DOE Office of Scientific and Technical Information (OSTI.GOV)
Maiden, Wendy M.
Cooperative Infrastructure Defense (CID) is a hierarchical, agent-based, adaptive, cyber-security framework designed to collaboratively protect multiple enclaves or organizations participating in a complex infrastructure. CID employs a swarm of lightweight, mobile agents called Sensors designed to roam hosts throughout a security enclave to find indications of anomalies and report them to host-based Sentinels. The Sensors’ findings become pieces of a larger puzzle, which the Sentinel puts together to determine the problem and respond per policy as given by the enclave-level Sergeant agent. Horizontally across multiple enclaves and vertically within each enclave, authentication and access control technologies are necessary but insufficientmore » authorization mechanisms to ensure that CID agents continue to fulfill their roles in a trustworthy manner. Trust management fills the gap, providing mechanisms to detect malicious agents and offering more robust mechanisms for authorization. This paper identifies the trust relationships throughout the CID hierarchy, the types of trust evidence that could be gathered, and the actions that the CID system could take if an entity is determined to be untrustworthy.« less
32 CFR 32.37 - Property trust relationship.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 1 2011-07-01 2011-07-01 false Property trust relationship. 32.37 Section 32.37 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DoD GRANT AND AGREEMENT... trust relationship. Real property, equipment, intangible property and debt instruments that are acquired...
Code of Federal Regulations, 2010 CFR
2010-07-01
... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Will the Presidio Trust's....20 Will the Presidio Trust's failure to comply with these regulations be a defense to a debt? No, the... procedures of the Presidio Trust will not be available to any debtor as a defense. ...
Department of Defense International Space Cooperation Strategy
2017-01-01
Secretary of Defense on .January 18. 2017. the unclassified version provides DoD’s approach for invigorating cooperation and collaboration with trusted ...Cooperation Strategy (ISCS) establishes DoD’ s approach for invigorating cooperation and collaboration with trusted allies and partners across the...collaborating with trusted allies and partners to address shared security challenges by leveraging allies’ and partners ’ capabilities to enhance space mission
United States Department of Defense Agency Financial Report for Fiscal Year 2013. Financial Section
2013-01-01
capacity for operating landfills and life expectancy in years for all other assets. The Department expenses the full cost to clean up contamination for...construction, and rehabilitation projects on inland waterways. The BFS manages and invests for the Trust Fund. Defense Commissary Agency Surcharge Trust
Smilanich, Angela M; Fincher, R Malia; Dyer, Lee A
2016-05-01
According to the plant-apparency hypothesis, apparent plants allocate resources to quantitative defenses that negatively affect generalist and specialist herbivores, while unapparent plants invest more in qualitative defenses that negatively affect nonadapted generalists. Although this hypothesis has provided a useful framework for understanding the evolution of plant chemical defense, there are many inconsistencies surrounding associated predictions, and it has been heavily criticized and deemed obsolete. We used a hierarchical Bayesian meta-analysis model to test whether defenses from apparent and unapparent plants differ in their effects on herbivores. We collected a total of 225 effect sizes from 158 published papers in which the effects of plant chemistry on herbivore performance were reported. As predicted by the plant-apparency hypothesis, we found a prevalence of quantitative defenses in woody plants and qualitative defenses in herbaceous plants. However, the detrimental impacts of qualitative defenses were more effective against specialists than generalists, and the effects of chemical defenses did not significantly differ between specialists and generalists for woody or herbaceous plants. A striking pattern that emerged from our data was a pervasiveness of beneficial effects of secondary metabolites on herbivore performance, especially generalists. This pattern provides evidence that herbivores are evolving effective counteradaptations to putative plant defenses. © 2016 The Authors. New Phytologist © 2016 New Phytologist Trust.
32 CFR 32.37 - Property trust relationship.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 1 2010-07-01 2010-07-01 false Property trust relationship. 32.37 Section 32.37... trust relationship. Real property, equipment, intangible property and debt instruments that are acquired or improved with Federal funds shall be held in trust by the recipient as trustee for the...
Supplier behaviour and public contracting in the English agency nursing market.
Lonsdale, Chris; Kirkpatrick, Ian; Hoque, Kim; de Ruyter, Alex
2010-01-01
The worldwide expansion in the use of private firms to deliver public services and infrastructure has promoted a substantial literature on public sector contract and relationship management. This literature is currently dominated by the notion that supplier relationships should be based upon trust. Less prominent are more sceptical approaches that emphasize the need to assiduously manage potential supplier exploitation and opportunism. This article addresses this imbalance by focusing upon the recent experience of the English National Health Service (NHS) in its dealings with its nursing agencies. Between 1997 and 2001, the NHS was subjected to considerable exploitation and opportunism. This forced managers to adopt a supply strategy based upon an assiduous use of e-auctions, framework agreements and quality audits. The article assesses the effectiveness of this strategy and reflects upon whether a more defensive approach to contract and relationship management offers a viable alternative to one based upon trust.
32 CFR 644.542 - Application of anti-trust laws.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 4 2010-07-01 2010-07-01 true Application of anti-trust laws. 644.542 Section... PROPERTY REAL ESTATE HANDBOOK Disposal Sale Procedure § 644.542 Application of anti-trust laws. The Federal... tend to create or maintain a situation inconsistent with the anti-trust laws. Prior to obligating the...
The Effects of Vocational High School Teachers' Perceived Trust on Organizational Silence
ERIC Educational Resources Information Center
Saglam, Aycan Çiçek
2016-01-01
The objective of this research is to reveal the effects of vocational school teachers' perceived organizational trust on organizational silence. For this purpose, at first teachers' perception on sub-dimensions of organizational silence and organizational trust, which are respectively "acquiescent silence," "defensive silence,"…
32 CFR 761.13 - Ships: Individual authorizations.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 5 2010-07-01 2010-07-01 false Ships: Individual authorizations. 761.13 Section 761.13 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY ISLANDS UNDER NAVY JURISDICTION NAVAL DEFENSIVE SEA AREAS; NAVAL AIRSPACE RESERVATIONS, AREAS UNDER NAVY ADMINISTRATION, AND THE TRUST TERRITORY OF THE PACIFIC ISLANDS...
TrustBuilder2: A Reconfigurable Framework for Trust Negotiation
NASA Astrophysics Data System (ADS)
Lee, Adam J.; Winslett, Marianne; Perano, Kenneth J.
To date, research in trust negotiation has focused mainly on the theoretical aspects of the trust negotiation process, and the development of proof of concept implementations. These theoretical works and proofs of concept have been quite successful from a research perspective, and thus researchers must now begin to address the systems constraints that act as barriers to the deployment of these systems. To this end, we present TrustBuilder2, a fully-configurable and extensible framework for prototyping and evaluating trust negotiation systems. TrustBuilder2 leverages a plug-in based architecture, extensible data type hierarchy, and flexible communication protocol to provide a framework within which numerous trust negotiation protocols and system configurations can be quantitatively analyzed. In this paper, we discuss the design and implementation of TrustBuilder2, study its performance, examine the costs associated with flexible authorization systems, and leverage this knowledge to identify potential topics for future research, as well as a novel method for attacking trust negotiation systems.
The Role of the National Defense Stockpile in the Supply of Strategic and Critical Materials
2008-05-09
Insurance Trust Fund and the Federal Supplementary Medical Trust Fund.53 12 Analysis of NDS Operations and Alternatives The current method of determining...requirements are based upon analysis of military, industrial, and essential civilian materials needs in light of conflict scenarios found in the National...Defense Strategy. The bulk of this analysis is done utilizing computer modeling. First, the model projects the needs for finished products and services
Trust and distrust between patient and doctor.
Hawley, Katherine
2015-10-01
To trust someone is to have expectations of their behaviour; distrust often involves disappointed expectations. But healthy trust and distrust require a good understanding of which expectations are reasonable, and which are not. In this paper, I discuss the limits of trustworthiness by drawing on recent studies of trust in the context of defensive medicine, biobanking and cardiopulmonary resuscitation decisions. © 2015 John Wiley & Sons, Ltd.
32 CFR 761.12 - Ships: Group authorizations.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 5 2010-07-01 2010-07-01 false Ships: Group authorizations. 761.12 Section 761.12 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY ISLANDS UNDER NAVY JURISDICTION NAVAL DEFENSIVE SEA AREAS; NAVAL AIRSPACE RESERVATIONS, AREAS UNDER NAVY ADMINISTRATION, AND THE TRUST TERRITORY OF THE PACIFIC ISLANDS Entr...
32 CFR 761.14 - Aircraft: Group authorizations.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 5 2014-07-01 2014-07-01 false Aircraft: Group authorizations. 761.14 Section 761.14 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY ISLANDS UNDER NAVY... TRUST TERRITORY OF THE PACIFIC ISLANDS Entry Authorization § 761.14 Aircraft: Group authorizations...
32 CFR 761.14 - Aircraft: Group authorizations.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 5 2012-07-01 2012-07-01 false Aircraft: Group authorizations. 761.14 Section 761.14 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY ISLANDS UNDER NAVY... TRUST TERRITORY OF THE PACIFIC ISLANDS Entry Authorization § 761.14 Aircraft: Group authorizations...
32 CFR 761.10 - Persons: Group authorizations.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 5 2013-07-01 2013-07-01 false Persons: Group authorizations. 761.10 Section 761.10 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY ISLANDS UNDER NAVY... TRUST TERRITORY OF THE PACIFIC ISLANDS Entry Authorization § 761.10 Persons: Group authorizations...
32 CFR 761.14 - Aircraft: Group authorizations.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 5 2013-07-01 2013-07-01 false Aircraft: Group authorizations. 761.14 Section 761.14 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY ISLANDS UNDER NAVY... TRUST TERRITORY OF THE PACIFIC ISLANDS Entry Authorization § 761.14 Aircraft: Group authorizations...
32 CFR 761.14 - Aircraft: Group authorizations.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 5 2011-07-01 2011-07-01 false Aircraft: Group authorizations. 761.14 Section 761.14 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY ISLANDS UNDER NAVY... TRUST TERRITORY OF THE PACIFIC ISLANDS Entry Authorization § 761.14 Aircraft: Group authorizations...
32 CFR 761.10 - Persons: Group authorizations.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 5 2012-07-01 2012-07-01 false Persons: Group authorizations. 761.10 Section 761.10 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY ISLANDS UNDER NAVY... TRUST TERRITORY OF THE PACIFIC ISLANDS Entry Authorization § 761.10 Persons: Group authorizations...
32 CFR 761.10 - Persons: Group authorizations.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 5 2014-07-01 2014-07-01 false Persons: Group authorizations. 761.10 Section 761.10 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY ISLANDS UNDER NAVY... TRUST TERRITORY OF THE PACIFIC ISLANDS Entry Authorization § 761.10 Persons: Group authorizations...
32 CFR 761.14 - Aircraft: Group authorizations.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 5 2010-07-01 2010-07-01 false Aircraft: Group authorizations. 761.14 Section 761.14 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY ISLANDS UNDER NAVY... TRUST TERRITORY OF THE PACIFIC ISLANDS Entry Authorization § 761.14 Aircraft: Group authorizations...
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 2 2010-07-01 2010-07-01 false Policy. 290.4 Section 290.4 National Defense... PROGRAM DEFENSE CONTRACT AUDIT AGENCY (DCAA) FREEDOM OF INFORMATION ACT PROGRAM § 290.4 Policy. Agency policy and procedures are those cited in DoD 5400.7-R. In addition, DCAA will: (a) Promote public trust...
Short-Term Group Treatment for Survivors of Sexual Abuse: A Psychoeducational Approach.
ERIC Educational Resources Information Center
Thompson, Nikki; Renninger, Salina
1995-01-01
Counseling survivors of sexual abuse requires acknowledgment of the legitimacy of the client's ego defenses while helping the client abandon those defenses which have become obstacles to leading a fulfilling life. Such defenses may also impede the therapeutic process, as survivors are less likely to trust other people. Clients can arrive at a…
ASIC/FPGA Trust Assessment Framework
NASA Technical Reports Server (NTRS)
Berg, Melanie
2018-01-01
NASA Electronic Parts and Packaging (NEPP) is developing a process to be employed in critical applications. The framework assesses levels of Trust and assurance in microelectronic systems. The process is being created with participation from a variety of organizations. We present a synopsis of the framework that includes contributions from The Aerospace Corporation.
32 CFR 651.36 - Public involvement.
Code of Federal Regulations, 2010 CFR
2010-07-01
... to open decision-making and builds the necessary community trust that sustains the Army in the long... National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) ENVIRONMENTAL QUALITY... information on public involvement requirements). (b) Environmental agencies and the public will be involved to...
Code of Federal Regulations, 2013 CFR
2013-07-01
... medium of exchange in U.S. military establishments located in overseas areas when such areas are... Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY CLAIMS AND ACCOUNTS MILITARY PAYMENT...) Travelers' checks issued by the American Express Company; Bank of America, National Trust and Savings...
Code of Federal Regulations, 2014 CFR
2014-07-01
... medium of exchange in U.S. military establishments located in overseas areas when such areas are... Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY CLAIMS AND ACCOUNTS MILITARY PAYMENT...) Travelers' checks issued by the American Express Company; Bank of America, National Trust and Savings...
DualTrust: A Distributed Trust Model for Swarm-Based Autonomic Computing Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Maiden, Wendy M.; Dionysiou, Ioanna; Frincke, Deborah A.
2011-02-01
For autonomic computing systems that utilize mobile agents and ant colony algorithms for their sensor layer, trust management is important for the acceptance of the mobile agent sensors and to protect the system from malicious behavior by insiders and entities that have penetrated network defenses. This paper examines the trust relationships, evidence, and decisions in a representative system and finds that by monitoring the trustworthiness of the autonomic managers rather than the swarming sensors, the trust management problem becomes much more scalable and still serves to protect the swarm. We then propose the DualTrust conceptual trust model. By addressing themore » autonomic manager’s bi-directional primary relationships in the ACS architecture, DualTrust is able to monitor the trustworthiness of the autonomic managers, protect the sensor swarm in a scalable manner, and provide global trust awareness for the orchestrating autonomic manager.« less
Vega, Laurian C.; Montague, Enid; DeHart, Tom
2012-01-01
With the exploding growth of the web, health websites have become a dominant force in the realm of health care. Technically savvy patients have been using the web not only to self inform but to self diagnose. In this paper we examine the trust relationship between humans and health websites by outlining the existing literature on trust in health websites. A total of forty-nine papers were examined using a meta-analytical framework. Using this framework, each paper was coded for the antecedents and facets that comprise user trust in health websites. Our findings show that there is little consensus regarding the defining characteristics of the construct of trust in health websites. Further research in this field should focus on collaboratively defining trust and what factors affect trust in health web sites. PMID:22288026
Vega, Laurian C; Montague, Enid; Dehart, Tom
2011-11-18
With the exploding growth of the web, health websites have become a dominant force in the realm of health care. Technically savvy patients have been using the web not only to self inform but to self diagnose. In this paper we examine the trust relationship between humans and health websites by outlining the existing literature on trust in health websites. A total of forty-nine papers were examined using a meta-analytical framework. Using this framework, each paper was coded for the antecedents and facets that comprise user trust in health websites. Our findings show that there is little consensus regarding the defining characteristics of the construct of trust in health websites. Further research in this field should focus on collaboratively defining trust and what factors affect trust in health web sites.
Dynamic Trust Management (DTM)
2009-11-04
as the DoD/IC GIG, Navy FORCEnet and Clouds – The ability to define policies for scalable decentralized defense against emergent cyber-threats by... the service you wanted 6. (B) uses (S) Reputation DB 2. How has (B) behaved in the past? (S->B) - Pos: 9 Neg: 1 (S->A) - Pos: 5 Neg: 0 (A->B) - Pos...to create a novel method for trust evaluation The QuanTM Architecture Trust Dependency Graph (TDG), encoding PTM relationships useful for RTM
A Novel Trust Service Provider for Internet Based Commerce Applications.
ERIC Educational Resources Information Center
Siyal, M. Y.; Barkat, B.
2002-01-01
Presents a framework for enhancing trust in Internet commerce. Shows how trust can be provided through a network of Trust Service Providers (TSp). Identifies a set of services that should be offered by a TSp. Presents a distributed object-oriented implementation of trust services using CORBA, JAVA and XML. (Author/AEF)
32 CFR 761.13 - Ships: Individual authorizations.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 5 2011-07-01 2011-07-01 false Ships: Individual authorizations. 761.13 Section... TRUST TERRITORY OF THE PACIFIC ISLANDS Entry Authorization § 761.13 Ships: Individual authorizations. (a) Applications; form; filing. Applications for authorization to navigate ships within the limits of defense areas...
Public trust in vaccination: an analytical framework.
Gopichandran, Vijayaprasad
2017-01-01
While vaccination is one of the most successful public health interventions, there has always been a parallel movement against vaccines. Apart from scientific factors, the uptake of vaccinations is influenced by historical, political, sociocultural and economic factors. In India, the health system is struggling with logistical weaknesses in taking vaccination to the remotest corners; while on the other hand, some people in places where vaccination is available resist it. Unwillingness to be vaccinated is a growing problem in the developed world. This trend is gradually emerging in several parts of India as well. Other factors, such as heightened awareness of the profit motives of the vaccine industry, conflicts of interest among policy-makers, and social, cultural and religious considerations have eroded the people's trust in vaccination. This paper develops an analytical framework to assess trust in vaccination. The framework considers trust in vaccination from four perspectives - trust in the health system, the vaccine policy, vaccination providers and specific vaccines. The framework considers specific issues involved in vaccination trust, including the increasing scepticism towards medical technology, perceptions of conflicts of interest in the vaccine policy, and of lack of transparency and openness, the presence of strong alternative schools of thought, influence of the social media. The paper will conclude by arguing that engaging with communities and having a dialogue about the vaccination policy is an ethical imperative.
Government Microelectronics Assessment for Trust (GOMAT)
NASA Technical Reports Server (NTRS)
Berg, Melanie D.; LaBel, Kenneth A.
2018-01-01
NASA Electronic Parts and Packaging (NEPP) is developing a process to be employed in critical applications. The framework assesses levels of trust and assurance in microelectronic systems. The process is being created with participation from a variety of organizations. We present a synopsis of the framework that includes contributions from The Aerospace Corporation.
[Trust and power--three interrelationships].
Grimen, H
2001-12-10
Trust is not always an idyllic phenomenon; it may also serve as a context in which power is exercised. Reflecting on power in relation to trust gives us a richer theoretical framework for analysing the social conditions for establishing, maintaining and eroding relations of trust. This article proposes three interrelationships between trust and power: power may create trust; unequal distribution of power may affect the conditions for establishing and maintaining relations of trust; the internal structure of interest and control is identical in some types of trust relations and some types of power relations.
BIOS Security Analysis and a Kind of Trusted BIOS
NASA Astrophysics Data System (ADS)
Zhou, Zhenliu; Xu, Rongsheng
The BIOS's security threats to computer system are analyzed and security requirements for firmware BIOS are summarized in this paper. Through discussion about TCG's trust transitivity, a new approach about CRTM implementation based on BIOS is developed. In this paper, we also put forward a new trusted BIOS architecture-UTBIOS which is built on Intel Framework for EFI/UEFI. The trustworthiness of UTBIOS is based on trusted hardware TPM. In UTBIOS, trust encapsulation and trust measurement are used to construct pre-OS trust chain. Performance of trust measurement is also analyzed in the end.
ComTrustO: Composite Trust-Based Ontology Framework for Information and Decision Fusion
2015-07-06
based definitions and models of trust have been studied in various domains [39]. Jules et al. [27] propose an intelligent and dynamic Service Level...Cognitive and affective trust in service relationships. Journal of Business Research, 58:500–507, 2005. [27] O. Jules , A. Hafid, and M.A. Serhani
Redefining genomic privacy: trust and empowerment.
Erlich, Yaniv; Williams, James B; Glazer, David; Yocum, Kenneth; Farahany, Nita; Olson, Maynard; Narayanan, Arvind; Stein, Lincoln D; Witkowski, Jan A; Kain, Robert C
2014-11-01
Fulfilling the promise of the genetic revolution requires the analysis of large datasets containing information from thousands to millions of participants. However, sharing human genomic data requires protecting subjects from potential harm. Current models rely on de-identification techniques in which privacy versus data utility becomes a zero-sum game. Instead, we propose the use of trust-enabling techniques to create a solution in which researchers and participants both win. To do so we introduce three principles that facilitate trust in genetic research and outline one possible framework built upon those principles. Our hope is that such trust-centric frameworks provide a sustainable solution that reconciles genetic privacy with data sharing and facilitates genetic research.
Redefining Genomic Privacy: Trust and Empowerment
Erlich, Yaniv; Williams, James B.; Glazer, David; Yocum, Kenneth; Farahany, Nita; Olson, Maynard; Narayanan, Arvind; Stein, Lincoln D.; Witkowski, Jan A.; Kain, Robert C.
2014-01-01
Fulfilling the promise of the genetic revolution requires the analysis of large datasets containing information from thousands to millions of participants. However, sharing human genomic data requires protecting subjects from potential harm. Current models rely on de-identification techniques in which privacy versus data utility becomes a zero-sum game. Instead, we propose the use of trust-enabling techniques to create a solution in which researchers and participants both win. To do so we introduce three principles that facilitate trust in genetic research and outline one possible framework built upon those principles. Our hope is that such trust-centric frameworks provide a sustainable solution that reconciles genetic privacy with data sharing and facilitates genetic research. PMID:25369215
Veinot, Tiffany C; Campbell, Terrance R; Kruger, Daniel J; Grodzinski, Alison
2013-01-01
We investigated the user requirements of African-American youth (aged 14-24 years) to inform the design of a culturally appropriate, network-based informatics intervention for the prevention of HIV and other sexually transmitted infections (STI). We conducted 10 focus groups with 75 African-American youth from a city with high HIV/STI prevalence. Data analyses involved coding using qualitative content analysis procedures and memo writing. Unexpectedly, the majority of participants' design recommendations concerned trust. Youth expressed distrust towards people and groups, which was amplified within the context of information technology-mediated interactions about HIV/STI. Participants expressed distrust in the reliability of condoms and the accuracy of HIV tests. They questioned the benevolence of many institutions, and some rejected authoritative HIV/STI information. Therefore, reputational information, including rumor, influenced HIV/STI-related decision making. Participants' design requirements also focused on trust-related concerns. Accordingly, we developed a novel trust-centered design framework to guide intervention design. Current approaches to online trust for health informatics do not consider group-level trusting patterns. Yet, trust was the central intervention-relevant issue among African-American youth, suggesting an important focus for culturally informed design. Our design framework incorporates: intervention objectives (eg, network embeddedness, participation); functional specifications (eg, decision support, collective action, credible question and answer services); and interaction design (eg, member control, offline network linkages, optional anonymity). Trust is a critical focus for HIV/STI informatics interventions for young African Americans. Our design framework offers practical, culturally relevant, and systematic guidance to designers to reach this underserved group better.
Sustainable Urban Water and Wastewater Services: The TRUST Approach
The TRUST (Transitions to the Urban Water Services of Tomorrow) Project is a research program funded by the European Union Seventh Framework Programme. The overall objective of TRUST is to help water and wastewater authorities and utilities across Europe to formulate and impleme...
ERIC Educational Resources Information Center
Adler, Terry R.
2005-01-01
The Swift Trust exercise provides instructors with the opportunity to discuss the issues of managing trust and distrust perceptions in a team-based design. Lewicki, McAllister, and Bies's (1998) framework is used to allow students to experience the difficulties of deriving a common set of contract requirements based on team dynamics and…
ERIC Educational Resources Information Center
Deng, Shengli; Lin, Yanqing; Liu, Yong; Chen, Xiaoyu; Li, Hongxiu
2017-01-01
Introduction: Personality and trust have been found to be important precursors of information-sharing behaviour, but little is known about how these factors interact with each other in shaping information-sharing behaviour. By integrating both trust and user personality into a unified research framework, this study examines how trust mediates the…
NASA Astrophysics Data System (ADS)
Chrisjatmiko, K.
2018-01-01
The paper aims to present a comprehensive framework for the influences of green perceived risk, green image, green trust and green satisfaction to green loyalty. The paper also seeks to account explicitly for the differences in green perceived risk, green image, green trust, green satisfaction and green loyalty found among green products customers. Data were obtained from 155 green products customers. Structural equation modeling was used in order to test the proposed hypotheses. The findings show that green image, green trust and green satisfaction has positive effects to green loyalty. But green perceived risk has negative effects to green image, green trust and green satisfaction. However, green perceived risk, green image, green trust and green satisfaction also seems to be a good device to gain green products customers from competitors. The contributions of the paper are, firstly, a more complete framework of the influences of green perceived risk, green image, green trust and green satisfaction to green loyalty analyses simultaneously. Secondly, the study allows a direct comparison of the difference in green perceived risk, green image, green trust, green satisfaction and green loyalty between green products customers.
Wang, Xin; Wang, Ying; Sun, Hongbin
2016-01-01
In social media, trust and distrust among users are important factors in helping users make decisions, dissect information, and receive recommendations. However, the sparsity and imbalance of social relations bring great difficulties and challenges in predicting trust and distrust. Meanwhile, there are numerous inducing factors to determine trust and distrust relations. The relationship among inducing factors may be dependency, independence, and conflicting. Dempster-Shafer theory and neural network are effective and efficient strategies to deal with these difficulties and challenges. In this paper, we study trust and distrust prediction based on the combination of Dempster-Shafer theory and neural network. We firstly analyze the inducing factors about trust and distrust, namely, homophily, status theory, and emotion tendency. Then, we quantify inducing factors of trust and distrust, take these features as evidences, and construct evidence prototype as input nodes of multilayer neural network. Finally, we propose a framework of predicting trust and distrust which uses multilayer neural network to model the implementing process of Dempster-Shafer theory in different hidden layers, aiming to overcome the disadvantage of Dempster-Shafer theory without optimization method. Experimental results on a real-world dataset demonstrate the effectiveness of the proposed framework. PMID:27034651
48 CFR 239.7300 - Scope of subpart.
Code of Federal Regulations, 2014 CFR
2014-10-01
... OF DEFENSE SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Requirements for... Instruction 5200.44, Protection of Mission Critical Functions to Achieve Trusted Systems and Networks (TSN...
2010 Military Family Life Project (MFLP) - Couples: Tabulations of Responses
2013-08-31
interest income; dividends; child support/alimony; social security, welfare assistance; and net rent, trusts, and royalties from any other investments ...2010 Military Family Life Project: Couples Tabulations of Responses Additional copies of this report may be obtained from: Defense... RESPONSES Defense Manpower Data Center Human Resources Strategic Assessment Program 4800 Mark Center Drive, Suite 04E25-01, Alexandria, VA 22350
The Importance of Trust in Electronic Commerce.
ERIC Educational Resources Information Center
Ratnasingham, Pauline
1998-01-01
Introduces the new concept of trust and how it influences the process of managing the security of an organization operating in an electronic commerce environment. Theoretically, the study aims to develop a framework of trust and security to provide a set of guidelines for secure electronic commerce. (Author/LRW)
Facilitating Trust Engenderment in Secondary School Nurse Interactions with Students
ERIC Educational Resources Information Center
Summach, Anne H. J.
2011-01-01
School nurses are involved in a complex framework of interactions with students, other professionals, parents, and administrators. Trust between nurse and student is critical for interaction effectiveness. The goal of this study was to understand through phenomenology the process of engendering trust in school nurse-high school student…
Veinot, Tiffany C; Campbell, Terrance R; Kruger, Daniel J; Grodzinski, Alison
2013-01-01
Objective We investigated the user requirements of African-American youth (aged 14–24 years) to inform the design of a culturally appropriate, network-based informatics intervention for the prevention of HIV and other sexually transmitted infections (STI). Materials and Methods We conducted 10 focus groups with 75 African-American youth from a city with high HIV/STI prevalence. Data analyses involved coding using qualitative content analysis procedures and memo writing. Results Unexpectedly, the majority of participants’ design recommendations concerned trust. Youth expressed distrust towards people and groups, which was amplified within the context of information technology-mediated interactions about HIV/STI. Participants expressed distrust in the reliability of condoms and the accuracy of HIV tests. They questioned the benevolence of many institutions, and some rejected authoritative HIV/STI information. Therefore, reputational information, including rumor, influenced HIV/STI-related decision making. Participants’ design requirements also focused on trust-related concerns. Accordingly, we developed a novel trust-centered design framework to guide intervention design. Discussion Current approaches to online trust for health informatics do not consider group-level trusting patterns. Yet, trust was the central intervention-relevant issue among African-American youth, suggesting an important focus for culturally informed design. Our design framework incorporates: intervention objectives (eg, network embeddedness, participation); functional specifications (eg, decision support, collective action, credible question and answer services); and interaction design (eg, member control, offline network linkages, optional anonymity). Conclusions Trust is a critical focus for HIV/STI informatics interventions for young African Americans. Our design framework offers practical, culturally relevant, and systematic guidance to designers to reach this underserved group better. PMID:23512830
Building Stakeholder Trust: Defensible Government Decisions - 13110
DOE Office of Scientific and Technical Information (OSTI.GOV)
Franklin, Victor A.
Administrative decisions must be grounded in reasonable expectations, founded on sound principles, and bounded by societal norms. Without these first principles, attaining and retaining public trust is a Herculean task. Decisions made by governmental administrators must be both transparent and defensible: without the former the agency will lose the public's trust and support (possibly prompting a legal challenge to the decision) and without the latter the decision may fail to withstand judicial scrutiny. This presentation and accompanying paper delves into the process by which governmental decisions can achieve both defensibility and openness through building stakeholder trust with transparency. Achieving andmore » maintaining stakeholder trust is crucial, especially in the environs of nuclear waste management. Proving confidence, stability, and security to the surrounding citizenry as well as those throughout the country is the goal of governmental nuclear waste remediation. Guiding administrative decision-making processes and maintaining a broad bandwidth of communication are of incalculable importance to all those charged with serving the public, but are especially essential to those whose decisional impacts will be felt for millennia. A strong, clear, and concise administrative record documenting discrete decisions and overarching policy choices is the strongest defense to a decisional challenge. However, this can be accomplished using transparency as the fundamental building block. This documentation allows the decision-makers to demonstrate the synthesis of legal and technical challenges and fortifies the ground from which challenges will be defended when necessary. Further, administrative actions which capture the public's interest and captivate that interest throughout the process will result in a better-informed, more deeply-involved, and more heavily-invested group of interested parties. Management of information, involvement, and investment on the front-end of the process reaps rewards far more efficiently than attempts to assuage and mitigate the concerns of those parties after the fact and there are a number of tools Savannah River Remediation (SRR) has deployed that render transparency an ally in this context. The makers, applicators, and beneficiaries of policies and decisions will all benefit from strong administrative records which document decisional choices in an open and transparent manner and from timely, up-front management of concerns of interested parties. The strongest defense to decisional challenges is an ability to demonstrate the basis of the decision and the reason(s) that the decision was chosen over other alternatives. Providing a sound basis for defending challenges rather than avoiding or fighting over them allows the deciding entity the greatest opportunity to produce value for its customer. Often, a transparent process that invites public participation and is open for public review and comment will thwart challenge genesis. An entity that has to devote resources to defending its choices obviously cannot utilize those resources to further its mission. (authors)« less
Trusted Defense Microelectronics: Future Access and Capabilities Are Uncertain
2015-10-28
Board Task Force on High Performance Microchip Supply and documentation and discussions with industry and DOD officials in September and October...the defense and microelectronics industry . DOD’s review of this report deemed some of this information as sensitive but unclassified. What GAO...increased specialization and industry consolidation. • Once dominated by domestic sources, the supply chain for microelectronics manufacturing is a global one
1983-01-01
Supervisor’s perceived .82 .86 job performance Communications .68 .68 Teamwork .68 .73 Extrinsic Satisfaction .78 .72 Organizational Commitment .90 .90... Performance , Communications, Teamwork, Extrinsic Satisfaction and Organizational Commitment for the Organization One Sample (n=284) Variables 1 2 3 4 5 6 7 1...correlations 67 Ij TABLE 4 Correlations Among Interpersonal Trust, Supervisor’s Perceived Job Performance , Communications, Teamwork, Extrinsic Satisfaction
ITrace: An implicit trust inference method for trust-aware collaborative filtering
NASA Astrophysics Data System (ADS)
He, Xu; Liu, Bin; Chen, Kejia
2018-04-01
The growth of Internet commerce has stimulated the use of collaborative filtering (CF) algorithms as recommender systems. A CF algorithm recommends items of interest to the target user by leveraging the votes given by other similar users. In a standard CF framework, it is assumed that the credibility of every voting user is exactly the same with respect to the target user. This assumption is not satisfied and thus may lead to misleading recommendations in many practical applications. A natural countermeasure is to design a trust-aware CF (TaCF) algorithm, which can take account of the difference in the credibilities of the voting users when performing CF. To this end, this paper presents a trust inference approach, which can predict the implicit trust of the target user on every voting user from a sparse explicit trust matrix. Then an improved CF algorithm termed iTrace is proposed, which takes advantage of both the explicit and the predicted implicit trust to provide recommendations with the CF framework. An empirical evaluation on a public dataset demonstrates that the proposed algorithm provides a significant improvement in recommendation quality in terms of mean absolute error.
Trusted Operations on Sensor Data †
Joosen, Wouter; Michiels, Sam; Hughes, Danny
2018-01-01
The widespread use of mobile devices has allowed the development of participatory sensing systems that capture various types of data using the existing or external sensors attached to mobile devices. Gathering data from such anonymous sources requires a mechanism to establish the integrity of sensor readings. In many cases, sensor data need to be preprocessed on the device itself before being uploaded to the target server while ensuring the chain of trust from capture to the delivery of the data. This can be achieved by a framework that provides a means to implement arbitrary operations to be performed on trusted sensor data, while guaranteeing the security and integrity of the data. This paper presents the design and implementation of a framework that allows the capture of trusted sensor data from both external and internal sensors on a mobile phone along with the development of trusted operations on sensor data while providing a mechanism for performing predefined operations on the data such that the chain of trust is maintained. The evaluation shows that the proposed system ensures the security and integrity of sensor data with minimal performance overhead. PMID:29702601
A Conceptual Framework and Principles for Trusted Pervasive Health
Blobel, Bernd Gerhard; Seppälä, Antto Veikko; Sorvari, Hannu Olavi; Nykänen, Pirkko Anneli
2012-01-01
Background Ubiquitous computing technology, sensor networks, wireless communication and the latest developments of the Internet have enabled the rise of a new concept—pervasive health—which takes place in an open, unsecure, and highly dynamic environment (ie, in the information space). To be successful, pervasive health requires implementable principles for privacy and trustworthiness. Objective This research has two interconnected objectives. The first is to define pervasive health as a system and to understand its trust and privacy challenges. The second goal is to build a conceptual model for pervasive health and use it to develop principles and polices which can make pervasive health trustworthy. Methods In this study, a five-step system analysis method is used. Pervasive health is defined using a metaphor of digital bubbles. A conceptual framework model focused on trustworthiness and privacy is then developed for pervasive health. On that model, principles and rules for trusted information management in pervasive health are defined. Results In the first phase of this study, a new definition of pervasive health was created. Using this model, differences between pervasive health and health care are stated. Reviewed publications demonstrate that the widely used principles of predefined and static trust cannot guarantee trustworthiness and privacy in pervasive health. Instead, such an environment requires personal dynamic and context-aware policies, awareness, and transparency. A conceptual framework model focused on information processing in pervasive health is developed. Using features of pervasive health and relations from the framework model, new principles for trusted pervasive health have been developed. The principles propose that personal health data should be under control of the data subject. The person shall have the right to verify the level of trust of any system which collects or processes his or her health information. Principles require that any stakeholder or system collecting or processing health data must support transparency and shall publish its trust and privacy attributes and even its domain specific policies. Conclusions The developed principles enable trustworthiness and guarantee privacy in pervasive health. The implementation of principles requires new infrastructural services such as trust verification and policy conflict resolution. After implementation, the accuracy and usability of principles should be analyzed. PMID:22481297
A conceptual framework and principles for trusted pervasive health.
Ruotsalainen, Pekka Sakari; Blobel, Bernd Gerhard; Seppälä, Antto Veikko; Sorvari, Hannu Olavi; Nykänen, Pirkko Anneli
2012-04-06
Ubiquitous computing technology, sensor networks, wireless communication and the latest developments of the Internet have enabled the rise of a new concept-pervasive health-which takes place in an open, unsecure, and highly dynamic environment (ie, in the information space). To be successful, pervasive health requires implementable principles for privacy and trustworthiness. This research has two interconnected objectives. The first is to define pervasive health as a system and to understand its trust and privacy challenges. The second goal is to build a conceptual model for pervasive health and use it to develop principles and policies which can make pervasive health trustworthy. In this study, a five-step system analysis method is used. Pervasive health is defined using a metaphor of digital bubbles. A conceptual framework model focused on trustworthiness and privacy is then developed for pervasive health. On that model, principles and rules for trusted information management in pervasive health are defined. In the first phase of this study, a new definition of pervasive health was created. Using this model, differences between pervasive health and health care are stated. Reviewed publications demonstrate that the widely used principles of predefined and static trust cannot guarantee trustworthiness and privacy in pervasive health. Instead, such an environment requires personal dynamic and context-aware policies, awareness, and transparency. A conceptual framework model focused on information processing in pervasive health is developed. Using features of pervasive health and relations from the framework model, new principles for trusted pervasive health have been developed. The principles propose that personal health data should be under control of the data subject. The person shall have the right to verify the level of trust of any system which collects or processes his or her health information. Principles require that any stakeholder or system collecting or processing health data must support transparency and shall publish its trust and privacy attributes and even its domain specific policies. The developed principles enable trustworthiness and guarantee privacy in pervasive health. The implementation of principles requires new infrastructural services such as trust verification and policy conflict resolution. After implementation, the accuracy and usability of principles should be analyzed.
Privacy as an enabler, not an impediment: building trust into health information exchange.
McGraw, Deven; Dempsey, James X; Harris, Leslie; Goldman, Janlori
2009-01-01
Building privacy and security protections into health information technology systems will bolster trust in such systems and promote their adoption. The privacy issue, too long seen as a barrier to electronic health information exchange, can be resolved through a comprehensive framework that implements core privacy principles, adopts trusted network design characteristics, and establishes oversight and accountability mechanisms. The public policy challenges of implementing this framework in a complex and evolving environment will require improvements to existing law, new rules for entities outside the traditional health care sector, a more nuanced approach to the role of consent, and stronger enforcement mechanisms.
Consumer trust in food safety--a multidisciplinary approach and empirical evidence from Taiwan.
Chen, Mei-Fang
2008-12-01
Food scandals that happened in recent years have increased consumers' risk perceptions of foods and decreased their trust in food safety. A better understanding of the consumer trust in food safety can improve the effectiveness of public policy and allow the development of the best practice in risk communication. This study proposes a research framework from a psychometric approach to investigate the relationships between the consumer's trust in food safety and the antecedents of risk perceptions of foods based on a reflexive modernization perspective and a cultural theory perspective in the hope of benefiting the future empirical study. The empirical results from a structural equation modeling analysis of Taiwan as a case in point reveal that this research framework based on a multidisciplinary perspective can be a valuable tool for a growing understanding of consumer trust in food safety. The antecedents in the psychometric research framework comprised reflexive modernization factors and cultural theory factors have all been supported in this study except the consumer's perception of pessimism toward food. Moreover, the empirical results of repeated measures analysis of variance give more detailed information to grasp empirical implications and to provide some suggestions to the actors and institutions involved in the food supply chain in Taiwan.
Huh, Jisu; Shin, Wonsun
2014-01-01
Direct-to-consumer (DTC) prescription drug brand websites, as a form of DTC advertising, are receiving increasing attention due to the growing number and importance as an ad and a consumer information source. This study examined consumer trust in a DTC website as an important factor influencing consumers' attitude toward the website and behavioral intention. Applying the conceptual framework of website trust, the particular focus of investigation was the effect of the website trust cue factor on consumers' perceived DTC website trust and subsequent attitudinal and behavioral responses. Results show a significant relation between the website trust cue factor and consumers' perceived DTC website trust. Perceived DTC website trust, in turn, was found to be significantly associated with consumers' attitude toward the DTC website and behavioral intention.
Code of Federal Regulations, 2010 CFR
2010-07-01
... public trust by making the maximum amount of information available to the public, in both hard copy and electronic formats, on the operation and activities of the Department of Defense, consistent with the DoD...
ERIC Educational Resources Information Center
Yavuz, Ahmet
2015-01-01
This study aims to investigate (1) students' trust in mathematics calculation versus intuition in a physics problem solving and (2) whether this trust is related to achievement in physics in the context of epistemic game theoretical framework. To achieve this research objective, paper-pencil and interview sessions were conducted. A paper-pencil…
Bird, Victoria; Leamy, Mary; Tew, Jerry; Le Boutillier, Clair; Williams, Julie; Slade, Mike
2014-07-01
Mental health services in the UK, Australia and other Anglophone countries have moved towards supporting personal recovery as a primary orientation. To provide an empirically grounded foundation to identify and evaluate recovery-oriented interventions, we previously published a conceptual framework of personal recovery based on a systematic review and narrative synthesis of existing models. Our objective was to test the validity and relevance of this framework for people currently using mental health services. Seven focus groups were conducted with 48 current mental health consumers in three NHS trusts across England, as part of the REFOCUS Trial. Consumers were asked about the meaning and their experience of personal recovery. Deductive and inductive thematic analysis applying a constant comparison approach was used to analyse the data. The analysis aimed to explore the validity of the categories within the conceptual framework, and to highlight any areas of difference between the conceptual framework and the themes generated from new data collected from the focus groups. Both the inductive and deductive analysis broadly validated the conceptual framework, with the super-ordinate categories Connectedness, Hope and optimism, Identity, Meaning and purpose, and Empowerment (CHIME) evident in the analysis. Three areas of difference were, however, apparent in the inductive analysis. These included practical support; a greater emphasis on issues around diagnosis and medication; and scepticism surrounding recovery. This study suggests that the conceptual framework of personal recovery provides a defensible theoretical base for clinical and research purposes which is valid for use with current consumers. However, the three areas of difference further stress the individual nature of recovery and the need for an understanding of the population and context under investigation. © The Royal Australian and New Zealand College of Psychiatrists 2014.
TANDEM: A Trust-Based Agent Framework for Networked Decision Making
2015-09-10
selective (20–80 %), while the rest are good citizens, trust acts as a method to isolate misbehaving agents. If the majority of the agents have high...competence and low selectivity, then they can use trust to isolate route information around the misbehaving agents, improving Comm and Steps. The impact is...more dramatic when only 20–40 % of the agents are misbehaving . However, using trust results in reduced SA as the information available at the
Achieving Optimal Privacy in Trust-Aware Social Recommender Systems
NASA Astrophysics Data System (ADS)
Dokoohaki, Nima; Kaleli, Cihan; Polat, Huseyin; Matskin, Mihhail
Collaborative filtering (CF) recommenders are subject to numerous shortcomings such as centralized processing, vulnerability to shilling attacks, and most important of all privacy. To overcome these obstacles, researchers proposed for utilization of interpersonal trust between users, to alleviate many of these crucial shortcomings. Till now, attention has been mainly paid to strong points about trust-aware recommenders such as alleviating profile sparsity or calculation cost efficiency, while least attention has been paid on investigating the notion of privacy surrounding the disclosure of individual ratings and most importantly protection of trust computation across social networks forming the backbone of these systems. To contribute to addressing problem of privacy in trust-aware recommenders, within this paper, first we introduce a framework for enabling privacy-preserving trust-aware recommendation generation. While trust mechanism aims at elevating recommender's accuracy, to preserve privacy, accuracy of the system needs to be decreased. Since within this context, privacy and accuracy are conflicting goals we show that a Pareto set can be found as an optimal setting for both privacy-preserving and trust-enabling mechanisms. We show that this Pareto set, when used as the configuration for measuring the accuracy of base collaborative filtering engine, yields an optimized tradeoff between conflicting goals of privacy and accuracy. We prove this concept along with applicability of our framework by experimenting with accuracy and privacy factors, and we show through experiment how such optimal set can be inferred.
Framework model and principles for trusted information sharing in pervasive health.
Ruotsalainen, Pekka; Blobel, Bernd; Nykänen, Pirkko; Seppälä, Antto; Sorvari, Hannu
2011-01-01
Trustfulness (i.e. health and wellness information is processed ethically, and privacy is guaranteed) is one of the cornerstones for future Personal Health Systems, ubiquitous healthcare and pervasive health. Trust in today's healthcare is organizational, static and predefined. Pervasive health takes place in an open and untrusted information space where person's lifelong health and wellness information together with contextual data are dynamically collected and used by many stakeholders. This generates new threats that do not exist in today's eHealth systems. Our analysis shows that the way security and trust are implemented in today's healthcare cannot guarantee information autonomy and trustfulness in pervasive health. Based on a framework model of pervasive health and risks analysis of ubiquitous information space, we have formulated principles which enable trusted information sharing in pervasive health. Principles imply that the data subject should have the right to dynamically verify trust and to control the use of her health information, as well as the right to set situation based context-aware personal policies. Data collectors and processors have responsibilities including transparency of information processing, and openness of interests, policies and environmental features. Our principles create a base for successful management of privacy and information autonomy in pervasive health. They also imply that it is necessary to create new data models for personal health information and new architectures which support situation depending trust and privacy management.
ERIC Educational Resources Information Center
Leighton, Jacqueline P.; Bustos Gómez, María Clara
2018-01-01
Formative assessments and feedback are vital to enhancing learning outcomes but require that learners feel at ease identifying their errors, and receiving feedback from a trusted source--teachers. An experimental test of a new theoretical framework was conducted to cultivate a pedagogical alliance to enhance students' (a) trust in the teacher, (b)…
Search for Trustful Leadership in Secondary Schools: Is Empowerment the Solution?
ERIC Educational Resources Information Center
Freire, Carla; Fernandes, António
2016-01-01
The purpose of this study is to analyse how the access to structures of empowerment by teachers in primary and secondary education impacts on their trust of the headmaster of the school management board. Using the theoretical framework of empowerment and trust in the context of companies, one adapted the constructs of these scales to the reality…
Gangl, Katharina; Hofmann, Eva; Kirchler, Erich
2015-01-01
Tax compliance represents a social dilemma in which the short-term self-interest to minimize tax payments is at odds with the collective long-term interest to provide sufficient tax funds for public goods. According to the Slippery Slope Framework, the social dilemma can be solved and tax compliance can be guaranteed by power of tax authorities and trust in tax authorities. The framework, however, remains silent on the dynamics between power and trust. The aim of the present theoretical paper is to conceptualize the dynamics between power and trust by differentiating coercive and legitimate power and reason-based and implicit trust. Insights into this dynamic are derived from an integration of a wide range of literature such as on organizational behavior and social influence. Conclusions on the effect of the dynamics between power and trust on the interaction climate between authorities and individuals and subsequent individual motivation of cooperation in social dilemmas such as tax contributions are drawn. Practically, the assumptions on the dynamics can be utilized by authorities to increase cooperation and to change the interaction climate from an antagonistic climate to a service and confidence climate. PMID:25859096
Gangl, Katharina; Hofmann, Eva; Kirchler, Erich
2015-02-01
Tax compliance represents a social dilemma in which the short-term self-interest to minimize tax payments is at odds with the collective long-term interest to provide sufficient tax funds for public goods. According to the Slippery Slope Framework, the social dilemma can be solved and tax compliance can be guaranteed by power of tax authorities and trust in tax authorities. The framework, however, remains silent on the dynamics between power and trust. The aim of the present theoretical paper is to conceptualize the dynamics between power and trust by differentiating coercive and legitimate power and reason-based and implicit trust. Insights into this dynamic are derived from an integration of a wide range of literature such as on organizational behavior and social influence. Conclusions on the effect of the dynamics between power and trust on the interaction climate between authorities and individuals and subsequent individual motivation of cooperation in social dilemmas such as tax contributions are drawn. Practically, the assumptions on the dynamics can be utilized by authorities to increase cooperation and to change the interaction climate from an antagonistic climate to a service and confidence climate.
2004-06-01
Prahalad , C. K. (1981). Headquarters influence and strategic control in MNCs. Sloan Management Review, 23(1), 15-29. Gagne, M., Koestner, R...p. 124). Rousseau, et al. (1998) defined trust as “a psychological state comprising the intention to accept vulnerability based on the positive...expectations of the intentions or behavior of another” (p. 395). McAllister (1995) defined trust as “the extent to which a person is confident in and
2013-01-01
what truly had to be protected and where we would establish trust. The results of that exercise materially changed our defense-in-depth strategy...vice president for Global Transportation and Industrial Markets at KPMG Consulting (later BearingPoint), leading the company’s strat- egy and
The dynamics of commissioning across organisational and clinical boundaries.
Baxter, Kate; Weiss, Marjorie; Le Grand, Julian
2008-01-01
The purpose of the paper is to investigate the inter- and intra-organisational relationships in the commissioning of secondary care by primary care trusts in England, using a principal-agent framework. The methodology is a qualitative study of three case studies. A total of 13 commissioning-related meetings were observed. In total, 21 managers and six consultant surgeons were interviewed. There are a number of different levels at which contractual and managerial control take place. Different strengths of control at one level can affect willingness to comply with agreements at other levels. Agreements at one level do not necessarily result in appropriate or expected action at another. The system for commissioning in the National Health Service (NHS) has changed with the introduction of payment by results and practice-based commissioning. However, the dynamics of the inter- and intra-organisational relationships studied remain. Incentives within organisations are as important as those between organisations. Within a chain of principal-agent relations, it is important that a strong link in the chain does not result in the exploitation of weaknesses in other links. If government targets and frameworks are to be met through commissioning, it may be advantageous to concentrate efforts on developing incentives that align clinician with NHS trust objectives as well as NHS trust with primary care trust (PCT) and government objectives. This paper is based on original empirical work. It uses a principal-agent framework to understand the relationships between PCTs and NHS trusts and highlights the importance of internal NHS trust governance systems in the fulfilment of commissioning agreements.
Johns, Matthew C; Blazes, David L
2010-12-03
A cornerstone of effective global health surveillance programs is the ability to build systems that identify, track and respond to public health threats in a timely manner. These functions are often difficult and require international cooperation given the rapidity with which diseases cross national borders and spread throughout the global community as a result of travel and migration by both humans and animals. As part of the U.S. Armed Forces Health Surveillance Center (AFHSC), the Department of Defense's (DoD) Global Emerging Infections Surveillance and Response System (AFHSC-GEIS) has developed a global network of surveillance sites over the past decade that engages in a wide spectrum of support activities in collaboration with host country partners. Many of these activities are in direct support of International Health Regulations (IHR[2005]). The network also supports host country military forces around the world, which are equally affected by these threats and are often in a unique position to respond in areas of conflict or during complex emergencies. With IHR(2005) as the guiding framework for action, the AFHSC-GEIS network of international partners and overseas research laboratories continues to develop into a far-reaching system for identifying, analyzing and responding to emerging disease threats.
Are we on the same page? The performance effects of congruence between supervisor and group trust.
