Sample records for social security trust

  1. Stochastic models of the Social Security trust funds.

    PubMed

    Burdick, Clark; Manchester, Joyce

    Each year in March, the Board of Trustees of the Social Security trust funds reports on the current and projected financial condition of the Social Security programs. Those programs, which pay monthly benefits to retired workers and their families, to the survivors of deceased workers, and to disabled workers and their families, are financed through the Old-Age, Survivors, and Disability Insurance (OASDI) Trust Funds. In their 2003 report, the Trustees present, for the first time, results from a stochastic model of the combined OASDI trust funds. Stochastic modeling is an important new tool for Social Security policy analysis and offers the promise of valuable new insights into the financial status of the OASDI trust funds and the effects of policy changes. The results presented in this article demonstrate that several stochastic models deliver broadly consistent results even though they use very different approaches and assumptions. However, they also show that the variation in trust fund outcomes differs as the approach and assumptions are varied. Which approach and assumptions are best suited for Social Security policy analysis remains an open question. Further research is needed before the promise of stochastic modeling is fully realized. For example, neither parameter uncertainty nor variability in ultimate assumption values is recognized explicitly in the analyses. Despite this caveat, stochastic modeling results are already shedding new light on the range and distribution of trust fund outcomes that might occur in the future.

  2. Impact of Trust on Security and Performance in Tactical Networks

    DTIC Science & Technology

    2013-06-01

    and reliability . On the other hand, in organizational theory, trust management has viewed trust as a key factor to manage relationships that flourish...environments challenges, these dynamics can hinder accurate and reliable trust evaluation of entities in the network [10], [11]. • Information Network Domain...trustworthy entities. • Social/Cognitive Network Domain: Social scientists, physiologists, and neuroscientists have studied social trust, interpersonal

  3. A Simple Exposition of the Social Security Trust Fund.

    ERIC Educational Resources Information Center

    Holahan, William L.; Schug, Mark C.

    2000-01-01

    Discusses a strategy for teaching students about how the Social Security Trust Fund works. Explains that a flow chart is presented to the students; four terms are defined (deficit, surplus, debt, and reserve); and a new graph is prepared to show the paths of these four variables. (CMK)

  4. A game-theoretical approach to multimedia social networks security.

    PubMed

    Liu, Enqiang; Liu, Zengliang; Shao, Fei; Zhang, Zhiyong

    2014-01-01

    The contents access and sharing in multimedia social networks (MSNs) mainly rely on access control models and mechanisms. Simple adoptions of security policies in the traditional access control model cannot effectively establish a trust relationship among parties. This paper proposed a novel two-party trust architecture (TPTA) to apply in a generic MSN scenario. According to the architecture, security policies are adopted through game-theoretic analyses and decisions. Based on formalized utilities of security policies and security rules, the choice of security policies in content access is described as a game between the content provider and the content requester. By the game method for the combination of security policies utility and its influences on each party's benefits, the Nash equilibrium is achieved, that is, an optimal and stable combination of security policies, to establish and enhance trust among stakeholders.

  5. A Game-Theoretical Approach to Multimedia Social Networks Security

    PubMed Central

    Liu, Enqiang; Liu, Zengliang; Shao, Fei; Zhang, Zhiyong

    2014-01-01

    The contents access and sharing in multimedia social networks (MSNs) mainly rely on access control models and mechanisms. Simple adoptions of security policies in the traditional access control model cannot effectively establish a trust relationship among parties. This paper proposed a novel two-party trust architecture (TPTA) to apply in a generic MSN scenario. According to the architecture, security policies are adopted through game-theoretic analyses and decisions. Based on formalized utilities of security policies and security rules, the choice of security policies in content access is described as a game between the content provider and the content requester. By the game method for the combination of security policies utility and its influences on each party's benefits, the Nash equilibrium is achieved, that is, an optimal and stable combination of security policies, to establish and enhance trust among stakeholders. PMID:24977226

  6. Institutional trust in the national social security and municipal healthcare systems for the elderly in Japan.

    PubMed

    Murayama, Hiroshi; Taguchi, Atsuko; Ryu, Shuhei; Nagata, Satoko; Murashima, Sachiyo

    2012-09-01

    Japanese social security systems and institutions for the elderly, as well as the general attitude toward elderly care services among the Japanese population, have been undergoing a dramatic change. By examining the association between institutional trust, which is a representative element of social capital, and anxiety regarding receiving elderly care, we can uncover clues toward building a more robust social security system for the elderly. This study examines the relationship between institutional trust, in the national social security and municipal healthcare systems for the elderly, and anxiety with respect to receiving elderly care among the general Japanese population. A cross-sectional survey was conducted using a self-administered questionnaire that was returned by mail in January and February 2005. The target population was 4735 community residents aged 20-75 years, who lived in the city of Koka, Shiga, Japan. A total of 2264 questionnaires were included in the analysis. A binominal logistic regression analysis showed that responses of 'trust' [odds ratio (OR): 2.09, 95% confidence interval (95% CI): 1.01-4.30] and 'strongly trust' (OR: 3.80, 95% CI: 1.55-9.31) for the national system were associated with not having anxiety regarding elderly care, compared with the reference category of feeling strongly distrust. However, trust in the municipal system showed no association with this anxiety. These results indicate the importance of developing strategies to increase a common trust in the national care services for the elderly to reduce the anxiety people feel regarding whether they will be able to receive elderly care when required.

  7. Does Variation in the Extent of Generalized Trust, Individual Education and Extensiveness of Social Security Policies Matter for Maximization of Subjective Well-Being?

    ERIC Educational Resources Information Center

    Valeeva, Rania F.

    2016-01-01

    In this paper, I examine whether generalized trust and education, as well as social security policies of welfare state institutions matter for cross-national differences in subjective well-being (SWB), because knowledge on this issue is still lacking. For this purpose I integrated the insights of two sociological theories: Social Function…

  8. A Trust That Can't Be Breached.

    ERIC Educational Resources Information Center

    Penning, Nick

    1990-01-01

    Children's Investment Trust is a proposed trust fund for children's services (nutrition, health, education, and social services) similar in design to Social Security fund. The trust would be funded by a small, progressive payroll tax levied on both employer and employee on wages greater than $5 per hour. The tax would raise $25 billion more every…

  9. Should Medicare's trust fund be removed from the budget?

    PubMed

    Burke, M

    1990-03-05

    The recent proposal to to roll back the recent increase in the Social Security payroll tax has some health care executives worried. The Hospital Insurance Trust Fund is closely linked to the Social Security fund, and what affects one will surely affect the other. However, analysts say that the question of whether the trust funds should or should not be part of the federal budget masks a much bigger question. Are the Administration, Congress, and the American public ready to raise taxes to adequately fund Medicare?

  10. 77 FR 18277 - Domini Social Investment Trust and Domini Social Investments LLC; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-27

    ... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 29984; 812-13971] Domini Social Investment Trust and Domini Social Investments LLC; Notice of Application March 21, 2012. AGENCY... the Investment Company Act of 1940 (``Act'') for an exemption from section 15(a) of the Act and rule...

  11. Deafblindness, ontological security, and social recognition.

    PubMed

    Danermark, Berth D; Möller, Kerstin

    2008-11-01

    Trust, ontological security, and social recognition are discussed in relation to self-identity among people with acquired deafblindness. To date the phenomenon has not been elaborated in the context of deafblindness. When a person with deafblindness interacts with the social and material environment, the reliability, constancy, and predictability of his or her relations is crucial for maintaining or achieving ontological security or a general and fairly persistent feeling of well-being. When these relations fundamentally change, the impact on ontological security will be very negative. The construction of social recognition through the interaction between the self and others is embodied across three dimensions: at the individual level, at the legal systems level, and at the normative or value level. The relationship between trust and ontological security on the one hand and social recognition on the other hand is discussed. It is argued that these basic processes affecting personality development have to be identified and acknowledged in the interactions people with deafblindness experience. Some implications for the rehabilitation of people with acquired deafblindness are presented and illustrated.

  12. Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing

    DTIC Science & Technology

    2012-09-28

    population of misbehaving nodes or evolving hostility or social relations such that an application (e.g., secure routing) built on top of trust...optimization in DTNs in response to dynamically changing conditions such as increasing population of misbehaving nodes. The design part addresses the...The rest of the paper is organized as follows. In Section 2, we survey existing trust management protocols and approaches to deal with misbehaved

  13. Social Security's Surpluses: An Update.

    ERIC Educational Resources Information Center

    Dattalo, Patrick

    1992-01-01

    Notes that deliberation over how to manage social security's large trust fund balances is expected to continue. Urges social workers to participate in this debate because surpluses have implications for increasing quality of life of low- and moderate-income families. Continues earlier discussion (Dattalo, 1990) by assessing two recent proposals…

  14. 12 CFR Appendix C to Part 360 - Deposit File Structure

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... social security number (“SSN”). For business accounts it would be the federal tax identification number... tax identification number. Possible values are: • S = Social Security Number. • T = Federal Tax..., charitable, social or other non-commercial purpose. Revocable Trusts: Including PODs and formal revocable...

  15. Prediction-error in the context of real social relationships modulates reward system activity.

    PubMed

    Poore, Joshua C; Pfeifer, Jennifer H; Berkman, Elliot T; Inagaki, Tristen K; Welborn, Benjamin L; Lieberman, Matthew D

    2012-01-01

    The human reward system is sensitive to both social (e.g., validation) and non-social rewards (e.g., money) and is likely integral for relationship development and reputation building. However, data is sparse on the question of whether implicit social reward processing meaningfully contributes to explicit social representations such as trust and attachment security in pre-existing relationships. This event-related fMRI experiment examined reward system prediction-error activity in response to a potent social reward-social validation-and this activity's relation to both attachment security and trust in the context of real romantic relationships. During the experiment, participants' expectations for their romantic partners' positive regard of them were confirmed (validated) or violated, in either positive or negative directions. Primary analyses were conducted using predefined regions of interest, the locations of which were taken from previously published research. Results indicate that activity for mid-brain and striatal reward system regions of interest was modulated by social reward expectation violation in ways consistent with prior research on reward prediction-error. Additionally, activity in the striatum during viewing of disconfirmatory information was associated with both increases in post-scan reports of attachment anxiety and decreases in post-scan trust, a finding that follows directly from representational models of attachment and trust.

  16. Social Milieu Oriented Routing: A New Dimension to Enhance Network Security in WSNs.

    PubMed

    Liu, Lianggui; Chen, Li; Jia, Huiling

    2016-02-19

    In large-scale wireless sensor networks (WSNs), in order to enhance network security, it is crucial for a trustor node to perform social milieu oriented routing to a target a trustee node to carry out trust evaluation. This challenging social milieu oriented routing with more than one end-to-end Quality of Trust (QoT) constraint has proved to be NP-complete. Heuristic algorithms with polynomial and pseudo-polynomial-time complexities are often used to deal with this challenging problem. However, existing solutions cannot guarantee the efficiency of searching; that is, they can hardly avoid obtaining partial optimal solutions during a searching process. Quantum annealing (QA) uses delocalization and tunneling to avoid falling into local minima without sacrificing execution time. This has been proven a promising way to many optimization problems in recently published literatures. In this paper, for the first time, with the help of a novel approach, that is, configuration path-integral Monte Carlo (CPIMC) simulations, a QA-based optimal social trust path (QA_OSTP) selection algorithm is applied to the extraction of the optimal social trust path in large-scale WSNs. Extensive experiments have been conducted, and the experiment results demonstrate that QA_OSTP outperforms its heuristic opponents.

  17. Leveraging Social Links for Trust and Privacy in Networks

    NASA Astrophysics Data System (ADS)

    Cutillo, Leucio Antonio; Molva, Refik; Strufe, Thorsten

    Existing on-line social networks (OSN) such as Facebook suffer from several weaknesses regarding privacy and security due to their inherent handling of personal data. As pointed out in [4], a preliminary analysis of existing OSNs shows that they are subject to a number of vulnerabilities, ranging from cloning legitimate users to sybil attacks through privacy violations. Starting from these OSN vulnerabilities as the first step of a broader research activity, we came up with a new approach that is very promising in re-visiting security and privacy problems in distributed systems and networks. We suggest a solution that both aims at avoiding any centralized control and leverages on the real life trust between users, that is part of the social network application itself. An anonymization technique based on multi-hop routing among trusted nodes guarantees privacy in data access and, generally speaking, in all the OSN operations.

  18. 41 CFR 102-37.40 - What type of surplus property is available for donation?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... working capital funds established under 10 U.S.C. 2208 or in similar funds) is available for donation to... with trust funds (e.g., Social Security Trust Funds). (c) Non-appropriated fund property. (d) Naval...

  19. 20 CFR 435.37 - Property trust relationship.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 20 Employees' Benefits 2 2011-04-01 2011-04-01 false Property trust relationship. 435.37 Section 435.37 Employees' Benefits SOCIAL SECURITY ADMINISTRATION UNIFORM ADMINISTRATIVE REQUIREMENTS FOR... relationship. Real property, equipment, intangible property and debt instruments that are acquired or improved...

  20. 41 CFR 102-37.40 - What type of surplus property is available for donation?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... working capital funds established under 10 U.S.C. 2208 or in similar funds) is available for donation to... with trust funds (e.g., Social Security Trust Funds). (c) Non-appropriated fund property. (d) Naval...

  1. Financial status of the Social Security Program.

    PubMed

    Myers, R J

    1983-03-01

    This study, originally a background paper for the National Commission on Social Security Reform and published as Appendix J in the Commission's Report, outlines the dimensions of the financing problem the Commission addressed. Prepared by Robert J. Myers, the Commission's Executive Director and a former Deputy Commissioner and Chief Actuary of the Social Security Administration, it discusses, in turn, the operational and funding procedures of the Social Security Trust Funds, the measures developed to determine the financial soundness of the program, and the financial status of each trust fund in the past, at present, and projected for the future. The author shows how program funding was gradually shifted from a modified-reserve to a pay-as-you-go basis and how the balance between income and outgo was disrupted by adverse economic conditions during 1979-81, when prices rose more rapidly than wages and unemployment was substantially higher than anticipated. Using several different economic assumptions, Myers estimates how extensive the deficits of the program could be over the short run (the remainder of the 1980's) and over the long term (the period 1982-2055).

  2. Career Obsolescence and Social Security: Emerging Education Policy Issues in Law.

    ERIC Educational Resources Information Center

    Sandow, Stuart A.

    This document is the second in a series of studies designed to examine the legal aspects of various potential educational problems in our society. This particular study deals with the case of a highly trained aerospace technician who sues the social security trust for loan benefits, arguing that he is economically disabled and has been retired by…

  3. Popular opinion on tax cuts and Social Security.

    PubMed

    Teixeira, R

    2000-01-01

    A review of recent opinion polls reveals the U.S. public's views on budget priorities and Social Security. The public wants more spending on Social Security, Medicare, and other domestic programs, chiefly education and health care, and prefers these spending priorities--by up to a 70 percent majority--to paying down the national debt and cutting taxes. The public supports the Social Security system but doubts it can continue to deliver the goods. To remedy this problem, it is willing not only to use part of the surplus but to raise the cap on payroll taxes. The public does not support benefit cuts or an increase in the retirement age. And the public remains unsure to hostile about the role of the stock market, whether in individual accounts or in the Social Security trust fund.

  4. Public assessment of new surveillance-oriented security technologies: Beyond the trade-off between privacy and security.

    PubMed

    Pavone, Vincenzo; Esposti, Sara Degli

    2012-07-01

    As surveillance-oriented security technologies (SOSTs) are considered security enhancing but also privacy infringing, citizens are expected to trade part of their privacy for higher security. Drawing from the PRISE project, this study casts some light on how citizens actually assess SOSTs through a combined analysis of focus groups and survey data. First, the outcomes suggest that people did not assess SOSTs in abstract terms but in relation to the specific institutional and social context of implementation. Second, from this embedded viewpoint, citizens either expressed concern about government's surveillance intentions and considered SOSTs mainly as privacy infringing, or trusted political institutions and believed that SOSTs effectively enhanced their security. None of them, however, seemed to trade privacy for security because concerned citizens saw their privacy being infringed without having their security enhanced, whilst trusting citizens saw their security being increased without their privacy being affected.

