teamwork Assessment Scale in two different learning environments (traditional lecture/lab and collaborative learning environment). A convenience sample of fifty-six entry-level dental hygiene students taking an introductory/preclinic course at two metropolitan area dental hygiene programs provided comparable experimental and control groups. Factor scores were computed for the three traits, and comparisons were conducted using the Ryan-Einot-Gabriel-Welsh multiple comparison procedure among specific cell comparisons generated from a two-factor repeated measures ANOVA. The results indicate that the collaborative learning environment influenced dental hygiene students positively regarding the traits of social interaction, task management, and trust. However, comparing dental hygiene students to undergraduate students overall indicates that dental hygiene students already possess somewhat higher levels of these traits. Future studies on active learning strategies should examine factors such as student achievement and explore other possible active learning methodologies.

  10. A qualitative study of patient (dis)trust in public and private hospitals: the importance of choice and pragmatic acceptance for trust considerations in South Australia.

    Science.gov (United States)

    Ward, Paul R; Rokkas, Philippa; Cenko, Clinton; Pulvirenti, Mariastella; Dean, Nicola; Carney, Simon; Brown, Patrick; Calnan, Michael; Meyer, Samantha

    2015-07-30

    This paper explores the nature and reasoning for (dis)trust in Australian public and private hospitals. Patient trust increases uptake of, engagement with and optimal outcomes from healthcare services and is therefore central to health practice, policy and planning. A qualitative study in South Australia, including 36 in-depth interviews (18 from public and 18 from private hospitals). 'Private patients' made active choices about both their hospital and doctor, playing the role of the 'consumer', where trust and choice went hand in hand. The reputation of the doctor and hospital were key drivers of trust, under the assumption that a better reputation equates with higher quality care. However, making a choice to trust a doctor led to personal responsibility and the additional requirement for self-trust. 'Public patients' described having no choice in their hospital or doctor. They recognised 'problems' in the public healthcare system but accepted and even excused these as 'part of the system'. In order to justify their trust, they argued that doctors in public hospitals tried to do their best in difficult circumstances, thereby deserving of trust. This 'resigned trust' may stem from a lack of alternatives for free health care and thus a dependence on the system. These two contrasting models of trust within the same locality point to the way different configurations of healthcare systems, hospital experiences, insurance coverage and related forms of 'choice' combine to shape different formats of trust, as patients act to manage their vulnerability within these contexts.

  11. 76 FR 60757 - Executive Branch Qualified Trusts

    Science.gov (United States)

    2011-09-30

    ... trust and to manage trust assets without participation by, or the knowledge of, any interested party or... assets without the interested party having any knowledge of the identity of the assets in the trust, the... trustee will, over time, sell or dispose of some or all of the initial assets placed in the trust. The...

  12. Systems engineering management plans.

    Energy Technology Data Exchange (ETDEWEB)

    Rodriguez, Tamara S.

    2009-10-01

    The Systems Engineering Management Plan (SEMP) is a comprehensive and effective tool used to assist in the management of systems engineering efforts. It is intended to guide the work of all those involved in the project. The SEMP is comprised of three main sections: technical project planning and control, systems engineering process, and engineering specialty integration. The contents of each section must be tailored to the specific effort. A model outline and example SEMP are provided. The target audience is those who are familiar with the systems engineering approach and who have an interest in employing the SEMP as a tool for systems management. The goal of this document is to provide the reader with an appreciation for the use and importance of the SEMP, as well as provide a framework that can be used to create the management plan.

  13. Trust-based or performance-based management: a study of employment contracting in hospitals.

    Science.gov (United States)

    Pettersen, Inger Johanne

    2011-01-01

    Hospitals are frequently changing managerial practices due to numerous public sector reforms taking place. In general, these reforms include the making and monitoring of contracts that regulate relations between the hospitals and their professional staffs. The aim of this paper is to discuss some main characteristics of the contracts that regulate the perceived relations between physicians as employees and the public hospital as employer. The theoretical framework is based on a contract theory approach. The empirical data is based on survey data from full-time employed physicians in the medical and surgical divisions in one of the largest university hospitals in Norway. This study shows that perceived obligations and psychological contracts indicate high degree of relational contracts between the hospital and the physicians. These socio-cultural elements should be recognized as important mechanisms of coordination and communication when policy makers and hospital managers are designing hospital management control systems. Copyright © 2009 John Wiley & Sons, Ltd.

  14. Trust and Credit

    DEFF Research Database (Denmark)

    Harste, Gorm

    The present paper is an answer to the question, how did trust and credit emerge. The systems of trust and credit reduce the environmental and contextual complexities in which trust and credit are embedded. The paper analyses the forms of this reduction in a number of stages in the evolution...... of history from the present risk of modern systems back to early modernity, the Reformation and the high medieval Revolutions in law, organization and theology. It is not a history of economics, but a history of the conditions of some communication codes used in economic systems....

  15. Enhancing Trust Management for Wireless Intrusion Detection via Traffic Sampling in the Era of Big Data

    DEFF Research Database (Denmark)

    Meng, Weizhi; Li, Wenjuan; Su, Chunhua

    2017-01-01

    Internet of Things (IoT) has been widely used in our daily life, which enables various objects to be interconnected for data exchange, including physical devices, vehicles, and other items embedded with network connectivity. Wireless sensor network (WSN) is a vital application of IoT, providing...... against insider attacks through implementing proper trustbased mechanisms. However, in the era of big data, sensors may generate excessive information and data, which could degrade the effectiveness of trust computation. In this paper, we focus on this challenge and propose a way of combining Bayesian...

  16. Intranet Document Management Systems.

    Science.gov (United States)

    Wen, H. Joseph; Yen, David C.; Lin, Binshan

    1998-01-01

    Explains how intranets facilitate documentation availability within a company at substantial cost savings. Topics include intranet document management systems (IDMS); publication costs for printed materials; hardware and software specifications; performance; and security. (Author/LRW)

  17. Correspondence Management System

    Data.gov (United States)

    U.S. Environmental Protection Agency — CMS is EPA's correspondence tracking and workflow management system. It scans, logs, routes, tracks, and stores incoming and outgoing correspondence in all Program...

  18. Holdings Management System

    Data.gov (United States)

    National Archives and Records Administration — This system supports the physical management of permanent, hard-copy archival Records in the custody of National Archives and Records Administration program offices.

  19. Earned Value Management System

    Data.gov (United States)

    US Agency for International Development — EVMS is a system for measuring project performance and progress in an objective manner by supporting earned value management. EVMS has the ability to combine...

  20. Environmental Management Systems

    Science.gov (United States)

    This site on Environmental Management Systems (EMS) provides information and resources related to EMS for small businesses and private industry, as well as local, state and federal agencies, including all the EPA offices and laboratories.

  1. Portfolio Management System

    Data.gov (United States)

    US Agency for International Development — PfMS is an implementation of WorkLenz. WorkLenz is USAID's portfolio management system tool. It is a commercially available, off-the-shelf (COTS) package that...

  2. Database Management System

    Science.gov (United States)

    1990-01-01

    In 1981 Wayne Erickson founded Microrim, Inc, a company originally focused on marketing a microcomputer version of RIM (Relational Information Manager). Dennis Comfort joined the firm and is now vice president, development. The team developed an advanced spinoff from the NASA system they had originally created, a microcomputer database management system known as R:BASE 4000. Microrim added many enhancements and developed a series of R:BASE products for various environments. R:BASE is now the second largest selling line of microcomputer database management software in the world.

  3. Systems engineering management plan

    International Nuclear Information System (INIS)

    Conner, C.W.

    1985-10-01

    The purpose of this Systems Engineering Management Plan (SEMP) is to prescribe the systems engineering procedures to be implemented at the Program level and the minimum requirements for systems engineering at the Program-element level. The Program level corresponds to the Director, OCRWM, or to the organizations within OCRWM to which the Director delegates responsibility for the development of the System and for coordinating and integrating the activities at the Program-element level. The Office of Policy and Outreach (OPO) and the Office of Resource Management (ORM) support the Director at the Program level. The Program-element level corresponds to the organizations within OCRWM (i.e., the Office of Geologic Repositories (OGR) and the Office of Storage and Transportation Systems (OSTS)) with overall responsibility for developing the System elements - that is, the mined geologic disposal system (MGDS), monitored retrievable storage (MRS) (if approved by Congress), and the transportation system

  4. Audit Management System

    CERN Document Server

    Alconada, Federico

    2015-01-01

    In the need of renewing their system, the Internal Audit department has given a proposal for building a new one. Taking into consideration the problems of their system they elaborated a requirement's list with the functionalities and features they were expecting from the new management system. This new system would be primarily for the use of the Internal Audit staff but it would also support the follow-up of internal audit recommendations by potentially all CERN staff members.

  5. Academy Trust

    Indian Academy of Sciences (India)

    The Academy Trust (tAcT) was set up in August 2014 as a non-governmental entity under the auspices of the Indian Academy of Sciences (IASc), Bengaluru. Working closely with some of the most distinguished scientific minds in the country through the Fellowship of the IASc, the Trust hopes to bring about a tangible ...

  6. Trust and Wellbeing

    Directory of Open Access Journals (Sweden)

    John F. Helliwell

    2011-01-01

    Full Text Available

    This paper presents new evidence linking trust and subjective wellbeing, based primarily on data from the Gallup World Poll and cycle 17 of the Canadian General Social Survey (GSS17. Because several of the general explanations for subjective wellbeing examined here show large and significant linkages to both household income and various measures of trust, it is possible to estimate income-equivalent compensating differentials for different types of trust. Measures of trust studied include general social trust, trust in management, trust in co-workers, trust in neighbours, and trust in police. In addition, some Canadian surveys and the Gallup World Poll ask respondents to estimate the chances that a lost wallet would be returned to them if found by different individuals, including neighbours, police and strangers.

    Our results reveal strong linkages between several trust measures and subjective well-being, as well as strong linkages between social trust and two major global causes of death—suicides and traffic fatalities. This suggests the value of learning more about how trust can be built and maintained, or repaired where it has been damaged. We therefore use data from the Canadian GSS17 to analyze personal and neighbourhood characteristics, including education, migration history, and mobility, that help explain differences in trust

  7. Sewer System Management Plan.

    Energy Technology Data Exchange (ETDEWEB)

    Holland, Robert C. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-08-01

    A Sewer System Management Plan (SSMP) is required by the State Water Resources Control Board (SWRCB) Order No. 2006-0003-DWQ Statewide General Waste Discharge Requirements (WDR) for Sanitary Sewer Systems (General Permit). DOE, National Nuclear Security Administration (NNSA), Sandia Field Office has filed a Notice of Intent to be covered under this General Permit. The General Permit requires a proactive approach to reduce the number and frequency of sanitary sewer overflows (SSOs) within the State. SSMPs must include provisions to provide proper and efficient management, operation, and maintenance of sanitary sewer systems and must contain a spill response plan.

  8. Program management system manual

    International Nuclear Information System (INIS)

    1989-08-01

    OCRWM has developed a program management system (PMS) to assist in organizing, planning, directing and controlling the Civilian Radioactive Waste Management Program. A well defined management system is necessary because: (1) the Program is a complex technical undertaking with a large number of participants, (2) the disposal and storage facilities to be developed by the Program must be licensed by the Nuclear Regulatory Commission (NRC) and hence are subject to rigorous quality assurance (QA) requirements, (3) the legislation mandating the Program creates a dichotomy between demanding schedules of performance and a requirement for close and continuous consultation and cooperation with external entities, (4) the various elements of the Program must be managed as parts of an integrated waste management system, (5) the Program has an estimated total system life cycle cost of over $30 billion, and (6) the Program has a unique fiduciary responsibility to the owners and generators of the nuclear waste for controlling costs and minimizing the user fees paid into the Nuclear Waste Fund. This PMS Manual is designed and structured to facilitate strong, effective Program management by providing policies and requirements for organizing, planning, directing and controlling the major Program functions

  9. A distribution management system

    Energy Technology Data Exchange (ETDEWEB)

    Jaerventausta, P.; Verho, P.; Kaerenlampi, M.; Pitkaenen, M. [Tampere Univ. of Technology (Finland); Partanen, J. [Lappeenranta Univ. of Technology (Finland)

    1998-08-01

    The development of new distribution automation applications is considerably wide nowadays. One of the most interesting areas is the development of a distribution management system (DMS) as an expansion to the traditional SCADA system. At the power transmission level such a system is called an energy management system (EMS). The idea of these expansions is to provide supporting tools for control center operators in system analysis and operation planning. Nowadays the SCADA is the main computer system (and often the only) in the control center. However, the information displayed by the SCADA is often inadequate, and several tasks cannot be solved by a conventional SCADA system. A need for new computer applications in control center arises from the insufficiency of the SCADA and some other trends. The latter means that the overall importance of the distribution networks is increasing. The slowing down of load-growth has often made network reinforcements unprofitable. Thus the existing network must be operated more efficiently. At the same time larger distribution areas are for economical reasons being monitored at one control center and the size of the operation staff is decreasing. The quality of supply requirements are also becoming stricter. The needed data for new applications is mainly available in some existing systems. Thus the computer systems of utilities must be integrated. The main data source for the new applications in the control center are the AM/FM/GIS (i.e. the network database system), the SCADA, and the customer information system (CIS). The new functions can be embedded in some existing computer system. This means a strong dependency on the vendor of the existing system. An alternative strategy is to develop an independent system which is integrated with other computer systems using well-defined interfaces. The latter approach makes it possible to use the new applications in various computer environments, having only a weak dependency on the

  10. Web-Based Dissemination System for the Trusted Computing Exemplar Project

    National Research Council Canada - National Science Library

    Kane, Douglas R., Jr

    2005-01-01

    Open dissemination of the Trusted Computing Exemplar (TCX) project is needed. This dissemination must include methods to provide secure web access to project material, integrity verification of data, and group-based access controls...

  11. The Relationship between Teamwork and Organizational Trust

    Directory of Open Access Journals (Sweden)

    Musab Işık

    2015-04-01

    Full Text Available The aim of this study is to investigate the relationship between teamwork and organizational trust. In the implementation section the data from the survey of 250 workers is employed in call centers in Erzurum by using relevant statistical methods. Consequently, it is found that there is a positive and significant relationship between teamwork and organizational trust. Thus, the hypothesis of the study is supported as it was expected. Besides, it is found that there are positive and significant relationships between communication, openness to innovation, participation-trust in teamwork and organizational trust, trust in management, trust in co-workers, and trust in workplace.

  12. Management Information System

    Science.gov (United States)

    1984-01-01

    New Automated Management Information Center (AMIC) employs innovative microcomputer techniques to create color charts, viewgraphs, or other data displays in a fraction of the time formerly required. Developed under Kennedy Space Center's contract by Boeing Services International Inc., Seattle, WA, AMIC can produce an entirely new informational chart in 30 minutes, or an updated chart in only five minutes. AMIC also has considerable potential as a management system for business firms.

  13. 77 FR 31378 - Secretarial Commission on Indian Trust Administration and Reform

    Science.gov (United States)

    2012-05-25

    ... the trust administration system based on information obtained from the Commission's activities... input and information from two public meetings and has requested feedback on five questions regarding... potential improvements to the existing management and administration of the trust administration system. The...

  14. Pickering tool management system

    International Nuclear Information System (INIS)

    Wong, E.H.; Green, A.H.

    1997-01-01

    Tools were being deployed in the station with no process in effect to ensure that they are maintained in good repair so as to effectively support the performance of Maintenance activities. Today's legal requirements require that all employers have a process in place to ensure that tools are maintained in a safe condition. This is specified in the Ontario Health and Safety Act. The Pickering Tool Management System has been chosen as the process at Pickering N.D to manage tools. Tools are identified by number etching and bar codes. The system is a Windows application installed on several file servers

  15. Trust as a Critical Concept

    DEFF Research Database (Denmark)

    Bordum, Anders

    2004-01-01

    In this articlei I will argue that trust is a fundamental and critical concept because trust is the direct or transcendental constitutive ground of most social phenomena, as well as applicable as an operational method in critical theory. There are two different but overlapping positions on trust I...... address in this article. One is the standpoint we find in business strategy, that trust is naïve to show, and control or contracts are presumed better. In the strategy game the idealistic good guys seems to lose (Arrow 1974), (Williamson 1975). The other position is the position taken by systems theory...... where trust is treated as if it was a value-neutral system-internal decision, which presupposes that trust and mistrust are symmetrically interrelated functionally (Luhmann 1979). In his early book Trust and Power, Niklas Luhmann seems to agree with the vision guiding my general argument...

  16. Modeling trust context in networks

    CERN Document Server

    Adali, Sibel

    2013-01-01

    We make complex decisions every day, requiring trust in many different entities for different reasons. These decisions are not made by combining many isolated trust evaluations. Many interlocking factors play a role, each dynamically impacting the others.? In this brief, 'trust context' is defined as the system level description of how the trust evaluation process unfolds.Networks today are part of almost all human activity, supporting and shaping it. Applications increasingly incorporate new interdependencies and new trust contexts. Social networks connect people and organizations throughout

  17. Designing High-Trust Organizations

    DEFF Research Database (Denmark)

    Jagd, Søren

    The specific problem considered in this paper is what are the key issues to consider for managers involved in designing high-trust organizations, a design problem still not properly explored. This paper intends to take the first step in filling this lacuna. In the paper, I first present the exist......The specific problem considered in this paper is what are the key issues to consider for managers involved in designing high-trust organizations, a design problem still not properly explored. This paper intends to take the first step in filling this lacuna. In the paper, I first present...... the existing management and research literature on building high-trust organizations. Then I explore Alan Fox’s (1974) analysis of low-trust vs. high-trust dynamics which, I argue, may serve as a theoretically stronger basis for understanding the issues management have to consider when designing hightrust...... organizations...

  18. An Operational Semantics for Trust Policies

    DEFF Research Database (Denmark)

    Krukow, Karl Kristian

    2005-01-01

    In the trust-structure model of trust management, principals specify their trusting relationships with other principals in terms of trust policies. In their paper on trust structures, Carbone et al. present a language for trust policies, and provide a suitable denotational semantics. The semantics...... ensures that for any collection of trust policies, there is always a unique global trust-state, compatible with all the policies, specifying everyone's degree of trust in everyone else. However, as the authors themselves point out, the language lacks an operational model: the global trust-state is a well......-defined mathematical object, but it is not clear how principals can actually compute it. This becomes even more apparent when one considers the intended application environment: vast numbers of autonomous principals, distributed and possibly mobile. We provide a compositional operational semantics for a language...

  19. Integrated management system

    International Nuclear Information System (INIS)

    Florescu, N.

    2003-01-01

    A management system is developed in order to reflect the needs of the business and to ensure that the objectives of the organization will be achieved. The process model and each individual process within the system then needs to identify the drives or requirements from external customers and stakeholders, regulations, and standards such as ISO and 50-C-Q. The processes are then developed to address these drivers. Developing the process in this way makes it fully integrated and capable of incorporating any new requirements. The International Standard (ISO 9000:2000) promotes the adoption of a process approach when developing, implementing and improving the effectiveness of a quality management system to enhance customer satisfaction by meeting customer requirements. The IAEA Code recognizes that the entire work is a process which can be planned, assessed and improved. For an organization to function effectively, numerous linked activities have to be identified and managed. By definition a process is an activity that using resources and taking into account all the constraints imposed executes the necessary operations which transform the inputs in outcomes. Running a system of processes within an organization, identification of the interaction between the processes and their management can be referred to as a 'process approach'. The advantage of such an approach is the ensuring of the ongoing control over the linkage between the individual processes composing the system as well as over their combination and interaction. Developing a management system implies: identification of the process which delivers Critical Success Factor (CSFs) of the business; identifying the support processes enabling the CSFs to be accomplished; identifying the processes that deliver the business fundamentals. An integrated management system should include all activities not only those related to Quality, Health and Safety. When developing an IMS it is necessary to identify all of the drivers

  20. Anesthesia information management systems

    Directory of Open Access Journals (Sweden)

    Feri Štivan

    2014-08-01

    Full Text Available Introduction: The use of anesthesia information management systems (AIMS is on the increase. This is particularly true for academic anesthesia departments. The main reasons for slow adoption of these systems in the past are financial barriers associated with implementation of these systems and their not so traditionally obvious potential to improve patient care. In addition, a major obstacle to acceptance of this technology is the concern of users over the impact of the electronic anesthesia record on malpractice exposure.Conclusions: The experience reported by departments using AIMS indicates that these systems are useful for managing malpractice risk. AIMS can enhance the efficiency and effectiveness of preoperative, intraoperative, and post-operative anesthesia care. However, AIMS are able to increase the quality of care and improve operating room efficiency only with careful planning, installation, and customization. Strengths, weaknesses, opportunities and threats (SWOT analysis performed for AIMS could help departments in making better decisions when implementing AIMS.

  1. DIRAC Data Management System

    CERN Document Server

    Smith, A C

    2007-01-01

    The LHCb experiment being built to utilize CERN’s flagship Large Hadron Collider will generate data to be analysed by a community of over 600 physicists worldwide. DIRAC, LHCb’s Workload and Data Management System, facilitates the use of underlying EGEE Grid resources to generate, process and analyse this data in the distributed environment. The Data Management System, presented here, provides real-time, data-driven distribution in accordance with LHCb’s Computing Model. The data volumes produced by the LHC experiments are unprecedented, rendering individual institutes and even countries, unable to provide the computing and storage resources required to make full use of the produced data. EGEE Grid resources allow the processing of LHCb data possible in a distributed fashion and LHCb’s Computing Model is based on this approach. Data Management in this environment requires reliable and high-throughput transfer of data, homogeneous access to storage resources and the cataloguing of data replicas, all of...