Carter, Min Z; Mossholder, Kevin W
2015-09-01
Taking a multiple-stakeholder perspective, we examined the effects of supervisor-work group trust congruence on groups' task and contextual performance using a polynomial regression and response surface analytical framework. We expected motivation experienced by work groups to mediate the positive influence of trust congruence on performance. Although hypothesized congruence effects on performance were more strongly supported for affective rather than for cognitive trust, we found significant indirect effects on performance (via work group motivation) for both types of trust. We discuss the performance effects of trust congruence and incongruence between supervisors and work groups, as well as implications for practice and future research. (c) 2015 APA, all rights reserved).
A Theoretical Framework for Defense Acquisition Analysis
1989-09-01
Carnegie Reports on this issue discuss the need further. Being imaginative in business means having the ability to visualize systematic...Curriculum in Business and Public Administration," Negotiation Journal, 2: 191-204. (April 1987). 15. Cheney, Dick. Defense Management Report to the...Framework, Framework I and Framework II ....... .................. 105 13. Typical Perspective of an American Business Organization
A multi-domain trust management model for supporting RFID applications of IoT
Li, Feng
2017-01-01
The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system, in which trust establishment among entities from heterogeneous domains without past interaction or prior agreed policy, is a challenge. The current trust management mechanisms in the literature do not meet the specific requirements in multi-domain RFID systems. Therefore, this paper analyzes the special challenges on trust management in multi-domain RFID systems, and identifies the implications and the requirements of the challenges on the solutions to the trust management of multi-domain RFID systems. A multi-domain trust management model is proposed, which provides a hierarchical trust management framework include a diversity of trust evaluation and establishment approaches. The simulation results and analysis show that the proposed method has excellent ability to deal with the trust relationships, better security, and higher accuracy rate. PMID:28708855
A multi-domain trust management model for supporting RFID applications of IoT.
Wu, Xu; Li, Feng
2017-01-01
The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system, in which trust establishment among entities from heterogeneous domains without past interaction or prior agreed policy, is a challenge. The current trust management mechanisms in the literature do not meet the specific requirements in multi-domain RFID systems. Therefore, this paper analyzes the special challenges on trust management in multi-domain RFID systems, and identifies the implications and the requirements of the challenges on the solutions to the trust management of multi-domain RFID systems. A multi-domain trust management model is proposed, which provides a hierarchical trust management framework include a diversity of trust evaluation and establishment approaches. The simulation results and analysis show that the proposed method has excellent ability to deal with the trust relationships, better security, and higher accuracy rate.
Trust, Health Care Relationships, and Chronic Illness
Robinson, Carole A.
2016-01-01
Trust in health care relationships is a key ingredient of effective, high-quality care. Although the indirect influence of trust on health outcomes has long been recognized, recent research has shown that trust has a direct effect on outcomes of care. Trust is important. However, the research on trust is disparate, organized around differing definitions, and primarily focused on patients’ trust in physicians. Morse’s method of theoretical coalescence was used to further develop and elaborate a grounded theory of the evolution of trust in health care relationships, in the context of chronic illness. This middle-range theory offers a clear conceptual framework for organizing and relating disparate studies, explaining the findings of different studies at a higher conceptual level, and identifying gaps in research and understanding. In addition, the grounded theory is relevant to practice. PMID:28508016
USDA-ARS?s Scientific Manuscript database
Tradeoffs between plant growth and defense are central to theoretical frameworks used to study the ecology and evolution of plant defense against herbivores. However, these frameworks, as well as the experiments designed to test them, rarely include the remarkable diversity of belowground herbivores...
2010-01-01
offshoring, or producing major software components overseas (Defense Science Board, 2009). These trends raise concerns about the level of trust that...7 Software Complexity...7 Increasing Software Vulnerabilities and Malware Population . . . . . . . . . . . . . . . . 9 Limitations of
Trust in leadership: meta-analytic findings and implications for research and practice.
Dirks, Kurt T; Ferrin, Donald L
2002-08-01
In this study, the authors examined the findings and implications of the research on trust in leadership that has been conducted during the past 4 decades. First, the study provides estimates of the primary relationships between trust in leadership and key outcomes, antecedents, and correlates (k = 106). Second, the study explores how specifying the construct with alternative leadership referents (direct leaders vs. organizational leadership) and definitions (types of trust) results in systematically different relationships between trust in leadership and outcomes and antecedents. Direct leaders (e.g., supervisors) appear to be a particularly important referent of trust. Last, a theoretical framework is offered to provide parsimony to the expansive literature and to clarify the different perspectives on the construct of trust in leadership and its operation.
Cross-cultural differences in relationship- and group-based trust.
Yuki, Masaki; Maddux, William W; Brewer, Marilynn B; Takemura, Kosuke
2005-01-01
Two experiments explored differences in depersonalized trust (trust toward a relatively unknown target person) across cultures. Based on a recent theoretical framework that postulates predominantly different bases for group behaviors in Western cultures versus Eastern cultures, it was predicted that Americans would tend to trust people primarily based on whether they shared category memberships; however, trust for Japanese was expected to be based on the likelihood of sharing direct or indirect interpersonal links. Results supported these predictions. In both Study 1 (questionnaire study) and Study 2 (online money allocation game), Americans trusted ingroup members more than outgroup members; however, the existence of a potential indirect relationship link increased trust for outgroup members more for Japanese than for Americans. Implications for understanding group processes across cultures are discussed.
Moore's law and the impact on trusted and radiation-hardened microelectronics.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ma, Kwok Kee
2011-12-01
In 1965 Gordon Moore wrote an article claiming that integrated circuit density would scale exponentially. His prediction has remained valid for more than four decades. Integrated circuits have changed all aspects of everyday life. They are also the 'heart and soul' of modern systems for defense, national infrastructure, and intelligence applications. The United States government needs an assured and trusted microelectronics supply for military systems. However, migration of microelectronics design and manufacturing from the United States to other countries in recent years has placed the supply of trusted microelectronics in jeopardy. Prevailing wisdom dictates that it is necessary to usemore » microelectronics fabricated in a state-of-the-art technology for highest performance and military system superiority. Close examination of silicon microelectronics technology evolution and Moore's Law reveals that this prevailing wisdom is not necessarily true. This presents the US government the possibility of a totally new approach to acquire trusted microelectronics.« less
Trust that binds: the impact of collective felt trust on organizational performance.
Salamon, Sabrina Deutsch; Robinson, Sandra L
2008-05-01
The impact of employees' collective perceptions of being trusted by management was examined with a longitudinal study involving 88 retail stores. Drawing on the appropriateness framework (March, 1994; Weber, Kopelman, & Messick, 2004), the authors develop and test a model showing that when employees in an organization perceive they are trusted by management, increases in the presence of responsibility norms, as well as in the sales performance and customer service performance of the organization, are observed. Moreover, the relationship between perceptions of being trusted and sales performance is fully mediated by responsibility norms. PsycINFO Database Record (c) 2008 APA, all rights reserved.
Replacing missing values using trustworthy data values from web data sources
NASA Astrophysics Data System (ADS)
Izham Jaya, M.; Sidi, Fatimah; Mat Yusof, Sharmila; Suriani Affendey, Lilly; Ishak, Iskandar; Jabar, Marzanah A.
2017-09-01
In practice, collected data usually are incomplete and contains missing value. Existing approaches in managing missing values overlook the importance of trustworthy data values in replacing missing values. In view that trusted completed data is very important in data analysis, we proposed a framework of missing value replacement using trustworthy data values from web data sources. The proposed framework adopted ontology to map data values from web data sources to the incomplete dataset. As data from web is conflicting with each other, we proposed a trust score measurement based on data accuracy and data reliability. Trust score is then used to select trustworthy data values from web data sources for missing values replacement. We successfully implemented the proposed framework using financial dataset and presented the findings in this paper. From our experiment, we manage to show that replacing missing values with trustworthy data values is important especially in a case of conflicting data to solve missing values problem.
Facilitating trust engenderment in secondary school nurse interactions with students.
Summach, Anne H J
2011-04-01
School nurses are involved in a complex framework of interactions with students, other professionals, parents, and administrators. Trust between nurse and student is critical for interaction effectiveness. The goal of this study was to understand through phenomenology the process of engendering trust in school nurse-high school student interactions. The qualitative approach explored school nurse perceptions of experiences interacting with students, yielding insights into nurse- and setting-based factors contributing to the development of trust. Subthemes within these included key behaviors and attributes enhancing trust engenderment in school nurse-student interactions. Study findings were well supported by the existing nursing and psychological research literature. Nurses that purposefully strive to develop trust in young people will maximize adolescent health results.
Galford, Robert; Drapeau, Anne Seibold
2003-02-01
Researchers have established that trust is critical to organizational effectiveness. Being trustworthy yourself, however, does not guarantee that you are capable of building trust in an organization. That takes old-fashioned managerial virtues like consistency, clear communication, and a willingness to tackle awkward questions. It also requires a good defense: You must protect trust from its enemies. Any act of bad management erodes trust, so the list of potential enemies is endless. Among the most common enemies of trust, though, are inconsistent messages from top management, inconsistent standards, a willingness to tolerate incompetence or bad behavior, dishonest feedback, a failure to trust others to do good work, a tendency to ignore painful or politically charged situations, consistent corporate underperformance, and rumors. Fending off these enemies must be at the top of every chief executive's agenda. But even with constant vigilance, an organization and its leaders will sometimes lose people's trust. During a crisis, managers should enlist the help of an objective third party--chances are you won't be thinking clearly--and be available physically and emotionally. If you "go dark" in the face of a crisis, employees will worry about the company's survival, about their own capacity to cope, and about your abilities as a leader. And if trust has broken down so badly that your only choice is to start over, you can do so by figuring out exactly how the breach of trust happened, ascertaining the depth and breadth of the loss, owning up to the loss instead of downplaying it, and identifying as precisely as possible the specific changes you must make to rebuild trust.
Interpersonal Dynamics in the Workplace.
ERIC Educational Resources Information Center
1999
The first of the four papers in this symposium, "Trust and Distrust at Work: Normative and Dyad-exchange Influences on Performance" (C. Ken Weidner, II), proposes a theoretical framework for exploring and understanding trust and distrust in organizations. "Work Culture Adjustment: A Critical Ingredient to Organizational Change"…
Internet health resources: from quality to trust.
Lampe, K; Doupi, P; van den Hoven, M Jeroen
2003-01-01
Quality of online health resources remains a much debated topic, despite considerable international efforts. The lack of a systematic and comprehensive conceptual analysis is hindering further progress. Therefore we aim at clarifying the origins, nature and interrelations of pertinent concepts. Further, we claim that quality is neither a necessary nor a sufficient condition for Internet health resources to produce an effect offline. As users' trust is also required, we examine the relation of quality aspects to trust building online. We reviewed and analyzed the key documentation and deliverables of quality initiatives, as well as relevant scientific publications. Using the insights of philosophy, we identified the elementary dimensions which underlie the key concepts and theories presented so far in the context of online health information quality. We examined the interrelations of various perspectives and explored how trust as a phenomenon relates to these dimensions of quality. Various aspects associated with the quality of online health resources originate from four conceptual dimensions: epistemic, ethical, economic and technological. We propose a conceptual framework that incorporates all these perspectives. We argue that total quality exists only if all four dimensions have been addressed adequately and that high total quality is conducive to warranted trust. Quality and trust are intertwined, but distinct concepts, and their relation is not always straightforward. Ideally, trust should track quality. Apprehending the composition of these concepts will help to understand and guide the behavior of both users and providers of online information, as well as to foster warranted trust in online resources. The framework we propose provides a conceptual starting point for further deliberations and empirical work.
Consumer satisfaction with primary care provider choice and associated trust
Chu-Weininger, Ming Ying L; Balkrishnan, Rajesh
2006-01-01
Background Development of managed care, characterized by limited provider choice, is believed to undermine trust. Provider choice has been identified as strongly associated with physician trust. Stakeholders in a competitive healthcare market have competing agendas related to choice. The purpose of this study is to analyze variables associated with consumer's satisfaction that they have enough choice when selecting their primary care provider (PCP), and to analyze the importance of these variables on provider trust. Methods A 1999 randomized national cross-sectional telephone survey conducted of United States residential households, who had a telephone, had seen a medical professional at least twice in the past two years, and aged ≥ 20 years was selected for secondary data analyses. Among 1,117 households interviewed, 564 were selected as the final sample. Subjects responded to a core set of questions related to provider trust, and a subset of questions related to trust in the insurer. A previously developed conceptual framework was adopted. Linear and logistic regressions were performed based on this framework. Results Results affirmed 'satisfaction with amount of PCP choice' was significantly (p < .001) associated with provider trust. 'PCP's care being extremely effective' was strongly associated with 'satisfaction with amount of PCP choice' and 'provider trust'. Having sought a second opinion(s) was associated with lower trust. 'Spoke to the PCP outside the medical office,' 'satisfaction with the insurer' and 'insurer charges less if PCP within network' were all variables associated with 'satisfaction with amount of PCP choice' (all p < .05). Conclusion This study confirmed the association of 'satisfaction with amount of PCP choice' with provider trust. Results affirmed 'enough PCP choice' was a strong predictor of provider trust. 'Second opinion on PCP' may indicate distrust in the provider. Data such as 'trust in providers in general' and 'the role of provider performance information' in choice, though import in PCP choice, were not available for analysis and should be explored in future studies. Results have implications for rethinking the relationships among consumer choice, consumer behaviors in making trade-offs in PCP choice, and the role of healthcare experiences in 'satisfaction with amount of PCP choice' or 'provider trust.' PMID:17059611
Code of Federal Regulations, 2012 CFR
2012-07-01
... medium of exchange in U.S. military establishments located in overseas areas when such areas are... Department of Defense (Continued) DEPARTMENT OF THE ARMY CLAIMS AND ACCOUNTS MILITARY PAYMENT CERTIFICATES...) Travelers' checks issued by the American Express Company; Bank of America, National Trust and Savings...
Code of Federal Regulations, 2011 CFR
2011-07-01
... medium of exchange in U.S. military establishments located in overseas areas when such areas are... Department of Defense (Continued) DEPARTMENT OF THE ARMY CLAIMS AND ACCOUNTS MILITARY PAYMENT CERTIFICATES...) Travelers' checks issued by the American Express Company; Bank of America, National Trust and Savings...
On effectiveness of network sensor-based defense framework
NASA Astrophysics Data System (ADS)
Zhang, Difan; Zhang, Hanlin; Ge, Linqiang; Yu, Wei; Lu, Chao; Chen, Genshe; Pham, Khanh
2012-06-01
Cyber attacks are increasing in frequency, impact, and complexity, which demonstrate extensive network vulnerabilities with the potential for serious damage. Defending against cyber attacks calls for the distributed collaborative monitoring, detection, and mitigation. To this end, we develop a network sensor-based defense framework, with the aim of handling network security awareness, mitigation, and prediction. We implement the prototypical system and show its effectiveness on detecting known attacks, such as port-scanning and distributed denial-of-service (DDoS). Based on this framework, we also implement the statistical-based detection and sequential testing-based detection techniques and compare their respective detection performance. The future implementation of defensive algorithms can be provisioned in our proposed framework for combating cyber attacks.
A Conceptual Framework for Defense Acquisition Decision Makers: Giving the Schedule its Due
2014-01-01
Principles from microeconomic theory and operations research can provide insight into acquisition decisions to produce military capabili- ties in an...models based on economic and operations research principles can yield valuable insight into defense acquisition decisions. This article focuses on models...Department Edmund Conrow (1995) developed an excellent microeconomic framework to investigate the incentives of buyers and sellers in the defense
Hardware Support for Malware Defense and End-to-End Trust
2017-02-01
IoT) sensors and actuators, mobile devices and servers; cloud based, stand alone, and traditional mainframes. The prototype developed demonstrated...virtual machines. For mobile platforms we developed and prototyped an architecture supporting separation of personalities on the same platform...4 3.1. MOBILE
In Defense of Teacher Professionalism as a Policy Choice.
ERIC Educational Resources Information Center
Sykes, Gary
1991-01-01
Whereas democracy institutionalizes distrust, professionalism relies on trust. Responding to Berbules and Densmore, this article identifies strong normative reasons, grounded in the interests of children, for promoting teacher professionalism. Exorcising the evils of classic professionalism will eliminate neither equity nor quality problems.…
Participatory modeling and structured decision making
Robinson, Kelly F.; Fuller, Angela K.
2016-01-01
Structured decision making (SDM) provides a framework for making sound decisions even when faced with uncertainty, and is a transparent, defensible, and replicable method used to understand complex problems. A hallmark of SDM is the explicit incorporation of values and science, which often includes participation from multiple stakeholders, helping to garner trust and ultimately result in a decision that is more likely to be implemented. The core steps in the SDM process are used to structure thinking about natural resources management choices, and include: (1) properly defining the problem and the decision context, (2) determining the objectives that help describe the aspirations of the decision maker, (3) devising management actions or alternatives that can achieve those objectives, (4) evaluating the outcomes or consequences of each alternative on each of the objectives, (5) evaluating trade-offs, and (6) implementing the decision. Participatory modeling for SDM includes engaging stakeholders in some or all of the steps of the SDM process listed above. In addition, participatory modeling often is crucial for creating qualitative and quantitative models of how the system works, providing data for these models, and eliciting expert opinion when data are unavailable. In these ways, SDM provides a framework for decision making in natural resources management that includes participation from stakeholder groups throughout the process, including the modeling phase.
Peregrine, Michael W; Schwartz, James R
2004-10-01
Not-for-profit healthcare providers have several options they can use to resist government attempts to apply the charitable trust doctrine to their business decisions. As a strategic defense, providers should perform internal due diligence that focuses on governing documents, financial arrangements, donations/solicitation, real estate, and charitable waste allegations.
32 CFR 761.12 - Ships: Group authorizations.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 5 2011-07-01 2011-07-01 false Ships: Group authorizations. 761.12 Section 761... TRUST TERRITORY OF THE PACIFIC ISLANDS Entry Authorization § 761.12 Ships: Group authorizations. Ships or other craft in the following categories, except those ships which have been denied individual...
32 CFR 761.12 - Ships: Group authorizations.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 5 2012-07-01 2012-07-01 false Ships: Group authorizations. 761.12 Section 761... TRUST TERRITORY OF THE PACIFIC ISLANDS Entry Authorization § 761.12 Ships: Group authorizations. Ships or other craft in the following categories, except those ships which have been denied individual...
32 CFR 761.12 - Ships: Group authorizations.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 5 2013-07-01 2013-07-01 false Ships: Group authorizations. 761.12 Section 761... TRUST TERRITORY OF THE PACIFIC ISLANDS Entry Authorization § 761.12 Ships: Group authorizations. Ships or other craft in the following categories, except those ships which have been denied individual...
32 CFR 761.12 - Ships: Group authorizations.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 5 2014-07-01 2014-07-01 false Ships: Group authorizations. 761.12 Section 761... TRUST TERRITORY OF THE PACIFIC ISLANDS Entry Authorization § 761.12 Ships: Group authorizations. Ships or other craft in the following categories, except those ships which have been denied individual...
"Personal Growth: A Continuation High School Drug Defense."
ERIC Educational Resources Information Center
Preshaw, Gene; Steele, Larry
Two drug intervention courses were developed for students at risk, entitled "Personal Growth" and "Advanced Personal Growth." These courses were implemented by continuation high school staffs to raise self-esteem. Both courses emphasize building positive relationships and support systems, sharing feelings, and trusting. These are skills students…
School Principals in Southern Thailand: Exploring Trust with Community Leaders during Conflict
ERIC Educational Resources Information Center
Brooks, Melanie C.
2015-01-01
This article reports findings from a case study of school principals in Southern Thailand who work in areas targeted by Muslim separatist groups. Data were gathered and analyzed using a conceptual framework that conceived of trust as five interrelated constructs: benevolence, honesty, openness, reliability, and competence. This study builds on…
Building "Our School": Parental Perspectives for Building Trusting Family-Professional Partnerships
ERIC Educational Resources Information Center
Francis, Grace L.; Blue-Banning, Martha; Haines, Shana J.; Turnbull, Ann P.; Gross, Judith M. S.
2016-01-01
All educational stakeholders benefit when families and school staff have trusting partnerships as they work together to achieve mutual goals. Eleven focus groups were conducted with parents of children with and without disabilities in six schools, which had been selected as knowledge development sites by the Schoolwide Integrated Framework for…
Trust Networks: A New Perspective on Pedigree and the Ambiguities of Admissions
ERIC Educational Resources Information Center
Posselt, Julie R.
2018-01-01
Privileging elite academic pedigrees in graduate admissions preserves racial and socioeconomic inequities that many institutions say they wish to reduce. To understand this preference, I integrate across perspectives on trust in rational choice, social capital, and social network theories, and use the resulting framework to interpret 68 interviews…
Self-Regulatory Climate: A Positive Attribute of Public Schools
ERIC Educational Resources Information Center
Adams, Curt M.; Ware, Jordan K.; Miskell, Ryan C.; Forsyth, Patrick B.
2016-01-01
This study contributes to the development of a positive framework for effective public schools in 2 ways. First, it advances the construct self-regulatory climate as consisting of 3 generative school norms--collective faculty trust in students, collective student trust in teachers, and student-perceived academic emphasis. The authors argue these…
2017-02-28
systematic distortion of intelligence. Similarly, we did not find sufficient evidence to substantiate the allegations that CCJ2 leadership suppressed...CCJ2 leadership at the time, and does not 6 indicate any intent to present a rosier picture of the fight against ISIL. However, the CCJ2...to the early perception that the leadership did not trust the analysts and wanted to control the “narrative.” Similarly, the allegation raised in
2007-02-28
Program •Services executed Defense HUMINT Activities •DIA ran attaché system •Over time , deferred the Secretary’s Authorities •Post-1995 (Perry and White...ornl.gov orbucma@doe.ic.gov 26 February, 2007 TT L SENSO RS COMMS time trust Intelligence …the power of change… hameleon ORNL Cognitive Radio Program...and internal states in real- time to meet user requirements and goals • Learns: uses statistical signal processing and machine learning to reflect
A Framework for Defense Planning
1989-08-01
and hardware, (4) developing outlines of capability goals , (5) the allocation of rt’sources to best overall ef-et(6) a bcctter process for decisio ...annual report to Congress would be issued jointly by the Secretary ’See the Defense Reorganization Act of 1986 ( Public Law 99-433, October 1, 1986...developu - center, Contract No. MDA903- &5-C-0030. Library of CoWgress Cataloging in Publication Data Kent, Glenn A., 1915- A framework for defense
NASA Astrophysics Data System (ADS)
Fraser, Ryan; Gross, Lutz; Wyborn, Lesley; Evans, Ben; Klump, Jens
2015-04-01
Recent investments in HPC, cloud and Petascale data stores, have dramatically increased the scale and resolution that earth science challenges can now be tackled. These new infrastructures are highly parallelised and to fully utilise them and access the large volumes of earth science data now available, a new approach to software stack engineering needs to be developed. The size, complexity and cost of the new infrastructures mean any software deployed has to be reliable, trusted and reusable. Increasingly software is available via open source repositories, but these usually only enable code to be discovered and downloaded. As a user it is hard for a scientist to judge the suitability and quality of individual codes: rarely is there information on how and where codes can be run, what the critical dependencies are, and in particular, on the version requirements and licensing of the underlying software stack. A trusted software framework is proposed to enable reliable software to be discovered, accessed and then deployed on multiple hardware environments. More specifically, this framework will enable those who generate the software, and those who fund the development of software, to gain credit for the effort, IP, time and dollars spent, and facilitate quantification of the impact of individual codes. For scientific users, the framework delivers reviewed and benchmarked scientific software with mechanisms to reproduce results. The trusted framework will have five separate, but connected components: Register, Review, Reference, Run, and Repeat. 1) The Register component will facilitate discovery of relevant software from multiple open source code repositories. The registration process of the code should include information about licensing, hardware environments it can be run on, define appropriate validation (testing) procedures and list the critical dependencies. 2) The Review component is targeting on the verification of the software typically against a set of benchmark cases. This will be achieved by linking the code in the software framework to peer review forums such as Mozilla Science or appropriate Journals (e.g. Geoscientific Model Development Journal) to assist users to know which codes to trust. 3) Referencing will be accomplished by linking the Software Framework to groups such as Figshare or ImpactStory that help disseminate and measure the impact of scientific research, including program code. 4) The Run component will draw on information supplied in the registration process, benchmark cases described in the review and relevant information to instantiate the scientific code on the selected environment. 5) The Repeat component will tap into existing Provenance Workflow engines that will automatically capture information that relate to a particular run of that software, including identification of all input and output artefacts, and all elements and transactions within that workflow. The proposed trusted software framework will enable users to rapidly discover and access reliable code, reduce the time to deploy it and greatly facilitate sharing, reuse and reinstallation of code. Properly designed it could enable an ability to scale out to massively parallel systems and be accessed nationally/ internationally for multiple use cases, including Supercomputer centres, cloud facilities, and local computers.
GINSU: Guaranteed Internet Stack Utilization
2005-11-01
Computer Architecture Data Links, Internet , Protocol Stacks 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT UNCLASSIFIED 18. SECURITY...AFRL-IF-RS-TR-2005-383 Final Technical Report November 2005 GINSU: GUARANTEED INTERNET STACK UTILIZATION Trusted... Information Systems, Inc. Sponsored by Defense Advanced Research Projects Agency DARPA Order No. ARPS APPROVED FOR PUBLIC
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 8 2010-10-01 2010-10-01 false Definitions. 296.2 Section 296.2 Shipping MARITIME... SECURITY PROGRAM (MSP) Introduction § 296.2 Definitions. For the purposes of this part: Act means the... 121. This definition includes a trust. DOD means the U.S. Department of Defense. Domestic Trade means...
The role of brand trust in male customers' relationship to luxury brands.
Hur, Won-Moo; Kim, Minsung; Kim, Hanna
2014-04-01
This study examined the role of brand trust in customers' luxury brand consumption behavior. Perceived value and brand satisfaction were presented within a framework as antecedents of brand trust, while brand loyalty and brand risk were presented as consequences. A face-to-face survey was administered to a sample (N = 400) of men between 25 and 54 years of age who had purchased luxury brand and non-luxury brand suits within the previous three months. The results showed the greater the hedonic value on brand satisfaction, the greater the influence of brand satisfaction on brand trust, and the greater was the effect of brand trust on brand loyalty for luxury brands as compared with non-luxury brands. Similar patterns are identified between luxury and non-luxury brands for the positive relationship between utilitarian value and brand satisfaction and the negative relationship between brand trust and brand risk.
Defense.gov Special Report: Travels With Hagel
Halifax International Security Forum. Story U.S., Canada Sign Asia-Pacific Cooperation Framework Defense Cooperation Framework as both leaders take part in the Halifax International Security Forum. Story Travel Visits First Zumwalt-class Destroyer Photo Essays Photo Essay: Hagel Attends Halifax International
Kao, Danny Tengti
2009-04-01
Mobile commerce (M-commerce) has been acknowledged as one of the most representative transaction types driving e-commerce worldwide; however, the potential security threats that keep consumers from M-commerce still confound the M-commerce industry. This research attempts to explore two questions: What are the dimensions of transaction trust that may significantly affect consumers' intentions to adopt M-commerce, and what are the cultural dimensions that may significantly moderate the impact of transaction trust on consumers' intentions to adopt M-commerce? A research framework based on the BATE model and Hofstede's cultural dimensions was established to identify how transaction trust and cultural value affect consumers' intentions to adopt M-commerce. Results revealed that transaction trust significantly affects consumers' intentions to adopt M-commerce. However, while uncertainty avoidance moderates the impacts of business trust and security on consumers' intentions of M-commerce adoption, both individualism/collectivism and long-term/short-term orientation moderate the relationship between security trust and consumers' intentions of M-commerce adoption.
ERIC Educational Resources Information Center
Fisler, Jennifer L.; Firestone, William A.
2006-01-01
Teacher learning has been studied in numerous contexts using a variety of theoretical frameworks. Our research examines variation in teacher learning in a school-university partnership. We explore the personal characteristics of social trust and teaching efficacy beliefs in relation to teachers' levels of learning. We classify teachers in the…
ERIC Educational Resources Information Center
Stensaker, Bjørn; Maassen, Peter
2015-01-01
While external quality assurance in higher education was originally developed to cater for various domestic needs, recent decades have seen various attempts in the use of quality assurance also as a mechanism for creating more trust in cross-national higher education activities. In this article, a conceptual framework for analysing available…
1983-05-01
advertising. Traditionally defense marketing and advertising focused on decision makers within the defense conuunity and Congress. While it appears that...focus may be- starting to change, marketing and advertising remain highly directed and concentrated in defense oriented media. marketing was oriented to
McLaughlin, Megan M; Simonson, Louis; Zou, Xia; Ling, Li; Tucker, Joseph D
2015-01-01
Patient trust in physicians is a critical determinant of health seeking behaviors, medication adherence, and health outcomes. A crisis of interpersonal trust exists in China, extending throughout multiple social spheres, including the healthcare system. At the same time, with increased migration from Africa to China in the last two decades, Chinese physicians must establish mutual trust with an increasingly diverse patient population. We undertook a qualitative study to identify factors affecting African migrants' trust in Chinese physicians and to identify potential mechanisms for promoting trust. We conducted semi-structured, in-depth interviews with 40 African migrants in Guangzhou, China. A modified version of the social ecological model was used as a theoretical framework. At the patient-physician level, interpersonal treatment, technical competence, perceived commitment and motive, and language concordance were associated with enhanced trust. At the health system level, two primary factors influenced African migrants' trust in their physicians: the fee-for-service payment system and lack of continuity with any one physician. Patients' social networks and the broader socio-cultural context of interactions between African migrants and Chinese locals also influenced patients' trust of their physicians. These findings demonstrate the importance of factors beyond the immediate patient-physician interaction and suggest opportunities to promote trust through health system interventions.
Factors Affecting Intention to Use in Social Networking Sites: An Empirical Study on Thai Society
NASA Astrophysics Data System (ADS)
Jairak, Rath; Sahakhunchai, Napath; Jairak, Kallaya; Praneetpolgrang, Prasong
This research aims to explore the factors that affect the intention to use in Social Networking Sites (SNS). We apply the theory of Technology Acceptance Model (TAM), intrinsic motivation, and trust properties to develop the theoretical framework for SNS users' intention. The results show that the important factors influencing SNS users' intention for general purpose and collaborative learning are task-oriented, pleasure-oriented, and familiarity-based trust. In marketing usage, dispositional trust and pleasure-oriented are two main factors that reflect intention to use in SNS.
Cacho, N Ivalú; Kliebenstein, Daniel J; Strauss, Sharon Y
2015-11-01
We explored macroevolutionary patterns of plant chemical defense in Streptanthus (Brassicaceae), tested for evolutionary escalation of defense, as predicted by Ehrlich and Raven's plant-herbivore coevolutionary arms-race hypothesis, and tested whether species inhabiting low-resource or harsh environments invest more in defense, as predicted by the resource availability hypothesis (RAH). We conducted phylogenetically explicit analyses using glucosinolate profiles, soil nutrient analyses, and microhabitat bareness estimates across 30 species of Streptanthus inhabiting varied environments and soils. We found weak to moderate phylogenetic signal in glucosinolate classes and no signal in total glucosinolate production; a trend toward evolutionary de-escalation in the numbers and diversity of glucosinolates, accompanied by an evolutionary increase in the proportion of aliphatic glucosinolates; some support for the RAH relative to soil macronutrients, but not relative to serpentine soil use; and that the number of glucosinolates increases with microhabitat bareness, which is associated with increased herbivory and drought. Weak phylogenetic signal in chemical defense has been observed in other plant systems. A more holistic approach incorporating other forms of defense might be necessary to confidently reject escalation of defense. That defense increases with microhabitat bareness supports the hypothesis that habitat bareness is an underappreciated selective force on plants in harsh environments. © 2015 The Authors. New Phytologist © 2015 New Phytologist Trust.
Exploring plant defense theory in tall goldenrod, Solidago altissima.
Heath, Jeremy J; Kessler, André; Woebbe, Eric; Cipollini, Don; Stireman, John O
2014-06-01
Understanding the evolutionary reasons for patterns of chemical defense in plants is an ongoing theoretical and empirical challenge. The goal is to develop a model that can reliably predict how defenses are distributed within the plant over space and time. This is difficult given that evolutionary, ecological, and physiological processes and tradeoffs can operate over different spatial and temporal scales. We evaluated the major predictions of two leading defense theories, the growth-differentiation balance hypothesis (GDBH) and optimal defense theory (ODT). To achieve this, enemies, fitness components, terpenoids, and protease inhibitors were measured in Solidago altissima and used to construct conventional univariate and structural equation models (SEMs). Leaf-tissue value indices extracted from an SEM revealed a strong correlation between tissue value and terpenoid defense that supports ODT. A tradeoff between serine protease inhibition and growth as well as an indirect tradeoff between growth and terpenoids manifested through galling insects supported the GDBH. Interestingly, there was a strong direct effect of terpenoids on rhizome mass, suggesting service to both storage and defense. The results support established theories but unknown genotypic traits explained much of the variation in defense, confirming the need to integrate emerging theories such as pollination constraints, defense syndromes, tolerance, mutualisms, and facilitation. © 2014 The Authors. New Phytologist © 2014 New Phytologist Trust.
Schimmel, Bernardus C J; Ataide, Livia M S; Chafi, Rachid; Villarroel, Carlos A; Alba, Juan M; Schuurink, Robert C; Kant, Merijn R
2017-06-01
Spider mites are destructive arthropod pests on many crops. The generalist herbivorous mite Tetranychus urticae induces defenses in tomato (Solanum lycopersicum) and this constrains its fitness. By contrast, the Solanaceae-specialist Tetranychus evansi maintains a high reproductive performance by suppressing tomato defenses. Tetranychus evansi outcompetes T. urticae when infesting the same plant, but it is unknown whether this is facilitated by the defenses of the plant. We assessed the extent to which a secondary infestation by a competitor affects local plant defense responses (phytohormones and defense genes), mite gene expression and mite performance. We observed that T. evansi switches to hyper-suppression of defenses after its tomato host is also invaded by its natural competitor T. urticae. Jasmonate (JA) and salicylate (SA) defenses were suppressed more strongly, albeit only locally at the feeding site of T. evansi, upon introduction of T. urticae to the infested leaflet. The hyper-suppression of defenses coincided with increased expression of T. evansi genes coding for salivary defense-suppressing effector proteins and was paralleled by an increased reproductive performance. Together, these observations suggest that T. evansi overcompensates its reproduction through hyper-suppression of plant defenses in response to nearby competitors. We hypothesize that the competitor-induced overcompensation promotes competitive population growth of T. evansi on tomato. © 2017 The Authors. New Phytologist © 2017 New Phytologist Trust.
1993-10-01
Edwards Deming, Joseph M. Juran, Process Kaoru Ishikawa and Philip B. Crosby Activities stress the importance of work-force employee involvement to...contracts. The Ishikawa - An atmosphere of mutual work-force employee involvement ac- DOD executives have lectured at con- trust and respect is neces- tions
Application of Game Theory to Improve the Defense of the Smart Grid
2012-03-01
Computer Systems and Networks ...............................................22 2.4.2 Trust Models ...systems. In this environment, developers assumed deterministic communications mediums rather than the “best effort” models provided in most modern... models or computational models to validate the SPSs design. Finally, the study reveals concerns about the performance of load rejection schemes
Building blocks toward contemporary trauma theory: Ferenczi 's paradigm shift.
Mészáros, Judit
2010-12-01
In laying down the building blocks of contemporary trauma theory, Ferenczi asserted that trauma is founded on real events and that it occurs in the interpersonal and intersubjective dynamics of object relations. He stressed the significance of the presence or lack of a trusted person in the post-traumatic situation. After the trauma, the loneliness and later the isolation of the victim represent a serious pathogenic source. In the traumatic situation, the victim and the persecutor/aggressor operate differing ego defense mechanisms. Ferenczi was the first to describe the ego defense mechanism of identification with the aggressor. Ferenczi pointed out the characteristic features of the role of analyst/therapist with which (s)he may assist the patient in working through the trauma, among them being the development of a therapeutic atmosphere based on trust, so that the traumatic experiences can be relived, without which effective therapeutic change cannot be achieved. For the analyst, countertransference, as part of authentic communication, is incorporated into the therapeutic process. These are the key building blocks that are laid down by Ferenczi in his writings and appear in later works on trauma theory.
Feng, Jingyu; Zhang, Man; Xiao, Yun; Yue, Hongzhou
2018-01-01
Cooperative spectrum sensing (CSS) is considered as a powerful approach to improve the utilization of scarce spectrum resources. However, if CSS assumes that all secondary users (SU) are honest, it may offer opportunities for attackers to conduct a spectrum sensing data falsification (SSDF) attack. To suppress such a threat, recent efforts have been made to develop trust mechanisms. Currently, some attackers can collude with each other to form a collusive clique, and thus not only increase the power of SSDF attack but also avoid the detection of a trust mechanism. Noting the duality of sensing data, we propose a defense scheme called XDA from the perspective of XOR distance analysis to suppress a collusive SSDF attack. In the XDA scheme, the XOR distance calculation in line with the type of “0” and “1” historical sensing data is used to measure the similarity between any two SUs. Noting that collusive SSDF attackers hold high trust value and the minimum XOR distance, the algorithm to detect collusive SSDF attackers is designed. Meanwhile, the XDA scheme can perfect the trust mechanism to correct collusive SSDF attackers’ trust value. Simulation results show that the XDA scheme can enhance the accuracy of trust evaluation, and thus successfully reduce the power of collusive SSDF attack against CSS. PMID:29382061
2006-03-01
Defense, Editor. 2001. 12. Defense, D.o., Department of Defense Architecture Framework Deskbook. 2004, Department of Defense. 13. Denzin , N. and...Y. Lincoln , Handbook of Qualitative Research. 2000, California: Sage. 14. Flick, U., An Introduction to Qualitative research: Theory, method and
Trust and Society: Suggestions for Further Development of Niklas Luhmann's Theory of Trust.
Morgner, Christian
2018-05-01
This paper addresses an apparent gap in the work of Niklas Luhmann. While the issue of trust continues to receive widespread attention in the social sciences, Luhmann's interest in this topic declined following the development of his systems theory. It is argued that this decline does not reflect any diminished relevance of trust for systems theory, but rather that the architectural remodeling of theory cannot easily be applied to the issue of trust. Here, the issue of trust is reconceptualized as a connection medium. This entails a reconstruction of Luhmann's early theory of trust, especially with regard to function and social positioning. In this context, trust can in turn be linked to the concept of medium in Luhmann's late work. As a connection medium, trust mediates between the different levels of sociality-interaction, organization, and society. These theoretical considerations are employed to develop a more applied framework for empirical research, with a brief case study from southern Italy. From this perspective, the idea of trust as society's glue is seen to be overly simplistic. The common ethical understanding that more trust leads to a better society is also questioned on the grounds that social cooperation can also lead to social sclerosis. Finally, risk and trust are shown to accommodate the formation of different cultures of trust. The paper shows how Luhmann's updated version of trust can inspire current research and enhance our understanding of how trust operates in contemporary society. © 2018 Canadian Sociological Association/La Société canadienne de sociologie.
A Strategic Approach to Network Defense: Framing the Cloud
2011-03-10
accepted network defensive principles, to reduce risks associated with emerging virtualization capabilities and scalability of cloud computing . This expanded...defensive framework can assist enterprise networking and cloud computing architects to better design more secure systems.
Campbell, Stephen; Hannon, Kerin; Lester, Helen
2011-04-01
Exception reporting allows practices to exclude eligible patients from indicators or an entire clinical domain of the Quality and Outcomes Framework (QOF). It is a source of contention, viewed by some as a 'gaming' mechanism. To explore GP and practice staff views and experiences of exception reporting in the QOF. Qualitative semi-structured interviews. Interviews with 24 GPs, 20 practice managers, 13 practice nurses, and nine other staff were conducted in 27 general practices in the UK. Semi-structured interviews, analysed using open explorative thematic coding. Exception reporting was seen as a clinically necessary part of the QOF. Exempting patients, particularly for discretionary reasons, was seen as an 'exception to the rule' that was justified either in terms of practising patient-centred care within a framework of population-based health measures or because of the poor face validity of the indicators. Rates in all practices were described as minimal and the threat of external scrutiny from primary care trusts kept rates low. However, GPs were happy to defend using discretionary exception codes for individual patients. Exception reporting was used, particularly at the end of the payment year, to meet unmet targets and to prevent the practice being penalised financially. Overt gaming was seen as something done by 'other' practices. Only two GPs admitted to occasional inappropriate exception reporting. Exception reporting is seen by most GPs and practice staff as an important and defensible safeguard against inappropriate treatment or over-treatment of patients. However, a minority of practitioners also saw it as a gaming mechanism.
McLaughlin, Megan M.; Simonson, Louis; Zou, Xia; Ling, Li; Tucker, Joseph D.
2015-01-01
Background Patient trust in physicians is a critical determinant of health seeking behaviors, medication adherence, and health outcomes. A crisis of interpersonal trust exists in China, extending throughout multiple social spheres, including the healthcare system. At the same time, with increased migration from Africa to China in the last two decades, Chinese physicians must establish mutual trust with an increasingly diverse patient population. We undertook a qualitative study to identify factors affecting African migrants’ trust in Chinese physicians and to identify potential mechanisms for promoting trust. Methods / Principal Findings We conducted semi-structured, in-depth interviews with 40 African migrants in Guangzhou, China. A modified version of the social ecological model was used as a theoretical framework. At the patient-physician level, interpersonal treatment, technical competence, perceived commitment and motive, and language concordance were associated with enhanced trust. At the health system level, two primary factors influenced African migrants’ trust in their physicians: the fee-for-service payment system and lack of continuity with any one physician. Patients’ social networks and the broader socio-cultural context of interactions between African migrants and Chinese locals also influenced patients’ trust of their physicians. Conclusions These findings demonstrate the importance of factors beyond the immediate patient-physician interaction and suggest opportunities to promote trust through health system interventions. PMID:25965064
Proposal of a Framework for Internet Based Licensing of Learning Objects
ERIC Educational Resources Information Center
Santos, Osvaldo A.; Ramos, Fernando M. S.
2004-01-01
This paper presents a proposal of a framework whose main objective is to manage the delivery and rendering of learning objects in a digital rights controlled environment. The framework is based on a digital licensing scheme that requires each learning object to have the proper license in order to be rendered by a trusted player. A conceptual model…
Past experience, 'shadow of the future', and patient trust: a cross-sectional survey.
Tarrant, Carolyn; Colman, Andrew M; Stokes, Tim
2008-11-01
Recent changes to the organisation and delivery of primary care in the UK have the potential to reduce continuity of care markedly, but it is not clear how this will have an impact on patient trust. This study aims to test the associations between specific aspects of continuity in the GP-patient relationship, and patient trust, informed by the theoretical framework of behavioural game theory. A cross-sectional survey of patients in three Leicestershire general practices was conducted. Regression analysis showed that ratings of the GP's interpersonal care, past experience of cooperation, and expectation of continuing care from the GP were all independent predictors of patient trust. These findings highlight the value of longitudinal aspects of the GP-patient relationship.
Capturing Trust in Social Web Applications
NASA Astrophysics Data System (ADS)
O'Donovan, John
The Social Web constitutes a shift in information flow from the traditional Web. Previously, content was provided by the owners of a website, for consumption by the end-user. Nowadays, these websites are being replaced by Social Web applications which are frameworks for the publication of user-provided content. Traditionally, Web content could be `trusted' to some extent based on the site it originated from. Algorithms such as Google's PageRank were (and still are) used to compute the importance of a website, based on analysis of underlying link topology. In the Social Web, analysis of link topology merely tells us about the importance of the information framework which hosts the content. Consumers of information still need to know about the importance/reliability of the content they are reading, and therefore about the reliability of the producers of that content. Research into trust and reputation of the producers of information in the Social Web is still very much in its infancy. Every day, people are forced to make trusting decisions about strangers on the Web based on a very limited amount of information. For example, purchasing a product from an eBay seller with a `reputation' of 99%, downloading a file from a peer-to-peer application such as Bit-Torrent, or allowing Amazon.com tell you what products you will like. Even something as simple as reading comments on a Web-blog requires the consumer to make a trusting decision about the quality of that information. In all of these example cases, and indeed throughout the Social Web, there is a pressing demand for increased information upon which we can make trusting decisions. This chapter examines the diversity of sources from which trust information can be harnessed within Social Web applications and discusses a high level classification of those sources. Three different techniques for harnessing and using trust from a range of sources are presented. These techniques are deployed in two sample Social Web applications—a recommender system and an online auction. In all cases, it is shown that harnessing an increased amount of information upon which to make trust decisions greatly enhances the user experience with the Social Web application.
Development of Metrics for Trust in Automation
2010-06-01
Systems Literature Review Defence Research and Development Canada Toronto No. CR-2003-096 Ajzen , I ., & Fishbein , M . (1980). Understanding attitudes...theory and research (pp. 261–287). Thousand Oaks, CA: Sage. Moray, N., Inagaki, T., Itoh, M ., 2000 . Adaptive automation, trust, and self-confidence...Assurance Technical Framework document ( 2000 ), the term ‘trust’ is used 352 times, ranging from reference to the trustworthiness of technology, to
Ethical Frameworks, Moral Practices and Outdoor Education.
ERIC Educational Resources Information Center
Fox, Karen M.; Lautt, Mick
Insights from quantum physics and chaos theory help create new metaphors about ethical frameworks and moral practices in outdoor education. The seemingly straightforward concept of values is analogous to the initial simple nonlinear equation of a fractal. The value claims of outdoor education--trust, cooperation, environmental awareness,…
Promoting cooperation and trust in "noisy" situations: the power of generosity.
Klapwijk, Anthon; Van Lange, Paul A M
2009-01-01
The authors present an interdependence theoretical framework and advance the argument that generosity serves the important purpose of communicating trust, which is assumed to be of utmost importance to coping with incidents of negative noise (i.e., when the other every now and then behaves less cooperatively than intended). Using a new social dilemma task (the parcel delivery paradigm), it was hypothesized that incidents of negative noise would exert detrimental effects on trust and trust-related judgments and experiences, as well as cooperation, and that relative to tit for tat and self-regarding strategies (stingy or unconditionally cooperative strategies), other-regarding strategies (i.e., unconditional cooperation and generosity) would be more effective at reducing such as detrimental effects. Results from 2 studies provided strong support for these hypotheses, suggesting that the power of generosity is underestimated in the extant literature, especially in its ability to maintain or build trust, which is essential for coping with noise.
Applying the SERENITY Methodology to the Domain of Trusted Electronic Archiving
NASA Astrophysics Data System (ADS)
Porekar, Jan; Klobučar, Tomaž; Šaljič, Svetlana; Gabrijelčič, Dušan
We present the application of the SERENITY methodology to the domain of long-term trusted electronic archiving, sometimes also referred to as trusted digital notary services. We address the SERENITY approach from thepoint of view of a company providing security solutions in the mentioned domain and adopt the role of a solution developer. In this chapter we show a complete vertical slice through the trusted archiving domain providing: (i) the relevant S&D properties, (ii) the S&D classes and S&D patterns on both organizational and technical level, (iii) describe how S&D patterns are integrated into a trusted longterm archiving service using the SERENITY Run-Time Framework (SRF). At the end of the chapter we put in perspective what a solution developer can learn from the process of capturing security knowledge according to SERENITY methodology and we discuss how existing implementations of archiving services can benefit from SERENITY approach in the future.
Bending, Zara J
2015-06-01
The conception of the doctor-patient relationship under Australian law has followed British common law tradition whereby the relationship is founded in a contractual exchange. By contrast, this article presents a rationale and framework for an alternative model-a "Trust Model"-for implementation into law to more accurately reflect the contemporary therapeutic dynamic. The framework has four elements: (i) an assumption that professional conflicts (actual or perceived) with patient safety, motivated by financial or personal interests, should be avoided; (ii) an onus on doctors to disclose these conflicts; (iii) a proposed mechanism to contend with instances where doctors choose not to disclose; and (iv) sanctions for non-compliance with the regime.
32 CFR Appendix B to Part 172 - Disposition of Amounts Collected From Successful Bidders
Code of Federal Regulations, 2010 CFR
2010-07-01
... DEFENSE CONTRACTING DISPOSITION OF PROCEEDS FROM DOD SALES OF SURPLUS PERSONAL PROPERTY Pt. 172, App. B...) activities IF IF. 2. Usable personal property purchased by and turned in by IF activities IF IF. 3. Property purchased with funds from trust fund _ X8420, “Surcharge Collections, Sales of Commissary Stores” _ X8420...
32 CFR Appendix B to Part 172 - Disposition of Amounts Collected From Successful Bidders
Code of Federal Regulations, 2011 CFR
2011-07-01
... DEFENSE CONTRACTING DISPOSITION OF PROCEEDS FROM DOD SALES OF SURPLUS PERSONAL PROPERTY Pt. 172, App. B...) activities IF IF. 2. Usable personal property purchased by and turned in by IF activities IF IF. 3. Property purchased with funds from trust fund _ X8420, “Surcharge Collections, Sales of Commissary Stores” _ X8420...
Trust My Face: Cognitive Factors of Head Fakes in Sports
ERIC Educational Resources Information Center
Kunde, Wilfried; Skirde, Stefanie; Weigelt, Matthias
2011-01-01
In many competitive sports, players try to deceive their opponents about their behavioral intentions by using specific body movements or postures called fakes. For example, fakes are performed in basketball when a player gazes in one direction but passes or shoots the ball in another direction to avert efficient defense actions. The present study…
The Price of Distrust: Trust, Anxious Attachment, Jealousy, and Partner Abuse.
Rodriguez, Lindsey M; DiBello, Angelo M; Øverup, Camilla S; Neighbors, Clayton
2015-07-01
Trust is essential to the development of healthy, secure, and satisfying relationships (Simpson, 2007a). Attachment styles provide a theoretical framework for understanding how individuals respond to partner behaviors that either confirm or violate trust (Hazan & Shaver, 1994). The current research aimed to identify how trust and attachment anxiety might interact to predict different types of jealousy and physical and psychological abuse. We expected that when experiencing lower levels of trust, anxiously attached individuals would report higher levels of both cognitive and behavioral jealousy as well as partner abuse perpetration. Participants in committed romantic relationships ( N = 261) completed measures of trust, attachment anxiety and avoidance, jealousy, and physical and psychological partner abuse in a cross-sectional study. Moderation results largely supported the hypotheses: Attachment anxiety moderated the association between trust and jealousy, such that anxious individuals experienced much higher levels of cognitive and behavioral jealousy when reporting lower levels of trust. Moreover, attachment anxiety moderated the association between trust and nonphysical violence. These results suggest that upon experiencing distrust in one's partner, anxiously attached individuals are more likely to become jealous, snoop through a partner's belongings, and become psychologically abusive. The present research illustrates that particularly for anxiously attached individuals, distrust has cascading effects on relationship cognitions and behavior, and this should be a key area of discussion during therapy.
Epstein, Elizabeth G; Wolfe, Katherine
2016-11-01
The purpose of this study was to preliminarily evaluate ICU family members' trust and shared decision making using modified versions of the Wake Forest Trust Survey and the Shared Decision Making-9 Survey. Using a descriptive approach, the perceptions of family members of ICU patients (n=69) of trust and shared decision making were measured using the Wake Forest Trust Survey and the 9-item Shared Decision Making (SDM-9) Questionnaire. Both surveys were modified slightly to apply to family members of ICU patients and to include perceptions of nurses as well as physicians. Overall, family members reported high levels of trust and inclusion in decision making. Family members who lived with the patient had higher levels of trust than those who did not. Family members who reported strong agreement among other family about treatment decisions had higher levels of trust and higher SDM-9 scores than those who reported less family agreement. The modified surveys may be useful in evaluating family members' trust and shared decision making in ICU settings. Future studies should include development of a comprehensive patient-centered care framework that focuses on its central goal of maintaining provider-patient/family partnerships as an avenue toward effective shared decision making. Copyright © 2016 Elsevier Inc. All rights reserved.