  5. Climbing social media in medicine's hierarchy of needs.

    PubMed

    Chretien, Katherine C; Kind, Terry

    2014-10-01

    The social media and medicine landscape is evolving rapidly. Early research, social media policies, and educational efforts focused on risk avoidance, while more current efforts have encouraged reflection and explored opportunities. This trajectory has affirmed physicians' professional commitment to maintaining public trust in the face of new challenges in the digital age. In this Commentary, the authors propose viewing physicians' social media use as a hierarchy of needs, similar to Maslow's psychological theory which posits that more basic levels of needs must be met before higher, aspirational levels can be fully attained. The three levels in the social media in medicine's hierarchy of needs are Security, Reflection, and Discovery. Critical to this model is respecting the essential need for Security in order to move towards Reflection and into Discovery. The social media in medicine hierarchy of needs pyramid rests on a foundation of Public Trust. How physicians as a profession have responded to past--and continue to respond to present and future--social media challenges to professionalism reveals what matters most: maintaining public trust and honoring the physicians' contract with society. A victory for online professionalism would be providing trainees with the tools and guidance needed to ascend to Discovery, while ensuring that their basic social media needs are first met. To do this, physician educators need to continue increasing trainees' awareness through designing relevant curricula, encouraging reflection, and providing positive role modeling and effective mentorship.

  6. Current development in Social Security financing.

    PubMed

    Bartlett, D K

    1980-09-01

    The current financial outlook for the old-age, survivors, disability, and health insurance (OASDHI) program indicates several problems. During 1980-84, income and outgo for the OASDI and hospital insurance (HI) trust funds combined are roughly in balance, according to the annual report of the Board of Trustees. The OSI program, however, is running out of funds as automatic benefit increases exceed the growth in payroll tax revenues. Clearly, additional financing will be needed throughout the 1980's. Funds now earmarked for the DI and HI trust funds could serve this purpose, although more short-range financing will be needed if real wages continue to show losses instead of the usual gains. The 1977 amendments that strengthened social security financing provided only a thin margin of safety against unfavorable experience during the early 1980's. The short-range economic picture has darkened considerably since 1977, with adverse consequences for social security financing. Only the DI experience has improved. Based on tax rates in the present law, a large buildup of OASDI trust funds is expected over the next 25 years. HI financing, however, is projected to become inadequate after 1990. Projections over the next 75 years indicate severe financing problems for the OASDI program early in the 21st centruy, as the aged population grows relative to the work force.

  7. Trust at zero acquaintance: more a matter of respect than expectation of reward.

    PubMed

    Dunning, David; Anderson, Joanna E; Schlösser, Thomas; Ehlebracht, Daniel; Fetchenhauer, Detlef

    2014-07-01

    Trust is essential for a secure and flourishing social life, but many economic and philosophical approaches argue that rational people should never extend it, in particular to strangers they will never encounter again. Emerging data on the trust game, a laboratory economic exchange, suggests that people trust strangers excessively (i.e., far more than their tolerance for risk and cynical views of their peers should allow). What produces this puzzling "excess" of trust? We argue that people trust due to a norm mandating that they show respect for the other person's character, presuming the other person has sufficient integrity and goodwill even if they do not believe it privately. Six studies provided converging evidence that decisions to trust follow the logic of norms. Trusting others is what people think they should do, and the emotions associated with fulfilling a social duty or responsibility (e.g., guilt, anxiety) account for at least a significant proportion of the excessive trust observed. Regarding the specific norm in play, trust rates collapse when respect for the other person's character is eliminated as an issue.

  8. Toward a Trust Evaluation Mechanism in the Social Internet of Things.

    PubMed

    Truong, Nguyen Binh; Lee, Hyunwoo; Askwith, Bob; Lee, Gyu Myoung

    2017-06-09

    In the blooming era of the Internet of Things (IoT), trust has been accepted as a vital factor for provisioning secure, reliable, seamless communications and services. However, a large number of challenges still remain unsolved due to the ambiguity of the concept of trust as well as the variety of divergent trust models in different contexts. In this research, we augment the trust concept, the trust definition and provide a general conceptual model in the context of the Social IoT (SIoT) environment by breaking down all attributes influencing trust. Then, we propose a trust evaluation model called REK, comprised of the triad of trust indicators (TIs) Reputation, Experience and Knowledge. The REK model covers multi-dimensional aspects of trust by incorporating heterogeneous information from direct observation (as Knowledge TI), personal experiences (as Experience TI) to global opinions (as Reputation TI). The associated evaluation models for the three TIs are also proposed and provisioned. We then come up with an aggregation mechanism for deriving trust values as the final outcome of the REK evaluation model. We believe this article offers better understandings on trust as well as provides several prospective approaches for the trust evaluation in the SIoT environment.

  9. Toward a Trust Evaluation Mechanism in the Social Internet of Things

    PubMed Central

    Truong, Nguyen Binh; Lee, Hyunwoo; Askwith, Bob; Lee, Gyu Myoung

    2017-01-01

    In the blooming era of the Internet of Things (IoT), trust has been accepted as a vital factor for provisioning secure, reliable, seamless communications and services. However, a large number of challenges still remain unsolved due to the ambiguity of the concept of trust as well as the variety of divergent trust models in different contexts. In this research, we augment the trust concept, the trust definition and provide a general conceptual model in the context of the Social IoT (SIoT) environment by breaking down all attributes influencing trust. Then, we propose a trust evaluation model called REK, comprised of the triad of trust indicators (TIs) Reputation, Experience and Knowledge. The REK model covers multi-dimensional aspects of trust by incorporating heterogeneous information from direct observation (as Knowledge TI), personal experiences (as Experience TI) to global opinions (as Reputation TI). The associated evaluation models for the three TIs are also proposed and provisioned. We then come up with an aggregation mechanism for deriving trust values as the final outcome of the REK evaluation model. We believe this article offers better understandings on trust as well as provides several prospective approaches for the trust evaluation in the SIoT environment. PMID:28598401

  10. Application of the AHP method in modeling the trust and reputation of software agents

    NASA Astrophysics Data System (ADS)

    Zytniewski, Mariusz; Klementa, Marek; Skorupka, Dariusz; Stanek, Stanislaw; Duchaczek, Artur

    2016-06-01

    Given the unique characteristics of cyberspace and, in particular, the number of inherent security threats, communication between software agents becomes a highly complex issue and a major challenge that, on the one hand, needs to be continuously monitored and, on the other, awaits new solutions addressing its vulnerabilities. An approach that has recently come into view mimics mechanisms typical of social systems and is based on trust and reputation that assist agents in deciding which other agents to interact with. The paper offers an enhancement to existing trust and reputation models, involving the application of the AHP method that is widely used for decision support in social systems, notably for risks analysis. To this end, it is proposed to expand the underlying conceptual basis by including such notions as self-trust and social trust, and to apply these to software agents. The discussion is concluded with an account of an experiment aimed at testing the effectiveness of the proposed solution.

  11. Effect of Incest on Self and Social Functioning: A Developmental Psychopathology Perspective.

    ERIC Educational Resources Information Center

    Cole, Pamela M.; Putnam, Frank W.

    1992-01-01

    Proposes model based on developmental psychopathology for conceptualizing effects of child sexual abuse. Argues that incest has negative effects on self and social functioning, by jeopardizing self-definition and integration, self-regulatory processes, and sense of security and trust in relationships. Reviews self and social development…

  12. 77 FR 37714 - Comment Request for Information Collection for Unemployment Insurance (UI) Trust Fund Activity...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-22

    ... Collection for Unemployment Insurance (UI) Trust Fund Activity Reports, Extension Without Revisions AGENCY... Section 303(a)(4) of the Social Security Act (SSA) and Section 3304(a)(3) of the Federal Unemployment Tax Act (FUTA) require that all monies received in the unemployment fund of a state be paid immediately to...

  13. The 2014 Long-Term Budget Outlook

    DTIC Science & Technology

    2014-07-01

    estimated to be necessary to achieve one of those goals are conceptually similar to the estimated actuarial imbalance (that is, a negative actuarial ...interest rates and some other changes have led CBO to estimate a larger fiscal gap and a greater actuarial deficit for Social Security. (The key revisions...financing in the estimate.  The actuarial shortfall for the Social Security trust funds is estimated to be significantly larger this year than was

  14. 78 FR 26727 - Pension Benefit Statements

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-08

    ... Consensus Estimate for the Equity Premium by Academic Financial Economists in December 2008, Social Sciences... Labor Statistics. Furthermore, the trustees of the Social Security Trust Fund assume that cost of living... either monthly or annual payments. The second method is the annuitization approach. This approach, for...

  15. Trust-Based Cooperative Social System Applied to a Carpooling Platform for Smartphones.

    PubMed

    Caballero-Gil, Cándido; Caballero-Gil, Pino; Molina-Gil, Jezabel; Martín-Fernández, Francisco; Loia, Vincenzo

    2017-01-27

    One of the worst traffic problems today is the existence of huge traffic jams in almost any big city, produced by the large number of commuters using private cars. This problem has led to an increase in research on the optimization of vehicle occupancy in urban areas as this would help to solve the problem that most cars are occupied by single passengers. The solution of sharing the available seats in cars, known as carpooling, is already available in major cities around the world. However, carpooling is still not considered a safe and reliable solution for many users. With the widespread use of mobile technology and social networks, it is possible to create a trust-based platform to promote carpooling through a convenient, fast and secure system. The main objective of this work is the design and implementation of a carpool system that improves some important aspects of previous systems, focusing on trust between users, and on the security of the system. The proposed system guarantees user privacy and measures trust levels through a new reputation algorithm. In addition to this, the proposal has been developed as a mobile application for devices using the Android Open Source Project.

  16. Trust-Based Cooperative Social System Applied to a Carpooling Platform for Smartphones

    PubMed Central

    Caballero-Gil, Cándido; Caballero-Gil, Pino; Molina-Gil, Jezabel; Martín-Fernández, Francisco; Loia, Vincenzo

    2017-01-01

    One of the worst traffic problems today is the existence of huge traffic jams in almost any big city, produced by the large number of commuters using private cars. This problem has led to an increase in research on the optimization of vehicle occupancy in urban areas as this would help to solve the problem that most cars are occupied by single passengers. The solution of sharing the available seats in cars, known as carpooling, is already available in major cities around the world. However, carpooling is still not considered a safe and reliable solution for many users. With the widespread use of mobile technology and social networks, it is possible to create a trust-based platform to promote carpooling through a convenient, fast and secure system. The main objective of this work is the design and implementation of a carpool system that improves some important aspects of previous systems, focusing on trust between users, and on the security of the system. The proposed system guarantees user privacy and measures trust levels through a new reputation algorithm. In addition to this, the proposal has been developed as a mobile application for devices using the Android Open Source Project. PMID:28134803

  17. Statistical security for Social Security.

    PubMed

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  18. Regulatory focus and generalized trust: the impact of prevention-focused self-regulation on trusting others.

    PubMed

    Keller, Johannes; Mayo, Ruth; Greifeneder, Rainer; Pfattheicher, Stefan

    2015-01-01

    The current research suggests that taking self-regulatory mechanisms into account provides insights regarding individuals' responses to threats in social interactions. In general, based on the notion that a prevention-focused orientation of self-regulation is associated with a need for security and a vigilant tendency to avoid losses and other types of negative events we advocate that a prevention-focused orientation, both as a disposition as well as a situationally induced state, lowers generalized trust, thus hindering cooperation within social interactions that entail threats. Specifically, we found that the more individuals' habitual self-regulatory orientation is dominated by a prevention focus, the less likely they are to score high on a self-report measure of generalized trust (Study 1), and to express trust in a trust game paradigm as manifested in lower sums of transferred money (Studies 2 and 3). Similar findings were found when prevention focus was situationally manipulated (Study 4). Finally, one possible factor underlying the impact of prevention-focused self-regulation on generalized trust was demonstrated as individuals with a special sensitivity to negative information were significantly affected by a subtle prevention focus manipulation (versus control condition) in that they reacted with reduced trust in the trust game (Study 5). In sum, the current findings document the crucial relevance of self-regulatory orientations as conceptualized in regulatory focus theory regarding generalized trust and responses to threats within a social interaction. The theoretical and applied implications of the findings are discussed.

  19. 20 CFR 404.1052 - Payments from or to certain tax-exempt trusts or payments under or into certain annuity plans.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Payments from or to certain tax-exempt trusts or payments under or into certain annuity plans. 404.1052 Section 404.1052 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND DISABILITY INSURANCE (1950- ) Employment, Wages, Self-Employment, and Self-Employment Incom...

  20. Hypersensitivity to Contingent Behavior in Paranoia: A New Virtual Reality Paradigm.

    PubMed

    Fornells-Ambrojo, Miriam; Elenbaas, Maaike; Barker, Chris; Swapp, David; Navarro, Xavier; Rovira, Aitor; Sanahuja, Josep Maria Tomàs; Slater, Mel

    2016-02-01

    Contingency in interpersonal relationships is associated with the development of secure attachment and trust, whereas paranoia arises from the overattribution of negative intentions. We used a new virtual reality paradigm to experimentally investigate the impact of contingent behavior on trust along the paranoia continuum. Sixty-one healthy participants were randomly allocated to have a social interaction with a pleasant virtual human (avatar) programmed to be highly responsive or not (high/low contingency). Perceived trustworthiness and trusting behavior were assessed alongside control variables attachment and anxiety. Higher paranoia and dismissive attachment were associated with larger interpersonal distances. Unexpectedly, extremely paranoid individuals experienced the highly contingent avatar as more trustworthy than their low contingency counterpart. Higher dismissive attachment was also associated with more subjective trust in both conditions. Extreme paranoia is associated with hypersensitivity to noncontingent behavior, which might explain experiences of mistrust when others are not highly responsive in everyday social situations.

  1. The Challenge of Financing Higher Education and the Role of Student Loans Scheme: An Analysis of the Student Loan Trust Fund (SLTF) in Ghana

    ERIC Educational Resources Information Center

    Atuahene, Francis

    2008-01-01

    Student loans program is one of the most controversial phenomena in financing higher education in Ghana, but its importance as a cost sharing mechanism is incontestable. This paper describes the challenge of financing higher education in Ghana. It provides a critique of the Social Security and National Insurance Trust (SSNIT) Student Loans Scheme,…

  2. Behavioral analysis of use personal service e-balance Indonesian social security

    NASA Astrophysics Data System (ADS)

    Wang, Gunawan; Fitriani, Novi; Nurul Fajar, Ahmad

    2017-09-01

    Indonesian Social Security is the one of the government agencies that is trusted to organize social security. With help of Information technology that growing these day, Indonesian Social Security is also developing E-Balance application, where previously all activities for checking balance is done by giving their slip details through the nearest branch to be distributed to each company. So far there is no research that reviewing e-Balance. Hence, the authors is interested to do research related factors that influence the behavior of the use of E-Balance Indonesian Social Security in the Jakarta area and model that can describe those factors Authors distributing questioners to 193 respondents and perform data processing. The result of this study is to know the factors that influence the behavior of use Personal Service E-Balance Indonesian Social Security and model that can describe those factors. The result shows that UTAUT 2 model is not match with this research and need to be enhanced. After enhancement, there are 3 factors that being significant. Such as Behavioral Intention, Effort Expectancy and Social Influence while the others are not supported and need to be customize.

  3. Social Security Is Fair to All Generations: Demystifying the Trust Fund, Solvency, and the Promise to Younger Americans.

    PubMed

    Buchanan, Neil H

    The Social Security system has come under attack for having illegitimately transferred wealth from younger generations to the Baby Boom generation. This attack is unfounded, because it fails to understand how the system was altered in order to force the Baby Boomers to finance their own benefits in retirement. Any challenges that Social Security now faces are not caused by the pay-as-you-go structure of the system but by Baby Boomers' other policy errors, especially the emergence of extreme economic inequality since 1980. Attempting to fix the wrong problem all but guarantees a solution that will make matters worse. Generational justice and distributive justice go hand in hand.

  4. 77 FR 42017 - AmericaFirst Quantitative Trust and AmericaFirst Securities, Inc.; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-17

    ... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 30134; 812-14005] AmericaFirst Quantitative Trust and AmericaFirst Securities, Inc.; Notice of Application July 10, 2012. AGENCY...: AmericaFirst Quantitative Trust (the ``AmericaFirst Trust'') and AmericaFirst Securities, Inc. (``AFSI...