  2. Distribution management system

    Energy Technology Data Exchange (ETDEWEB)

    Verho, P.; Kaerenlampi, M.; Pitkaenen, M.; Jaerventausta, P.; Partanen, J.

    1997-12-31

    This report comprises a general description of the results obtained in the research projects `Information system applications of a distribution control center`, `Event analysis in primary substation`, and `Distribution management system` of the EDISON research program during the years of 1993 - 1997. The different domains of the project are presented in more detail in other reports. An operational state analysis of a distribution network has been made from the control center point of view and the functions which can not be solved by a conventional SCADA system are determined. The basis for new computer applications is shown to be integration of the computer systems. The main result of the work is a distribution management system (DMS), which is an autonomous system integrated to the existing information systems, SCADA and AM/FM/GIS. The system uses a large number of modelling and computation methods and provides an extensive group of advanced functions to support the distribution network monitoring, fault management, operations planning and optimization. The development platform of the system consists of a Visual C++ programming environment, Windows NT operating system and PC. During the development the DMS has been tested in a pilot utility and it is nowadays in practical use in several Finnish utilities. The use of a DMS improves the quality and economy of power supply in many ways; the outage times can, in particular, be reduced using the system. Based on the achieved experiences some parts of the DMS reached the commercialization phase, too. Initially the commercial products were developed by a software company, Versoft Oy. At present the research results are the basis of a worldwide software product supplied by ABB Transmit Co. (orig.) EDISON Research Programme. 28 refs.

  3. The effect of different navigation voices on trust and attention while using in-vehicle navigation systems.

    Science.gov (United States)

    Large, David R; Burnett, Gary E

    2014-06-01

    Automobiles are suffused with computers and technology designed to support drivers at all levels of the driving hierarchy. Classic secondary devices, such as in-vehicle navigation systems (IVNS), present strategic and tactical information to drivers. In order to mitigate the potential distraction and workload when interacting with these devices while driving, IVNS often employ voices to deliver navigational instructions. In contrast, voices are used during interpersonal encounters to engage the listener, provide clues about the speaker's personality and make judgments about them, for example, whether to like them and to trust them. A study conducted within a fixed-based medium-fidelity driving simulator investigated if drivers made similar 'personality' attributions to voices emanating from an IVNS and if this subsequently affected how they engaged with the device while driving. Twenty-nine experienced drivers and IVNS users drove to a specified destination with a simulated IVNS and authentically reproduced UK road signage to support their route-finding. Either of two navigation voices were used; one considered 'high-trust' and the other 'low-trust.' Presented with a conflict scenario, where the verbal route guidance differed to the road signs, 22 drivers followed the IVNS instruction rather than the road signs. Of these, the majority were using the 'high-trust' voice. A post-drive questionnaire revealed that, despite the fact that message content and delivery remained equivalent, participants recognized different attributes ('personalities') associated with each of the navigation voices. This influenced their attitudes towards them, including how much they liked them, their preferences for use, and the level of trust that they associated with each voice. While these, so-called, social responses may be invited and indeed encouraged in other contexts, in the automotive domain they are likely to conflict with the intended benefits of using a voice to deliver route

  4. DIRAC Workload Management System

    CERN Document Server

    Garonne, V; Stokes-Rees, I

    2005-01-01

    The Workload Management System is the core component of the DIRAC distributed MC production and analysis grid environment of the CERN LHCb experiment. This paper discusses the architecture, implementation and performance of this system. The WMS is a community scheduler, realizing a pull paradigm, particulary for the high troughput computing context. It has recently been used for an intensive physics simulation production involving more than 60 sites, 65 TB of data, and over 1000-GHz processor-years.

  5. DISEASE MANAGEMENT INFORMATION SYSTEM

    OpenAIRE

    Bens Pardamean; Anindito; Anjela Djoeang; Nana Tobing

    2013-01-01

    The study designed an information system model for Disease Management (DisMan) that met the specifications and needs of a consumer electronics manufacturer. The diseases monitored by this study were diabetes, hypertension and tuberculosis. Data were collected through interviews with the companyâs human resources department and occupational health provider. As for the model, literature and online research were conducted to collect health standards and information system standards on existing D...

  6. Pollution management system

    DEFF Research Database (Denmark)

    2015-01-01

    A pollution management system comprises an array of one or more inlets and at least one outlet. The one or more inlets are arranged to collect polluted air and supply said polluted air to a polluted air treatment element. The one or more inlets each comprise a respective inlet sensor for measuring...

  7. Visual management support system

    Science.gov (United States)

    Lee Anderson; Jerry Mosier; Geoffrey Chandler

    1979-01-01

    The Visual Management Support System (VMSS) is an extension of an existing computer program called VIEWIT, which has been extensively used by the U. S. Forest Service. The capabilities of this program lie in the rapid manipulation of large amounts of data, specifically opera-ting as a tool to overlay or merge one set of data with another. VMSS was conceived to...

  8. A Cloud Theory-Based Trust Computing Model in Social Networks

    Directory of Open Access Journals (Sweden)

    Fengming Liu

    2016-12-01

    Full Text Available How to develop a trust management model and then to efficiently control and manage nodes is an important issue in the scope of social network security. In this paper, a trust management model based on a cloud model is proposed. The cloud model uses a specific computation operator to achieve the transformation from qualitative concepts to quantitative computation. Additionally, this can also be used to effectively express the fuzziness, randomness and the relationship between them of the subjective trust. The node trust is divided into reputation trust and transaction trust. In addition, evaluation methods are designed, respectively. Firstly, the two-dimension trust cloud evaluation model is designed based on node’s comprehensive and trading experience to determine the reputation trust. The expected value reflects the average trust status of nodes. Then, entropy and hyper-entropy are used to describe the uncertainty of trust. Secondly, the calculation methods of the proposed direct transaction trust and the recommendation transaction trust involve comprehensively computation of the transaction trust of each node. Then, the choosing strategies were designed for node to trade based on trust cloud. Finally, the results of a simulation experiment in P2P network file sharing on an experimental platform directly reflect the objectivity, accuracy and robustness of the proposed model, and could also effectively identify the malicious or unreliable service nodes in the system. In addition, this can be used to promote the service reliability of the nodes with high credibility, by which the stability of the whole network is improved.

  9. Use Trust Management Framework to Achieve Effective Security Mechanisms in Cloud Environment

    Directory of Open Access Journals (Sweden)

    Hicham Toumi

    2017-03-01

    Full Text Available Cloud Computing is an Internet based Computing where virtual shared servers provide software, infrastructure, platform and other resources to the customer on pay-as-you-use basis. Cloud Computing is increasingly becoming popular as many enterprise applications and data are moving into cloud platforms. However, with the enormous use of Cloud, the probability of occurring intrusion also increases. There is a major need of bringing security, transparency and reliability in cloud model for client satisfaction. One of the security issues is how to reduce the impact of any type of intrusion in this environment. To address this issue, a security solution is proposed in this paper. We provide a collaborative framework between our Hybrid Intrusion Detection System (Hy-IDS based on Mobile Agents and virtual firewalls. Therefore, our hybrid intrusion detection system consists of three types of IDS namely IDS-C, IDS-Cr and IDS-M, which are dispatched over three layer of cloud computing. In the first layer, we use IDS-C over our framework to collect, analyze and detect malicious data using Mobile Agents. In case of attack, we collect at the level of the second layer all the malicious data detected in the first layer for the generation of new signatures using IDS-Cr, which is based on a Signature Generation Algorithm (SGA and network intrusion detection system (NIDS. Finally, through an IDS-M placed in the third layer, the new signatures will be used to update the database NIDS belonging to IDS-Cr, then the database to NIDS belonging of IDS-Cr the cluster neighboring and also their IDS-C. Hardware firewall is unable to control communication between virtual machines on the same hypervisor. Moreover, they are blind to virtual traffic. Mostly, they are deployed at Virtual Machine Monitor- level (VMM under Cloud provider’s control. Equally, the mobile agents play an important role in this collaboration. They are used in our framework for investigation of hosts

  10. The mental models of vaccination, trust in health care system and parental attitudes towards childhood vaccination

    Directory of Open Access Journals (Sweden)

    Bojan Gjorgjievski

    2016-11-01

    Full Text Available Many contradictory notions have been appearing in the area of health care in recent years, including those related to attitudes towards vaccination. On the basis of their understanding of the phenomenon some parents oppose to the vaccination. The purpose of this study was to compare mental models of laymen with expert models and examine the correlation of the mental models of vaccination and the trust in doctors and healthcare system with the parental attitudes on childhood vaccination. In doing so, we have considered the demographic characteristics of the parents and cultural differences between parents from Slovenia and Macedonia. We were also interested in the role of compulsory and optional vaccination, because in the latter the behavioral intention is expressed more clearly. The methods used in our study of mental models was based on the approach of Morgan, Fischhoff, Bostrom and Atman (2002 which has three phases: (1 obtaining expert mental models, (2 getting mental models of the laymen (e.g., parents and (3 comparison of both mental models. Expert models of vaccination were obtained from five doctors from Slovenia and five doctors from Macedonia. Laymen models of vaccination were obtained in structured interviews with 33 parents from Slovenia and 30 from Macedonia. Based on comparisons of expert and laymental models it can be concluded that the mental models of vaccination from parents of one-year old children differ from expert mental models. Most parents, both Macedonian and Slovenian, have also responded that they have greater confidence in the doctors rather than the healthcare system, mainly due to positive experiences with the selected pediatrician. In some Slovenian parents, a tendency to identify compulsory vaccination with force was noticed.

  11. Petascale system management experiences.

    Energy Technology Data Exchange (ETDEWEB)

    Desai, N.; Bradshaw, R.; Lueninghoener, C.; Cherry, A.; Coghlan, S.; Scullin, W. (LCF); ( MCS)

    2008-01-01

    National Laboratory, and a 504 TF Opteron-based system has been deployed at Texas Advanced Computing Center (TACC). Intrepid is comprised of 40,960 nodes with a total of 163,840 cores. While systems like these are uncommon now, we expect them to become more widespread in the coming years. The scale of these large systems impose several requirements upon system architecture. The need for scalability is obvious, however, power efficiency and density constraints have become increasingly important in recent years. At the same time, because the size of administrative staff cannot grow linearly with the system size, more efficient system management techniques are needed. In this paper we will describe our experiences administering Intrepid. Over the last year, we have experienced a number of interesting challenges in this endeavor. Our initial expectation was for scalability to be the dominant system issue. This expectation was not accurate. Several issues expected to have minor impact have played a much greater role in system operations. Debugging, due to the large numbers of components used in scalable system operations, has become a much more difficult endeavor. The system has a sophisticated monitoring system, however, the analysis of this data has been problematic. These issues are not specific to HPC workloads in any way, so we expect them to be of general interest. This paper consists of three major parts. First, we will provide a detailed overview of several important aspects of Intrepid's hardware and software. In this, we will highlight aspects that have featured prominently in our system management experiences. Next, we will describe our administration experiences in detail. Finally, we will draw some conclusions based on these experiences. In particular, we will discuss the implications for the non-HPC world, system managers, and system software developers.

  12. A Novel Iterative and Dynamic Trust Computing Model for Large Scaled P2P Networks

    Directory of Open Access Journals (Sweden)

    Zhenhua Tan

    2016-01-01

    Full Text Available Trust management has been emerging as an essential complementary part to security mechanisms of P2P systems, and trustworthiness is one of the most important concepts driving decision making and establishing reliable relationships. Collusion attack is a main challenge to distributed P2P trust model. Large scaled P2P systems have typical features, such as large scaled data with rapid speed, and this paper presented an iterative and dynamic trust computation model named IDTrust (Iterative and Dynamic Trust model according to these properties. First of all, a three-layered distributed trust communication architecture was presented in IDTrust so as to separate evidence collector and trust decision from P2P service. Then an iterative and dynamic trust computation method was presented to improve efficiency, where only latest evidences were enrolled during one iterative computation. On the basis of these, direct trust model, indirect trust model, and global trust model were presented with both explicit and implicit evidences. We consider multifactors in IDTrust model according to different malicious behaviors, such as similarity, successful transaction rate, and time decay factors. Simulations and analysis proved the rightness and efficiency of IDTrust against attacks with quick respond and sensitiveness during trust decision.

  13. Smart energy management system

    Science.gov (United States)

    Desai, Aniruddha; Singh, Jugdutt

    2010-04-01

    Peak and average energy usage in domestic and industrial environments is growing rapidly and absence of detailed energy consumption metrics is making systematic reduction of energy usage very difficult. Smart energy management system aims at providing a cost-effective solution for managing soaring energy consumption and its impact on green house gas emissions and climate change. The solution is based on seamless integration of existing wired and wireless communication technologies combined with smart context-aware software which offers a complete solution for automation of energy measurement and device control. The persuasive software presents users with easy-to-assimilate visual cues identifying problem areas and time periods and encourages a behavioural change to conserve energy. The system allows analysis of real-time/statistical consumption data with the ability to drill down into detailed analysis of power consumption, CO2 emissions and cost. The system generates intelligent projections and suggests potential methods (e.g. reducing standby, tuning heating/cooling temperature, etc.) of reducing energy consumption. The user interface is accessible using web enabled devices such as PDAs, PCs, etc. or using SMS, email, and instant messaging. Successful real-world trial of the system has demonstrated the potential to save 20 to 30% energy consumption on an average. Low cost of deployment and the ability to easily manage consumption from various web enabled devices offers gives this system a high penetration and impact capability offering a sustainable solution to act on climate change today.

  14. Air System Information Management

    Science.gov (United States)

    Filman, Robert E.

    2004-01-01

    I flew to Washington last week, a trip rich in distributed information management. Buying tickets, at the gate, in flight, landing and at the baggage claim, myriad messages about my reservation, the weather, our flight plans, gates, bags and so forth flew among a variety of travel agency, airline and Federal Aviation Administration (FAA) computers and personnel. By and large, each kind of information ran on a particular application, often specialized to own data formats and communications network. I went to Washington to attend an FAA meeting on System-Wide Information Management (SWIM) for the National Airspace System (NAS) (http://www.nasarchitecture.faa.gov/Tutorials/NAS101.cfm). NAS (and its information infrastructure, SWIM) is an attempt to bring greater regularity, efficiency and uniformity to the collection of stovepipe applications now used to manage air traffic. Current systems hold information about flight plans, flight trajectories, weather, air turbulence, current and forecast weather, radar summaries, hazardous condition warnings, airport and airspace capacity constraints, temporary flight restrictions, and so forth. Information moving among these stovepipe systems is usually mediated by people (for example, air traffic controllers) or single-purpose applications. People, whose intelligence is critical for difficult tasks and unusual circumstances, are not as efficient as computers for tasks that can be automated. Better information sharing can lead to higher system capacity, more efficient utilization and safer operations. Better information sharing through greater automation is possible though not necessarily easy.

  15. Integrated management systems

    DEFF Research Database (Denmark)

    Jørgensen, Tine Herreborg; Remmen, Arne; Mellado, M. Dolores

    2006-01-01

    of integration. The focus of the article is primarily to discuss three ambition levels of integration: from increased compatibility of system elements over coordination of generic processes to an embeddedness of an integrated management system (IMS) in a culture of learning and continuous improvements......Different approaches to integration of management systems (ISO 9001, ISO 14001, OHSAS 18001 and SA 8000) with various levels of ambition have emerged. The tendency of increased compatibility between these standards has paved the road for discussions of, how to understand the different aspects....... At present, national IMS standards are being developed, and the IMS standards in Denmark and Spain are being analysed regarding the ambition level for integration. Should the ISO organisation decide to make a standard for IMS, then it would be necessary to consider the different levels of integration...

  16. Trust and responsible eco managing. The case of state controlled repacking

    DEFF Research Database (Denmark)

    Rittenhofer, Iris

    The paper is concerned with a case of local management of eco certification. With outset in a case study, the paper explores the relation of eco certification to economy, society and culture. The paper emphasizes the multidimensional quality of local eco management of global organic agrifood...

  17. Strategic Alliance Poker: Demonstrating the Importance of Complementary Resources and Trust in Strategic Alliance Management

    Science.gov (United States)

    Reutzel, Christopher R.; Worthington, William J.; Collins, Jamie D.

    2012-01-01

    Strategic Alliance Poker (SAP) provides instructors with an opportunity to integrate the resource based view with their discussion of strategic alliances in undergraduate Strategic Management courses. Specifically, SAP provides Strategic Management instructors with an experiential exercise that can be used to illustrate the value creation…

  18. Trusted Computing Strengthens Cloud Authentication

    Directory of Open Access Journals (Sweden)

    Eghbal Ghazizadeh

    2014-01-01

    Full Text Available Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM. Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM are great technologies for solving the trust and security concerns in the cloud identity environment. Single sign-on (SSO and OpenID have been released to solve security and privacy problems for cloud identity. This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in .Net environment. Security analyzing, simulation, and BLP confidential model are three ways to evaluate and analyze our proposed model.

  19. Trusted computing strengthens cloud authentication.

    Science.gov (United States)

    Ghazizadeh, Eghbal; Zamani, Mazdak; Ab Manan, Jamalul-lail; Alizadeh, Mojtaba

    2014-01-01

    Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM). Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM) are great technologies for solving the trust and security concerns in the cloud identity environment. Single sign-on (SSO) and OpenID have been released to solve security and privacy problems for cloud identity. This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in .Net environment. Security analyzing, simulation, and BLP confidential model are three ways to evaluate and analyze our proposed model.

  20. Mastering the management system.

    Science.gov (United States)

    Kaplan, Robert S; Norton, David P

    2008-01-01

    Companies have always found it hard to balance pressing operational concerns with long-term strategic priorities. The tension is critical: World-class processes won't lead to success without the right strategic direction, and the best strategy in the world will get nowhere without strong operations to execute it. In this article, Kaplan, of Harvard Business School, and Norton, founder and director of the Palladium Group, explain how to effectively manage both strategy and operations by linking them tightly in a closed-loop management system. The system comprises five stages, beginning with strategy development, which springs from a company's mission, vision, and value statements, and from an analysis of its strengths, weaknesses, and competitive environment. In the next stage, managers translate the strategy into objectives and initiatives with strategy maps, which organize objectives by themes, and balanced scorecards, which link objectives to performance metrics. Stage three involves creating an operational plan to accomplish the objectives and initiatives; it includes targeting process improvements and preparing sales, resource, and capacity plans and dynamic budgets. Managers then put plans into action, monitoring their effectiveness in stage four. They review operational, environmental, and competitive data; assess progress; and identify barriers to execution. In the final stage, they test the strategy, analyzing cost, profitability, and correlations between strategy and performance. If their underlying assumptions appear faulty, they update the strategy, beginning another loop. The authors present not only a comprehensive blueprint for successful strategy execution but also a managerial tool kit, illustrated with examples from HSBC Rail, Cigna Property and Casualty, and Store 24. The kit incorporates leading management experts' frameworks, outlining where they fit into the management cycle.

  1. Mediating Trust in Terrorism Coverage

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    Mass mediated risk communication can contribute to perceptions of threats and fear of “others” and/or to perceptions of trust in fellow citizens and society to overcome problems. This paper outlines a cross-disciplinary holistic framework for research in mediated trust building during an acute...... crisis. While the framework is presented in the context of television coverage of a terror-related crisis situation, it can equally be used in connection with all other forms of mediated trust. Key words: National crisis, risk communication, crisis management, television coverage, mediated trust....

  2. Graph-Based Trust Model for Evaluating Trust Using Subjective Logic

    OpenAIRE

    Alhadad , Nagham; Busnel , Yann; Serrano-Alvarado , Patricia; Lamarre , Philippe

    2013-01-01

    50 pages; Before using a digital system, it is necessary to evaluate it according to different parameters. Lately trust emerged as a momentous aspect of evaluation. Evaluating trust in a system is a complex issue that becomes more challenging when systems use distributed architectures. In a previous work, we proposed SocioTrust, a trust model that is based on probability theory to evaluate trust in a system for an activity. In SocioTrust, trust values are considered as the probability, by whi...

  3. Trust Transitivity and Conditional Belief Reasoning

    OpenAIRE

    Josang, Audun; Ažderska, Tanja; Marsh, Stephen

    2012-01-01

    Part 1: Full Papers; International audience; Trust transitivity is a common phenomenon embedded in human reasoning about trust. Given a specific context or purpose, trust transitivity is often manifested through the humans’ intuition to rely on the recommendations of a trustworthy advisor about another entity that the advisor recommends. Although this simple principle has been formalised in various ways for many trust and reputation systems, there is no real or physical basis for trust transi...

  4. Verification Account Management System (VAMS)

    Data.gov (United States)

    Social Security Administration — The Verification Account Management System (VAMS) is the centralized location for maintaining SSA's verification and data exchange accounts. VAMS account management...