NASA Astrophysics Data System (ADS)
Kuga, Kazuki; Tanimoto, Jun
2018-02-01
We consider two imperfect ways to protect against an infectious disease such as influenza, namely vaccination giving only partial immunity and a defense against contagion such as wearing a mask. We build up a new analytic framework considering those two cases instead of perfect vaccination, conventionally assumed as a premise, with the assumption of an infinite and well-mixed population. Our framework also considers three different strategy-updating rules based on evolutionary game theory: conventional pairwise comparison with one randomly selected agent, another concept of pairwise comparison referring to a social average, and direct alternative selection not depending on the usual copying concept. We successfully obtain a phase diagram in which vaccination coverage at equilibrium can be compared when assuming the model of either imperfect vaccination or a defense against contagion. The obtained phase diagram reveals that a defense against contagion is marginally inferior to an imperfect vaccination as long as the same coefficient value is used. Highlights - We build a new analytical framework for a vaccination game combined with the susceptible-infected-recovered (SIR) model. - Our model can evaluate imperfect provisions such as vaccination giving only partial immunity and a defense against contagion. - We obtain a phase diagram with which to compare the quantitative effects of partial vaccination and a defense against contagion.
What Is Trust? Ethics and Risk Governance in Precision Medicine and Predictive Analytics
Adjekum, Afua; Ienca, Marcello
2017-01-01
Abstract Trust is a ubiquitous term used in emerging technology (e.g., Big Data, precision medicine), innovation policy, and governance literatures in particular. But what exactly is trust? Even though trust is considered a critical requirement for the successful deployment of precision medicine initiatives, nonetheless, there is a need for further conceptualization with regard to what qualifies as trust, and what factors might establish and sustain trust in precision medicine, predictive analytics, and large-scale biology. These new fields of 21st century medicine and health often deal with the “futures” and hence, trust gains a temporal and ever-present quality for both the present and the futures anticipated by new technologies and predictive analytics. We address these conceptual gaps that have important practical implications in the way we govern risk and unknowns associated with emerging technologies in biology, medicine, and health broadly. We provide an in-depth conceptual analysis and an operative definition of trust dynamics in precision medicine. In addition, we identify three main types of “trust facilitators”: (1) technical, (2) ethical, and (3) institutional. This three-dimensional framework on trust is necessary to building and maintaining trust in 21st century knowledge-based innovations that governments and publics invest for progressive societal change, development, and sustainable prosperity. Importantly, we analyze, identify, and deliberate on the dimensions of precision medicine and large-scale biology that have carved out trust as a pertinent tool to its success. Moving forward, we propose a “points to consider” on how best to enhance trust in precision medicine and predictive analytics. PMID:29257733
What Is Trust? Ethics and Risk Governance in Precision Medicine and Predictive Analytics.
Adjekum, Afua; Ienca, Marcello; Vayena, Effy
2017-12-01
Trust is a ubiquitous term used in emerging technology (e.g., Big Data, precision medicine), innovation policy, and governance literatures in particular. But what exactly is trust? Even though trust is considered a critical requirement for the successful deployment of precision medicine initiatives, nonetheless, there is a need for further conceptualization with regard to what qualifies as trust, and what factors might establish and sustain trust in precision medicine, predictive analytics, and large-scale biology. These new fields of 21st century medicine and health often deal with the "futures" and hence, trust gains a temporal and ever-present quality for both the present and the futures anticipated by new technologies and predictive analytics. We address these conceptual gaps that have important practical implications in the way we govern risk and unknowns associated with emerging technologies in biology, medicine, and health broadly. We provide an in-depth conceptual analysis and an operative definition of trust dynamics in precision medicine. In addition, we identify three main types of "trust facilitators": (1) technical, (2) ethical, and (3) institutional. This three-dimensional framework on trust is necessary to building and maintaining trust in 21st century knowledge-based innovations that governments and publics invest for progressive societal change, development, and sustainable prosperity. Importantly, we analyze, identify, and deliberate on the dimensions of precision medicine and large-scale biology that have carved out trust as a pertinent tool to its success. Moving forward, we propose a "points to consider" on how best to enhance trust in precision medicine and predictive analytics.
Pellissier, Loïc; Litsios, Glenn; Fishbein, Mark; Salamin, Nicolas; Agrawal, Anurag A; Rasmann, Sergio
2016-02-01
Given the dual role of many plant traits to tolerate both herbivore attack and abiotic stress, the climatic niche of a species should be integrated into the study of plant defense strategies. Here we investigate the impact of plant reproductive strategy and components of species' climatic niche on the rate of chemical defense evolution in the milkweeds using a common garden experiment of 49 species. We found that across Asclepias species, clonal reproduction repeatedly evolved in lower temperature conditions, in species generally producing low concentrations of a toxic defense (cardenolides). Additionally, we found that rates of cardenolide evolution were lower for clonal than for nonclonal species. We thus conclude that because the clonal strategy is based on survival, long generation times, and is associated with tolerance of herbivory, it may be an alternative to toxicity in colder ecosystems. Taken together, these results indicate that the rate of chemical defense evolution is influenced by the intersection of life-history strategy and climatic niches into which plants radiate. © 2015 The Authors. New Phytologist © 2015 New Phytologist Trust.
Information spreading in Delay Tolerant Networks based on nodes' behaviors
NASA Astrophysics Data System (ADS)
Wu, Yahui; Deng, Su; Huang, Hongbin
2014-07-01
Information spreading in DTNs (Delay Tolerant Networks) adopts a store-carry-forward method, and nodes receive the message from others directly. However, it is hard to judge whether the information is safe in this communication mode. In this case, a node may observe other nodes' behaviors. At present, there is no theoretical model to describe the varying rule of the nodes' trusting level. In addition, due to the uncertainty of the connectivity in DTN, a node is hard to get the global state of the network. Therefore, a rational model about the node's trusting level should be a function of the node's own observing result. For example, if a node finds k nodes carrying a message, it may trust the information with probability p(k). This paper does not explore the real distribution of p(k), but instead presents a unifying theoretical framework to evaluate the performance of the information spreading in above case. This framework is an extension of the traditional SI (susceptible-infected) model, and is useful when p(k) conforms to any distribution. Simulations based on both synthetic and real motion traces show the accuracy of the framework. Finally, we explore the impact of the nodes' behaviors based on certain special distributions through numerical results.
Processes Asunder: Acquisition & Planning Misfits
2009-03-26
Establishing six Business Enterprise Priorities ( BEPs ) to focus the Department’s business transformation efforts, which now guide DoD investment decisions...three phases which look very much like Milestone A, B, and C of the previously existing Life Cycle Management Framework . With this obvious redundancy...February 2002). 30 6 Defense Acquisition University, “Integrated Defense Acquisition, Technology, & Logistics Life Cycle Management Framework , version 5.2
Understanding the roles of NHS trust board members.
Deffenbaugh, J
1996-01-01
The establishment of NHS trust boards on a business format was a recent innovation resulting from the NHS reforms. In order to realize benefits for patients, it is essential that boards operate effectively. Explores within the framework of corporate governance, the practical implications of board member roles. Drawing on experience of strategy formulation at board level, analyses and clarifies the roles, and presents recommendations to increase board effectiveness.
NASA Astrophysics Data System (ADS)
Xi, Huixing
2017-03-01
With the continuous development of network technology and the rapid spread of the Internet, computer networks have been around the world every corner. However, the network attacks frequently occur. The ARP protocol vulnerability is one of the most common vulnerabilities in the TCP / IP four-layer architecture. The network protocol vulnerabilities can lead to the intrusion and attack of the information system, and disable or disable the normal defense function of the system [1]. At present, ARP spoofing Trojans spread widely in the LAN, the network security to run a huge hidden danger, is the primary threat to LAN security. In this paper, the author summarizes the research status and the key technologies involved in ARP protocol, analyzes the formation mechanism of ARP protocol vulnerability, and analyzes the feasibility of the attack technique. Based on the summary of the common defensive methods, the advantages and disadvantages of each defense method. At the same time, the current defense method is improved, and the advantage of the improved defense algorithm is given. At the end of this paper, the appropriate test method is selected and the test environment is set up. Experiment and test are carried out for each proposed improved defense algorithm.
Trust and risk: a model for medical education.
Damodaran, Arvin; Shulruf, Boaz; Jones, Philip
2017-09-01
Health care delivery, and therefore medical education, is an inherently risky business. Although control mechanisms, such as external audit and accreditation, are designed to manage risk in clinical settings, another approach is 'trust'. The use of entrustable professional activities (EPAs) represents a deliberate way in which this is operationalised as a workplace-based assessment. Once engaged with the concept, clinical teachers and medical educators may have further questions about trust. This narrative overview of the trust literature explores how risk, trust and control intersect with current thinking in medical education, and makes suggestions for potential directions of enquiry. Beyond EPAs, the importance of trust in health care and medical education is reviewed, followed by a brief history of trust research in the wider literature. Interpersonal and organisational levels of trust and a model of trust from the management literature are used to provide the framework with which to decipher trust decisions in health care and medical education, in which risk and vulnerability are inherent. In workplace learning and assessment, the language of 'trust' may offer a more authentic and practical vocabulary than that of 'competency' because clinical and professional risks are explicitly considered. There are many other trust relationships in health care and medical education. At the most basic level, it is helpful to clearly delineate who is the trustor, the trustee, and for what task. Each relationship has interpersonal and organisational elements. Understanding and considered utilisation of trust and control mechanisms in health care and medical education may lead to systems that maturely manage risk while actively encouraging trust and empowerment. © 2017 John Wiley & Sons Ltd and The Association for the Study of Medical Education.
Liao, Qiuyan; Cowling, Benjamin J; Lam, Wendy Wing Tak; Fielding, Richard
2011-06-01
Understanding population responses to influenza helps optimize public health interventions. Relevant theoretical frameworks remain nascent. To model associations between trust in information, perceived hygiene effectiveness, knowledge about the causes of influenza, perceived susceptibility and worry, and personal hygiene practices (PHPs) associated with influenza. Cross-sectional household telephone surveys on avian influenza A/H5N1 (2006) and pandemic influenza A/H1N1 (2009) gathered comparable data on trust in formal and informal sources of influenza information, influenza-related knowledge, perceived hygiene effectiveness, worry, perceived susceptibility, and PHPs. Exploratory factor analysis confirmed domain content while confirmatory factor analysis was used to evaluate the extracted factors. The hypothesized model, compiled from different theoretical frameworks, was optimized with structural equation modelling using the A/H5N1 data. The optimized model was then tested against the A/H1N1 dataset. The model was robust across datasets though corresponding path weights differed. Trust in formal information was positively associated with perceived hygiene effectiveness which was positively associated with PHPs in both datasets. Trust in formal information was positively associated with influenza worry in A/H5N1 data, and with knowledge of influenza cause in A/H1N1 data, both variables being positively associated with PHPs. Trust in informal information was positively associated with influenza worry in both datasets. Independent of information trust, perceived influenza susceptibility associated with influenza worry. Worry associated with PHPs in A/H5N1 data only. Knowledge of influenza cause and perceived PHP effectiveness were associated with PHPs. Improving trust in formal information should increase PHPs. Worry was significantly associated with PHPs in A/H5N1.
Direct trust-based security scheme for RREQ flooding attack in mobile ad hoc networks
NASA Astrophysics Data System (ADS)
Kumar, Sunil; Dutta, Kamlesh
2017-06-01
The routing algorithms in MANETs exhibit distributed and cooperative behaviour which makes them easy target for denial of service (DoS) attacks. RREQ flooding attack is a flooding-type DoS attack in context to Ad hoc On Demand Distance Vector (AODV) routing protocol, where the attacker broadcasts massive amount of bogus Route Request (RREQ) packets to set up the route with the non-existent or existent destination in the network. This paper presents direct trust-based security scheme to detect and mitigate the impact of RREQ flooding attack on the network, in which, every node evaluates the trust degree value of its neighbours through analysing the frequency of RREQ packets originated by them over a short period of time. Taking the node's trust degree value as the input, the proposed scheme is smoothly extended for suppressing the surplus RREQ and bogus RREQ flooding packets at one-hop neighbours during the route discovery process. This scheme distinguishes itself from existing techniques by not directly blocking the service of a normal node due to increased amount of RREQ packets in some unusual conditions. The results obtained throughout the simulation experiments clearly show the feasibility and effectiveness of the proposed defensive scheme.
Myths and Legends of the New York Iroquois. Museum Bulletin 125.
ERIC Educational Resources Information Center
Converse, Harriet Maxwell
1974-01-01
Adopted for 22 years into the Seneca nation, Harriet Maxwell Converse devoted much of her life to the study and defense of the Indians of New York. The position of friendship and trust she enjoyed enabled her to record extensive information on the customs and institutions of the Iroquois. Material for this volume was taken from her notes found…
Defense AT and L. Volume 38, Number 2
2009-04-01
trust of running the business or doing their job in the hands of employees, and allows a greater degree of autonomy (think Warren Buffet ). This can...Reserve Air Fleet and Voluntary Intermodal Sealift Agreement. Financial accountability for all its missions is extremely important, as the funds for...cutting-edge responsiveness. Your Dollars, Spent Responsibly Establishing Stronger Financial Accountability Alan “Keith” Bentley, USTRANSCOM
2014-10-01
maneuver • Traditional “ Brick and Mortar ” training models – Difficult to train regularly due to logistics/budget restrictions – Doesn’t scale...complexity, scenario, location , and resources available • Scalable 4-cell planning construct – Exercise Control (White Cell) – Threat Emulation (Red...business impact) • Collaborative effort Trusted Agents ( SMEs ) – Threats – Cyber defense capabilities – Policies and procedures – Project and/or
Moral Competence for the Joint Warfighter: The Missing Element in Defense Transformation
2006-06-01
warriors. Further, it argues that through a combination of benign neglect and intentional acquiescence, the Services have undermined their own ethical ...initiate a Joint Ethical Transformation Campaign to improve moral competence and ethical cultures within all of the Services...21 Demand for Moral Skill Joint Values in Joint Warfare Challenging Ethical Environment Special Trust Avoiding the Worst Possible Outcome
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lee, Adam J.; Perano, Kenneth J.
In trust negotiation, resource providers specify access control policies in terms of the attributes that should be possessed by authorized users, rather than the identities of these users. Users can prove ownership of certain attributes through the use of digital credentials issued by trusted entities. For example, the Department of Motor Vehicles might issue vehicle owners X.509 driver's licenses that can be used to demonstrate proof of their current age, address, or ability to drive. These types of digital credentials may also be protected by user-specified policies controlling their release to remote parties; for example, Alice might only be willingmore » to show her VISA card credential to members of the Better Business Bureau. In this way, a request to access a given resource can result in a bilateral and iterative exchange of policies and credentials that represents a negotiation between the participating parties. To date, research interest in trust negotiation has been primarily theoretical and any implementations have been largely proofs of concept; experimenting with these prototypes is often not a straightforward task. TrustBuilder2 is a flexible framework for supporting research in the area trust negotiation protocols, designed to allow researchers to quickly prototype and experiment with various approaches to trust negotiation. In TrustBuilder2, the primary components of a trust negotiation system are represented using abstract interfaces.« less
The Price of Distrust: Trust, Anxious Attachment, Jealousy, and Partner Abuse
Rodriguez, Lindsey M.; DiBello, Angelo M.; Øverup, Camilla S.; Neighbors, Clayton
2017-01-01
Trust is essential to the development of healthy, secure, and satisfying relationships (Simpson, 2007a). Attachment styles provide a theoretical framework for understanding how individuals respond to partner behaviors that either confirm or violate trust (Hazan & Shaver, 1994). The current research aimed to identify how trust and attachment anxiety might interact to predict different types of jealousy and physical and psychological abuse. We expected that when experiencing lower levels of trust, anxiously attached individuals would report higher levels of both cognitive and behavioral jealousy as well as partner abuse perpetration. Participants in committed romantic relationships (N = 261) completed measures of trust, attachment anxiety and avoidance, jealousy, and physical and psychological partner abuse in a cross-sectional study. Moderation results largely supported the hypotheses: Attachment anxiety moderated the association between trust and jealousy, such that anxious individuals experienced much higher levels of cognitive and behavioral jealousy when reporting lower levels of trust. Moreover, attachment anxiety moderated the association between trust and nonphysical violence. These results suggest that upon experiencing distrust in one’s partner, anxiously attached individuals are more likely to become jealous, snoop through a partner’s belongings, and become psychologically abusive. The present research illustrates that particularly for anxiously attached individuals, distrust has cascading effects on relationship cognitions and behavior, and this should be a key area of discussion during therapy. PMID:28386379
Multilayer network decoding versatility and trust
NASA Astrophysics Data System (ADS)
Sarkar, Camellia; Yadav, Alok; Jalan, Sarika
2016-01-01
In the recent years, the multilayer networks have increasingly been realized as a more realistic framework to understand emergent physical phenomena in complex real-world systems. We analyze massive time-varying social data drawn from the largest film industry of the world under a multilayer network framework. The framework enables us to evaluate the versatility of actors, which turns out to be an intrinsic property of lead actors. Versatility in dimers suggests that working with different types of nodes are more beneficial than with similar ones. However, the triangles yield a different relation between type of co-actor and the success of lead nodes indicating the importance of higher-order motifs in understanding the properties of the underlying system. Furthermore, despite the degree-degree correlations of entire networks being neutral, multilayering picks up different values of correlation indicating positive connotations like trust, in the recent years. The analysis of weak ties of the industry uncovers nodes from a lower-degree regime being important in linking Bollywood clusters. The framework and the tools used herein may be used for unraveling the complexity of other real-world systems.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 6 2010-07-01 2010-07-01 false Concept. 989.2 Section 989.2 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ENVIRONMENTAL PROTECTION ENVIRONMENTAL IMPACT ANALYSIS PROCESS (EIAP) § 989.2 Concept. (a) This part provides a framework on how to comply with NEPA and...
A Training Framework for the Department of Defense Public Key Infrastructure
2001-09-01
and the growth of electronic commerce within the Department of Defense (DoD) has led to the development and implementation of the DoD Public Key...also grown within the Department of Defense. Electronic commerce and business to business transactions have become more commonplace and have
A Planetary Defense Gateway for Smart Discovery of relevant Information for Decision Support
NASA Technical Reports Server (NTRS)
Bambacus, Myra; Yang, Chaowei Phil; Leung, Ronald Y.; Barbee, Brent; Nuth, Joseph A.; Seery, Bernard; Jiang, Yongyao; Qin, Han; Li, Yun; Yu, Manzhu;
2017-01-01
A Planetary Defense Gateway for Smart Discovery of relevant Information for Decision Support presentation discussing background, framework architecture, current results, ongoing research, conclusions.
What are children's trusts? Early findings from a national survey.
Bachmann, M O; Reading, R; Husbands, C; O'Brien, M; Thoburn, J; Shemilt, I; Watson, J; Jones, N; Haynes, R; Mugford, M
2006-03-01
The Children Act 2004 and National Service Framework for Children, Young People and Maternity Services require fuller integration of health, education and social services for children and young people in England and Wales. The UK government supported the establishment of 35 experimental children's trust pathfinders (henceforth called children's trusts) in England. A questionnaire was completed by managers in all 35 children's trusts a year after their start. Children's trust documents were examined. Census and performance indicators were compared between children's trust areas and the rest of England. Children's trust areas had demographic and social characteristics typical of England. All children's trusts aimed to improve health, education and social services by greater managerial and service integration. All had boards representing the three sectors; other agencies' representation varied. Two-thirds of children's trusts had moved towards pooling budgets in at least some service areas. At this stage in their development, some had prioritized joint procurement or provision of services, with formal managerial structures, while others favoured an informal strategic planning, co-ordination and information sharing approach. The commonest priorities for services development were for disabled children (16 children's trusts), followed by early intervention (11) and mental health services (8). The diverse strategies adopted by these 35 children's trusts during their first year is due to their own characteristics and to the way government strategy developed during this period. Whilst some prioritized organizational development, joint financing and commissioning, and information sharing, others laid more emphasis on mechanisms for bringing front-line professionals closer together. Their experiences are of value to others deciding how best to integrate children's services.
Handling of the demilitarized zone using service providers in SAP
NASA Astrophysics Data System (ADS)
Iovan, A.; Robu, R.
2016-02-01
External collaboration needs to allow data access from the Internet. In a trusted Internet collaboration scenario where the external user works on the same data like the internal user direct access to the data in the Intranet is required. The paper presents a solution to get access to certain data in the Enterprise Resource Planning system, having the User Interface on a system in the Demilitarized Zone and the database on a system which is located in the trusted area. Using the Service Provider Interface framework, connections between separate systems can be created in different areas of the network. The paper demonstrates how to connect the two systems, one in the Demilitarized Zone and one in the trusted area, using SAP ERP 6.0 with Enhancement Package 7. In order to use the Service Provider Interface SAP Business Suite Foundation component must be installed in both systems. The advantage of using the Service Provider Interface framework is that the external user works on the same data like the internal user (and not on copies). This assures data consistency and less overhead for backup and security systems.
2011-06-01
BEIS Business Enterprise Information Services BEP Business Enterprise Priorities BMMP Business Management Modernization Program BTA Business...Scorecard framework . Initially published in December 2005, the FIAR is the DoD’s strategy towards achieving audit readiness. The FIAR provides a timeline and...Secretary of Defense Comptroller, n.d.). The Balanced Scorecard, a strategic management framework developed in 1987 by Arthur Schneiderman and popularized
RAND Arroyo Center Annual Report 2009
2010-01-01
forces to transfer responsibility and authority to other entities outside the U.S. Department of Defense (DoD) at the tactical level. It recommended...SoSE principles and recommended how to use them to efficiently implement and integrate SoSE capability into the Army acquisition framework . Sponsored...exploring how the Department of Defense acquisition system can more rapidly develop, procure, and field effective C2 systems within the framework of
Davies, Julie; Sampson, Mark; Beesley, Frank; Smith, Debra; Baldwin, Victoria
2014-05-01
5 Boroughs Partnership NHS Foundation Trust, in the Northwest of England, has trained over 500 staff in the Knowledge and Understanding Framework, level 1 personality disorder awareness training. This is a 3-day nationally devised training programme delivered via an innovative co-production model (i.e. co-delivery and partnership working with service users who have lived experience). This paper provides quantitative and qualitative information on the effectiveness of training delivery and also serves to provide some insight into the impact of service-user involvement via such a co-production model. Information on 162 participants using the Knowledge and Understanding Framework bespoke questionnaire (Personality Disorder Knowledge, Attitudes and Skills Questionnaire) suggests that the training can be effectively delivered by and within a local NHS Mental Health Trust. Results immediately post-training suggest an improvement in levels of understanding and capability efficacy and a reduction in negative emotional reactions. Indications from a 3-month follow-up suggest that while understanding and emotional reaction remain improved, capability efficacy regresses back to pre-training levels, suggesting the need for ongoing supervision and/or support to consolidate skills. Discussion includes guidelines for the implementation of a truly integrated co-production model of training provision, as well as advice relating to the maximization of long-term benefits. Copyright © 2014 John Wiley & Sons, Ltd.
Kovacs, Izabella; Durner, Jörg; Lindermayr, Christian
2015-11-01
Nitric oxide (NO) is a ubiquitous signaling molecule involved in a wide range of physiological and pathophysiological processes in animals and plants. Although its significant influence on plant immunity is well known, information about the exact regulatory mechanisms and signaling pathways involved in the defense response to pathogens is still limited. We used genetic, biochemical, pharmacological approaches in combination with infection experiments to investigate the NO-triggered salicylic acid (SA)-dependent defense response in Arabidopsis thaliana. The NO donor S-nitrosoglutathione (GSNO) promoted the nuclear accumulation of NONEXPRESSOR OF PATHOGENESIS-RELATED GENES 1 (NPR1) protein accompanied by an elevated SA concentration and the activation of pathogenesis-related (PR) genes, leading to induced resistance of A. thaliana against Pseudomonas infection. Moreover, NO induced a rapid change in the glutathione status, resulting in increased concentrations of glutathione, which is required for SA accumulation and activation of the NPR1-dependent defense response. Our data imply crosstalk between NO and glutathione, which is integral to the NPR1-dependent defense signaling pathway, and further demonstrate that glutathione is not only an important cellular redox buffer but also a signaling molecule in the plant defense response. © 2015 The Authors. New Phytologist © 2015 New Phytologist Trust.
Review of "Stuck Schools: A Framework for Identifying Schools Where Students Need Change--Now"
ERIC Educational Resources Information Center
Lee, Jaekyung
2010-01-01
The Education Trust research report "Stuck Schools" suggests a framework for identifying chronically low-performing schools in need of turnaround. The study uses Maryland and Indiana to show that some low-performing schools make progress while others remain stagnant. The report has four serious problems of reliability and validity,…
2012-08-01
Political Sci- ence Review, no. 30 (2009), 122–124, 130. 7 Mauricio Pazini Brandão, “Ciência, Tecnologia , Inovação e a Defesa Nacional,” 3ª Conferência...Nacional de Ciência, Tecnologia e Inovação, October 2005, 798, available at <http://cncti3.cgee.org. br/Documentos/Seminariosartigos/Areasinternacional
Multi-Objective Constraint Satisfaction for Mobile Robot Area Defense
2010-03-01
17 NSGA-II non-dominated sorting genetic algorithm II . . . . . . . . . . . . . . . . . . . 17 jMetal Metaheuristic Algorithms in...to alert the other agents and ensure trust in the system. This research presents an algorithm that tasks robots to meet the two specific goals of...problem is defined as a constraint satisfaction problem solved using the Non-dominated Sorting Genetic Algorithm II (NSGA-II). Both goals of
Incorporating Trust into Department of Defense Acquisition Risk Management
2014-09-01
Budget, Paperwork Reduction Project (0704–0188) Washington DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE September 2014 3. REPORT TYPE...Sydney, Australia. Paper published and archived, SETE Conference Proceedings. xviii Langford, Gary O. 2012. Engineering Systems Integration Theory...and knowledge on the subject were invaluable in keeping me focused and nudging me in the proper direction. This project would have been impossible
CrossTalk. The Journal of Defense Software Engineering. Volume 26, Number 5
2013-10-01
to a backend domain managed by the cyber criminal. Mobile bots can perform piggybacking on legitimate applications and steal data by controlling...technology infrastructure for managing identities, interfaces (web and/or mobile ), and agreements with service providers. The necessary capabilities and...platforms of unknown or dubious origin, global access by mobile (and largely insecure) devices, eroded trust boundaries, and the possibility of malevolent
Defense Industrial Personnel Security Clearance Review Program
1992-01-02
or on closed accounts. 5. Indication of deceit or deception in obtaining credit or bank accounts, misappropriation of funds, income tax evasion ...income tax evasion , expense account fraud, filing deceptive loan statements, and other intentional financial breaches of trust; (3) inability or...information; or any U.S. citizen nominated by the Red Cross or United Service Organizations for assignment with the Military Services overseas. The
Reynolds, Barbara; Quinn Crouse, Sandra
2008-10-01
During a crisis, an open and empathetic style of communication that engenders the public's trust is the most effective when officials are attempting to galvanize the population to take a positive action or refrain from a harmful act. Although trust is imperative in a crisis, public suspicions of scientific experts and government are increasing for a variety of reasons, including access to more sources of conflicting information, a reduction in the use of scientific reasoning in decision making, and political infighting. Trust and credibility--which are demonstrated through empathy and caring, competence and expertise, honesty and openness, and dedication and commitment--are essential elements of persuasive communication.
Elicitors and defense gene induction in plants with altered lignin compositions.
Gallego-Giraldo, Lina; Posé, Sara; Pattathil, Sivakumar; Peralta, Angelo Gabriel; Hahn, Michael G; Ayre, Brian G; Sunuwar, Janak; Hernandez, Jonathan; Patel, Monika; Shah, Jyoti; Rao, Xiaolan; Knox, J Paul; Dixon, Richard A
2018-06-27
A reduction in the lignin content in transgenic plants induces the ectopic expression of defense genes, but the importance of altered lignin composition in such phenomena remains unclear. Two Arabidopsis lines with similar lignin contents, but strikingly different lignin compositions, exhibited different quantitative and qualitative transcriptional responses. Plants with lignin composed primarily of guaiacyl units overexpressed genes responsive to oomycete and bacterial pathogen attack, whereas plants with lignin composed primarily of syringyl units expressed a far greater number of defense genes, including some associated with cis-jasmone-mediated responses to aphids; these plants exhibited altered responsiveness to bacterial and aphid inoculation. Several of the defense genes were differentially induced by water-soluble extracts from cell walls of plants of the two lines. Glycome profiling, fractionation and enzymatic digestion studies indicated that the different lignin compositions led to differential extractability of a range of heterogeneous oligosaccharide epitopes, with elicitor activity originating from different cell wall polymers. Alteration of lignin composition affects interactions with plant cell wall matrix polysaccharides to alter the sequestration of multiple latent defense signal molecules with an impact on biotic stress responses. © 2018 The Authors. New Phytologist © 2018 New Phytologist Trust.
2015-03-01
Defense DODAF Department of Defense Architecture Framework DOE design of experiment EMMI energy , mass, material wealth, information FNF fire and... energy or blast power (depending on the type of projectile). Tank munitions have significant penetrative ability and can cause serious damage to...survivability of ground combat vehicles during ground force maneuver operations. The simulation results indicated that the presence of air defense
2015-06-01
Stockholm International Peace Research Institute (SIPRI) yearbooks, published documents of EU governments, annual reports and studies , and others. The main...the framework of impact assessment. In this context, five studies were commissioned, in particular to collect more 48 quantitative information...military spending, in particular in the defense procurement and research and development areas, has been negatively affecting defense companies in
New Zealand Defense Policy Framework, A Strategic Reappraisal
2004-03-19
viii THE NEW ZEALAND DEFENSE POLICY FRAMEWORK – A STRATEGIC APPRAISAL What we demand is that the world be made fit and safe to live in. Woodrow Wilson...pressure on some governments and often results in armed conflict. The former Yugoslavia and Soviet Union stand out as prominent examples of the... demand access to the products, services and lifestyles that are evident in other nations. This is problematic for governments who set values and
Hendy, Jane; Fulop, Naomi; Reeves, Barnaby C; Hutchings, Andrew; Collin, Simon
2007-06-30
To describe progress and perceived challenges in implementing the NHS information and technology (IT) programme in England. Case studies and in-depth interviews, with themes identified using a framework developed from grounded theory. We interviewed personnel who had been interviewed 18 months earlier, or new personnel in the same posts. Four NHS acute hospital trusts in England. Senior trust managers and clinicians, including chief executives, directors of IT, medical directors, and directors of nursing. Interviewees unreservedly supported the goals of the programme but had several serious concerns. As before, implementation is hampered by local financial deficits, delays in implementing patient administration systems that are compliant with the programme, and poor communication between Connecting for Health (the agency responsible for the programme) and local managers. New issues were raised. Local managers cannot prioritise implementing the programme because of competing financial priorities and uncertainties about the programme. They perceive a growing risk to patients' safety associated with delays and a loss of integration of components of the programme, and are discontented with Choose and Book (electronic booking for referrals from primary care). We recommend that the programme sets realistic timetables for individual trusts and advises managers about interim IT systems they have to purchase because of delays outside their control. Advice needs to be mindful of the need for trusts to ensure longer term compatibility with the programme and value for money. Trusts need assistance in prioritising modernisation of IT by, for example, including implementation of the programme in the performance management framework. Even with Connecting for Health adopting a different approach of setting central standards with local implementation, these issues will still need to be addressed. Lessons learnt in the NHS have wider relevance as healthcare systems, such as in France and Australia, look to realise the potential of large scale IT modernisation.
Integrating Subjective Trust into Networked Infrastructures
2009-04-22
architectural framework for hexperimenting wit trust. • Use of semantic technologies incorporated into h b id b d t t t ta y r - ase rus managemen ...Language for Operation PI Persistent Identifier PILOW P i t t Id tifi T blers s en en er a es PINL Persistent Identifier Networking Layer SBIR Small...Investigate and propose an architecture to determine/measure and convey th t t l l f th i l t ie rus eve o e var ous e emen s n a distributed or
Building trust and diversity in patient-centered oncology clinical trials: An integrated model.
Hurd, Thelma C; Kaplan, Charles D; Cook, Elise D; Chilton, Janice A; Lytton, Jay S; Hawk, Ernest T; Jones, Lovell A
2017-04-01
Trust is the cornerstone of clinical trial recruitment and retention. Efforts to decrease barriers and increase clinical trial participation among diverse populations have yielded modest results. There is an urgent need to better understand the complex interactions between trust and clinical trial participation. The process of trust-building has been a focus of intense research in the business community. Yet, little has been published about trust in oncology clinical trials or the process of building trust in clinical trials. Both clinical trials and business share common dimensions. Business strategies for building trust may be transferable to the clinical trial setting. This study was conducted to understand and utilize contemporary thinking about building trust to develop an Integrated Model of Trust that incorporates both clinical and business perspectives. A key word-directed literature search of the PubMed, Medline, Cochrane, and Google Search databases for entries dated between 1 January 1985 and 1 September 2015 was conducted to obtain information from which to develop an Integrated Model of Trust. Successful trial participation requires both participants and clinical trial team members to build distinctly different types of interpersonal trust to effect recruitment and retention. They are built under conditions of significant emotional stress and time constraints among people who do not know each other and have never worked together before. Swift Trust and Traditional Trust are sequentially built during the clinical trial process. Swift trust operates during the recruitment and very early active treatment phases of the clinical trial process. Traditional trust is built over time and operates during the active treatment and surveillance stages of clinical trials. The Psychological Contract frames the participants' and clinical trial team members' interpersonal trust relationship. The "terms" of interpersonal trust are negotiated through the psychological contract. Contract renegotiation occurs in response to cyclical changes within the trust relationship throughout trial participation. The Integrated Model of Trust offers a novel framework to interrogate the process by which diverse populations and clinical trial teams build trust. To our knowledge, this is the first model of trust-building in clinical trials that frames trust development through integrated clinical and business perspectives. By focusing on the process, rather than outcomes of trust-building diverse trial participants, clinical trials teams, participants, and cancer centers may be able to better understand, measure, and manage their trust relationships in real time. Ultimately, this may foster increased recruitment and retention of diverse populations to clinical trials.
2015 National Agenda for Digital Stewardship
2014-09-01
tool and framework that explores the aspects of “benefit,” “risk,” “value,”’ “ quality ,” and “sustainability.” It is analyzing previous work on cost...evidence of the value of digital stewardship activities is needed. Improved and sharable metrics about the quality and success of digital stewardship...Significant Properties .................................. 38 5.3.4 Policy Research on Trust Frameworks
U.S. Army Military Police: The Force of Choice for Defense Support to Civil Authorities
2014-05-22
nearly identical to the qualifications and standards required for first responders and emergency managers. Additionally, within a military police...and first responders requires trust and a common professional language. Through the Police Officer Standards and Training program and Federal Law...away some of their own precious free time to review my work. The excellent research librarians at the Combined Arms Research Library were invaluable
Fabrication Security and Trust of Domain-Specific ASIC Processors
2016-10-30
embedded in the design. For example , an ASIC processor potentially has a 10-1,000X performance advantage over its FPGA and GPP counterparts, but...paper by summarizing our lessons learned from this project and suggests a few research directions. II. DOMAIN-SPECIFIC ASIC PROCESSORS As Figure 1 has...sponsored by the Assistant Secretary of Defense for Research & Engineering under Air Force Contract #FA8721-05-C-0002. Opinions, interpretations
Security Considerations For Network-Centric Weapon Systems
2009-09-01
who exploits some weakness in these protective measures and impersonates a trusted network member can gain the ability to reprogram the victim node to...permitting the attacker to conduct a small-scale reprogramming and insert malicious code such as viruses or worms (McClure, Scambray, and Kurtz 2005, 218...people requesting this information because of the subconscious assumption that everything will end well because it has in the past. Defense
NASA Astrophysics Data System (ADS)
Goodwin, M.; Pandya, R.; Udu-gama, N.; Wilkins, S.
2017-12-01
While one-size-fits all may work for most hats, it rarely does for communities. Research products, methods and knowledge may be usable at a local scale, but applying them often presents a challenge due to issues like availability, accessibility, awareness, lack of trust, and time. However, in an environment with diminishing federal investment in issues related climate change, natural hazards, and natural resource use and management, the ability of communities to access and leverage science has never been more urgent. Established, yet responsive frameworks and methods can help scientists and communities work together to identify and address specific challenges and leverage science to make a local impact. Through the launch of over 50 community science projects since 2013, the Thriving Earth Exchange (TEX) has created a living framework consisting of a set of milestones by which teams of scientists and community leaders navigate the challenges of working together. Central to the framework are context, trust, project planning and refinement, relationship management and community impact. We find that careful and respectful partnership management results in trust and an open exchange of information. Community science partnerships grounded in local priorities result in the development and exchange of stronger decision-relevant tools, resources and knowledge. This presentation will explore three methods TEX uses to apply its framework to community science partnerships: cohort-based collaboration, online dialogues, and one-on-one consultation. The choice of method should be responsive to a community's needs and working style. For example, a community may require customized support, desire the input and support of peers, or require consultation with multiple experts before deciding on a course of action. Knowing and applying the method of engagement best suited to achieve the community's objectives will ensure that the science is most effectively translated and applied.
Defense.gov Special Report: Law of the Sea Treaty
treaty. It is the bedrock legal instrument underpinning public order across the maritime domain. Defense United States. The convention sets forth a comprehensive legal framework governing uses of the oceans and
Can we trust what parents tell us? A systematic review.
Brand, Paul L P; van Dulmen, Sandra
2017-09-01
Taking a history is a key diagnostic instrument in paediatric consultations. Numerous issues potentially reduce the history's reliability. Therefore, paediatricians have always expressed ambivalence regarding history taking from parents, both valuing and distrusting it. In this review, we describe how parents build and present a description of their child's health issues in the conceptual framework of self-regulation theory. We performed a systematic review on the literature on the reliability of history taking. No studies examined the reliability of history taking from parents, but there is a considerable body of evidence on the issue of mutual trust in relationships between health care professionals and patients. Because trust is a dynamic relational phenomenon, taking a patient centred approach in consultations is likely to increase the patients' and parents' trust in the health care professional, and their willingness to follow the health care professional's treatment proposals. We provide evidence based recommendations on how to build and maintain trust in paediatric consultations by taking a patient centred approach in such consultations. Copyright © 2017. Published by Elsevier Ltd.
Utopia Providing Trusted Social Network Relationships within an Un-trusted Environment
NASA Astrophysics Data System (ADS)
Gauvin, William; Liu, Benyuan; Fu, Xinwen; Wang, Jie
This paper introduces an unobtrusive method and distributed solution set to aid users of on-line social networking sites, by creating a trusted environment in which every member has the ability to identify each other within their private social network by name, gender, age, location, and the specific usage patterns adopted by the group. Utopia protects members by understanding how the social network is created and the specific aspects of the group that make it unique and identifiable. The main focus of Utopia is the protection of the group, and their privacy within a social network from predators and spammers that characteristically do not fit within the well defined usage boundaries of the social network as a whole. The solution set provides defensive, as well as offensive tools to identify these threats. Once identified, client desktop tools are used to prevent these predators from further interaction within the group. In addition, offensive tools are used to determine the origin of the predator to allow actions to be taken by automated tools and law enforcement to alleviate the threat.
Guo, Ping; Wang, Jin; Ji, Sai; Geng, Xue Hua; Xiong, Neal N
2015-12-01
With the pervasiveness of smart phones and the advance of wireless body sensor network (BSN), mobile Healthcare (m-Healthcare), which extends the operation of Healthcare provider into a pervasive environment for better health monitoring, has attracted considerable interest recently. However, the flourish of m-Healthcare still faces many challenges including information security and privacy preservation. In this paper, we propose a secure and privacy-preserving framework combining with multilevel trust management. In our scheme, smart phone resources including computing power and energy can be opportunistically gathered to process the computing-intensive PHI (personal health information) during m-Healthcare emergency with minimal privacy disclosure. In specific, to leverage the PHI privacy disclosure and the high reliability of PHI process and transmission in m-Healthcare emergency, we introduce an efficient lightweight encryption for those users whose trust level is low, which is based on mix cipher algorithms and pair of plain text and cipher texts, and allow a medical user to decide who can participate in the opportunistic computing to assist in processing his overwhelming PHI data. Detailed security analysis and simulations show that the proposed framework can efficiently achieve user-centric privacy protection in m-Healthcare system.
Cyber Security Research Frameworks For Coevolutionary Network Defense
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rush, George D.; Tauritz, Daniel Remy
Several architectures have been created for developing and testing systems used in network security, but most are meant to provide a platform for running cyber security experiments as opposed to automating experiment processes. In the first paper, we propose a framework termed Distributed Cyber Security Automation Framework for Experiments (DCAFE) that enables experiment automation and control in a distributed environment. Predictive analysis of adversaries is another thorny issue in cyber security. Game theory can be used to mathematically analyze adversary models, but its scalability limitations restrict its use. Computational game theory allows us to scale classical game theory to larger,more » more complex systems. In the second paper, we propose a framework termed Coevolutionary Agent-based Network Defense Lightweight Event System (CANDLES) that can coevolve attacker and defender agent strategies and capabilities and evaluate potential solutions with a custom network defense simulation. The third paper is a continuation of the CANDLES project in which we rewrote key parts of the framework. Attackers and defenders have been redesigned to evolve pure strategy, and a new network security simulation is devised which specifies network architecture and adds a temporal aspect. We also add a hill climber algorithm to evaluate the search space and justify the use of a coevolutionary algorithm.« less
A paradigm for understanding trust and mistrust in medical research: The Community VOICES study.
Smirnoff, M; Wilets, I; Ragin, D F; Adams, R; Holohan, J; Rhodes, R; Winkel, G; Ricci, E M; Clesca, C; Richardson, L D
2018-01-01
To promote justice in research practice and rectify health disparities, greater diversity in research participation is needed. Lack of trust in medical research is one of the most significant obstacles to research participation. Multiple variables have been identified as factors associated with research participant trust/mistrust. A conceptual model that provides meaningful insight into the interplay of factors impacting trust may promote more ethical research practice and provide an enhanced, actionable understanding of participant mistrust. A structured survey was developed to capture attitudes toward research conducted in emergency situations; this article focuses on items designed to assess respondents' level of trust or mistrust in medical research in general. Community-based interviews were conducted in English or Spanish with 355 New York City residents (white 42%, African American 29%, Latino 22%). Generally favorable attitudes toward research were expressed by a majority (85.3%), but many respondents expressed mistrust. Factor analysis yielded four specific domains of trust/mistrust, each of which was associated with different demographic variables: general trustworthiness (older age, not disabled); perceptions of discrimination (African American, Latino, Spanish language preference); perceptions of deception (prior research experience, African American); and perceptions of exploitation (less education). The four domains identified in the analysis provide a framework for understanding specific areas of research trust/mistrust among disparate study populations. This model offers a conceptual basis for the design of tailored interventions that target specific groups to promote trust of individual researchers and research institutions as well as to facilitate broader research participation.
Bonner, Gloria; Williams, Sharon; Wilkie, Diana; Hart, Alysha; Burnett, Glenda; Peacock, Geraldine
2017-12-01
An initial and vital important step in recruiting participants for church-based hospice and palliative care research is the establishment of trust and credibility within the church community. Mistrust of medical research is an extremely important barrier hindering recruitment in African American (AA) communities. A church-based EOL dementia education project is currently being conducted at four large urban AA churches. Church leaders voiced mistrust concerns of previous researchers who conducted investigations in their faith-based institutions. We explored strategies to ameliorate the mistrust concerns. Specific aim: To identify trust-rebuilding elements for researchers following others who violated trust of AA church leaders. Face-to-face, in-depth interviews were conducted from a convenient sample of four established AA church leaders. Interviews were held in the informants' churches to promote candor and comfort in revealing sensitive information about trust /mistrust. Content analysis framework was used to analyze the data. Elements identified from the analysis were then used to create themes. Multidimensional overarching themes emerged from the analysis included: Experience with researchers (positive and extremely negative), violation of trust and trust building strategies. Findings suggest that researchers who wish to conduct successful studies in the AA religious institutions must implement trust rebuilding strategies that include mutual respect, collaboration and partnership building. If general moral practices continue to be violated, threat to future hospice and palliative care research within the institutions may prevail. Thus, potential benefits are thwarted for the church members, AA community, and advancement of EOL care scholarship.
Macroevolution of plant defenses against herbivores in the evening primroses.
Johnson, Marc T J; Ives, Anthony R; Ahern, Jeffrey; Salminen, Juha-Pekka
2014-07-01
Plant species vary greatly in defenses against herbivores, but existing theory has struggled to explain this variation. Here, we test how phylogenetic relatedness, tradeoffs, trait syndromes, and sexual reproduction affect the macroevolution of defense. To examine the macroevolution of defenses, we studied 26 Oenothera (Onagraceae) species, combining chemistry, comparative phylogenetics and experimental assays of resistance against generalist and specialist herbivores. We detected dozens of phenolic metabolites within leaves, including ellagitannins (ETs), flavonoids, and caffeic acid derivatives (CAs). The concentration and composition of phenolics exhibited low to moderate phylogenetic signal. There were clear negative correlations between multiple traits, supporting the prediction of allocation tradeoffs. There were also positively covarying suites of traits, but these suites did not strongly predict resistance to herbivores and thus did not act as defensive syndromes. By contrast, specific metabolites did correlate with the performance of generalist and specialist herbivores. Finally, that repeated losses of sex in Oenothera was associated with the evolution of increased flavonoid diversity and altered phenolic composition. These results show that secondary chemistry has evolved rapidly during the diversification of Oenothera. This evolution has been marked by allocation tradeoffs between traits, some of which are related to herbivore performance. The repeated loss of sex appears also to have constrained the evolution of plant secondary chemistry, which may help to explain variation in defense among plants. © 2014 The Authors. New Phytologist © 2014 New Phytologist Trust.
Bentz, Barbara J; Hood, Sharon M; Hansen, E Matthew; Vandygriff, James C; Mock, Karen E
2017-01-01
Mountain pine beetle (MPB, Dendroctonus ponderosae) is a significant mortality agent of Pinus, and climate-driven range expansion is occurring. Pinus defenses in recently invaded areas, including high elevations, are predicted to be lower than in areas with longer term MPB presence. MPB was recently observed in high-elevation forests of the Great Basin (GB) region, North America. Defense and susceptibility in two long-lived species, GB bristlecone pine (Pinus longaeva) and foxtail pine (P. balfouriana), are unclear, although they are sympatric with a common MPB host, limber pine (P. flexilis). We surveyed stands with sympatric GB bristlecone-limber pine and foxtail-limber pine to determine relative MPB attack susceptibility and constitutive defenses. MPB-caused mortality was extensive in limber, low in foxtail and absent in GB bristlecone pine. Defense traits, including constitutive monoterpenes, resin ducts and wood density, were higher in GB bristlecone and foxtail than in limber pine. GB bristlecone and foxtail pines have relatively high levels of constitutive defenses which make them less vulnerable to climate-driven MPB range expansion relative to other high-elevation pines. Long-term selective herbivore pressure and exaptation of traits for tree longevity are potential explanations, highlighting the complexity of predicting plant-insect interactions under climate change. No claim to original US Government works. New Phytologist © 2016 New Phytologist Trust.
A data protection framework for trans-European genetic research projects.
Claerhout, Brecht; Forgó, Nikolaus; Krügel, Tina; Arning, Marian; De Moor, Georges
2008-01-01
The paper proposes a data protection framework for trans-European medical research projects, which is based on a technical security infrastructure as well as on organizational measures and contractual obligations. It mainly relies on pseudonymization, an internal Data Protection Authority and on a Trusted Third Party. The outcome is an environment that combines both good research conditions and an extensive protection of patients' privacy.
2010-01-01
Background Through the nearly three decades that have passed since the Alma Ata conference on Primary Health Care, a wide range of global health initiatives and ideas have been advocated to improve the health of people living in developing countries. The issues raised in the Primary Health Care concept, the Structural Adjustment Programmes and the Health Sector Reforms have all influenced health service delivery. Increasingly however, health systems in developing countries are being described as having collapsed Do the advocated frameworks contribute to this collapse through not adequately including population trust as a determinant of the revival of health services, or are they primarily designed to satisfy the values of other actors within the health care system? This article argues there is an urgent need to challenge common thinking on health care provision under extreme resource scarcity. Methods This article sets out to discuss and analyze the described collapse of health services through a brief case study on provision of Emergency Obstetric Care in Northern Tanzania. Results The article argues that post the Alma Ata conference on Primary Health Care developments in global health initiatives have not been successful in incorporating population trust into the frameworks, instead focusing narrowly on expert-driven solutions through concepts such as prevention and interventions. The need for quantifiable results has pushed international policy makers and donors towards vertical programmes, intervention approaches, preventive services and quantity as the coverage parameter. Health systems have consequently been pushed away from generalized horizontal care, curative services and quality assurance, all important determinants of trust. Conclusions Trust can be restored, and to further this objective a new framework is proposed placing generalized services and individual curative care in the centre of the health sector policy domain. Preventive services are important, but should increasingly be handled by other sectors in a service focused health care system. To facilitate such a shift in focus we should acknowledge that limited resources are available and accept the conflict between population demand and expert opinion, with the aim of providing legitimate, accountable and trustworthy services through fair, deliberative, dynamic and incremental processes. A discussion of the acceptable level of quality, given the available resources, can then be conducted. The article presents for debate that an increased focus on quality and accountability to secure trust is an important precondition for enabling the political commitment to mobilize necessary resources to the health sector. PMID:20500857
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jenkins-Smith, Hank C.; Silva, Carol L.; Gupta, Kuhika
This report presents the questions and responses to a nationwide survey taken June 2016 to track preferences of US residents concerning the environment, energy, and radioactive waste management. A focus of the 2016 survey is public perceptions on different options for managing spent nuclear fuel, including on-site storage, interim storage, deep boreholes, general purpose geologic repositories, and geologic repositories for only defense-related waste. Highlights of the survey results include the following: (1) public attention to the 2011 accident and subsequent cleanup at the Fukushima nuclear facility continues to influence the perceived balance of risk and benefit for nuclear energy; (2)more » the incident at the Waste Isolation Pilot Plant in 2014 could influence future public support for nuclear waste management; (3) public knowledge about US nuclear waste management policies has remined higher than seen prior to the Fukushima nuclear accident and submittal of the Yucca Mountain application; (6) support for a mined disposal facility is higher than for deep borehole disposal, building one more interim storage facilities, or continued on-site storage of spent nuclear fuel; (7) support for a repository that comingles commercial and defense related waste is higher than for a repository for only defense related waste; (8) the public’s level of trust accorded to the National Academies, university scientists, and local emergency responders is the highest and the level trust accorded to advocacy organizations, public utilities, and local/national press is the lowest; and (9) the public is willing to serve on citizens panels but, in general, will only modestly engage in issues related to radioactive waste management.« less
Target of rapamycin signaling orchestrates growth-defense trade-offs in plants.