  5. Design for Security Workshop

    DTIC Science & Technology

    2014-09-30

    fingerprint sensor etc.  Secure application execution  Trust established outwards  With normal world apps  With internet/cloud apps...Xilinx Zynq Security Components and Capabilities © Copyright 2014 Xilinx . Security Features Inherited from FPGAs Zynq Secure Boot TrustZone...2014 Xilinx . Security Features Inherited from FPGAs Zynq Secure Boot TrustZone Integration 4 Agenda © Copyright 2014 Xilinx . Device DNA and User

  6. BIOS Security Analysis and a Kind of Trusted BIOS

    NASA Astrophysics Data System (ADS)

    Zhou, Zhenliu; Xu, Rongsheng

    The BIOS's security threats to computer system are analyzed and security requirements for firmware BIOS are summarized in this paper. Through discussion about TCG's trust transitivity, a new approach about CRTM implementation based on BIOS is developed. In this paper, we also put forward a new trusted BIOS architecture-UTBIOS which is built on Intel Framework for EFI/UEFI. The trustworthiness of UTBIOS is based on trusted hardware TPM. In UTBIOS, trust encapsulation and trust measurement are used to construct pre-OS trust chain. Performance of trust measurement is also analyzed in the end.

  7. The growth in Social Security benefits among the retirement-age population from increases in the cap on covered earnings.

    PubMed

    Gustman, Alan L; Steinmeier, Thomas L; Tabatabai, Nahid

    2012-01-01

    Analysts have proposed raising the maximum level of earnings subject to the Social Security payroll tax (the "tax max") to improve long-term Social Security Trust Fund solvency. This article investigates how raising the tax max leads to the "leakage" of portions of the additional revenue into higher benefit payments. Using Health and Retirement Study data matched to Social Security earnings records, we compare historical payroll tax payments and benefit amounts for Early Boomers (born 1948-1953) with tax and benefit simulations had they been subject to the tax max (adjusted for wage growth) faced by cohorts 12 and 24 years older. We find that 43.2 percent of the additional payroll tax revenue attributable to tax max increases affecting Early Boomers relative to taxes paid by the cohort 12 years older leaked into higher benefits. For Early Boomers relative to those 24 years older, we find 53.5 percent leakage.

  8. 78 FR 53509 - Self-Regulatory Organizations; BATS Exchange, Inc.; Order Approving a Proposed Rule Change, as...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-29

    ... for the following securities: Index-Linked Exchangeable Notes; Equity Gold Shares; Trust Certificates; Commodity-Based Trust Shares; Currency Trust Shares; Commodity Index Trust Shares; Commodity Futures Trust Shares; Partnership Units; Trust Units; Managed Trust Securities; and Currency Warrants (together with...

  9. Examining Trust, Forgiveness and Regret as Computational Concepts

    NASA Astrophysics Data System (ADS)

    Marsh, Stephen; Briggs, Pamela

    The study of trust has advanced tremendously in recent years, to the extent that the goal of a more unified formalisation of the concept is becoming feasible. To that end, we have begun to examine the closely related concepts of regret and forgiveness and their relationship to trust and its siblings. The resultant formalisation allows computational tractability in, for instance, artificial agents. Moreover, regret and forgiveness, when allied to trust, are very powerful tools in the Ambient Intelligence (AmI) security area, especially where Human Computer Interaction and concrete human understanding are key. This paper introduces the concepts of regret and forgiveness, exploring them from social psychological as well as a computational viewpoint, and presents an extension to Marsh's original trust formalisation that takes them into account. It discusses and explores work in the AmI environment, and further potential applications.

  10. Safety and privacy outcomes from a moderated online social therapy for young people with first-episode psychosis.

    PubMed

    Gleeson, John F; Lederman, Reeva; Wadley, Greg; Bendall, Sarah; McGorry, Patrick D; Alvarez-Jimenez, Mario

    2014-04-01

    Internet-based treatments for early psychosis offer considerable promise, but safety and security need to be established. This study pilot tested Horyzons, a novel online treatment application that integrates purpose-built moderated social networking with psychoeducation for recovery from early psychosis. Safety, privacy, and security were evaluated during a one-month single-group trial with 20 young consumers recovering from early psychosis who were recruited in Melbourne, Australia. Known clinical risk factors informed the safety protocol. Safety, privacy, and security were evaluated with respect to relapse and self-harm, users' perceptions of safety and privacy, and activity using Horyzons. No clinical or security problems with use of Horyzons were noted. Participants described feeling safe and trusting Horyzons. Private moderated online social networking combined with psychoeducation was a safe and secure therapeutic environment for consumers recovering from a first episode of psychosis. Testing the intervention in a randomized controlled trial is warranted.

  11. Implicit Trust between the Uyghur and the Han in Xinjiang, China

    PubMed Central

    Li, Xueting; Fang, Huizhen; Yang, Shengmin; Liu, Jia

    2013-01-01

    Trust is a vital lubricant that increases the sense of security in social interactions. In this study, we investigated the intergroup trust between the Uyghur and the Han, the two largest ethnic groups in Xinjiang, China, with a Go/No-Go Association Task. Specifically, we instructed Uyghur and Han participants to respond to ethnic faces (Uyghur vs. Han) and trust/distrust words and measured the strength of the automatic associations between the faces and words for both in-group and out-group pairs. As expected, both ethnic groups showed implicit in-group trust and out-group distrust, but the Han group demonstrated stronger in-group trust and out-group distrust toward the Uyghur than the Uyghur group toward the Han. However, the magnitude of distrust of the Han toward the Uyghur was small to medium as compared with that reported by other intergroup relationship research. In addition, participant geographic location was associated with out-group distrust. These findings offer implications for developing effective strategies to encourage trust between conflicting groups. PMID:23977155

  12. Modelling Public Security Operations: Evaluation of the Holistic Security Ecosystem (HSE) Proof-of-Concept

    DTIC Science & Technology

    2012-12-01

    base pour construire de telles simulations et pourrait être adaptée à d’autres expériences à un coût relativement bas. Perspectives : Les leçons...systems (such as culture , [ Culture ]). This seven-dimensional framework advocates that systems be viewed from the physical, individual, functional...structural, normative, social, and informational dimensions. The human factors include modelling stress, trust, risk factors, and cultural factors

  13. Economic policy, intergenerational equity, and the Social Security Trust Fund buildup.

    PubMed

    Hambor, J C

    1987-10-01

    For the next 75 years, the Old-Age, Survivors, and Disability Insurance (OASDI) system is projected to be close to in balance, on average. For approximately the next 40 years, under current projections, the combined OASDI Trust Fund is expected to continually have excesses of income over outgo, creating a buildup that will peak in 2030 at about +12 1/2 trillion (roughly 23 percent of the gross national product). Thereafter, the system is projected to be in annual deficit continually until the trust fund is exhausted in 2051. This article focuses on two fundamental issues that must be understood if the potential economic consequences of this buildup are to be evaluated properly. The first issue deals with the fact that the nature of Federal economic policy during the buildup period will determine the ultimate economic impact of the buildup. The second issue concerns the effect of the buildup, and its disposition, on the Social Security program's treatment of one generation of workers compared with another. If a fund is actually accumulated as projected, part of the retirement benefits of the "baby-boom" generation will, in effect, be self-financed. If, however, that fund is used for other purposes--directly or indirectly--future cohorts of workers will be required to fully finance benefits promised to the baby-boom retirees.

  14. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOEpatents

    Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

    2013-07-09

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  15. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOEpatents

    Hughes, Richard John; Nordholt, Jane Elizabeth; Peterson, Charles Glen

    2015-01-06

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  16. 17 CFR 240.16a-8 - Trusts.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Trusts. 240.16a-8 Section 240...-8 Trusts. (a) Persons subject to section 16—(1) Trusts. A trust shall be subject to section 16 of the Act with respect to securities of the issuer if the trust is a beneficial owner, pursuant to § 240...

  17. Student Loans in Ghana.

    ERIC Educational Resources Information Center

    Kotey, N.

    1992-01-01

    This article summarizes the current pattern of finance of higher education in Ghana, gives a brief history of student loans in Ghana, and describes a new program, which is administered by the Social Security and National Insurance Trust and is expected to result in a higher rate of loan repayment. (Author/DB)

  18. Children's Attentional Exploration of Threatening Information as Related to Trust in Maternal Support

    ERIC Educational Resources Information Center

    Dujardin, Adinda; Bosmans, Guy; De Raedt, Rudi; Braet, Caroline

    2015-01-01

    There is increasing interest in attachment-related social information processing, including children's attentional processing of information regarding the attachment figure. Previous research in middle childhood revealed evidence for a stronger attentional focus toward mother in children with less secure attachment expectations. However, the…

  19. Key Exchange Trust Evaluation in Peer-to-Peer Sensor Networks With Unconditionally Secure Key Exchange

    NASA Astrophysics Data System (ADS)

    Gonzalez, Elias; Kish, Laszlo B.

    2016-03-01

    As the utilization of sensor networks continue to increase, the importance of security becomes more profound. Many industries depend on sensor networks for critical tasks, and a malicious entity can potentially cause catastrophic damage. We propose a new key exchange trust evaluation for peer-to-peer sensor networks, where part of the network has unconditionally secure key exchange. For a given sensor, the higher the portion of channels with unconditionally secure key exchange the higher the trust value. We give a brief introduction to unconditionally secured key exchange concepts and mention current trust measures in sensor networks. We demonstrate the new key exchange trust measure on a hypothetical sensor network using both wired and wireless communication channels.

  20. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hughes, Richard John; Nordholt, Jane Elizabeth; Peterson, Charles Glen

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD aremore » extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.« less

  1. A Trusted Portable Computing Device

    NASA Astrophysics Data System (ADS)

    Ming-wei, Fang; Jun-jun, Wu; Peng-fei, Yu; Xin-fang, Zhang

    A trusted portable computing device and its security mechanism were presented to solve the security issues, such as the attack of virus and Trojan horse, the lost and stolen of storage device, in mobile office. It used smart card to build a trusted portable security base, virtualization to create a secure virtual execution environment, two-factor authentication mechanism to identify legitimate users, and dynamic encryption to protect data privacy. The security environment described in this paper is characteristic of portability, security and reliability. It can meet the security requirement of mobile office.

  2. The Importance of Trust in Electronic Commerce.

    ERIC Educational Resources Information Center

    Ratnasingham, Pauline

    1998-01-01

    Introduces the new concept of trust and how it influences the process of managing the security of an organization operating in an electronic commerce environment. Theoretically, the study aims to develop a framework of trust and security to provide a set of guidelines for secure electronic commerce. (Author/LRW)

  3. 17 CFR 210.3-15 - Special provisions as to real estate investment trusts.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... provisions as to real estate investment trusts. (a)(1) The income statement prepared pursuant to § 210.5-03....3-04 shall be modified similarly. (b) The trust's status as a real estate investment trust under... estate investment trusts. 210.3-15 Section 210.3-15 Commodity and Securities Exchanges SECURITIES AND...

  4. 17 CFR 210.3-15 - Special provisions as to real estate investment trusts.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... provisions as to real estate investment trusts. (a)(1) The income statement prepared pursuant to § 210.5-03....3-04 shall be modified similarly. (b) The trust's status as a real estate investment trust under... estate investment trusts. 210.3-15 Section 210.3-15 Commodity and Securities Exchanges SECURITIES AND...

  5. 17 CFR 210.3-15 - Special provisions as to real estate investment trusts.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... provisions as to real estate investment trusts. (a)(1) The income statement prepared pursuant to § 210.5-03....3-04 shall be modified similarly. (b) The trust's status as a real estate investment trust under... estate investment trusts. 210.3-15 Section 210.3-15 Commodity and Securities Exchanges SECURITIES AND...

  6. Study on Cloud Security Based on Trust Spanning Tree Protocol

    NASA Astrophysics Data System (ADS)

    Lai, Yingxu; Liu, Zenghui; Pan, Qiuyue; Liu, Jing

    2015-09-01

    Attacks executed on Spanning Tree Protocol (STP) expose the weakness of link layer protocols and put the higher layers in jeopardy. Although the problems have been studied for many years and various solutions have been proposed, many security issues remain. To enhance the security and credibility of layer-2 network, we propose a trust-based spanning tree protocol aiming at achieving a higher credibility of LAN switch with a simple and lightweight authentication mechanism. If correctly implemented in each trusted switch, the authentication of trust-based STP can guarantee the credibility of topology information that is announced to other switch in the LAN. To verify the enforcement of the trusted protocol, we present a new trust evaluation method of the STP using a specification-based state model. We implement a prototype of trust-based STP to investigate its practicality. Experiment shows that the trusted protocol can achieve security goals and effectively avoid STP attacks with a lower computation overhead and good convergence performance.

  7. Attachment style and oxytocin receptor gene variation interact in influencing social anxiety.

    PubMed

    Notzon, S; Domschke, K; Holitschke, K; Ziegler, C; Arolt, V; Pauli, P; Reif, A; Deckert, J; Zwanzger, P

    2016-01-01

    Social anxiety has been suggested to be promoted by an insecure attachment style. Oxytocin is discussed as a mediator of trust and social bonding as well as a modulator of social anxiety. Applying a gene-environment (G × E) interaction approach, in the present pilot study the main and interactive effects of attachment styles and oxytocin receptor (OXTR) gene variation were probed in a combined risk factor model of social anxiety in healthy probands. Participants (N = 388; 219 females, 169 males; age 24.7 ± 4.7 years) were assessed for anxiety in social situations (Social Phobia and Anxiety Inventory) depending on attachment style (Adult Attachment Scale, AAS) and OXTR rs53576 A/G genotype. A less secure attachment style was significantly associated with higher social anxiety. This association was partly modulated by OXTR genotype, with a stronger negative influence of a less secure attachment style on social anxiety in A allele carriers as compared to GG homozygotes. The present pilot data point to a strong association of less secure attachment and social anxiety as well as to a gene-environment interaction effect of OXTR rs53576 genotype and attachment style on social anxiety possibly constituting a targetable combined risk marker of social anxiety disorder.

  8. Particularized trust, generalized trust, and immigrant self-rated health: cross-national analysis of World Values Survey.

    PubMed

    Kim, H H-S

    2018-05-01

    This research examined the associations between two types of trust, generalized and particularized, and self-rated health among immigrants. Data were drawn from the World Values Survey (WVS6), the latest wave of cross-sectional surveys based on face-to-face interviews. The immigrant subsample analyzed herein contains 3108 foreign-born individuals clustered from 51 countries. Given the hierarchically nested data, two-level logistic regressions models were estimated using HLM (Hierarchical Linear Modeling) 7.1. At the individual level, net of socio-economic and demographic factors (age, gender, marital status, education, income, neighborhood security, and subjective well-being), particularized trust was positively related to physical health (odds ratio [OR] = 1.11, P < .001). Generalized trust, however, was not a significant predictor. At the country level, based on alternative models, the aggregate measure of particularized trust was negatively associated with subjective health. The odds of being healthy were on average about 30% lower. The interdisciplinary literature on social determinants of health has largely focused on the salubrious impact of trust and other forms of social capital on physical well-being. Many previous studies based on general, not immigrant, populations also did not differentiate between generalized and particularized types of trust. Results from this study suggest that this conceptual distinction is critical in understanding how and to what extent the two are differentially related to immigrant well-being across multiple levels of analysis. Copyright © 2018 The Royal Society for Public Health. Published by Elsevier Ltd. All rights reserved.