  5. Building trust

    International Nuclear Information System (INIS)

    Lewis, Meriel

    1995-01-01

    'Activate' is the energy magazine for secondary schools and is part of the Education Programme which is managed on behalf of the British Nuclear Industry Forum by AEA Technology. activate is the flagship communication device between the British Nuclear Industry Forum's Education Programme and secondary schools in the UK. It was developed from a previous publication, Nuclear Bulletin. There is a need for the nuclear industry to build trust with teachers and students in the UK, where for a long time, everything that the industry has said, written or printed has been disregarded by school teachers as propaganda. Over the last few years the industry has put in a great deal of effort to position itself as a provider of educationally sound and socially acceptable information. 'Activate' was an evolution of this idea and there was a hole in the market for a lively, activity and article based magazine that could be used in the classroom. The target audience is principally teachers of science, mathematics and geography, but also includes teachers of art,, English and history with students of between 11 and 18. The results were very positive in that teachers appreciated the colourful and lively nature of activate and they felt that it provided information and opinions in an un biased and non-propagandist way. Their comments about layout, number of activities style of presentation were taken into account and during the summer of 1994 activate was remodelled ready for re launch in September. The feedback so far is good with more teachers signing up every week to receive their own free copy

  6. HLT configuration management system

    CERN Document Server

    Daponte, Vincenzo

    2015-01-01

    The CMS High Level Trigger (HLT) is implemented running a streamlined version of the CMS offline reconstruction software running on thousands of CPUs. The CMS software is written mostly in C++, using Python as its configuration language through an embedded CPython interpreter. The configuration of each process is made up of hundreds of modules, organized in sequences and paths. As an example, the HLT configurations used for 2011 data taking comprised over 2200 different modules, organized in more than 400 independent trigger paths. The complexity of the HLT configurations and the large number of configuration produced require the design of a suitable data management system. The present work describes the designed solution to manage the considerable number of configurations developed and to assist the editing of new configurations. The system is required to be remotely accessible and OS-independent as well as easly maintainable easy to use. To meet these requirements a three-layers architecture has been choose...

  7. Towards a politics of trust.

    Science.gov (United States)

    Gilbert, T

    1998-05-01

    This paper draws upon sociological theory to demonstrate that the manufacture and deployment of trust is an integral part of the function of complex systems such as health care. The discussion begins by identifying the error within the nursing literature which arises from a rather technical conceptualization of trust. This tends to limit the dimensions to trust which is established, and fails to recognize that trust may be subject to competition and conflict. The paper continues by drawing upon the work of two theorists, Niklas Luhmann and Susan P. Shapiro, to demonstrate how trust functions within systems such as health care and the mechanisms through which it is controlled. The title of this paper, 'Towards a politics of trust', identifies that this is merely the first stage in the analysis. Further stages are necessary which analyse the ways in which power is exercised in the conflict for control within discrete elements of the system.

  8. Application of Fuzzy Comprehensive Evaluation Method in Trust Quantification

    Directory of Open Access Journals (Sweden)

    Shunan Ma

    2011-10-01

    Full Text Available Trust can play an important role for the sharing of resources and information in open network environments. Trust quantification is thus an important issue in dynamic trust management. By considering the fuzziness and uncertainty of trust, in this paper, we propose a fuzzy comprehensive evaluation method to quantify trust along with a trust quantification algorithm. Simulation results show that the trust quantification algorithm that we propose can effectively quantify trust and the quantified value of an entity's trust is consistent with the behavior of the entity.

  9. Beneficiaries of conflict: a qualitative study of people’s trust in the private health care system in Mogadishu, Somalia

    Directory of Open Access Journals (Sweden)

    Gele AA

    2017-08-01

    Full Text Available Abdi A Gele,1–3 Mohamed Yusuf Ahmed,4 Prabhjot Kour,2 Sadiyo Ali Moallim,5 Abdulwahab Moallim Salad,3 Bernadette Kumar2 1Institute of Nursing and Health Promotion, Department of Health, Oslo and Akershus University College of Applied Science, 2Department for Research, Norwegian Centre for Minority Health Research, Oslo, Norway; 3Center for Health Research, Somali National University, 4Department of Business Management, Simad University, 5Faculty of Medicine, Benadir University, Mogadishu, Somalia Background: In 2005, the World Health Conference called for all nations to move toward universal health coverage, which is defined as “access to adequate health care for all at an affordable price”. Despite this, an estimated 90% of Somalia’s largely impoverished population use private health care. Therefore, considering that the private health care system is the dominant health care system in Mogadishu, Somalia, exploring the accessibility to, as well as people’s trust in, the private sector is essential to help contribute an equitable and affordable health care system in the country.Methods: A qualitative study using unstructured interviews was conducted in Mogadishu from August to November of 2016. A purposive sampling approach was used to recruit 23 participants, including seven medical doctors who own private health centers, eight patients, five medical students and three senior officials who work for the Ministry of Health. Data were analyzed using a thematic analysis.Results: Our findings show that the private health care system in Mogadishu is not only unregulated but also expensive, with the cost of health care often unaffordable for the majority of the country’s citizens. There is evidence of prescription of inappropriate treatment, tendency to conduct unnecessary laboratory tests, excessive use of higher diagnostic technologies and overcharging – including the widespread practice of further appointments for follow-up – which

  10. Can we trust robots?

    NARCIS (Netherlands)

    Coeckelbergh, Mark

    2011-01-01

    Can we trust robots? Responding to the literature on trust and e-trust, this paper asks if the question of trust is applicable to robots, discusses different approaches to trust, and analyses some preconditions for trust. In the course of the paper a phenomenological-social approach to trust is

  11. 78 FR 3044 - Exchange Traded Spreads Trust, et al.; Notice of Application

    Science.gov (United States)

    2013-01-15

    ..., ``Investing Management Companies,'' such unit investment trusts, ``Investing Trusts,'' and Investing Management Companies and Investing Trusts together are ``Investing Funds''). Investing Funds do not include... Fund, applicants propose a condition prohibiting the adviser of an Investing Management Company...

  12. Goals, trust, participation, and feedback: Linking internal management with performance outcomes

    NARCIS (Netherlands)

    Favero, Nathan; Meier, Kenneth J.; O'Toole, Laurence J.

    2016-01-01

    Much recent work in the study of public administration has emphasized new challenges and relatively unusual aspects of management. However, it is likely that the core features of traditional public administration play a crucial role, particularly regarding the delivery of performance. The most

  13. 76 FR 58059 - Investment Managers Series Trust, et al.; Notice of Application

    Science.gov (United States)

    2011-09-19

    ... investment objectives, policies and restrictions. For the investment management services that it provides to... to select one or more Subadvisers best suited to achieve a Fund's investment objectives. Applicants... comply with each Fund's investment objective, policies and restrictions. 11. No Trustee or officer of the...

  14. Trust, performance and well-being in Nordic working life and management research

    DEFF Research Database (Denmark)

    Sørensen, Ole Henning; Hasle, Peter; Madsen, Christian Uhrenholdt

    2014-01-01

    In the last decades there has been a growing focus in working life and management research on sustainable organizational development that simultaneously improve organizational outcomes such as productivity and quality and employee outcomes such as well-being and job-satisfaction. Research has...

  15. Environmental Compliance Management System

    International Nuclear Information System (INIS)

    Brownson, L.W.; Krsul, T.; Peralta, R.A.; Knudson, D.A.; Rosignolo, C.L.

    1992-01-01

    Argonne National Laboratory (ANL) is developing the Environmental Compliance Management System (ECMS) as a comprehensive, cost-effective tool to ensure (1) that the Laboratory complies with all applicable federal and state environmental laws and regulations, (2) that environmental issues and concerns are recognized and considered in the early phases of projects; and (3) that Laboratory personnel conduct Laboratory operations in the most environmentally acceptable manner. The ECMS is an expert computer system which is designed to allow project engineers to perform an environmental evaluation of their projects. The system includes a Master Program which collects basic project information, provide utility functions, and access the environmental expert modules, environmental expert system modules for each federal and state environmental law which allows the user to obtain specific information on how an individual law may affect his project; and site-specific databases which contain information necessary for effective management of the site under environmental regulations. The ECMS will have the capability to complete and print many of the necessary environmental forms required by federal and state agencies, including the Department of Energy

  16. DIRAC Workload Management System

    CERN Document Server

    Paterson, S

    2007-01-01

    DIRAC (Distributed Infrastructure with Remote Agent Control) is the Workload and Data Management system (WMS) for the LHCb experiment. The DIRAC WMS offers a transparent way for LHCb users to submit jobs to the EGEE Grid as well as local clusters and individual PCs. This paper will describe workload management optimizations, which ensure high job efficiency and minimized job start times. The computing requirements of the LHCb experiment can only be fulfilled through the use of many distributed compute resources. DIRAC provides a robust platform to run data productions on all the resources available to LHCb including the EGEE Grid. More recently, user support was added to DIRAC that greatly simplifies the procedure of submitting, monitoring and retrieving output of Grid jobs for the LHCb user community. DIRAC submits Pilot Agents to the EGEE Grid via the gLite WMS as normal jobs. Pilot Agents then request jobs from the DIRAC Workload Management System after the local environment has been checked. Therefore DIR...

  17. Simulator configuration management system

    International Nuclear Information System (INIS)

    Faulent, J.; Brooks, J.G.

    1990-01-01

    The proposed revisions to ANS 3.5-1985 (Section 5) require Utilities to establish a simulator Configuration Management System (CMS). The proposed CMS must be capable of: Establishing and maintaining a simulator design database. Identifying and documenting differences between the simulator and its reference plant. Tracking the resolution of identified differences. Recording data to support simulator certification, testing and maintenance. This paper discusses a CMS capable of meeting the proposed requirements contained in ANS 3.5. The system will utilize a personal computer and a relational database management software to construct a simulator design database. The database will contain records to all reference nuclear plant data used in designing the simulator, as well as records identifying all the software, hardware and documentation making up the simulator. Using the relational powers of the database management software, reports will be generated identifying the impact of reference plant changes on the operation of the simulator. These reports can then be evaluated in terms of training needs to determine if changes are required for the simulator. If a change is authorized, the CMS will track the change through to its resolution and then incorporate the change into the simulator design database

  18. Programmatic risk management system

    Energy Technology Data Exchange (ETDEWEB)

    Mahn, J. [Sandia National Labs., Albuquerque, NM (United States); Wood, C.L. [Automated Solutions of Albuquerque, NM (United States)

    1996-07-01

    The purpose of the Programmatic Risk Management System (PRMS) is to evaluate and manage potential risks associated with proposed projects (i.e., new products or processes, or possible research and technological development projects). Although the PRMS considers some technical aspects of risk, the primary focus of the methodology is programmatic risk. That is, the methodology permits an assessment of risks associated with such issues as the ability to successfully produce a product that performs in accordance with all customer requirements, and the availability and allocation of resources (money, equipment, facilities, skilled personnel). The PRMS process consists of five formalized activities that are essential for effective management of risks associated with proposed projects. These activities include risk assessment, development of appropriate risk mitigation strategies, estimating strategy implementation cost, ranking of risk mitigation strategies for resource allocation, and scheduling of strategy implementing. The PRMS utilizes a ranking system that allows the user to identify the most cost-effective investment of resources of minimizing risk.

  19. Development of the environmental data management system

    International Nuclear Information System (INIS)

    Tatebe, Kazuaki; Suzuki, Yurina; Shirato, Seiichi; Sato, Yoshinori

    2012-02-01

    The recent society requires business activities with environmental consideration to every enterprise. Also, Japanese laws require those activities. For example, 'Law Concerning the Promotion of Business Activities with Environmental Consideration by Specified Corporations, etc, by Facilitating Access to Environmental Information, and Other Measures' (Environmental Consideration Law) mandates publication of a report relating to the activities of environmental consideration to each enterprise above designated size. 'Act on the Rational Use of Energy' mandates the report of the results of energy consumption and the long-term plan of the rational use of energy. Moreover, 'Act on Promotion of Global Warming Countermeasures' mandates the report of the greenhouse gas emissions. In addition to those, 'Water Pollution Control Law', 'Waste Management and Public Cleaning Law' and other environmental laws as well as environmental ordinances require business activities with environmental consideration to all companies. So, it is very important for Japan Atomic Energy Agency (JAEA) to report business activities with environmental consideration in order to build up trustful relations with the nation and communities. The Environmental Data Management System has been developed as the data base of business activities with environmental consideration in JAEA and as the means to promote the activities at every site and office of JAEA. This report summarizes the structure of the Environmental Data Management System, kinds of environmental performance data treated by the system, and gathering methods of the data. (author)

  20. Bank Customers Management System

    Directory of Open Access Journals (Sweden)

    Ebubeogu Amarachukwu Felix

    2015-08-01

    Full Text Available ABSTRACT The purpose of this project is in partial fulfilment of the requirements of Bachelor of Science Hon in Information Technology. The Design and development of this Bank customers Management system provides a more secured approach in managing bank customers information which strengthens the relationships between banks and their customers by providing the right solutions that uses a multi-level security to improve customer satisfaction. The technology used in developing this project is ASP.NET and the programming language used to develop this project is C and the IDE used is Microsoft Visual Studio 2013 professional in designing the front end while the back end uses Microsoft SQL Server 2012.

  1. Management Information Systems at CERN

    OpenAIRE

    Ferguson, J

    1986-01-01

    The specific areas addressed in the study are 1.Management decision support (data presentation, data base management systems â" DBMS, modeling) 2.Text processing, 3.Electronic communication for management purposes, 4.Office automation, 5.Administrative use of Management Information Systems (MIS) and in particular Administrative Data Processing (ADP).

  2. Trusted Computing Technologies, Intel Trusted Execution Technology.

    Energy Technology Data Exchange (ETDEWEB)

    Guise, Max Joseph; Wendt, Jeremy Daniel

    2011-01-01

    We describe the current state-of-the-art in Trusted Computing Technologies - focusing mainly on Intel's Trusted Execution Technology (TXT). This document is based on existing documentation and tests of two existing TXT-based systems: Intel's Trusted Boot and Invisible Things Lab's Qubes OS. We describe what features are lacking in current implementations, describe what a mature system could provide, and present a list of developments to watch. Critical systems perform operation-critical computations on high importance data. In such systems, the inputs, computation steps, and outputs may be highly sensitive. Sensitive components must be protected from both unauthorized release, and unauthorized alteration: Unauthorized users should not access the sensitive input and sensitive output data, nor be able to alter them; the computation contains intermediate data with the same requirements, and executes algorithms that the unauthorized should not be able to know or alter. Due to various system requirements, such critical systems are frequently built from commercial hardware, employ commercial software, and require network access. These hardware, software, and network system components increase the risk that sensitive input data, computation, and output data may be compromised.

  3. Trust and innovativeness in virtual organisations

    NARCIS (Netherlands)

    Pournaras, E.; Lazakidou, A.

    2008-01-01

    This paper discusses trust and control in a virtualised environment. An extensive use of information and communication technology, and virtualisation of organisations put trust into the core of management challenges. Trust is a glue that bonds individuals and groups together to form virtual teams

  4. Remedial action graphics management system

    International Nuclear Information System (INIS)

    Madson, M.E.

    1987-01-01

    The objective of the Graphics Management System is to provide a visual display of the Grand Junction vicinities properties status as a cost effective management tool. Capabilities of the system are listed and a series of sample displays are presented

  5. 5G-ENSURE - D2.2 Trust model (draft)

    OpenAIRE

    Phillips, Stephen; Correndo, Gianluca; Surridge, Michael; Sanchez Vilchez, Jose Manuel; Arfaoui, Ghada; Heikkinen, Seppo; Liinasuo, Marja; Ruuska, Pekka; Schaefer, Christian; Nasland, Mats; Borgaonkar, Ravishankar; O'Hanlon, Piers; Lendrino, Gorka; Salas, Carla; Zaccanoe, Pier Luigi

    2016-01-01

    Trust is a response to risk. A decision to trust someone (or something) is a decision to accept the risk that they will not perform as expected. To manage risk in a socio-technical system such as a mobile network we need to understand what trust decisions are being made, the consequences of those trust decisions and we need information on the trustworthiness of other parties in order to make better decisions.New business models and new domains of operation in 5G networks facilitated by networ...

  6. Early experiences with the multidose drug dispensing system – A matter of trust?

    OpenAIRE

    Wekre, Liv Johanne; Melby, Line; Grimsmo, Anders

    2011-01-01

    Beskriver en kvalitativ studie hvor hensikten var å undersøke helsepersonells erfaringer med multidose. Objective: to study early experiences with multidose drug dispensing (MDD) among different groups of health personnel. Design: qualitative study based on focus-group interviews. Setting: primary health care, Trondheim, Norway. Main outcome: the importance of trust in the technology and in collaborating partners is actualized in the early implementation of MDD. Results: GPs, home-care nur...

  7. Developing a point-of-care electronic medical record system for TB/HIV co-infected patients: experiences from Lighthouse Trust, Lilongwe, Malawi.

    Science.gov (United States)

    Tweya, Hannock; Feldacker, Caryl; Gadabu, Oliver Jintha; Ng'ambi, Wingston; Mumba, Soyapi L; Phiri, Dave; Kamvazina, Luke; Mwakilama, Shawo; Kanyerere, Henry; Keiser, Olivia; Mwafilaso, Johnbosco; Kamba, Chancy; Egger, Matthias; Jahn, Andreas; Simwaka, Bertha; Phiri, Sam

    2016-03-05

    Implementation of user-friendly, real-time, electronic medical records for patient management may lead to improved adherence to clinical guidelines and improved quality of patient care. We detail the systematic, iterative process that implementation partners, Lighthouse clinic and Baobab Health Trust, employed to develop and implement a point-of-care electronic medical records system in an integrated, public clinic in Malawi that serves HIV-infected and tuberculosis (TB) patients. Baobab Health Trust, the system developers, conducted a series of technical and clinical meetings with Lighthouse and Ministry of Health to determine specifications. Multiple pre-testing sessions assessed patient flow, question clarity, information sequencing, and verified compliance to national guidelines. Final components of the TB/HIV electronic medical records system include: patient demographics; anthropometric measurements; laboratory samples and results; HIV testing; WHO clinical staging; TB diagnosis; family planning; clinical review; and drug dispensing. Our experience suggests that an electronic medical records system can improve patient management, enhance integration of TB/HIV services, and improve provider decision-making. However, despite sufficient funding and motivation, several challenges delayed system launch including: expansion of system components to include of HIV testing and counseling services; changes in the national antiretroviral treatment guidelines that required system revision; and low confidence to use the system among new healthcare workers. To ensure a more robust and agile system that met all stakeholder and user needs, our electronic medical records launch was delayed more than a year. Open communication with stakeholders, careful consideration of ongoing provider input, and a well-functioning, backup, paper-based TB registry helped ensure successful implementation and sustainability of the system. Additional, on-site, technical support provided

  8. An Operational Semantics for Trust Policies

    DEFF Research Database (Denmark)

    Krukow, Karl

    2006-01-01

    In the trust-structure framework for trust management, principals specify their trusting relationships in terms of trust policies. In their paper on trust structures, Carbone et al. present a language for such policies, and provide a suitable denotational semantics. The semantics ensures that for......In the trust-structure framework for trust management, principals specify their trusting relationships in terms of trust policies. In their paper on trust structures, Carbone et al. present a language for such policies, and provide a suitable denotational semantics. The semantics ensures...... that for any collection of policies, there is always a unique global trust-state, compatible with all the policies, specifying everyone's degree of trust in everyone else. However, as the authors themselves point out, the language lacks an operational model: the global trust-state is a well......-defined mathematical object, but it is not clear how principals can actually compute it. This becomes even more apparent when one considers the intended application environment: vast numbers of autonomous principals, distributed and possibly mobile. We provide a compositional operational semantics for a language...

  9. The influences of patient's satisfaction with medical service delivery, assessment of medical service, and trust in health delivery system on patient's life satisfaction in China.

    Science.gov (United States)

    Tang, Liyang

    2012-09-14

    Patient's satisfaction with medical service delivery/assessment of medical service/trust in health delivery system may have significant influence on patient's life satisfaction in China's health delivery system/in various kinds of hospitals.The aim of this study was to test whether and to what extent patient's satisfaction with medical service delivery/patient's assessments of various major aspects of medical service/various major aspects of patient's trust in health delivery system influenced patient's life satisfaction in China's health delivery system/in various kinds of hospitals. This study collaborated with National Bureau of Statistics of China to carry out a 2008 national urban resident household survey in 17 provinces, autonomous regions, and municipalities directly under the central government (N = 3,386), and specified ordered probit models were established to analyze dataset from this household survey. The key considerations in generating patient's life satisfaction involved patient's overall satisfaction with medical service delivery, assessment of doctor-patient communication, assessment of medical cost, assessment of medical treatment process, assessment of medical facility and hospital environment, assessment of waiting time for medical service, trust in prescription, trust in doctor, and trust in recommended medical examination. But the major considerations in generating patient's life satisfaction were different among low level public hospital, high level public hospital, and private hospital. The promotion of patient's overall satisfaction with medical service delivery, the improvement of doctor-patient communication, the reduction of medical cost, the improvement of medical treatment process, the promotion of medical facility and hospital environment, the reduction of waiting time for medical service, the promotion of patient's trust in prescription, the promotion of patient's trust in doctor, and the promotion of patient's trust in

  10. Trust as a Critical Concept

    DEFF Research Database (Denmark)

    Bordum, Anders

    2004-01-01

    address in this article. One is the standpoint we find in business strategy, that trust is naïve to show, and control or contracts are presumed better. In the strategy game the idealistic good guys seems to lose (Arrow 1974), (Williamson 1975). The other position is the position taken by systems theory......In this articlei I will argue that trust is a fundamental and critical concept because trust is the direct or transcendental constitutive ground of most social phenomena, as well as applicable as an operational method in critical theory. There are two different but overlapping positions on trust I...

  11. Control Is Good, But Trust Is Cheaper

    DEFF Research Database (Denmark)

    Jensen, Keld; Svendsen, Gert Tinggaard

    2014-01-01

    Trust or Control? Trust-Based Management and the Thriving Workplace Lenin once said, “Trust is good, but control is better” – and many a modern manager seems to agree. One sees precious time and resources plowed into paper-pushing, form-filling, and the drafting of voluminous, hyper-detailed cont......Trust or Control? Trust-Based Management and the Thriving Workplace Lenin once said, “Trust is good, but control is better” – and many a modern manager seems to agree. One sees precious time and resources plowed into paper-pushing, form-filling, and the drafting of voluminous, hyper......-detailed contracts, all to the end of tightening control. Control over employees, control over clients and customers, control over business processes and outcomes. But with what results? Does Lenin’s little management maxim work out well in practice? Or have managements overestimated and overemphasized control...