De Vleesschauwer, David; Filipe, Osvaldo; Hoffman, Gena; Seifi, Hamed Soren; Haeck, Ashley; Canlas, Patrick; Van Bockhaven, Jonas; De Waele, Evelien; Demeestere, Kristof; Ronald, Pamela; Hofte, Monica
2018-01-01
Plant defense to microbial pathogens is often accompanied by significant growth inhibition. How plants merge immune system function with normal growth and development is still poorly understood. Here, we investigated the role of target of rapamycin (TOR), an evolutionary conserved serine/threonine kinase, in the plant defense response. We used rice as a model system and applied a combination of chemical, genetic, genomic and cell-based analyses. We demonstrate that ectopic expression of TOR and Raptor (regulatory-associated protein of mTOR), a protein previously demonstrated to interact with TOR in Arabidopsis, positively regulates growth and development in rice. Transcriptome analysis of rice cells treated with the TOR-specific inhibitor rapamycin revealed that TOR not only dictates transcriptional reprogramming of extensive gene sets involved in central and secondary metabolism, cell cycle and transcription, but also suppresses many defense-related genes. TOR overexpression lines displayed increased susceptibility to both bacterial and fungal pathogens, whereas plants with reduced TOR signaling displayed enhanced resistance. Finally, we found that TOR antagonizes the action of the classic defense hormones salicylic acid and jasmonic acid. Together, these results indicate that TOR acts as a molecular switch for the activation of cell proliferation and plant growth at the expense of cellular immunity. © 2017 The Authors. New Phytologist © 2017 New Phytologist Trust.
Miao, Min; Niu, Xiangli; Kud, Joanna; Du, Xinran; Avila, Julian; Devarenne, Timothy P; Kuhl, Joseph C; Liu, Yongsheng; Xiao, Fangming
2016-07-01
We recently identified a defense-related tomato (Solanum lycopersicum) NAC (NAM, ATAF1,2, CUC2) transcription factor, NAC1, that is subjected to ubiquitin-proteasome system-dependent degradation in plant cells. In this study, we identified a tomato ubiquitin ligase (termed SEVEN IN ABSENTIA3; SINA3) that ubiquitinates NAC1, promoting its degradation. We conducted coimmunoprecipitation and bimolecular fluorescence complementation to determine that SINA3 specifically interacts with the NAC1 transcription factor in the nucleus. Moreover, we found that SINA3 ubiquitinates NAC1 in vitro and promotes NAC1 degradation via polyubiquitination in vivo, indicating that SINA3 is a ubiquitin ligase that ubiquitinates NAC1, promoting its degradation. Our real-time PCR analysis indicated that, in contrast to our previous finding that NAC1 mRNA abundance increases upon Pseudomonas infection, the SINA3 mRNA abundance decreases in response to Pseudomonas infection. Moreover, using Agrobacterium-mediated transient expression, we found that overexpression of SINA3 interferes with the hypersensitive response cell death triggered by multiple plant resistance proteins. These results suggest that SINA3 ubiquitinates a defense-related NAC transcription factor for degradation and plays a negative role in defense signaling. © 2016 The Authors. New Phytologist © 2016 New Phytologist Trust.
Berrabah, Fathi; Balliau, Thierry; Aït-Salem, El Hosseyn; George, Jeoffrey; Zivy, Michel; Ratet, Pascal; Gourion, Benjamin
2018-04-18
Massive intracellular populations of symbiotic bacteria, referred to as rhizobia, are housed in legume root nodules. Little is known about the mechanisms preventing the development of defense in these organs although genes such as SymCRK and DNF2 of the model legume Medicago truncatula are required for this control after rhizobial internalization in host nodule cells. Here we investigated the molecular basis of the symbiotic control of immunity. Proteomic analysis was performed to compare functional (wild-type) and defending nodules (symCRK). Based on the results, the control of plant immunity during the functional step of the symbiosis was further investigated by biochemical and pharmacological approaches as well as by transcript and histology analysis. Ethylene was identified as a potential signal inducing plant defenses in symCRK nodules. Involvement of this phytohormone in symCRK and dnf2-developed defenses and in the death of intracellular rhizobia was confirmed. This negative effect of ethylene depended on the M. truncatula sickle gene and was also observed in the legume Lotus japonicus. Together, these data indicate that prevention of ethylene-triggered defenses is crucial for the persistence of endosymbiosis and that the DNF2 and SymCRK genes are required for this process. © 2018 CNRS New Phytologist © 2018 New Phytologist Trust.
Iowa pavement asset management decision-making framework : [tech transfer summary].
DOT National Transportation Integrated Search
2015-10-01
A structured framework and tool that can reflect local requirements, : practices, and operational conditions would greatly assist local : agencies in making consistent and defensible pavement treatment : selection decisions.
NASA Astrophysics Data System (ADS)
Belkadi, Farouk; Messaadia, Mourad; Bernard, Alain; Baudry, David
2017-08-01
Due to the increased competitiveness and the diversity of requirements in today's markets, manufacturing companies need to join their competencies and resources to propose innovative solutions for each specific market, with the possibility to transpose these solutions to another market, by means of slight adaptations. Thus, manufacturing firms must constantly conduct new collaborations with known partners in most cases, but also with new partners. The critical question for managers in this latter case is how to define the best collaborative strategy according to the goals of the project and the specificity of the target market. This paper tackles the problem by proposing a conceptual framework for supporting the management of collaborative situations in the case of Original equipment manufacturers (OEMs). Based on the concept of trust level, the framework proposes a classification of different collaboration modes to be adopted in various contexts of inter-enterprise relationships, in manufacturing sector. The aim is to support the flexible navigation between different collaborative situations by taking into account all decision-making levels from the strategy to the implementation of the information technologies (IT) systems at the operational level.
The Charitable Trust Model: An Alternative Approach For Department Of Defense Accounting
2016-12-01
Constitution declares, “No Money shall be drawn from the Treasury, but in Consequence of Appropriations made by Law; and a regular Statement and Account...of all public Money shall be published from time to time” (U.S. Const. art. I, § 9). This provision represents the basis for federal financial... money . In the 200 years since the founders established this nation, various statutes have subsequently mandated additional accounting and reporting
SHAMROCK: A Synthesizable High Assurance Cryptography and Key Management Coprocessor
2016-11-01
and excluding devices from a communicating group as they become trusted, or untrusted. An example of using rekeying to dynamically adjust group...algorithms, such as the Elliptic Curve Digital Signature Algorithm (ECDSA), work by computing a cryptographic hash of a message using, for example , the...material is based upon work supported by the Assistant Secretary of Defense for Research and Engineering under Air Force Contract No. FA8721- 05-C
Results of SEI Independent Research and Development Projects
2011-02-01
ft’s Bit- poten- hout a ut de- r for CMU/SEI-2011-TR-002 | 8 more systems to install them. The implication to the Department of Defense and...Computing, June 2011. 2.7.1 Bibliography Challener, David; Yoder, K.; Catherman, R .; Saford, D.; & Van Doom, L. A Practical Guide to Trusted...number of publications and presentations: Brown, N.; Nord, R .; & Ozkaya, I. “Enabling Agility Through Architecture.” CrossTalk 23, 6 (November
Metrics for TRUST in Integrated Circuits
2008-06-01
metrics; Trojan ; detection Introduction In the Defense Science Board report, “DSB Task Force on High Performance Microchip Supply” [1] several...BETAINV C m M m= − + − + Where Ptd | lower is a lower bound on Ptd with confidence C, m is the number of detected Trojan transistors, and M is the...total number of Trojan transistors. From this relationship, in order to establish Ptd = 90% at 90% confidence on a single test article, we must
Nelson, James Lindemann
2011-01-01
Mary Ann Meeker's article admirably reminds readers that family members are involved in--or "responsively manage"--the care of relatives with severe illness in ways that run considerably beyond the stereotypes at play in many bioethical discussions of advance directives. Her observations thus make thinking about the role of families in healthcare provision more adequate to the facts, and this is an important contribution. There's reason to be worried, however, that one explicit aim of the article--to ease the standing anxieties that many clinicians and ethicists have about the reliability of family members as proxy decision makers--will be frustrated by its very success. Those already inclined to suspicion may tend to think that the more intricate and pervasive the ways in which families influence the healthcare decision making of their sick, the more chances they have for altering the connection between patients' interests and the actions of professional providers. To determine whether and when such alterations are something to be concerned about, we'll need to supplement a better grasp of the pertinent facts with a deeper sense of how human agency works and why we value it. We may also need some reminders about the defensibility of diverse moral understandings. Although both professionals and family members may profess an ethic that sets patients' interests above those of non-patients--as Meeker's own results suggest--any strict allegiance to such a framework may be more notional than normative--as her findings also hint. The actual working norms (among professionals, as well as within families) will likely be more complex, but not necessarily any the less defensible for that.
Cell-autonomous defense, re-organization and trafficking of membranes in plant-microbe interactions.
Dörmann, Peter; Kim, Hyeran; Ott, Thomas; Schulze-Lefert, Paul; Trujillo, Marco; Wewer, Vera; Hückelhoven, Ralph
2014-12-01
Plant cells dynamically change their architecture and molecular composition following encounters with beneficial or parasitic microbes, a process referred to as host cell reprogramming. Cell-autonomous defense reactions are typically polarized to the plant cell periphery underneath microbial contact sites, including de novo cell wall biosynthesis. Alternatively, host cell reprogramming converges in the biogenesis of membrane-enveloped compartments for accommodation of beneficial bacteria or invasive infection structures of filamentous microbes. Recent advances have revealed that, in response to microbial encounters, plasma membrane symmetry is broken, membrane tethering and SNARE complexes are recruited, lipid composition changes and plasma membrane-to-cytoskeleton signaling is activated, either for pre-invasive defense or for microbial entry. We provide a critical appraisal on recent studies with a focus on how plant cells re-structure membranes and the associated cytoskeleton in interactions with microbial pathogens, nitrogen-fixing rhizobia and mycorrhiza fungi. © 2014 The Authors. New Phytologist © 2014 New Phytologist Trust.
2017-01-18
cu.ac.jp Period of Performance: September/30/2014– September/30/2016 Abstract: Traditionally, a team has been defined as a group of people that...INTRODUCTION Traditionally, a team has been defined as a group of people that meet face-to-face to achieve a common goal. Yet the past two decades have...are conducive to developing trust quickly in the absence of a strong “in- group .” GVTs working for MNCs are also assembled differently from
Competitive strategy for providers.
Hackett, M C
1996-01-01
National Health Service (NHS) Trusts are struggling to determine a long-term strategic direction for their organizations in response to the competitive pressures generated by the NHS reforms. The development of long-term strategic direction and the methods to implement this are presenting real challenges to the Trusts which have inherited service configurations based on bureaucratic planning frameworks rather than service configurations suited to a more competitive environment. Examines the strategic choices available to these organizations; explores the importance of identifying positive strategic choices; and discusses the advantages and disadvantages in the context of the NHS internal market.
Tribal Air Grants Framework - Menu of Options
Tool to assist tribes that apply for CAA funding to draft moreeffective work plans for projects that will develop tribal knowledge of air quality issues andbuild tribal expertise to manage air quality on reservations and tribal trust land
Jardine, Cynthia G; Banfield, Laura; Driedger, S Michelle; Furgal, Christopher M
2013-01-01
The development and implementation of a remediation plan for the residual arsenic trioxide stored at the former Giant Mine site in the Canadian Northwest Territories has raised important issues related to trust. Social and individual trust of those responsible for making decisions on risks is critically important in community judgements on risk and the acceptability of risk management decisions. Trust is known to be affected by value similarity and confidence in past performance, which serve as interacting sources of cooperation in acting toward a common goal. To explore the elements of trust associated with the development and implementation of the Giant Mine Remediation Plan. Semi-structured interviews were conducted with eight purposively selected key informants representing both various interested and affected parties and the two government proponents. Five primary issues related to trust were identified by the participants: (1) a historical legacy of mistrust between the community (particularly Aboriginal peoples) and government; (2) barriers to building trust with the federal government; (3) limited community input and control over the decision-making process; (4) the conflicted and confounded role of the government agencies being both proponent and regulator, and the resulting need for independent oversight; and (5) distrust of the government to commit to the perpetual care required for the remediation option selected. The dual-mode model of trust and confidence was shown to be a useful framework for understanding the pivotal role of trust in the development of the Giant Mine Remediation Plan. Failure to recognize issues of trust based on value dissimilarity and lack of confidence based on past performance have resulted in a lack of cooperation characterized by delayed remediation and a prolonged and expensive consultation process. Government recognition of the importance of trust to these issues will hopefully improve future communication and public engagement endeavours.
Bonner, Gloria; Williams, Sharon; Wilkie, Diana; Hart, Alysha; Burnett, Glenda; Peacock, Geraldine
2017-01-01
Background An initial and vital important step in recruiting participants for church-based hospice and palliative care research is the establishment of trust and credibility within the church community. Mistrust of medical research is an extremely important barrier hindering recruitment in African American (AA) communities. A church-based EOL dementia education project is currently being conducted at four large urban AA churches. Church leaders voiced mistrust concerns of previous researchers who conducted investigations in their faith-based institutions. We explored strategies to ameliorate the mistrust concerns. Specific aim To identify trust-rebuilding elements for researchers following others who violated trust of AA church leaders. Methods Face-to-face, in-depth interviews were conducted from a convenient sample of four established AA church leaders. Interviews were held in the informants’ churches to promote candor and comfort in revealing sensitive information about trust/mistrust. Content analysis framework was used to analyze the data. Elements identified from the analysis were then used to create themes. Results Multidimensional overarching themes emerged from the analysis included: Experience with researchers (positive and extremely negative), violation of trust and trust building strategies. Conclusions Findings suggest that researchers who wish to conduct successful studies in the AA religious institutions must implement trust rebuilding strategies that include mutual respect, collaboration and partnership building. If general moral practices continue to be violated, threat to future hospice and palliative care research within the institutions may prevail. Thus, potential benefits are thwarted for the church members, AA community, and advancement of EOL care scholarship. PMID:27577723
Governance Through Privacy, Fairness, and Respect for Individuals
Baker, Dixie B.; Kaye, Jane; Terry, Sharon F.
2016-01-01
Introduction: Individuals have a moral claim to be involved in the governance of their personal data. Individuals’ rights include privacy, autonomy, and the ability to choose for themselves how they want to manage risk, consistent with their own personal values and life situations. The Fair Information Practices principles (FIPPs) offer a framework for governance. Privacy-enhancing technology that complies with applicable law and FIPPs offers a dynamic governance tool for enabling the fair and open use of individual’s personal data. Perceptions of Risk: Any governance model must protect against the risks posed by data misuse. Individual perceptions of risks are a subjective function involving individuals’ values toward self, family, and society, their perceptions of trust, and their cognitive decision-making skills. The HIPAA Privacy Rule Puts Some Governance in the Hands of Individuals: Individual privacy protections and individuals’ right to choose are codified in the HIPAA Privacy Rule, which attempts to strike a balance between the dual goals of information flow and privacy protection. The choices most commonly given individuals regarding the use of their health information are binary (“yes” or “no”) and immutable. Recent federal recommendations and law recognize the need for granular, dynamic choices. Building a Governance Framework Based in Trust: Avoiding Surprises: Individuals expect that they will govern the use of their own health and genomic data. Failure to build and maintain individuals’ trust increases the likelihood that they will refuse to grant permission to access or use their data. The “no surprises principle” asserts that an individual’s personal information should never be collected, used, transmitted, or disclosed in a way that would surprise the individual were she to learn about it. Fair Information Practices Principles: The FIPPs provide a powerful framework for enabling data sharing and use, while maintaining trust. We introduce the eight FIPPs adopted by the Department of Health and Human Services, and provide examples of their interpretation and implementation. Reducing Risk through Consumer Engagement: Privacy risk and health risk can be reduced by giving consumers control, autonomy, and transparency, and by engaging them in managing their own health. Explicit “consent” may not always be necessary – the FIPPs offer multiple ways to engender trust and avoid surprises. PMID:27141520
Evidence of an evolutionary hourglass pattern in herbivory-induced transcriptomic responses.
Durrant, Matthew; Boyer, Justin; Zhou, Wenwu; Baldwin, Ian T; Xu, Shuqing
2017-08-01
Herbivory-induced defenses are specific and activated in plants when elicitors, frequently found in the herbivores' oral secretions, are introduced into wounds during attack. While complex signaling cascades are known to be involved, it remains largely unclear how natural selection has shaped the evolution of these induced defenses. We analyzed herbivory-induced transcriptomic responses in wild tobacco, Nicotiana attenuata, using a phylotranscriptomic approach that measures the origin and sequence divergence of herbivory-induced genes. Highly conserved and evolutionarily ancient genes of primary metabolism were activated at intermediate time points (2-6 h) after elicitation, while less constrained and young genes associated with defense signaling and biosynthesis of specialized metabolites were activated at early (before 2 h) and late (after 6 h) stages of the induced response, respectively - a pattern resembling the evolutionary hourglass pattern observed during embryogenesis in animals and the developmental process in plants and fungi. The hourglass patterns found in herbivory-induced defense responses and developmental process are both likely to be a result of signaling modularization and differential evolutionary constraints on the modules involved in the signaling cascade. © 2017 The Authors. New Phytologist © 2017 New Phytologist Trust.
Knox, Justin; Yi, Huso; Reddy, Vasu; Maimane, Senkhu; Sandfort, Theo
2010-01-01
The objective of this study is to assess (1) whether beliefs about trust and condom use affect sexual risk behaviour, and (2) if beliefs about trust and condom use impact sexual risk behaviour directly or if this relationship is mediated by other determinants. The Information-Motivation-Behavioural Skills model was used as a framework for the mediation analysis. A diverse cohort of three hundred 18–40 year old men who have sex with men (MSM) residing in Pretoria, South Africa, were recruited and surveyed for this project. Findings indicate that men who report a high frequency of past unprotected anal intercourse are more likely to believe that it is not necessary to use condoms with a trusted or steady partner regardless of their current partnership status. This fallacy of intimacy appears to affect sexual risk behaviour through intentions and attitudes regarding safer sex practices. Based on these findings, we recommend that more attention be given to gaining a better understanding of how beliefs about trust and condom use are formed and how they can be changed among MSM in South Africa. PMID:21154019
Governance - Alignment and Configuration of Business Activities Task Group Report
2006-05-01
governance level and the Enterprise Model as a way of ensuring integration at the management and work/execution levels 3. Ensure shared services (i.e...Management Framework o QDR Organizational Model o Secretary of Defense 2006-2008 Priorities o Shared Services Defense Business Board...support for horizontal and vertical organizations • Move “supporting” organizations to shared services model May 2006 "Team Defense" 18 Task Group
Hedberg, Thomas D; Krima, Sylvere; Camelio, Jaime A
2017-03-01
Exchange and reuse of three-dimensional (3D)-product models are hampered by the absence of trust in product-lifecycle-data quality. The root cause of the missing trust is years of "silo" functions (e.g., engineering, manufacturing, quality assurance) using independent and disconnected processes. Those disconnected processes result in data exchanges that do not contain all of the required information for each downstream lifecycle process, which inhibits the reuse of product data and results in duplicate data. The X.509 standard, maintained by the Telecommunication Standardization Sector of the International Telecommunication Union (ITU-T), was first issued in 1988. Although originally intended as the authentication framework for the X.500 series for electronic directory services, the X.509 framework is used in a wide range of implementations outside the originally intended paradigm. These implementations range from encrypting websites to software-code signing, yet X.509 certificate use has not widely penetrated engineering and product realms. Our approach is not trying to provide security mechanisms, but equally as important, our method aims to provide insight into what is happening with product data to support trusting the data. This paper provides a review of the use of X.509 certificates and proposes a solution for embedding X.509 digital certificates in 3D models for authentication, authorization, and traceability of product data. This paper also describes an application within the Aerospace domain. Finally, the paper draws conclusions and provides recommendations for further research into using X.509 certificates in product lifecycle management (PLM) workflows to enable a product lifecycle of trust.
NASA Astrophysics Data System (ADS)
Goodrich, D. C.; Brookshire, D.; Broadbent, C.; Dixon, M. D.; Brand, L. A.; Thacher, J.; Benedict, K. K.; Lansey, K. E.; Stromberg, J. C.; Stewart, S.; McIntosh, M.
2011-12-01
Water is a critical component for sustaining both natural and human systems. Yet the value of water for sustaining ecosystem services is not well quantified in monetary terms. Ideally decisions involving water resource management would include an apples-to-apples comparison of the costs and benefits in dollars of both market and non-market goods and services - human and ecosystem. To quantify the value of non-market ecosystem services, scientifically defensible relationships must be developed that link the effect of a decision (e.g. human growth) to the change in ecosystem attributes from current conditions. It is this linkage that requires the "poly-disciplinary" coupling of knowledge and models from the behavioral, physical, and ecological sciences. In our experience another key component of making this successful linkage is development of a strong poly-disciplinary scientific team that can readily communicate complex disciplinary knowledge to non-specialists outside their own discipline. The time to build such a team that communicates well and has a strong sense of trust should not be underestimated. The research described in the presentation incorporated hydrologic, vegetation, avian, economic, and decision models into an integrated framework to determine the value of changes in ecological systems that result from changes in human water use. We developed a hydro-bio-economic framework for the San Pedro River Region in Arizona that considers groundwater, stream flow, and riparian vegetation, as well as abundance, diversity, and distribution of birds. In addition, we developed a similar framework for the Middle Rio Grande of New Mexico. There are six research components for this project: (1) decision support and scenario specification, (2) regional groundwater model, (3) the riparian vegetation model, (4) the avian model, (5) methods for displaying the information gradients in the valuation survey instruments (Choice Modeling and Contingent Valuation), and (6) the economic framework. Our modeling framework began with the identification of factors that influence spatial and temporal changes in riparian vegetation on the two rivers. The linked modeling framework was then employed for making spatial predictions of the changes in presence of surface water, vegetation change, and avian populations in both river systems. An overview of the overall project will be provided, with lessons learned, and initial valuation survey results.
The use of attachment theory in the clinical dialogue with patients.
Cortina, Mauricio
2013-01-01
Attachment theory specifically addresses the ability to use an attachment figure as a haven of safety and base of exploration. While many other relational issues are important during development, a foundation of trust based on having positive expectations that others will be available when needed is clearly relevant in the practice of psychotherapy. Yet many patients come in with histories of insecure or even disorganized attachment and have suffered different forms of maltreatment. Understanding affect-regulating strategies, defensive processes, and transference and countertransference patterns associated with insecure or disorganized patterns is enormously useful during the clinical exchange. In addition to paying attention to affect regulation strategies, it is important to note that two other motivational systems may become coopted for defensive purposes in order to cope with disorganized attachment: the caregiving system and the ranking system (the latter being the legacy of dominance hierarchies we observe in primates). The other theme in this article is the importance of paying attention to a cooperative and social engagement motivational system (sometimes referred sometimes to as a social or affiliative motive) in building a therapeutic alliance. This prosocial motive is not about safety (attachment) but about sharing and developing positive social relations with others (Cortina & Liotti, 2010). The article explores the significance of building on this cooperative and social engagement system when there is not a foundation of trust based on a secure attachment history.
Liao, Yangwenke; Tian, Miaoying; Zhang, Huan; Li, Xin; Wang, Yu; Xia, Xiaojian; Zhou, Jie; Zhou, Yanhong; Yu, Jingquan; Shi, Kai; Klessig, Daniel F
2015-02-01
Salicylic acid (SA) plays a critical role in plant defense against pathogen invasion. SA-induced viral defense in plants is distinct from the pathways mediating bacterial and fungal defense and involves a specific pathway mediated by mitochondria; however, the underlying mechanisms remain largely unknown. The SA-binding activity of the recombinant tomato (Solanum lycopersicum) alpha-ketoglutarate dehydrogenase (Slα-kGDH) E2 subunit of the tricarboxylic acid (TCA) cycle was characterized. The biological role of this binding in plant defenses against tobacco mosaic virus (TMV) was further investigated via Slα-kGDH E2 silencing and transient overexpression in plants. Slα-kGDH E2 was found to bind SA in two independent assays. SA treatment, as well as Slα-kGDH E2 silencing, increased resistance to TMV. SA did not further enhance TMV defense in Slα-kGDH E2-silenced tomato plants but did reduce TMV susceptibility in Nicotiana benthamiana plants transiently overexpressing Slα-kGDH E2. Furthermore, Slα-kGDH E2-silencing-induced TMV resistance was fully blocked by bongkrekic acid application and alternative oxidase 1a silencing. These results indicated that binding by Slα-kGDH E2 of SA acts upstream of and affects the mitochondrial electron transport chain, which plays an important role in basal defense against TMV. The findings of this study help to elucidate the mechanisms of SA-induced viral defense. © 2014 The Authors. New Phytologist © 2014 New Phytologist Trust.
Developing criteria to establish Trusted Digital Repositories
Faundeen, John L.
2017-01-01
This paper details the drivers, methods, and outcomes of the U.S. Geological Survey’s quest to establish criteria by which to judge its own digital preservation resources as Trusted Digital Repositories. Drivers included recent U.S. legislation focused on data and asset management conducted by federal agencies spending $100M USD or more annually on research activities. The methods entailed seeking existing evaluation criteria from national and international organizations such as International Standards Organization (ISO), U.S. Library of Congress, and Data Seal of Approval upon which to model USGS repository evaluations. Certification, complexity, cost, and usability of existing evaluation models were key considerations. The selected evaluation method was derived to allow the repository evaluation process to be transparent, understandable, and defensible; factors that are critical for judging competing, internal units. Implementing the chosen evaluation criteria involved establishing a cross-agency, multi-disciplinary team that interfaced across the organization.
Presence-only modeling using MAXENT: when can we trust the inferences?
Yackulic, Charles B.; Chandler, Richard; Zipkin, Elise F.; Royle, J. Andrew; Nichols, James D.; Grant, Evan H. Campbell; Veran, Sophie
2013-01-01
5. We conclude with a series of recommendations foremost that researchers analyse data in a presence–absence framework whenever possible, because fewer assumptions are required and inferences can be made about clearly defined parameters such as occurrence probability.
Credible investigation of air accidents.
Smart, K
2004-07-26
Within the United Kingdom the Air Accidents Investigation Branch (AAIB) has been used as a model for the other transport modes accident investigation bodies. Government Ministers considered that the AAIB's approach had established the trust of the public and the aviation industry in its ability to conduct independent and objective investigations. The paper will examine the factors that are involved in establishing this trust. They include: the investigation framework; the actual and perceived independence of the accident investigating body; the aviation industry's safety culture; the qualities of the investigators and the quality of their liaison with bereaved families those directly affected by the accidents they investigate.
No-hardware-signature cybersecurity-crypto-module: a resilient cyber defense agent
NASA Astrophysics Data System (ADS)
Zaghloul, A. R. M.; Zaghloul, Y. A.
2014-06-01
We present an optical cybersecurity-crypto-module as a resilient cyber defense agent. It has no hardware signature since it is bitstream reconfigurable, where single hardware architecture functions as any selected device of all possible ones of the same number of inputs. For a two-input digital device, a 4-digit bitstream of 0s and 1s determines which device, of a total of 16 devices, the hardware performs as. Accordingly, the hardware itself is not physically reconfigured, but its performance is. Such a defense agent allows the attack to take place, rendering it harmless. On the other hand, if the system is already infected with malware sending out information, the defense agent allows the information to go out, rendering it meaningless. The hardware architecture is immune to side attacks since such an attack would reveal information on the attack itself and not on the hardware. This cyber defense agent can be used to secure a point-to-point, point-to-multipoint, a whole network, and/or a single entity in the cyberspace. Therefore, ensuring trust between cyber resources. It can provide secure communication in an insecure network. We provide the hardware design and explain how it works. Scalability of the design is briefly discussed. (Protected by United States Patents No.: US 8,004,734; US 8,325,404; and other National Patents worldwide.)
Xin, Zhaojun; Yu, Zhaonan; Erb, Matthias; Turlings, Ted C J; Wang, Baohui; Qi, Jinfeng; Liu, Shengning; Lou, Yonggen
2012-04-01
Synthetic chemical elicitors of plant defense have been touted as a powerful means for sustainable crop protection. Yet, they have never been successfully applied to control insect pests in the field. We developed a high-throughput chemical genetics screening system based on a herbivore-induced linalool synthase promoter fused to a β-glucuronidase (GUS) reporter construct to test synthetic compounds for their potential to induce rice defenses. We identified 2,4-dichlorophenoxyacetic acid (2,4-D), an auxin homolog and widely used herbicide in monocotyledonous crops, as a potent elicitor of rice defenses. Low doses of 2,4-D induced a strong defensive reaction upstream of the jasmonic acid and ethylene pathways, resulting in a marked increase in trypsin proteinase inhibitor activity and volatile production. Induced plants were more resistant to the striped stem borer Chilo suppressalis, but became highly attractive to the brown planthopper Nilaparvata lugens and its main egg parasitoid Anagrus nilaparvatae. In a field experiment, 2,4-D application turned rice plants into living traps for N. lugens by attracting parasitoids. Our findings demonstrate the potential of auxin homologs as defensive signals and show the potential of the herbicide to turn rice into a selective catch crop for an economically important pest. © 2012 The Authors. New Phytologist © 2012 New Phytologist Trust.
Integrated Strategic Planning and Analysis Network Increment 4 (ISPAN Inc 4)
2016-03-01
Defense Acquisition Executive DoD - Department of Defense DoDAF - DoD Architecture Framework FD - Full Deployment FDD - Full Deployment Decision FY...Inc 4 will achieve FDD completion criteria when: 1) the system meets all the KPP thresholds as verified through an Initial Operational Test and
Integrated Strategic Planning and Analysis Network Increment 5 (ISPAN Inc 5)
2016-03-01
Defense Acquisition Executive DoD - Department of Defense DoDAF - DoD Architecture Framework FD - Full Deployment FDD - Full Deployment Decision...achieve FDD in August 2018. ISPAN Inc 5 is envisioned as a follow-on to ISPAN Inc 4 in order to respond to USSTRATCOM requirements for improved
Deceived, Disgusted, and Defensive: Motivated Processing of Anti-Tobacco Advertisements.
Leshner, Glenn; Clayton, Russell B; Bolls, Paul D; Bhandari, Manu
2017-08-29
A 2 × 2 experiment was conducted, where participants watched anti-tobacco messages that varied in deception (content portraying tobacco companies as dishonest) and disgust (negative graphic images) content. Psychophysiological measures, self-report, and a recognition test were used to test hypotheses generated from the motivated cognition framework. The results of this study indicate that messages containing both deception and disgust push viewers into a cascade of defensive responses reflected by increased self-reported unpleasantness, reduced resources allocated to encoding, worsened recognition memory, and dampened emotional responses compared to messages depicting one attribute or neither. Findings from this study demonstrate the value of applying a motivated cognition theoretical framework in research on responses to emotional content in health messages and support previous research on defensive processing and message design of anti-tobacco messages.
Parimbelli, E; Bottalico, B; Losiouk, E; Tomasi, M; Santosuosso, A; Lanzola, G; Quaglini, S; Bellazzi, R
2018-04-01
The main purpose of the article is to raise awareness among all the involved stakeholders about the risks and legal implications connected to the development and use of modern telemedicine systems. Particular focus is given to the class of "active" telemedicine systems, that imply a real-world, non-mediated, interaction with the final user. A secondary objective is to give an overview of the European legal framework that applies to these systems, in the effort to avoid defensive medicine practices and fears, which might be a barrier to their broader adoption. We leverage on the experience gained during two international telemedicine projects, namely MobiGuide (pilot studies conducted in Spain and Italy) and AP@home (clinical trials enrolled patients in Italy, France, the Netherlands, United Kingdom, Austria and Germany), whose development our group has significantly contributed to in the last 4 years, to create a map of the potential criticalities of active telemedicine systems and comment upon the legal framework that applies to them. Two workshops have been organized in December 2015 and March 2016 where the topic has been discussed in round tables with system developers, researchers, physicians, nurses, legal experts, healthcare economists and administrators. We identified 8 features that generate relevant risks from our example use cases. These features generalize to a broad set of telemedicine applications, and suggest insights on possible risk mitigation strategies. We also discuss the relevant European legal framework that regulate this class of systems, providing pointers to specific norms and highlighting possible liability profiles for involved stakeholders. Patients are more and more willing to adopt telemedicine systems to improve home care and day-by-day self-management. An essential step towards a broader adoption of these systems consists in increasing their compliance with existing regulations and better defining responsibilities for all the involved stakeholders. Copyright © 2018 Elsevier B.V. All rights reserved.
Chouliara, Zoë; Karatzias, Thanos; Gullone, Angela; Ferguson, Sandra; Cosgrove, Katie; Burke Draucker, Claire
2017-04-01
Our understanding of therapeutic change processes in group therapy for complex interpersonal trauma has been limited. The present study aimed at addressing this gap by developing a framework of therapeutic change in this field from a survivor and therapist perspective. This is a qualitative study, which utilized semistructured individual interviews. Transcripts were analyzed using interpretative phenomenological analysis (IPA) to identify recurrent themes. A final sample of n = 16 patients and n = 5 facilitators completed the interview. Main change processes identified by survivors were as follows: self versus others, trust versus threat, confrontation versus avoidance, and "patching up" versus true healing. Therapeutic processes identified by therapist facilitators included managing group dynamics, unpredictability and uncertainty, and process versus content. The proposed framework explains therapeutic change in group therapy in relational terms, that is, therapeutic dissonance, the dynamic interaction of self and experience as well as building empathic trusting relations. The importance of managing dissonance to aid personally meaningful recovery was highlighted. These findings have implications for the usefulness of relational and person-centered approaches to clinical practice in the area of interpersonal and complex trauma, especially in the early identification, prevention, and management of dropouts.
Comprehensive security framework for the communication and storage of medical images
NASA Astrophysics Data System (ADS)
Slik, David; Montour, Mike; Altman, Tym
2003-05-01
Confidentiality, integrity verification and access control of medical imagery and associated metadata is critical for the successful deployment of integrated healthcare networks that extend beyond the department level. As medical imagery continues to become widely accessed across multiple administrative domains and geographically distributed locations, image data should be able to travel and be stored on untrusted infrastructure, including public networks and server equipment operated by external entities. Given these challenges associated with protecting large-scale distributed networks, measures must be taken to protect patient identifiable information while guarding against tampering, denial of service attacks, and providing robust audit mechanisms. The proposed framework outlines a series of security practices for the protection of medical images, incorporating Transport Layer Security (TLS), public and secret key cryptography, certificate management and a token based trusted computing base. It outlines measures that can be utilized to protect information stored within databases, online and nearline storage, and during transport over trusted and untrusted networks. In addition, it provides a framework for ensuring end-to-end integrity of image data from acquisition to viewing, and presents a potential solution to the challenges associated with access control across multiple administrative domains and institution user bases.
Bell, Sigall K; Mejilla, Roanne; Anselmo, Melissa; Darer, Jonathan D; Elmore, Joann G; Leveille, Suzanne; Ngo, Long; Ralston, James D; Delbanco, Tom; Walker, Jan
2017-04-01
Patient advocates and safety experts encourage adoption of transparent health records, but sceptics worry that shared notes may offend patients, erode trust or promote defensive medicine. As electronic health records disseminate, such disparate views fuel policy debates about risks and benefits of sharing visit notes with patients through portals. Presurveys and postsurveys from 99 volunteer doctors at three US sites who participated in OpenNotes and postsurveys from 4592 patients who read at least one note and submitted a survey. Patients read notes to be better informed and because they were curious; about a third read them to check accuracy. In total, 7% (331) of patients reported contacting their doctor's office about their note. Of these, 29% perceived an error, and 85% were satisfied with its resolution. Nearly all patients reported feeling better (37%) or the same (62%) about their doctor. Patients who were older (>63), male, non-white, had fair/poor self-reported health or had less formal education were more likely to report feeling better about their doctor. Among doctors, 26% anticipated documentation errors, and 44% thought patients would disagree with notes. After a year, 53% believed patient satisfaction increased, and 51% thought patients trusted them more. None reported ordering more tests or referrals. Despite concerns about errors, offending language or defensive practice, transparent notes overall did not harm the patient-doctor relationship. Rather, doctors and patients perceived relational benefits. Traditionally more vulnerable populations-non-white, those with poorer self-reported health and those with fewer years of formal education-may be particularly likely to feel better about their doctor after reading their notes. Further informing debate about OpenNotes, the findings suggest transparent records may improve patient satisfaction, trust and safety. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.
Final Report for Bio-Inspired Approaches to Moving-Target Defense Strategies
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fink, Glenn A.; Oehmen, Christopher S.
This report records the work and contributions of the NITRD-funded Bio-Inspired Approaches to Moving-Target Defense Strategies project performed by Pacific Northwest National Laboratory under the technical guidance of the National Security Agency’s R6 division. The project has incorporated a number of bio-inspired cyber defensive technologies within an elastic framework provided by the Digital Ants. This project has created the first scalable, real-world prototype of the Digital Ants Framework (DAF)[11] and integrated five technologies into this flexible, decentralized framework: (1) Ant-Based Cyber Defense (ABCD), (2) Behavioral Indicators, (3) Bioinformatic Clas- sification, (4) Moving-Target Reconfiguration, and (5) Ambient Collaboration. The DAF canmore » be used operationally to decentralize many such data intensive applications that normally rely on collection of large amounts of data in a central repository. In this work, we have shown how these component applications may be decentralized and may perform analysis at the edge. Operationally, this will enable analytics to scale far beyond current limitations while not suffering from the bandwidth or computational limitations of centralized analysis. This effort has advanced the R6 Cyber Security research program to secure digital infrastructures by developing a dynamic means to adaptively defend complex cyber systems. We hope that this work will benefit both our client’s efforts in system behavior modeling and cyber security to the overall benefit of the nation.« less
2010-12-03
with the CDC’s Central America and Panama Center, the U.S. Army Public Health Command Region–South (PHCR-South) provided laboratory tech- nical...Introduction and background Th e central focus of disease surveillance systems is the early identifi cation of infectious disease outbreaks in...been leveraged by AFHSC- GEIS for the purpose of disease surveillance and response through a growing network of centrally funded partners (Figure 1
Crosstalk: The Journal of Defense Software Engineering. Volume 22, Number 1, January 2009
2009-01-01
con - tract project. They manage the pro - ject plan and its execution and ask: How do we get all of this accom- plished? • The marketing manager...struggle with the pros and cons of technological toys at home, with the cell phone probably being the most divisive. It’s great to keep our kids in...their technology behind? These concerns present us practitioners with many challenges. We must build trust with pro - gram managers, proving over and
2003-07-01
Centric Architecture Office ( NCAO ) should develop an RF communications/network management technology roadmap. The roadmap should serve two purposes: a...Centric Architecture Office ( NCAO ) chartered with integrating diverse DoD efforts to provide technical alternatives to the current form of radio...American people as a cornerstone of DoD’s leadership of the public trust in this area. The NCAO should be consolidated from ongoing NII, JTRS JPO and DDR
2009-05-11
de Pau. “Cambodia.” Escola de Cultura de Pau, http://www.escolapau.org/img/ programas /desarme/mapa/camboyai.pdf (accessed March 20, 2009). 69...Escola de Cultura de Pau. “Eritrea.” Escola de Cultura de Pau, http://www.escolapau.org/img/ programas /desarme/mapa/eritreai.pdf (accessed March 20...government authorized the formation and support of “rondas” or Comites de auto defensa (Committees of Self Defense) as the government fought the
Social Networks as a Source of Competitive Advantage for the Firm.
ERIC Educational Resources Information Center
Van Laere, Kristien; Heene, Aime
2003-01-01
Proposes a conceptual framework for managing relationships of small and medium-sized enterprises, based on the necessity of cooperation for survival. Describes characteristics of embedded relationship in stakeholder interactions, including trust, durability, information transfer, and collaboration. (Contains 72 references.) (SK)
Defense Acquisition Transformation Report to Congress
2007-02-01
current initiatives and for the purposes of this report are put into a framework of workforce, acquisition, requirements, budget, industry and organization...requirements. The Capability Portfolio Management Initiative provides a common framework to recognize federated ownership and senior-level teams have been...Performance Trade Off Constraints Risk Based Source Selection techniques are also being piloted to provide an improved framework for
The Civil-Military Gap in the United States. Does It Exist, Why, and Does It Matter?
2007-01-01
and/or the general public. Based on this framework, our analysis then compares the char- acteristics of military and civilian respondents using a...armed forces, three major force structure reviews (1990 Base Force, 1993 Bottom-Up Review, 1997 Quadrennial Defense Review) took place in the space...Defense Planning in a Decade of Change: Lessons from the Base Force, Bottom-Up Review, and Quadrennial Defense Review, Santa Monica, CA: RAND
2015-08-01
Congress concerning requirements for the National Defense Stockpile (NDS) of strategic and critical non- fuel materials. 1 RAMF-SM, which was...critical non- fuel materials. The NDS was established in the World War II era and has been managed by the Department of Defense (DOD) since 1988. By...Department of the Interior. An alternative algorithm is used for materials with intensive defense demands. v Contents 1 . Introduction
Trade-offs between acquired and innate immune defenses in humans
McDade, Thomas W.; Georgiev, Alexander V.; Kuzawa, Christopher W.
2016-01-01
Immune defenses provide resistance against infectious disease that is critical to survival. But immune defenses are costly, and limited resources allocated to immunity are not available for other physiological or developmental processes. We propose a framework for explaining variation in patterns of investment in two important subsystems of anti-pathogen defense: innate (non-specific) and acquired (specific) immunity. The developmental costs of acquired immunity are high, but the costs of maintenance and activation are relatively low. Innate immunity imposes lower upfront developmental costs, but higher operating costs. Innate defenses are mobilized quickly and are effective against novel pathogens. Acquired responses are less effective against novel exposures, but more effective against secondary exposures due to immunological memory. Based on their distinct profiles of costs and effectiveness, we propose that the balance of investment in innate versus acquired immunity is variable, and that this balance is optimized in response to local ecological conditions early in development. Nutritional abundance, high pathogen exposure and low signals of extrinsic mortality risk during sensitive periods of immune development should all favor relatively higher levels of investment in acquired immunity. Undernutrition, low pathogen exposure, and high mortality risk should favor innate immune defenses. The hypothesis provides a framework for organizing prior empirical research on the impact of developmental environments on innate and acquired immunity, and suggests promising directions for future research in human ecological immunology. PMID:26739325
Braving a faceless new world? Conceptualizing trust in the pharmaceutical industry and its products.
Brown, Patrick; Calnan, Michael
2012-01-01
Pharmaceutical products are commonly relied upon by professionals, and correspondingly patients, within a wide range of healthcare contexts. This dependence, combined with the inherent risk and uncertainty surrounding both medical practice and the drugs it harnesses, points towards the importance of trust in the pharmaceutical industry--a subject which has been much neglected by researchers. This article begins to address this deficiency by mapping out a conceptual framework which may form a useful basis for future research into this important topic. The often negative portrayal of the pharmaceutical industry in the public sphere belies a state of apparent confidence in its products. The role of prescribing professionals as 'mediators of trust' amid a faceless system of production and, alongside regulators, as bases of assurance in the quality of drugs goes some way towards explaining this contradiction. Recent policy moves towards fostering increased patient 'expertise' and responsibility for illness management, a widening of over-the-counter medication availability and a growing market of products (mainstream and illicit) via the Internet suggest this role of 'facework' in facilitating trust may be becoming more marginal. This heightened requirement for trusting amid the unfamiliar, and an apparent willingness to do so, underlines the need for further research into trust in the industry--both mainstream and underground--and its products. Within this discussion an agenda for furthering our understandings of the political-economy of the pharmaceutical industry becomes apparent, one which might be most effectively approached by way of a broader political-economy of hope and trust.
[Autonomy, Trust and Medical Ethics in Onora O'Neill's Work].
Jaramillo, Carlos Alberto López; Lew, Jorge Carlos Holguín
2013-03-01
Autonomy has become a key concept in bioethics. Onora O'neill is perhaps the most representative author and researcher in the philosophical and bioethical fields regrding the concept of autonomy. To review the concept of autonomy in Onora O'Neill's work so as to understand its relevance in current bioethics. The concept of bioethics is reviewed in relation to three fundamental quesions: 1) Which are the main limitations of the individualistic conception of autonomy? 2) How to understand the relations between trust and autonomy together with their implications? and 3) Which are the implications of principled autonomy for aspects such as doctor-patient relationship and informed consent. The main works by O'Neill are reviewed, specifically regarding medical bioethics. O'neill's approach is original and relates Kantian autonomy to her own conceptions about trust, and both the individual and social levels of bioethics. The author has developed a Kantian non indvidualistic view of autonomy. Her conceptulization of trust and the crises this concept is currently undergoing complement and strengthen the concept of principled autonomy. The implications of O'Neill's concepts go beyond theoretical discussions and in her work she uses examples and analyzes circumstances which demonstrate the applicability of her proposals. O'Neill's work contributes to dealing with the challenges posed by the socio-political context of cost-efficiency oriented health systems and of the so-called defensive medicine. Copyright © 2013 Asociación Colombiana de Psiquiatría. Publicado por Elsevier España. All rights reserved.
Hedberg, Thomas D.; Krima, Sylvere; Camelio, Jaime A.
2016-01-01
Exchange and reuse of three-dimensional (3D)-product models are hampered by the absence of trust in product-lifecycle-data quality. The root cause of the missing trust is years of “silo” functions (e.g., engineering, manufacturing, quality assurance) using independent and disconnected processes. Those disconnected processes result in data exchanges that do not contain all of the required information for each downstream lifecycle process, which inhibits the reuse of product data and results in duplicate data. The X.509 standard, maintained by the Telecommunication Standardization Sector of the International Telecommunication Union (ITU-T), was first issued in 1988. Although originally intended as the authentication framework for the X.500 series for electronic directory services, the X.509 framework is used in a wide range of implementations outside the originally intended paradigm. These implementations range from encrypting websites to software-code signing, yet X.509 certificate use has not widely penetrated engineering and product realms. Our approach is not trying to provide security mechanisms, but equally as important, our method aims to provide insight into what is happening with product data to support trusting the data. This paper provides a review of the use of X.509 certificates and proposes a solution for embedding X.509 digital certificates in 3D models for authentication, authorization, and traceability of product data. This paper also describes an application within the Aerospace domain. Finally, the paper draws conclusions and provides recommendations for further research into using X.509 certificates in product lifecycle management (PLM) workflows to enable a product lifecycle of trust. PMID:27840596
Cairns, Georgina; de Andrade, Marisa; MacDonald, Laura
2013-01-01
Population-level compliance with health protective behavioral advice to prevent and control communicable disease is essential to optimal effectiveness. Multiple factors affect perceptions of trustworthiness, and trust in advice providers is a significant predeterminant of compliance. While competency in assessment and management of communicable disease risks is critical, communications competency may be equally important. Organizational reputation, quality of stakeholder relationships and risk information provision strategies are trust moderating factors, whose impact is strongly influenced by the content, timing and coordination of communications. This article synthesizes the findings of 2 literature reviews on trust moderating communications and communicable disease prevention and control. We find a substantial evidence base on risk communication, but limited research on other trust building communications. We note that awareness of good practice historically has been limited although interest and the availability of supporting resources is growing. Good practice and policy elements are identified: recognition that crisis and risk communications require different strategies; preemptive dialogue and planning; evidence-based approaches to media relations and messaging; and building credibility for information sources. Priority areas for future research include process and cost-effectiveness evaluation and the development of frameworks that integrate communication and biomedical disease control and prevention functions, conceptually and at scale.
Hampshire, Kate; Hamill, Heather; Mariwah, Simon; Mwanga, Joseph; Amoako-Sakyi, Daniel
2017-09-01
In contexts where healthcare regulation is weak and levels of uncertainty high, how do patients decide whom and what to trust? In this paper, we explore the potential for using Signalling Theory (ST, a form of Behavioural Game Theory) to investigate health-related trust problems under conditions of uncertainty, using the empirical example of 'herbal clinics' in Ghana and Tanzania. Qualitative, ethnographic fieldwork was conducted over an eight-month period (2015-2016) in eight herbal clinics in Ghana and ten in Tanzania, including semi-structured interviews with herbalists (N = 18) and patients (N = 68), plus detailed ethnographic observations and twenty additional key informant interviews. The data were used to explore four ST-derived predictions, relating to herbalists' strategic communication ('signalling') of their trustworthiness to patients, and patients' interpretation of those signals. Signalling Theory is shown to provide a useful analytical framework, allowing us to go beyond the primary trust problem addressed by other researchers - cataloguing observable indicators of trustworthiness - and providing tools for tackling the trickier secondary trust problem, where the trustworthiness of those indicators must be ascertained. Signalling Theory also enables a basis for comparative work between different empirical contexts that share the underlying condition of uncertainty. Copyright © 2017 The Authors. Published by Elsevier Ltd.. All rights reserved.
Roberts, Michael T
2011-01-01
Trust underpins the Chinese social system, and yet it is lacking from a Chinese food system that is riddled with safety disasters and disgruntled consumers. Government and industry play a major role in rehabilitating consumer trust in China. To this end, food safety and quality laws have been constructed to foster this process; however, safety scandals continue even in the face of stricter regulations and increased enforcement. A potential toll to abate food-safety problems and to build trust is the implementation of Corporate Social Responsibility ("CSR"). Mandates by the government promote CSR in enterprise activity, including Article 3 of the 2009 China Food Safety Law. Officials have also recently touted the need for "moral education" of operators in the food industry. Regardless of government activity or whether CSR is employed by food enterprises, it is imperative that the food industry recognizes how critical it is to establish trust with Chinese consumers, who increasingly expect safe, quality food. The case study with pistachios highlights this evolving consumer expectation and the principles of social responsibility in the framework of the relationship between government and industry and consumers, while demonstrating the benefits of doing the right thing for food companies doing business in China.
Deliberate and Crisis Action Planning and Execution Segments Increment 2A (DCAPES Inc 2A)
2016-03-01
Document DAE - Defense Acquisition Executive DoD - Department of Defense DoDAF - DoD Architecture Framework FD - Full Deployment FDD - Full...Jun 2009 DT/OT Completion Jan 2015 Jan 2015 FDD Aug 2015 Oct 2015 FD TBD Oct 2015 Memo DCAPES is a National Security System. Acronyms and
Thomson, George A; Foster, Matthew; Sheriff, Rezvi; Mendis, Lalitha; Fernando, Devaka J S; Blundell, Caroline; Worrall, Jeffrey; Black, Carol
2005-01-01
The UK offers excellent postgraduate medical education, and overseas doctors in training often covet a period of training in the UK. Some overseas training authorities make UK training mandatory prior to appointment as a consultant. Unfortunately, the organisation of such training often proves to be ad hoc, and may lack educational value. UK training faces challenges as a result of reduced hours of work, more structured and intensive educational needs, and pressures of increasing clinical demand. A plethora of new 'trust' posts have developed, often with limited educational value, creating a risk that training quality for overseas doctors is reduced. Against this background, such posts can be used to create international training partnerships such as that at Sherwood Forest Hospitals NHS Trust (SFHT), providing high-quality general and specialty training. Given the success of this strategy, it would be desirable for other UK trusts to provide similar schemes offering specialties not covered at SFHT.