  9. Comparing replacement rates under private and federal retirement systems.

    PubMed

    Martin, Patricia P

    One measure of the adequacy of retirement income is replacement rate - the percentage of pre-retirement salary that is available to a worker in retirement. This article compares salary replacement rates for private-sector employees of medium and large private establishments with those for federal employees under the Civil Service Retirement System and the Federal Employees Retirement System. Because there is no standard benefit formula to represent the variety of formulas available in the private sector, a composite defined benefit formula was developed using the characteristics of plans summarized in the Bureau of Labor Statistics Medium and Large Employer Plan Survey. The resulting "typical" private-sector defined benefit plan, with an accompanying defined contribution plan, was then compared with the two federal systems. The Civil Service Retirement System (CSRS) is a stand-alone defined benefit plan whose participants are not covered by Social Security. Until passage of the 1983 Amendments to Social Security Act, it was the only retirement plan for most federal civilian employees. Provisions of the 1983 Amendments were designed to restore long-term financial stability to the Social Security trust funds. One provision created the Federal Employees Retirement System (FERS), which covers federal employees hired after 1983. It was one of the provisions designed to restore long-term financial stability to the Social Security trust funds. FERS employees contribute to and are covered by Social Security. FERS, which is a defined benefit plan, also includes a basic benefit and a 401(k)-type plan known as the Thrift Savings Plan (TSP). To compare how retirees would fare under the three different retirement systems, benefits of employees retiring at age 65 with 35 years of service were calculated using hypothetical workers with steady earnings. Workers were classified according to a percentage of the average wage in the economy: low earners (45 percent), average earners (100 percent) high earners (160 percent), and maximum earners (earnings at the taxable maximum amount). Overall, this analysis found that: Excluding Social Security benefits and TSP and defined contribution annuities, CSRS retirees have a higher pre-retirement salary replacement rate than either FERS or private-sector retirees. Private-sector retirees, however, have higher replacement rate than their FERS counterparts. Including Social Security benefits but not TSP and defined contribution plan annuities, CSRS retirees who are maximum earners have a higher pre-retirement salary replacement rate (despite receiving no Social Security benefits) than FERS retirees with the same earnings. Private-sector retirees in all earnings categories have a higher replacement rate than federal retirees with the same earnings. Including Social Security and TSP and defined contribution plan annuities, private-sector retirees in all earnings categories have a higher replacement rate than federal retirees, but their rate is close to that of FERS retirees. The rate is higher for FERS retirees than for CSRS retirees in all earnings categories. This analysis shows that replacement creates could exceed 100 percent for FERS employees who contribute who contribute 6 percent of earnings to the TSP over full working career. Private-sector replacement rates were quite similar for those with both a defined benefit and a defined contribution pension plan. Social Security replacement rates make up the highest proportion of benefits for th private sector's lowest income quartile group. The replacement rate for 401(k) plans and the TSP account for a higher proportion of benefits than does Social Security for all other income groups, assuming the absence of a defined benefit plan.

  10. 76 FR 73748 - Genesis Capital, LLC and Northern Lights Fund Trust; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-29

    ... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 29867; 812-13935] Genesis Capital, LLC and Northern Lights Fund Trust; Notice of Application November 21, 2011. AGENCY: Securities...: Genesis Capital, LLC (``Genesis Capital'' or the ``Adviser'') and Northern Lights Fund Trust (the ``Trust...

  11. 16 CFR 802.35 - Acquisitions by employee trusts.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Acquisitions by employee trusts. 802.35... Acquisitions by employee trusts. An acquisition of voting securities shall be exempt from the notification requirements of the act if: (a) The securities are acquired by a trust that meets the qualifications of section...

  12. 77 FR 55235 - Cash Account Trust, et al.; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-07

    ... Account Trust, et al.; Notice of Application August 31, 2012. AGENCY: Securities and Exchange Commission... Trust, on behalf of its series, Government & Agency Securities Portfolio and Money Market Portfolio... Funds, on behalf of its series, DWS Money Market Prime Series; DWS Money Market Trust, on behalf of its...

  13. Online trust, trustworthiness, or assurance?

    PubMed

    Cheshire, Coye

    2011-01-01

    Every day, individuals around the world retrieve, share, and exchange information on the Internet. We interact online to share personal information, find answers to questions, make financial transactions, play social games, and maintain professional and personal relationships. Sometimes our online interactions take place between two or more humans. In other cases, we rely on computers to manage information on our behalf. In each scenario, risk and uncertainty are essential for determining possible actions and outcomes. This essay highlights common deficiencies in our understanding of key concepts such as trust, trustworthiness, cooperation, and assurance in online environments. Empirical evidence from experimental work in computer-mediated environments underscores the promises and perils of overreliance on security and assurance structures as replacements for interpersonal trust. These conceptual distinctions are critical because the future shape of the Internet will depend on whether we build assurance structures to limit and control ambiguity or allow trust to emerge in the presence of risk and uncertainty.

  14. A Collaborative Secure Localization Algorithm Based on Trust Model in Underwater Wireless Sensor Networks

    PubMed Central

    Han, Guangjie; Liu, Li; Jiang, Jinfang; Shu, Lei; Rodrigues, Joel J.P.C.

    2016-01-01

    Localization is one of the hottest research topics in Underwater Wireless Sensor Networks (UWSNs), since many important applications of UWSNs, e.g., event sensing, target tracking and monitoring, require location information of sensor nodes. Nowadays, a large number of localization algorithms have been proposed for UWSNs. How to improve location accuracy are well studied. However, few of them take location reliability or security into consideration. In this paper, we propose a Collaborative Secure Localization algorithm based on Trust model (CSLT) for UWSNs to ensure location security. Based on the trust model, the secure localization process can be divided into the following five sub-processes: trust evaluation of anchor nodes, initial localization of unknown nodes, trust evaluation of reference nodes, selection of reference node, and secondary localization of unknown node. Simulation results demonstrate that the proposed CSLT algorithm performs better than the compared related works in terms of location security, average localization accuracy and localization ratio. PMID:26891300

  15. 76 FR 33376 - Altegris Advisors, L.L.C. and Northern Lights Fund Trust; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-08

    ... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 29689; 812-13851] Altegris Advisors, L.L.C. and Northern Lights Fund Trust; Notice of Application June 1, 2011. AGENCY: Securities and... ``Adviser'') and Northern Lights Fund Trust (the ``Trust''). DATES: Filing Dates: The application was filed...

  16. 17 CFR 210.3-15 - Special provisions as to real estate investment trusts.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... Financial Statements § 210.3-15 Special provisions as to real estate investment trusts. (a)(1) The income... real estate investment trust under applicable provisions of the Internal Revenue Code as amended shall... estate investment trusts. 210.3-15 Section 210.3-15 Commodity and Securities Exchanges SECURITIES AND...

  17. Trusted computing strengthens cloud authentication.

    PubMed

    Ghazizadeh, Eghbal; Zamani, Mazdak; Ab Manan, Jamalul-lail; Alizadeh, Mojtaba

    2014-01-01

    Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM). Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM) are great technologies for solving the trust and security concerns in the cloud identity environment. Single sign-on (SSO) and OpenID have been released to solve security and privacy problems for cloud identity. This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in .Net environment. Security analyzing, simulation, and BLP confidential model are three ways to evaluate and analyze our proposed model.

  18. Trusted Computing Strengthens Cloud Authentication

    PubMed Central

    2014-01-01

    Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM). Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM) are great technologies for solving the trust and security concerns in the cloud identity environment. Single sign-on (SSO) and OpenID have been released to solve security and privacy problems for cloud identity. This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in .Net environment. Security analyzing, simulation, and BLP confidential model are three ways to evaluate and analyze our proposed model. PMID:24701149

  19. The Double-System Architecture for Trusted OS

    NASA Astrophysics Data System (ADS)

    Zhao, Yong; Li, Yu; Zhan, Jing

    With the development of computer science and technology, current secure operating systems failed to respond to many new security challenges. Trusted operating system (TOS) is proposed to try to solve these problems. However, there are no mature, unified architectures for the TOS yet, since most of them cannot make clear of the relationship between security mechanism and the trusted mechanism. Therefore, this paper proposes a double-system architecture (DSA) for the TOS to solve the problem. The DSA is composed of the Trusted System (TS) and the Security System (SS). We constructed the TS by establishing a trusted environment and realized related SS. Furthermore, we proposed the Trusted Information Channel (TIC) to protect the information flow between TS and SS. In a word, the double system architecture we proposed can provide reliable protection for the OS through the SS with the supports provided by the TS.

  20. ReTrust: attack-resistant and lightweight trust management for medical sensor networks.

    PubMed

    He, Daojing; Chen, Chun; Chan, Sammy; Bu, Jiajun; Vasilakos, Athanasios V

    2012-07-01

    Wireless medical sensor networks (MSNs) enable ubiquitous health monitoring of users during their everyday lives, at health sites, without restricting their freedom. Establishing trust among distributed network entities has been recognized as a powerful tool to improve the security and performance of distributed networks such as mobile ad hoc networks and sensor networks. However, most existing trust systems are not well suited for MSNs due to the unique operational and security requirements of MSNs. Moreover, similar to most security schemes, trust management methods themselves can be vulnerable to attacks. Unfortunately, this issue is often ignored in existing trust systems. In this paper, we identify the security and performance challenges facing a sensor network for wireless medical monitoring and suggest it should follow a two-tier architecture. Based on such an architecture, we develop an attack-resistant and lightweight trust management scheme named ReTrust. This paper also reports the experimental results of the Collection Tree Protocol using our proposed system in a network of TelosB motes, which show that ReTrust not only can efficiently detect malicious/faulty behaviors, but can also significantly improve the network performance in practice.

  1. Information Sharing from 9-1-1 Centers

    DTIC Science & Technology

    2014-09-01

    Police Chief, 2014, http://www.policechiefmagazine.org/ magazine /index.cfm?fuseaction=display_arch&article_id=1199&issue _id=62007. 2 “9-1-1 History...Homeland Security Magazine ,51 discusses the pros and cons of using social media to 49 Jennifer E...Information Dilemmas in Biotechnology : Organizational Boundaries As Trust Production, NBER WorkingPaper No. 5199, National Bureau of Economic

  2. AST: Activity-Security-Trust driven modeling of time varying networks.

    PubMed

    Wang, Jian; Xu, Jiake; Liu, Yanheng; Deng, Weiwen

    2016-02-18

    Network modeling is a flexible mathematical structure that enables to identify statistical regularities and structural principles hidden in complex systems. The majority of recent driving forces in modeling complex networks are originated from activity, in which an activity potential of a time invariant function is introduced to identify agents' interactions and to construct an activity-driven model. However, the new-emerging network evolutions are already deeply coupled with not only the explicit factors (e.g. activity) but also the implicit considerations (e.g. security and trust), so more intrinsic driving forces behind should be integrated into the modeling of time varying networks. The agents undoubtedly seek to build a time-dependent trade-off among activity, security, and trust in generating a new connection to another. Thus, we reasonably propose the Activity-Security-Trust (AST) driven model through synthetically considering the explicit and implicit driving forces (e.g. activity, security, and trust) underlying the decision process. AST-driven model facilitates to more accurately capture highly dynamical network behaviors and figure out the complex evolution process, allowing a profound understanding of the effects of security and trust in driving network evolution, and improving the biases induced by only involving activity representations in analyzing the dynamical processes.

  3. A Secure Trust Establishment Scheme for Wireless Sensor Networks

    PubMed Central

    Ishmanov, Farruh; Kim, Sung Won; Nam, Seung Yeob

    2014-01-01

    Trust establishment is an important tool to improve cooperation and enhance security in wireless sensor networks. The core of trust establishment is trust estimation. If a trust estimation method is not robust against attack and misbehavior, the trust values produced will be meaningless, and system performance will be degraded. We present a novel trust estimation method that is robust against on-off attacks and persistent malicious behavior. Moreover, in order to aggregate recommendations securely, we propose using a modified one-step M-estimator scheme. The novelty of the proposed scheme arises from combining past misbehavior with current status in a comprehensive way. Specifically, we introduce an aggregated misbehavior component in trust estimation, which assists in detecting an on-off attack and persistent malicious behavior. In order to determine the current status of the node, we employ previous trust values and current measured misbehavior components. These components are combined to obtain a robust trust value. Theoretical analyses and evaluation results show that our scheme performs better than other trust schemes in terms of detecting an on-off attack and persistent misbehavior. PMID:24451471

  4. Towards Trust-based Cognitive Networks: A Survey of Trust Management for Mobile Ad Hoc Networks

    DTIC Science & Technology

    2009-06-01

    of trust. First, social trust refers to properties derived from social relationships . Examples of social networks are strong social ... relationships such as colleagues or relatives or loose social relationships such as school alumni or friends with common interests [44]. Social trust may...also use social relationships in evaluating the trust metric among group members by employing the concept of social networks. Yu et al. [44] define

  5. 75 FR 11627 - Order Granting Temporary Exemptions From Certain Government Securities Act Provisions and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-11

    ... Act Provisions and Regulations in Connection With a Request From ICE Trust U.S. LLC Related to Central... securities. The temporary exemptions were requested by ICE Trust U.S. LLC. Treasury is also soliciting public... exemptions to permit ICE Trust U.S. LLC (ICE Trust) to clear and settle transactions in credit default swaps...

  6. Trust Model to Enhance Security and Interoperability of Cloud Environment

    NASA Astrophysics Data System (ADS)

    Li, Wenjuan; Ping, Lingdi

    Trust is one of the most important means to improve security and enable interoperability of current heterogeneous independent cloud platforms. This paper first analyzed several trust models used in large and distributed environment and then introduced a novel cloud trust model to solve security issues in cross-clouds environment in which cloud customer can choose different providers' services and resources in heterogeneous domains can cooperate. The model is domain-based. It divides one cloud provider's resource nodes into the same domain and sets trust agent. It distinguishes two different roles cloud customer and cloud server and designs different strategies for them. In our model, trust recommendation is treated as one type of cloud services just like computation or storage. The model achieves both identity authentication and behavior authentication. The results of emulation experiments show that the proposed model can efficiently and safely construct trust relationship in cross-clouds environment.

  7. AST: Activity-Security-Trust driven modeling of time varying networks

    PubMed Central

    Wang, Jian; Xu, Jiake; Liu, Yanheng; Deng, Weiwen

    2016-01-01

    Network modeling is a flexible mathematical structure that enables to identify statistical regularities and structural principles hidden in complex systems. The majority of recent driving forces in modeling complex networks are originated from activity, in which an activity potential of a time invariant function is introduced to identify agents’ interactions and to construct an activity-driven model. However, the new-emerging network evolutions are already deeply coupled with not only the explicit factors (e.g. activity) but also the implicit considerations (e.g. security and trust), so more intrinsic driving forces behind should be integrated into the modeling of time varying networks. The agents undoubtedly seek to build a time-dependent trade-off among activity, security, and trust in generating a new connection to another. Thus, we reasonably propose the Activity-Security-Trust (AST) driven model through synthetically considering the explicit and implicit driving forces (e.g. activity, security, and trust) underlying the decision process. AST-driven model facilitates to more accurately capture highly dynamical network behaviors and figure out the complex evolution process, allowing a profound understanding of the effects of security and trust in driving network evolution, and improving the biases induced by only involving activity representations in analyzing the dynamical processes. PMID:26888717

  8. 2010 Military Family Life Project (MFLP) - Couples: Tabulations of Responses

    DTIC Science & Technology

    2013-08-31

    interest income; dividends; child support/alimony; social security, welfare assistance; and net rent, trusts, and royalties from any other investments ...2010 Military Family Life Project: Couples Tabulations of Responses Additional copies of this report may be obtained from: Defense... RESPONSES Defense Manpower Data Center Human Resources Strategic Assessment Program 4800 Mark Center Drive, Suite 04E25-01, Alexandria, VA 22350

  9. Learning To Be Independent and Responsible. Functional Programming for People with Autism: A Series.

    ERIC Educational Resources Information Center

    Dalrymple, Nancy

    Children with autism cannot be taught independent and responsible behavior in the way that most "sociable" children are taught, due to their deficits in social interaction and communication. Children with autism must first build trust in order to feel secure and to be able to concentrate on learning new skills and behaviors. Environmental supports…

  10. Novel technology for enhanced security and trust in communication networks

    NASA Astrophysics Data System (ADS)

    Milovanov, Alexander; Bukshpun, Leonid; Pradhan, Ranjit; Jannson, Tomasz

    2011-06-01

    A novel technology that significantly enhances security and trust in wireless and wired communication networks has been developed. It is based on integration of a novel encryption mechanism and novel data packet structure with enhanced security tools. This novel data packet structure results in an unprecedented level of security and trust, while at the same time reducing power consumption and computing/communication overhead in networks. As a result, networks are provided with protection against intrusion, exploitation, and cyber attacks and posses self-building, self-awareness, self-configuring, self-healing, and self-protecting intelligence.

  11. Questions of trust in health research on social capital: what aspects of personal network social capital do they measure?