  12. The relationship between servant leadership and employee empowerment, commitment, trust and innovative behaviour: A project management perspective

    OpenAIRE

    Camilla L. Krog; Krishna Govender

    2015-01-01

    Orientation: Understanding the relationship between a project sponsor’s servant leadership traits and employee commitment, trust and innovative behaviour.Research purpose: This study aimed to understand the relationship, if any, between a project sponsor’s servant leadership traits of altruistic calling, emotional healing, wisdom, persuasive mapping and organisational stewardship and a project team’s empowerment, commitment, trust and innovative behaviour.Motivation of the study: Most project...

  13. 77 FR 74884 - Cambria Investment Management, L.P. and Cambria ETF Trust; Notice of Application

    Science.gov (United States)

    2012-12-18

    ... instruments described above, each Fund reserves the right to invest in other instruments, including short... registered under the Exchange Act (``Broker'') or other participant in the Continuous Net Settlement System... settlement; (b) for minor differences when rounding is necessary to eliminate fractional shares or lots that...

  14. 77 FR 73089 - Cambria Investment Management, L.P. and Cambria ETF Trust; Notice of Application

    Science.gov (United States)

    2012-12-07

    ... addition to the instruments described above, each Fund reserves the right to invest in other instruments... Act (``Broker'') or other participant in the Continuous Net Settlement System of the National... differences when rounding is necessary to eliminate fractional shares or lots that are not tradeable round...

  15. How did rapid scale-up of HIV services impact on workplace and interpersonal trust in Zambian primary health centres: a case-based health systems analysis.

    Science.gov (United States)

    Topp, Stephanie M; Chipukuma, Julien M

    2016-01-01

    In sub-Saharan Africa, large amounts of funding continue to be directed towards HIV-specific care and treatment, often with claims of 'health system strengthening' effect. Such claims rarely account for the impact on human relationships and decisions that are core to functional health systems. This research examined how establishment of externally funded HIV services influenced trusting relationships in Zambian health centres. An in-depth, multicase study included four health centres selected for urban, peri-urban and rural characteristics. Case data included healthcare worker (HCW) interviews (60); patient interviews (180); direct observation of facility operations (2 weeks/centre) and key informant interviews (14) which were recorded and transcribed verbatim. Thematic analysis adopted inductive and deductive coding guided by a framework incorporating concepts of workplace trust, patient-provider trust, intrinsic and extrinsic motivation. HIV service scale-up impacted trust in positive and negative ways. Investment in HIV-specific infrastructure, supplies and quality assurance mechanisms strengthened workplace trust, HCW motivation and patient-provider trust in HIV departments in the short-term. In the health centres more broadly and over time, however, non-governmental organisation-led investment and support of HIV departments reinforced HCW's perceptions of the government as uninterested or unable to provide a quality work environment. Exacerbating existing perceptions of systemic workplace inequity and nepotism, uneven distribution of personal and professional opportunities related to HIV service establishment contributed to interdepartmental antagonism and reinforced workplace practices designed to protect individual HCW's interests. Findings illustrate long-term negative effects of the vertical HIV resourcing and support structures which failed to address and sometimes exacerbated HCW (dis)trust with their own government and supervisors. The short-term and

  16. TB-CA: A hybrid method based on trust and context-aware for recommender system in social networks

    Directory of Open Access Journals (Sweden)

    Fateme Keikha

    2015-05-01

    Full Text Available Recommender systems help users faced with the problem of information overflow and provide personalized recommendations. Social networks are used for providing variety of business or social activities, or sometimes a combination of both. In this paper, by considering social network of users and according to users’ context and items, a new method is introduced that is based on trust and context aware for recommender systems in social networks. The purpose of this paper is to create a recommender system which increases precision of predicted ratings for all users especially for cold start users. In the proposed method, walking on web of trust is done by neighbor users for finding rating of similar items and users’ preference is gotten of items’ context. The results show that suitable recommendation with user’s context is provided by using this method. Also, this system can increase precision of predicted rating for all users and cold starts too and however, do not decrease the rating’s coverage.

  17. Web Based Project Management System

    OpenAIRE

    Aadamsoo, Anne-Mai

    2010-01-01

    To increase an efficiency of a product, nowadays many web development companies are using different project management systems. A company may run a number of projects at a time, and requires input from a number of individuals, or teams for a multi level development plan, whereby a good project management system is needed. Project management systems represent a rapidly growing technology in IT industry. As the number of users, who utilize project management applications continues to grow, w...

  18. 77 FR 49839 - IndexIQ Advisors LLC and IndexIQ Active ETF Trust; Notice of Application

    Science.gov (United States)

    2012-08-17

    ... Investing Fund (as defined below); and (iv) each management investment company or unit investment trust... (as defined below) with a Fund (such management investment companies, ``Investing Management Companies,'' such unit investment trusts, ``Investing Trusts,'' and Investing Management Companies and Investing...

  19. A Multiagent System for Distributed Systems Management

    OpenAIRE

    H. M. Kelash; H. M. Faheem; M. Amoon

    2007-01-01

    The demand for autonomous resource management for distributed systems has increased in recent years. Distributed systems require an efficient and powerful communication mechanism between applications running on different hosts and networks. The use of mobile agent technology to distribute and delegate management tasks promises to overcome the scalability and flexibility limitations of the currently used centralized management approach. This work proposes a multiagent s...

  20. Trusted Product Evaluations. A Guide for Vendors

    National Research Council Canada - National Science Library

    1990-01-01

    Trusted Product Evaluations: A Guide for Vendors describes procedures for conducting business with the Information Systems Security Organization within the National Security Agency using the Trusted Product Evaluation Program...

  1. Cryptographic Key Management System

    Energy Technology Data Exchange (ETDEWEB)

    No, author

    2014-02-21

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  2. ENVIRONMENTAL MANAGEMENT SYSTEMS CERTIFICATION

    Directory of Open Access Journals (Sweden)

    Aniko Miler-Virc

    2012-12-01

    Full Text Available ISO 14001 prescribes the requirements for a system, not environmental performance itself. Similarly, certification is of the management system itself, not environmental performance. An audit is not conducted to ascertain whether your flue gas emissions are less than X part per million nitrous oxide or that your wastewater effluent contains less that Y milligrams of bacteria per litre. Consequently, the procces of auditing the system for compliance to the standard entails checking to see that all of the necessary components of a functioning system are present and working properly.           A company can have a complete and fully functional EMS as prescribed by ISO 14001 without being certified. As certification can add to the time and expense of EMS development, it is important for you to establish, in advance, whether certification is of net benefit to you. Although most companies that develop an EMS do in fact certify, there are cases where certification does not add immediate value. Certification is not always beneficial to small and medium sized companies. Certification is not always necessary for companies with one or two large clients with environmental demands who are satisfied that you have a functional EMS (second-party declaration. Whatever decision you make, it is important to remember that just as a driver′s licence does not automatically make you a good driver, ISO 14001 certification does not automatically make your company environmentally benign or ensure that you will continually improve environmental performance. The system is only as good as the people who operate it.

  3. Supplier Management System

    Science.gov (United States)

    Ramirez, Eric; Gutheinz, Sandy; Brison, James; Ho, Anita; Allen, James; Ceritelli, Olga; Tobar, Claudia; Nguyen, Thuykien; Crenshaw, Harrel; Santos, Roxann

    2008-01-01

    Supplier Management System (SMS) allows for a consistent, agency-wide performance rating system for suppliers used by NASA. This version (2.0) combines separate databases into one central database that allows for the sharing of supplier data. Information extracted from the NBS/Oracle database can be used to generate ratings. Also, supplier ratings can now be generated in the areas of cost, product quality, delivery, and audit data. Supplier data can be charted based on real-time user input. Based on these individual ratings, an overall rating can be generated. Data that normally would be stored in multiple databases, each requiring its own log-in, is now readily available and easily accessible with only one log-in required. Additionally, the database can accommodate the storage and display of quality-related data that can be analyzed and used in the supplier procurement decision-making process. Moreover, the software allows for a Closed-Loop System (supplier feedback), as well as the capability to communicate with other federal agencies.

  4. Computerized training management system

    Energy Technology Data Exchange (ETDEWEB)

    Rice, Harold B. (Franklin Furnace, OH); McNair, Robert C. (East Setauket, NY); White, Kenneth (Shirley, NY); Maugeri, Terry (Wading River, NY)

    1998-08-04

    A Computerized Training Management System (CTMS) for providing a procedurally defined process that is employed to develop accreditable performance based training programs for job classifications that are sensitive to documented regulations and technical information. CTMS is a database that links information needed to maintain a five-phase approach to training-analysis, design, development, implementation, and evaluation independent of training program design. CTMS is designed using R-Base.RTM., an-SQL compliant software platform. Information is logically entered and linked in CTMS. Each task is linked directly to a performance objective, which, in turn, is linked directly to a learning objective; then, each enabling objective is linked to its respective test items. In addition, tasks, performance objectives, enabling objectives, and test items are linked to their associated reference documents. CTMS keeps all information up to date since it automatically sorts, files and links all data; CTMS includes key word and reference document searches.

  5. Computerized training management system

    Energy Technology Data Exchange (ETDEWEB)

    Rice, H.B.; McNair, R.C.; White, K.; Maugeri, T.

    1998-08-04

    A Computerized Training Management System (CTMS) is disclosed for providing a procedurally defined process that is employed to develop accreditable performance based training programs for job classifications that are sensitive to documented regulations and technical information. CTMS is a database that links information needed to maintain a five-phase approach to training-analysis, design, development, implementation, and evaluation independent of training program design. CTMS is designed using R-Base{trademark}, an-SQL compliant software platform. Information is logically entered and linked in CTMS. Each task is linked directly to a performance objective, which, in turn, is linked directly to a learning objective; then, each enabling objective is linked to its respective test items. In addition, tasks, performance objectives, enabling objectives, and test items are linked to their associated reference documents. CTMS keeps all information up to date since it automatically sorts, files and links all data; CTMS includes key word and reference document searches. 18 figs.

  6. Trust information-based privacy architecture for ubiquitous health.

    Science.gov (United States)

    Ruotsalainen, Pekka Sakari; Blobel, Bernd; Seppälä, Antto; Nykänen, Pirkko

    2013-10-08

    Ubiquitous health is defined as a dynamic network of interconnected systems that offers health services independent of time and location to a data subject (DS). The network takes place in open and unsecure information space. It is created and managed by the DS who sets rules that regulate the way personal health information is collected and used. Compared to health care, it is impossible in ubiquitous health to assume the existence of a priori trust between the DS and service providers and to produce privacy using static security services. In ubiquitous health features, business goals and regulations systems followed often remain unknown. Furthermore, health care-specific regulations do not rule the ways health data is processed and shared. To be successful, ubiquitous health requires novel privacy architecture. The goal of this study was to develop a privacy management architecture that helps the DS to create and dynamically manage the network and to maintain information privacy. The architecture should enable the DS to dynamically define service and system-specific rules that regulate the way subject data is processed. The architecture should provide to the DS reliable trust information about systems and assist in the formulation of privacy policies. Furthermore, the architecture should give feedback upon how systems follow the policies of DS and offer protection against privacy and trust threats existing in ubiquitous environments. A sequential method that combines methodologies used in system theory, systems engineering, requirement analysis, and system design was used in the study. In the first phase, principles, trust and privacy models, and viewpoints were selected. Thereafter, functional requirements and services were developed on the basis of a careful analysis of existing research published in journals and conference proceedings. Based on principles, models, and requirements, architectural components and their interconnections were developed using system

  7. An integrative review of promoting trust in the patient-primary care provider relationship.

    Science.gov (United States)

    Murray, Billie; McCrone, Susan

    2015-01-01

    An integrative review of empirical studies on factors promoting trust in the patient-primary care provider relationship. Trust is essential to the patient-provider relationship. Patients with high trust in their healthcare providers have been found to have improved outcomes, including improved chronic disease management, increased use of preventative services and satisfaction with care. Breaches of trust in the healthcare system threaten trust. Exploring factors that promote trust in the patient-provider relationship is warranted. Integrative literature review. Electronic databases searched included CINAHL, MEDLINE and PsycARTICLES, using combinations of the key term 'trust' with: concept, practitioner, provider, physician, developing, creating, engendering, promoting and establishing. The results were limited to original publications in English, published between 1998-2013. A review of the literature was conducted by two independent reviewers based on the criteria established by Cooper; Whittemore and Knafl; and Polit and Beck. Methodological assessment tools were used to organize, evaluate the quality of and synthesize the data. A new conceptual definition of promoting trust is proposed that includes three core qualities: interpersonal and technical competence, moral comportment and vigilance. Gaps in the literature still exist related to rural, young adult, older adult and well patient populations. The core qualities could serve as target areas for the development of interventions aimed at modifying provider behaviours so that trust can be established, maintained or improved. Future prospective longitudinal research studies are needed that enhance understanding of trust with multiple primary care provider types. © 2014 John Wiley & Sons Ltd.

  8. Towards trusted trade-lanes

    NARCIS (Netherlands)

    Hulstijn, J.; Hofman, W.; Zomer, G.; Tan, Y.H.

    2016-01-01

    Customs administrations are exploring system-based approaches to regulatory supervision, taking the entire set of controls in a process into account. In addition to Trusted Traders, which are recognized by a certification process, customs are considering to identify so called Trusted Trade Lanes:

  9. Trusted Objects

    Energy Technology Data Exchange (ETDEWEB)

    CAMPBELL,PHILIP L.; PIERSON,LYNDON G.; WITZKE,EDWARD L.

    1999-10-27

    In the world of computers a trusted object is a collection of possibly-sensitive data and programs that can be allowed to reside and execute on a computer, even on an adversary's machine. Beyond the scope of one computer we believe that network-based agents in high-consequence and highly reliable applications will depend on this approach, and that the basis for such objects is what we call ''faithful execution.''

  10. Changeability of production management systems

    NARCIS (Netherlands)

    Hoogenraad, M. S.; Wortmann, J. C.; Olhager, J; Persson, F

    2007-01-01

    Modem production management systems consist of transaction processing systems and decision enhancement systems. A clear example of two such components are an ERP systems and APS systems. These systems are often standard software systems, and therefore suitable for many different situations. This

  11. Manpower management information system /MIS/

    Science.gov (United States)

    Gravette, M. C.; King, W. L.

    1971-01-01

    System of programs capable of building and maintaining data bank provides all levels of management with regular manpower evaluation reports and data source for special management exercises on manpower.

  12. System management and quality assurance

    International Nuclear Information System (INIS)

    Sastry, A.M.

    1989-01-01

    This paper describes the principles of system management and shows the relationship to quality assurance. It discusses the need for balanced attention to all the project management controls required for project success

  13. Informational system. Documents management

    Directory of Open Access Journals (Sweden)

    Vladut Iacob

    2009-12-01

    Full Text Available Productivity growing, as well as reducing of operational costs in a company can be achieved by adopting a document management solutions. Such application will allow management and structured and efficient transmission of information within the organization.

  14. ASCOT data base management system

    Energy Technology Data Exchange (ETDEWEB)

    Barbieri, J.; Nyholm, R.; Castro, C.; Hill, K.

    1980-07-01

    The ASCOT data base management system is designed to handle the data produced by both the experimental and theoretical efforts of the DOE Atmospheric Studies in Complex Terrain (ASCOT) project. The data base envisioned is hierarchically structured, sparse, and compact. Information concerning any given data file is stored in a directory file. The data base management system uses a relational data management approach. Presently three management schema are being developed for use with the data base. 5 figures.

  15. Trust and Distrust in E-Commerce

    Directory of Open Access Journals (Sweden)

    Suk-Joo Lee

    2018-03-01

    Full Text Available Trust is the key ingredient for sustainable transactions. In the concept of trust, the trustor trusts the trustees. In e-commerce, the trustor is the buyer and the trustees are the intermediaries and the seller. Intermediaries provide the web-based infrastructure that enables buyers and sellers to make transactions. Trust is the buyer’s judgment and comprises two distinct concepts; both trust and distrust reside in the trustor. The purpose of this study was to examine the complicated effects of trust and distrust on a buyer’s purchase intentions. Previous studies have provided theoretical frameworks illustrating co-existent trust and distrust, trust transfers from one to another, and trust in buyer-intermediary-seller relationships. Based on these frameworks, this study (i presented a holistic model that contained the judgment of buyers resulting in trust or distrust in the intermediary and the seller; (ii investigated trust and distrust transfer from the intermediary to the seller, and (iii explored the effects of various antecedents that affect trust and distrust. To validate the proposed model, we employed Partial Least Squares (PLS. A summary of key findings are as follows. First, buyer’s trust in an intermediary positively affected his or her trust in the seller, positively influencing purchase intention. In other words, we found the trust transfer from an intermediary to its seller. Second, distrust in an intermediary directly impacted on the buyer’s perceived risk, negatively influencing his or her purchase intentions. Third, structural assurance and perceived website quality of an intermediary gave a positive impact on buyer’s trust in the intermediary. The results of this study shed light on the necessity of managing both trust and distrust to facilitate sales in e-commerce.

  16. New type radiation management system

    International Nuclear Information System (INIS)

    Mogi, Kenichi; Uranaka, Yasuo; Fujita, Kazuhiko

    2001-01-01

    The radiation management system is a system to carry out entrance and leaving room management of peoples into radiation management area, information management on radiation obtained from a radiation testing apparatus, and so on. New type radiation management system developed by the Mitsubishi Electric Corp. is designed by concepts of superior maintenance and system practice by using apparatus and its interface with standard specification, upgrading of processing response by separating exposure management processing from radiation monitoring processing on a computer, and a backup system not so as to lose its function by a single accident of the constructed computer. Therefore, the system is applied by the newest hardware, package software, and general use LAN, and can carry out a total system filled with requirements and functions for various radiation management of customers by preparing a basic system from radiation testing apparatus to entrance and leaving room management system. Here were described on outline of the new type management system, concept of the system, and functions of every testing apparatus. (G.K.)

  17. Exploring the Change from Low-Trust to High-Trust Organizations

    DEFF Research Database (Denmark)

    Jagd, Søren

    and employees. An especially important issue is the trust/self-control nexus. Following this analysis it may be argued that the distinction low versus high-trust is much more complex and involves radical changes in organizational culture and identity than assumed by most management literature on trust a new...... projects of personal and organizational change leading to high-trust organizations. In this paper I explore how we may understand this change towards high-trust organizations: What does it mean, what is the content of such a change, and what may be the consequences. I show that it is still rather unclear...... what the notion of high-trust organization actually means, and that the change process in the direction of high trust organizations involves not only a quantitative growth in trust, but may involve important qualitative changes in the organization, especially concerning the relations between management...

  18. 4GL ward management system.

    OpenAIRE

    Brandejs, J. F.

    1991-01-01

    After many years of extensive research of computerized information systems for nursing, inpatient care, clinics and HMOs, laboratories, diagnostic imaging, pharmacy and other services, an integrated Ward Patient Management system was developed. A mature, relational data base management system (RDBMS) ORACLE was selected as the design tool. The system is running under VMS, DOS and UNIX operating systems and ORACLE version 6 on nearly all computer platforms, although multiprocessors are preferr...

  19. Respect, trust, and the management of sickle cell disease pain in hospital: comparative analysis of concern-raising behaviors, preliminary model, and agenda for international collaborative research to inform practice.

    Science.gov (United States)

    Elander, James; Beach, Mary Catherine; Haywood, Carlton

    2011-01-01

    Qualitative interview studies suggest that adult patients' experiences of hospital treatment for sickle cell disease (SCD) pain reflect an absence of respect by providers for patients, and an absence or breakdown of trust. Systematic comparisons between treatment settings could help identify contextual influences on respect and trust. Quantitative comparison of concern-raising behaviors (pain treatment outcomes indicating breakdowns of trust) among adult SCD patients in Baltimore, Maryland, USA, and London, UK, followed by analysis of potential explanations for differences, including socio-cultural and behavioral factors, with a preliminary model of the processes leading to concern-raising behaviors. Rates of concern-raising behaviors were significantly higher in Baltimore than London. The model identifies respect and trust as key factors which could be targeted in efforts to improve the quality of SCD pain management in hospital. An agenda for international, interdisciplinary research to improve the treatment of SCD pain in hospital should include: comparative analyses between countries and treatment settings of factors that could influence respect and trust; research to test hypotheses derived from models about the roles of respect and trust in the treatment of pain; studies of the impact of healthcare structures and policy on patients' experiences of care; research focusing on developmental and interpersonal processes related to respect and trust; applications of attribution and other social psychology theories; and development and evaluation of interventions to improve the hospital treatment of SCD pain by increasing respect and trust.

  20. Heuritic Trust in IoT

    DEFF Research Database (Denmark)

    Kaur, Bipjeet; Tange, Henrik

    2015-01-01

    Increasing use of Internet of things in diverse fields has demanding association in security and trust of such services. The trust on the services cannot exist independent. It is greatly depended on the security of system at each layer. In this paper we analyze different existing trust algorithms...

  1. Privacy Management and Networked PPD Systems - Challenges Solutions.

    Science.gov (United States)

    Ruotsalainen, Pekka; Pharow, Peter; Petersen, Francoise

    2015-01-01

    Modern personal portable health devices (PPDs) become increasingly part of a larger, inhomogeneous information system. Information collected by sensors are stored and processed in global clouds. Services are often free of charge, but at the same time service providers' business model is based on the disclosure of users' intimate health information. Health data processed in PPD networks is not regulated by health care specific legislation. In PPD networks, there is no guarantee that stakeholders share same ethical principles with the user. Often service providers have own security and privacy policies and they rarely offer to the user possibilities to define own, or adapt existing privacy policies. This all raises huge ethical and privacy concerns. In this paper, the authors have analyzed privacy challenges in PPD networks from users' viewpoint using system modeling method and propose the principle "Personal Health Data under Personal Control" must generally be accepted at global level. Among possible implementation of this principle, the authors propose encryption, computer understandable privacy policies, and privacy labels or trust based privacy management methods. The latter can be realized using infrastructural trust calculation and monitoring service. A first step is to require the protection of personal health information and the principle proposed being internationally mandatory. This requires both regulatory and standardization activities, and the availability of open and certified software application which all service providers can implement. One of those applications should be the independent Trust verifier.