CONORBIT: constrained optimization by radial basis function interpolation in trust regions
Regis, Rommel G.; Wild, Stefan M.
2016-09-26
Here, this paper presents CONORBIT (CONstrained Optimization by Radial Basis function Interpolation in Trust regions), a derivative-free algorithm for constrained black-box optimization where the objective and constraint functions are computationally expensive. CONORBIT employs a trust-region framework that uses interpolating radial basis function (RBF) models for the objective and constraint functions, and is an extension of the ORBIT algorithm. It uses a small margin for the RBF constraint models to facilitate the generation of feasible iterates, and extensive numerical tests confirm that such a margin is helpful in improving performance. CONORBIT is compared with other algorithms on 27 test problems, amore » chemical process optimization problem, and an automotive application. Numerical results show that CONORBIT performs better than COBYLA, a sequential penalty derivative-free method, an augmented Lagrangian method, a direct search method, and another RBF-based algorithm on the test problems and on the automotive application.« less
Software Certification for Temporal Properties With Affordable Tool Qualification
NASA Technical Reports Server (NTRS)
Xia, Songtao; DiVito, Benedetto L.
2005-01-01
It has been recognized that a framework based on proof-carrying code (also called semantic-based software certification in its community) could be used as a candidate software certification process for the avionics industry. To meet this goal, tools in the "trust base" of a proof-carrying code system must be qualified by regulatory authorities. A family of semantic-based software certification approaches is described, each different in expressive power, level of automation and trust base. Of particular interest is the so-called abstraction-carrying code, which can certify temporal properties. When a pure abstraction-carrying code method is used in the context of industrial software certification, the fact that the trust base includes a model checker would incur a high qualification cost. This position paper proposes a hybrid of abstraction-based and proof-based certification methods so that the model checker used by a client can be significantly simplified, thereby leading to lower cost in tool qualification.
Topp, Stephanie M; Chipukuma, Julien M
2016-01-01
Background In sub-Saharan Africa, large amounts of funding continue to be directed towards HIV-specific care and treatment, often with claims of ‘health system strengthening’ effect. Such claims rarely account for the impact on human relationships and decisions that are core to functional health systems. This research examined how establishment of externally funded HIV services influenced trusting relationships in Zambian health centres. Methods An in-depth, multicase study included four health centres selected for urban, peri-urban and rural characteristics. Case data included healthcare worker (HCW) interviews (60); patient interviews (180); direct observation of facility operations (2 weeks/centre) and key informant interviews (14) which were recorded and transcribed verbatim. Thematic analysis adopted inductive and deductive coding guided by a framework incorporating concepts of workplace trust, patient–provider trust, intrinsic and extrinsic motivation. Results HIV service scale-up impacted trust in positive and negative ways. Investment in HIV-specific infrastructure, supplies and quality assurance mechanisms strengthened workplace trust, HCW motivation and patient–provider trust in HIV departments in the short-term. In the health centres more broadly and over time, however, non-governmental organisation-led investment and support of HIV departments reinforced HCW's perceptions of the government as uninterested or unable to provide a quality work environment. Exacerbating existing perceptions of systemic workplace inequity and nepotism, uneven distribution of personal and professional opportunities related to HIV service establishment contributed to interdepartmental antagonism and reinforced workplace practices designed to protect individual HCW's interests. Conclusions Findings illustrate long-term negative effects of the vertical HIV resourcing and support structures which failed to address and sometimes exacerbated HCW (dis)trust with their own government and supervisors. The short-term and long-term effects of weakened workplace trust on HCWs' motivation and performance signal the importance of understanding how such relationships play a role in generating virtuous or perverse cycles of actor interactions, with implications for service outcomes. PMID:28588985
Enhancing P3P Framework through Policies and Trust
2005-01-01
existing online review/rating systems are geared towards customer satisfaction in online shopping domain, we believe that in the future privacy will...ablers of online shopping to tracking of user browsing behavior. Though cookies are browser dependent, they are independent of internet service provider
Health data research in New Zealand: updating the ethical governance framework.
Ballantyne, Angela; Style, Rochelle
2017-10-27
Demand for health data for secondary research is increasing, both in New Zealand and worldwide. The New Zealand government has established a large research database, the Integrated Data Infrastructure (IDI), which facilitates research, and an independent ministerial advisory group, the Data Futures Partnership (DFP), to engage with citizens, the private sector and non-government organisations (NGOs) to facilitate trusted data use and strengthen the data ecosystem in New Zealand. We commend these steps but argue that key strategies for effective health-data governance remain absent in New Zealand. In particular, we argue in favour of the establishment of: (1) a specialist Health and Disability Ethics Committee (HDEC) to review applications for secondary-use data research; (2) a public registry of approved secondary-use research projects (similar to a clinical trials registry); and (3) detailed guidelines for the review and approval of secondary-use data research. We present an ethical framework based on the values of public interest, trust and transparency to justify these innovations.
NASA Astrophysics Data System (ADS)
Ge, Linqiang; Yu, Wei; Shen, Dan; Chen, Genshe; Pham, Khanh; Blasch, Erik; Lu, Chao
2014-06-01
Most enterprise networks are built to operate in a static configuration (e.g., static software stacks, network configurations, and application deployments). Nonetheless, static systems make it easy for a cyber adversary to plan and launch successful attacks. To address static vulnerability, moving target defense (MTD) has been proposed to increase the difficulty for the adversary to launch successful attacks. In this paper, we first present a literature review of existing MTD techniques. We then propose a generic defense framework, which can provision an incentive-compatible MTD mechanism through dynamically migrating server locations. We also present a user-server mapping mechanism, which not only improves system resiliency, but also ensures network performance. We demonstrate a MTD with a multi-user network communication and our data shows that the proposed framework can effectively improve the resiliency and agility of the system while achieving good network timeliness and throughput performance.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hoette, Trisha Marie
Throughout history, as new chemical threats arose, strategies for the defense against chemical attacks have also evolved. As a part of an Early Career Laboratory Directed Research and Development project, a systems analysis of past, present, and future chemical terrorism scenarios was performed to understand how the chemical threats and attack strategies change over time. For the analysis, the difficulty in executing chemical attack was evaluated within a framework of three major scenario elements. First, historical examples of chemical terrorism were examined to determine how the use of chemical threats, versus other weapons, contributed to the successful execution of themore » attack. Using the same framework, the future of chemical terrorism was assessed with respect to the impact of globalization and new technologies. Finally, the efficacy of the current defenses against contemporary chemical terrorism was considered briefly. The results of this analysis justify the need for continued diligence in chemical defense.« less
Game Intelligence in Team Sports
Lennartsson, Jan; Lidström, Nicklas; Lindberg, Carl
2015-01-01
We set up a game theoretic framework to analyze a wide range of situations from team sports. A fundamental idea is the concept of potential; the probability of the offense scoring the next goal minus the probability that the next goal is made by the defense. We develop categorical as well as continuous models, and obtain optimal strategies for both offense and defense. A main result is that the optimal defensive strategy is to minimize the maximum potential of all offensive strategies. PMID:25970581
Stimulus generalization as a mechanism for learning to trust
FeldmanHall, Oriel; Dunsmoor, Joseph E.; Tompary, Alexa; Hunter, Lindsay E.; Todorov, Alexander; Phelps, Elizabeth A.
2018-01-01
How do humans learn to trust unfamiliar others? Decisions in the absence of direct knowledge rely on our ability to generalize from past experiences and are often shaped by the degree of similarity between prior experience and novel situations. Here, we leverage a stimulus generalization framework to examine how perceptual similarity between known individuals and unfamiliar strangers shapes social learning. In a behavioral study, subjects play an iterative trust game with three partners who exhibit highly trustworthy, somewhat trustworthy, or highly untrustworthy behavior. After learning who can be trusted, subjects select new partners for a second game. Unbeknownst to subjects, each potential new partner was parametrically morphed with one of the three original players. Results reveal that subjects prefer to play with strangers who implicitly resemble the original player they previously learned was trustworthy and avoid playing with strangers resembling the untrustworthy player. These decisions to trust or distrust strangers formed a generalization gradient that converged toward baseline as perceptual similarity to the original player diminished. In a second imaging experiment we replicate these behavioral gradients and leverage multivariate pattern similarity analyses to reveal that a tuning profile of activation patterns in the amygdala selectively captures increasing perceptions of untrustworthiness. We additionally observe that within the caudate adaptive choices to trust rely on neural activation patterns similar to those elicited when learning about unrelated, but perceptually familiar, individuals. Together, these findings suggest an associative learning mechanism efficiently deploys moral information encoded from past experiences to guide future choice. PMID:29378964
Building a framework to manage trust in automation
NASA Astrophysics Data System (ADS)
Metcalfe, J. S.; Marathe, A. R.; Haynes, B.; Paul, V. J.; Gremillion, G. M.; Drnec, K.; Atwater, C.; Estepp, J. R.; Lukos, J. R.; Carter, E. C.; Nothwang, W. D.
2017-05-01
All automations must, at some point in their lifecycle, interface with one or more humans. Whether operators, end-users, or bystanders, human responses can determine the perceived utility and acceptance of an automation. It has been long believed that human trust is a primary determinant of human-automation interactions and further presumed that calibrating trust can lead to appropriate choices regarding automation use. However, attempts to improve joint system performance by calibrating trust have not yet provided a generalizable solution. To address this, we identified several factors limiting the direct integration of trust, or metrics thereof, into an active mitigation strategy. The present paper outlines our approach to addressing this important issue, its conceptual underpinnings, and practical challenges encountered in execution. Among the most critical outcomes has been a shift in focus from trust to basic interaction behaviors and their antecedent decisions. This change in focus inspired the development of a testbed and paradigm that was deployed in two experiments of human interactions with driving automation that were executed in an immersive, full-motion simulation environment. Moreover, by integrating a behavior and physiology-based predictor within a novel consequence-based control system, we demonstrated that it is possible to anticipate particular interaction behaviors and influence humans towards more optimal choices about automation use in real time. Importantly, this research provides a fertile foundation for the development and integration of advanced, wearable technologies for sensing and inferring critical state variables for better integration of human elements into otherwise fully autonomous systems.
A Security Architecture Based on Trust Management for Pervasive Computing Systems
2005-01-01
SmartSpace framework, we extended the C2 [16] ar- chitecture, which in turn is based on the Centaurus [10] model. In Centaurus a Client can access...the services provided by the nearest Centaurus Service Manager (SM) via some short-range communi- cation. The SM acts as an active proxy by executing...The In the Centaurus project [10], the main design goal is the development of a framework for building portals to services using various types of
A Framework for Managing Inter-Site Storage Area Networks using Grid Technologies
NASA Technical Reports Server (NTRS)
Kobler, Ben; McCall, Fritz; Smorul, Mike
2006-01-01
The NASA Goddard Space Flight Center and the University of Maryland Institute for Advanced Computer Studies are studying mechanisms for installing and managing Storage Area Networks (SANs) that span multiple independent collaborating institutions using Storage Area Network Routers (SAN Routers). We present a framework for managing inter-site distributed SANs that uses Grid Technologies to balance the competing needs to control local resources, share information, delegate administrative access, and manage the complex trust relationships between the participating sites.
Customer Loyalty in Virtual Environments: An Empirical Study in e-Bank
NASA Astrophysics Data System (ADS)
Chao, Yu; Lee, Gin-Yuan; Ho, Yung-Ching
2009-08-01
The advent of e-commerce has increased the importance of consumer financing operations. Internet banking helps banks to develop relationship marketing, thus improve customer loyalty. This study proposes a research framework to examine the relationships among e-service quality, customer satisfaction, customer trust and e-loyalty in e-bank in Taiwan. Data are collected through a survey using a structured questionnaire. The 442 valid respondents who have experience with e-bank are analyzed by partial least squares structural equation modeling (PLS-SEM) method. The managerial implication is e-bank must focus on e-service quality to increase customer satisfaction and trust for obtaining the e-loyalty.
A Knowledge Discovery framework for Planetary Defense
NASA Astrophysics Data System (ADS)
Jiang, Y.; Yang, C. P.; Li, Y.; Yu, M.; Bambacus, M.; Seery, B.; Barbee, B.
2016-12-01
Planetary Defense, a project funded by NASA Goddard and the NSF, is a multi-faceted effort focused on the mitigation of Near Earth Object (NEO) threats to our planet. Currently, there exists a dispersion of information concerning NEO's amongst different organizations and scientists, leading to a lack of a coherent system of information to be used for efficient NEO mitigation. In this paper, a planetary defense knowledge discovery engine is proposed to better assist the development and integration of a NEO responding system. Specifically, we have implemented an organized information framework by two means: 1) the development of a semantic knowledge base, which provides a structure for relevant information. It has been developed by the implementation of web crawling and natural language processing techniques, which allows us to collect and store the most relevant structured information on a regular basis. 2) the development of a knowledge discovery engine, which allows for the efficient retrieval of information from our knowledge base. The knowledge discovery engine has been built on the top of Elasticsearch, an open source full-text search engine, as well as cutting-edge machine learning ranking and recommendation algorithms. This proposed framework is expected to advance the knowledge discovery and innovation in planetary science domain.
Higher Education: Handbook of Theory and Research. Volume XI.
ERIC Educational Resources Information Center
Smart, John C., Ed.
This volume contains 10 papers on higher education theory and research. "Variation Among Academic Disciplines: Analytical Frameworks and Research" (John M. Braxton and Lowell L. Hargens) reviews work on disciplinary differences and proposed conceptual schemes for explaining these differences. "Public Policy and Public Trust: The Use…
Hwang, In Sun; Choi, Du Seok; Kim, Nak Hyun; Kim, Dae Sung; Hwang, Byung Kook
2014-01-01
Plant defense against microbial pathogens is coordinated by a complex regulatory network. Cysteine/histidine-rich DC1 domain proteins mediate a variety of cellular processes involved in plant growth, development and stress responses. We identified a pepper (Capsicum annuum) cysteine/histidine-rich DC1 domain protein gene, CaDC1, which positively regulates plant defense during microbial infection, based on gene silencing and transient expression in pepper, as well as ectopic expression in Arabidopsis. Induction of CaDC1 by avirulent Xanthomonas campestris pv vesicatoria (Xcv) infection was pronounced at both transcriptional and translational levels in pepper leaves. Purified CaDC1 protein bound to both DNA and RNA in vitro, especially in the presence of Zn(2+). CaDC1 was localized to both the nucleus and the cytoplasm, which was required for plant cell death signaling. The nuclear localization of CaDC1 was dependent on the divergent C1 (DC1) domain. CaDC1 silencing in pepper conferred increased susceptibility to Xcv infection, which was accompanied by reduced salicylic acid accumulation and defense-related gene expression. Ectopic expression of CaDC1 in Arabidopsis enhanced resistance to Hyaloperonospora arabidopsidis. CaDC1 binds both RNA and DNA and functions as a positive regulator of plant cell death and SA-dependent defense responses. © 2013 The Authors. New Phytologist © 2013 New Phytologist Trust.
Preemptive strikes: Fear, hope, and defensive aggression.
Halevy, Nir
2017-02-01
Preemptive strikes are costly and harmful. Existing models of defensive aggression focus narrowly on the role fear plays in motivating preemptive strikes. Theoretically integrating the literatures on conflict, decision making, and emotion, the current research investigated how specific emotions associated with certainty or uncertainty, including fear, anger, disgust, hope, and happiness, influence preemptive strikes. Study 1 demonstrated that hope negatively predicts defensive exits from relationships in choice dilemmas. Studies 2 and 3 experimentally manipulated risk of being attacked in an incentivized, interactive decision making task-the Preemptive Strike Game. Risk of being attacked fueled preemptive strikes; reduced feelings of hope partially mediated this effect in Study 3. Studies 4 and 5 investigated preemptive strikes under uncertainty (rather than risk). In Study 4, reasoning about the factors that make one trustful of others curbed preemptive strikes; cogitating about the factors that underlie discrete emotions, however, did not influence defensive aggression. Study 5 demonstrated that the valence and uncertainty appraisals of incidental emotions interact in shaping preemptive strikes. Specifically, recalling an autobiographical emotional experience that produced hope significantly decreased attack rates relative to fear, happiness, and a control condition. Fear, anger, disgust, and happiness were either unrelated to preemptive strikes or showed inconsistent relationships with preemptive strikes across the 5 studies. These findings shed light on how emotions shape defensive aggression, advance knowledge on strategic choice under risk and uncertainty, and demonstrate hope's positive effects on social interactions and relationships. (PsycINFO Database Record (c) 2017 APA, all rights reserved).
McGale, Erica; Diezel, Celia; Schuman, Meredith C; Baldwin, Ian T
2018-05-13
Plants are the primary producers in most terrestrial ecosystems and have complex defense systems to protect their produce. Defense-deficient, high-yielding agricultural monocultures attract abundant nonhuman consumers, but are alternatively defended through pesticide application and genetic engineering to produce insecticidal proteins such as Cry1Ac (Bacillus thuringiensis). These approaches alter the balance between yield protection and maximization but have been poorly contextualized to known yield-defense trade-offs in wild plants. The native plant Nicotiana attenuata was used to compare yield benefits of plants transformed to be defenseless to those with a full suite of naturally evolved defenses, or additionally transformed to ectopically produce Cry1Ac. An insecticide treatment allowed us to examine yield under different herbivore loads in N. attenuata's native habitat. Cry1Ac, herbivore damage, and growth parameters were monitored throughout the season. Biomass and reproductive correlates were measured at season end. Non-Cry1Ac-targeted herbivores dominated on noninsecticide-treated plants, and increased the yield drag of Cry1Ac-producing plants in comparison with endogenously defended or undefended plants. Insecticide-sprayed Cry1Ac-producing plants lagged less in stalk height, shoot biomass, and flower production. In direct comparison with the endogenous defenses of a native plant, Cry1Ac production did not provide yield benefits for plants under observed herbivore loads in a field study. © 2018 The Authors New Phytologist © 2018 New Phytologist Trust.
The adverse outcome pathway (AOP) framework has been developed as a means for assembling scientifically defensible descriptions of how particular molecular perturbations, termed molecular initiating events (MIEs), can evoke a set of predictable responses at different levels of bi...
Chaplaincy and mental health in the department of Veterans affairs and department of defense.
Nieuwsma, Jason A; Rhodes, Jeffrey E; Jackson, George L; Cantrell, William C; Lane, Marian E; Bates, Mark J; Dekraai, Mark B; Bulling, Denise J; Ethridge, Keith; Drescher, Kent D; Fitchett, George; Tenhula, Wendy N; Milstein, Glen; Bray, Robert M; Meador, Keith G
2013-01-01
Chaplains play important roles in caring for Veterans and Service members with mental health problems. As part of the Department of Veterans Affairs (VA) and Department of Defense (DoD) Integrated Mental Health Strategy, we used a sequential approach to examining intersections between chaplaincy and mental health by gathering and building upon: 1) input from key subject matter experts; 2) quantitative data from the VA / DoD Chaplain Survey (N = 2,163; response rate of 75% in VA and 60% in DoD); and 3) qualitative data from site visits to 33 VA and DoD facilities. Findings indicate that chaplains are extensively involved in caring for individuals with mental health problems, yet integration between mental health and chaplaincy is frequently limited due to difficulties between the disciplines in establishing familiarity and trust. We present recommendations for improving integration of services, and we suggest key domains for future research.
Defense Resource Management Studies: Introduction to Capability and Acquisition Planning Processes
2010-08-01
interchangeable and useful in a common contextual framework . Currently, both simulations use a common scenario, the same fictitious country, and...culture, legal framework , and institutions. • Incorporate Principles of Good Governance and Respect for Human Rights: Stress accountability and...Preparing for the assessments requires defining the missions to be analyzed; subdividing the mission definitions to provide a framework for analytic work
The Defense Science Board Task Force on Tactical Battlefield Communications
1999-12-01
impact of the system is clearly under appreciated. It could be the foundation for a common- user , QoS, Internet and could integrate legacy systems...into a common- user framework as is occurring in the private sector. Unfortunately, the networking aspects of the system are being lost; the focus...system-centric framework to a common- user , internetwork framework . Recommendation V—Information Security
An Access Control and Trust Management Framework for Loosely-Coupled Multidomain Environments
ERIC Educational Resources Information Center
Zhang, Yue
2010-01-01
Multidomain environments where multiple organizations interoperate with each other are becoming a reality as can be seen in emerging Internet-based enterprise applications. Access control to ensure secure interoperation in such an environment is a crucial challenge. A multidomain environment can be categorized as "tightly-coupled" and…
Autism and Pediatric Practice: Toward a Medical Home
ERIC Educational Resources Information Center
Hyman, Susan L.; Johnson, Jara K.
2012-01-01
The pediatrician sees a child for 11 well child visits by their third birthday. The provision of continuous primary care supports development of trust with parents, provides opportunity for screening and surveillance of autism spectrum disorders (ASD), allows monitoring the progress of children requiring therapy, and a framework to support and…
Engaging in Collaboration: A Team of Teams Approach
ERIC Educational Resources Information Center
Young, Carol; Hill, Rachel; Morris, Greg; Woods, Fabiola
2016-01-01
Adapting a Team of Teams model to a school environment provides a framework for a collaborative team culture based on trust, common vision, purposeful conversations, and interconnectivity. School leaders facilitate collaboration by modeling teamwork, as well as transparency and adaptability, to create a positive school culture and thereby improve…
Leading and Growing in a Culture of Reciprocal Trust
ERIC Educational Resources Information Center
Sopko, Kim Moherek; LaRocco, Diana J.
2018-01-01
Building and sustaining an organizational culture and climate where productive and positive leader-follower relationships can thrive is perhaps the single most important responsibility of those who aspire to lead. The attributes of benevolence, honesty, openness, reliability, and competence form a framework that individuals use in determining a…
Quadrennial Review of Military Compensation (5th). Volume 1. Uniformed Services Retirement System
1984-01-01
1120 OP P. .. ~~#~1 ’@" 4P er J,~ 0~*-P * P 0 %~~T % s - % -%n • -%:’-...%. .. ’ - .. -.. e. -’ " eM e...Guide for the 1980’ s " published by the Bankers Trust Company every five -. years. Also useful are the data published by various compensation con...NUMiit.H( S ) 7a. NAME OF MONITORING 0 1>iilATION Office of Secretary of Defense ASD, Manpower, InstallMtions and lb. ADDRESS (City, State, and liP
Extreme Cost Growth: Themes from Six U.S. Air Force Major Defense Acquisition Programs
2015-01-01
launch company SpaceX brought anti-trust litigation against the ULA as early as 2005, arguing that the agreement foreclosed competition. Legal maneuvering...was still under way through 2014. See “ SpaceX and ULA Go Toe-to-Toe Over EELV Contracts,” NASA Spaceflight.com, March 5, 2014. 16 Again, it is...December 9, 2014: http://www.rand.org/pubs/papers/P4748.html “ SpaceX and ULA Go Toe-to-Toe Over EELV Contracts,” NASA Spaceflight.com, March 5
2010-12-01
Mina and Red Star are beneficially owned by Erkin Bekbolotov and Douglas Edelman (through trusts in the name of Delphine Le Dain , his wife and a...documents and testimony, counsel for the companies and its principals disclosed that Erkin Bekbolotov and Delphine Le Dain , the wife of Douglas...Edelman, were the named owners of Mina and Red Star, each with 50 percent. Ms. Le Dain has never had any active role with the companies and, for all
Will new IUD debate lower Dalkon Shield settlements?
1991-07-01
A recent study challenging the risk associated with the use of IUDs will have little impact on the settlements of claims against the maker of the Dalkon Shield, an IUD believed to have caused pelvic inflammatory disease (PID) and other medical problems among its users. Recently, Richard Kronmal, a biostatistician from the University of Washington in Seattle, questioned the data from the Women's Health Study, an investigation sponsored by the National Institutes of Health, which found that the relative risk of PID among IUD users is 1.6. According to Kronmal, the actual relative risk is only 1.2. While other scientists came to the defense of the Women's Health Study, the press reported that Kronmal's report would lead to lower damage settlements for former Dalkon Shield users who have filed a claim against A.H. Robins Corp., the maker of the IUD. But according to Georgene Vairo, chair of the trust for the Dalkon Shield Claims Resolution Facility, the Kronmal study will have no impact on the settlements. Vairo says that the settlements will continue to be based on past offers, which range anywhere from %725 to 6-figure settlements, depending the amount of documentation and proof of injury. So far, the trust has settled some 137,000 claims. Furthermore, Vairo says that the trust still has $2.3 billion with which to settle claims, and has no incentive to reduce payments. The trust was set up by American Home Products Co., which acquired A.H. Robins after the maker of the Dalkon Shield filed for bankruptcy following increasing litigation claims from former Dalkon Shield users.
Channeling the Innovation Stream: A Decision Framework for Selecting Emerging Technologies
ERIC Educational Resources Information Center
Sauer, Philip S.
2010-01-01
The proliferation of emerging technologies offers opportunity but also presents challenges to defense acquisition decision makers seeking to incorporate those technologies as part of the acquisition process. Assessment frameworks and methodologies found in the literature typically address the primary focus of a sponsoring organization's interest…
Translingual Literacy, Language Difference, and Matters of Agency
ERIC Educational Resources Information Center
Lu, Min-Zhan; Horner, Bruce
2013-01-01
We argue that composition scholarship's defenses of language differences in student writing reinforce dominant ideology's spatial framework conceiving language difference as deviation from a norm of sameness. We argue instead for adopting a temporal-spatial framework defining difference as the norm of utterances, and defining languages,…
In Support of the Common Defense: Homeland Defense and Security Journal. Volume 1
2012-04-01
been, “When the nation is least ready, we must be most ready.” While that rings clear as far as warfare is concerned, it is not nearly so when it...JP) 5.0, Joint Operational Planning, and then examines Colonel John A. Warden III’s theory 28 In Support of the Common Defense (Five Ring Model) of...by a discussion of how an adaptation of Warden’s Five Ring Model can be used as a viable framework to assist in a more comprehensive risk
ERIC Educational Resources Information Center
Benson, Martin K.
2010-01-01
The purpose of the descriptive case study with a multiple case framework was to (a) describe the organizational cultures of education programs and leaders in the United States (U.S.) Department of Defense (DoD) voluntary education system on Oahu, Hawaii; (b) determine if an overlapping common organizational culture exists; and (c) assess the…
2001-01-01
improving defense management requires decentralizing the pursuit of efficiency on a framework of strategic planning, cost accounting , and performance...Office (GAO) report (1999) questions whether assumed sav- ings figures may be overly optimistic in not sufficiently accounting for the costs of...inputs�.� money and personnel spaces from opera- tions and maintenance (O&M) budget lines? Without better systems to account for costs and to measure
Defense Procurement: An Analysis of Contract Management Internal Controls
2015-03-22
monitoring activities component of the internal control framework. Acquisition Research Program Graduate School of Business & Public Policy - 7...Research Program Graduate School of Business & Public Policy - 24 - Naval Postgraduate School Tan, L. H. J. (2013). An analysis of internal controls and...Naval Postgraduate School, Monterey, CA 93943. Defense Procurement: An Analysis of Contract Management Internal Controls 22 March 2015 Dr. Juanita
Internet Civil Defense: Feasibility Study
2002-12-09
quell spread of false rumors that induce fear. Summary: Internet Civil Defense can help to manage fear in various ways. We can continuously poll...timely information to minimize rumors and accelerate recovery from disasters. ICD will create an “umbrella” framework to raise the overall...information to minimize rumors and accelerate recovery from disasters. Overall, ICD will collect and deliver actionable information to enhance public
Global Combat Support System-Marine Corps Logistics Chain Management Increment 1 (GCSS-MC LCM Inc 1)
2016-03-01
Production Document DAE - Defense Acquisition Executive DoD - Department of Defense DoDAF - DoD Architecture Framework FD - Full Deployment FDD ...Jul 2004 Milestone B Jun 2007 Jun 2007 Milestone C May 2010 May 2010 FDD Sep 2014 Mar 2015 FD Dec 2015 Dec 2015 GCSS-MC LCM Inc 1 2016 MAR
Managing resources in NHS dentistry: using health economics to inform commissioning decisions.
Holmes, Richard D; Steele, Jimmy; Exley, Catherine E; Donaldson, Cam
2011-05-31
The aim of this study is to develop, apply and evaluate an economics-based framework to assist commissioners in their management of finite resources for local dental services. In April 2006, Primary Care Trusts in England were charged with managing finite dental budgets for the first time, yet several independent reports have since criticised the variability in commissioning skills within these organisations. The study will explore the views of stakeholders (dentists, patients and commissioners) regarding priority setting and the criteria used for decision-making and resource allocation. Two inter-related case studies will explore the dental commissioning and resource allocation processes through the application of a pragmatic economics-based framework known as Programme Budgeting and Marginal Analysis. The study will adopt an action research approach. Qualitative methods including semi-structured interviews, focus groups, field notes and document analysis will record the views of participants and their involvement in the research process. The first case study will be based within a Primary Care Trust where mixed methods will record the views of dentists, patients and dental commissioners on issues, priorities and processes associated with managing local dental services. A Programme Budgeting and Marginal Analysis framework will be applied to determine the potential value of economic principles to the decision-making process. A further case study will be conducted in a secondary care dental teaching hospital using the same approach. Qualitative data will be analysed using thematic analysis and managed using a framework approach. The recent announcement by government regarding the proposed abolition of Primary Care Trusts may pose challenges for the research team regarding their engagement with the research study. However, whichever commissioning organisations are responsible for resource allocation for dental services in the future; resource scarcity is highly likely to remain an issue. Wider understanding of the complexities of priority setting and resource allocation at local levels are important considerations in the development of dental commissioning processes, national oral health policy and the future new dental contract which is expected to be implemented in April 2014.
War-gaming application for future space systems acquisition
NASA Astrophysics Data System (ADS)
Nguyen, Tien M.; Guillen, Andy T.
2016-05-01
Recently the U.S. Department of Defense (DOD) released the Defense Innovation Initiative (DII) [1] to focus DOD on five key aspects; Aspect #1: Recruit talented and innovative people, Aspect #2: Reinvigorate war-gaming, Aspect #3: Initiate long-range research and development programs, Aspect #4: Make DOD practices more innovative, and Aspect #5: Advance technology and new operational concepts. Per DII instruction, this paper concentrates on Aspect #2 and Aspect #4 by reinvigorating the war-gaming effort with a focus on an innovative approach for developing the optimum Program and Technical Baselines (PTBs) and their corresponding optimum acquisition strategies for acquiring future space systems. The paper describes a unified approach for applying the war-gaming concept for future DOD acquisition of space systems. The proposed approach includes a Unified Game-based Acquisition Framework (UGAF) and an Advanced Game-Based Mathematical Framework (AGMF) using Bayesian war-gaming engines to optimize PTB solutions and select the corresponding optimum acquisition strategies for acquiring a space system. The framework defines the action space for all players with a complete description of the elements associated with the games, including Department of Defense Acquisition Authority (DAA), stakeholders, warfighters, and potential contractors, War-Gaming Engines (WGEs) played by DAA, WGEs played by Contractor (KTR), and the players' Payoff and Cost functions (PCFs). The AGMF presented here addresses both complete and incomplete information cases. The proposed framework provides a recipe for the DAA and USAF-Space and Missile Systems Center (SMC) to acquire future space systems optimally.
Development of a Resource Manager Framework for Adaptive Beamformer Selection
2013-12-27
DEVELOPMENT OF A RESOURCE MANAGER FRAMEWORK FOR ADAPTIVE BEAMFORMER SELECTION DISSERTATION Jeremy P. Stringer, Major, USAF AFIT-ENG-DS-13-D-01...Force, the United States Department of Defense or the United States Government. AFIT-ENG-DS-13-D-01 DEVELOPMENT OF A RESOURCE MANAGER FRAMEWORK FOR...ADAPTIVE BEAMFORMER SELECTION DISSERTATION Presented to the Faculty Graduate School of Engineering and Management Air Force Institute of Technology Air
Knowledge-Based Decision Support in Department of Defense Acquisitions
2010-09-01
from the analysis framework developed by Miles and Huberman (1994). The framework describes the major phases of data analysis as data reduction, data... Miles and Huberman , 1994) Survey Effort For this research effort, the survey data was obtained from SAF/ACPO (Air Force Acquisition Chief...rank O-6/GS-15 or above. Data Reduction and Content Analysis Within the Miles and Huberman (1994) framework, the researcher used Microsoft
Züst, Tobias; Agrawal, Anurag A
2017-04-28
Costs of defense are central to our understanding of interactions between organisms and their environment, and defensive phenotypes of plants have long been considered to be constrained by trade-offs that reflect the allocation of limiting resources. Recent advances in uncovering signal transduction networks have revealed that defense trade-offs are often the result of regulatory "decisions" by the plant, enabling it to fine-tune its phenotype in response to diverse environmental challenges. We place these results in the context of classic studies in ecology and evolutionary biology, and propose a unifying framework for growth-defense trade-offs as a means to study the plant's allocation of limiting resources. Pervasive physiological costs constrain the upper limit to growth and defense traits, but the diversity of selective pressures on plants often favors negative correlations at intermediate trait levels. Despite the ubiquity of underlying costs of defense, the current challenge is using physiological and molecular approaches to predict the conditions where they manifest as detectable trade-offs.
Delegation guided by school nursing values: comprehensive knowledge, trust, and empowerment.
Gordon, Shirley C; Barry, Charlotte D
2009-10-01
As health care institutions in the United States respond to shrinking budgets and nursing shortages by increasing the use of unlicensed assistive personnel (UAP), school nursing practice is changing from providing direct care to supervising activities delegated to UAP. Therefore, delegation is a critical area of concern for school nurses. The purpose of this qualitative research study was to explore values guiding the delegation of health care tasks to UAP in school settings from the perspective of the school nurse. An inquiry focus group was conducted with 64 Florida school nurses. Values guiding delegation were comprehensive knowledge, trust, and empowerment. These values provided a framework for guiding the delegation process.
Alkan, Noam; Friedlander, Gilgi; Ment, Dana; Prusky, Dov; Fluhr, Robert
2015-01-01
The fungus Colletotrichum gloeosporioides breaches the fruit cuticle but remains quiescent until fruit ripening signals a switch to necrotrophy, culminating in devastating anthracnose disease. There is a need to understand the distinct fungal arms strategy and the simultaneous fruit response. Transcriptome analysis of fungal-fruit interactions was carried out concurrently in the appressoria, quiescent and necrotrophic stages. Conidia germinating on unripe fruit cuticle showed stage-specific transcription that was accompanied by massive fruit defense responses. The subsequent quiescent stage showed the development of dendritic-like structures and swollen hyphae within the fruit epidermis. The quiescent fungal transcriptome was characterized by activation of chromatin remodeling genes and unsuspected environmental alkalization. Fruit response was portrayed by continued highly integrated massive up-regulation of defense genes. During cuticle infection of green or ripe fruit, fungi recapitulate the same developmental stages but with differing quiescent time spans. The necrotrophic stage showed a dramatic shift in fungal metabolism and up-regulation of pathogenicity factors. Fruit response to necrotrophy showed activation of the salicylic acid pathway, climaxing in cell death. Transcriptome analysis of C. gloeosporioides infection of fruit reveals its distinct stage-specific lifestyle and the concurrent changing fruit response, deepening our perception of the unfolding fungal-fruit arms and defenses race. © 2014 The Authors. New Phytologist © 2014 New Phytologist Trust.
NASA Astrophysics Data System (ADS)
Haley, M.
The purpose of this study was to investigate whether or not there have been successful applications of lean manufacturing principles in highly variable defense IT environments. Specifically, the study assessed if implementation of the lean philosophies by a defense organization yielded repeatable, predictable results in software release schedules reductions. Additionally, the study set out to determine what potential critical success factors (CSF's) were documented in the secondary data captured for each release, and extracted the variables used in the decision making for acceptability of fielding. In evaluating lean applicability to the high variability environment of USAF IT acquisitions, the research was conducted using non-experimental quantitative methods of archival secondary data. The sample for this case study was compiled from a USAF office that had implemented these techniques in pre-development, development and testing, and fielding phases. Based on the research data, acquisitionists and lean practitioners are inherently interconnected. Therefore, an understanding that critical success factors (CSFs) are integral to successful lean application in DoD IT acquisitions is crucial. Through a combination of synergistic alignments, plyometric CSFs were discovered to maximize the effects of each single CSF to produce rapid results in defense IT acquisitions. These include: (1) Enterprise Incorporation, (2) Team Trust, (3) Transformational Leadership, (4) Recursive Improvement, (5) Integrated Synergy, (6) Customer-Centric Culture and (7) Heuristic Communication.
Insights from nature for cybersecurity.
Rzeszutko, Elżbieta; Mazurczyk, Wojciech
2015-01-01
The alarming rise in the quantity of malware in the past few years poses a serious challenge to the security community and requires urgent response. However, current countermeasures seem no longer to be effective. Thus, it is our belief that it is now time for researchers and security experts to turn to nature in the search for novel inspiration for defense systems. Nature has provided species with a whole range of offensive and defensive techniques, which have been developing and improving over the course of billions of years of evolution. Extremely diverse living conditions have promoted a large variation in the devised biosecurity solutions. In this article we introduce a novel Protection framework in which common denominators of the encountered offensive and defensive means are proposed and presented. The bio-inspired solutions are discussed in the context of cybersecurity, where some principles have already been adopted. The deployment of the whole nature-based framework should aid in the design and improvement of modern cyberdefense systems.
Secondary metabolites in plant innate immunity: conserved function of divergent chemicals.
Piasecka, Anna; Jedrzejczak-Rey, Nicolas; Bednarek, Paweł
2015-05-01
Plant secondary metabolites carry out numerous functions in interactions between plants and a broad range of other organisms. Experimental evidence strongly supports the indispensable contribution of many constitutive and pathogen-inducible phytochemicals to plant innate immunity. Extensive studies on model plant species, particularly Arabidopsis thaliana, have brought significant advances in our understanding of the molecular mechanisms underpinning pathogen-triggered biosynthesis and activation of defensive secondary metabolites. However, despite the proven significance of secondary metabolites in plant response to pathogenic microorganisms, little is known about the precise mechanisms underlying their contribution to plant immunity. This insufficiency concerns information on the dynamics of cellular and subcellular localization of defensive phytochemicals during the encounters with microbial pathogens and precise knowledge on their mode of action. As many secondary metabolites are characterized by their in vitro antimicrobial activity, these compounds were commonly considered to function in plant defense as in planta antibiotics. Strikingly, recent experimental evidence suggests that at least some of these compounds alternatively may be involved in controlling several immune responses that are evolutionarily conserved in the plant kingdom, including callose deposition and programmed cell death. © 2015 The Authors. New Phytologist © 2015 New Phytologist Trust.
Adolescents' View of Family Functioning: A Validation of the RES.
ERIC Educational Resources Information Center
Chambliss, Catherine; And Others
The contextual model argues that people in a relationship must experience a sense of loyalty, fairness, and reciprocity in order to build commitment and trust and provide ongoing mutual care. The Relational Ethics Scale (RES), which assess key relational variables, was developed for use in empirical research to test the theoretical framework of…
The Value of Social Care Professionals Working in Extended Schools
ERIC Educational Resources Information Center
Wilkin, Anne; Murfield, Jenny; Lamont, Emily; Kinder, Kay; Dyson, Paul
2008-01-01
Extended schools have featured in a range of government policies, promoting integration between education, social services departments and health services, supported by children's trusts, to better meet the needs of children. Legislative changes, and developments such as the Common Assessment Framework (CAF) and the role of the lead professional,…
Education and Modernization of Micronesia: A Case Study in Development and Development Planning.
ERIC Educational Resources Information Center
Pearse, Richard; Bezanson, Keith A.
The case study examined the development of an overall education plan for the Trust Territory of the Pacific Islands. The methodology of multidisciplinary education planning through the use of general comparative analysis models of political, economic, and social development is explained: Almond and Powell's framework for the analysis of political…
ERIC Educational Resources Information Center
Adidam, Phani Tej; Bingi, R. Prasad; Sindhav, Birud
2004-01-01
This study uses the relationship marketing theory of commitment and trust as a framework to investigate the issue of student retention in business schools. Structural equation modeling was used to examine relationships specified by Morgan and Hunt's (1994) theory of relationship marketing. Students' commitment to the business schools were…
The Accountability Dimension in Quality Assurance: An International Comparison
ERIC Educational Resources Information Center
Stensaker, Bjorn; Harvey, Lee
2013-01-01
The paper reports from a comparative study on systems of quality assurance in 19 countries around the globe, and how these systems function as accountability mechanisms. Based on a theoretical framework for assessing how accountability mechanisms can contribute to build trust in the higher education sector, the analysis of the quality assurance…
McParlin, Catherine; Bell, Ruth; Robson, Stephen C; Muirhead, Colin R; Araújo-Soares, Vera
2017-06-01
to investigate barriers and facilitators to physical activity (PA) guideline implementation for midwives when advising obese pregnant women. a cross-sectional, self-completion, anonymous questionnaire was designed using the Theoretical Domains Framework. this framework was developed to evaluate the implementation of guidelines by health care professionals. A total of 40 questions were included. These were informed by previous research on pregnant women's and midwives views, knowledge and attitudes to PA, and supported by national evidence based guidelines. Demographic information and free text comments were also collected. three diverse NHS Trusts in the North East of England. all midwives employed by two hospital Trusts and the community midwives from the third Trust (n=375) were invited to participate. mean domain scores were calculated. Factor and regression analysis were performed to describe which theoretical domains may be influencing practice. Free text comments were analysed thematically. 192 (53%) questionnaires were returned. Mean domain scores were highest for social professional role and knowledge, and lowest for skills, beliefs about capabilities and behaviour regulation. Regression analysis indicated that skills and memory/attention/decision domains had a statistically significant influence on midwives discussing PA with obese pregnant women and advising them accordingly. Midwives comments indicated that they felt it was part of their role to discuss PA with all pregnant women but felt they lacked the skills and resources to do so effectively. midwives seem to have the necessary knowledge about the need/importance of PA advice for obese women and believe it is part of their role, but perceive they lack necessary skills and resources, and do not plan or prioritise the discussion regarding PA with obese pregnant woman. designing interventions that improve skills, promote routine enquiry regarding PA and provide resources (eg. information, referral pathways) may help improve midwives' PA advice. Copyright © 2016 Elsevier Ltd. All rights reserved.
McFadden, Alison; Atkin, Karl; Bell, Kerry; Innes, Nicola; Jackson, Cath; Jones, Helen; MacGillivray, Steve; Siebelt, Lindsay
2016-11-14
Gypsy/Travellers have poor health and experience discrimination alongside structural and cultural barriers when accessing health services and consequently may mistrust those services. Our study aims to investigate which approaches to community engagement are most likely to be effective at enhancing trust between Gypsy/Travellers and mainstream health services. This multi-method 30-month study, commenced in June 2015, and comprises four stages. 1. Three related reviews: a) systematic review of Gypsy/Travellers' access to health services; b) systematic review of reviews of how trust has been conceptualised within healthcare; c) realist synthesis of community engagement approaches to enhance trust and increase Gypsy/Travellers' participation in health services. The reviews will consider any economic literature; 2. Online consultation with health and social care practitioners, and civil society organisations on existing engagement activities, including perceptions of barriers and good practice; 3. Four in-depth case studies of different Gypsy/Traveller communities, focusing on maternity, early years and child dental health services. The case studies include the views of 32-48 mothers of pre-school children, 32-40 healthcare providers and 8-12 informants from third sector organisations. 4. Two stakeholder workshops exploring whether policy options are realistic, sustainable and replicable. Case study data will be analysed thematically informed by the evaluative framework derived from the realist synthesis in stage one. The main outputs will be: a) an evaluative framework of Gypsy/Travellers' engagement with health services; b) recommendations for policy and practice; c) evidence on which to base future implementation strategies including estimation of costs. Our novel multi-method study seeks to provide recommendations for policy and practice that have potential to improve uptake and delivery of health services, and to reduce lifetime health inequalities for Gypsy/Travellers. The findings may have wider resonance for other marginalised populations. Strengths and limitations of the study are discussed. Prospero registration for literature reviews: CRD42015021955 and CRD42015021950 UKCRN reference: 20036.
Solving the infeasible trust-region problem using approximations.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Renaud, John E.; Perez, Victor M.; Eldred, Michael Scott
2004-07-01
The use of optimization in engineering design has fueled the development of algorithms for specific engineering needs. When the simulations are expensive to evaluate or the outputs present some noise, the direct use of nonlinear optimizers is not advisable, since the optimization process will be expensive and may result in premature convergence. The use of approximations for both cases is an alternative investigated by many researchers including the authors. When approximations are present, a model management is required for proper convergence of the algorithm. In nonlinear programming, the use of trust-regions for globalization of a local algorithm has been provenmore » effective. The same approach has been used to manage the local move limits in sequential approximate optimization frameworks as in Alexandrov et al., Giunta and Eldred, Perez et al. , Rodriguez et al., etc. The experience in the mathematical community has shown that more effective algorithms can be obtained by the specific inclusion of the constraints (SQP type of algorithms) rather than by using a penalty function as in the augmented Lagrangian formulation. The presence of explicit constraints in the local problem bounded by the trust region, however, may have no feasible solution. In order to remedy this problem the mathematical community has developed different versions of a composite steps approach. This approach consists of a normal step to reduce the amount of constraint violation and a tangential step to minimize the objective function maintaining the level of constraint violation attained at the normal step. Two of the authors have developed a different approach for a sequential approximate optimization framework using homotopy ideas to relax the constraints. This algorithm called interior-point trust-region sequential approximate optimization (IPTRSAO) presents some similarities to the two normal-tangential steps algorithms. In this paper, a description of the similarities is presented and an expansion of the two steps algorithm is presented for the case of approximations.« less
Governance Through Privacy, Fairness, and Respect for Individuals.
Baker, Dixie B; Kaye, Jane; Terry, Sharon F
2016-01-01
Individuals have a moral claim to be involved in the governance of their personal data. Individuals' rights include privacy, autonomy, and the ability to choose for themselves how they want to manage risk, consistent with their own personal values and life situations. The Fair Information Practices principles (FIPPs) offer a framework for governance. Privacy-enhancing technology that complies with applicable law and FIPPs offers a dynamic governance tool for enabling the fair and open use of individual's personal data. Any governance model must protect against the risks posed by data misuse. Individual perceptions of risks are a subjective function involving individuals' values toward self, family, and society, their perceptions of trust, and their cognitive decision-making skills. Individual privacy protections and individuals' right to choose are codified in the HIPAA Privacy Rule, which attempts to strike a balance between the dual goals of information flow and privacy protection. The choices most commonly given individuals regarding the use of their health information are binary ("yes" or "no") and immutable. Recent federal recommendations and law recognize the need for granular, dynamic choices. Individuals expect that they will govern the use of their own health and genomic data. Failure to build and maintain individuals' trust increases the likelihood that they will refuse to grant permission to access or use their data. The "no surprises principle" asserts that an individual's personal information should never be collected, used, transmitted, or disclosed in a way that would surprise the individual were she to learn about it. The FIPPs provide a powerful framework for enabling data sharing and use, while maintaining trust. We introduce the eight FIPPs adopted by the Department of Health and Human Services, and provide examples of their interpretation and implementation. Privacy risk and health risk can be reduced by giving consumers control, autonomy, and transparency, and by engaging them in managing their own health. Explicit "consent" may not always be necessary - the FIPPs offer multiple ways to engender trust and avoid surprises.
Keltner, Dacher; Kogan, Aleksandr; Piff, Paul K; Saturn, Sarina R
2014-01-01
The study of prosocial behavior--altruism, cooperation, trust, and the related moral emotions--has matured enough to produce general scholarly consensus that prosociality is widespread, intuitive, and rooted deeply within our biological makeup. Several evolutionary frameworks model the conditions under which prosocial behavior is evolutionarily viable, yet no unifying treatment exists of the psychological decision-making processes that result in prosociality. Here, we provide such a perspective in the form of the sociocultural appraisals, values, and emotions (SAVE) framework of prosociality. We review evidence for the components of our framework at four levels of analysis: intrapsychic, dyadic, group, and cultural. Within these levels, we consider how phenomena such as altruistic punishment, prosocial contagion, self-other similarity, and numerous others give rise to prosocial behavior. We then extend our reasoning to chart the biological underpinnings of prosociality and apply our framework to understand the role of social class in prosociality.
What's trust got to do with it? Revisiting opioid contracts.
Buchman, Daniel Z; Ho, Anita
2014-10-01
Prescription opioid abuse (POA) is an escalating clinical and public health problem. Physician worries about iatrogenic addiction and whether patients are 'drug seeking', 'abusing' and 'diverting' prescription opioids exist against a backdrop of professional and legal consequences of prescribing that have created a climate of distrust in chronic pain management. One attempt to circumvent these worries is the use of opioid contracts that outline conditions patients must agree to in order to receive opioids. Opioid contracts have received some scholarly attention, with trust and trustworthiness identified as key values and virtues. However, few articles have provided a critical account of trust and trustworthiness in this context, particularly when there exists disagreement about their role in terms of enhancing or detracting from the patient-physician relationship. This paper argues that opioid contracts represent a misleading appeal to patient-physician trust. Assuming the patient is untrustworthy may wrongfully undermine the credibility of the patient's testimony, which may exacerbate certain vulnerabilities of the person in pain. However, misplaced trust in certain patients may render the physician vulnerable to the potential harms of POA. If patients distrust their physician, or feel distrusted by them, this may destabilise the therapeutic relationship and compromise care. A process of epistemic humility may help cultivate mutual patient-physician trust. Epistemic humility is a collaborative effort between physicians and patients that recognises the role of patients' subjective knowledge in enhancing physicians' self-understanding of their theoretical and practice frameworks, values and assumptions about the motivations of certain patients who report chronic pain. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.
Jones, Sarah; Sloan, David; Evans, Hannah E R; Williams, Sian
2015-08-01
There is evidence that health and well-being of the National Health Service (NHS) workforce affects organizational and patient outcomes. A Cochrane review of the effectiveness of clinical audit to improve quality of care has shown great variation between studies, depending on the design and intensity of support offered. This study evaluates the effectiveness of an organizational audit methodology with (1) action-planning workshops and follow-up and (2) audit feedback alone, to support the implementation of the National Institute for Health and Care Excellence (NICE) workplace guidance. Two rounds of audit using a self-administered online questionnaire were conducted. An overall implementation score was devised for each trust. Following round 1, interviews were conducted with a cohort of trusts with high scores. The interviews used a theory-based framework to identify predictors of and barriers to successful implementation. From this, the content for action-planning workshops was devised and workshops held with lower scoring trusts. The remaining trusts received only written feedback on their audit results. Changes in the implementation score between rounds 1 and 2 were compared within and between cohorts. The median improvement in scores between rounds 1 and 2 was statistically significant except where baseline score was high. The improvement for trusts who received workshops was very much better than those who did not (P < 0.001). This difference remained after adjustment using stratification by baseline score (P = 0.001). Audit, combined with action-planning workshops and follow-up, appears to be more effective in improving implementation of NICE workplace health and well-being guidance than audit with feedback alone. © 2015 John Wiley & Sons, Ltd.