    PubMed

    Carpiano, Richard M; Fitterer, Lisa M

    2014-09-01

    Health research on personal social capital has often utilized measures of respondents' perceived trust of others as either a proxy for one's social capital in the absence of more focused measures or as a subjective component of social capital. Little empirical work has evaluated the validity of such practices. We test the construct validity of two trust measures used commonly in health research on social capital-generalized trust and trust of neighbors-with respect to measures of people's general network-, organization-, family-, friend-, and neighborhood-based social capital and the extent to which these two trust measures are associated with self-rated general health and mental health when social capital measures are included in the same models. Analyses of 2008 Canadian General Social Survey data (response rate 57.3%) indicate that generalized trust and trust of neighbors are both positively-yet modestly-associated with measures of several domains of network-based social capital. Both trust measures are positively associated with general and mental health, but these associations remain robust after adjusting for social capital measures. Our findings suggest that (a) trust is conceptually distinct from social capital, (b) trust measures are inadequate proxies for actual personal social networks, and (c) trust measures may only be capturing psychological aspects relevant to-but not indicative of-social capital. Though links between perceived trust and health deserve study, health research on social capital needs to utilize measures of respondents' actual social networks and their inherent resources. Copyright © 2014 Elsevier Ltd. All rights reserved.

  12. Hardening Logic Encryption against Key Extraction Attacks with Circuit Camouflage

    DTIC Science & Technology

    2017-03-01

    camouflage; obfuscation; SAT; key extraction; reverse engineering; security; trusted electronics Introduction Integrated Circuit (IC) designs are...Encryption Algorithms”, Hardware Oriented Security and Trust , 2015. 3. Rajendran J., Pino, Y., Sinanoglu, O., Karri, R., “Security Analysis of Logic

  13. 'You fix my community, you have fixed my life': the disruption and rebuilding of ontological security in New Orleans.

    PubMed

    Hawkins, Robert L; Maurer, Katherine

    2011-01-01

    Using the concept of ontological security, this paper examines the physical and psychological loss of home and community following Hurricane Katrina. This qualitative longitudinal study includes 40 heads of households with school-age children who lived in New Orleans during Hurricane Katrina. Participants describe a breakdown in their social fabric at the individual and structural/community levels that contributes to a sense of community loss and social displacement, disrupting their ontological security--their notion of safety, routine and trust in a stable environment. Three interrelated reactions were common: 1) experiencing nostalgia for their old neighbourhoods specifically and New Orleans in general; 2) experiencing a sense of loss of people and things that represented a level of security or constancy; 3) initiation of a process for re-establishing ontological security whether or not they returned to New Orleans. The paper concludes that intangible losses have an important psychological effect on community redevelopment and recovery from trauma. © 2011 The Author(s). Disasters © Overseas Development Institute, 2011.

  14. 17 CFR 240.10b5-2 - Duties of trust or confidence in misappropriation insider trading cases.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Duties of trust or confidence... Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange Act of 1934 Manipulative and Deceptive...

  15. 17 CFR 240.10b5-2 - Duties of trust or confidence in misappropriation insider trading cases.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Duties of trust or confidence... Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange Act of 1934 Manipulative and Deceptive...

  16. 17 CFR 240.10b5-2 - Duties of trust or confidence in misappropriation insider trading cases.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Duties of trust or confidence... Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange Act of 1934 Manipulative and Deceptive...

  17. 17 CFR 240.10b5-2 - Duties of trust or confidence in misappropriation insider trading cases.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Duties of trust or confidence... Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange Act of 1934 Manipulative and Deceptive...

  18. 17 CFR 240.10b5-2 - Duties of trust or confidence in misappropriation insider trading cases.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Duties of trust or confidence... Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange Act of 1934 Manipulative and Deceptive...

  19. 76 FR 62470 - MFS Series Trust I, et al.

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-07

    ...] MFS Series Trust I, et al.; Notice of Application September 30, 2011. AGENCY: Securities and Exchange... Series Trust I, MFS Series Trust II, MFS Series Trust III, MFS Series Trust IV, MFS Series Trust V, MFS Series Trust VI, MFS Series Trust VII, MFS Series Trust VIII, MFS Series Trust IX, MFS Series Trust X...

  20. Trust Maximization in Social Networks

    NASA Astrophysics Data System (ADS)

    Zhan, Justin; Fang, Xing

    Trust is a human-related phenomenon in social networks. Trust research on social networks has gained much attention on its usefulness, and on modeling propagations. There is little focus on finding maximum trust in social networks which is particularly important when a social network is oriented by certain tasks. In this paper, we propose a trust maximization algorithm based on the task-oriented social networks.

  1. 76 FR 58849 - Legg Mason Partners Equity Trust, et al.;

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-22

    ...] Legg Mason Partners Equity Trust, et al.; Notice of Application September 15, 2011. AGENCY: Securities... Trust (``LMP Equity Trust''), Legg Mason Partners Variable Equity Trust (``LMP Variable Equity Trust'' and together with LMP Equity Trust, the ``Trusts''), Legg Mason Partners Fund Advisor, LLC (``LMPFA...

  2. Combined and Relative Effect Levels of Perceived Risk, Knowledge, Optimism, Pessimism, and Social Trust on Anxiety among Inhabitants Concerning Living on Heavy Metal Contaminated Soil

    PubMed Central

    Tang, Zhongjun; Guo, Zengli; Zhou, Li; Xue, Shengguo; Zhu, Qinfeng; Zhu, Huike

    2016-01-01

    This research aims at combined and relative effect levels on anxiety of: (1) perceived risk, knowledge, optimism, pessimism, and social trust; and (2) four sub-variables of social trust among inhabitants concerning living on heavy metal contaminated soil. On the basis of survey data from 499 Chinese respondents, results suggest that perceived risk, pessimism, optimism, and social trust have individual, significant, and direct effects on anxiety, while knowledge does not. Knowledge has significant, combined, and interactive effects on anxiety together with social trust and pessimism, respectively, but does not with perceived risk and optimism. Social trust, perceived risk, pessimism, knowledge, and optimism have significantly combined effects on anxiety; the five variables as a whole have stronger predictive values than each one individually. Anxiety is influenced firstly by social trust and secondly by perceived risk, pessimism, knowledge, and optimism. Each of four sub-variables of social trust has an individual, significant, and negative effect on anxiety. When introducing four sub-variables into one model, trust in social organizations and in the government have significantly combined effects on anxiety, while trust in experts and in friends and relatives do not; anxiety is influenced firstly by trust in social organization, and secondly by trust in the government. PMID:27827866

  3. Combined and Relative Effect Levels of Perceived Risk, Knowledge, Optimism, Pessimism, and Social Trust on Anxiety among Inhabitants Concerning Living on Heavy Metal Contaminated Soil.

    PubMed

    Tang, Zhongjun; Guo, Zengli; Zhou, Li; Xue, Shengguo; Zhu, Qinfeng; Zhu, Huike

    2016-11-02

    This research aims at combined and relative effect levels on anxiety of: (1) perceived risk, knowledge, optimism, pessimism, and social trust; and (2) four sub-variables of social trust among inhabitants concerning living on heavy metal contaminated soil. On the basis of survey data from 499 Chinese respondents, results suggest that perceived risk, pessimism, optimism, and social trust have individual, significant, and direct effects on anxiety, while knowledge does not. Knowledge has significant, combined, and interactive effects on anxiety together with social trust and pessimism, respectively, but does not with perceived risk and optimism. Social trust, perceived risk, pessimism, knowledge, and optimism have significantly combined effects on anxiety; the five variables as a whole have stronger predictive values than each one individually. Anxiety is influenced firstly by social trust and secondly by perceived risk, pessimism, knowledge, and optimism. Each of four sub-variables of social trust has an individual, significant, and negative effect on anxiety. When introducing four sub-variables into one model, trust in social organizations and in the government have significantly combined effects on anxiety, while trust in experts and in friends and relatives do not; anxiety is influenced firstly by trust in social organization, and secondly by trust in the government.

  4. Object Signing in Bamboo

    DTIC Science & Technology

    2000-03-01

    Dynamics. Numerous smaller companies have entered the market in just the past year offering similar PKI security solutions in an effort to take advantage...web of social , legal and business interactions that, in some cases, have taken generations to mature. We use common instruments to establish trust...types of digital certificates on the market today. However, with the recent development of object signing tools, some of the later browsers are incapable

  5. A tale of two studies; ethics, bioterrorism, and the censorship of science.

    PubMed

    Selgelid, Michael J

    2007-01-01

    Some scientific research should not be published. The risks to national security and public health override the social benefits of disseminating scientific results openly. Unfortunately, scientists themselves are not in a position to know which studies to withhold from public view, as the National Research Council has proposed. Yet neither can government alone be trusted to balance the competing interests at stake.

  6. T2AR: trust-aware ad-hoc routing protocol for MANET.

    PubMed

    Dhananjayan, Gayathri; Subbiah, Janakiraman

    2016-01-01

    Secure data transfer against the malicious attacks is an important issue in an infrastructure-less independent network called mobile ad-hoc network (MANET). Trust assurance between MANET nodes is the key parameter in the high-security provision under dynamic topology variations and open wireless constraints. But, the malicious behavior of nodes reduces the trust level of the nodes that leads to an insecure data delivery. The increase in malicious attacks causes the excessive energy consumption that leads to a reduction of network lifetime. The lack of positional information update of the nodes in ad-hoc on-demand vector (AODV) protocol during the connection establishment offers less trust level between the nodes. Hence, the trust rate computation using energy and mobility models and its update are the essential tasks for secure data delivery. This paper proposes a trust-aware ad-hoc routing (T2AR) protocol to improve the trust level between the nodes in MANET. The proposed method modifies the traditional AODV routing protocol with the constraints of trust rate, energy, mobility based malicious behavior prediction. The packet sequence ID matching from the log reports of neighbor nodes determine the trust rate that avoids the malicious report generation. Besides, the direct and indirect trust observation schemes utilization increases the trust level. Besides, the received signal strength indicator utilization determines the trusted node is within the communication range or not. The comparative analysis between the proposed T2AR with the existing methods such as TRUNCMAN, RBT, GR, FBR and DICOTIDS regarding the average end-to-end delay, throughput, false positives, packet delivery ratio shows the effectiveness of T2AR in the secure MANET environment design.

  7. The impact of transaction trust on consumers' intentions to adopt m-commerce: a cross-cultural investigation.

    PubMed

    Kao, Danny Tengti

    2009-04-01

    Mobile commerce (M-commerce) has been acknowledged as one of the most representative transaction types driving e-commerce worldwide; however, the potential security threats that keep consumers from M-commerce still confound the M-commerce industry. This research attempts to explore two questions: What are the dimensions of transaction trust that may significantly affect consumers' intentions to adopt M-commerce, and what are the cultural dimensions that may significantly moderate the impact of transaction trust on consumers' intentions to adopt M-commerce? A research framework based on the BATE model and Hofstede's cultural dimensions was established to identify how transaction trust and cultural value affect consumers' intentions to adopt M-commerce. Results revealed that transaction trust significantly affects consumers' intentions to adopt M-commerce. However, while uncertainty avoidance moderates the impacts of business trust and security on consumers' intentions of M-commerce adoption, both individualism/collectivism and long-term/short-term orientation moderate the relationship between security trust and consumers' intentions of M-commerce adoption.

  8. College Education and Social Trust: An Evidence-Based Study on the Causal Mechanisms

    ERIC Educational Resources Information Center

    Huang, Jian; van den Brink, Henriette Maassen; Groot, Wim

    2011-01-01

    This paper examines the influence of college education on social trust at the individual level. Based on the literature of trust and social trust, we hypothesize that life experience/development since adulthood and perceptions of cultural/social structures are two primary channels in the causal linkage between college education and social trust.…

  9. A game theory-based trust measurement model for social networks.

    PubMed

    Wang, Yingjie; Cai, Zhipeng; Yin, Guisheng; Gao, Yang; Tong, Xiangrong; Han, Qilong

    2016-01-01

    In social networks, trust is a complex social network. Participants in online social networks want to share information and experiences with as many reliable users as possible. However, the modeling of trust is complicated and application dependent. Modeling trust needs to consider interaction history, recommendation, user behaviors and so on. Therefore, modeling trust is an important focus for online social networks. We propose a game theory-based trust measurement model for social networks. The trust degree is calculated from three aspects, service reliability, feedback effectiveness, recommendation credibility, to get more accurate result. In addition, to alleviate the free-riding problem, we propose a game theory-based punishment mechanism for specific trust and global trust, respectively. We prove that the proposed trust measurement model is effective. The free-riding problem can be resolved effectively through adding the proposed punishment mechanism.

  10. Social trust, interpersonal trust and self-rated health in China: a multi-level study.

    PubMed

    Feng, Zhixin; Vlachantoni, Athina; Liu, Xiaoting; Jones, Kelvyn

    2016-11-08

    Trust is important for health at both the individual and societal level. Previous research using Western concepts of trust has shown that a high level of trust in society can positively affect individuals' health; however, it has been found that the concepts and culture of trust in China are different from those in Western countries and research on the relationship between trust and health in China is scarce. The analyses use data from the national scale China General Social Survey (CGSS) on adults aged above 18 in 2005 and 2010. Two concepts of trust ("out-group" and "in-group" trust) are used to examine the relationship between trust and self-rated health in China. Multilevel logistical models are applied, examining the trust at the individual and societal level on individuals' self-rated health. In terms of interpersonal trust, both "out-group" and "in-group" trust are positively associated with good health in 2005 and 2010. At the societal level, the relationships between the two concepts of trust and health are different. In 2005, higher "out-group" social trust (derived from trust in strangers) is positively associated with better health; however, higher "in-group" social trust (derived from trust in most people) is negatively associated with good health in 2010. The cross-level interactions show that lower educated individuals (no education or only primary level), rural residents and those on lower incomes are the most affected groups in societies with higher "out-group" social trust; whereas people with lower levels of educational attainment, a lower income, and those who think that most people can be trusted are the most affected groups in societies with higher "in-group" social trust. High levels of interpersonal trust are of benefit to health. Higher "out-group" social trust is positively associated with better health; while higher "in-group" social trust is negatively associated with good health. Individuals with different levels of educational attainment are affected by trust differently.

  11. From the general to the specific: How social trust motivates relational trust.

    PubMed

    Robbins, Blaine G

    2016-01-01

    When people form beliefs about the trustworthiness of others with respect to particular matters (i.e., when individuals trust), theory suggests that they rely on preexistent cognitive schemas regarding the general cooperativeness of individuals and organizations (i.e., social trust). In spite of prior work, the impact of social trust on relational trust-or what Russell Hardin (2002) calls trust as a three-part relation where actor A trusts actor B with reference to matter Y-is not well established. Four vignette experiments were administered to Amazon.com Mechanical Turk workers (N = 1388 and N = 1419) and to public university undergraduate students (N = 995 and N = 956) in order to investigate the relationship between social trust and relational trust. Measures of general social trust and particular social trust produced statistically equivalent effects that were positively associated with relational trust. Political trust, however, was statistically unrelated to relational trust. These results support the idea that people rely on schemas and stereotypes concerned with the general cooperativeness and helpfulness of others when forming beliefs about another person's trustworthiness with respect to a particular matter at hand. Copyright © 2015 Elsevier Inc. All rights reserved.

  12. Self-adaptive trust based ABR protocol for MANETs using Q-learning.

    PubMed

    Kumar, Anitha Vijaya; Jeyapal, Akilandeswari

    2014-01-01

    Mobile ad hoc networks (MANETs) are a collection of mobile nodes with a dynamic topology. MANETs work under scalable conditions for many applications and pose different security challenges. Due to the nomadic nature of nodes, detecting misbehaviour is a complex problem. Nodes also share routing information among the neighbours in order to find the route to the destination. This requires nodes to trust each other. Thus we can state that trust is a key concept in secure routing mechanisms. A number of cryptographic protection techniques based on trust have been proposed. Q-learning is a recently used technique, to achieve adaptive trust in MANETs. In comparison to other machine learning computational intelligence techniques, Q-learning achieves optimal results. Our work focuses on computing a score using Q-learning to weigh the trust of a particular node over associativity based routing (ABR) protocol. Thus secure and stable route is calculated as a weighted average of the trust value of the nodes in the route and associativity ticks ensure the stability of the route. Simulation results show that Q-learning based trust ABR protocol improves packet delivery ratio by 27% and reduces the route selection time by 40% over ABR protocol without trust calculation.