  2. Lighting system with thermal management system

    Science.gov (United States)

    Arik, Mehmet; Weaver, Stanton; Stecher, Thomas; Seeley, Charles; Kuenzler, Glenn; Wolfe, Jr., Charles; Utturkar, Yogen; Sharma, Rajdeep; Prabhakaran, Satish; Icoz, Tunc

    2013-05-07

    Lighting systems having unique configurations are provided. For instance, the lighting system may include a light source, a thermal management system and driver electronics, each contained within a housing structure. The light source is configured to provide illumination visible through an opening in the housing structure. The thermal management system is configured to provide an air flow, such as a unidirectional air flow, through the housing structure in order to cool the light source. The driver electronics are configured to provide power to each of the light source and the thermal management system.

  3. Managing Temporal Knowledge in Port Management Systems

    Directory of Open Access Journals (Sweden)

    Anita Gudelj

    2006-05-01

    Full Text Available Large ports need to deal with a number of disparate activities:the movement of ships, containers and other cargo, theloading and unloading of ships and containers, customs activities.As well as human resources, anchorages, channels, lighters,tugs, berths, warehouse and other storage spaces have to beallocated and released. The efficient management of a port involvesmanaging these activities and resources, managing theflows of money involved between the agents providing and usingthese resources, and providing management information.Many information systems will be involved.Many applications have to deal with a large amount of datawhich not only represent the perceived state of the real world atpresent, but also past and/or future states. These applicationsare not served adequately by today's computer managementand database systems. In particular, deletions and updates insuch systems have destructive semantics. This means that previousdatabase contents (representing previous perceived statesof the real world cannot be accessed anymore.A review of how define temporal data models, based ongeneralizing a non-temporal data model in to a temporal one toimprove port management is presented. This paper describes apractical experiment which supports managing temporal dataalong with the corresponding prototype implementations.

  4. Managing organizational culture within a management system

    International Nuclear Information System (INIS)

    Comeau, L.; Watts, G.

    2009-01-01

    The Point Lepreau Generating Station (PLGS) is currently undergoing a major refurbishment of its nuclear reactor. At the same time, a small team is designing the organization that will operate the plant after refurbishment. This paper offers a high level overview of the Post-Refurbishment Organization (PRO) project and will focus primarily on the approach used to address organizational culture and human system dynamics. We will describe how various tools, used to assess organization culture, team performance, and individual self-understanding, are used collectively to place the right person in the right position. We will explain how the career system, Pathfinder, is used to integrate these tools to support a comprehensive model for organization design and development. Finally, we demonstrate how the management of organizational cultural and human system dynamics are integrated into the PLGS Integrated Management System. (author)

  5. ENVIRONMENTAL SYSTEMS MANAGEMENT AND SUSTAINABLE SYSTEMS THEORY

    Science.gov (United States)

    Environmental Systems Management is the management of environmental problems at the systems level fully accounting for the multi-dimensional nature of the environment. This includes socio-economic dimensions as well as the usual physical and life science aspects. This is importa...

  6. 77 FR 50185 - LoCorr Fund Management, LLC and LoCorr Investment Trust; Notice of Application

    Science.gov (United States)

    2012-08-20

    ... achieve each Fund's investment objective. Applicants assert that, from the perspective of the investor... selecting investments according to the LoCorr Funds' investment objectives, policies and restrictions. For... Fund's investment objective, policies and restrictions. 8. No trustee or officer of the Trust or a Fund...

  7. Learning to Trust

    NARCIS (Netherlands)

    Nooteboom, B.

    2005-01-01

    Trust is full of puzzle and paradox.Trust is both rational and emotional. Trust can go beyond calculative self-interest, but has its limits.People may want to trust, while they may also feel threatened by it.If trust is not in place prior to a relationship, on the basis of institutions, prior

  8. Cargo Data Management Demonstration System

    Science.gov (United States)

    1974-02-01

    Delays in receipt and creation of cargo documents are a problem in international trade. The work described demonstrates some of the advantages and capabilities of a computer-based cargo data management system. A demonstration system for data manageme...

  9. Applying Machine Trust Models to Forensic Investigations

    Science.gov (United States)

    Wojcik, Marika; Venter, Hein; Eloff, Jan; Olivier, Martin

    Digital forensics involves the identification, preservation, analysis and presentation of electronic evidence for use in legal proceedings. In the presence of contradictory evidence, forensic investigators need a means to determine which evidence can be trusted. This is particularly true in a trust model environment where computerised agents may make trust-based decisions that influence interactions within the system. This paper focuses on the analysis of evidence in trust-based environments and the determination of the degree to which evidence can be trusted. The trust model proposed in this work may be implemented in a tool for conducting trust-based forensic investigations. The model takes into account the trust environment and parameters that influence interactions in a computer network being investigated. Also, it allows for crimes to be reenacted to create more substantial evidentiary proof.

  10. THE INTERVENING EFFECTS OF PROCEDURAL FAIRNESS AND INTERPERSONAL TRUST ON THE RELATIONSHIPS BETWEEN MULTIPLE MEASURES-BASED PERFORMANCE EVALUATION AND MANAGERS' JOB SATISFACTION

    Directory of Open Access Journals (Sweden)

    Mahfud Sholihin

    2003-08-01

    Full Text Available Criticisms directed at the use of financial measures alone for performance evaluation have led to much interest in the use of nonfinancial performance measures to balance the financial measures. Hence, much recent research has been directed to investigate the effectiveness sand behavioral consequences of a mix of financial and nonfinancial measures (e.g. the Balanced Scorecard approach in contemporary settings. However, there is evidence from prior studies to suggest that the manner or how performance measures are used may affect the subordinates' behavior and work-related attitudes indirectly through the subordinates' perception of the justness of these measures and the interpersonal trust these measures promote. There is also evidence to indicate that it is the extent of the subordinates' agreement with the performance measures used in the evaluation, rather than the measures per se, which affects their behavior and work-related attitudes. Subordinates are more likely to agree with performance measures which they regard as fair and which enhance their trust in their superiors. This study therefore investigates if the effects of a mix of financial and nonfinancial measures (such as those used in the Balanced Scorecard approach on subordinates' job satisfaction are indirect through the subordinates' perception of the greater extent of fairness (justness in the evaluation process and the greater extent of trust such a mix of measures promotes. The results, based on a sample of 70 managers, support the expectation that a mix of financial and nonfinancial has no direct effect on subordinates’ job satisfaction. Instead, the effects of such a mix of performance measures on subordinates’ job satisfaction are indirect through the enhancement of the subordinates’ favorable perceptions of procedural fairness and interpersonal trust.

  11. Car insurance information management system

    OpenAIRE

    Sun, Yu

    2015-01-01

    A customer information system is a typical information management system. It involves three aspects, the backstage database establishment, the application development and the system maintenance. A car insurance information management system is based on browser/server structure. Microsoft SQL Server establishes the backstage database. Active Server Pages, from Microsoft as well is used as the interface layer. The objective of this thesis was to apply ASP to the dynamic storage of a web page...

  12. Dialogue Systems and Dialogue Management

    Science.gov (United States)

    2016-12-01

    system and user can take (McTear, 2002). FSM are archetypal handcrafted methods for dialogue management; they are developed solely through human...Natural language engineering, 6(3&4), pp. 323- 340. Lee, C., Jung , S., Eun, J., Jeong, M., & Lee, G. G. (2006). A situation-based dialogue management...72. IEEE. Lee, C., Jung , S., Kim, K., Lee, D., & Lee, G. G. (2010). Recent approaches to dialog management for spoken dialog systems. Journal of

  13. IT Asset Management System -

    Data.gov (United States)

    Department of Transportation — ITAMS provides a web frontend for the managing of all HW Assets lifecycle data purchased by ATO since 2006. In addition it contains much of our Enterprise SW license...

  14. Incremental Trust in Grid Computing

    DEFF Research Database (Denmark)

    Brinkløv, Michael Hvalsøe; Sharp, Robin

    2007-01-01

    This paper describes a comparative simulation study of some incremental trust and reputation algorithms for handling behavioural trust in large distributed systems. Two types of reputation algorithm (based on discrete and Bayesian evaluation of ratings) and two ways of combining direct trust...... and reputation (discrete combination and combination based on fuzzy logic) are considered. The various combinations of these methods are evaluated from the point of view of their ability to respond to changes in behaviour and the ease with which suitable parameters for the algorithms can be found in the context...... of Grid computing systems....

  15. Autonomously managed electrical power systems

    Science.gov (United States)

    Callis, Charles P.

    1986-01-01

    The electric power systems for future spacecraft such as the Space Station will necessarily be more sophisticated and will exhibit more nearly autonomous operation than earlier spacecraft. These new power systems will be more reliable and flexible than their predecessors offering greater utility to the users. Automation approaches implemented on various power system breadboards are investigated. These breadboards include the Hubble Space Telescope power system test bed, the Common Module Power Management and Distribution system breadboard, the Autonomusly Managed Power System (AMPS) breadboard, and the 20 kilohertz power system breadboard. Particular attention is given to the AMPS breadboard. Future plans for these breadboards including the employment of artificial intelligence techniques are addressed.

  16. The Relationship between Teamwork and Organizational Trust

    Directory of Open Access Journals (Sweden)

    Musab Isik

    2016-01-01

    Full Text Available The aim of this study is to investigate the relationship between teamwork and organizational trust. In the implementation section the data from the survey of 250 workers is employed in call centers in Erzurum by using relevant statistical  methods. Consequently, it is found that there is a positive and significant relationship between teamwork and organizational trust. Thus, the hypothesis of the study is supported as it was expected. Besides, it is found that there are positive and significant relationships between communication, openness to innovation, participation-trust in teamwork and organizational trust, trust in management, trust in co-workers, and trust in workplace.

  17. Trust-Based Leadership in the Making

    DEFF Research Database (Denmark)

    Bentzen, Tina Øllgaard; Jagd, Søren

    I spite of the popularity of trust-based leadership in consultancy and popular management writings empirical research on the transformation from traditional top-down to trust-based leadership is still limited. In this paper we study the implementation of a trust-based leadership reform in the City...... of Copenhagen taking place since 2012. We focus on understanding the trust dynamics in this major transformation. We show that the implementation of trust-based leadership should be seen as an emergent process involving a variety of actors within the organization. The case study reveals that the Trust Reform...... may be seen as a process involving multiple actors contributing to the implementation in diverse ways. The Trust Reform is a complex and fragile process giving rise to radical changes in roles and competences needed for leaders and for employees at different levels in the organization. The study also...

  18. Trust in Diverse Teams

    DEFF Research Database (Denmark)

    Clausen, Lisbeth

    Multicultural membership and diversity in teams are important to maintain effectiveness in organizations in a global business environment. Multicultural teams offer great potential in international collaboration just as top management teams are becoming increasingly diversified. However...... and interviews with managers from the US, Europe, China and Japan. The study presents a conceptual framework - a ‘trust buffer’ – which enables analysis and exemplification of the dynamics and challenges of teams as drivers of change. Each team has strategically important tasks, unique capacities and deal...

  19. Intelligent Integrated System Health Management

    Science.gov (United States)

    Figueroa, Fernando

    2012-01-01

    Intelligent Integrated System Health Management (ISHM) is the management of data, information, and knowledge (DIaK) with the purposeful objective of determining the health of a system (Management: storage, distribution, sharing, maintenance, processing, reasoning, and presentation). Presentation discusses: (1) ISHM Capability Development. (1a) ISHM Knowledge Model. (1b) Standards for ISHM Implementation. (1c) ISHM Domain Models (ISHM-DM's). (1d) Intelligent Sensors and Components. (2) ISHM in Systems Design, Engineering, and Integration. (3) Intelligent Control for ISHM-Enabled Systems

  20. Medical-Information-Management System

    Science.gov (United States)

    Alterescu, Sidney; Friedman, Carl A.; Frankowski, James W.

    1989-01-01

    Medical Information Management System (MIMS) computer program interactive, general-purpose software system for storage and retrieval of information. Offers immediate assistance where manipulation of large data bases required. User quickly and efficiently extracts, displays, and analyzes data. Used in management of medical data and handling all aspects of data related to care of patients. Other applications include management of data on occupational safety in public and private sectors, handling judicial information, systemizing purchasing and procurement systems, and analyses of cost structures of organizations. Written in Microsoft FORTRAN 77.

  1. Management systems in production operations

    International Nuclear Information System (INIS)

    Walters, K.B.; Henderson, G.

    1993-01-01

    The Cullen Enquiry into the Piper Alpha disaster in the U.K. North Sea recommended that an operator should formally present it's company Management System and demonstrate how safety is achieved throughout the life cycle of a platform, from design through operation to abandonment. Brunei Shell Petroleum has prepared a corporate level Safety Management System. As part of Safety Case work, the corporate system is being extended to include the development of specific Management Systems with particular emphasis on offshore production operations involving integrated oil and gas facilities. This paper will describe the development of Management Systems, which includes an intensive Business Process Analysis and will comment upon it's applicability and relationship to ISO 9000. The paper will further describe the applicability and benefits of Management Systems and offer guidance on required effort. The paper will conclude that development of structured Management Systems for safety critical business processes is worthwhile but prioritization of effort will be necessary. As such the full adoption of Management Systems will be directional in nature

  2. A Question of Ambiguity, Risk, and Trust: Do Auditors React Differently to Potential Accrual Transaction Earnings Management than to Potential Real Transaction Earnings Management?

    OpenAIRE

    Garner, Dana Porter

    2008-01-01

    This research study investigates the relationship between ambiguity, litigation risk, and auditor decision-making. In addition, this study investigates how auditor trust of his or her client may change these relationships. It is important to investigate the relationships of ambiguity, litigation risk, and client trust to auditor decision-making because auditors face these factors on a regular basis. This research uses a 2x2 experiment to investigate auditor reaction to ambiguity and li...

  3. Integrating the radioactive waste management system into other management systems

    International Nuclear Information System (INIS)

    Silva, Ana Cristina Lourenco da; Nunes Neto, Carlos Antonio

    2007-01-01

    Radioactive waste management is to be included in the Integrated Management System (IMS) which pursues the continuous improvement of the company's quality, occupational safety and health, and environment protection processes. Radioactive waste management is based on the following aspects: optimization of human and material resources for execution of tasks, including the provision of a radiation protection supervisor to watch over the management of radioactive waste; improved documentation (management plan and procedures); optimization of operational levels for waste classification and release; maintenance of generation records and history through a database that facilitates traceability of information; implementation of radioactive waste segregation at source (source identification, monitoring and decontamination) activities intended to reduce the amount of radioactive waste; licensing of initial storage site for radioactive waste control and storage; employee awareness training on radioactive waste generation; identification and evaluation of emergency situations and response planning; implementation of preventive maintenance program for safety related items; development and application of new, advanced treatment methodologies or systems. These aspects are inherent in the concepts underlying quality management (establishment of administrative controls and performance indicators), environment protection (establishment of operational levels and controls for release), occupational health and safety (establishment of operational controls for exposure in emergency and routine situations and compliance with strict legal requirements and standards). It is noted that optimizing the addressed aspects of a radioactive waste management system further enhances the efficiency of the Integrated Management System for Quality, Environment, and Occupational Safety and Health. (author)

  4. An ongoing Game of Tetris: Integrating Trusted Computing in Java, block-by-block

    Science.gov (United States)

    Toegl, Ronald; Pirker, Martin

    Trusted Computing is a promising approach to improve the security of computer systems. However, current releases of the Java platform do not provide support to utilize the Trusted Platform Module (TPM). This paper presents several building-blocks that lead to the integration of TC into Java. It outlines the issues that arise with multiple TPM-virtualizations in the context of managed environments. Further, it summarizes the design and implementation of Java TC-libraries that support the major operating systems on TPM-enabled platforms, while still considering alternative architectures. The final aspect covered is the ongoing standardization process of a future Trusted Computing API for Java.

  5. The CMS workload management system

    Energy Technology Data Exchange (ETDEWEB)

    Cinquilli, M. [CERN; Evans, D. [Fermilab; Foulkes, S. [Fermilab; Hufnagel, D. [Fermilab; Mascheroni, M. [CERN; Norman, M. [UC, San Diego; Maxa, Z. [Caltech; Melo, A. [Vanderbilt U.; Metson, S. [Bristol U.; Riahi, H. [INFN, Perugia; Ryu, S. [Fermilab; Spiga, D. [CERN; Vaandering, E. [Fermilab; Wakefield, Stuart [Imperial Coll., London; Wilkinson, R. [Caltech

    2012-01-01

    CMS has started the process of rolling out a new workload management system. This system is currently used for reprocessing and Monte Carlo production with tests under way using it for user analysis. It was decided to combine, as much as possible, the production/processing, analysis and T0 codebases so as to reduce duplicated functionality and make best use of limited developer and testing resources. This system now includes central request submission and management (Request Manager), a task queue for parcelling up and distributing work (WorkQueue) and agents which process requests by interfacing with disparate batch and storage resources (WMAgent).

  6. Management systems for regulatory authorities

    International Nuclear Information System (INIS)

    Mpandanyama, Rujeko Lynette

    2015-02-01

    For a regulatory body to fulfil its statutory obligations, there is need to develop and implement a regulatory management system that has the necessary arrangements for achieving and maintaining high quality performance in regulating the safety of nuclear and radiation facilities under its authority. Hence, the regulatory management system needs to fully integrate the human resources, processes and physical resources of the organization. This study sought to provide an understanding of the concept, principles, policies and fundamentals of management systems as they relate to regulatory systems in the field of radiation protection and to make appropriate recommendations to ensure that an effective management system exists for the control of ionizing radiation and radiation sources and addresses all relevant stakeholders in Zimbabwe. A comparative analysis was done on the current management status and the ideal management system, which led to the identification of the gaps existing. The main key that was found to be of significance was lack of linkages between processes and management tools within the institution. (au)

  7. BIMS: Biomedical Information Management System

    OpenAIRE

    Mora, Oscar; Bisbal, Jesús

    2013-01-01

    In this paper, we present BIMS (Biomedical Information Management System). BIMS is a software architecture designed to provide a flexible computational framework to manage the information needs of a wide range of biomedical research projects. The main goal is to facilitate the clinicians' job in data entry, and researcher's tasks in data management, in high data quality biomedical research projects. The BIMS architecture has been designed following the two-level modeling paradigm, a promising...

  8. Quality management systems in radiology

    Directory of Open Access Journals (Sweden)

    Geoffrey K. Korir

    2013-08-01

    Objective: To assess the level of quality management systems in X-ray medical facilities in Kenya. Methods: Quality management inspection, quality control performance tests and patient radiation exposure were assessed in 54 representative X-ray medical facilities. Additionally, a survey of X-ray examination frequency was conducted in 140 hospitals across the country. Results: The overall findings placed the country’s X-ray imaging quality management systems at 61±3% out of a possible 100%. The most and the least quality assurance performance indicators were general radiography X-ray equipment quality control tests at 88±4%, and the interventional cardiology adult examinations below diagnostic reference level at 25±1%, respectively. Conclusions: The study used a systematic evidence-based approach for the assessment of national quality management systems in radiological practice in clinical application, technical conduct of the procedure, image quality criteria, and patient characteristics as part of the quality management programme.

  9. Does Interpersonal Trust Influence Organizational Behavior?

    Directory of Open Access Journals (Sweden)

    Aziz BAKAY

    2015-05-01

    Full Text Available This research investigates into interpersonal trust and workplace outcomes in organizations within social exchange perspective. Current study is building upon the theoretical underpinnings of trust studies that pose trust as a psychological state and a social glue. Current research develops a theoretical model of interpersonal trust presuming that different trust objects -namely peers and senior managementhave unique and direct effects on global workplace outcomes: Affective commitment, turnover intention, and job satisfaction. The data was collected via convenience sampling and data consists of 134 professionals working in Turkey. Structural Equation Modeling (SEM using Partial Least Squares (PLS is employed to test our model. Findings suggest that trust in peers and trust in senior management translate into higher affective commitment. Results indicate a positive association between job satisfaction and trust in senior management. Turnover intention however, did not significantly associate with any of the trust variables suggesting the difference between economic exchange and social exchange, which involves reciprocal behaviors. Simultaneous investigation of two trust objects in organizations as well as inclusion of variety of contextual factors bring rigor to the scope of the research and the explanations of workplace outcomes.

  10. Analyzing user demographics and user behavior for trust assessment

    NARCIS (Netherlands)

    Ceolin, D.; Groth, P.T.; Nottamkandath, A.; Fokkink, W.J.; van Hage, W.R.

    2014-01-01

    In many systems, the determination of trust is reduced to reputation estimation. However, reputation is just one way of determining trust. The estimation of trust can be tackled from a variety of other perspectives. In this chapter, we model trust relying on user reputation, user demographics and

  11. Trust conceptualized as a corporate knowledge asset

    OpenAIRE

    Rodgers, Waymond; Gago Rodríguez, Susana

    2006-01-01

    To most individuals, "trust" can be viewed as a knowledge corporate asset that may add, or rest, value to the company. The role of knowledge in achieving a competitive advantage is becoming and increasingly important management issue in all business and non-business sectors. As such, our Throughput Modeling approach indicates how six different trust behaviors can be guided, how trust decision making can be improved and made defensible, and how special problems facing individuals can be dealt ...