Anonymity-preserving Reputation Management System for health sector
Hamid, Zara; Abdul, Wadood; Ghouzali, Sanaa; Khan, Abid; Malik, Saif Ur Rehman; Shaukat Khan, Mansoor; Nawaz, Sarfraz
2018-01-01
In health sector, trust is considered important because it indirectly influences the quality of health care through patient satisfaction, adherence and the continuity of its relationship with health care professionals and the promotion of accurate and timely diagnoses. One of the important requirements of TRSs in the health sector is rating secrecy, which mandates that the identification information about the service consumer should be kept secret to prevent any privacy violation. Anonymity and trust are two imperative objectives, and no significant explicit efforts have been made to achieve both of them at the same time. In this paper, we present a framework for solving the problem of reconciling trust with anonymity in the health sector. Our solution comprises Anonymous Reputation Management (ARM) protocol and Context-aware Trustworthiness Assessment (CTA) protocol. ARM protocol ensures that only those service consumers who received a service from a specific service provider provide a recommendation score anonymously with in the specified time limit. The CTA protocol computes the reputation of a user as a service provider and as a recommender. To determine the correctness of the proposed ARM protocol, formal modelling and verification are performed using High Level Petri Nets (HLPN) and Z3 Solver. Our simulation results verify the accuracy of the proposed context-aware trust assessment scheme. PMID:29649267
From 'automation' to 'autonomy': the importance of trust repair in human-machine interaction.
de Visser, Ewart J; Pak, Richard; Shaw, Tyler H
2018-04-09
Modern interactions with technology are increasingly moving away from simple human use of computers as tools to the establishment of human relationships with autonomous entities that carry out actions on our behalf. In a recent commentary, Peter Hancock issued a stark warning to the field of human factors that attention must be focused on the appropriate design of a new class of technology: highly autonomous systems. In this article, we heed the warning and propose a human-centred approach directly aimed at ensuring that future human-autonomy interactions remain focused on the user's needs and preferences. By adapting literature from industrial psychology, we propose a framework to infuse a unique human-like ability, building and actively repairing trust, into autonomous systems. We conclude by proposing a model to guide the design of future autonomy and a research agenda to explore current challenges in repairing trust between humans and autonomous systems. Practitioner Summary: This paper is a call to practitioners to re-cast our connection to technology as akin to a relationship between two humans rather than between a human and their tools. To that end, designing autonomy with trust repair abilities will ensure future technology maintains and repairs relationships with their human partners.
McCabe, T J; Sambrook, Sally
2014-05-01
Although trust has been investigated in the health context, limited research explores nurse and nurse manager perceptions of trust. To explore the concept of trust amongst nurses and nurse managers at individual, interpersonal and organisational levels. Our paper reports the findings from an interpretivist study conducted within the British National Health Service, involving thirty-nine semi-structured interviews with nurses and nurse managers. Large acute and small community organisation within the British National Health Service. 28 nurses and 11 nurse managers working within an Acute and a Community sector organisation - 20 and 19 in each organisation. Participants were selected through a process of purposive sampling, reflecting variations in terms of age, grade, ward and tenure. We utilise a concept analysis framework in exploring the antecedents, attributes and consequences of trust amongst nurses and nurse managers at individual, interpersonal and organisational levels. Key findings suggest that trust is formed within the immediate ward environment, and is significantly influenced by the role of line manager. Other positively influencing factors include professionalism and commitment to the nursing profession. These form the basis for the teamwork, delegation, support, open communication systems, confidentiality and discretion essential to delivering quality patient care. Negatively influencing factors include new management concepts, practices and styles overseen by managers recruited from the private sector. New management concepts were associated with reductions in the number of qualified nurses and increasing numbers of untrained nursing staff, reduced direct patient contact, less opportunities for professional training and development and deteriorating terms and conditions of employment. Our findings offer insight for managers, nurses and human resource practitioners to help build high trust relationships in a health care context. Of particular import is the need for managers to communicate more effectively organisational and financial constraints, in a manner that does not 'alienate' nurses and nurse managers, by highlighting their value and acknowledging their role in delivering high quality patient care. Copyright © 2013 Elsevier Ltd. All rights reserved.
ERIC Educational Resources Information Center
Smith, Morgan Wilder
2012-01-01
This study focuses on how superintendents who have experienced success, as measured by having a school district achieve and consistently achieve in the face of many challenges today. Several key strategies and leadership frameworks that superintendents use are examined through a review of current research and are validated by reviewing the results…
ERIC Educational Resources Information Center
Pincus, J. David; And Others
Using H. Dennis' (1974) five-factor communication climate construct framework as a predictor variable, a study investigated the relationship between perceptions of communication climate and job satisfaction of supervisory employees in the banking industry. A systematic random sample was drawn from 68 commercial banks in Orange County, California,…
Root symbionts: Powerful drivers of plant above- and belowground indirect defenses.
Rasmann, Sergio; Bennett, Alison; Biere, Arjen; Karley, Alison; Guerrieri, Emilio
2017-12-01
Soil microbial mutualists of plants, including mycorrhizal fungi, non-mycorrhizal fungi and plant growth promoting rhizobacteria, have been typically characterized for increasing nutrient acquisition and plant growth. More recently, soil microbes have also been shown to increase direct plant defense against above- and belowground herbivores. Plants, however, do not only rely on direct defenses when attacked, but they can also recruit pest antagonists such as predators and parasitoids, both above and belowground, mainly via the release of volatile organic compounds (i.e., indirect defenses). In this review, we illustrate the main features and effects of soil microbial mutualists of plants on plant indirect defenses and discuss possible applications within the framework of sustainable crop protection against root- and shoot-feeding arthropod pests. We indicate the main knowledge gaps and the future challenges to be addressed in the study and application of these multifaceted interactions. © 2017 Institute of Zoology, Chinese Academy of Sciences.
Ovseiko, Pavel V; Melham, Karen; Fowler, Jan; Buchan, Alastair M
2015-01-22
Around the world, the last two decades have been characterised by an increase in the numbers of mergers between healthcare providers, including some of the most prestigious university hospitals and academic health centres. However, many mergers fail to bring the anticipated benefits, and successful post-merger integration in university hospitals and academic health centres is even harder to achieve. An increasing body of literature suggests that organisational culture affects the success of post-merger integration and academic-clinical collaboration. This paper reports findings from a mixed-methods single-site study to examine 1) the perceptions of organisational culture in academic and clinical enterprises at one National Health Service (NHS) trust, and 2) the major cultural issues for its post-merger integration with another NHS trust and strategic partnership with a university. From the entire population of 72 clinician-scientists at one of the legacy NHS trusts, 38 (53%) completed a quantitative Competing Values Framework survey and 24 (33%) also provided qualitative responses. The survey was followed up by semi-structured interviews with six clinician-scientists and a group discussion including five senior managers. The cultures of two legacy NHS trusts differed and were primarily distinct from the culture of the academic enterprise. Major cultural issues were related to the relative size, influence, and history of the legacy NHS trusts, and the implications of these for respective identities, clinical services, and finances. Strategic partnership with a university served as an important ameliorating consideration in reaching trust merger. However, some aspects of university entrepreneurial culture are difficult to reconcile with the NHS service delivery model and may create tension. There are challenges in preserving a more desirable culture at one of the legacy NHS trusts, enhancing cultures in both legacy NHS trusts during their post-merger integration, and in aligning academic and clinical cultures following strategic partnership with a university. The seeds of success may be found in current best practice, good will, and a near identical ideal of the future preferred culture. Strong, fair leadership will be required both nationally and locally for the success of mergers and post-merger integration in university hospitals and academic health centres.
Hollinshead, Jayne; Stirling, Linda
2014-07-01
This paper describes the challenges faced by a trust in England following the introduction of the Health Visitor Implementation Plan. Two practice education facilitators designed a conceptual curriculum framework to ensure quality student health visitor education in practice. This curriculum complimented the excellent academic course already delivered by the University. A justification is provided for the design of the curriculum framework, including a rationale for the introduction of specific training sessions. Student and practice teacher feedback demonstrate the success of the introduction of this programme to ensure the development of student health visitors fit for practice. The conclusion places emphasis on the importance of continuous evaluation of the training programme to meet the needs of the students and the service.
Hu, Lingfei; Ye, Meng; Kuai, Peng; Ye, Miaofen; Erb, Matthias; Lou, Yonggen
2018-06-07
Plants are constantly exposed to a variety of environmental stresses, including herbivory. How plants perceive herbivores on a molecular level is poorly understood. Leucine-rich repeat receptor-like kinases (LRR-RLKs), the largest subfamily of RLKs, are essential for plants to detect external stress signals, and may therefore also be involved in herbivore perception. Here, we employed RNA interference silencing, phytohormone profiling and complementation, as well as herbivore resistance assays, to investigate the requirement of an LRR-RLK for the initiation of rice (Oryza sativa) defenses against the chewing herbivore striped stem borer (SSB) Chilo suppressalis. We discovered a plasma membrane-localized LRR-RLK, OsLRR-RLK1, whose transcription is strongly up-regulated by SSB attack and treatment with oral secretions of Spodoptera frugiperda. OsLRR-RLK1 acts upstream of mitogen-activated protein kinase (MPK) cascades, and positively regulates defense-related MPKs and WRKY transcription factors. Moreover, OsLRR-RLK1 is a positive regulator of SSB-elicited, but not wound-elicited, levels of jasmonic acid and ethylene, trypsin protease inhibitor activity and plant resistance towards SSB. OsLRR-RLK1 therefore plays an important role in herbivory-induced defenses of rice. Given the well-documented role of LRR-RLKs in the perception of stress-related molecules, we speculate that OsLRR-RLK1 may be involved in the perception of herbivory-associated molecular patterns. © 2018 The Authors. New Phytologist © 2018 New Phytologist Trust.
2003-09-29
for information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget...selected to be the Product Manager for the Joint Advanced Special Operations Radio System, at Fort Monmouth, New Jersey and successfully completed a...use,” or in defense terms-- operational effectiveness and suitability. Beyond the business aspects of program management , measurement of system
2015-02-12
become better stewards of scarce resources, to eliminate potential waste, and to reduce abuse of taxpayer money due to poor management, operational...stewards of scarce resources, to eliminate potential waste, and to reduce abuse of taxpayer money due to poor management, operational redundancy and...Conference—Best Practices and Lessons Learned and Training and Educating for Acquisition, Procurement and Contracting in Defense Institutions
Nature's Trust: A Paradigm for Natural Resources Stewardship
NASA Astrophysics Data System (ADS)
Wood, M. C.; Whitelaw, E.; Doppelt, B.; Burchell, A.
2007-12-01
Climate change uncertainty puts a premium on all remaining natural resources. Farmland, air, water, wetlands, wildlife, soils, mineral resources and forests must be protected to ensure that Americans - present citizens and future generations - have the fundamental survival resources they need in a future that holds many unknowns. Moreover, in light of the need to manage resources given climate and particle forcing, government must mitigate dangerous carbon loading of the atmosphere. Confronting climate change and protecting natural resources requires a clear sense of government obligation that is inherent to sovereignty, not a matter of political choice. Our government representatives can and must reframe government's discretion into a trustee obligation to protect Nature and ensure natural resource stewardship. Drawing upon enduring legal principles and court decisions, government can be characterized as a trustee of the natural resources essential to human survival. A trust is a fundamental type of ownership whereby one manages property for the benefit of another. Viewed as a trust, the environment consists of a portfolio of quantified natural assets that government manages. As beneficiaries, citizens hold a common property interest in defined, bounded assets that make up Nature's Trust. Such trust principles form the bedrock of statutory law. Trustees have a fiduciary obligation to protect trust assets and may not allow destruction of property they manage. This session will provide a policy frame for current scientific efforts to address climate change and natural resources loss. Under the Nature's Trust frame, U.S. government leaders and agencies at every level inherit a strict fiduciary obligation to protect our collective natural resources, including our water and the atmosphere, as assets in the trust. Their fiduciary standard of care consists of a proportionate responsibility, which ties directly to "Nature's Mandate" as defined by current climate scientists: each jurisdiction must cap and begin reducing total GHG emissions within the decade and continue reduction until they reach 80% below 1990 levels by 2050. The trust framework positions all nations of the world in a logical relationship that can guide international diplomacy. The atmosphere, oceans and the global hydrologic cycle are commonly held assets shared as property among all nations on Earth. Thus, all Nations are sovereign co-tenant trustees, each holding the fiduciary responsibility to not degrade the common asset and to accomplish proportionate carbon reduction.
2008-06-01
executes the avionics test) can run on the new ATS thus creating the common ATS framework . The system will also enable numerous new functional...Enterprise-level architecture that reflects corporate DoD priorities and requirements for business systems, and provides a common framework to ensure that...entire Business Mission Area (BMA) of the DoD. The BEA also contains a set of integrated Department of Defense Architecture Framework (DoDAF
NASA Astrophysics Data System (ADS)
Omoto, Akira
2013-12-01
After a short summary of the nuclear accident at the Fukushima Daiichi Nuclear Power Station, this paper discusses “what went wrong” by illustrating the problems of the specific layers of defense-in-depth (basic strategy for assuring nuclear safety) and “what lessons are universal.” Breaches in the multiple layers of defense were particularly significant in respective protection (a) against natural disasters (first layer of defense) as well as (b) against severe conditions, specifically in this case, a complete loss of AC/DC power and isolation from the primary heat sink (fourth layer of defense). Confusion in crisis management by the government and insufficient implementation of offsite emergency plans revealed problems in the fifth layer of defense. By taking into consideration managerial and safety culture that might have relevance to this accident, in the author's view, universal lessons are as follows: Resilience: the need to enhance organizational capabilities to respond, monitor, anticipate, and learn in changing conditions, especially to prepare for the unexpected. This includes increasing distance to cliff edge by knowing where it exists and how to increase safety margin. Responsibility: the operator is primarily responsible for safety, and the government is responsible for protecting public health and environment. For both, their right decisions are supported by competence, knowledge, and an understanding of the technology, as well as humble attitudes toward the limitations of what we know and what we can learn from others. Social license to operate: the need to avoid, as much as possible regardless of its probability of occurrence, the reasonably anticipated environmental impact (such as land contamination), as well as to build public confidence/trust and a renewed liability scheme.
Cosme, Marco; Lu, Jing; Erb, Matthias; Stout, Michael Joseph; Franken, Philipp; Wurst, Susanne
2016-08-01
Plant-microbe mutualisms can improve plant defense, but the impact of root endophytes on below-ground herbivore interactions remains unknown. We investigated the effects of the root endophyte Piriformospora indica on interactions between rice (Oryza sativa) plants and its root herbivore rice water weevil (RWW; Lissorhoptrus oryzophilus), and how plant jasmonic acid (JA) and GA regulate this tripartite interaction. Glasshouse experiments with wild-type rice and coi1-18 and Eui1-OX mutants combined with nutrient, jasmonate and gene expression analyses were used to test: whether RWW adult herbivory above ground influences subsequent damage caused by larval herbivory below ground; whether P. indica protects plants against RWW; and whether GA and JA signaling mediate these interactions. The endophyte induced plant tolerance to root herbivory. RWW adults and larvae acted synergistically via JA signaling to reduce root growth, while endophyte-elicited GA biosynthesis suppressed the herbivore-induced JA in roots and recovered plant growth. Our study shows for the first time the impact of a root endophyte on plant defense against below-ground herbivores, adds to growing evidence that induced tolerance may be an important root defense, and implicates GA as a signal component of inducible plant tolerance against biotic stress. © 2016 The Authors. New Phytologist © 2016 New Phytologist Trust.
ERIC Educational Resources Information Center
Sprangel, Joseph; Stavros, Jacqueline; Cole, Matthew
2011-01-01
New forms of organization development are moving from a classical diagnostic perspective to a dialogic perspective. This move includes a focus on exploring positive states of organizing, shared aspirations, and the design of preferred futures as key outcomes of a strategic change process. Training and development that applies the elements of the…
ERIC Educational Resources Information Center
Torney-Purta, Judith; Richardson, Wendy Klandl
The goal of the International Association for the Evaluation of Educational Achievement (IEA) Civic Education Study has been to examine, in a comparative framework, the political socialization of adolescents as they prepare for their roles as citizens of democracies. Approximately 90,000 students from the modal grade for 14-year-olds from…
ERIC Educational Resources Information Center
Griffin, Michaela
2010-01-01
This case study examined a joint assessment and allocation panel set up to inform local implementation of the UK Government's policy of integrating children's services, particularly the introduction of a Common Assessment Framework and the lead practitioner role. It brought together agencies serving one community. Professionals and parents agreed…
The Changing Contours of the Psychological Contract: Unpacking Context and Circumstances of Breach
ERIC Educational Resources Information Center
Pate, Judy
2006-01-01
Purpose: The purpose of this paper is to propose a processual framework of psychological contract breach, which maps holistically the interactions among concepts drawn from the trust and justice literature. However, the price of a holistic picture is frequently a lack of depth of analysis of any single variable, and consequently the second part of…
Jeffrey J. Brooks; Alexander N. Bujak; Joseph G. Champ; Daniel R. Williams
2006-01-01
We reviewed, annotated, and organized recent social science research and developed a framework for addressing the wildland fire social problem. We annotated articles related to three topic areas or factors, which are critical for understanding collective action, particularly in the wildland-urban interface. These factors are collaborative capacity, problem framing, and...
Irestig, Robert; Burström, Kristina; Wessel, Maja; Lynöe, Niels
2010-05-01
To elucidate the perceived treatment that the homeless have received from the healthcare and other societal organisations and to present homeless persons' trust in the healthcare system and suggestions of necessary changes for improving it. Homeless individuals in special houses and institutions in the County of Stockholm were asked to answer a short version of a public health survey, including added questions about how they experienced the healthcare providers' attitudes towards them and how much trust they had in the healthcare system. A total of 155 homeless persons (123 male and 32 female) were interviewed. Three-quarters of the participants stated that they had fairly or very high trust in healthcare services and also felt that they had been fairly or very well treated. Fewer females than males reported being treated well and they declared a lower degree of trust in the healthcare system. The homeless suggest that extra resources be set aside to organise their healthcare, including a higher level of knowledge of the medical problems prevailing in the group. Those who felt badly treated also asked for less neglect and disrespect from the healthcare staff. Even though a majority experience that they are being well treated within the healthcare system, the study also indicated disadvantages in the treatment of homeless persons in Sweden. The study also reveals an imbalance between the official ethical framework in Sweden and of the specific moral of some individual healthcare providers. One way to facilitate their entry into the healthcare system might be to create special surgeries for the homeless.
Popularity versus similarity in growing networks
NASA Astrophysics Data System (ADS)
Krioukov, Dmitri; Papadopoulos, Fragkiskos; Kitsak, Maksim; Serrano, Mariangeles; Boguna, Marian
2012-02-01
Preferential attachment is a powerful mechanism explaining the emergence of scaling in growing networks. If new connections are established preferentially to more popular nodes in a network, then the network is scale-free. Here we show that not only popularity but also similarity is a strong force shaping the network structure and dynamics. We develop a framework where new connections, instead of preferring popular nodes, optimize certain trade-offs between popularity and similarity. The framework admits a geometric interpretation, in which preferential attachment emerges from local optimization processes. As opposed to preferential attachment, the optimization framework accurately describes large-scale evolution of technological (Internet), social (web of trust), and biological (E.coli metabolic) networks, predicting the probability of new links in them with a remarkable precision. The developed framework can thus be used for predicting new links in evolving networks, and provides a different perspective on preferential attachment as an emergent phenomenon.
Clinical governance is "ACE"--using the EFQM excellence model to support baseline assessment.
Holland, K; Fennell, S
2000-01-01
The introduction of clinical governance in the "new NHS" means that National Health Service (NHS) organisations are now accountable for the quality of the services they provide to their local communities. As part of the implementation of clinical governance in the NHS, Trusts and health authorities had to complete a baseline assessment of their capability and capacity by September 1999. Describes one Trust's approach to developing and implementing its baseline assessment tool, based upon its existing use of the European Foundation for Quality Management (EFQM) Excellence Model. An initial review of the process suggests that the model provides an adaptable framework for the development of a comprehensive and practical assessment tool and that self-assessment ensures ownership of action plans at service level.
The Climate Change Strategy Gap: Crafting a Strategic Framework for the Department of Defense
2016-03-24
Climate Change Effects: Issues for International and US National Security (Alexandria, VA: The Institute for Defense Analyses, 2009), 3. 3 in...Security Needs Assessment, (New York: United Nations, 2012), 7. 50 Christine Youngblut, Climate Change Effects: Issues for International and US National...Master’s Thesis 3. DATES COVERED (From - To) 10-01-2015 - 03-19-2016 4. TITLE AND SUBTITLE The Climate Change Strategy Gap: Crafting a Strategic 5a
The Climate Change Strategy Gap: Crafting a Strategic Framework for the Department of Defense
2016-03-23
Climate Change Effects: Issues for International and US National Security (Alexandria, VA: The Institute for Defense Analyses, 2009), 3. 3 in...Security Needs Assessment, (New York: United Nations, 2012), 7. 50 Christine Youngblut, Climate Change Effects: Issues for International and US National...Master’s Thesis 3. DATES COVERED (From - To) 10-01-2015 - 03-19-2016 4. TITLE AND SUBTITLE The Climate Change Strategy Gap: Crafting a Strategic 5a
Joint Space Operations Center (JSpOC) Mission System Increment 2 (JMS Inc 2)
2016-03-01
Defense Acquisition Executive DoD - Department of Defense DoDAF - DoD Architecture Framework FD - Full Deployment FDD - Full Deployment Decision FY...date has slipped from September 2016 to December 2016 and FDD has slipped from October 2016 to March 2017 since the last MAIS Annual Report...testing. This added test time, in combination with funding reductions and the US Government furlough and shutdown in FY13, caused a total FDD slip
Air and Space Operations Center-Weapon System Increment 10.2 (AOC-WS Inc 10.2)
2016-03-01
DAE - Defense Acquisition Executive DoD - Department of Defense DoDAF - DoD Architecture Framework FD - Full Deployment FDD - Full Deployment...the AOC 10.2 MAIS was approximately 11 months beyond the original schedule estimates for MS-C, July 31, 2015, and FDD , July 31, 2016. Accordingly...ADM effectively acknowledged selection of AOC-WS Inc 10.2 as the Preferred Alternative, thereby starting the 5-year development window to attain FDD
Intelligence Cooperation in the Asia-Pacific Region: Establishing a Framework for Multilateralism
2003-03-01
responding in a manner consistent with an absence of diplomacy. The North is developing nuclear weapons out of self -defense. The participant remarked...capabilities, the support for terrorism. We see these things and feel self defense needs to be defined more broadly and needs to be more proactive. The...occur, which affected the tourism industry in the area. The Malaysian government is serious about stop- ping this problem and has recently devoted an
Bao, Fei; Huang, Xiaozhen; Zhu, Chipan; Zhang, Xiaoyan; Li, Xin; Yang, Shuhua
2014-06-01
Plant defense responses are regulated by temperature. In Arabidopsis, the chilling-sensitive mutant chs2-1 (rpp4-1d) contains a gain-of-function mutation in the TIR-NB-LRR (Toll and interleukin 1 receptor-nucleotide binding-leucine-rich repeat) gene, RPP4 (RECOGNITION OF PERONOSPORA PARASITICA 4), which leads to constitutive activation of the defense response at low temperatures. Here, we identified and characterized two suppressors of rpp4-1d from a genetic screen, hsp90.2 and hsp90.3, which carry point mutations in the cytosolic heat shock proteins HSP90.2 and HSP90.3, respectively. The hsp90 mutants suppressed the chilling sensitivity of rpp4-1d, including seedling lethality, activation of the defense responses and cell death under chilling stress. The hsp90 mutants exhibited compromised RPM1 (RESISTANCE TO PSEUDOMONAS MACULICOLA 1)-, RPS4 (RESISTANCE TO P. SYRINGAE 4)- and RPP4-mediated pathogen resistance. The wild-type RPP4 and the mutated form rpp4 could interact with HSP90 to form a protein complex. Furthermore, RPP4 and rpp4 proteins accumulated in the cytoplasm and nucleus at normal temperatures, whereas the nuclear accumulation of the mutated rpp4 was decreased at low temperatures. Genetic analysis of the intragenic suppressors of rpp4-1d revealed the important functions of the NB-ARC and LRR domains of RPP4 in temperature-dependent defense signaling. In addition, the rpp4-1d-induced chilling sensitivity was largely independent of the WRKY70 or MOS (modifier of snc1) genes. [Correction added after online publication 11 March 2013: the expansions of TIR-NB-LRR and RPS4 were amended] This study reveals that Arabidopsis HSP90 regulates RPP4-mediated temperature-dependent cell death and defense responses. © 2014 The Authors. New Phytologist © 2014 New Phytologist Trust.
de Bruin, Jeroen S; Zeckl, Julia; Adlassnig, Katharina; Blacky, Alexander; Koller, Walter; Rappelsberger, Andrea; Adlassnig, Klaus-Peter
2017-01-01
The creation of clinical decision support systems has received a strong impulse over the last years, but their integration into a clinical routine has lagged behind, partly due to a lack of interoperability and trust by physicians. We report on the implementation of a clinical foundation framework in Arden Syntax, comprising knowledge units for (a) preprocessing raw clinical data, (b) the determination of single clinical concepts, and (c) more complex medical knowledge, which can be modeled through the composition and configuration of knowledge units in this framework. Thus, it can be tailored to clinical institutions or patients' caregivers. In the present version, we integrated knowledge units for several infection-related clinical concepts into the framework and developed a clinical event monitoring system over the framework that employs three different scenarios for monitoring clinical signs of bloodstream infection. The clinical event monitoring system was tested using data from intensive care units at Vienna General Hospital, Austria.
Scaling Agile Methods for Department of Defense Programs
2016-12-01
concepts that drive the design of scaling frameworks, the contextual drivers that shape implementation, and widely known frameworks available today...Barlow probably governs some of the design choices you make. Barlow’s formula helps us understand the relationship between the outside diameter of a...encouraged to cross-train engineering staff and move away from a team structure where people focus on only one specialty, such as design
Open Innovation and Technology Maturity Analysis
2007-09-11
Management Process Develop a framework which incorporates DoD Acquisition Management framework (e.g: TRLs), DoD Business Transformation strategies...Public Organizations (DoD): DoD Force Transformation : • Support the Joint Warfighting Capability of the DoD • Enable Rapid Access to Information for...Survey - 2007 Defense Transformation : Clear Leadership, Accountability, and Management Tools Are Needed to Enhance DOD’s Efforts to Transform Military
Steinbeis, Nikolaus; Engert, Veronika; Linz, Roman; Singer, Tania
2015-12-01
The prevalence of psychosocial stress in Western societies is constantly on the rise. Its influence on social decision-making, however, remains poorly understood. Whereas, it is known that stress triggers psychological and physiological defense mechanisms, indications of such patterns in social decisions are ambivalent. We sought to elucidate the underlying mechanisms of stress-induced social decisions. We recruited 145 men, who were individually exposed to either a psychosocial stressor or a control condition, while primed with affiliation by interacting either with members of an in- or an out-group. We found that stressed participants were less trusting and engaged in less costly punishment compared to the non-stressed control group. Interacting with out-group members led to less reciprocity and more spiteful punishment. There was no interaction between stress and the affiliation conditions in any of the used social-decision-making paradigms. Lastly, while stress-reactive cortisol levels had no effect on trust behavior, higher baseline cortisol was correlated with greater trust. Our findings suggest that previous ambiguities in data reported on the influence of stress on social decisions, namely tend-and-befriend behavior may have arisen through critical social confounds in the induction of stress. When controlling for potential social confounds, stress may trigger fight-or-flight behavior as indicated by increased social anxiety. These findings highlight the considerable context-dependence of psychosocial stress and its effects on social behavior. Copyright © 2015 Elsevier Ltd. All rights reserved.
Van Devanter, Nancy; Islam, Nadia; Trinh-Shevrin, Chau
2015-01-01
We formulated a conceptual framework that begins to answer the national call to improve health care access, delivery, and quality by explaining the processes through which community health workers (CHWs) facilitate patients’ adoption of healthy behaviors. In September 2011 to January 2012, we conducted a qualitative study that triangulated multiple data sources: 26 in-depth interviews, training documents, and patient charts. CHWs served as partners in health to immigrant Filipinos with hypertension, leveraging their cultural congruence with intervention participants, employing interpersonal communication techniques to build trust and rapport, providing social support, and assisting with health behavior change. To drive the field forward, this work can be expanded with framework testing that may influence future CHW training and interventions. PMID:25790405
Katigbak, Carina; Van Devanter, Nancy; Islam, Nadia; Trinh-Shevrin, Chau
2015-05-01
We formulated a conceptual framework that begins to answer the national call to improve health care access, delivery, and quality by explaining the processes through which community health workers (CHWs) facilitate patients' adoption of healthy behaviors. In September 2011 to January 2012, we conducted a qualitative study that triangulated multiple data sources: 26 in-depth interviews, training documents, and patient charts. CHWs served as partners in health to immigrant Filipinos with hypertension, leveraging their cultural congruence with intervention participants, employing interpersonal communication techniques to build trust and rapport, providing social support, and assisting with health behavior change. To drive the field forward, this work can be expanded with framework testing that may influence future CHW training and interventions.
When do people cooperate? The neuroeconomics of prosocial decision making.
Declerck, Carolyn H; Boone, Christophe; Emonds, Griet
2013-02-01
Understanding the roots of prosocial behavior is an interdisciplinary research endeavor that has generated an abundance of empirical data across many disciplines. This review integrates research findings from different fields into a novel theoretical framework that can account for when prosocial behavior is likely to occur. Specifically, we propose that the motivation to cooperate (or not), generated by the reward system in the brain (extending from the striatum to the ventromedial prefrontal cortex), is modulated by two neural networks: a cognitive control system (centered on the lateral prefrontal cortex) that processes extrinsic cooperative incentives, and/or a social cognition system (including the temporo-parietal junction, the medial prefrontal cortex and the amygdala) that processes trust and/or threat signals. The independent modulatory influence of incentives and trust on the decision to cooperate is substantiated by a growing body of neuroimaging data and reconciles the apparent paradox between economic versus social rationality in the literature, suggesting that we are in fact wired for both. Furthermore, the theoretical framework can account for substantial behavioral heterogeneity in prosocial behavior. Based on the existing data, we postulate that self-regarding individuals (who are more likely to adopt an economically rational strategy) are more responsive to extrinsic cooperative incentives and therefore rely relatively more on cognitive control to make (un)cooperative decisions, whereas other-regarding individuals (who are more likely to adopt a socially rational strategy) are more sensitive to trust signals to avoid betrayal and recruit relatively more brain activity in the social cognition system. Several additional hypotheses with respect to the neural roots of social preferences are derived from the model and suggested for future research. Copyright © 2012 Elsevier Inc. All rights reserved.
Chen, Nien-Tsu Nancy
2015-07-01
Major health behavior change models tend to consider health decisions as primarily resulting from a systematic appraisal of relevant beliefs, such as the perceived benefits and risks of a pharmacological intervention. Drawing on research from the disciplines of risk management, communication, and psychology, this study proposed the inclusion of a heuristic route in established theory and tested the direction of influence between heuristic and systematic process variables. Affect and social trust were included as key heuristics in the proposed dual-mode framework of health decision making. Furthermore, exposure to health-related coverage on television was considered potentially influential over both heuristic and systematic process variables. To test this framework, data were collected from a national probability sample of 584 adults in the United States in 2012 regarding their decision to vaccinate against a hypothetical avian flu. The results provided some support for the bidirectional influence between heuristic and systematic processing. Affect toward flu vaccination and trust in the Food and Drug Administration were found to be powerful predictors of vaccination intention, enhancing intention both directly and indirectly via certain systematic process variables. The direction of influence between perceived susceptibility and severity, on the one hand, and affect, on the other, is less clear, suggesting the need for further research. Contrary to the opinion of media critics, exposure to televised health coverage was negatively associated with the perceived risks of vaccination. Results from this study carry theoretical and practical implications, and applying this model to the acceptance of different health interventions constitutes an area for future inquiries. © 2015 Society for Risk Analysis.
E-loyalty towards a cancer information website: applying a theoretical framework.
Crutzen, Rik; Beekers, Nienke; van Eenbergen, Mies; Becker, Monique; Jongen, Lilian; van Osch, Liesbeth
2014-06-01
To provide more insight into user perceptions related to e-loyalty towards a cancer information website. This is needed to assure adequate provision of high quality information during the full process of cancer treatment-from diagnosis to after care-and an important first step towards optimizing cancer information websites in order to promote e-loyalty. Participants were cancer patients (n = 63) and informal caregivers (n = 202) that visited a website providing regional information about cancer care for all types of cancer. Subsequently, they filled out a questionnaire assessing e-loyalty towards the website and user perceptions (efficiency, effectiveness, active trust and enjoyment) based on a theoretical framework derived from the field of e-commerce. A structural equation model was constructed to test the relationships between user perceptions and e-loyalty. Participants in general could find the information they were looking for (efficiency), thought it was relevant (effectiveness) and that they could act upon it (active trust) and thought the visit itself was pleasant (enjoyment). Effectiveness and enjoyment were both positively related with e-loyalty, but this was mediated by active trust. Efficiency was positively related with e-loyalty. The explained variance of e-loyalty was high (R(2) = 0.70). This study demonstrates that the importance of user perceptions is not limited to fields such as e-commerce but is also present within the context of cancer information websites. The high information need among participants might explain the positive relationship between efficiency and e-loyalty. Therefore, cancer information websites need to foster easy search and access of information provided. Copyright © 2014 John Wiley & Sons, Ltd.
Byskov, Jens; Bloch, Paul; Blystad, Astrid; Hurtig, Anna-Karin; Fylkesnes, Knut; Kamuzora, Peter; Kombe, Yeri; Kvåle, Gunnar; Marchal, Bruno; Martin, Douglas K; Michelo, Charles; Ndawi, Benedict; Ngulube, Thabale J; Nyamongo, Isaac; Olsen, Oystein E; Onyango-Ouma, Washington; Sandøy, Ingvild F; Shayo, Elizabeth H; Silwamba, Gavin; Songstad, Nils Gunnar; Tuba, Mary
2009-10-24
Despite multiple efforts to strengthen health systems in low and middle income countries, intended sustainable improvements in health outcomes have not been shown. To date most priority setting initiatives in health systems have mainly focused on technical approaches involving information derived from burden of disease statistics, cost effectiveness analysis, and published clinical trials. However, priority setting involves value-laden choices and these technical approaches do not equip decision-makers to address a broader range of relevant values - such as trust, equity, accountability and fairness - that are of concern to other partners and, not least, the populations concerned. A new focus for priority setting is needed.Accountability for Reasonableness (AFR) is an explicit ethical framework for legitimate and fair priority setting that provides guidance for decision-makers who must identify and consider the full range of relevant values. AFR consists of four conditions: i) relevance to the local setting, decided by agreed criteria; ii) publicizing priority-setting decisions and the reasons behind them; iii) the establishment of revisions/appeal mechanisms for challenging and revising decisions; iv) the provision of leadership to ensure that the first three conditions are met.REACT - "REsponse to ACcountable priority setting for Trust in health systems" is an EU-funded five-year intervention study started in 2006, which is testing the application and effects of the AFR approach in one district each in Kenya, Tanzania and Zambia. The objectives of REACT are to describe and evaluate district-level priority setting, to develop and implement improvement strategies guided by AFR and to measure their effect on quality, equity and trust indicators. Effects are monitored within selected disease and programme interventions and services and within human resources and health systems management. Qualitative and quantitative methods are being applied in an action research framework to examine the potential of AFR to support sustainable improvements to health systems performance.This paper reports on the project design and progress and argues that there is a high need for research into legitimate and fair priority setting to improve the knowledge base for achieving sustainable improvements in health outcomes.
Clinical management. Where medicine meets management. Senior moments.
Young, John; Sturdy, Deborah
2004-06-10
Most general hospital users are older people. Standard 4 of the national service framework for older people aims to transform the whole hospital experience for this group. Trusts have yet to grasp the fundamentals of this approach, despite the fact that it will help them achieve improvements such as access targets. Investment in staff training and education is needed to achieve the necessary cultural change.
Key Planning Factors for Recovery from a Chemical Warfare Agent Incident
2012-07-01
confusion and degradation of public trust. Such consequences were brought to light for the U.S. during the Fukushima Daiichi nuclear power plant...appendices follow : the first describing the relationships among the National Disaster Recovery Framework Recovery Support Functions, the National...phases of action following a disaster incident— short-, intermediate-, and long-term—that can overlap, sometimes considerably. As shown in Figure 2
ERIC Educational Resources Information Center
Schultz, Katherine; McGinn, Kathryn C.
2013-01-01
In this research, situated in a small urban district with a state-imposed school board, we analyze participation of community members during a three-year effort to improve schools. Through a qualitative analysis of forms of community engagement, this article offers a framework for understanding participation. We present two overlapping continua of…
A Trust Based Framework for Information Sharing Behavior in Command and Control Environments
2013-06-01
organizations under certain environmental contexts using the ELICIT multiplayer intelligence game . Like other existing work dealing with com- parative... multiplayer intelligence game ,” in Proc. 12th Int?l Command and Control Research and Technology Symposium, 2007. ...dictated by a combination of personality traits, organizational rules and the need to achieve mission objectives. For example, cooperation games often show
ERIC Educational Resources Information Center
Garrity, Sheila; Canavan, John
2017-01-01
Conceptualising early years settings as "communities of care" reflects the narrative arising from recent ethnographic research conducted in the West and Midlands areas of Ireland. Drawing on the ethic of care as an underpinning theoretical framework, this article outlines the potential of early years settings to represent reliable,…
Shared Awareness in Times of Crisis: A Framework for Collaboration
2011-06-01
also affords a “ dashboard ” perspective allowing for centralization of resources. The U.S. Army’s Knowledge Online portal is one example of a single...labor, energy, materials, information, cash and technology into outputs of higher value • Organization’s values (criteria that managers and...follows: Challenges - Disabilities Inter-Organizational Cross-Organizational Privacy and Security high security (portal) blocks information flow Trust
2012-10-01
requirements de - fined by the public sector. CRADAs leverage private sector resources and knowledge to meet the needs of government agencies at no financial...situations helps resolve barriers to cooperation. The evolution of CRA- DAs offers insight into how DOD can interact with multiple partners in a mutually...actions among multiple private power companies, the public sector (at Federal, state, local, and tribal levels), and third parties (hos- pitals
Shan, Linghan; Li, Ye; Ding, Ding; Wu, Qunhong; Liu, Chaojie; Jiao, Mingli; Hao, Yanhua; Han, Yuzhen; Gao, Lijun; Hao, Jiejing; Wang, Lan; Xu, Weilan; Ren, Jiaojiao
2016-01-01
Deteriorations in the patient-provider relationship in China have attracted increasing attention in the international community. This study aims to explore the role of trust in patient satisfaction with hospital inpatient care, and how patient-provider trust is shaped from the perspectives of both patients and providers. We adopted a mixed methods approach comprising a multivariate logistic regression model using secondary data (1200 people with inpatient experiences over the past year) from the fifth National Health Service Survey (NHSS, 2013) in Heilongjiang Province to determine the associations between patient satisfaction and trust, financial burden and perceived quality of care, followed by in-depth interviews with 62 conveniently selected key informants (27 from health and 35 from non-health sectors). A thematic analysis established a conceptual framework to explain deteriorating patient-provider relationships. About 24% of respondents reported being dissatisfied with hospital inpatient care. The logistic regression model indicated that patient satisfaction was positively associated with higher level of trust (OR = 14.995), lower levels of hospital medical expenditure (OR = 5.736-1.829 as compared with the highest quintile of hospital expenditure), good staff attitude (OR = 3.155) as well as good ward environment (OR = 2.361). But patient satisfaction was negatively associated with medical insurance for urban residents and other insurance status (OR = 0.215-0.357 as compared with medical insurance for urban employees). The qualitative analysis showed that patient trust-the most significant predictor of patient satisfaction-is shaped by perceived high quality of service delivery, empathic and caring interpersonal interactions, and a better designed medical insurance that provides stronger financial protection and enables more equitable access to health care. At the core of high levels of patient dissatisfaction with hospital care is the lack of trust. The current health care system reform in China has yet to address the fundamental problems embedded in the system that caused distrust. A singular focus on doctor-patient inter-personal interactions will not offer a successful solution to the deteriorated patient-provider relationships unless a systems approach to accountability is put into place involving all stakeholders.
Obfuscation Framework Based on Functionally Equivalent Combinatorial Logic Families
2008-03-01
of Defense, or the United States Government . AFIT/GCS/ENG/08-12 Obfuscation Framework Based on Functionally Equivalent Combinatorial Logic Families...time, United States policy strongly encourages the sale and transfer of some military equipment to foreign governments and makes it easier for...Proceedings of the International Conference on Availability, Reliability and Security, 2007. 14. McDonald, J. Todd and Alec Yasinsac. “Of unicorns and random
Parent-adolescent attachment and procrastination: The mediating role of self-worth.
Chen, Bin-Bin
2017-01-01
Within the theoretical framework of attachment theory, the author examined associations between adolescents' procrastination and their attachment relationships with both mothers and fathers, and explored the potential mediation role of self-worth in these associations. Participants were 384 Chinese adolescents (49.6% boys, average age 15.13 years) from public schools in Shanghai, China. They completed self-report measures of 3 dimensions of parental attachment (i.e., trust, communication, and alienation), general self-worth, and procrastination. The results indicated that both paternal and maternal trust and paternal communication were negatively associated with higher levels of procrastination whereas both paternal and maternal alienation were positively associated with procrastination. In addition, self-worth mediated the associations among 3 dimensions of parental attachment and procrastination. The findings highlighted the importance of parental attachment-based intervention strategies to reduce procrastination among adolescents.
A framework for identifying and managing risk in the operating theatre.
Simpson, A
1995-09-01
There is much advice available about the development of risk management strategies within the NHS. There are booklets and magazines and there are many management consultancies willing to give advice on the development of strategies. NATN is also working on the development of advice on risk management within the operating theatre department and a document should be available at Congress this year. It was felt, however, that it may be useful to hear a little about the specific experience of the development of a strategy within one operating theatre area and Andrea Simpson, Directorate Nurse Manager for Clinical Services, West Lothian NHS Trust has recorded the development within the directorate. There has been some additional comment from the Director of Nursing and Quality within the Trust, Libby Campbell, who is responsible for risk management there.
Wiggins, Natasha L; Forrister, Dale L; Endara, María-José; Coley, Phyllis D; Kursar, Thomas A
2016-01-01
Selective pressures imposed by herbivores are often positively correlated with investments that plants make in defense. Research based on the framework of an evolutionary arms race has improved our understanding of why the amount and types of defenses differ between plant species. However, plant species are exposed to different selective pressures during the life of a leaf, such that expanding leaves suffer more damage from herbivores and pathogens than mature leaves. We hypothesize that this differential selective pressure may result in contrasting quantitative and qualitative defense investment in plants exposed to natural selective pressures in the field. To characterize shifts in chemical defenses, we chose six species of Inga, a speciose Neotropical tree genus. Focal species represent diverse chemical, morphological, and developmental defense traits and were collected from a single site in the Amazonian rainforest. Chemical defenses were measured gravimetrically and by characterizing the metabolome of expanding and mature leaves. Quantitative investment in phenolics plus saponins, the major classes of chemical defenses identified in Inga, was greater for expanding than mature leaves (46% and 24% of dry weight, respectively). This supports the theory that, because expanding leaves are under greater selective pressure from herbivores, they rely more upon chemical defense as an antiherbivore strategy than do mature leaves. Qualitatively, mature and expanding leaves were distinct and mature leaves contained more total and unique metabolites. Intraspecific variation was greater for mature leaves than expanding leaves, suggesting that leaf development is canalized. This study provides a snapshot of chemical defense investment in a speciose genus of tropical trees during the short, few-week period of leaf development. Exploring the metabolome through quantitative and qualitative profiling enables a more comprehensive examination of foliar chemical defense investment.
Nicholls, Jacqueline; Dobbs, Christine; Sethi, Nayha; Cunningham, James; Ainsworth, John; Heaven, Martin; Peacock, Trevor; Peacock, Anthony; Jones, Kerina; Laurie, Graeme; Kalra, Dipak
2016-01-01
In parallel with the advances in big data-driven clinical research, the data safe haven concept has evolved over the last decade. It has led to the development of a framework to support the secure handling of health care information used for clinical research that balances compliance with legal and regulatory controls and ethical requirements while engaging with the public as a partner in its governance. We describe the evolution of 4 separately developed clinical research platforms into services throughout the United Kingdom-wide Farr Institute and their common deployment features in practice. The Farr Institute is a case study from which we propose a common definition of data safe havens as trusted platforms for clinical academic research. We use this common definition to discuss the challenges and dilemmas faced by the clinical academic research community, to help promote a consistent understanding of them and how they might best be handled in practice. We conclude by questioning whether the common definition represents a safe and trustworthy model for conducting clinical research that can stand the test of time and ongoing technical advances while paying heed to evolving public and professional concerns. PMID:27329087
Singh, Anup Kumar; Kumar, Sarma Rajeev; Dwivedi, Varun; Rai, Avanish; Pal, Shaifali; Shasany, Ajit K; Nagegowda, Dinesh A
2017-08-01
Withania somnifera produces pharmacologically important triterpenoid withanolides that are derived via phytosterol pathway; however, their biosynthesis and regulation remain to be elucidated. A jasmonate- and salicin-inducible WRKY transcription factor from W. somnifera (WsWRKY1) exhibiting correlation with withaferin A accumulation was functionally characterized employing virus-induced gene silencing and overexpression studies combined with transcript and metabolite analyses, and chromatin immunoprecipitation assay. WsWRKY1 silencing resulted in stunted plant growth, reduced transcripts of phytosterol pathway genes with corresponding reduction in phytosterols and withanolides in W. somnifera. Its overexpression elevated the biosynthesis of triterpenoids in W. somnifera (phytosterols and withanolides), as well as tobacco and tomato (phytosterols). Moreover, WsWRKY1 binds to W-box sequences in promoters of W. somnifera genes encoding squalene synthase and squalene epoxidase, indicating its direct regulation of triterpenoid pathway. Furthermore, while WsWRKY1 silencing in W. somnifera compromised the tolerance to bacterial growth, fungal infection, and insect feeding, its overexpression in tobacco led to improved biotic stress tolerance. Together these findings demonstrate that WsWRKY1 has a positive regulatory role on phytosterol and withanolides biosynthesis, and defense against biotic stress, highlighting its importance as a metabolic engineering tool for simultaneous improvement of triterpenoid biosynthesis and plant defense. © 2017 The Authors. New Phytologist © 2017 New Phytologist Trust.
He, Yuqing; Zhang, Hehong; Sun, Zongtao; Li, Junmin; Hong, Gaojie; Zhu, Qisong; Zhou, Xuebiao; MacFarlane, Stuart; Yan, Fei; Chen, Jianping
2017-04-01
Plant hormones play a vital role in plant immune responses. However, in contrast to the relative wealth of information on hormone-mediated immunity in dicot plants, little information is available on monocot-virus defense systems. We used a high-throughput-sequencing approach to compare the global gene expression of Rice black-streaked dwarf virus (RBSDV)-infected rice plants with that of healthy plants. Exogenous hormone applications and transgenic rice were used to test RBSDV infectivity and pathogenicity. Our results revealed that the jasmonic acid (JA) pathway was induced while the brassinosteroid (BR) pathway was suppressed in infected plants. Foliar application of methyl jasmonate (MeJA) or brassinazole (BRZ) resulted in a significant reduction in RBSDV incidence, while epibrassinolide (BL) treatment increased RBSDV infection. Infection studies using coi1-13 and Go mutants demonstrated JA-mediated resistance and BR-mediated susceptibility to RBSDV infection. A mixture of MeJA and BL treatment resulted in a significant reduction in RBSDV infection compared with a single BL treatment. MeJA application efficiently suppressed the expression of BR pathway genes, and this inhibition depended on the JA coreceptor OsCOI1. Collectively, our results reveal that JA-mediated defense can suppress the BR-mediated susceptibility to RBSDV infection. © 2016 The Authors. New Phytologist © 2016 New Phytologist Trust.
The ethics of hastening death during terminal weaning.
Walton, Laura; Bell, Dominic
2013-12-01
Withdrawal of life-sustaining medical treatment (LSMT) is under scrutiny as next-of-kin challenge medical decision-making in the courts and established end-of-life pathways are withdrawn in the face of public criticism. With persistent lobbying for medically assisted dying as the other side of the coin, and professional advice that doctors distance themselves from this activity, the fine line between defensible palliative care and hastening a death needs to be unambiguously defined, particularly with additional confounders such as transplantation initiatives. The medical literature in this domain is dominated by ethical debate on euthanasia and medically assisted dying rather than defensibility within intensive care at the point of withdrawal of LSMT. The process and, therefore, the timing of dying is open to manipulation by intensivists, families, other hospital physicians, courts of law and extraneous influences such as organ donation. Intensivists faced with these challenging processes need to consider some key principles to help them navigate the management of dying. They need to demonstrate transparency in order to engender trust, be responsive to the dynamically evolving needs of patient and family, avoid ambiguity, show consistency and predictability and, finally, they need to conform with society's expectations and professional standards to achieve defensibility for their actions. Adherence to these principles is likely to minimize conflict, maximize patient benefit, maintain public confidence and avoid professional jeopardy.
Schulze, Sebastian; Kay, Sabine; Büttner, Daniela; Egler, Monique; Eschen-Lippold, Lennart; Hause, Gerd; Krüger, Antje; Lee, Justin; Müller, Oliver; Scheel, Dierk; Szczesny, Robert; Thieme, Frank; Bonas, Ulla
2012-09-01
The pathogenicity of the Gram-negative plant-pathogenic bacterium Xanthomonas campestris pv. vesicatoria (Xcv) is dependent on type III effectors (T3Es) that are injected into plant cells by a type III secretion system and interfere with cellular processes to the benefit of the pathogen. In this study, we analyzed eight T3Es from Xcv strain 85-10, six of which were newly identified effectors. Genetic studies and protoplast expression assays revealed that XopB and XopS contribute to disease symptoms and bacterial growth, and suppress pathogen-associated molecular pattern (PAMP)-triggered plant defense gene expression. In addition, XopB inhibits cell death reactions induced by different T3Es, thus suppressing defense responses related to both PAMP-triggered immunity (PTI) and effector-triggered immunity (ETI). XopB localizes to the Golgi apparatus and cytoplasm of the plant cell and interferes with eukaryotic vesicle trafficking. Interestingly, a XopB point mutant derivative was defective in the suppression of ETI-related responses, but still interfered with vesicle trafficking and was only slightly affected with regard to the suppression of defense gene induction. This suggests that XopB-mediated suppression of PTI and ETI is dependent on different mechanisms that can be functionally separated. © 2012 The Authors. New Phytologist © 2012 New Phytologist Trust.
Risk appreciation for living kidney donors: another new subspecialty?
Steiner, Robert W
2004-05-01
Quantitative estimates of the risk of end stage renal disease (ESRD) for living donors would seem essential to defensible donor selection practices, as the 'safe/unsafe' model for donor selection is not viable. All kidney donors take risk, and four fundamental, qualitative criteria should instead be used to decide when donor rejection is justified. These criteria are lack of donor education about transplantation, donor irrationality, lack of free and voluntary donation, and/or that donor acceptance would unavoidably threaten the public trust or the integrity of the center's selection procedures. Such a data-based selection policy, with explicit documentation of unbiased and comprehensive donor education, will help neutralize the center's self interest in a more defensible way than by rejecting 'complicated' kidney donors out of hand, and in a more practical way than by the creation of center-independent donor counselors or waiting for donor registries to come to fruition. Living kidney donors with isolated medical abnormalities comprise a sizable subset of at risk donors for whom center acceptance practices vary markedly. This population provides a paradigm opportunity for quantitative risk estimation and counseling.