  13. Self-Adaptive Trust Based ABR Protocol for MANETs Using Q-Learning

    PubMed Central

    Jeyapal, Akilandeswari

    2014-01-01

    Mobile ad hoc networks (MANETs) are a collection of mobile nodes with a dynamic topology. MANETs work under scalable conditions for many applications and pose different security challenges. Due to the nomadic nature of nodes, detecting misbehaviour is a complex problem. Nodes also share routing information among the neighbours in order to find the route to the destination. This requires nodes to trust each other. Thus we can state that trust is a key concept in secure routing mechanisms. A number of cryptographic protection techniques based on trust have been proposed. Q-learning is a recently used technique, to achieve adaptive trust in MANETs. In comparison to other machine learning computational intelligence techniques, Q-learning achieves optimal results. Our work focuses on computing a score using Q-learning to weigh the trust of a particular node over associativity based routing (ABR) protocol. Thus secure and stable route is calculated as a weighted average of the trust value of the nodes in the route and associativity ticks ensure the stability of the route. Simulation results show that Q-learning based trust ABR protocol improves packet delivery ratio by 27% and reduces the route selection time by 40% over ABR protocol without trust calculation. PMID:25254243

  14. 77 FR 12898 - Self-Regulatory Organizations; Midwest Securities Trust Company; Order Cancelling Clearing Agency...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-02

    ... the event any self-regulatory organization is no longer in existence or has ceased to do business in... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-66461; File No. 600-7] Self-Regulatory Organizations; Midwest Securities Trust Company; Order Cancelling Clearing Agency Registration February 24, 2012...

  15. 77 FR 12897 - Self-Regulatory Organizations; Pacific Securities Depository Trust Company; Order Cancelling...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-02

    ...(a)(3) of the Act \\14\\ provides that in the event any self-regulatory organization is no longer in... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-66460; File No. 600-10] Self-Regulatory Organizations; Pacific Securities Depository Trust Company; Order Cancelling Clearing Agency Registration...

  16. Cross-sectional and longitudinal relations among children's trust beliefs, psychological maladjustment and social relationships: are very high as well as very low trusting children at risk?

    PubMed

    Rotenberg, Ken J; Boulton, Michael J; Fox, Claire L

    2005-10-01

    Four hundred and thirty-four children enrolled in school years 5 and 6 in the United Kingdom were administered measures of trust beliefs in peers/best friends and psychosocial functioning (internalized maladjustment, self-perceived social acceptance, social preference, and social exclusion) across an 8-month period (mean age = 9 years-9 months at Time 1). The relation between children's trust beliefs in peers or trust beliefs within best friend dyads and measures of psychosocial functioning conformed to a quadratic pattern. Compared to children in the middle range of trust beliefs, children with very low trust beliefs and those with very high trust beliefs in peers and/or within best friend dyads displayed higher internalized maladjustment, lower self-perceived social acceptance, higher social exclusion, and lower social preference. The relation between the trust beliefs and internalized maladjustment was asymmetrical, with children who held very low trust beliefs being comparatively more disadvantaged.

  17. 75 FR 14646 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-26

    ... Organizations; International Securities Exchange, LLC; Notice of Filing of Proposed Rule Change To List and... ``Commission'') authorized ISE to list and trade options on the SPDR Gold Trust,\\3\\ the iShares COMEX Gold... Exchange proposes to list and trade options on the ETFS Palladium Trust and the ETFS Platinum Trust. \\3...

  18. 75 FR 9987 - Self-Regulatory Organizations; The Depository Trust Company; Order Approving Proposed Rule Change...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-04

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-61593; File No. SR-DTC-2009-17] Self-Regulatory Organizations; The Depository Trust Company; Order Approving Proposed Rule Change To Allow The Depository Trust Company To Provide Settlement Services to European Central Counterparty Limited for U.S. Securities Traded on European Trading Venues...

  19. 78 FR 43251 - Grosvenor Alternative Funds Master Trust, et al.; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-19

    ... Alternative Funds Master Trust, et al.; Notice of Application July 15, 2013. AGENCY: Securities and Exchange... Alternative Funds Master Trust (``Master Trust''), Grosvenor Alternative Funds (``GAF Trust''), and Grosvenor... calling (202) 551-8090. Applicants' Representations 1. The Master Trust \\1\\ and the GAF Trust...

  20. 78 FR 34410 - First Trust Exchange-Traded Fund, et al.; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-07

    ...] First Trust Exchange-Traded Fund, et al.; Notice of Application June 3, 2013. AGENCY: Securities and... disclosure requirements. Applicants: First Trust Exchange-Traded Fund, First Trust Exchange- Traded Fund II, First Trust Exchange-Traded Fund III, First Trust Exchange-Traded Fund IV, First Trust Exchange-Traded...

  1. Trust models for efficient communication in Mobile Cloud Computing and their applications to e-Commerce

    NASA Astrophysics Data System (ADS)

    Pop, Florin; Dobre, Ciprian; Mocanu, Bogdan-Costel; Citoteanu, Oana-Maria; Xhafa, Fatos

    2016-11-01

    Managing the large dimensions of data processed in distributed systems that are formed by datacentres and mobile devices has become a challenging issue with an important impact on the end-user. Therefore, the management process of such systems can be achieved efficiently by using uniform overlay networks, interconnected through secure and efficient routing protocols. The aim of this article is to advance our previous work with a novel trust model based on a reputation metric that actively uses the social links between users and the model of interaction between them. We present and evaluate an adaptive model for the trust management in structured overlay networks, based on a Mobile Cloud architecture and considering a honeycomb overlay. Such a model can be useful for supporting advanced mobile market-share e-Commerce platforms, where users collaborate and exchange reliable information about, for example, products of interest and supporting ad-hoc business campaigns

  2. Success requires seizing opportunities.

    PubMed

    Melum, M M

    1987-01-01

    The well-trained group of professionals had worked hard at the business they knew well. Their efforts had paid off--they were highly respected for their quality; their business grew; they had a close, trusting relationship with their customers; and they had the satisfaction of running their business as they alone knew to be best. As they looked ahead, they saw the personal security of a bright, safe future, of more of the same success. Then, slowly at first but building steadily to a feverish pace, their business and their lives were uprooted and torn apart in an all-encompassing economic and social earthquake. Now, with a force the professionals could hardly believe, let alone keep track of, the very definition of their business was changing, the trusting relationship with customers began to break down as massive numbers of new and different competitors vied for their business, many new players began to control how they ran their business, and security vanished into a confusion of competition, entrepreneurship, and risk.

  3. A robust trust establishment scheme for wireless sensor networks.

    PubMed

    Ishmanov, Farruh; Kim, Sung Won; Nam, Seung Yeob

    2015-03-23

    Security techniques like cryptography and authentication can fail to protect a network once a node is compromised. Hence, trust establishment continuously monitors and evaluates node behavior to detect malicious and compromised nodes. However, just like other security schemes, trust establishment is also vulnerable to attack. Moreover, malicious nodes might misbehave intelligently to trick trust establishment schemes. Unfortunately, attack-resistance and robustness issues with trust establishment schemes have not received much attention from the research community. Considering the vulnerability of trust establishment to different attacks and the unique features of sensor nodes in wireless sensor networks, we propose a lightweight and robust trust establishment scheme. The proposed trust scheme is lightweight thanks to a simple trust estimation method. The comprehensiveness and flexibility of the proposed trust estimation scheme make it robust against different types of attack and misbehavior. Performance evaluation under different types of misbehavior and on-off attacks shows that the detection rate of the proposed trust mechanism is higher and more stable compared to other trust mechanisms.

  4. The Trust Project - Symbiotic Human Machine Teams: Social Cueing for Trust and Reliance

    DTIC Science & Technology

    2016-06-30

    AFRL-RH-WP-TR-2016-0096 THE TRUST PROJECT - SYMBIOTIC HUMAN-MACHINE TEAMS: SOCIAL CUEING FOR TRUST & RELIANCE Susan Rivers, Monika Lohani, Marissa...30 JUN 2012 – 30 JUN 2016 4. TITLE AND SUBTITLE THE TRUST PROJECT - SYMBIOTIC HUMAN-MACHINE TEAMS: SOCIAL CUEING FOR TRUST & RELIANCE 5a. CONTRACT

  5. Security Protection on Trust Delegated Data in Public Mobile Networks

    NASA Astrophysics Data System (ADS)

    Weerasinghe, Dasun; Rajarajan, Muttukrishnan; Rakocevic, Veselin

    This paper provides detailed solutions for trust delegation and security protection for medical records in public mobile communication networks. The solutions presented in this paper enable the development of software for mobile devices that can be used by emergency medical units in urgent need of sensitive personal information about unconscious patients. In today's world, technical improvements in mobile communication systems mean that users can expect to have access to data at any time regardless of their location. This paper presents a token-based procedure for the data security at a mobile device and delegation of trust between a requesting mobile unit and secure medical data storage. The data security at the mobile device is enabled using identity based key generation methodology.

  6. Combining Trust and Behavioral Analysis to Detect Security Threats in Open Environments

    DTIC Science & Technology

    2010-11-01

    behavioral feature values. This would provide a baseline notional object trust and is formally defined as follows: TO(1)[0, 1] = ∑ 0,n:νbt wtP (S) (8...TO(2)[0, 1] = ∑ wtP (S) · identity(O,P ) (9) 28- 12 RTO-MP-IST-091 Combining Trust and Behavioral Analysis to Detect Security Threats in Open...respectively. The wtP weight function determines the significance of a particular behavioral feature in the final trust calculation. Note that the weight

  7. 75 FR 497 - Self-Regulatory Organizations; The Depository Trust Company; Notice of Filing of Proposed Rule...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-05

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-61249; File No. SR-DTC-2009-17] Self-Regulatory Organizations; The Depository Trust Company; Notice of Filing of Proposed Rule Change To Allow The Depository Trust Company To Provide Settlement Services to European Central Counterparty Limited for U.S. Securities Traded on European Trading Venue...

  8. Air Force Journal of Logistics. Volume 34, Numbers 3 and 4, 2011

    DTIC Science & Technology

    2011-01-01

    best value. Since these scores are mathematically derived, they violate some agencies* procurement policies (those that require qualitative ratings...the trust fund assets will be exhausted and Social Security will lack the resources to pay all promised benefits. According to SSA actuaries ...education programs (masters degrees) than either the Air Force or the Army. This was quite surprising. Mathematical Model to Determine Senior Officers

  9. 77 FR 45381 - Cash Account Trust, et al.; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-31

    ..., DWS Market Trust, DWS Money Funds, DWS Money Market Trust, DWS Municipal Trust, DWS Portfolio Trust, DWS Securities Trust, DWS State Tax-Free Income Series, DWS Target Date Series, DWS Target Fund, DWS Tax Free Trust, DWS Value Series, Inc., DWS Variable Series I, DWS Variable Series II, Investors Cash...

  10. Social trust and grassroots governance in rural China.

    PubMed

    Huhe, Narisong; Chen, Jie; Tang, Min

    2015-09-01

    The relationship between social trust and governance has been one of the focal points of the academic and policy-making communities. Empirical studies on this relationship, however, have focused mostly on democracies. The scarcity of such studies in authoritarian countries has left many important questions unanswered: Is social trust associated with effective governance only in democratic settings? Can social trust improve the quality of governance in non-democracies as well? Drawing on data from 2005 China General Social Survey-a representative survey conducted nationwide at both the individual- and village-level in rural China, this paper attempts to answer these questions empirically by examining the relationship between social trust and the quality of governance in rural China. The findings reveal that different types of social trust-particularized trust and generalized trust-correspond with different effects in rural governance: whereas villagers' trust in people whom they knew personally was positively and significantly associated with the provision of various public goods and services, their trust in strangers had virtually no impact on rural governance. Copyright © 2015 Elsevier Inc. All rights reserved.

  11. Trustful societies, trustful individuals, and health: An analysis of self-rated health and social trust using the World Value Survey.

    PubMed

    Jen, Min Hua; Sund, Erik R; Johnston, Ron; Jones, Kelvyn

    2010-09-01

    This study analyses the relationships between self-rated health and both individual and mean national social trust, focusing on a variant of Wilkinson's hypothesis that individuals will be less healthy the greater the lack of social cohesion in a country. It employs multilevel modelling on World Values Survey data across 69 countries with a total sample of 160,436 individuals. The results show that self-rated health are positively linked to social trust at both country and individual levels after controlling for individual socio-demographic and income variables plus individual social trust; increased trust is associated with better health. Moreover, this analysis of social trust gives some insight into distinctive results for the former Soviet Bloc countries, which have high reported levels of poor health, alongside the Scandinavian countries which have high levels of trust and better health situations. Our results support and extend the Wilkinson hypothesis that the level of trust, an indicator of social cohesion, is predictive of individuals' health. Copyright 2010 Elsevier Ltd. All rights reserved.

  12. Social Trust, Social Partner Time and Television Time

    ERIC Educational Resources Information Center

    Patulny, Roger

    2011-01-01

    Social trust is an important phenomenon, but the influence of important time-based measures upon trust has not been examined. Such measures include social contact and anti-social activity, such as television watching, which allows for the co-presence of other people. This paper reports on associations between trust and weighted means of co-present…

  13. Research of Trust Chain of Operating System

    NASA Astrophysics Data System (ADS)

    Li, Hongjiao; Tian, Xiuxia

    Trust chain is one of the key technologies in designing secure operating system based on TC technology. Constructions of trust chain and trust models are analyzed. Future works in these directions are discussed.

  14. 78 FR 21428 - Royce Focus Trust, Inc., et al.;

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-10

    ...] Royce Focus Trust, Inc., et al.; Notice of Application April 4, 2013. AGENCY: Securities and Exchange.... Applicants: Royce Focus Trust, Inc. (``RFT''), Royce Value Trust, Inc. (``RVT''), Royce Micro-Cap Trust, Inc... prior order (``Prior Order'').\\1\\ \\1\\ Royce Global Trust, Inc., et al., Investment Company Act Release...

  15. 77 FR 25514 - Northern Trust Investments, Inc., et al.; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-30

    ... Trust Investments, Inc., et al.; Notice of Application April 24, 2012. AGENCY: Securities and Exchange... sections 12(d)(1)(A) and (B) of the Act. Applicants: Northern Trust Investments, Inc. (``Northern Trust''), FlexShares Trust (``Trust''), and Foreside Fund Services, LLC (``Foreside''). Summary of Application...

  16. 78 FR 5846 - Securian Funds Trust, et al.; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-28

    ...] Securian Funds Trust, et al.; Notice of Application January 22, 2013. AGENCY: Securities and Exchange... the Act to invest in certain financial instruments. Applicants: Securian Funds Trust (the ``Trust... Trust is organized as a Delaware statutory trust and is registered under the Act as an open-end...

  17. 49 CFR 1013.1 - The independence of the trustee of a voting trust.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... corporate securities constitute the corpus of the trust. (e) The trustee should be entitled to receive cash... of voting securities is purchased. (b) In voting the trusteed stock, the trustee should maintain...

  18. 49 CFR 1013.1 - The independence of the trustee of a voting trust.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... corporate securities constitute the corpus of the trust. (e) The trustee should be entitled to receive cash... of voting securities is purchased. (b) In voting the trusteed stock, the trustee should maintain...

  19. 49 CFR 1013.1 - The independence of the trustee of a voting trust.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... corporate securities constitute the corpus of the trust. (e) The trustee should be entitled to receive cash... of voting securities is purchased. (b) In voting the trusteed stock, the trustee should maintain...

  20. 49 CFR 1013.1 - The independence of the trustee of a voting trust.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... corporate securities constitute the corpus of the trust. (e) The trustee should be entitled to receive cash... of voting securities is purchased. (b) In voting the trusteed stock, the trustee should maintain...

  1. 49 CFR 1013.1 - The independence of the trustee of a voting trust.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... corporate securities constitute the corpus of the trust. (e) The trustee should be entitled to receive cash... of voting securities is purchased. (b) In voting the trusteed stock, the trustee should maintain...

  2. Understanding Patterns of Social Support and Their Relationship to an ART Adherence Intervention Among Adults in Rural Southwestern Uganda.