  12. Trusting the state, trusting each other?

    DEFF Research Database (Denmark)

    Sønderskov, Kim Mannemar; Dinesen, Peter Thisted

    2016-01-01

    reflects reverse causality (social trust forming institutional trust), or both forms of trust reflecting deep-seated dispositions (common confounding). Against the backdrop of the shortcomings of previous cross-sectional analyses, this paper utilizes two Danish panel surveys containing measures of both...... types of trust for the same individuals surveyed at multiple points in time over a long time-span (up to 18 years) to address the potentially reverse and/or spurious relationship. Using individual fixed effects and cross-lagged panel models, the results provide strong evidence of trust in state...

  13. Congestion Management System Process Report

    Science.gov (United States)

    1996-03-01

    In January 1995, the Indianapolis Metropolitan Planning Organization with the help of an interagency Study Review Committee began the process of developing a Congestion Management System (CMS) Plan resulting in this report. This report documents the ...

  14. System Wide Information Management (SWIM)

    Science.gov (United States)

    Hritz, Mike; McGowan, Shirley; Ramos, Cal

    2004-01-01

    This viewgraph presentation lists questions regarding the implementation of System Wide Information Management (SWIM). Some of the questions concern policy issues and strategies, technology issues and strategies, or transition issues and strategies.

  15. Fault management and systems knowledge

    Science.gov (United States)

    2016-12-01

    Pilots are asked to manage faults during flight operations. This leads to the training question of the type and depth of system knowledge required to respond to these faults. Based on discussions with multiple airline operators, there is agreement th...

  16. RIMS: Resource Information Management System

    Science.gov (United States)

    Symes, J.

    1983-01-01

    An overview is given of the capabilities and functions of the resource management system (RIMS). It is a simple interactive DMS tool which allows users to build, modify, and maintain data management applications. The RIMS minimizes programmer support required to develop/maintain small data base applications. The RIMS also assists in bringing the United Information Services (UIS) budget system work inhouse. Information is also given on the relationship between the RIMS and the user community.

  17. BIMS: Biomedical Information Management System

    OpenAIRE

    Mora Pérez, Oscar

    2009-01-01

    This final year project presents the design principles and prototype implementation of BIMS (Biomedical Information Management System), a flexible software system which provides an infrastructure to manage all information required by biomedical research projects.The BIMS project was initiated with the motivation to solve several limitations in medical data acquisition of some research projects, in which Universitat Pompeu Fabra takes part. These limitations,based on the lack of control mechan...

  18. Project management and Enterprise systems

    DEFF Research Database (Denmark)

    Koch, Christian; Buhl, Henrik

    2006-01-01

    Implementing and Operating integrated Enterprise Systems are a multidimensional effort. It seriously challenges the IT supplier as well as the professional service provider client. The paper discuss these issues in a project management perspective. A framework for supporting project management...... is developed consisting of 18 dimensions. Building on an enterprise case we argue that the interrelation between politics, competences and unpredictability is crucial. A maturity measurement tool for enterprises planning to implement enterprise systems is developed....

  19. CLASSIFICATION OF LEARNING MANAGEMENT SYSTEMS

    Directory of Open Access Journals (Sweden)

    Yu. B. Popova

    2016-01-01

    Full Text Available Using of information technologies and, in particular, learning management systems, increases opportunities of teachers and students in reaching their goals in education. Such systems provide learning content, help organize and monitor training, collect progress statistics and take into account the individual characteristics of each user. Currently, there is a huge inventory of both paid and free systems are physically located both on college servers and in the cloud, offering different features sets of different licensing scheme and the cost. This creates the problem of choosing the best system. This problem is partly due to the lack of comprehensive classification of such systems. Analysis of more than 30 of the most common now automated learning management systems has shown that a classification of such systems should be carried out according to certain criteria, under which the same type of system can be considered. As classification features offered by the author are: cost, functionality, modularity, keeping the customer’s requirements, the integration of content, the physical location of a system, adaptability training. Considering the learning management system within these classifications and taking into account the current trends of their development, it is possible to identify the main requirements to them: functionality, reliability, ease of use, low cost, support for SCORM standard or Tin Can API, modularity and adaptability. According to the requirements at the Software Department of FITR BNTU under the guidance of the author since 2009 take place the development, the use and continuous improvement of their own learning management system.

  20. Impact Management System

    Data.gov (United States)

    US Agency for International Development — IMS (developed w/Iraq mission) is a system for conducting quality portfolio impact analysis, linking projects to strategy through integration of context data. IMS...

  1. Automated Maintenance Management System -

    Data.gov (United States)

    Department of Transportation — To achieve the to-be state of a modernized supply chain infrastructure and the NextGen Mission Service Requirements, the System Information Modernization initiative...

  2. 76 FR 55322 - Section 67 Limitations on Estates or Trusts

    Science.gov (United States)

    2011-09-07

    ... fees, real estate taxes, insurance premiums, maintenance and lawn services, automobile registration and... amount to the trust each year as compensation for leasing and managing the trust's rental real estate...

  3. Site systems engineering: Systems engineering management plan

    Energy Technology Data Exchange (ETDEWEB)

    Grygiel, M.L. [Westinghouse Hanford Co., Richland, WA (United States)

    1996-05-03

    The Site Systems Engineering Management Plan (SEMP) is the Westinghouse Hanford Company (WHC) implementation document for the Hanford Site Systems Engineering Policy, (RLPD 430.1) and Systems Engineering Criteria Document and Implementing Directive, (RLID 430.1). These documents define the US Department of Energy (DOE), Richland Operations Office (RL) processes and products to be used at Hanford to implement the systems engineering process at the site level. This SEMP describes the products being provided by the site systems engineering activity in fiscal year (FY) 1996 and the associated schedule. It also includes the procedural approach being taken by the site level systems engineering activity in the development of these products and the intended uses for the products in the integrated planning process in response to the DOE policy and implementing directives. The scope of the systems engineering process is to define a set of activities and products to be used at the site level during FY 1996 or until the successful Project Hanford Management Contractor (PHMC) is onsite as a result of contract award from Request For Proposal DE-RP06-96RL13200. Following installation of the new contractor, a long-term set of systems engineering procedures and products will be defined for management of the Hanford Project. The extent to which each project applies the systems engineering process and the specific tools used are determined by the project`s management.

  4. Evaluating safety management system implementation

    International Nuclear Information System (INIS)

    Preuss, M.

    2009-01-01

    Canada is committed to not only maintaining, but also improving upon our record of having one of the safest aviation systems in the world. The development, implementation and maintenance of safety management systems is a significant step towards improving safety performance. Canada is considered a world leader in this area and we are fully engaged in implementation. By integrating risk management systems and business practices, the aviation industry stands to gain better safety performance with less regulatory intervention. These are important steps towards improving safety and enhancing the public's confidence in the safety of Canada's aviation system. (author)

  5. Interconnecting heterogeneous database management systems

    Science.gov (United States)

    Gligor, V. D.; Luckenbaugh, G. L.

    1984-01-01

    It is pointed out that there is still a great need for the development of improved communication between remote, heterogeneous database management systems (DBMS). Problems regarding the effective communication between distributed DBMSs are primarily related to significant differences between local data managers, local data models and representations, and local transaction managers. A system of interconnected DBMSs which exhibit such differences is called a network of distributed, heterogeneous DBMSs. In order to achieve effective interconnection of remote, heterogeneous DBMSs, the users must have uniform, integrated access to the different DBMs. The present investigation is mainly concerned with an analysis of the existing approaches to interconnecting heterogeneous DBMSs, taking into account four experimental DBMS projects.

  6. Emergency management information system (EMINS)

    International Nuclear Information System (INIS)

    Desonier, L.M.

    1987-01-01

    In a time of crisis or in an emergency, a manager is required to make many decisions to facilitate the proper solution and conclusion to the emergency or crisis. In order to make these decisions, it is necessary for the manager to have correct up-to-date information on the situation, which calls for an automated information display and entry process. The information handling needs are identified in terms of data, video, and voice. Studies of existing Emergency Operations Centers and evaluations of hardware and software have been completed. The result of these studies and investigations is the design and implementation of an automated Emergency Management Information System. Not only is the system useful for Emergency Management but for any information management requirement

  7. The Academy Trust

    Indian Academy of Sciences (India)

    user

    The Academy Trust. Agenda. Date: 3rd November 2016. Time: 0900 hrs. Venue: Visitors' Hostel – Auditorium, IISER Bhopal. 0900 – 0930 hrs Welcome and Introduction to the Academy Trust (Chair Academy. Trust or Trustee). Remarks by Director, IISER, Bhopal. Remarks by: Eklavya Trust. 0930 – 1015 hrs Talk by Prof.

  8. Trust in Scientific Publishing

    NARCIS (Netherlands)

    Hummels, Harry; Roosendaal, Hans E.

    2001-01-01

    Trust is an important phenomenon to reduce organisational complexity and uncertainty. In the literature many types of trust are distinguished. An important framework to understand the variety and development of trust in organisations is provided by Zucker. She distinguishes three types of trust:

  9. Trust and Leadership

    DEFF Research Database (Denmark)

    Bordum, Anders

    2005-01-01

    need not continue the phrase `trust is good,' with `control is better,' as e.g., Stalin did. Let us stop with `trust is good,' and look at the implications of this evaluation. It is my conviction that trust is normally something which is normatively desirable, and that trust is a concept which cannot...

  10. Integrated Project Management System description

    International Nuclear Information System (INIS)

    1987-03-01

    The Uranium Mill Tailings Remedial Action (UMTRA) Project is a Department of Energy (DOE) designated Major System Acquisition (MSA). To execute and manage the Project mission successfully and to comply with the MSA requirements, the UMTRA Project Office (''Project Office'') has implemented and operates an Integrated Project Management System (IPMS). The Project Office is assisted by the Technical Assistance Contractor's (TAC) Project Integration and Control (PIC) Group in system operation. Each participant, in turn, provides critical input to system operation and reporting requirements. The IPMS provides a uniform structured approach for integrating the work of Project participants. It serves as a tool for planning and control, workload management, performance measurement, and specialized reporting within a standardized format. This system description presents the guidance for its operation. Appendices 1 and 2 contain definitions of commonly used terms and abbreviations and acronyms, respectively. 17 figs., 5 tabs

  11. Management systems for service providers

    International Nuclear Information System (INIS)

    Bolokonya, Herbert Chiwalo

    2015-02-01

    In the field of radiation safety and protection there are a number of institutions that are involved in achieving different goals and strategies. These strategies and objectives are achieved based on a number of tools and systems, one of these tools and systems is the use of a management system. This study aimed at reviewing the management system concept for Technical Service Providers in the field of radiation safety and protection. The main focus was on personal monitoring services provided by personal dosimetry laboratories. A number of key issues were found to be prominent to make the management system efficient. These are laboratory accreditation, approval; having a customer driven operating criteria; and controlling of records and good reporting. (au)

  12. Implementation of integrated management system

    International Nuclear Information System (INIS)

    Gaspar Junior, Joao Carlos A.; Fonseca, Victor Zidan da

    2007-01-01

    In present day exist quality assurance system, environment, occupational health and safety such as ISO9001, ISO14001 and OHSAS18001 and others standards will can create. These standards can be implemented and certified they guarantee one record system, quality assurance, documents control, operational control, responsibility definition, training, preparing and serve to emergency, monitoring, internal audit, corrective action, continual improvement, prevent of pollution, write procedure, reduce costs, impact assessment, risk assessment , standard, decree, legal requirements of municipal, state, federal and local scope. These procedure and systems when isolate applied cause many management systems and bureaucracy. Integration Management System reduce to bureaucracy, excess of documents, documents storage and conflict documents and easy to others standards implementation in future. The Integrated Management System (IMS) will be implemented in 2007. INB created a management group for implementation, this group decides planing, works, policy and advertisement. Legal requirements were surveyed, internal audits, pre-audits and audits were realized. INB is partially in accordance with ISO14001, OSHAS18001 standards. But very soon, it will be totally in accordance with this norms. Many studies and works were contracted to deal with legal requirements. This work have intention of show implementation process of ISO14001, OHSAS18001 and Integrated Management System on INB. (author)

  13. The JCMT Telescope Management System

    Science.gov (United States)

    Tilanus, Remo P. J.; Jenness, Tim; Economou, Frossie; Cockayne, Steve

    Established telescopes often face a challenge when trying to incorporate new software standards and utilities into their existing real-time control system. At the JCMT we have successfully added important new features such as a Relational Database (the Telescope Management System---TMS), an online data Archive, and WWW based utilities to an, in part, 10-year old system. The new functionality was added with remarkably few alterations to the existing system. We are still actively expanding and exploring these new capabilities.

  14. Management Information System & Computer Applications

    OpenAIRE

    Sreeramana Aithal

    2017-01-01

    The book contains following Chapters : Chapter 1 : Introduction to Management Information Systems, Chapter 2 : Structure of MIS, Chapter 3 : Planning for MIS, Chapter 4 : Introduction to Computers Chapter 5 : Decision Making Process in MIS Chapter 6 : Approaches for System Development Chapter 7 : Form Design Chapter 8 : Charting Techniques Chapter 9 : System Analysis & Design Chapter 10 : Applications of MIS in Functional Areas Chapter 11 : System Implement...

  15. Problems of judiciary trust

    Directory of Open Access Journals (Sweden)

    Vuković Slobodan

    2007-01-01

    Full Text Available Topic of the article is problem of trust in judiciary as a most important part of legal system. For all empirical researches so far have shown very law degree of this trust many authors were searching for the causes of this phenomenon. Among multifold causes some are special worth while to be mentioned here: historical inheritance, political pressures, delaying of judiciary decisions, respect of the laws, transferring of responsibility from political power to the judiciary, public comments of judiciary decisions, media pressures, efficiency of judiciary and police. Among inner factors author pays attention to competency of judges, modes of penal policy, modes of judges’ entitlement, problems of communication, involvement into criminal and corruptional affairs, etc.

  16. The decommissioning information management system

    International Nuclear Information System (INIS)

    Park, Seung-Kook; Moon, Jei-Kwon

    2015-01-01

    At the Korea Atomic Energy Research Institute (KAERI), the Korea Research Reactor (KRR-2) and one uranium conversion plant (UCP) were decommissioned. A project was launched in 1997, for the decommissioning of KRR-2 reactor with the goal of completion by 2008. Another project for the decommissioning of the UCP was launched in 2001. The physical dismantling works were started in August 2003 and the entire project was completed by the end of 2010. KAERI has developed a computer information system, named DECOMMIS, for an information management with an increased effectiveness for decommissioning projects and for record keeping for the future decommissioning projects. This decommissioning information system consists of three sub-systems; code management system, data input system (DDIS) and data processing and output system (DDPS). Through the DDIS, the data can be directly inputted at sites to minimize the time gap between the dismantling activities and the evaluation of the data by the project staff. The DDPS provides useful information to the staff for more effective project management and this information includes several fields, such as project progress management, man power management, waste management, and radiation dose control of workers and so on. The DECOMMIS was applied to the decommissioning projects of the KRR-2 and the UCP, and was utilized to give information to the staff for making decisions regarding the progress of projects. It is also to prepare the reference data for the R and D program which is for the development of the decommissioning engineering system tools and to maintain the decommissioning data for the next projects. In this paper, the overall system will be explained and the several examples of its utilization, focused on waste management and manpower control, will be introduced. (author)

  17. Trust and Leadership

    DEFF Research Database (Denmark)

    Bordum, Anders

    2005-01-01

    The concept and phenomenon of trust and its relation to leadership has recently come into focus. What role does trust play? Can trust be created strategically? Questions like these are often raised. How we conceive of and conceptualize trust is not as often discussed. Among those conceptualizations...... flexibility of form for example, the idea that one with leadership tools can consciously bring forth trust. In the conclusion, the question about trust communication is addressed. In this section I argue that trust is positively value-laden, becausesincerity is a functional and pragmatic condition...

  18. On development of TrustMan system assisting configuration of temporary consortiums

    NARCIS (Netherlands)

    Msanjila, S.S.; Afsarmanesh, H.

    2009-01-01

    Managing coalition networks of organisations is gradually becoming more complex and challenging as the current trends of the market conditions are becoming more dynamic. The dynamism nature is experienced in many aspects including: advances in technologies, rising demand of resources for each

  19. Trust in Diverse Teams

    DEFF Research Database (Denmark)

    Clausen, Lisbeth

    Multicultural membership and diversity in teams are important to maintain effectiveness in organizations in a global business environment. Multicultural teams offer great potential in international collaboration just as top management teams are becoming increasingly diversified. However...... with change in particular ways: Each team is analyzed in relation to its global (HQ) mandate, local (national) stakeholders and organizational context. It is found that communication energy, resources and team mandate underscore the sense of trust in high performing teams. Diversity is understood...... as nationalities, gender, functional expertise and international experience. The study contributes insights to diverse teams through a processual study of micro-processes in global organizational contexts crossing multicultural boundaries....

  20. Integrated Systems Health Management for Intelligent Systems

    Science.gov (United States)

    Figueroa, Fernando; Melcher, Kevin

    2011-01-01

    The implementation of an integrated system health management (ISHM) capability is fundamentally linked to the management of data, information, and knowledge (DIaK) with the purposeful objective of determining the health of a system. It is akin to having a team of experts who are all individually and collectively observing and analyzing a complex system, and communicating effectively with each other in order to arrive at an accurate and reliable assessment of its health. In this paper, concepts, procedures, and approaches are presented as a foundation for implementing an intelligent systems ]relevant ISHM capability. The capability stresses integration of DIaK from all elements of a system. Both ground-based (remote) and on-board ISHM capabilities are compared and contrasted. The information presented is the result of many years of research, development, and maturation of technologies, and of prototype implementations in operational systems.

  1. DKIST facility management system integration

    Science.gov (United States)

    White, Charles R.; Phelps, LeEllen

    2016-07-01

    The Daniel K. Inouye Solar Telescope (DKIST) Observatory is under construction at Haleakalā, Maui, Hawai'i. When complete, the DKIST will be the largest solar telescope in the world. The Facility Management System (FMS) is a subsystem of the high-level Facility Control System (FCS) and directly controls the Facility Thermal System (FTS). The FMS receives operational mode information from the FCS while making process data available to the FCS and includes hardware and software to integrate and control all aspects of the FTS including the Carousel Cooling System, the Telescope Chamber Environmental Control Systems, and the Temperature Monitoring System. In addition it will integrate the Power Energy Management System and several service systems such as heating, ventilation, and air conditioning (HVAC), the Domestic Water Distribution System, and the Vacuum System. All of these subsystems must operate in coordination to provide the best possible observing conditions and overall building management. Further, the FMS must actively react to varying weather conditions and observational requirements. The physical impact of the facility must not interfere with neighboring installations while operating in a very environmentally and culturally sensitive area. The FMS system will be comprised of five Programmable Automation Controllers (PACs). We present a pre-build overview of the functional plan to integrate all of the FMS subsystems.

  2. Campus Telephone Systems: Managing Change.

    Science.gov (United States)

    National Association of College and University Business Officers, Washington, DC.

    Issues facing a college or university that seeks to change its telephone system are raised in seven chapters. Major topics addressed by this resource guide are: telephone deregulation and changes in the telephone industry, the new technology available, how to manage a system, consultants, financing options, and institutional case studies. Specific…

  3. Managing Risk in Systems Development.

    Science.gov (United States)

    DePaoli, Marilyn M.; And Others

    Stanford University's use of a risk assessment methodology to improve the management of systems development projects is discussed. After examining the concepts of hazard, peril, and risk as they relate to the system development process, three ways to assess risk are covered: size, structure, and technology. The overall objective for Stanford…

  4. The CMS Data Management System

    CERN Document Server

    Giffels, M.; Kuznetsov, V; Magini, N; Wildish, T

    2014-01-01

    The data management elements in CMS are scalable, modular, and designed to work together. The main components are PhEDEx, the data transfer and location system; the Dataset Booking System (DBS), a metadata catalogue; and the Data Aggregation Service (DAS), designed to aggregate views and provide them to users and services. Tens of thousands of samples have been cataloged and petabytes of data have been moved since the run began. The modular system has allowed the optimal use of appropriate underlying technologies. In this presentation we will discuss the use of both Oracle and nonSQL databases to implement the data management elements as well as the individual architectures chosen. We will discuss how the data management system functioned during the first run, and what improvements are planned in preparation for 2015.

  5. Portuguese food composition database quality management system.

    Science.gov (United States)

    Oliveira, L M; Castanheira, I P; Dantas, M A; Porto, A A; Calhau, M A

    2010-11-01

    ') comments, complaints and satisfaction, with minor adaptation. Implementation of the FCDB QMS proved to be a way of reducing the subjectivity of the compilation process and fully documenting it, and also facilitates training of new compilers. Furthermore, it has strengthened cooperation and trust among FCDB actors, as all of them were called to be involved in the process. On the basis of our practical results, we can conclude that ISO/IEC 17025 management requirements are an adequate reference for the implementation of INSA's FCDB QMS with the advantages of being well known to all members of staff and also being a common quality language among laboratories producing FCD. Combining quality systems and food composition activities endows the FCDB compilation process with flexibility, consistency and transparency, and facilitates its monitoring and assessment, providing the basis for strengthening confidence among users, data producers and compilers.

  6. Playing Attack and Defense with Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe; Bouganim, Luc

    2014-01-01

    It is often convenient to assume in a data management platform that one or several computing devices are trusted, specially when the goal is to provide privacy guarantees over personal data. But what does it take for a computing device to be trusted? More specifically, how can a personal device...... provide trusted storage? This is the question we tackle in this demonstration. We describe how secure devices, equipped with a trusted execution environment, differ from general purpose devices. We illustrate with our demonstration scenario, that it is much more difficult to attack a storage service...... running on a secure device, than to attack the same service running on a general purpose device....