Vigil: Providing Trust for Enhanced Security in Pervasive Systems
2005-01-01
environment consisting of Bluetooth, Infrared, 802.11b and Ethernet. Vigil is the extension and culmination of our two previous projects: Centaurus [22] and...Centau- rus2 [36]. The main design goal of the Centaurus project was the development of a framework for building portals to services using various...types of mobile devices. Centaurus provides a uniform infrastructure for access to heterogeneous hardware and software components. It uses a language
Interpretable Decision Sets: A Joint Framework for Description and Prediction
Lakkaraju, Himabindu; Bach, Stephen H.; Jure, Leskovec
2016-01-01
One of the most important obstacles to deploying predictive models is the fact that humans do not understand and trust them. Knowing which variables are important in a model’s prediction and how they are combined can be very powerful in helping people understand and trust automatic decision making systems. Here we propose interpretable decision sets, a framework for building predictive models that are highly accurate, yet also highly interpretable. Decision sets are sets of independent if-then rules. Because each rule can be applied independently, decision sets are simple, concise, and easily interpretable. We formalize decision set learning through an objective function that simultaneously optimizes accuracy and interpretability of the rules. In particular, our approach learns short, accurate, and non-overlapping rules that cover the whole feature space and pay attention to small but important classes. Moreover, we prove that our objective is a non-monotone submodular function, which we efficiently optimize to find a near-optimal set of rules. Experiments show that interpretable decision sets are as accurate at classification as state-of-the-art machine learning techniques. They are also three times smaller on average than rule-based models learned by other methods. Finally, results of a user study show that people are able to answer multiple-choice questions about the decision boundaries of interpretable decision sets and write descriptions of classes based on them faster and more accurately than with other rule-based models that were designed for interpretability. Overall, our framework provides a new approach to interpretable machine learning that balances accuracy, interpretability, and computational efficiency. PMID:27853627
2016-09-01
be conducted midstream, at the end of an activity program or LOE, or ex post facto . Not all security cooperation endeavors require evaluation...noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only...iv Developing an AME Framework for DoD Security Cooperation approach, the study team analyzed documents, interviewed subject- matter experts
Defense Horizons. A New Military Framework for NATO. May 2005, Number 48
2005-05-01
seem to ask too much of the European allies. This is not the case. The entire framework includes only about 10 percent of Europe’s active military...Europeans, creating these forces and capabilities is a viable proposition because they require commitment of only 10 percent of their active military...security challenges, from defeating radical Islamic terrorism to controlling Iran’s nuclear activities to building a free Iraq to achieving an Israeli
Evaluating U.S. and Chinese Cyber Security Strategies Within a Cultural Framework
2016-04-01
predictable courses of action that an organization would take. Hofstede’s National Cultural Dimensions Starting with Hofstede’s work as a foundation to...accepted cultural influences. When combined with Hofstede’s dimensions, and Kim’s framework, strategic vision and goals may start to become more...China has exhibited a tendency for the controlled, politically driven defensive and minimalistic use of force that is deeply rooted in the statecraft
Forging a new legacy of trust in research with Alaska Native college students using CBPR.
Lopez, Ellen D S; Sharma, Dinghy Kristine B; Mekiana, Deborah; Ctibor, Alaina
2012-01-01
Disparities in the rates of matriculation and graduation are of concern to Alaska Native (AN) students and the universities committed to their academic success. Efforts to reduce attrition require a keen understanding of the factors that impact quality of life (QOL) at college. Yet, a long-standing legacy of mistrust towards research poses challenges to conducting inquiry among AN students. We introduced a partnership between the University of Alaska Fairbank's Rural Student Services (RSS) and the Center for Alaska Native Health Research (CANHR) within which we conducted the "What makes life good?" study aimed towards developing a QOL measure for AN students. Equally important was building a legacy of research trust among AN partners. We describe Phase I of a 2-phase study that employed a sequential mixed methods approach. Discussed are facilitators, challenges and lessons learned while striving to adhere to the principles of community-based participatory research (CBPR). Phase I included formative focus groups and QOL measurement development. The research involved the interplay among activities that were co-developed with the goal of enhancing trust and research capacity. Emphasis was placed on ensuring that data collection and analyses were student driven. All partners resided at the same university. However, trust and collaboration could not be assumed. Working within a collaborative framework, our partnership achieved the aim of developing a culturally informed QOL measure, while also creating an empowering experience for all partners who became co-investigators in a process that might normally be regarded with mistrust.
NASA Astrophysics Data System (ADS)
Lee, Yu-Cheng; Yen, Tieh-Min; Tsai, Chih-Hung
This study provides an integrated model of Supplier Quality Performance Assesment (SQPA) activity for the semiconductor industry through introducing the ISO 9001 management framework, Importance-Performance Analysis (IPA) Supplier Quality Performance Assesment and Taguchi`s Signal-to-Noise Ratio (S/N) techniques. This integrated model provides a SQPA methodology to create value for all members under mutual cooperation and trust in the supply chain. This method helps organizations build a complete SQPA framework, linking organizational objectives and SQPA activities to optimize rating techniques to promote supplier quality improvement. The techniques used in SQPA activities are easily understood. A case involving a design house is illustrated to show our model.
Lindsey, P A; McGlynn, E A
1988-02-01
Transplantation of hearts and livers for both adults and children is increasingly viewed as therapeutic and lifesaving, but access to these procedures is impeded by their high cost as well as by a limited supply of organs. In the absence of comprehensive federal coverage, pressure is being brought to bear on states to provide broader access to these procedures. This synthesis provides a framework for the consideration of coverage decisions at the state level. While there are no "right" answers about whether a state should support such coverage, the analytic tools of cost analysis, demand estimation, and assessment of capacity described in this synthesis can better inform the decision-making process.
A framework for secure and decentralized sharing of medical imaging data via blockchain consensus.
Patel, Vishal
2018-04-01
The electronic sharing of medical imaging data is an important element of modern healthcare systems, but current infrastructure for cross-site image transfer depends on trust in third-party intermediaries. In this work, we examine the blockchain concept, which enables parties to establish consensus without relying on a central authority. We develop a framework for cross-domain image sharing that uses a blockchain as a distributed data store to establish a ledger of radiological studies and patient-defined access permissions. The blockchain framework is shown to eliminate third-party access to protected health information, satisfy many criteria of an interoperable health system, and readily generalize to domains beyond medical imaging. Relative drawbacks of the framework include the complexity of the privacy and security models and an unclear regulatory environment. Ultimately, the large-scale feasibility of such an approach remains to be demonstrated and will depend on a number of factors which we discuss in detail.
Workforce development and effective evaluation of projects.
Dickerson, Claire; Green, Tess; Blass, Eddie
The success of a project or programme is typically determined in relation to outputs. However, there is a commitment among UK public services to spending public funds efficiently and on activities that provide the greatest benefit to society. Skills for Health recognised the need for a tool to manage the complex process of evaluating project benefits. An integrated evaluation framework was developed to help practitioners identify, describe, measure and evaluate the benefits of workforce development projects. Practitioners tested the framework on projects within three NHS trusts and provided valuable feedback to support its development. The prospective approach taken to identify benefits and collect baseline data to support evaluation was positively received and the clarity and completeness of the framework, as well as the relevance of the questions, were commended. Users reported that the framework was difficult to complete; an online version could be developed, which might help to improve usability. Effective implementation of this approach will depend on the quality and usability of the framework, the willingness of organisations to implement it, and the presence or establishment of an effective change management culture.
Implementing an Integrated Network Defense Construct
2013-06-01
hierarchical structure under the Air Defence of Great Britain initiative ( Checkland and Holwell, 1998). This implementation was the earliest concept...Framework for Detecting and Defending against Insider IT Attacks. Auerbach Publications. 2008. Checkland , Peter and Holwell, Sue. "Information, Systems
Economic Assessment of FMDv Releases from the National Bio and Agro Defense Facility
Pendell, Dustin L.; Marsh, Thomas L.; Coble, Keith H.; Lusk, Jayson L.; Szmania, Sara C.
2015-01-01
This study evaluates the economic consequences of hypothetical foot-and-mouth disease releases from the future National Bio and Agro Defense Facility in Manhattan, Kansas. Using an economic framework that estimates the impacts to agricultural firms and consumers, quantifies costs to non-agricultural activities in the epidemiologically impacted region, and assesses costs of response to the government, we find the distribution of economic impacts to be very significant. Furthermore, agricultural firms and consumers bear most of the impacts followed by the government and the regional non-agricultural firms. PMID:26114546
NASA Astrophysics Data System (ADS)
Kramer, Michael J.; Bellman, Kirstie L.; Landauer, Christopher
2002-07-01
This paper will review and examine the definitions of Self-Reflection and Active Middleware. Then it will illustrate a conceptual framework for understanding and enumerating the costs of Self-Reflection and Active Middleware at increasing levels of Application. Then it will review some application of Self-Reflection and Active Middleware to simulations. Finally it will consider the application and additional kinds of costs applying Self-Reflection and Active Middleware to sharing information among the organizations expected to participate in Homeland Defense.
2013-12-13
role in Global War on Terrorism . The goal of this study is to illustrate a framework to improve interagency cooperation though the Joint...and Edward Marks, “ The Global War on Terrorism : A Regional Approach to Coordination,” Joint Force Quarterly no. 32 (Autumn 2002): 50. 6...second mission was to provide civil support to Civilian Irregular Defense Groups (CIDG), which were established to win the loyalty of the aboriginal
Epilepsy in adolescence: implications for the development of personality.
Viberg, M; Blennow, G; Polski, B
1987-01-01
Sixteen adolescent children with onset of epilepsy between the ages of 1 and 12 years and 16 control children were investigated by interview, self-esteem scales, and the Thematic Apperception Test (TAT). Children with epilepsy had a significantly larger discrepancy between the self-image and the ideal self-image than did the control children. TAT indicated the body and self-image is poorer, the unknown and the risk of acting out more threatening, the sex identity less stable, and the defense not as adaptive as the control group. Persons suffering from epilepsy are often stigmatized. One explanation could be the influence of epilepsy on the development during adolescence of the basic trust of their bodies and of themselves.
Barriers to e-health business processes.
Mieczkowska, Suzanne; Hinton, Matthew; Barnes, David
2004-01-01
This paper builds from recent case study research in commercial organisations to develop the hypothesis that many of the barriers to e-health processes are similar to those encountered by commercial businesses. The paper reports findings from a case study within the pathology department of a UK National Health Service (NHS) Trust. The NHS has a risk-averse culture where many individuals practice defensive behaviour and there are deeply embedded working practices. The paper suggests that if the NHS is to seize the opportunities offered by substantial new investments in e-health systems that utilise internet-based ICTs, greater effort needs to be made to understand and address the socio-cultural factors affecting the UK healthcare system.
[The fragmentation of representational space in schizophrenia].
Plagnol, A; Oïta, M; Montreuil, M; Granger, B; Lubart, T
2003-01-01
Existent neurocognitive models of schizophrenia converge towards a core of impairments involving working memory, context processing, action planning, controlled and intentional processing. However, the emergence of this core remains itself difficult to explain and more specific hypotheses do not explain the heterogeneity of schizophrenia. To overcome these limits, we propose a new paradigm based on representational theory from cognitive science. Some recent developments of this theory enable us to describe a subjective universe as a representational space which is displayed from memory. We outline a conceptual framework to construct such a representational space from analogical -representations that can be activated in working memory and are connected to a network of symbolic structures. These connections are notably made through an analytic process of the analogical fragments, which involves the attentional focus. This framework allows us to define rigorously some defense processes in response to traumatic tensions that are expressed on the representational space. The fragmentation of representational space is a consequence of a defensive denial based on an impairment of the analytic process. The fragmentation forms some parasitic areas in memory which are excluded from the main part of the representational space and disturb information processing. The key clinical concepts of paranoid syndromes can be defined in this conceptual framework: mental automatism, delusional intuition, acute destructuration, psychotic dissociation, and autistic withdrawal. We show that these syndromes imply each other, which in return increases the fragmentation of the representational space. Some new concepts emerge naturally in this framework, such as the concept of "suture" which is defined as a link between a parasitic area and the main representational space. Schizophrenia appears as a borderline case of fragmentation of the representational space. This conceptual framework is compatible with numerous etiological factors. Multiple clinical forms can be differentiated in accordance with the persistence of parasitic areas, the degree of fragmentation, and the formation of sutures. We use this approach to account for an empirical study concerning the analysis of analogical representations in schizophrenia. We used the Parallel Visual Information Processing Test (PVIPT) which assesses the analysis of interfering visual information. Subjects were asked to connect several small geometric figures printed on a transparency. The transparency was displayed above four photographs which were the interfering material. Then, subjects completed three tasks concerning the photographs: a recognition task, a recall task, and an affective qualification task. Using a case-by-case study, this test allows us to access the defense processes of the subjects, which is not possible with the usual methods in cognitive psychopathology. Twelve clinically-stable schizophrenic subjects participated in the study which also included a self-assessment of alexithymia by the Toronto Alexithymia Scale. We obtained 2 main results: (a) creation of items in recall or false recognition by 8 subjects, and (b) lack of the usual -negative correlations between the alexithymia score and the recall, recognition and affective qualification scores in the PVIPT. These 2 results contrast with what has been previously observed for alexithymia using the same methodology. The result (a) confirms an interfering activation in schizophrenic memory, which can be interpreted in our framework as indicative of parasitic areas. The creation of items suggests the formation of sutures between the semantic content of photographs and some delusional fragments. The result (b) suggests that the apparent alexithymia in schizophrenia is a defense against interfering activation in parasitic areas. We underline the interest of individual protocols to exhibit the dynamic interplay between an interfering activity in memory and a defensive flattening of affects.
Warmerdam, Amanda; Newnam, Sharon; Sheppard, Dianne; Griffin, Mark; Stevenson, Mark
2017-08-18
Statistics indicate that employees commuting or traveling as part of their work are overrepresented in workplace injury and death. Despite this, many organizations are unaware of the factors within their organizations that are likely to influence potential reductions in work-related road traffic injury. This article presents a multilevel conceptual framework that identifies health investment as the central feature in reducing work-related road traffic injury. Within this framework, we explore factors operating at the individual driver, workgroup supervisor, and organizational senior management levels that create a mutually reinforcing system of safety. The health investment framework identifies key factors at the senior manager, supervisor, and driver levels to cultivating a safe working environment. These factors are high-performance workplace systems, leader-member exchange and autonomy, trust and empowerment, respectively. The framework demonstrates the important interactions between these factors and how they create a self-sustaining organizational safety system. The framework aims to provide insight into the future development of interventions that are strategically aligned with the organization and target elements that facilitate and enhance driver safety and ultimately reduce work-related road traffic injury and death.
R-EACTR: A Framework for Designing Realistic Cyber Warfare Exercises
2017-09-11
2.1 Environment 3 2.2 Adversary 4 2.3 Communications 4 2.4 Tactics 5 2.5 Roles 5 3 Case Study – Cyber Forge 11 7 3.1 Environment 7 3.2...realism into each aspect of the exercise, and a case study of one exercise where the framework was successfully employed. CMU/SEI-2017-TR-005...network, emulation, logging, reporting Supporting: computer network defense service provider (CNDSP), intelligence, reach-back, higher
Towards Dynamic Authentication in the Grid — Secure and Mobile Business Workflows Using GSet
NASA Astrophysics Data System (ADS)
Mangler, Jürgen; Schikuta, Erich; Witzany, Christoph; Jorns, Oliver; Ul Haq, Irfan; Wanek, Helmut
Until now, the research community mainly focused on the technical aspects of Grid computing and neglected commercial issues. However, recently the community tends to accept that the success of the Grid is crucially based on commercial exploitation. In our vision Foster's and Kesselman's statement "The Grid is all about sharing." has to be extended by "... and making money out of it!". To allow for the realization of this vision the trust-worthyness of the underlying technology needs to be ensured. This can be achieved by the use of gSET (Gridified Secure Electronic Transaction) as a basic technology for trust management and secure accounting in the presented Grid based workflow. We present a framework, conceptually and technically, from the area of the Mobile-Grid, which justifies the Grid infrastructure as a viable platform to enable commercially successful business workflows.
Stochastic derivative-free optimization using a trust region framework
Larson, Jeffrey; Billups, Stephen C.
2016-02-17
This study presents a trust region algorithm to minimize a function f when one has access only to noise-corrupted function values f¯. The model-based algorithm dynamically adjusts its step length, taking larger steps when the model and function agree and smaller steps when the model is less accurate. The method does not require the user to specify a fixed pattern of points used to build local models and does not repeatedly sample points. If f is sufficiently smooth and the noise is independent and identically distributed with mean zero and finite variance, we prove that our algorithm produces iterates suchmore » that the corresponding function gradients converge in probability to zero. As a result, we present a prototype of our algorithm that, while simplistic in its management of previously evaluated points, solves benchmark problems in fewer function evaluations than do existing stochastic approximation methods.« less
The HEPiX Virtualisation Working Group: Towards a Grid of Clouds
NASA Astrophysics Data System (ADS)
Cass, Tony
2012-12-01
The use of virtual machine images, as for example with Cloud services such as Amazon's Elastic Compute Cloud, is attractive for users as they have a guaranteed execution environment, something that cannot today be provided across sites participating in computing grids such as the Worldwide LHC Computing Grid. However, Grid sites often operate within computer security frameworks which preclude the use of remotely generated images. The HEPiX Virtualisation Working Group was setup with the objective to enable use of remotely generated virtual machine images at Grid sites and, to this end, has introduced the idea of trusted virtual machine images which are guaranteed to be secure and configurable by sites such that security policy commitments can be met. This paper describes the requirements and details of these trusted virtual machine images and presents a model for their use to facilitate the integration of Grid- and Cloud-based computing environments for High Energy Physics.
Therapeutic Assessment in Personality Disorders: Toward the Restoration of Epistemic Trust.
Kamphuis, Jan H; Finn, Stephen E
2018-06-06
Research evidence suggests Therapeutic Assessment positively affects clients with problems in living, including clients with personality disorders, who are typically quite resistant to change. Importantly, this change takes place quickly, in relatively few sessions. This article draws on a relatively new evolutionary-based theory of epistemic trust (ET) and epistemic hypervigilance (EH) as a lens to plausibly explain the efficacy of TA, and especially its influence on PD clients' alliance and motivation for subsequent psychotherapy (Fonagy, Luyten, & Alison, 2015 ). ET is the willingness to take in relevant interpersonally transmited information and it is essential to the immediate success of psychotherapy and its long-term impact. The collaborative, intersubjective framework of TA and many of its specific techniques might be understood as highly relevant to restoring ET in clients, especially those with PD. We close by discussing implications for psychological assessment, psychotherapy, and research.
2012-12-01
base pour construire de telles simulations et pourrait être adaptée à d’autres expériences à un coût relativement bas. Perspectives : Les leçons...systems (such as culture , [ Culture ]). This seven-dimensional framework advocates that systems be viewed from the physical, individual, functional...structural, normative, social, and informational dimensions. The human factors include modelling stress, trust, risk factors, and cultural factors
Patient rights and medical education: clinical principles.
Lewkonia, Ray
2011-01-01
The rights of patients may be considered within three broad categories: (i) health as a fundamental human right, (ii) equitable healthcare provision by governments and institutions, and (iii) professional relationships with individual health practitioners. Doctors should be well prepared in medical schools to understand and uphold patient rights. A simplified framework for learning and for teaching medical students about patient rights is proposed with the acronym DROIT--dignity, respect, obligation, information and trust.
Technology Assessment for Powertrain Components Final Report CRADA No. TC-1124-95
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tokarz, F.; Gough, C.
LLNL utilized its defense technology assessment methodologies in combination with its capabilities in the energy; manufacturing, and transportation technologies to demonstrate a methodology that synthesized available but incomplete information on advanced automotive technologies into a comprehensive framework.
Accelerating regenerative medicine: the Japanese experiment in ethics and regulation.
Lysaght, Tamra
2017-09-01
In 2014, the Japanese National Diet introduced new laws aimed at promoting the clinical translation of stem cells and regenerative medicine. The basic action of these laws is to allow the early introduction of regenerative medicine products into the Japanese market through an accelerated approval process, while providing patients with access to certain types of stem cell and cell-based therapies in the context of private clinical practice. While this framework appears to offer enormous opportunities for the translation of stem cell science, it raises ethical challenges that have not yet been fully explored. This paper critically analyzes this framework with respect to the prioritization of safety over clinical benefit, distributive justice and public trust in science and medicine. It is argued that the framework unfairly burdens patients and strained healthcare systems without any clear benefits, and may undermine the credibility of the regenerative medicine field as it emerges.
Pandemic influenza preparedness: an ethical framework to guide decision-making.
Thompson, Alison K; Faith, Karen; Gibson, Jennifer L; Upshur, Ross E G
2006-12-04
Planning for the next pandemic influenza outbreak is underway in hospitals across the world. The global SARS experience has taught us that ethical frameworks to guide decision-making may help to reduce collateral damage and increase trust and solidarity within and between health care organisations. Good pandemic planning requires reflection on values because science alone cannot tell us how to prepare for a public health crisis. In this paper, we present an ethical framework for pandemic influenza planning. The ethical framework was developed with expertise from clinical, organisational and public health ethics and validated through a stakeholder engagement process. The ethical framework includes both substantive and procedural elements for ethical pandemic influenza planning. The incorporation of ethics into pandemic planning can be helped by senior hospital administrators sponsoring its use, by having stakeholders vet the framework, and by designing or identifying decision review processes. We discuss the merits and limits of an applied ethical framework for hospital decision-making, as well as the robustness of the framework. The need for reflection on the ethical issues raised by the spectre of a pandemic influenza outbreak is great. Our efforts to address the normative aspects of pandemic planning in hospitals have generated interest from other hospitals and from the governmental sector. The framework will require re-evaluation and refinement and we hope that this paper will generate feedback on how to make it even more robust.
An Integrative Bio-Psycho-Social Theory of Anorexia Nervosa.
Munro, Calum; Randell, Louise; Lawrie, Stephen M
2017-01-01
The need for novel approaches to understanding and treating anorexia nervosa (AN) is well recognized. The aim of this paper is to describe an integrative bio-psycho-social theory of maintaining factors in AN. We took a triangulation approach to develop a clinically relevant theory with face validity and internal consistency. We developed theoretical ideas from our clinical practice and reviewed theoretical ideas within the eating disorders and wider bio-psycho-social literature. The synthesis of these ideas and concepts into a clinically meaningful framework is described here. We suggest eight key factors central to understanding the maintenance and treatment resistance of anorexia nervosa: genetic or experiential predisposing factors; dysfunctional feelings processing and regulation systems; excessive vulnerable feelings; 'feared self' beliefs; starvation as a maladaptive physiological feelings regulation mechanism; maladaptive psychological coping modes; maladaptive social behaviour; and unmet physical and psychological core needs. Each of these factors serves to maintain the disorder. The concept of universal physical and psychological core needs can provide an underpinning integrative framework for working with this distinctly physical and psychological disorder. This framework could be used within any treatment model. We suggest that treatments which help address the profound lack of trust, emotional security and self-acceptance in this patient group will in turn address unmet needs and improve well-being. Copyright © 2016 John Wiley & Sons, Ltd. The concept of unmet physical and psychological needs can be used as an underlying integrative framework for understanding and working with this patient group, alongside any treatment model. A functional understanding of the neuro-biological, physiological and psychological mechanisms involved in anorexia nervosa can help patients reduce self-criticism and shame. Fears about being or becoming fat, greedy, needy, selfish and unacceptable ('Feared Self') drive over-compensatory self-depriving behaviour ('Anorexic Self'). Psychological treatment for anorexia nervosa should emphasize a focus on feelings and fostering experiences of acceptance and trust. Treatment for patients with anorexia nervosa needs to be longer than current clinical practice. Copyright © 2016 John Wiley & Sons, Ltd.
Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks.
Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly
2014-02-01
Hybrid mobile applications (apps) combine the features of Web applications and "native" mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources-file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies "bridges" that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources-the ability to read and write contacts list, local files, etc.-to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign-origin Web content and explain why they are ineffectual. We then present NoFrak, a capability-based defense against fracking attacks. NoFrak is platform-independent, compatible with any framework and embedded browser, requires no changes to the code of the existing hybrid apps, and does not break their advertising-supported business model.
Russian military in the year 2000. Master's thesis
DOE Office of Scientific and Technical Information (OSTI.GOV)
McIlmail, J.F.; Jaworski, J.L.
Through the use of content analysis, this paper attempts to paint a picture of the Russian military in the year 2000 and its impact on the US national security strategy. The research begins by defining the origin of Russian national security policy and how that translates into military policy and doctrine. A framework for evaluating Russian military doctrines is provided with a chronology of the military reform process and the related doctrinal reforms that has its birth in the 1987 announcement of a defensive-defense. Following from the doctrinal variant framework the new strategic missions of the 1992 draft military doctrinemore » are presented with an analysis that shows they are a clear departure from the past and truly represent a defensive-defense type doctrine. Additionally, a comparison is made with the current military reform ongoing in Russia with the historical precedent of the Russian military reform of 1924-25. A rough outline of the separate branches of the Russian military both present and future is provided based on the ongoing trends in the reform process. This thumbnail sketch of the Russian military then assists in the analysis and conclusion that even after a possible 50% cutback in US military spending, in the year 2000 the Russian military will not pose a threat to US national security. The major caveat to this conclusion is in the realm of nuclear weapons and this issue is therefore discussed in some length....Former Soviet Union, Russia, Commonwealth of Independent States (CIS), Conventional Forces in Europe treaty (CFE), European Security, New National Security Strategy, Nuclear Weapons, Nuclear Strategy.« less
Chlamydia trachomatis testing among young people: what is the role of stigma?
Theunissen, Kevin A T M; Bos, Arjan E R; Hoebe, Christian J P A; Kok, Gerjo; Vluggen, Stan; Crutzen, Rik; Dukers-Muijrers, Nicole H T M
2015-07-14
To reach young people for Chlamydia trachomatis (CT) testing, new web-based strategies are used to offer testing via young people's sexual and social networks. The success of such peer-driven strategies depends on whether individuals disclose their own testing and encourage others to get tested. We assessed whether public- and self-stigma would hamper these behaviours, by comparing anticipations and experiences relating to these issues in young men and women who already tested or never tested for CT. Participants were recruited at an STI clinic and two schools in the Netherlands. Semi-structured interviews were analysed from 23 sexually active heterosexual young people between 16-24 years using qualitative content analysis with a framework approach. Both tested and never tested participants perceived public stigma and anticipated shame and self-stigma in relation to testing. Maintaining good health was identified as main reason for testing. Never tested and tested participants anticipated that they would feel shame and receive stigmatizing reactions from people outside their trusted network if they would disclose their testing, or encourage them to test. From a selected group of trusted peers, they anticipated social support and empathy. When tested participants disclosed their testing to trusted peers they did not experience stigma. Due to the fact that no one disclosed their testing behaviour to peers outside their trusted network, stigma was avoided and therefore tested participants reported no negative reactions. Similarly, regarding the encouragement of others to test, most tested participants did not experience negative reactions from sex partners and friends. Young people perceive public stigma and anticipate self-stigma and shame in relation to CT testing, disclosure and encouraging others to test. People do test for CT, including those who anticipate stigma. To avoid stigmatizing reactions, stigma management strategies are applied, such as selective disclosure and the selective encouragement of others to test (i.e. only in a small trusted peer network). Care strategies that deploy sexual and social networks of individuals can reach into small networks surrounding a person. These strategies could be improved by exploring methods to reach high-risk network members outside the small trusted circle of a person.
Wu, Qunhong; Liu, Chaojie; Jiao, Mingli; Hao, Yanhua; Han, Yuzhen; Gao, Lijun; Hao, Jiejing; Wang, Lan; Xu, Weilan; Ren, Jiaojiao
2016-01-01
Objective Deteriorations in the patient-provider relationship in China have attracted increasing attention in the international community. This study aims to explore the role of trust in patient satisfaction with hospital inpatient care, and how patient-provider trust is shaped from the perspectives of both patients and providers. Methods We adopted a mixed methods approach comprising a multivariate logistic regression model using secondary data (1200 people with inpatient experiences over the past year) from the fifth National Health Service Survey (NHSS, 2013) in Heilongjiang Province to determine the associations between patient satisfaction and trust, financial burden and perceived quality of care, followed by in-depth interviews with 62 conveniently selected key informants (27 from health and 35 from non-health sectors). A thematic analysis established a conceptual framework to explain deteriorating patient-provider relationships. Findings About 24% of respondents reported being dissatisfied with hospital inpatient care. The logistic regression model indicated that patient satisfaction was positively associated with higher level of trust (OR = 14.995), lower levels of hospital medical expenditure (OR = 5.736–1.829 as compared with the highest quintile of hospital expenditure), good staff attitude (OR = 3.155) as well as good ward environment (OR = 2.361). But patient satisfaction was negatively associated with medical insurance for urban residents and other insurance status (OR = 0.215–0.357 as compared with medical insurance for urban employees). The qualitative analysis showed that patient trust—the most significant predictor of patient satisfaction—is shaped by perceived high quality of service delivery, empathic and caring interpersonal interactions, and a better designed medical insurance that provides stronger financial protection and enables more equitable access to health care. Conclusion At the core of high levels of patient dissatisfaction with hospital care is the lack of trust. The current health care system reform in China has yet to address the fundamental problems embedded in the system that caused distrust. A singular focus on doctor-patient inter-personal interactions will not offer a successful solution to the deteriorated patient-provider relationships unless a systems approach to accountability is put into place involving all stakeholders. PMID:27755558
2014-12-01
1995 ..............................................78 g. JAUGS 1995 ............................................................................82 h...108 g. JAUGS from 1995 to 1996 ....................................................111 h. Conclusion...2001 .......................................172 j. JAUGS 2001 ..........................................................................173 k
2012-04-09
between BPMN , SysML, and Arena ........................................... 16 Capabilities, Activities, Resources, Performers...Proof of Concept ................................................................ 22 BPMN 2.0 XML to Arena Converter...21 Figure 5: BPMN 2.0 XML StartEvent (Excerpt
1983-05-01
maintenance of the essential industrial base and to put in place the framework and processes---’ DD I O 1473 £O,TION OF I NOV65 IS OBSOLETE{ SECjBITY...the essential indu,, ......... -: -, :.It .n pl3ce the framework and processes necessary to resolve the conflict between liberal trade and national...domestic capabilities of selected industries essential to national security. Major Recommendations 1. Modify U.S. trade policy to allow for goverr ent
Forging a new legacy of trust in research with Alaska Native college students using CBPR
Lopez, Ellen D.S.; Sharma, Dinghy Kristine B.; Mekiana, Deborah; Ctibor, Alaina
2012-01-01
Objectives Disparities in the rates of matriculation and graduation are of concern to Alaska Native (AN) students and the universities committed to their academic success. Efforts to reduce attrition require a keen understanding of the factors that impact quality of life (QOL) at college. Yet, a long-standing legacy of mistrust towards research poses challenges to conducting inquiry among AN students. We introduced a partnership between the University of Alaska Fairbank's Rural Student Services (RSS) and the Center for Alaska Native Health Research (CANHR) within which we conducted the “What makes life good?” study aimed towards developing a QOL measure for AN students. Equally important was building a legacy of research trust among AN partners. Study design We describe Phase I of a 2-phase study that employed a sequential mixed methods approach. Discussed are facilitators, challenges and lessons learned while striving to adhere to the principles of community-based participatory research (CBPR). Methods Phase I included formative focus groups and QOL measurement development. The research involved the interplay among activities that were co-developed with the goal of enhancing trust and research capacity. Emphasis was placed on ensuring that data collection and analyses were student driven. Conclusions All partners resided at the same university. However, trust and collaboration could not be assumed. Working within a collaborative framework, our partnership achieved the aim of developing a culturally informed QOL measure, while also creating an empowering experience for all partners who became co-investigators in a process that might normally be regarded with mistrust. PMID:23019564
Reed, Maureen G; Godmaire, Hélène; Abernethy, Paivi; Guertin, Marc-André
2014-12-01
Deliberation, dialogue and systematic learning are now considered attributes of good practice for organizations seeking to advance sustainability. Yet we do not know whether organizations that span spatial scales and governance responsibilities can establish effective communities of practice to facilitate learning and action. The purpose of this paper is to generate a framework that specifies actions and processes of a community of practice designed to instill collective learning and action strategies across a multi-level, multi-partner network. The framework is then used to describe and analyze a partnership among practitioners of Canada's 16 UNESCO biosphere reserves, and additional researchers and government representatives from across Canada. The framework is a cycle of seven action steps, beginning and ending with reflecting on and evaluating present practice. It is supported by seven characteristics of collaborative environmental management that are used to gauge the success of the partnership. Our results show that the partnership successfully built trust, established shared norms and common interest, created incentives to participate, generated value in information sharing and willingness to engage, demonstrated effective flow of information, and provided leadership and facilitation. Key to success was the presence of a multi-lingual facilitator who could bridge cultural differences across regions and academia-practitioner expectations. The project succeeded in establishing common goals, setting mutual expectations and building relations of trust and respect, and co-creating knowledge. It is too soon to determine whether changes in practices that support sustainability will be maintained over the long term and without the help of an outside facilitator. Copyright © 2014 Elsevier Ltd. All rights reserved.
Weiss, Jeff; Donigian, Aram; Hughes, Jonathan
2010-11-01
CEOs and other senior executives must make countless complex, high-stakes deals across functional areas and divisions, with alliance partners and critical suppliers, and with customers and regulators. The pressure of such negotiations may make them feel a lot like U.S. military officers in an Afghan village, fending off enemy fire while trying to win trust and get intelligence from the local populace. Both civilian and military leaders face what the authors call "dangerous negotiations," in which the traps are many and good advice is scarce. Although the sources of danger are quite different for executives and officers, they resort to the same kinds of behaviors. Both feel pressure to make quick progress, project strength and control (particularly when they have neither), rely on force rather than collaboration, trade resources for cooperation rather than build trust, and make unwanted compromises to minimize potential damage. The authors outline five core strategies that "in extremis" military negotiators use to resolve conflicts and influence others: maintaining a big-picture perspective; uncovering hidden agendas to improve collaboration; using facts and fairness to get buy-in; building trust; and focusing on process as well as outcomes. These strategies provide an effective framework that business executives can use to prepare for a negotiation and guide their moves at the bargaining table.
Recruiting the next generation: applying a values-based approach to recruitment.
Ritchie, Georgina; Ashworth, Lisa; Bades, Annette
2018-05-02
The qualified district nurse (DN) role demands high levels of leadership. Attracting the right candidates to apply for the Specialist Practice Qualification District Nursing (SPQDN) education programme is essential to ensure fitness to practice on qualification. Anecdotal evidence suggested that the traditional panel interview discouraged candidates from applying and a need to improve the quality of the overall interview process was identified by the authors. The University of Central Lancashire in partnership with Lancashire Care NHS Foundation Trust adopted the National Values Based Recruitment (VBR) Framework to select candidates to gain entry onto the SPQDN course. This involved using 'selection centres' of varying activities including a multiple mini interview, written exercise, group discussion, and portfolio review with scores attached to each centre. The ultimate aim of utilising VBR was to align personal and profession values to both the nursing profession and the Trust whilst allowing a fairer assessment process. An evaluation of the VBR recruitment process demonstrated 100% pass rate for the course and 100% satisfaction with the interview process reported by all 16 candidates over three academic years. Interviewer feedback showed deeper insight into the candidates' skills and values aligned with the core values and skills required by future District Nurse leaders within the Trust.
Empowering Provenance in Data Integration
NASA Astrophysics Data System (ADS)
Kondylakis, Haridimos; Doerr, Martin; Plexousakis, Dimitris
The provenance of data has recently been recognized as central to the trust one places in data. This paper presents a novel framework in order to empower provenance in a mediator based data integration system. We use a simple mapping language for mapping schema constructs, between an ontology and relational sources, capable to carry provenance information. This language extends the traditional data exchange setting by translating our mapping specifications into source-to-target tuple generating dependencies (s-t tgds). Then we define formally the provenance information we want to retrieve i.e. annotation, source and tuple provenance. We provide three algorithms to retrieve provenance information using information stored on the mappings and the sources. We show the feasibility of our solution and the advantages of our framework.
Mentalizing Family Violence Part 1: Conceptual Framework.
Asen, Eia; Fonagy, Peter
2017-03-01
This is the first of two companion papers describing concepts and techniques of a mentalization-based approach to understanding and managing family violence. We review evidence that attachment difficulties, sudden high levels of arousal, and poor affect control contribute to a loss of mentalizing capacity, which, in turn, undermines social learning and can favor the transgenerational transmission of violent interaction patterns. It is suggested that physically violent acts are only possible if mentalizing is temporarily inhibited or decoupled. However, being mentalized in the context of attachment relationships in the family generates epistemic trust within the family unit and reduces the likelihood of family violence. The implications of this framework for therapeutic work with families are discussed. © 2016 Family Process Institute.
Dunn, Geoffrey P
2006-08-01
The last phases of colorectal malignant illness may be the most challenging and saddening for all involved, but they offer opportunities to become the most rewarding. This transformation of hopelessness to fulfillment requires a willingness by surgeon, patient, and patient's family to trust one another to realistically set goals of care, stick together, and not let the treatment of the disease become a surrogate for treating the suffering that characterizes grave illness.
Using Reputation Systems and Non-Deterministic Routing to Secure Wireless Sensor Networks
Moya, José M.; Vallejo, Juan Carlos; Fraga, David; Araujo, Álvaro; Villanueva, Daniel; de Goyeneche, Juan-Mariano
2009-01-01
Security in wireless sensor networks is difficult to achieve because of the resource limitations of the sensor nodes. We propose a trust-based decision framework for wireless sensor networks coupled with a non-deterministic routing protocol. Both provide a mechanism to effectively detect and confine common attacks, and, unlike previous approaches, allow bad reputation feedback to the network. This approach has been extensively simulated, obtaining good results, even for unrealistically complex attack scenarios. PMID:22412345
International cooperation in the Space Station programme - Assessing the experience to date
NASA Technical Reports Server (NTRS)
Logsdon, John M.
1991-01-01
The origins and framework for cooperation in the Space Station program are outlined. Particular attention is paid to issues and commitments between the countries and to the political context of the Station partnership. A number of conclusions concerning international cooperation in space are drawn based on the Space Station experience. Among these conclusions is the assertion that an international partnership requires realistic assesments, mutual trust, and strong commitments in order to work.
2016-07-07
engineering (CCE) methods, such as aggregate crater fill and laying replacement concrete. [RAND] • Level 2: CCE plus the use of folded fiberglass ( FFM ...or aluminum mats (e.g., AM-2). [RAND] • Level 3: CCE, FFMs , and Critical Runway Assessment and Repair (CRATR) teams. [RAND] Recovery. In air...CSG carrier strike group CTA central terminal area DCA defensive counterair DoD U.S. Department of Defense FFM folded fiber mats FOB forward
Evolutionary genetics of insect innate immunity.
Viljakainen, Lumi
2015-11-01
Patterns of evolution in immune defense genes help to understand the evolutionary dynamics between hosts and pathogens. Multiple insect genomes have been sequenced, with many of them having annotated immune genes, which paves the way for a comparative genomic analysis of insect immunity. In this review, I summarize the current state of comparative and evolutionary genomics of insect innate immune defense. The focus is on the conserved and divergent components of immunity with an emphasis on gene family evolution and evolution at the sequence level; both population genetics and molecular evolution frameworks are considered. © The Author 2015. Published by Oxford University Press.
The ties that bind: an integrative framework of physician-hospital alignment
2011-01-01
Background Alignment between physicians and hospitals is of major importance to the health care sector. Two distinct approaches to align the medical staff with the hospital have characterized previous research. The first approach, economic integration, is rooted in the economic literature, in which alignment is realized by financial means. The second approach, noneconomic integration, represents a sociological perspective emphasizing the cooperative nature of their relationship. Discussion Empirical studies and management theory (agency theory and social exchange theory) are used to increase holistic understanding of physician hospital alignment. On the one hand, noneconomic integration is identified as a means to realize a cooperative relationship. On the other hand, economic integration is studied as a way to align financial incentives. The framework is developed around two key antecedent factors which play an important role in aligning the medical staff. First, provider financial risk bearing is identified as a driving force towards closer integration. Second, organizational trust is believed to be important in explaining the causal relation between noneconomic and economic integration. Summary Hospital financial risk bearing creates a greater need for closer cooperation with the medical staff and alignment of financial incentives. Noneconomic integration lies at the very basis of alignment. It contributes directly to alignment through the norm of reciprocity and indirectly by building trust with the medical staff, laying the foundation for alignment of financial incentives. PMID:21324128
The ties that bind: an integrative framework of physician-hospital alignment.
Trybou, Jeroen; Gemmel, Paul; Annemans, Lieven
2011-02-15
Alignment between physicians and hospitals is of major importance to the health care sector. Two distinct approaches to align the medical staff with the hospital have characterized previous research. The first approach, economic integration, is rooted in the economic literature, in which alignment is realized by financial means. The second approach, noneconomic integration, represents a sociological perspective emphasizing the cooperative nature of their relationship. Empirical studies and management theory (agency theory and social exchange theory) are used to increase holistic understanding of physician hospital alignment. On the one hand, noneconomic integration is identified as a means to realize a cooperative relationship. On the other hand, economic integration is studied as a way to align financial incentives. The framework is developed around two key antecedent factors which play an important role in aligning the medical staff. First, provider financial risk bearing is identified as a driving force towards closer integration. Second, organizational trust is believed to be important in explaining the causal relation between noneconomic and economic integration. Hospital financial risk bearing creates a greater need for closer cooperation with the medical staff and alignment of financial incentives. Noneconomic integration lies at the very basis of alignment. It contributes directly to alignment through the norm of reciprocity and indirectly by building trust with the medical staff, laying the foundation for alignment of financial incentives.
Reach, Gérard
2016-01-01
Patient education (PE) is expected to help patients with a chronic disease to manage their lives and give them the possibility of adopting, in an appropriate manner, beneficial changes in health behaviors that are prescribed by their physicians. It is aimed at delineating, agreeing on, and implementing a patient’s personal action plan and is therefore an essential constituent of the person-centered model of care. The aim of this article is to examine the idea that PE may sometimes be a manipulation that is organized for the good of patients in a paternalistic framework. Theoretically, PE differs from manipulation by addressing the reflective intelligence of patients in full light and helping them make autonomous choices. In this article, we examined some analogies between PE and nudge (ie, techniques used to push people to make good choices by organizing their environment). This analysis suggests that PE is not always as transparent and reflective as it is supposed to be and that unmasking these issues may be useful for improving the ethical quality of educational practice that must be performed in a framework of a trusting patient–doctor relationship. Under this condition, PE may sometimes represent a form of persuasion without being accused of patient deception and manipulation: trust is therefore the core of the person-centered model of care. PMID:27103791
Reach, Gérard
2016-01-01
Patient education (PE) is expected to help patients with a chronic disease to manage their lives and give them the possibility of adopting, in an appropriate manner, beneficial changes in health behaviors that are prescribed by their physicians. It is aimed at delineating, agreeing on, and implementing a patient's personal action plan and is therefore an essential constituent of the person-centered model of care. The aim of this article is to examine the idea that PE may sometimes be a manipulation that is organized for the good of patients in a paternalistic framework. Theoretically, PE differs from manipulation by addressing the reflective intelligence of patients in full light and helping them make autonomous choices. In this article, we examined some analogies between PE and nudge (ie, techniques used to push people to make good choices by organizing their environment). This analysis suggests that PE is not always as transparent and reflective as it is supposed to be and that unmasking these issues may be useful for improving the ethical quality of educational practice that must be performed in a framework of a trusting patient-doctor relationship. Under this condition, PE may sometimes represent a form of persuasion without being accused of patient deception and manipulation: trust is therefore the core of the person-centered model of care.
Why carers use adult day respite: a mixed method case study
2014-01-01
Background We need to improve our understanding of the complex interactions between family carers’ emotional relationships with care-recipients and carers use of support services. This study assessed carer’s expectations and perceptions of adult day respite services and their commitment to using services. Methods A mixed-method case study approach was used with psychological contract providing a conceptual framework. Data collection was situated within an organisational case study, and the total population of carers from the organisation’s day respite service were approached. Fifty respondents provided quantitative and qualitative data through an interview survey. The conceptual framework was expanded to include Maslow’s hierarchy of needs during analysis. Results Carers prioritised benefits for and experiences of care-recipients when making day respite decisions. Respondents had high levels of trust in the service and perceived that the major benefits for care-recipients were around social interaction and meaningful activity with resultant improved well-being. Carers wanted day respite experiences to include all levels of Maslow’s hierarchy of needs from the provision of physiological care and safety through to the higher levels of belongingness, love and esteem. Conclusion The study suggests carers need to trust that care-recipients will have quality experiences at day respite. This study was intended as a preliminary stage for further research and while not generalizable it does highlight key considerations in carers’ use of day respite services. PMID:24906239
Why carers use adult day respite: a mixed method case study.
Stirling, Christine M; Dwan, Corinna A; McKenzie, Angela R
2014-06-06
We need to improve our understanding of the complex interactions between family carers' emotional relationships with care-recipients and carers use of support services. This study assessed carer's expectations and perceptions of adult day respite services and their commitment to using services. A mixed-method case study approach was used with psychological contract providing a conceptual framework. Data collection was situated within an organisational case study, and the total population of carers from the organisation's day respite service were approached. Fifty respondents provided quantitative and qualitative data through an interview survey. The conceptual framework was expanded to include Maslow's hierarchy of needs during analysis. Carers prioritised benefits for and experiences of care-recipients when making day respite decisions. Respondents had high levels of trust in the service and perceived that the major benefits for care-recipients were around social interaction and meaningful activity with resultant improved well-being. Carers wanted day respite experiences to include all levels of Maslow's hierarchy of needs from the provision of physiological care and safety through to the higher levels of belongingness, love and esteem. The study suggests carers need to trust that care-recipients will have quality experiences at day respite. This study was intended as a preliminary stage for further research and while not generalizable it does highlight key considerations in carers' use of day respite services.
An, Chuanfu; Wang, Chenggang; Mou, Zhonglin
2017-05-01
Although in recent years nonhost resistance has attracted considerable attention for its broad spectrum and durability, the genetic and mechanistic components of nonhost resistance have not been fully understood. We used molecular and histochemical approaches including quantitative PCR, chromatin immunoprecipitation, and 3,3'-diaminobenzidine and aniline blue staining. The evolutionarily conserved histone acetyltransferase complex Elongator was identified as a major component of nonhost resistance against Xanthomonas citri subsp. citri (Xcc) and Pseudomonas syringae pv. phaseolicola (Psp) NPS3121. Mutations in Elongator genes inhibit Xcc-, Psp NPS3121- and/or flg22-induced defense responses including defense gene expression, callose deposition, and reactive oxygen species (ROS) and salicylic acid (SA) accumulation. Mutations in Elongator also attenuate the ROS-SA amplification loop. We show that suppressed ROS and SA accumulation in Elongator mutants is correlated with reduced expression of the Arabidopsis respiratory burst oxidase homologue AtrbohD and the SA biosynthesis gene ISOCHORISMATE SYNTHASE1 (ICS1). Furthermore, we found that the Elongator subunit ELP2 is associated with the chromatin of AtrbohD and ICS1 and is required for maintaining basal histone H3 acetylation levels in these key defense genes. As both AtrbohD and ICS1 contribute to nonhost resistance against Xcc, our results reveal an epigenetic mechanism by which Elongator regulates nonhost resistance in Arabidopsis. © 2017 The Authors. New Phytologist © 2017 New Phytologist Trust.
Aivalli, Praveen Kumar; Elias, Maya Annie; Pati, Manoj Kumar; Bhanuprakash, Srinath; Munegowda, Chikkagollahalli; Shroff, Zubin Cyrus; Srinivas, Prashanth N
2017-01-01
Generic medicines are an important policy option to reduce out-of-pocket expenditure on medicines. However, negative perceptions of their quality affect utilisation and raise issues of confidence and trust in medicines and health services. The aim of the study was to test the quality of generic and branded medicines and explain negative perceptions towards generic medicines. The study was part of a larger study on access to medicines. Information on various quality parameters was collected for branded medicines and branded and unbranded generic versions of the same medicines from government and private pharmacies in Karnataka in Southern India. To assess perceptions related to quality and drivers of preferred point of care (public vs private), focus group discussions were conducted with diabetes and hypertension patients, health workers and private pharmacists. The results of the quality tests were assessed and thematic analysis was conducted on the qualitative data to develop a conceptual framework to explain perceptions of medicine and care quality in the local health system. The generic and branded variants of the medicines tested were of comparable quality. Contrary to the quality test results, patients' and health workers' perceptions of quality were largely in favour of branded medicines. Negative perceptions of medicine quality along with other drivers contribute towards choosing more expensive medicines in the private sector. Trust in the health system emerged as an underlying central theme that explained and drove choice of medicines and providers within the local health system. Negative perceptions of generic medicines and preferential promotion of branded medicines over generics by pharmaceutical companies could influence prescriber behaviour and affect trust in healthcare provided in public services. To succeed, access to medicines programmes need to systematically invest in information on quality of medicines and develop strategies to build trust in healthcare offered in government health services.
Aivalli, Praveen Kumar; Elias, Maya Annie; Pati, Manoj Kumar; Bhanuprakash, Srinath; Munegowda, Chikkagollahalli; Shroff, Zubin Cyrus
2017-01-01
Introduction Generic medicines are an important policy option to reduce out-of-pocket expenditure on medicines. However, negative perceptions of their quality affect utilisation and raise issues of confidence and trust in medicines and health services. The aim of the study was to test the quality of generic and branded medicines and explain negative perceptions towards generic medicines. Methods The study was part of a larger study on access to medicines. Information on various quality parameters was collected for branded medicines and branded and unbranded generic versions of the same medicines from government and private pharmacies in Karnataka in Southern India. To assess perceptions related to quality and drivers of preferred point of care (public vs private), focus group discussions were conducted with diabetes and hypertension patients, health workers and private pharmacists. The results of the quality tests were assessed and thematic analysis was conducted on the qualitative data to develop a conceptual framework to explain perceptions of medicine and care quality in the local health system. Results The generic and branded variants of the medicines tested were of comparable quality. Contrary to the quality test results, patients’ and health workers’ perceptions of quality were largely in favour of branded medicines. Negative perceptions of medicine quality along with other drivers contribute towards choosing more expensive medicines in the private sector. Trust in the health system emerged as an underlying central theme that explained and drove choice of medicines and providers within the local health system. Conclusion Negative perceptions of generic medicines and preferential promotion of branded medicines over generics by pharmaceutical companies could influence prescriber behaviour and affect trust in healthcare provided in public services. To succeed, access to medicines programmes need to systematically invest in information on quality of medicines and develop strategies to build trust in healthcare offered in government health services. PMID:29531844
A Framework for Comparing Groups of Documents
2015-09-21
Science Foundation (NSF), the National Institutes of Health (NIH), and the Department of Defense (DoD), are of- ten in the position of reviewing...documents. Here, we provide two motivating examples. 1. Program Reviews. To better direct research efforts, funding organizations such as the National
Gallego-Giraldo, Lina; Jikumaru, Yusuke; Kamiya, Yuji; Tang, Yuhong; Dixon, Richard A
2011-05-01
• Downregulation of hydroxycinnamoyl CoA: shikimate hydroxycinnamoyl transferase (HCT) in alfalfa (Medicago sativa) reduces lignin levels and improves forage quality and saccharification efficiency for bioethanol production. However, the plants have reduced stature. It was previously reported that HCT-down-regulated Arabidopsis have impaired auxin transport, but this has recently been disproved. • To address the basis for the phenotypes of lignin-modified alfalfa, we measured auxin transport, profiled a range of metabolites including flavonoids and hormones, and performed in depth transcriptome analyses. • Auxin transport is unaffected in HCT antisense alfalfa despite increased flavonoid biosynthesis. The plants show increased cytokinin and reduced auxin levels, and gibberellin levels and sensitivity are both reduced. Levels of salicylic, jasmonic and abscisic acids are elevated, associated with massive upregulation of pathogenesis and abiotic stress-related genes and enhanced tolerance to fungal infection and drought. • We suggest that HCT downregulated alfalfa plants exhibit constitutive activation of defense responses, triggered by release of bioactive cell wall fragments and production of hydrogen peroxide as a result of impaired secondary cell wall integrity. © 2011 The Authors. New Phytologist © 2011 New Phytologist Trust.