    PubMed

    Atukunda, Esther C; Musiimenta, Angella; Musinguzi, Nicholas; Wyatt, Monique A; Ashaba, Justus; Ware, Norma C; Haberer, Jessica E

    2017-02-01

    SMS is a widely used technology globally and may also improve ART adherence, yet SMS notifications to social supporters following real-time detection of missed doses showed no clear benefit in a recent pilot trial. We examine the demographic and social-cultural dynamics that may explain this finding. In the trial, 63 HIV-positive individuals initiating ART received a real-time adherence monitor and were randomized to two types of SMS reminder interventions versus a control (no SMS). SMS notifications were also sent to 45 patient-identified social supporters for sustained adherence lapses. Like participants, social supporters were interviewed at enrollment, following their matched participant's adherence lapse and at exit. Social supporters with regular income (RR = 0.27, P = 0.001) were significantly associated with fewer adherence lapses. Instrumental support was associated with fewer adherence lapses only among social supporters who were food secure (RR = 0.58, P = 0.003). Qualitative interview data revealed diverse and complex economic and relationship dynamics, affecting social support. Resource availability in emotionally positive relationships seemingly facilitated helpful support, while limited resources prevented active provision of support for many. Effective social support appeared subject to social supporters' food security, economic stability and a well-functioning social network dependent on trust and supportive disclosure.

  3. Trust and Online Reputation Systems

    NASA Astrophysics Data System (ADS)

    Kwan, Ming; Ramachandran, Deepak

    Web 2.0 technologies provide organizations with unprecedented opportunities to expand and solidify relationships with their customers, partners, and employees—while empowering firms to define entirely new business models focused on sharing information in online collaborative environments. Yet, in and of themselves, these technologies cannot ensure productive online interactions. Leading enterprises that are experimenting with social networks and online communities are already discovering this fact and along with it, the importance of establishing trust as the foundation for online collaboration and transactions. Just as today's consumers must feel secure to bank, exchange personal information and purchase products and services online; participants in Web 2.0 initiatives will only accept the higher levels of risk and exposure inherent in e-commerce and Web collaboration in an environment of trust. Indeed, only by attending to the need to cultivate online trust with customers, partners and employees will enterprises ever fully exploit the expanded business potential posed by Web 2.0. But developing online trust is no easy feat. While various preliminary attempts have occurred, no definitive model for establishing or measuring it has yet been established. To that end, nGenera has identified three, distinct dimensions of online trust: reputation (quantitative-based); relationship (qualitative-based) and process (system-based). When considered together, they form a valuable model for understanding online trust and a toolbox for cultivating it to support Web 2.0 initiatives.

  4. Parochial trust and cooperation across 17 societies

    PubMed Central

    Romano, Angelo; Balliet, Daniel; Liu, James H.

    2017-01-01

    International challenges such as climate change, poverty, and intergroup conflict require countries to cooperate to solve these complex problems. However, the political tide in many countries has shifted inward, with skepticism and reluctance to cooperate with other countries. Thus, cross-societal investigations are needed to test theory about trust and cooperation within and between groups. We conducted an experimental study in 17 countries designed to test several theories that explain why, who, and where people trust and cooperate more with ingroup members, compared with outgroup members. The experiment involved several interactions in the trust game, either as a trustor or trustee. We manipulated partner group membership in the trust game (ingroup, outgroup, or unknown) and if their reputation was at stake during the interaction. In addition to the standard finding that participants trust and cooperate more with ingroup than outgroup members, we obtained findings that reputational concerns play a decisive role for promoting trust and cooperation universally across societies. Furthermore, men discriminated more in favor of their ingroup than women. Individual differences in cooperative preferences, as measured by social value orientation, predicted cooperation with both ingroup and outgroup members. Finally, we did not find support for three theories about the cross-societal conditions that influence the degree of ingroup favoritism observed across societies (e.g., material security, religiosity, and pathogen stress). We discuss the implications for promoting cooperation within and between countries. PMID:29133403

  5. 77 FR 16873 - First Trust Exchange-Traded Fund, et al.; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-22

    ...] First Trust Exchange-Traded Fund, et al.; Notice of Application March 15, 2012. AGENCY: Securities and... exemption from sections 17(a)(1) and (a)(2) of the Act. Applicants: First Trust Exchange-Traded Fund (the ``Initial Trust''), First Trust Exchange-Traded Fund II (``Trust II''), First Trust Exchange-Traded Fund III...

  6. Security management based on trust determination in cognitive radio networks

    NASA Astrophysics Data System (ADS)

    Li, Jianwu; Feng, Zebing; Wei, Zhiqing; Feng, Zhiyong; Zhang, Ping

    2014-12-01

    Security has played a major role in cognitive radio networks. Numerous researches have mainly focused on attacking detection based on source localization and detection probability. However, few of them took the penalty of attackers into consideration and neglected how to implement effective punitive measures against attackers. To address this issue, this article proposes a novel penalty mechanism based on cognitive trust value. The main feature of this mechanism has been realized by six functions: authentication, interactive, configuration, trust value collection, storage and update, and punishment. Data fusion center (FC) and cluster heads (CHs) have been put forward as a hierarchical architecture to manage trust value of cognitive users. Misbehaving users would be punished by FC by declining their trust value; thus, guaranteeing network security via distinguishing attack users is of great necessity. Simulation results verify the rationality and effectiveness of our proposed mechanism.

  7. Securing Resources in Collaborative Environments: A Peer-to-peerApproach

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Berket, Karlo; Essiari, Abdelilah; Thompson, Mary R.

    2005-09-19

    We have developed a security model that facilitates control of resources by autonomous peers who act on behalf of collaborating users. This model allows a gradual build-up of trust. It enables secure interactions among users that do not necessarily know each other and allows them to build trust over the course of their collaboration. This paper describes various aspects of our security model and describes an architecture that implements this model to provide security in pure peer-to-peer environments.

  8. 75 FR 45179 - Virtus Opportunities Trust, et al.; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-02

    ... Opportunities Trust, et al.; Notice of Application Date: July 27, 2010. AGENCY: Securities and Exchange... of other registered open-end management investment companies and unit investment trusts (``UITs... under common control with PVA. Applicants: (a) Virtus Opportunities Trust (the ``Trust''), including the...

  9. Household food insecurity is inversely associated with social capital and health in females from special supplemental nutrition program for women, infants, and children households in Appalachian Ohio.

    PubMed

    Walker, Jennifer L; Holben, David H; Kropf, Mary L; Holcomb, John P; Anderson, Heidi

    2007-11-01

    Food insecurity has been negatively associated with social capital (a measure of perceived social trust and community reciprocity) and health status. Yet, these factors have not been studied extensively among women from households participating in the Special Supplemental Nutrition Program for Women, Infants, and Children (WIC) or the WIC Farmers' Market Nutrition Program. A cross-sectional, self-administered, mailed survey was conducted in Athens County, Ohio, to examine the household food security status, social capital, and self-rated health status of women from households receiving WIC benefits alone (n=170) and those from households receiving both WIC and Farmers' Market Nutrition Program benefits (n=65), as well as the relationship of food security, social capital, and self-rated health status. Household food security and perceived health status were not significantly different between groups; however, high social capital was greater (chi(2)=8.156, P=0.004) among WIC, compared to WIC/Farmers' Market Nutrition Program group respondents. Overall, household food insecurity was inversely associated with perceived health status (r=-0.229, P=0.001) and social capital (r=0.337, P<0.001). Enabling networking among clients, leading to client-facilitated programs and projects, and developing programs that strengthen social capital, including community-based mentoring programs and nutrition education programs that are linked to community-based activities, are needed, as is additional research to verify these findings.

  10. 78 FR 41462 - Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing of a Proposed Rule Change...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-10

    ... Asset. The term ``Currency,'' as used in the proposed rule, means one or more currencies, or currency...; Commodity-Based Trust Shares; Currency Trust Shares; Commodity Index Trust Shares; Commodity Futures Trust Shares; Partnership Units; Trust Units; Managed Trust Securities; and Currency Warrants. Specifically...

  11. Scheduling multimedia services in cloud computing environment

    NASA Astrophysics Data System (ADS)

    Liu, Yunchang; Li, Chunlin; Luo, Youlong; Shao, Yanling; Zhang, Jing

    2018-02-01

    Currently, security is a critical factor for multimedia services running in the cloud computing environment. As an effective mechanism, trust can improve security level and mitigate attacks within cloud computing environments. Unfortunately, existing scheduling strategy for multimedia service in the cloud computing environment do not integrate trust mechanism when making scheduling decisions. In this paper, we propose a scheduling scheme for multimedia services in multi clouds. At first, a novel scheduling architecture is presented. Then, We build a trust model including both subjective trust and objective trust to evaluate the trust degree of multimedia service providers. By employing Bayesian theory, the subjective trust degree between multimedia service providers and users is obtained. According to the attributes of QoS, the objective trust degree of multimedia service providers is calculated. Finally, a scheduling algorithm integrating trust of entities is proposed by considering the deadline, cost and trust requirements of multimedia services. The scheduling algorithm heuristically hunts for reasonable resource allocations and satisfies the requirement of trust and meets deadlines for the multimedia services. Detailed simulated experiments demonstrate the effectiveness and feasibility of the proposed trust scheduling scheme.

  12. Social capital, the miniaturisation of community and self-reported global and psychological health.

    PubMed

    Lindström, Martin

    2004-08-01

    Social capital is often operationalised as social participation in the activities of the formal and informal networks of civil society and/or as generalised trust. Social participation and trust are two aspects of social capital that mutually affect each other, according to the literature. In recent years there has been an increased attention to the fact that generalised trust decreases for every new birth cohort that reaches adulthood in the USA, while social participation may take new forms such as ideologically much narrower single-issue movements that do not enhance trust. The phenomenon has been called "the miniaturisation of community". The effects of similar patterns in Sweden on self-reported health and self-reported psychological health are analysed. The odds ratios of bad self-reported global health are highest in the low-social capital category (low-social participation/low trust), but the miniaturisation of community and low-social participation/high-trust categories also have significantly higher odds ratios than the high-social capital category (high-social participation/high trust). The odds ratios of bad self-reported psychological health are significantly higher in both the low-social capital category and the miniaturisation of community category compared to the high-social capital category, while the low-social participation/high-trust category does not differ from the high-social capital reference group. Copyright 2003 Elsevier Ltd.

  13. Using social outcomes to inform decision-making in schizophrenia: Relationships with symptoms and functioning.

    PubMed

    Campellone, Timothy R; Fisher, Aaron J; Kring, Ann M

    2016-02-01

    The outcomes of the decisions we make can be used to inform subsequent choices and behavior. We investigated whether and how people with and without schizophrenia use positive and negative social outcomes and emotional displays to inform decisions to place trust in social partners. We also investigated the impact of reversals in social partners' behavior on decisions to trust. Thirty-two people with schizophrenia and 29 control participants completed a task in which they decided how much trust to place in social partners' showing either a dynamic emotional (smiling, scowling) or neutral display. Interactions were predetermined to result in positive (trust reciprocated) or negative (trust abused) outcomes, and we modeled changes in trust decisions over the course of repeated interactions. Compared to controls, people with schizophrenia were less sensitive to positive social outcomes in that they placed less trust in trustworthy social partners during initial interactions. By contrast, people with schizophrenia were more sensitive to negative social outcomes during initial interactions with untrustworthy social partners, placing less trust in these partners compared to controls. People with schizophrenia did not differ from controls in detecting social partner behavior reversals from trustworthy to untrustworthy; however, they had difficulties detecting reversals from untrustworthy to trustworthy. Importantly, decisions to trust were associated with real-world social functioning. We discuss the implications of these findings for understanding social engagement among people with schizophrenia and the development of psychosocial interventions for social functioning. (c) 2016 APA, all rights reserved).

  14. 78 FR 2456 - Fidelity Commonwealth Trust, et al.; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-11

    ...] Fidelity Commonwealth Trust, et al.; Notice of Application January 7, 2013. AGENCY: Securities and Exchange... companies and unit investment trusts outside of the same group of investment companies as the series to...-feeder structure. Applicants: Fidelity Commonwealth Trust (the ``Trust''), Fidelity Management & Research...

  15. 78 FR 63255 - Arden Investment Series Trust, et al.; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-23

    ... Series Trust, et al.; Notice of Application October 17, 2013. AGENCY: Securities and Exchange Commission... Series Trust (the ``Trust'') and Arden Asset Management LLC (``Arden'') (collectively, the ``Applicants... Accounts'') holds shares of Arden Variable Alternative Strategies Fund, an existing portfolio of the Trust...

  16. 78 FR 65720 - Cambria ETF Trust, et al.; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-01

    ...] Cambria ETF Trust, et al.; Notice of Application October 28, 2013. AGENCY: Securities and Exchange... (e) certain registered management investment companies and unit investment trusts outside of the same group of investment companies as the series to acquire Shares. Applicants: Cambria ETF Trust (``Trust...

  17. 75 FR 11585 - Lincoln Variable Insurance Products Trust, et al.; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-11

    ...] Lincoln Variable Insurance Products Trust, et al.; Notice of Application March 5, 2010. AGENCY: Securities... registered open-end management investment companies and unit investment trusts (``UITs'') that are within and...: Lincoln Variable Insurance Products Trust (``Trust'') and Lincoln Investment Advisors Corporation...

  18. 77 FR 36022 - Notice of Application; Precidian ETFs Trust, et al.

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-15

    ... Application; Precidian ETFs Trust, et al. June 8, 2012. AGENCY: Securities and Exchange Commission...). \\1\\ Precidian ETFs Trust, Investment Company Act Release Nos. 29692 (June 9, 2011) (notice) and 29712 (July 1, 2011) (order). Applicants: Precidian ETFs Trust (``Trust''), Precidian Funds LLC (``Adviser...

  19. 78 FR 3044 - Exchange Traded Spreads Trust, et al.; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-15

    ... Traded Spreads Trust, et al.; Notice of Application January 9, 2013. AGENCY: Securities and Exchange... Trust (``Trust''), and ALPS Distributors, Inc. (``Distributor''). SUMMARY: Summary of Application: Applicants request an order that permits: (a) Actively-managed series of the Trust to issue shares (``Shares...

  20. Integrated Social and Quality of Service Trust Management of Mobile Groups in Ad Hoc Networks

    DTIC Science & Technology

    2013-01-01

    high resiliency to malicious attacks and misbehaving nodes. Keywords—trust management; mobile ad hoc networks; QoS trust; social trust; trust...paper we address an importance issue of trust management protocol design for MANETs: trust bias minimization despite misbehaving nodes performing

  1. Bootstrapping and Maintaining Trust in the Cloud

    DTIC Science & Technology

    2016-12-01

    proliferation and popularity of infrastructure-as-a- service (IaaS) cloud computing services such as Amazon Web Services and Google Compute Engine means...IaaS trusted computing system: • Secure Bootstrapping – the system should enable the tenant to securely install an initial root secret into each cloud ...elastically instantiated and terminated. Prior cloud trusted computing solutions address a subset of these features, but none achieve all. Excalibur [31] sup

  2. 17 CFR 270.14a-3 - Exemption from section 14(a) of the Act for certain registered unit investment trusts and their...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... held by the Trust for purchase of the securities); (2) If, within ninety days from the time that the... by a corporation and which have their interest or dividend rate fixed at the time they are issued; (2... subdivision thereof; (3) Government securities; and (4) Units of a previously issued series of the Trust...

  3. 17 CFR 270.14a-3 - Exemption from section 14(a) of the Act for certain registered unit investment trusts and their...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... held by the Trust for purchase of the securities); (2) If, within ninety days from the time that the... by a corporation and which have their interest or dividend rate fixed at the time they are issued; (2... subdivision thereof; (3) Government securities; and (4) Units of a previously issued series of the Trust...

  4. 17 CFR 270.14a-3 - Exemption from section 14(a) of the Act for certain registered unit investment trusts and their...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... held by the Trust for purchase of the securities); (2) If, within ninety days from the time that the... by a corporation and which have their interest or dividend rate fixed at the time they are issued; (2... subdivision thereof; (3) Government securities; and (4) Units of a previously issued series of the Trust...

  5. 17 CFR 270.14a-3 - Exemption from section 14(a) of the Act for certain registered unit investment trusts and their...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... held by the Trust for purchase of the securities); (2) If, within ninety days from the time that the... by a corporation and which have their interest or dividend rate fixed at the time they are issued; (2... subdivision thereof; (3) Government securities; and (4) Units of a previously issued series of the Trust...

  6. 17 CFR 270.14a-3 - Exemption from section 14(a) of the Act for certain registered unit investment trusts and their...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... held by the Trust for purchase of the securities); (2) If, within ninety days from the time that the... by a corporation and which have their interest or dividend rate fixed at the time they are issued; (2... subdivision thereof; (3) Government securities; and (4) Units of a previously issued series of the Trust...