  7. BIOS Security Analysis and a Kind of Trusted BIOS

    Science.gov (United States)

    Zhou, Zhenliu; Xu, Rongsheng

    The BIOS's security threats to computer system are analyzed and security requirements for firmware BIOS are summarized in this paper. Through discussion about TCG's trust transitivity, a new approach about CRTM implementation based on BIOS is developed. In this paper, we also put forward a new trusted BIOS architecture-UTBIOS which is built on Intel Framework for EFI/UEFI. The trustworthiness of UTBIOS is based on trusted hardware TPM. In UTBIOS, trust encapsulation and trust measurement are used to construct pre-OS trust chain. Performance of trust measurement is also analyzed in the end.

  8. Trust-distrust Balance

    DEFF Research Database (Denmark)

    Jukka, Minna; Blomqvist, Kirsimarja; Li, Peter Ping

    2017-01-01

    Purpose - The purpose of this paper is to explore how Chinese and Finnish managers in cross-cultural supply-chain relationships evaluate their business partners' trustworthiness and distrustworthiness. Design/methodology/approach - Representatives of two Finnish companies and their Chinese...... and Finnish suppliers were interviewed to collect qualitative data from 23 managers. Findings - The Chinese managers emphasized relationship-specific, personalized trustworthiness. They highlighted personalized communication and benevolence, which manifested in respect and reciprocity, rooted in the Chinese...... as the effects of industry, market position, and position in the supply chain. Practical implications - The findings of this study bring a valuable understanding of the potential pitfalls and unique challenges in cross-border inter-firm transactions. These can enhance inter-firm trust building in a cross-cultural...

  9. Pengaruh Systemic Fairness Dari Layanan Internet Banking Terhadap Customer Satisfaction Dengan Customer Trust Dan Customer Perceived Value Sebagai Variabel Intervening

    OpenAIRE

    Pratama, Reza Putra

    2014-01-01

    The background of this research is to investigate and analyze the effect of systematic fairness from internet banking services to customer satisfaction with customer trust and customer perceived value as intervening variable. The objective of this research findings in internet banking, fairness that includes distributive fairness, procedural fairness and informational fairness is positively related to customer satisfaction. Trust is identified as the key mediator of fairness to customer sa...

  10. The Importance of Trust in Electronic Commerce.

    Science.gov (United States)

    Ratnasingham, Pauline

    1998-01-01

    Introduces the new concept of trust and how it influences the process of managing the security of an organization operating in an electronic commerce environment. Theoretically, the study aims to develop a framework of trust and security to provide a set of guidelines for secure electronic commerce. (Author/LRW)

  11. Trust and Control in Public Sector Reform

    DEFF Research Database (Denmark)

    Vallentin, Steen; Thygesen, Niels Thyge

    2017-01-01

    This paper provides an analysis of trust-based management reform in the Danish public sector from the point of view of the trust–control nexus. Based on a qualitative case study of home care in the municipality of Copenhagen we argue that a complementary view of trust and control is superior...

  12. Electromagnetic spectrum management system

    Science.gov (United States)

    Seastrand, Douglas R.

    2017-01-31

    A system for transmitting a wireless countermeasure signal to disrupt third party communications is disclosed that include an antenna configured to receive wireless signals and transmit wireless counter measure signals such that the wireless countermeasure signals are responsive to the received wireless signals. A receiver processes the received wireless signals to create processed received signal data while a spectrum control module subtracts known source signal data from the processed received signal data to generate unknown source signal data. The unknown source signal data is based on unknown wireless signals, such as enemy signals. A transmitter is configured to process the unknown source signal data to create countermeasure signals and transmit a wireless countermeasure signal over the first antenna or a second antenna to thereby interfere with the unknown wireless signals.

  13. Electromagnetic spectrum management system

    Energy Technology Data Exchange (ETDEWEB)

    Seastrand, Douglas R.

    2017-10-17

    A system for transmitting a wireless countermeasure signal to disrupt third party communications is disclosed that include an antenna configured to receive wireless signals and transmit wireless counter measure signals such that the wireless countermeasure signals are responsive to the received wireless signals. A receiver processes the received wireless signals to create processed received signal data while a spectrum control module subtracts known source signal data from the processed received signal data to generate unknown source signal data. The unknown source signal data is based on unknown wireless signals, such as enemy signals. A transmitter is configured to process the unknown source signal data to create countermeasure signals and transmit a wireless countermeasure signal over the first antenna or a second antenna to thereby interfere with the unknown wireless signals.

  14. Trust in automation: integrating empirical evidence on factors that influence trust.

    Science.gov (United States)

    Hoff, Kevin Anthony; Bashir, Masooda

    2015-05-01

    We systematically review recent empirical research on factors that influence trust in automation to present a three-layered trust model that synthesizes existing knowledge. Much of the existing research on factors that guide human-automation interaction is centered around trust, a variable that often determines the willingness of human operators to rely on automation. Studies have utilized a variety of different automated systems in diverse experimental paradigms to identify factors that impact operators' trust. We performed a systematic review of empirical research on trust in automation from January 2002 to June 2013. Papers were deemed eligible only if they reported the results of a human-subjects experiment in which humans interacted with an automated system in order to achieve a goal. Additionally, a relationship between trust (or a trust-related behavior) and another variable had to be measured. All together, 101 total papers, containing 127 eligible studies, were included in the review. Our analysis revealed three layers of variability in human-automation trust (dispositional trust, situational trust, and learned trust), which we organize into a model. We propose design recommendations for creating trustworthy automation and identify environmental conditions that can affect the strength of the relationship between trust and reliance. Future research directions are also discussed for each layer of trust. Our three-layered trust model provides a new lens for conceptualizing the variability of trust in automation. Its structure can be applied to help guide future research and develop training interventions and design procedures that encourage appropriate trust. © 2014, Human Factors and Ergonomics Society.

  15. Operational Management System for Regulated Water Systems

    Science.gov (United States)

    van Loenen, A.; van Dijk, M.; van Verseveld, W.; Berger, H.

    2012-04-01

    Most of the Dutch large rivers, canals and lakes are controlled by the Dutch water authorities. The main reasons concern safety, navigation and fresh water supply. Historically the separate water bodies have been controlled locally. For optimizating management of these water systems an integrated approach was required. Presented is a platform which integrates data from all control objects for monitoring and control purposes. The Operational Management System for Regulated Water Systems (IWP) is an implementation of Delft-FEWS which supports operational control of water systems and actively gives advice. One of the main characteristics of IWP is that is real-time collects, transforms and presents different types of data, which all add to the operational water management. Next to that, hydrodynamic models and intelligent decision support tools are added to support the water managers during their daily control activities. An important advantage of IWP is that it uses the Delft-FEWS framework, therefore processes like central data collection, transformations, data processing and presentation are simply configured. At all control locations the same information is readily available. The operational water management itself gains from this information, but it can also contribute to cost efficiency (no unnecessary pumping), better use of available storage and advise during (water polution) calamities.

  16. Autonomously managed high power systems

    International Nuclear Information System (INIS)

    Weeks, D.J.; Bechtel, R.T.

    1985-01-01

    The need for autonomous power management capabilities will increase as the power levels of spacecraft increase into the multi-100 kW range. The quantity of labor intensive ground and crew support consumed by the 9 kW Skylab cannot be afforded in support of a 75-300 kW Space Station or high power earth orbital and interplanetary spacecraft. Marshall Space Flight Center is managing a program to develop necessary technologies for high power system autonomous management. To date a reference electrical power system and automation approaches have been defined. A test facility for evaluation and verification of management algorithms and hardware has been designed with the first of the three power channel capability nearing completion

  17. User Resistance and Trust in a Clinical RFID Employee Location Tracking Information System

    Science.gov (United States)

    Wong, Wilson

    2013-01-01

    User resistance has been identified as a factor in information systems implementation failures in the health care industry. RFID, radio frequency identification, is being incorporated into new health care information systems in order to effect cost reductions by tracking, identifying and monitoring individuals and medical items. This is the first…

  18. Analysis of the Factors Affecting Resistance to Changes in Management Accounting Systems

    Directory of Open Access Journals (Sweden)

    Rodrigo Angonese

    2014-12-01

    Full Text Available Despite changes in the environment and management accounting practices, studies indicate that management accounting systems do not change or change at a much slower rate than expected. The stability of the management accounting systems used by companies may relate to resistance to changing these systems. This study analyzes the factors that contribute to resistance to implementing an integrated management system from the perspective of institutional theory, grounded in the old institutional economics. Methodologically, this study provides a qualitative assessment of the problem and a descriptive analysis of the resistance factors through a case-study approach. The data were collected using semi-structured interviews and analyzed through content analysis. Two companies were selected for this study due to their differing characteristics. The following seven factors were analyzed for resistance to implementing integrated management systems: institutional power, ontological insecurity, trust, inertia, lack of knowledge, acceptance of routines and decoupling. However, there was no evidence to characterize hierarchical power. The research findings indicate that changing management accounting systems, through the implementation of an integrated management system, faces internal resistance in these organizations. Each factor varies in intensity but is permanently present in these companies, such as ontological insecurity, trust, inertia, lack of knowledge, acceptance of routines and decoupling. These factors are awakened when the change process begins and, if they gather enough force, can stop the change.

  19. Introduction to Management Information system

    OpenAIRE

    Mishra, Umakant

    2013-01-01

    A Management Information System (MIS) is a systematic organization and presentation of information that is generally required by the management of an organization for taking better decisions for the organization. The MIS data may be derived from various units of the organization or from other sources. However it is very difficult to say the exact structure of MIS as the structure and goals of different types of organizations are different. Hence both the data and structure of MIS is dependent...

  20. Laboratory information management system proposal

    Energy Technology Data Exchange (ETDEWEB)

    Brown, B.; Schweitzer, S.; Adams, C.; White, S. [Tennessee Univ., Knoxville, TN (United States)

    1992-08-01

    The objectives of this paper is design a user friendly information management system using a relational database in order to: allow customers direct access to the system; provide customers with direct sample tracking capabilities; provide customers with more timely, consistent reporting; better allocate costs for analyses to appropriate customers; eliminate cumbersome and costly papertrails; and enhance facility utilization by laboratory personnel. The resultant savings through increased efficiency provided by this system should more than offset its cost in the long-term.

  1. Laboratory information management system proposal

    Energy Technology Data Exchange (ETDEWEB)

    Brown, B.; Schweitzer, S.; Adams, C.; White, S. (Tennessee Univ., Knoxville, TN (United States))

    1992-01-01

    The objectives of this paper is design a user friendly information management system using a relational database in order to: allow customers direct access to the system; provide customers with direct sample tracking capabilities; provide customers with more timely, consistent reporting; better allocate costs for analyses to appropriate customers; eliminate cumbersome and costly papertrails; and enhance facility utilization by laboratory personnel. The resultant savings through increased efficiency provided by this system should more than offset its cost in the long-term.

  2. Which Doctor to Trust: A Recommender System for Identifying the Right Doctors.

    Science.gov (United States)

    Guo, Li; Jin, Bo; Yao, Cuili; Yang, Haoyu; Huang, Degen; Wang, Fei

    2016-07-07

    Key opinion leaders (KOLs) are people who can influence public opinion on a certain subject matter. In the field of medical and health informatics, it is critical to identify KOLs on various disease conditions. However, there have been very few studies on this topic. We aimed to develop a recommender system for identifying KOLs for any specific disease with health care data mining. We exploited an unsupervised aggregation approach for integrating various ranking features to identify doctors who have the potential to be KOLs on a range of diseases. We introduce the design, implementation, and deployment details of the recommender system. This system collects the professional footprints of doctors, such as papers in scientific journals, presentation activities, patient advocacy, and media exposure, and uses them as ranking features to identify KOLs. We collected the information of 2,381,750 doctors in China from 3,657,797 medical journal papers they published, together with their profiles, academic publications, and funding. The empirical results demonstrated that our system outperformed several benchmark systems by a significant margin. Moreover, we conducted a case study in a real-world system to verify the applicability of our proposed method. Our results show that doctors' profiles and their academic publications are key data sources for identifying KOLs in the field of medical and health informatics. Moreover, we deployed the recommender system and applied the data service to a recommender system of the China-based Internet technology company NetEase. Patients can obtain authority ranking lists of doctors with this system on any given disease.

  3. Social trust and ionizing radiation

    Energy Technology Data Exchange (ETDEWEB)

    Meadd, E. [Faculty of Environmental Studies, York University, Toronto, Ontario (Canada)

    2002-07-01

    The linkages that exist between the environmental risks associated with nuclear energy production (both perceived and real) and the myriad of social and political issues and processes that influence social trust are a current issue in literature, but are not well explored, particularly for the Canadian context. This paper will examine one particular issue and its relationship with social trust: ionizing radiation and public health. Social trust is defined for this paper as including interpersonal trust, but having a much broader focus, extending to public trust in governments, institutions, corporations, and the power elite, and across whole societies. Of particular interest for the nuclear energy issue is how waning social trust may impact the functioning of democratic decision-making processes, particularly those associated with the siting of waste facilities. Social trust is a central issue in the management of environmental risks, particularly those related to high technology; its absence is seen as a major cause of intractable conflict in decisions related to nuclear power generation and waste disposal. Understanding the dynamics of social trust is important if a resolution is to be found to the nuclear waste management debate in Canada, that is, one that involves broad public, or social, support. For instance, what factors cause distrust to emerge, and when distrust emerges, what authorities do members of affected communities seek out for information and support? This paper begins to examine social trust in relation to human health and ionizing radiation, particularly low dose radiation from radioactive wastes resulting from uranium and radium processing activities in Port Hope, Ontario. These activities date back to the 1930s and are of great concern to community members. This paper looks at some of the roots of public concern, for example, scientific uncertainty around whether or not human health is compromised by exposure to low dose ionizing radiation

  4. Social trust and ionizing radiation

    International Nuclear Information System (INIS)

    Meadd, E.

    2002-01-01

    The linkages that exist between the environmental risks associated with nuclear energy production (both perceived and real) and the myriad of social and political issues and processes that influence social trust are a current issue in literature, but are not well explored, particularly for the Canadian context. This paper will examine one particular issue and its relationship with social trust: ionizing radiation and public health. Social trust is defined for this paper as including interpersonal trust, but having a much broader focus, extending to public trust in governments, institutions, corporations, and the power elite, and across whole societies. Of particular interest for the nuclear energy issue is how waning social trust may impact the functioning of democratic decision-making processes, particularly those associated with the siting of waste facilities. Social trust is a central issue in the management of environmental risks, particularly those related to high technology; its absence is seen as a major cause of intractable conflict in decisions related to nuclear power generation and waste disposal. Understanding the dynamics of social trust is important if a resolution is to be found to the nuclear waste management debate in Canada, that is, one that involves broad public, or social, support. For instance, what factors cause distrust to emerge, and when distrust emerges, what authorities do members of affected communities seek out for information and support? This paper begins to examine social trust in relation to human health and ionizing radiation, particularly low dose radiation from radioactive wastes resulting from uranium and radium processing activities in Port Hope, Ontario. These activities date back to the 1930s and are of great concern to community members. This paper looks at some of the roots of public concern, for example, scientific uncertainty around whether or not human health is compromised by exposure to low dose ionizing radiation

  5. Intentional systems management: managing forests for biodiversity.

    Science.gov (United States)

    A.B. Carey; B.R. Lippke; J. Sessions

    1999-01-01

    Conservation of biodiversity provides for economic, social, and environmental sustainability. Intentional management is designed to manage conflicts among groups with conflicting interests. Our goal was to ascertain if intentional management and principles of conservation of biodiversity could be combined into upland and riparian forest management strategies that would...

  6. Strategies to Build a Trusted and Collaborative Information Sharing System for State-Level Homeland Security

    National Research Council Canada - National Science Library

    Flowers, Robert

    2004-01-01

    .... Spending more money on "stuff" (hardware, communications systems, etc.) will not provide for better information sharing, unless cultural barriers to change are recognized and taken into account in State planning...

  7. Management of complex dynamical systems

    Science.gov (United States)

    MacKay, R. S.

    2018-02-01

    Complex dynamical systems are systems with many interdependent components which evolve in time. One might wish to control their trajectories, but a more practical alternative is to control just their statistical behaviour. In many contexts this would be both sufficient and a more realistic goal, e.g. climate and socio-economic systems. I refer to it as ‘management’ of complex dynamical systems. In this paper, some mathematics for management of complex dynamical systems is developed in the weakly dependent regime, and questions are posed for the strongly dependent regime.

  8. The CMS data management system

    International Nuclear Information System (INIS)

    Giffels, M; Magini, N; Guo, Y; Kuznetsov, V; Wildish, T

    2014-01-01

    The data management elements in CMS are scalable, modular, and designed to work together. The main components are PhEDEx, the data transfer and location system; the Data Booking Service (DBS), a metadata catalog; and the Data Aggregation Service (DAS), designed to aggregate views and provide them to users and services. Tens of thousands of samples have been cataloged and petabytes of data have been moved since the run began. The modular system has allowed the optimal use of appropriate underlying technologies. In this contribution we will discuss the use of both Oracle and NoSQL databases to implement the data management elements as well as the individual architectures chosen. We will discuss how the data management system functioned during the first run, and what improvements are planned in preparation for 2015.

  9. The CMS Data Management System

    Science.gov (United States)

    Giffels, M.; Guo, Y.; Kuznetsov, V.; Magini, N.; Wildish, T.

    2014-06-01

    The data management elements in CMS are scalable, modular, and designed to work together. The main components are PhEDEx, the data transfer and location system; the Data Booking Service (DBS), a metadata catalog; and the Data Aggregation Service (DAS), designed to aggregate views and provide them to users and services. Tens of thousands of samples have been cataloged and petabytes of data have been moved since the run began. The modular system has allowed the optimal use of appropriate underlying technologies. In this contribution we will discuss the use of both Oracle and NoSQL databases to implement the data management elements as well as the individual architectures chosen. We will discuss how the data management system functioned during the first run, and what improvements are planned in preparation for 2015.

  10. Archetypes for Managing ERP Systems

    DEFF Research Database (Denmark)

    Kræmmergaard, Pernille; Hansen, Michael Fiil

    2006-01-01

    The ERP journey has taken us beyond implementation, into the second wave of ERP. One interesting question in this second wave is how the ERP system is managed and what role the ERP system plays in the organization after some years of implementation. These questions are addressed in this paper....... In our research of 20 case-studies we found certain similarities and differences in the patterns which coalesced around three alternatives in the way organizations approach the managing of ERP in the second wave. We describe these archetypes, which we call the Calculators, the Co-players and the Drivers......, and we present illustrative cases of each of the archetypes. The archetypes are believed to play an important role in conveying the essential differences existing in alternative ways in which organizations manage their ERP system during the second wave....

  11. Archetypes for Managing ERP Systems

    DEFF Research Database (Denmark)

    Kræmmergaard, Pernille; Fill, Michael; Simonsen, Martin

    2007-01-01

    The ERP journey has taken us beyond implementation, into the second wave of ERP. One interesting question in this second wave is how the ERP system is managed and what role the ERP system plays in the organization after some years of implementation. These questions are addressed in this paper....... In our research of 20 case-studies we found certain similarities and differences in the patterns which coalesced around three alternatives in the way organizations approach the managing of ERP in the second wave. We describe these archetypes, which we call the Calculators, the Co-players and the Drivers......, and we present illustrative cases of each of the archetypes. The archetypes are believed to play an important role in conveying the essential differences existing in alternative ways in which organizations manage their ERP system during the second wave....

  12. Network Security Toolkit Including Heuristic Solutions for Trust System Placement and Network Obfuscation

    Science.gov (United States)

    2010-12-01

    I, a supervisory control and data acquisition (SCADA) network consists of a group of stations and substations in a portion of the power grid. The use...nD number of domains . . . . . . . . . . . . . . . . . . . . . . . . 25 Hn the harmonic number corresponding to the largest-sized subset 27 xiii Part...to remotely monitor and control distant substations . Pilot wire systems and step switching systems allowed operators to run wires between stations and

  13. Nuclear maintenance and management system

    International Nuclear Information System (INIS)

    Yamaji, Yoshihiro; Abe, Norihiko

    2000-01-01

    The Mitsubishi Electric Co., Ltd. has developed to introduce various computer systems for desk-top business assistance in a power plant such as system isolation assisting system, operation parameter management system, and so on under aiming at business effectiveness since these ten and some years. Recently, by further elapsed years of the plants when required for further cost reduction and together with change of business environment represented by preparation of individual personal computer, further effectiveness, preparation of the business environment, and upgrading of maintenance in power plant business have been required. Among such background, she has carried out various proposals and developments on construction of a maintenance and management system integrated the business assistant know-hows and the plant know-hows both accumulated previously. They are composed of three main points on rationalization of business management and document management in the further effectiveness, preparation of business environment, TBM maintenance, introduction of CBM maintenance and introduction of maintenance assistance in upgrading of maintenance. Here was introduced on system concepts aiming at the further effectiveness of the nuclear power plant business, preparation of business environment, upgrading of maintenance and maintenance, and so on, at a background of environment around maintenance business in the nuclear power plants (cost-down, highly elapsed year of the plant, change of business environment). (G.K)

  14. Auditing of environmental management system

    Directory of Open Access Journals (Sweden)

    Čuchranová Katarína

    2001-12-01

    Full Text Available Environmental auditing has estabilished itself as a valueable instrument to verify and help to improve the environmental performance.Organizations of all kinds may have a need to demonstrate the environmental responsibility. The concept of environmental management systems and the associated practice of environmental auditing have been advanced as one way to satisfy this need.These system are intended to help an organization to establish and continue to meet its environmental policies, objectives, standards and other requirements.Environmental auditing is a systematic and documented verification process of objectively obtaining and evaluating audit evidence to determine whether an organizations environmental management system conforms to the environmental management system audit criteria set by the organization and for the communication of the results of this process to the management.The following article intercepts all parts of preparation environmental auditing.The audit programme and procedures should cover the activities and areas to be considered in audits, the frequency of audits, the responsibilities associated with managing and conducting audits, the communication of audit results, auditor competence, and how audits will be conducted.The International Standard ISO 140011 estabilishes the audit procedures that determine conformance with EMS audit criteria.