Bourcy, Marie; Brocard, Lysiane; Pislariu, Catalina I; Cosson, Viviane; Mergaert, Peter; Tadege, Millon; Mysore, Kirankumar S; Udvardi, Michael K; Gourion, Benjamin; Ratet, Pascal
2013-03-01
Medicago truncatula and Sinorhizobium meliloti form a symbiotic association resulting in the formation of nitrogen-fixing nodules. Nodule cells contain large numbers of bacteroids which are differentiated, nitrogen-fixing forms of the symbiotic bacteria. In the nodules, symbiotic plant cells home and maintain hundreds of viable bacteria. In order to better understand the molecular mechanism sustaining the phenomenon, we searched for new plant genes required for effective symbiosis. We used a combination of forward and reverse genetics approaches to identify a gene required for nitrogen fixation, and we used cell and molecular biology to characterize the mutant phenotype and to gain an insight into gene function. The symbiotic gene DNF2 encodes a putative phosphatidylinositol phospholipase C-like protein. Nodules formed by the mutant contain a zone of infected cells reduced to a few cell layers. In this zone, bacteria do not differentiate properly into bacteroids. Furthermore, mutant nodules senesce rapidly and exhibit defense-like reactions. This atypical phenotype amongst Fix(-) mutants unravels dnf2 as a new actor of bacteroid persistence inside symbiotic plant cells. © 2012 CNRS. New Phytologist © 2012 New Phytologist Trust.
Collegiality and commerce: The culture of consideration amongst engineers
NASA Astrophysics Data System (ADS)
Nugent, Paul David
This study is a participant observation ethnography of engineering relationships at a defense contracting plant that specializes in the design and manufacture of launch control systems for nuclear submarines. "Consideration" is presented as a unique mode of interaction enabling resource exchange and pivotal in developing and strengthening work relationships. Consideration differs from other modes of exchange such as markets, gift-giving, and charity primarily in that the bestowal of the resource involves little sacrifice. The manner in which consideration is enacted by the engineers, the structural and cultural conditions supporting consideration, and the social and economic consequences of consideration are presented. From these findings it is concluded that consideration is a unique form of economic exchange embedded in concrete relationships that forces us to rethink and extend current conceptualizations of trust, networks, social capital, and friendship in the workplace. The data for the analysis were drawn from twenty interviews and fieldnotes collected and transcribed over a twelve month period. Quotations from the interviews and exerpts from the fieldnotes are included to illustrate claims being made in the analysis as well as to familiarize the reader with the culture developed by engineers and managers in a defense contracting plant.
Holland, P
1997-04-01
Three years of analytical psychotherapy with a professional woman in mid-life, suffering from chronic fatigue syndrome (CFS), is described. Gradual recovery merged into mid-life changes; marriage, along with a new balance of maternal and paternal imagos, enabled her to trust enough to become pregnant-coniunctio in the most primal bodily and psychic modes. Her life-long, schizoid type pattern, "the pendulum of closeness and isolation', with its extreme of psycho-physical collapse and devitalization, was replayed in therapy. The analyst's symbolic attitude is emphasized, containing the patient's initial affective explosion and validating the physicality of her condition. Mirroring and steady rhythmic attunement became a new, pre-verbal, source of trust-vitalization; differentiation and separation replaced defensive splitting and dissociation. Then the overwhelmingly powerful bodily/maternal could be counterbalanced by the masculine, and a transitional space emerged for symbolic work. Both the regressive and the dynamic aspects of CFS are located in the earliest undifferentiated, archetypal, bodily/psychic modes, when the frustration of primary needs evokes the defences of the self. It is argued that our psychodynamic understanding can contribute to the stalemate in seeing chronic fatigue syndrome as either an organic illness or depression, and that a new linking of the somatic and psychic calls for a new professional collaboration.
Smith, Denise Colter
2015-01-01
Since the passage of the Affordable Care Act, collaborative practice has been cited as one method of increasing access to care, decreasing costs, and improving efficiency. How and under what conditions might these goals be achieved? Midwives and physicians have built effective collaborative practice models over a period of 30 years. Empirical study of interprofessional collaboration between midwives and physicians could be useful in guiding professional education, regulation, and health policy in women's health and maternity care. Construction of a conceptual framework for interprofessional collaboration between midwives and physicians was guided by a review of the literature. A theory derivation strategy was used to define dimensions, concepts, and statements of the framework. Midwife-physician interprofessional collaboration can be defined by 4 dimensions (organizational, procedural, relational, and contextual) and 12 concepts (trust, shared power, synergy, commitment, and respect, among others). The constructed framework provides the foundation for further empirical study of the interprofessional collaborative process. The experiences of midwife-physician collaborations provide solid support for a conceptual framework of the collaborative process. A conceptual framework provides a point from which further research can increase knowledge and understanding about how successful outcomes are achieved in collaborative health care practices. Construction of a measurement scale and validation of the model are important next steps. © 2014 by the American College of Nurse-Midwives.
Van Gelderen, Stacey A; Krumwiede, Kelly A; Krumwiede, Norma K; Fenske, Candace
2018-01-01
To describe the application of the Community-Based Collaborative Action Research (CBCAR) framework to uplift rural community voices while conducting a community health needs assessment (CHNA) by formulating a partnership between a critical access hospital, public health agency, school of nursing, and community members to improve societal health of this rural community. This prospective explorative study used the CBCAR framework in the design, collection, and analysis of the data. The framework phases include: Partnership, dialogue, pattern recognition, dialogue on meaning of pattern, insight into action, and reflecting on evolving pattern. Hospital and public health agency leaders learned how to use the CBCAR framework when conducting a CHNA to meet Affordable Care Act federal requirements. Closing the community engagement gap helped ensure all voices were heard, maximized intellectual capital, synergized efforts, improved communication by establishing trust, aligned resources with initiatives, and diminished power struggles regarding rural health. The CBCAR framework facilitated community engagement and promoted critical dialogue where community voices were heard. A sustainable community-based collaborative was formed. The project increased the critical access hospital's capacity to conduct a CHNA. The collaborative's decision-making capacity was challenged and ultimately strengthened as efforts continue to be made to address rural health.
Dickmann, Petra; Sheeley, Heather; Lightfoot, Nigel
2015-01-01
Laboratory capacity building is characterized by a paradox between endemicity and resources: countries with high endemicity of pathogenic agents often have low and intermittent resources (water, electricity) and capacities (laboratories, trained staff, adequate regulations). Meanwhile, countries with low endemicity of pathogenic agents often have high-containment facilities with costly infrastructure and maintenance governed by regulations. The common practice of exporting high biocontainment facilities and standards is not sustainable and concerns about biosafety and biosecurity require careful consideration. A group at Chatham House developed a draft conceptual framework for safer, more secure, and sustainable laboratory capacity building. The draft generic framework is guided by the phrase "LOCAL - PEOPLE - MAKE SENSE" that represents three major principles: capacity building according to local needs (local) with an emphasis on relationship and trust building (people) and continuous outcome and impact measurement (make sense). This draft generic framework can serve as a blueprint for international policy decision-making on improving biosafety and biosecurity in laboratory capacity building, but requires more testing and detailing development.
Pandemic influenza preparedness: an ethical framework to guide decision-making
Thompson, Alison K; Faith, Karen; Gibson, Jennifer L; Upshur, Ross EG
2006-01-01
Background Planning for the next pandemic influenza outbreak is underway in hospitals across the world. The global SARS experience has taught us that ethical frameworks to guide decision-making may help to reduce collateral damage and increase trust and solidarity within and between health care organisations. Good pandemic planning requires reflection on values because science alone cannot tell us how to prepare for a public health crisis. Discussion In this paper, we present an ethical framework for pandemic influenza planning. The ethical framework was developed with expertise from clinical, organisational and public health ethics and validated through a stakeholder engagement process. The ethical framework includes both substantive and procedural elements for ethical pandemic influenza planning. The incorporation of ethics into pandemic planning can be helped by senior hospital administrators sponsoring its use, by having stakeholders vet the framework, and by designing or identifying decision review processes. We discuss the merits and limits of an applied ethical framework for hospital decision-making, as well as the robustness of the framework. Summary The need for reflection on the ethical issues raised by the spectre of a pandemic influenza outbreak is great. Our efforts to address the normative aspects of pandemic planning in hospitals have generated interest from other hospitals and from the governmental sector. The framework will require re-evaluation and refinement and we hope that this paper will generate feedback on how to make it even more robust. PMID:17144926
2010-03-12
are, it is best to leave their names incognito. To my wife, Carey , and our entertaining children, Jacob and Lucas: words alone cannot describe your...MILCON) appropriations fund major projects such as bases, schools, missile storage facilities, maintenance facilities, medical/ dental clinics
2010-01-01
encouragement. For some, and they know who they are, it is best to leave their names incognito. To my wife, Carey , and our entertaining children, Jacob...such as bases, schools, missile storage facilities, maintenance facilities, medical/ dental clinics, libraries, and military family housing
Improving Defense Acquisition Management and Policy Through a Life-Cycle Affordability Framework
2014-02-04
substrates based on gender, culture, and propensity. Four Design a neurofeedback -based training program that will produce changes in neuronal substrates...Validate the training program by iterating Step 3 until the desired behavioral outcome is achieved. Confirm that the neurofeedback creates desired
Augmenting Trust Establishment in Dynamic Systems with Social Networks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lagesse, Brent J; Kumar, Mohan; Venkatesh, Svetha
2010-01-01
Social networking has recently flourished in popularity through the use of social websites. Pervasive computing resources have allowed people stay well-connected to each other through access to social networking resources. We take the position that utilizing information produced by relationships within social networks can assist in the establishment of trust for other pervasive computing applications. Furthermore, we describe how such a system can augment a sensor infrastructure used for event observation with information from mobile sensors (ie, mobile phones with cameras) controlled by potentially untrusted third parties. Pervasive computing systems are invisible systems, oriented around the user. As a result,more » many future pervasive systems are likely to include a social aspect to the system. The social communities that are developed in these systems can augment existing trust mechanisms with information about pre-trusted entities or entities to initially consider when beginning to establish trust. An example of such a system is the Collaborative Virtual Observation (CoVO) system fuses sensor information from disaparate sources in soft real-time to recreate a scene that provides observation of an event that has recently transpired. To accomplish this, CoVO must efficently access services whilst protecting the data from corruption from unknown remote nodes. CoVO combines dynamic service composition with virtual observation to utilize existing infrastructure with third party services available in the environment. Since these services are not under the control of the system, they may be unreliable or malicious. When an event of interest occurs, the given infrastructure (bus cameras, etc.) may not sufficiently cover the necessary information (be it in space, time, or sensor type). To enhance observation of the event, infrastructure is augmented with information from sensors in the environment that the infrastructure does not control. These sensors may be unreliable, uncooperative, or even malicious. Additionally, to execute queries in soft real-time, processing must be distributed to available systems in the environment. We propose to use information from social networks to satisfy these requirements. In this paper, we present our position that knowledge gained from social activities can be used to augment trust mechanisms in pervasive computing. The system uses social behavior of nodes to predict a subset that it wants to query for information. In this context, social behavior such as transit patterns and schedules (which can be used to determine if a queried node is likely to be reliable) or known relationships, such as a phone's address book, that can be used to determine networks of nodes that may also be able to assist in retrieving information. Neither implicit nor explicit relationships necessarily imply that the user trusts an entity, but rather will provide a starting place for establishing trust. The proposed framework utilizes social network information to assist in trust establishment when third-party sensors are used for sensing events.« less
Reflections on a community and university research collaboration.
Mayo, Kevin; Tsey, Komla
2009-08-01
This paper reflects on the collaborative research relationship between university and community researchers. It identifies emergent themes expressed in the words of researchers and recommends strategies to assist with other research collaborations. Emergent themes included: Initial reticence by community members followed by positive experiences; the value of empowerment frameworks in research; building trust between community and university researchers; capacity building, management, and workloads; and community politics, misunderstandings and wealth disparity. The paper recommends strategies for successful research collaborations and identifies challenges to research collaborations.
2012-06-01
Topic 8: Networks and Networking Name of Author(s) Kevin Chan, US Army Research Laboratory Mary Ruddy, Azigo Point of Contact Kevin Chan RDRL-CIN...framework. The enhanced integrated emulation platform is then used to conduct a series of agent-based ELICIT experiments whose design is informed by...NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) US Army Research
Litigation and complaints procedures: objectives, effectiveness and alternatives.
Whelan, C J
1988-01-01
Recent debates about redress mechanisms for medical accident victims have been sidetracked by fears of an American-style medical malpractice crisis. What is required is a framework within which the debate can resume. This paper proposes such a framework by focusing on the compensation and deterrence objectives and placing them in the wider context of the social costs of providing medical services. The framework is then used to assess and compare the effectiveness of differing approaches. In particular, the American and British experiences of litigation, including the concept of 'defensive medicine', are evaluated. Also discussed briefly are alternatives to court-based complaints procedures including 'no-fault' schemes, professional ethics and internal complaints mechanisms. PMID:3392721
Decision support frameworks and tools for conservation
Schwartz, Mark W.; Cook, Carly N.; Pressey, Robert L.; Pullin, Andrew S.; Runge, Michael C.; Salafsky, Nick; Sutherland, William J.; Williamson, Matthew A.
2018-01-01
The practice of conservation occurs within complex socioecological systems fraught with challenges that require transparent, defensible, and often socially engaged project planning and management. Planning and decision support frameworks are designed to help conservation practitioners increase planning rigor, project accountability, stakeholder participation, transparency in decisions, and learning. We describe and contrast five common frameworks within the context of six fundamental questions (why, who, what, where, when, how) at each of three planning stages of adaptive management (project scoping, operational planning, learning). We demonstrate that decision support frameworks provide varied and extensive tools for conservation planning and management. However, using any framework in isolation risks diminishing potential benefits since no one framework covers the full spectrum of potential conservation planning and decision challenges. We describe two case studies that have effectively deployed tools from across conservation frameworks to improve conservation actions and outcomes. Attention to the critical questions for conservation project planning should allow practitioners to operate within any framework and adapt tools to suit their specific management context. We call on conservation researchers and practitioners to regularly use decision support tools as standard practice for framing both practice and research.
Enduring U.S. Interests in the Persian Gulf Region
2012-03-02
building partner capacity” ( BPC ). BPC is part of a larger security assistance framework which provides defense articles, military training, and...Santa Monica, CA: Rand, 2010), 157 . 15The Cooperation Council for the Arab States of the Gulf; http://www.gcc-sg.org/eng/ indexfc7a.html?action=Sec
Reconstructing Operational Theory: A Framework for Emerging Threats in a Complex Environment
2007-01-01
General Shimon Naveh. While the composition and construction of the urban environment traditionally influence targeting calculus , this is not the same as... Anton . "The Relevance of Chaos Theory to Operations." Australian Defense Force Journal. No. 162. Sep/Oct 2003, 4-18. Lind, William
Fact Sheet: FY2017 National Defense Authorization Act (NDAA) DOD Reform Proposals
2016-05-25
this critical organizational framework, while still preserving its spirit and intent. For example, we can see in some areas how the pendulum between...or where subsequent world events suggest nudging the pendulum further, as in taking more steps to strengthen the capability of the Chairman and the
ERIC Educational Resources Information Center
Frey, Karin S.; Higheagle Strong, Zoe; Onyewuenyi, Adaurennaya C.
2017-01-01
Theory and research using a social-information processing framework indicate that reward-focused (proactive) aggression has different social consequences than defense-focused (reactive) aggression. Students use norms that identify expected and socially approved behaviors as guides to their own actions. Differences in social-cognitive processing…
Vital Defenses: Social Support Appraisals of Black Grandmothers Parenting Grandchildren
ERIC Educational Resources Information Center
Stevenson, Michelle L.; Henderson, Tammy L.; Baugh, Eboni
2007-01-01
Guided by the conceptual frameworks of social support appraisal mechanisms and cultural variant perspectives, the reported experiences of 23 Black grandmothers parenting grandchildren who receive cash assistance under the current welfare program, Temporary Assistance to Needy Families (TANF), were used to integrate macro- and micro-level…
2009-08-19
SSDS Ship Self Defense System TSTS Total Ship Training System UDDI Universal Description, Discovery, and Integration UML Unified Modeling...34ContractorOrganization" type="ContractorOrganizationType"> <xs:annotation> <xs:documentation>Identifies a contractor organization resposible for the
Agile Software Development in the Department of Defense Environment
2017-03-31
Research Methodology .............................................................................................. 17 Research Hypothesis...acquisition framework to enable greater adoption of Agile methodologies . Overview of the Research Methodology The strategy for this study was to...guidance. 17 Chapter 3 – Research Methodology This chapter defines the research methodology and processes used in the study, in an effort to
USDA-ARS?s Scientific Manuscript database
Robust stressor-response measures are needed to inform nutrient criteria development and protect inland waters from impacts associated with eutrophication. We tested a framework to help inform criteria development that relies on assessing stream assemblage responses to phosphorus (P) enrichment acro...
2010-03-01
80 Discussion ...methods used to construct the survey questionnaire and discuss the data analysis methodology. Chapter IV will present the analysis of the data...2 provides a snapshot of the similarities and differences across various studies on new product development. The subsequent paragraphs will discuss
Applying Counterinsurgency Theory to Air Base Defense: A New Doctrinal Framework
2005-09-01
impact when compared to airpower. However, the combatant commander’s dependence on airpower goes beyond just fire support but, maybe as importantly, on...insurgents do not is because the air base attacks have strategic impact . The insurgents attack because, as the Marine Corps’ Small Wars Manual (2003
Military health system efficiency: a review of history and recommendations for the future.
Coppola, Nicholas; Satterwhite, Robin; Fulton, Lawrence V; Shanderson, Laurie L; Pasupathy, Rubini
2012-06-01
This article reviews the history of measuring military medical health care efficiency. No single approved definition or uniform framework has ever been offered or suggested defining military medical treatment facility efficiency over the last 225 years within the Department of Defense. The purpose of this article is to consolidate much of the existing research on the latent variable of military medical efficiency over the last two centuries, and to provide health care leaders a framework for understanding past and current practices in measuring efficiency in the military health care setting.
Toward a Conceptual Framework for Operational Arms Control in Europe’s Central Region
1988-11-01
AD-A214 057 Toward a Conceptual Framework for Operational Arms Control in Europe’s Central Region Paul K. Davis DTIG ELECTEfl NOVO TIM D A Report...REPORT DOCUMENTATION PAGE 1_____RZ___________FORM 00 1 014POON? NUMBIEN 1. GOVT C-CZsSIO4 me. 3.,tcC1i(Ntzm1 CATALOCG ,lMaGI R -3704...Under Secretary of Defense for Policy November 1988 Hashington, D . C. 20301 13. MUNGIER Or 0 ACKS9 u~I 81 ICMONITORING AGENMCY NAMEC 6 ACORIESS(it
Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks
Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly
2014-01-01
Hybrid mobile applications (apps) combine the features of Web applications and “native” mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources—file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies “bridges” that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources—the ability to read and write contacts list, local files, etc.—to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign-origin Web content and explain why they are ineffectual. We then present NoFrak, a capability-based defense against fracking attacks. NoFrak is platform-independent, compatible with any framework and embedded browser, requires no changes to the code of the existing hybrid apps, and does not break their advertising-supported business model. PMID:25485311
Pandya, Sheel M
2010-05-01
Congress made an unprecedented investment in health information technology (IT) when it passed the American Recovery and Reinvestment Act in February 2009. Health IT provides enormous opportunities to improve health care quality, reduce costs, and engage patients in their own care. But the potential payoff for use of health IT for diabetes care is magnified given the prevalence, cost, and complexity of the disease. However, without proper privacy and security protections in place, diabetes patient data are at risk of misuse, and patient trust in the system is undermined. We need a comprehensive privacy and security framework that articulates clear parameters for access, use, and disclosure of diabetes patient data for all entities storing and exchanging electronic data. (c) 2010 Diabetes Technology Society.
Bredenoord, Annelien L; Mostert, Menno; Isasi, Rosario; Knoppers, Bartha M
2015-01-01
Data and sample sharing constitute a scientific and ethical imperative but need to be conducted in a responsible manner in order to protect individual interests as well as maintain public trust. In 2014, the Global Alliance for Genomics and Health (GA4GH) adopted a common Framework for Responsible Sharing of Genomic and Health-Related Data. The GA4GH Framework is applicable to data sharing in the stem cell field, however, interpretation is required so as to provide guidance for this specific context. In this paper, the International Stem Cell Forum Ethics Working Party discusses those principles that are specific to translational stem cell science, including engagement, data quality and safety, privacy, security and confidentiality, risk-benefit analysis and sustainability.
The Primary Role of Fibrinogen-Related Proteins in Invertebrates Is Defense, Not Coagulation
Hanington, Patrick C.; Zhang, Si-Ming
2010-01-01
In vertebrates, the conversion of fibrinogen into fibrin is an essential process that underlies the establishment of the supporting protein framework required for coagulation. In invertebrates, fibrinogen-domain-containing proteins play a role in the defense response generated against pathogens; however, they do not function in coagulation, suggesting that this role has been recently acquired. Molecules containing fibrinogen motifs have been identified in numerous invertebrate organisms, and most of these molecules known to date have been linked to defense. Moreover, recent genome projects of invertebrate animals have revealed surprisingly high numbers of fibrinogen-like loci in their genomes, suggesting important and perhaps diverse functions of fibrinogen-like proteins in invertebrates. The ancestral role of molecules containing fibrinogen-related domains (FReDs) with immunity is the focus of this review, with emphasis on specific FReDs called fibrinogen-related proteins (FREPs) identified from the schistosome-transmitting mollusc Biomphalaria glabrata. Herein, we outline the range of invertebrate organisms FREPs can be found in, and detail the roles these molecules play in defense and protection against infection. PMID:21063081
Newborn screening in Victoria: a case study of tissue banking regulation.
Lawson, Charles
2008-12-01
The regulation of human tissue collections is increasingly important in maintaining public trust (and legitimacy) for critical practices and resources directed to public health programs and research. This article examines the governance arrangements applying to VCGS Ltd (under its various incarnations as "Genetic Health Services Victoria", "VCGS Pathology", and so on) and the existing collection of population-wide blood samples maintained on newborn screening cards (or Guthrie cards) in Victoria. The analyses reveal a complex web of regulations (and possibly even no regulation) and the limited role of significant statutory schemes that are generally assumed to apply to human tissue collections and the data and information derived from those materials. The article argues that, without a clear regulatory framework (and in particular meaningful consent), there is likely to be a decline in public trust (and legitimacy) with a consequent decreased participation in what is a public health program with immediate and quantifiable benefits and a valuable research resource for the future.
A secured e-tendering modeling using misuse case approach
NASA Astrophysics Data System (ADS)
Mohd, Haslina; Robie, Muhammad Afdhal Muhammad; Baharom, Fauziah; Darus, Norida Muhd; Saip, Mohamed Ali; Yasin, Azman
2016-08-01
Major risk factors relating to electronic transactions may lead to destructive impacts on trust and transparency in the process of tendering. Currently, electronic tendering (e-tendering) systems still remain uncertain in issues relating to legal and security compliance and most importantly it has an unclear security framework. Particularly, the available systems are lacking in addressing integrity, confidentiality, authentication, and non-repudiation in e-tendering requirements. Thus, one of the challenges in developing an e-tendering system is to ensure the system requirements include the function for secured and trusted environment. Therefore, this paper aims to model a secured e-tendering system using misuse case approach. The modeling process begins with identifying the e-tendering process, which is based on the Australian Standard Code of Tendering (AS 4120-1994). It is followed by identifying security threats and their countermeasure. Then, the e-tendering was modelled using misuse case approach. The model can contribute to e-tendering developers and also to other researchers or experts in the e-tendering domain.
A wireless trust model for healthcare.
Wickramasinghe, Nilmini; Misra, Santosh K
2004-01-01
In today's context of escalating costs, managed care, regulations such as the Health Insurance Portability and Accountability Act (HIPAA) and a technology savvy patient, the healthcare industry can no longer be complacent regarding embracing technologies to enable better, more effective and efficient practice management. In such an environment, many healthcare organisations are turning to m-commerce or wireless solutions. These solutions, in particular the mobile electronic patient record, have many advantages over their wired counterparts, including significant cost advantages, higher levels of physician acceptance, more functionalities as well as enabling easy accessibility to healthcare in remote geographic regions, however, they also bring with them challenges of their own. One such major challenge is security. To date, few models exist that help establish an appropriate framework, in the context of wireless in healthcare, in which to understand and evaluate all the security issues let alone facilitate the development of systematic and robust solutions. Our paper addresses this need by outlining an appropriate mobile trust model for such a scenario in healthcare organisations.
Design of real-time encryption module for secure data protection of wearable healthcare devices.
Kim, Jungchae; Lee, Byuck Jin; Yoo, Sun K
2013-01-01
Wearable devices for biomedical instrumentation could generate the medical data and transmit to a repository on cloud service through wireless networks. In this process, the private medical data will be disclosed by man in the middle attack. Thus, the archived data for healthcare services would be protected by non-standardized security policy by healthcare service provider (HSP) because HIPAA only defines the security rules. In this paper, we adopted the Advanced Encryption Standard (AES) for security framework on wearable devices, so healthcare applications using this framework could support the confidentiality easily. The framework developed as dynamic loadable module targeted for lightweight microcontroller such as msp430 within embedded operating system. The performance was shown that the module can support the real-time encryption using electrocardiogram and photoplethysmogram. In this regard, the processing load for enabling security is distributed to wearable devices, and the customized data protection method could be composed by HSP for a trusted healthcare service.
Gould, Dinah; Berridge, Emma-Jane; Kelly, Daniel
2007-01-01
The National Health Service Knowledge and Skills Framework has been introduced as part of the Agenda for Change Reforms in the United Kingdom to link pay and career progression to competency. The purpose of this paper is to consider the implications for nurses, their managers and the impact on university departments delivering continuing professional development for nurses. The new system has the potential to increase the human resources management aspect of the clinical nurse managers' role and could have legal implications, for example if practitioners perceive that their needs for continuing professional development have been overlooked to the detriment of their pay and career aspirations. The new system also has implications for providers of continuing professional development in the universities and is likely to demand closer liaison between education providers and trust staff who commission education and training. The Knowledge and Skills Framework is of interest to nurses and nurse educators internationally because the system, if effective, could be introduced elsewhere.
Scott, P J; Rigby, M; Ammenwerth, E; McNair, J Brender; Georgiou, A; Hyppönen, H; de Keizer, N; Magrabi, F; Nykänen, P; Gude, W T; Hackl, W
2017-08-01
Objectives: To set the scientific context and then suggest principles for an evidence-based approach to secondary uses of clinical data, covering both evaluation of the secondary uses of data and evaluation of health systems and services based upon secondary uses of data. Method: Working Group review of selected literature and policy approaches. Results: We present important considerations in the evaluation of secondary uses of clinical data from the angles of governance and trust, theory, semantics, and policy. We make the case for a multi-level and multi-factorial approach to the evaluation of secondary uses of clinical data and describe a methodological framework for best practice. We emphasise the importance of evaluating the governance of secondary uses of health data in maintaining trust, which is essential for such uses. We also offer examples of the re-use of routine health data to demonstrate how it can support evaluation of clinical performance and optimize health IT system design. Conclusions: Great expectations are resting upon "Big Data" and innovative analytics. However, to build and maintain public trust, improve data reliability, and assure the validity of analytic inferences, there must be independent and transparent evaluation. A mature and evidence-based approach needs not merely data science, but must be guided by the broader concerns of applied health informatics. Georg Thieme Verlag KG Stuttgart.
Homeland defense: looking back, moving forward
NASA Astrophysics Data System (ADS)
Quine, Dennis H.
2002-07-01
A concern for homeland defense has been with us since the inception of the Republic. However, it has changed in focus and emphasis depending on the nature of the threat we perceived. In the earliest decades the threat was from invasion by a Britain that still did not accept the results of the Revolutionary War. Later the focus shifted to concern about possible attack by ships, and during WW I and WW II, by submarines. With the advent of the intercontinental nuclear-armed bomber in 1950, our focus changed again. When we could be attacked by ballistic missiles after 1960, our concern focused on that threat. Now that we have seen that damaging attacks can be brought to the homeland 'under the radar screen', by terrorist operations, the focus has shifted again. We are now entering an era when we must address potential homeland attacks with weapons of mass destruction (WMD) that may be delivered by a range of means, depending on the source of the attack. In response to this full spectrum of attack modes, the U.S. has implemented a three-stage defense policy that integrates overseas 'offense' and homeland 'defense'. This framework for defense analysis and planning is likely to be with us into the indefinite future.
Nursing education in Bangladesh: a social business model.
Parfitt, Barbara; Nahar, Niru Shamsun
2016-06-01
The aim of this project was to develop a quality nurse education programme in Bangladesh. A sustainable social business financial model was used. The project is a collaboration between Glasgow Caledonian University and the Grameen Health Care Trust. It contributes to the UN development agenda, eradication of poverty, sustainability and the development of global partnerships. There is an acute shortage of nurses in Bangladesh but many young women who wish to become nurses are unable to do so. Women are discriminated against, have few leadership opportunities and poverty affects large proportions of rural society. The collaboration between the University and the Trust provides the necessary input to ensure a quality nursing programme. A business plan was developed, competency-based teaching introduced, infrastructure and financial management processes were set-up and an evaluation framework was put in place. The systems evaluation framework monitors the financial status of the College and the effects of the programme on students. The social business model, providing access to educational loans, has enabled 118 students to graduate into employment. The College is currently on target to be financially sustainable by 2016. This project outlines a business model that tackles poverty, gender equality and contributes to the human resource deficit. Young women are equipped as change agents and leaders. The social business model provides a mechanism for releasing funds for education to those who are impoverished. It provides a viable option for increasing the number of well-educated nurse leaders in developing countries. © 2016 International Council of Nurses.
Ridd, Matthew; Shaw, Alison; Lewis, Glyn; Salisbury, Chris
2009-04-01
The patient-doctor relationship is an important but poorly defined topic. In order to comprehensively assess its significance for patient care, a clearer understanding of the concept is required. To derive a conceptual framework of the factors that define patient-doctor relationships from the perspective of patients. Systematic review and thematic synthesis of qualitative studies. Medline, EMBASE, PsychINFO and Web of Science databases were searched. Studies were screened for relevance and appraised for quality. The findings were synthesised using a thematic approach. From 1985 abstracts, 11 studies from four countries were included in the final synthesis. They examined the patient-doctor relationship generally (n = 3), or in terms of loyalty (n = 3), personal care (n = 2), trust (n = 2), and continuity (n = 1). Longitudinal care (seeing the same doctor) and consultation experiences (patients' encounters with the doctor) were found to be the main processes by which patient-doctor relationships are promoted. The resulting depth of patient-doctor relationship comprises four main elements: knowledge, trust, loyalty, and regard. These elements have doctor and patient aspects to them, which may be reciprocally related. A framework is proposed that distinguishes between dynamic factors that develop or maintain the relationship, and characteristics that constitute an ongoing depth of relationship. Having identified the different elements involved, future research should examine for associations between longitudinal care, consultation experiences, and depth of patient-doctor relationship, and, in turn, their significance for patient care.
McKean, Cristina; Law, James; Laing, Karen; Cockerill, Maria; Allon-Smith, Jan; McCartney, Elspeth; Forbes, Joan
2017-07-01
Effective co-practice is essential to deliver services for children with speech, language and communication needs (SLCN). The necessary skills, knowledge and resources are distributed amongst professionals and agencies. Co-practice is complex and a number of barriers, such as 'border disputes' and poor awareness of respective priorities, have been identified. However social-relational aspects of co-practice have not been explored in sufficient depth to make recommendations for improvements in policy and practice. Here we apply social capital theory to data from practitioners: an analytical framework with the potential to move beyond descriptions of socio-cultural phenomena to inform change. Co-practice in a local authority site was examined to understand: (1) the range of social capital relations extant in the site's co-practice; (2) how these relations affected the abilities of the network to collaborate; (3) whether previously identified barriers to co-practice remain; (4) the nature of any new complexities that may have emerged; and (5) how inter-professional social capital might be fostered. A qualitative case study of SLCN provision within one local authority in England and its linked NHS partner was completed through face-to-face semi-structured interviews with professionals working with children with SLCN across the authority. Interviews, exploring barriers and facilitators to interagency working and social capital themes, were transcribed, subjected to thematic analysis using iterative methods and a thematic framework derived. We identified a number of characteristics important for the effective development of trust, reciprocity and negotiated co-practice at different levels of social capital networks: macro-service governance and policy; meso-school sites; and micro-intra-practitioner knowledge and skills. Barriers to co-practice differed from those found in earlier studies. Some negative aspects of complexity were evident, but only where networked professionalism and trust was absent between professions. Where practitioners embraced and services and systems enabled more fluid forms of collaboration, then trust and reciprocity developed. Highly collaborative forms of co-practice, inherently more complex at the service governance, macro-level, bring benefits. At the meso-level of the school and support team network there was greater capacity to individualize co-practice to the needs of the child. Capacity was increased at the micro-level of knowledge and skills to harness the overall resource distributed amongst members of the inter-professional team. The development of social capital, networks of trust across SLCN support teams, should be a priority at all levels-for practitioners, services, commissioners and schools. © 2016 Royal College of Speech and Language Therapists.
Community readiness for adopting mHealth in rural Bangladesh: A qualitative exploration.
Khatun, Fatema; Heywood, Anita E; Ray, Pradeep K; Bhuiya, Abbas; Liaw, Siaw-Teng
2016-09-01
There are increasing numbers of mHealth initiatives in middle and low income countries aimed at improving health outcomes. Bangladesh is no exception with more than 20 mobile health (mHealth) initiatives in place. A recent study in Bangladesh examined community readiness for mHealth using a framework based on quantitative data. Given the importance of a framework and the complementary role of qualitative exploration, this paper presents data from a qualitative study which complements findings from the quantitative study. The study was conducted in the Chakaria sub-district of Bangladesh. In total, 37 in-depth interviews were conducted between December 2012 and March 2013. Participants included the general public, students, community leaders, school teachers, and formal and informal healthcare providers. Thematic analysis was used to develop a logical and relevant framework to examine community readiness. As in the quantitative exploration, this study approached the investigation with four types of readiness in mind: core readiness, technological readiness, human resource readiness and motivational readiness. Community members, community leaders and healthcare providers expressed their interest in the use of mHealth in rural Bangladesh. Awareness of mHealth and its advantages was low among uneducated people. Participants who have used mHealth were attracted to the speed of access to qualified healthcare providers, time savings and low cost. Some participants did not see the value of using mobile phones for healthcare compared to a face-to-face consultation. Illiteracy, lack of English language proficiency, lack of trust and technological incapability were identified as barriers to mHealth use. However, a sense of ownership, evidence of utility, a positive attitude to the use of mHealth, and intentions towards future use of mHealth were driving forces in the adoption of mHealth services. This study re-affirmed the mHealth readiness conceptual framework with different dimensions of readiness and identified potential barriers and possible solutions for mHealth. Moving forward, emphasis should be placed on training users, providing low-cost services and improving trust of users. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
A WPS Based Architecture for Climate Data Analytic Services (CDAS) at NASA
NASA Astrophysics Data System (ADS)
Maxwell, T. P.; McInerney, M.; Duffy, D.; Carriere, L.; Potter, G. L.; Doutriaux, C.
2015-12-01
Faced with unprecedented growth in the Big Data domain of climate science, NASA has developed the Climate Data Analytic Services (CDAS) framework. This framework enables scientists to execute trusted and tested analysis operations in a high performance environment close to the massive data stores at NASA. The data is accessed in standard (NetCDF, HDF, etc.) formats in a POSIX file system and processed using trusted climate data analysis tools (ESMF, CDAT, NCO, etc.). The framework is structured as a set of interacting modules allowing maximal flexibility in deployment choices. The current set of module managers include: Staging Manager: Runs the computation locally on the WPS server or remotely using tools such as celery or SLURM. Compute Engine Manager: Runs the computation serially or distributed over nodes using a parallelization framework such as celery or spark. Decomposition Manger: Manages strategies for distributing the data over nodes. Data Manager: Handles the import of domain data from long term storage and manages the in-memory and disk-based caching architectures. Kernel manager: A kernel is an encapsulated computational unit which executes a processor's compute task. Each kernel is implemented in python exploiting existing analysis packages (e.g. CDAT) and is compatible with all CDAS compute engines and decompositions. CDAS services are accessed via a WPS API being developed in collaboration with the ESGF Compute Working Team to support server-side analytics for ESGF. The API can be executed using either direct web service calls, a python script or application, or a javascript-based web application. Client packages in python or javascript contain everything needed to make CDAS requests. The CDAS architecture brings together the tools, data storage, and high-performance computing required for timely analysis of large-scale data sets, where the data resides, to ultimately produce societal benefits. It is is currently deployed at NASA in support of the Collaborative REAnalysis Technical Environment (CREATE) project, which centralizes numerous global reanalysis datasets onto a single advanced data analytics platform. This service permits decision makers to investigate climate changes around the globe, inspect model trends, compare multiple reanalysis datasets, and variability.
The happy personality: a meta-analysis of 137 personality traits and subjective well-being.
DeNeve, K M; Cooper, H
1998-09-01
This meta-analysis used 9 literature search strategies to examine 137 distinct personality constructs as correlates of subjective well-being (SWB). Personality was found to be equally predictive of life satisfaction, happiness, and positive affect, but significantly less predictive of negative affect. The traits most closely associated with SWB were repressive-defensiveness, trust, emotional stability, locus of control-chance, desire for control, hardiness, positive affectivity, private collective self-esteem, and tension. When personality traits were grouped according to the Big Five factors, Neuroticism was the strongest predictor of life satisfaction, happiness, and negative affect. Positive affect was predicted equally well by Extraversion and Agreeableness. The relative importance of personality for predicting SWB, how personality might influence SWB, and limitations of the present review are discussed.
Toward Scalable Trustworthy Computing Using the Human-Physiology-Immunity Metaphor
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hively, Lee M; Sheldon, Frederick T
The cybersecurity landscape consists of an ad hoc patchwork of solutions. Optimal cybersecurity is difficult for various reasons: complexity, immense data and processing requirements, resource-agnostic cloud computing, practical time-space-energy constraints, inherent flaws in 'Maginot Line' defenses, and the growing number and sophistication of cyberattacks. This article defines the high-priority problems and examines the potential solution space. In that space, achieving scalable trustworthy computing and communications is possible through real-time knowledge-based decisions about cyber trust. This vision is based on the human-physiology-immunity metaphor and the human brain's ability to extract knowledge from data and information. The article outlines future steps towardmore » scalable trustworthy systems requiring a long-term commitment to solve the well-known challenges.« less
Dispositions in Teacher Education: A Look at Social Justice
ERIC Educational Resources Information Center
Villegas, Ana Maria
2007-01-01
The use of a dispositional framework in the preparation of teachers, especially one that attends to issues of social justice, has generated considerable debate of late. In this article, the author argues that assessing teacher candidates' dispositions related to social justice is both reasonable and defensible. She explains why social justice…
2008-09-30
89 Integrated Surface Ship ASW Combat System (AN/SQQ-89) SSDS Ship Self Defense System TSTS Total Ship Training System UDDI Universal Description...34ContractorOrganization" type="ContractorOrganizationType"> <xs:annotation> <xs:documentation>Identifies a contractor organization resposible for the
Consolidated Afloat Networks and Enterprise Services (CANES)
2016-03-01
Executive DoD - Department of Defense DoDAF - DoD Architecture Framework FD - Full Deployment FDD - Full Deployment Decision FY - Fiscal Year IA...Deployment Decision Jun 2015 Oct 2015 Full Deployment1 Sep 2024 Sep 2023 Memo 1/ Per the FDD ADM approved by USD(AT&L) on October 13, 2015, the FD date was
Applying Kane's Validity Framework to a Simulation Based Assessment of Clinical Competence
ERIC Educational Resources Information Center
Tavares, Walter; Brydges, Ryan; Myre, Paul; Prpic, Jason; Turner, Linda; Yelle, Richard; Huiskamp, Maud
2018-01-01
Assessment of clinical competence is complex and inference based. Trustworthy and defensible assessment processes must have favourable evidence of validity, particularly where decisions are considered high stakes. We aimed to organize, collect and interpret validity evidence for a high stakes simulation based assessment strategy for certifying…
2010-12-01
discovered that the NSA is concerned about speaker recognition being vulnerable to man- in-the-middle ( MITM ) attacks. The professional could tailor an MITM ...with the results of the test against the MITM threat. The Collective Acquisition framework comprises powerful search techniques found in the CRC
The Global Positioning System and Its Integration into College Geography Curricula.
ERIC Educational Resources Information Center
Wikle, Thomas A.; Lambert, Dean P.
1996-01-01
Introduces global positioning system (GPS) technology to nonspecialist geographers and recommends a framework for implementing GPS instructional modules in college geography courses. GPS was developed as a worldwide satellite-based system by the U.S. Department of Defense to simplify and improve military and civilian navigation and positioning.…
Adopting SCORM 1.2 Standards in a Courseware Production Environment
ERIC Educational Resources Information Center
Barker, Bradley
2004-01-01
The Sharable Content Object Reference Model (SCORM) is a technology framework for Web-based learning technology. Originated by the Department of Defense and accelerated by the Advanced Distributed Learning initiative SCORM was released in January of 2000 (ADL, 2003). The goals of SCORM are to decrease the cost of training, while increasing the…
76 FR 39411 - Self-Defense of Vessels of the United States
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-06
... by the advisory guidelines of PSA 3-09, are an adequate framework. One comment stated that PSA 3-09... community be pressured to allow deployment of weapons. One commenter suggested that the Coast Guard provide... repellants. Additionally, one comment encouraged the use of Special Forces to respond to hostage situations...
Safety Issues at the Defense Production Reactors. A Report to the U.S. Department of Energy.
ERIC Educational Resources Information Center
National Academy of Sciences - National Research Council, Washington, DC. Commission on Physical Sciences, Mathematics, and Resources.
This report provides an assessment of safety management, safety review, and safety methodology employed by the Department of Energy (DOE) and private contractors. Chapter 1, "The DOE Safety Framework," examines safety objectives for production reactors and processes to implement the objectives. Chapter 2, "Technical Issues,"…
ERIC Educational Resources Information Center
Daley, Glenn A.; Levy, Dina G.; Kaganoff, Tessa; Augustine, Catherine A.; Benjamin, Roger; Bikson, Tora K.; Gates, Susan M.; Moini, Joy S.
A study was conducted to develop tools for describing and evaluating external governance in the U.S. Department of Defense's (DoD's) multiorganizational system of education, training, and professional development. An exploratory conceptual framework and taxonomy for understanding external governance in the DoD context was developed, and the…
Implementing High School JROTC [Junior Reserve Officers Training Corps] Career Academies.
ERIC Educational Resources Information Center
Hanser, Lawrence M.; Robyn, Abby E.
In 1992, the U.S. Department of Defense and U.S. Department of Education jointly developed the Junior Reserve Officers Training Corps (JROTC) Career Academy model, which provides a framework for implementation of an innovative vocational education program designed to keep dropout-prone students in school. The program, which combines military…
A Framework for Event Prioritization in Cyber Network Defense
2014-07-15
U.S.," Reuters (US online Edition), pp. http://www.reuters.com/article/2013/11/06/net-us-usa-china- hacking - idUSBRE9A51AN20131106, 6 Nov 2013. [2...expressed individually, or as a single vector by using the magnitude of these three factors (cell J5 in Table 5
The evolutionary and ecological roots of human social organization
Kaplan, Hillard S.; Hooper, Paul L.; Gurven, Michael
2009-01-01
Social organization among human foragers is characterized by a three-generational system of resource provisioning within families, long-term pair-bonding between men and women, high levels of cooperation between kin and non-kin, and relatively egalitarian social relationships. In this paper, we suggest that these core features of human sociality result from the learning- and skill-intensive human foraging niche, which is distinguished by a late age-peak in caloric production, high complementarity between male and female inputs to offspring viability, high gains to cooperation in production and risk-reduction, and a lack of economically defensible resources. We present an explanatory framework for understanding variation in social organization across human societies, highlighting the interactive effects of four key ecological and economic variables: (i) the role of skill in resource production; (ii) the degree of complementarity in male and female inputs into production; (iii) economies of scale in cooperative production and competition; and (iv) the economic defensibility of physical inputs into production. Finally, we apply this framework to understanding variation in social and political organization across foraging, horticulturalist, pastoralist and agriculturalist societies. PMID:19805435
[In defense of society: the invention of palliative care and the production of subjectivities].
da Silva, Karen Schein; Kruse, Maria Henriqueta Luce
2012-04-01
This article is a theoretical reflection that is part of a study named Em Defesa da Sociedade: a invenção dos Cuidados Paliativos (In Defense of Society: the invention of Palliative Care). In order to articulate this discussion, we used the 2007edition of the Palliative Care Manual published by the World Health Organization (WHO), as we understand it is part of a body of work capable of producing subjectivities and ruling conduct. In this sense, we intend to understand how the discourses on palliative care are associated and promote the invention of a new subject that would work as a bio-political strategy in order to defend society. Based on the textual analysis of the discourse presented in the manual, with the help of the Cultural Studies framework and inspired by the works of Michel Foucault, we present one of the possible meanings derived from the readings of the WHO Guide. Thus, we observe the (re)organization and (re)invention of a subject that invests in the subjectivity of individuals and constitutes an actual framework that regulates and rules the population.
Visualization techniques for computer network defense
NASA Astrophysics Data System (ADS)
Beaver, Justin M.; Steed, Chad A.; Patton, Robert M.; Cui, Xiaohui; Schultz, Matthew
2011-06-01
Effective visual analysis of computer network defense (CND) information is challenging due to the volume and complexity of both the raw and analyzed network data. A typical CND is comprised of multiple niche intrusion detection tools, each of which performs network data analysis and produces a unique alerting output. The state-of-the-practice in the situational awareness of CND data is the prevalent use of custom-developed scripts by Information Technology (IT) professionals to retrieve, organize, and understand potential threat events. We propose a new visual analytics framework, called the Oak Ridge Cyber Analytics (ORCA) system, for CND data that allows an operator to interact with all detection tool outputs simultaneously. Aggregated alert events are presented in multiple coordinated views with timeline, cluster, and swarm model analysis displays. These displays are complemented with both supervised and semi-supervised machine learning classifiers. The intent of the visual analytics framework is to improve CND situational awareness, to enable an analyst to quickly navigate and analyze thousands of detected events, and to combine sophisticated data analysis techniques with interactive visualization such that patterns of anomalous activities may be more easily identified and investigated.
Smith, S; Macduff, C
2017-03-01
WHAT IS KNOWN ON THE SUBJECT?: Solution Focused Brief Therapy (SFBT) is an effective model of brief psychotherapy. Evidence suggests that nurses can be trained to deliver SFBT with only a few days training. It has been argued that SFBT reflects the core values of nursing practice, but no empirical research has been undertaken to validate this assertion. WHAT DOES THIS PAPER ADD TO EXISTING KNOWLEDGE?: This is the first time the impact of such training on nurses' sense of professional and personal identity has been explored. Drawing upon data derived from twenty interviews, this paper explores the key themes reported by nurses in relation to their personal experience of training in SFBT. This paper extends our understanding of the lived experience of mental health nurses and facilitates discussion on the preparation and practice of their role. WHAT ARE THE IMPLICATIONS FOR PRACTICE?: Training in SFBT can provide a framework for nurses to empower their clients/patients to take control of their own recovery in a shared and trusting relationship. Training in SFBT can enhance nurses' sense of trust in their clients. Training in solution-focused interactions may provide a framework for many nurses to provide the type of collaborative, patient-led care they aspire to. Introduction SFBT is a psychotherapeutic model that aims to 'build solutions' rather than 'solve problems'. It has evolved into a structured communication framework utilized across a range of disciplines, focusing on the future, as opposed to the past, and on participant's strengths and abilities, as opposed to their problems and deficits. There have been no studies exploring the experience of training in SFBT from the perspective of the nurses being trained. Aim This study sought to explore the experience of nurses who had completed a six-month training course in SFBT. Methods Using a qualitative methodology, 20 nurses who had undertaken SFBT training were interviewed at various locations across Scotland. Results Five main themes emerged from analysis of the 20 interviews. Many of the participants reported increased trust in their clients and enhanced role satisfaction. Implications for Practice Training in SFBT provides nurses with an alternative model of practice to the dominant 'medical' and 'psychological' models of contemporary practice. The experiences of the participants in this study suggest that SFBT can be a useful intervention in nursing practice and that nurses can easily incorporate SFBT into their practice. © 2017 John Wiley & Sons Ltd.
Vulnerability Assessments and Resilience Planning at Federal Sites
DOE Office of Scientific and Technical Information (OSTI.GOV)
Moss, Richard H.; Blohm, Andrew; Delgado, Alison
2016-02-01
U.S. government agencies are now directed to assess the vulnerability of their operations and facilities to climate change and to develop adaptation plans to increase their resilience. Specific guidance on methods is still evolving based on the many different available frameworks. This technical paper synthesizes lessons and insights from a series of research case studies conducted by the investigators at facilities of the U.S. Departments of Energy and Defense. The paper provides a framework of steps for climate vulnerability assessments at Federal facilities and elaborates on three sets of methods required for assessments, regardless of the detailed framework used. Inmore » a concluding section, the paper suggests a roadmap to further develop methods to support agencies in preparing for climate change.« less
76 FR 62470 - MFS Series Trust I, et al.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-07
...] MFS Series Trust I, et al.; Notice of Application September 30, 2011. AGENCY: Securities and Exchange... Series Trust I, MFS Series Trust II, MFS Series Trust III, MFS Series Trust IV, MFS Series Trust V, MFS Series Trust VI, MFS Series Trust VII, MFS Series Trust VIII, MFS Series Trust IX, MFS Series Trust X...