  15. Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model

    DEFF Research Database (Denmark)

    Li, Wenjuan; Meng, Weizhi; Kwok, Lam-For

    2017-01-01

    To defend against complex attacks, collaborative intrusion detection networks (CIDNs) have been developed to enhance the detection accuracy, which enable an IDS to collect information and learn experience from others. However, this kind of networks is vulnerable to malicious nodes which...... are utilized by insider attacks (e.g., betrayal attacks). In our previous research, we developed a notion of intrusion sensitivity and identified that it can help improve the detection of insider attacks, whereas it is still a challenge for these nodes to automatically assign the values. In this article, we...... of intrusion sensitivity based on expert knowledge. In the evaluation, we compare the performance of three different supervised classifiers in assigning sensitivity values and investigate our trust model under different attack scenarios and in a real wireless sensor network. Experimental results indicate...

  16. Dimensions of trust

    DEFF Research Database (Denmark)

    Frederiksen, Morten

    2012-01-01

    Georg Simmel is the seminal author on trust within sociology, but though inspired by Simmel, subsequent studies of intersubjective trust have failed to address Simmel’s suggestion that trust is as differentiated as the social relations of which it is part. Rather, trust has been studied within...... limited sets of exchange or work relations. This article revisits Simmel’s concept of trust as social form in order to investigate this differentiation. From an interview study, the differentiation and limits of trust are analysed within different types of social relations. Trust is found to vary greatly...... in scope and mode influenced by the intersecting dimensions of relations, objects and situations. Furthermore, trust exists between an outer threshold of expected deceit and an inner threshold of confident reliance. The findings from the qualitative study contribute new knowledge on the diversity of trust...

  17. Trust for intelligent recommendation

    CERN Document Server

    Bhuiyan, Touhid

    2013-01-01

    Recommender systems are one of the recent inventions to deal with the ever-growing information overload in relation to the selection of goods and services in a global economy. Collaborative Filtering (CF) is one of the most popular techniques in recommender systems. The CF recommends items to a target user based on the preferences of a set of similar users known as the neighbors, generated from a database made up of the preferences of past users. In the absence of these ratings, trust between the users could be used to choose the neighbor for recommendation making. Better recommendations can b

  18. Is Trust in Banks in Slovenia Put to the Test?

    Directory of Open Access Journals (Sweden)

    Taškar Beloglavec Sabina

    2015-06-01

    Full Text Available The question of the banking system’s stability in connection to trust since the 2008 crisis has been the subject of many debates seeking to find permanent solutions to banking system problems, as the current situation affects bank customers’ behavior. This article examined trust in banks during the financial crisis and offers, via demographic variables, explanations as tow whether or not customers tend to withdraw their deposits during a crisis. The results contribute to banks’ decision-making regarding deposits management and understanding customers’ behavior, especially during a crisis. The results show a negative relationship between trust and deposit withdrawal intention, where gender and education level play an important role.

  19. The SMAP Dictionary Management System

    Science.gov (United States)

    Smith, Kevin A.; Swan, Christoper A.

    2014-01-01

    The Soil Moisture Active Passive (SMAP) Dictionary Management System is a web-based tool to develop and store a mission dictionary. A mission dictionary defines the interface between a ground system and a spacecraft. In recent years, mission dictionaries have grown in size and scope, making it difficult for engineers across multiple disciplines to coordinate the dictionary development effort. The Dictionary Management Systemaddresses these issues by placing all dictionary information in one place, taking advantage of the efficiencies inherent in co-locating what were once disparate dictionary development efforts.

  20. Operating Security System Support for Run-Time Security with a Trusted Execution Environment

    DEFF Research Database (Denmark)

    Gonzalez, Javier

    , it is safe to assume that any complex software is compromised. The problem is then to monitor and contain it when it executes in order to protect sensitive data and other sensitive assets. To really have an impact, any solution to this problem should be integrated in commodity operating systems...... in the Linux operating system. We are in the process of making this driver part of the mainline Linux kernel.......Software services have become an integral part of our daily life. Cyber-attacks have thus become a problem of increasing importance not only for the IT industry, but for society at large. A way to contain cyber-attacks is to guarantee the integrity of IT systems at run-time. Put differently...

  1. Increasing Trust in Banking and Developing Insurance System for Bank Deposits in Russia

    Directory of Open Access Journals (Sweden)

    Igor V. Dmitriev

    2014-01-01

    Full Text Available In this article the topical issues connected with changes are considered, occurring in the banking sector of Russia, the number of the operating credit organizations caused by essential reduction, intensive revocation of licenses on bank activity at the credit organizations Bank of Russia. According to the author, in this regard there is a number of the problems connected with sufficiency of a network of the operating credit organizations of requirement of ensuring economic growth, formation of the healthy competitive environment, sufficiency of Fund of insurance of deposits for providing guarantees to investors in case of bankruptcy of banks. In article, recent trends of insurance of deposits in the countries of EEC and the USA are considered. Taking into account the revealed tendencies problems of functioning of system of insurance of deposits of citizens in the Russian commercial banks are analyzed. To number of such problems are carried: insufficient volume of an insurance covering; concentration of deposits mainly in the large banks which are on the one hand, carriers of system risk, with another, - in which capitals participates the state, having thus subsidiary responsibility; limited set of functions of Agency and some other. Taking into account the carried-out analysis and an assessment of operating system of insurance of deposits it is offered: to develop the mechanism of overcoming of "moral" risk; increase of financial literacy of the population, in view of activity of some banks on advance in a segment of private investors of the products which aren't covered by system of guaranteeing; to define introduction of the mechanism of differentiation of contributions to the ASV insurance Fund depending on degree of riskiness of activity of participating bank of system, system modernization risk - the focused supervision as bases of stable functioning of the banking sector and its hotel institutes.

  2. The Impact of Trust on Job Performance in Organisations

    Directory of Open Access Journals (Sweden)

    Ana Nešić

    2016-04-01

    Full Text Available In circumstances governed by consistent change in all aspects of business, trust represents a significant factor in the behavioural patterns of organisations. Of great importance for a successful communication in organisations is understanding the levels of trust among staff, employees and their management, and trust in the organisation itself. Trust is a cohesive and motivating factor in work groups. Also, based on trust are identification and commitment to the organisation, as well as the relationships of employees. In successful organisations special attention is given to the problems of trust and mistrust. This work considers different theoretical concepts of how trust is created and maintained in organisations, different dimensions of organisational trust, as well as the effects of trust in organisational performance.

  3. Trust arguments

    International Nuclear Information System (INIS)

    Gelman, S.M.

    1995-01-01

    cycle has a complex of general machine building technologies which permit, if necessary, to organize in a very short period, production of non-traditional articles and avoid limitation of working places. This is well proved by the experience of 'Elemash', where in connection with the decrease of demand for nuclear fuel after the accident in Chernobyl, different products are now produced, equipment for dairy industry, tubular, heating elements, hard-alloy tooling for metal cutting and mining industries, a variety of domestic appliances. This peculiar 'conversion' permitted not only preserve the staff but provide employment of youth. We concentrate our attention on one more social side of activity of our enterprise, more of a few in the town having stable interior and exterior market for its products; this is very important in the period of newly-born market economy in Russia. Annual turnover of 'Elemash', only for export of nuclear fuel, is more tan 200 million dollars. It is natural that the majority of this sum comes as taxes to the municipal budget, where it is used for developing social infrastructure of the town (culture, port, health protection education, i.e. for the welfare of the population). Evaluating te general reaction of the population and public, which was discovered as a result of communicating in the Centre with thousands of inhabitants of the town we can state that it is quite favourable and our task is to strengthen the trust to the enterprise in the future. (author)

  4. How Academic Health Systems Can Achieve Population Health in Vulnerable Populations Through Value-Based Care: The Critical Importance of Establishing Trusted Agency.

    Science.gov (United States)

    Wesson, Donald E; Kitzman, Heather E

    2018-01-16

    Improving population health may require health systems to proactively engage patient populations as partners in the implementation of healthy behaviors as a shared value using strategies that incentivize healthy outcomes for the population as a whole. The current reactive health care model, which focuses on restoring the health of individuals after it has been lost, will not achieve the goal of improved population health. To achieve this goal, health systems must proactively engage in partnerships with the populations they serve. Health systems will need the help of community entities and individuals who have the trust of the population being served to act on behalf of the health system if they are to achieve this effective working partnership. The need for these trusted agents is particularly pertinent for vulnerable and historically underserved segments of the population. In this Invited Commentary, the authors discuss ways by which health systems might identify, engage, and leverage trusted agents to improve the health of the population through value-based care.

  5. Effective Trust-Aware E-learning Recommender System Based on Learning Styles and Knowledge Levels

    Science.gov (United States)

    Dwivedi, Pragya; Bharadwaj, Kamal K.

    2013-01-01

    In the age of information explosion, e-learning recommender systems (ELRSs) have emerged as the most essential tool to deliver personalized learning resources to learners. Due to enormous amount of information on the web, learner faces problem in searching right information. ELRSs deal with the problem of information overload effectively and…

  6. Integrated therapy safety management system.

    Science.gov (United States)

    Podtschaske, Beatrice; Fuchs, Daniela; Friesdorf, Wolfgang

    2013-09-01

    The aim is to demonstrate the benefit of the medico-ergonomic approach for the redesign of clinical work systems. Based on the six layer model, a concept for an 'integrated therapy safety management' is drafted. This concept could serve as a basis to improve resilience. The concept is developed through a concept-based approach. The state of the art of safety and complexity research in human factors and ergonomics forms the basis. The findings are synthesized to a concept for 'integrated therapy safety management'. The concept is applied by way of example for the 'medication process' to demonstrate its practical implementation. The 'integrated therapy safety management' is drafted in accordance with the six layer model. This model supports a detailed description of specific work tasks, the corresponding responsibilities and related workflows at different layers by using the concept of 'bridge managers'. 'Bridge managers' anticipate potential errors and monitor the controlled system continuously. If disruptions or disturbances occur, they respond with corrective actions which ensure that no harm results and they initiate preventive measures for future procedures. The concept demonstrates that in a complex work system, the human factor is the key element and final authority to cope with the residual complexity. The expertise of the 'bridge managers' and the recursive hierarchical structure results in highly adaptive clinical work systems and increases their resilience. The medico-ergonomic approach is a highly promising way of coping with two complexities. It offers a systematic framework for comprehensive analyses of clinical work systems and promotes interdisciplinary collaboration. © 2013 The Authors. British Journal of Clinical Pharmacology © 2013 The British Pharmacological Society.

  7. Looking for Trust

    DEFF Research Database (Denmark)

    Bøge, Ask Risom; Lauritsen, Peter

    Trust and surveillance are often seen as opposites. Trust is regularly characterized as the glue that holds society together, while surveillance is seen as corrosive. However, in Scandinavia high levels of trust and surveillance coexist. It is therefore interesting to investigate...... if there is a connection between these phenomena and ask what is the role of trust in the spread of surveillance in Scandinavia? The aim of this paper is: 1) to investigate the role of trust in the history of the Danish DNA database and 2) to experiment with Actor-Network-Theory (ANT) as an ap-proach in studies of trust....

  8. I-15 integrated corridor management system : project management plan.

    Science.gov (United States)

    2011-06-01

    The Project Management Plan (PMP) assists the San Diego ICM Team by defining a procedural framework for : management and control of the I-15 Integrated Corridor Management Demonstration Project, and development and : deployment of the ICM System. The...

  9. An Efficient and Effective Implementation of the Trust System for Power Grid Compartmentalization

    Science.gov (United States)

    2009-06-01

    I am also very thankful to student interns James Haught for providing his expertise in writing the optimizer code and Alex Stirling for helping in...is particularly damaging to electric motors [32]. • Blackout. This is the most severe malfunction, which refer to the total loss of power to an area... motors , pumps, valves, switches, sensors, etc. 2.6 Time Constraints The response time thresholds under which SCADA systems normally operate are usually

  10. Using Reputation Based Trust to Overcome Malfunctions and Malicious Failures in Electric Power Protection Systems

    Science.gov (United States)

    2011-09-01

    60] in the 1990s followed by the IEC 61850 standard [61] and more recently, the Wide Area Measurement System [62], NASPI [63], and the general push...using the IEC 61850 : a case for meta-modelling," Computer Standards & Interfaces, vol. 27, pp. 679-695, 2005. [62] B. Naduvathuparambil, M. C. Valenti...International Conference on Information Warfare and Security IEC International Electrotechnical Commission IED Intelligent Electronic Device IEEE Institute

  11. Trust Ownership of the Tata Group

    DEFF Research Database (Denmark)

    Thomsen, Steen

    : the main holding company Tata Sons Limited is majority-owned by charitable trusts. We examine the governance of this remarkable entity. The Trusts own 66% of Tata Sons, the main holding company of the Group, while members of the founding Tata family are very small minority shareholders. The governance...... structure is characterized by managerial distance between trusts and Group companies. The Trusts are almost exclusively concerned with philanthropy, and according to the Articles of Association of Tata Sons Limited, their governance role is limited to nominating two members to the Selection Committee which...... recommends the Chairman of the company’s Board of Directors. Group companies are independently managed, but there are significant cross shareholdings and a member of the founding family, Mr Ratan Tata, chairs the Trusts, holding companies and major subsidiaries. Mr. Cyrus P Mistry, Managing Director...

  12. Knowledge management: processes and systems | Igbinovia ...

    African Journals Online (AJOL)

    Knowledge management: processes and systems. ... Information Impact: Journal of Information and Knowledge Management ... observation, role reversal technique, and discussion forums as well as the forms of knowledge representation to include report writing, database management system and institutional repositories.

  13. Thermal management systems and methods

    Science.gov (United States)

    Gering, Kevin L.; Haefner, Daryl R.

    2006-12-12

    A thermal management system for a vehicle includes a heat exchanger having a thermal energy storage material provided therein, a first coolant loop thermally coupled to an electrochemical storage device located within the first coolant loop and to the heat exchanger, and a second coolant loop thermally coupled to the heat exchanger. The first and second coolant loops are configured to carry distinct thermal energy transfer media. The thermal management system also includes an interface configured to facilitate transfer of heat generated by an internal combustion engine to the heat exchanger via the second coolant loop in order to selectively deliver the heat to the electrochemical storage device. Thermal management methods are also provided.

  14. An Integrated Knowledge Management System

    Directory of Open Access Journals (Sweden)

    Vasile Mazilescu

    2014-11-01

    Full Text Available The aim of this paper is to present a Knowledge Management System based on Fuzzy Logic (FLKMS, a real-time expert system to meet the challenges of the dynamic environment. The main feature of our integrated shell FLKMS is that it models and integrates the temporal relationships between the dynamic of the evolution of an economic process with some fuzzy inferential methods, using a knowledge model for control, embedded within the expert system’s operational knowledge base.

  15. Information system revives materials management

    International Nuclear Information System (INIS)

    Hansen, T.

    1995-01-01

    Through a change in philosophy and the development of a new, more efficient information management system, Arizona Public Service Co. (APSW) has, in less than two years, reduced material and service costs by 10 percent. The utility plans to cut these costs form 1993 figures by 25 percent before 2000. The utility is breaking new ground with ongoing implementation of new business processes and the new Materials Logistics Information System (MLIS), which has been co-developed with Texas Instruments Software Division (TISD)

  16. Systems approach in energy management

    International Nuclear Information System (INIS)

    Dutta-Choudhury, K.

    1993-01-01

    Several years ago when the author was working in the chemicals division of a paper company in Instrumentation and Controls, one experience had a lasting impact on his work approach which is systems approach. The maintenance manager told the author that a very important piece of boiler instrument of the power plant had broken down and delivery of the replacement needed to be expedited. The instrument was ordered over the phone in another city. The purchase order was personally delivered at the supplier's office and arrangements were made so the instrument was put on the next flight. A week later the maintenance manager indicated that the particular instrument still had not arrived in the plant and he could not run the power plant. Thus the company incurred substantial losses. Further inquiries showed that the instrument did indeed arrive at the plant stores on time. But, in the absence of any instructions thereon, the instrument was not delivered to the power plant. The sense of urgency was lost in the existing delivery process. In other words, the process or system failed. The whole process from requisitioning to delivery of ordered items was analyzed and corrective procedures were incorporated to prevent future repetitions. This brings up the subject of systems approach in engineering management in general and energy management in particular. This involves defining an objective and designing a system for an effective way of getting there

  17. Grenada Education Management Information System

    OpenAIRE

    Porta, Emilio; Klein, Jennifer; Arcia, Gustavo; Nannyonjo, Harriet

    2012-01-01

    The Education Management Information System (EMIS) country report for Grenada includes the following headings: background which includes education data in Grenada, EMIS staff, facilities and equipment, EMIS data, and publications; prerequisites of quality; assurances of integrity; methodological soundness; accuracy and reliability; serviceability; and accessibility.

  18. Trust, but verify - Accuracy of clinical commercial radiation Treatment Planning Systems

    Science.gov (United States)

    Lehmann, J.; Kenny, J.; Lye, J.; Dunn, L.; Williams, I.

    2014-03-01

    Computer based Treatment Planning Systems (TPS) are used worldwide to design and calculate treatment plans for treating radiation therapy patients. TPS are generally well designed and thoroughly tested by their developers and local physicists prior to clinical use. However, the wide-reaching impact of their accuracy warrants ongoing vigilance. This work reviews the findings of the Australian national audit system and provides recommendations for checks of TPS. The Australian Clinical Dosimetry Service (ACDS) has designed and implemented a national system of audits, currently in a three year test phase. The Level III audits verify the accuracy of a beam model of a facility's TPS through a comparison of measurements with calculation at selected points in an anthropomorphic phantom. The plans are prescribed by the ACDS and all measurement equipment is brought in for independent onsite measurements. In this first version of audits, plans are comparatively simple, involving asymmetric fields, wedges and inhomogeneities. The ACDS has performed 14 Level III audits to-date. Six audits returned at least one measurement at Action Level, indicating that the measured dose differed more than 3.3% (but less than 5%) from the planned dose. Two audits failed (difference >5%). One fail was caused by a data transmission error coupled with quality assurance (QA) not being performed. The second fail was investigated and reduced to Action Level with the onsite audit team finding phantom setup at treatment a contributing factor. The Action Level results are attributed to small dose calculation deviations within the TPS, which are investigated and corrected by the facilities. Small deviations exist in clinical TPS which can add up and can combine with output variations to result in unacceptable variations. Ongoing checks and independent audits are recommended.

  19. Trust, but verify – accuracy of clinical commercial radiation treatment planning systems

    International Nuclear Information System (INIS)

    Lehmann, J; Kenny, J; Lye, J; Dunn, L; Williams, I

    2014-01-01

    Computer based Treatment Planning Systems (TPS) are used worldwide to design and calculate treatment plans for treating radiation therapy patients. TPS are generally well designed and thoroughly tested by their developers and local physicists prior to clinical use. However, the wide-reaching impact of their accuracy warrants ongoing vigilance. This work reviews the findings of the Australian national audit system and provides recommendations for checks of TPS. The Australian Clinical Dosimetry Service (ACDS) has designed and implemented a national system of audits, currently in a three year test phase. The Level III audits verify the accuracy of a beam model of a facility's TPS through a comparison of measurements with calculation at selected points in an anthropomorphic phantom. The plans are prescribed by the ACDS and all measurement equipment is brought in for independent onsite measurements. In this first version of audits, plans are comparatively simple, involving asymmetric fields, wedges and inhomogeneities. The ACDS has performed 14 Level III audits to-date. Six audits returned at least one measurement at Action Level, indicating that the measured dose differed more than 3.3% (but less than 5%) from the planned dose. Two audits failed (difference >5%). One fail was caused by a data transmission error coupled with quality assurance (QA) not being performed. The second fail was investigated and reduced to Action Level with the onsite audit team finding phantom setup at treatment a contributing factor. The Action Level results are attributed to small dose calculation deviations within the TPS, which are investigated and corrected by the facilities. Small deviations exist in clinical TPS which can add up and can combine with output variations to result in unacceptable variations. Ongoing checks and independent audits are recommended.

  20. Security ManagementSystems Approach

    Directory of Open Access Journals (Sweden)

    Milan Kný

    2015-12-01

    Full Text Available The aim of the contribution is the use of the systems approach to treat security management as a practical field and new scientific discipline. The philosophy of systems approach to the solution of problems generally is an adequate methodological basis even for the theory of management. The path to the real optimization of security situation leads only through the holistic and solid solution. Applications of systems analysis and synthesis back up the fact, that systems approach and systems thinking should not absent in security objects. The truthfulness of the claim, that security management is a well-established discipline, depends on ongoing discussion that represents useful process of development of new scientific discipline. At the same time the rationality of science and systematism works as a counterbalance to irrational fear of the whole society, too. Which questions of security remain open in relation to „our interests“? Current problems of Europe should be solved systematically. It is necessary to define the space of interest (territorially the border of the EU or the Schengen area, to implement the system to the object with respect to the borders of the space, to specify the structure and subjects of decision making and implementation.