  7. Trust development: testing a new model in undergraduate roommate relationships.

    PubMed

    Whitmore, Corrie B; Dunsmore, Julie C

    2014-01-01

    Interpersonal trust is a vital component of social relationships. In this study the roles of parental attachment, perceived similarity of trustee to self, and social exchange processes in trust development were investigated longitudinally with randomly assigned, same-sex undergraduate roommates during emerging adulthood. A total of 214 first-year students completed weekly self-report measures during the first 5 weeks of the fall semester. Perceived similarity measured the second week and social exchange with roommates across the 5 weeks predicted participants' trust in their roommate, with social exchange mediating the relation between perceived similarity and trust. Results highlight interrelations of social exchange and trust in established relationships.

  8. The Role of Social Trust in Reducing Long-Term Truancy and Forming Human Capital in Japan

    ERIC Educational Resources Information Center

    Yamamura, Eiji

    2011-01-01

    This paper attempts to examine how social trust influences human capital formation using prefectural level data in Japan. To this end, I constructed a proxy for social trust, based on the Japanese General Social Surveys. After controlling for socioeconomic factors, I found that social trust plays an important role in reducing the rate of long-term…

  9. 78 FR 26407 - Goldman Sachs Trust II, et al.; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-06

    ... Sachs Trust II, et al.; Notice of Application April 29, 2013. AGENCY: Securities and Exchange Commission... would grant relief from certain disclosure requirements. APPLICANTS: Goldman Sachs Trust II (the ``Trust...'', each of GSAM and GSAMI an ``Adviser'' and collectively, ``Advisers,'' and together with the Trust...

  10. 78 FR 14367 - Market Vectors ETF Trust, et al.; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-05

    ...] Market Vectors ETF Trust, et al.; Notice of Application February 27, 2013. AGENCY: Securities and... companies and unit investment trusts outside of the same group of investment companies as the series to...-feeder structure. Applicants: Market Vectors ETF Trust (the ``Trust''), Van Eck Associates Corporation...

  11. 77 FR 57597 - Wells Fargo Funds Trust, et al.; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-18

    ...] Wells Fargo Funds Trust, et al.; Notice of Application September 12, 2012. AGENCY: Securities and... companies and unit investment trusts (``UITs'') that are within and outside the same group of investment... the Act to invest in certain financial instruments. Applicants: Wells Fargo Funds Trust (``Trust...

  12. 78 FR 63522 - Syntax Analytics, LLC and Syntax ETF Trust; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-24

    ... Analytics, LLC and Syntax ETF Trust; Notice of Application October 18, 2013. AGENCY: Securities and Exchange... Trust (``Trust''). Summary of Application: Applicants request an order that permits: (a) Actively... unit investment trusts outside of the same group of investment companies as the series to acquire...

  13. 78 FR 30351 - LocalShares Investment Trust, et al.; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-22

    ...] LocalShares Investment Trust, et al.; Notice of Application May 15, 2013. AGENCY: Securities and... sections 12(d)(1)(A) and (B) of the Act. Applicants: LocalShares Investment Trust (the ``Trust''), Local... (e) certain registered management investment companies and unit investment trusts outside of the same...

  14. 75 FR 33369 - EQ Advisors Trust, et al.; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-11

    ...] EQ Advisors Trust, et al.; Notice of Application June 4, 2010. AGENCY: Securities and Exchange... trusts (``UITs'') that are within or outside the same group of investment companies, and (b) permit... to invest in certain financial instruments. Applicants: EQ Advisors Trust, AXA Premier VIP Trust...

  15. 76 FR 77857 - Seasons Series Trust, et al.; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-14

    ...] Seasons Series Trust, et al.; Notice of Application December 8, 2011. AGENCY: Securities and Exchange... 12d1-2 under the Act to invest in certain financial instruments. Applicants: Seasons Series Trust (``Seasons''), SunAmerica Series Trust (``Series Trust''), VALIC Company II (``VALIC II''), SunAmerica Series...

  16. 76 FR 59455 - Curian Series Trust and Curian Capital, LLC; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-26

    ...] Curian Series Trust and Curian Capital, LLC; Notice of Application AGENCY: Securities and Exchange... Series Trust (``Trust'') and Curian Capital, LLC (the ``Adviser''). DATES: Filing Dates: The application.... Applicants, Curian Series Trust, 7601 Technology Way, Denver, CO 80237. FOR FURTHER INFORMATION CONTACT: Jaea...

  17. 76 FR 47617 - BofA Funds Series Trust, et al.;

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-05

    ... Funds Series Trust, et al.; Notice of Application August 1, 2011. AGENCY: Securities and Exchange... Funds Series Trust (``BAFST'' or ``Trust''), on behalf of its series (the ``Funds'', BofA Advisors, LLC... Incorporated (together with any successor, ``MLPF&S'') (Trust, Advisor and MLPF&S, the ``Applicants'').\\1\\ \\1...

  18. 17 CFR 300.104 - Trust accounts.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Trust accounts. 300.104... Customers of Sipc Members § 300.104 Trust accounts. (a) A trust account held with a member shall be deemed a “qualifying trust account” if it is held on behalf of a valid and subsisting express trust created by a...

  19. When paranoia makes sense.

    PubMed

    Kramer, Roderick M

    2002-07-01

    On September 11, 2001, in the space of a few horrific minutes, Americans realized the fragility of trust. The country's evident vulnerability to deadly terrorism rocked our faith in the systems we rely on for security. Our trust was shaken again only a few months later with the stunning collapse of Enron, forcing us to question many of the methods and assumptions underpinning the way we work. These two crises are obviously very different, yet both serve as reminders of the perils of trusting too much. The abiding belief that trust is a strength now seems dangerously naive. This new doubtfulness runs contrary to most management literature, which has traditionally touted trust as an organizational asset. It's an easy case to make. When there are high levels of trust, employees can fully commit themselves to the organization because they can be confident that their efforts will be recognized and rewarded. Trust also means that leaders don't have to worry so much about putting the right spin on things. They can act and speak forthrightly and focus on essentials. In short, trust is an organizational superglue. Nevertheless, two decades of research on trust and cooperation in organizations have convinced social psychologist Roderick Kramer that--despite its costs--distrust can be beneficial in the workplace. Kramer has observed that a moderate form of suspicion, which he calls prudent paranoia, can in many cases prove highly beneficial to the distrustful individual or organization. In this article, he describes situations in which prudent paranoia makes sense and shows how, when properly deployed, it can serve as a powerful morale booster--even a competitive weapon--for organizations.

  20. Social Security Disability Insurance Enrollment and Health Care Employment.

    PubMed

    Pellegrini, Lawrence C; Geissler, Kimberley H

    2017-09-21

    To examine the relationship between Social Security Disability Insurance (SSDI) enrollment and health care employment. State-year level data from government and other publicly available sources for all states (2000-2014). Population-weighted linear regression analyses model associations between each health care employment measure and each SSDI enrollment measure (i.e., SSDI overall, physical, or mental health enrollment rates), controlling for factors associated with health care employment, state fixed effects, and secular time trends. Data are gathered from publicly available sources. A one standard deviation increase in SSDI enrollment per 100,000 population is associated with a statistically significant 2.6 and 4.5 percent increase in the mean employment rate per 100,000 population for health care practitioner and technical occupations and health care support occupations, respectively. The size of this relationship varies by the type of disabling condition for SSDI enrollment (physical versus mental health). Social Security Disability Insurance enrollment is significantly associated with health care employment at the state level. Quantifying the magnitude of this relationship is important given high SSDI enrollment rates as well as evolving policy and demographic shifts related to the SSDI program. © Health Research and Educational Trust.

  1. Trust-Based Security Level Evaluation Using Bayesian Belief Networks

    NASA Astrophysics Data System (ADS)

    Houmb, Siv Hilde; Ray, Indrakshi; Ray, Indrajit; Chakraborty, Sudip

    Security is not merely about technical solutions and patching vulnerabilities. Security is about trade-offs and adhering to realistic security needs, employed to support core business processes. Also, modern systems are subject to a highly competitive market, often demanding rapid development cycles, short life-time, short time-to-market, and small budgets. Security evaluation standards, such as ISO 14508 Common Criteria and ISO/IEC 27002, are not adequate for evaluating the security of many modern systems for resource limitations, time-to-market, and other constraints. Towards this end, we propose an alternative time and cost effective approach for evaluating the security level of a security solution, system or part thereof. Our approach relies on collecting information from different sources, who are trusted to varying degrees, and on using a trust measure to aggregate available information when deriving security level. Our approach is quantitative and implemented as a Bayesian Belief Network (BBN) topology, allowing us to reason over uncertain information and seemingly aggregating disparate information. We illustrate our approach by deriving the security level of two alternative Denial of Service (DoS) solutions. Our approach can also be used in the context of security solution trade-off analysis.

  2. Trusted Truck(R) II (phase A).

    DOT National Transportation Integrated Search

    2009-01-01

    The Trusted Truck Program was initiated in 2003 as a joint effort by NTRCI, Volvo and UT. The vision of the Trusted Truck program is to develop a secure and "trusted" transport solution from pickup to delivery. The program's objective is to incre...

  3. 78 FR 59985 - Variable Insurance Trust, et al.;

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-30

    ... Trust, et al.; Notice of Application September 24, 2013. AGENCY: Securities and Exchange Commission... Trust (the ``Fund'') and MFund Services LLC (``MFund'') (collectively, ``Applicants''). SUMMARY: Summary... Services LLC, 22 High Street, Huntington, NY 11743 and Jerry Szilagyi, Variable Insurance Trust, 5...

  4. Representing Trust in Cognitive Social Simulations

    NASA Astrophysics Data System (ADS)

    Pollock, Shawn S.; Alt, Jonathan K.; Darken, Christian J.

    Trust plays a critical role in communications, strength of relationships, and information processing at the individual and group level. Cognitive social simulations show promise in providing an experimental platform for the examination of social phenomena such as trust formation. This paper describes the initial attempts at representation of trust in a cognitive social simulation using reinforcement learning algorithms centered around a cooperative Public Commodity game within a dynamic social network.

  5. A Study on the Interrelations between the Security-Related Antecedents of Customers' Online Trust

    NASA Astrophysics Data System (ADS)

    Peikari, Hamid Reza

    Despite the wide attention of previous studies to explore the influence of different security-related factors on customers' online trust, the interrelations between such factors and their direct and indirect influences on customers' trust have been neglected. This study investigates the direct and indirect interrelations between the factors authentication, encryption, technical protection and externally provided assurances including third party security and privacy seals with customers' trust in the business-to-customer (B2C) environment. The data was collected from 238 respondents and after the test of reliability and validity of the scale, the hypotheses were tested using structural equation modeling. The results showed that customers' perception of encryption and authentication mechanisms implemented by a Website have a positive significant influence on their perceived technical protection while technical protection was found to significantly influence customers' trust to the Website. However, the analysis did not find any relation between the third party assurance and customers' trust, indicating that despite the high expenses companies involve to obtain such assurances from reputed third parties, such mechanisms and assurances do not have any direct or indirect significant influence on customers' trust; which raises questions on the value of such mechanisms .finally, after discussing the findings and implication of this study for both academic and business worlds, suggestions for future studies were made to have a better understanding of the dimensions of the interrelations between the security-related factors.

  6. Trust and mindreading in adolescents: the moderating role of social value orientation.

    PubMed

    Derks, Jeffrey; Van Scheppingen, Manon A; Lee, Nikki C; Krabbendam, Lydia

    2015-01-01

    In adolescence, aspects of cognition that are required to deal with complex cooperation situations, such as mentalising and social value orientation, are still in development. In the Trust Game, cooperation may lead to better outcomes for both players, but can also lead to exploitation by the trustee. In the present study, we explore how mindreading, a crucial aspect of mentalising, and social value orientation (whether someone is prosocial or proself) are related to trust. In a group of 217 students (51% girls, Mage = 15.1) social value orientation, mindreading and trust (using the Trust Game) were measured. The result show that social value orientation moderates the relation between mindreading and trust. In the group of prosocials, we find no correlation between mindreading and trust. In the group of proselfs, mindreading is negatively correlated to trust, indicating that proselfs use their mentalising skills to assess that the trustee is likely to exploit them.

  7. Does social trust increase willingness to pay taxes to improve public healthcare? Cross-sectional cross-country instrumental variable analysis.

    PubMed

    Habibov, Nazim; Cheung, Alex; Auchynnikava, Alena

    2017-09-01

    The purpose of this paper is to investigate the effect of social trust on the willingness to pay more taxes to improve public healthcare in post-communist countries. The well-documented association between higher levels of social trust and better health has traditionally been assumed to reflect the notion that social trust is positively associated with support for public healthcare system through its encouragement of cooperative behaviour, social cohesion, social solidarity, and collective action. Hence, in this paper, we have explicitly tested the notion that social trust contributes to an increase in willingness to financially support public healthcare. We use micro data from the 2010 Life-in-Transition survey (N = 29,526). Classic binomial probit and instrumental variables ivprobit regressions are estimated to model the relationship between social trust and paying more taxes to improve public healthcare. We found that an increase in social trust is associated with a greater willingness to pay more taxes to improve public healthcare. From the perspective of policy-making, healthcare administrators, policy-makers, and international donors should be aware that social trust is an important factor in determining the willingness of the population to provide much-needed financial resources to supporting public healthcare. From a theoretical perspective, we found that estimating the effect of trust on support for healthcare without taking confounding and measurement error problems into consideration will likely lead to an underestimation of the true effect of trust. Copyright © 2017 Elsevier Ltd. All rights reserved.

  8. 75 FR 21048 - Northern Lights Fund Trust, et al.; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-22

    ... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 29208; 812-13651] Northern Lights Fund Trust, et al.; Notice of Application April 16, 2010. AGENCY: Securities and Exchange... shareholder approval and would grant relief from certain disclosure requirements. Applicants: Northern Lights...

  9. 78 FR 26649 - Agency Information Collection Activities: Trusted Traveler Programs

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-07

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection Activities: Trusted Traveler Programs AGENCY: U.S. Customs and Border Protection (CBP), Department of Homeland Security. ACTION: 60-Day Notice and request for comments; Extension of an existing collection of...

  10. Neighbourhood social trust and youth perceptions of safety during daily activities.

    PubMed

    Flynn, Kalen; Richmond, Therese S; Branas, Charles C; Wiebe, Douglas J

    2017-10-07

    Exposure to adverse neighbourhood conditions can negatively impact adolescent well-being and perceived safety. However, the impact of neighbourhood social trust on perceived safety is largely unknown. We studied 139 adolescent men to investigate how their perceptions of safety varied as a function of social trust levels in the neighbourhoods they traversed; neighbourhoods that were not necessarily their own. Adolescents mapped their minute-by-minute activities over a recent day and rated their perceived safety on a 10-point scale during in-person interviews. Neighbourhood social trust was measured via a citywide random sample survey. Mixed effects regression showed that, compared with their safety perceptions when in areas of low social trust, older adolescents were 73% more likely to feel unsafe when in areas of medium social trust, and 89% more likely to feel unsafe when in areas of high social trust. Inverse relationships between neighbourhood social trust and adolescents' perceived safety highlight the complex interplay between youth, environmental contexts and safety. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  11. Using Trust to Establish a Secure Routing Model in Cognitive Radio Network.

    PubMed

    Zhang, Guanghua; Chen, Zhenguo; Tian, Liqin; Zhang, Dongwen

    2015-01-01

    Specific to the selective forwarding attack on routing in cognitive radio network, this paper proposes a trust-based secure routing model. Through monitoring nodes' forwarding behaviors, trusts of nodes are constructed to identify malicious nodes. In consideration of that routing selection-based model must be closely collaborative with spectrum allocation, a route request piggybacking available spectrum opportunities is sent to non-malicious nodes. In the routing decision phase, nodes' trusts are used to construct available path trusts and delay measurement is combined for making routing decisions. At the same time, according to the trust classification, different responses are made specific to their service requests. By adopting stricter punishment on malicious behaviors from non-trusted nodes, the cooperation of nodes in routing can be stimulated. Simulation results and analysis indicate that this model has good performance in network throughput and end-to-end delay under the selective forwarding attack.

  12. Birth Weight and Social Trust in Adulthood: Evidence for Early Calibration of Social Cognition.

    PubMed

    Petersen, Michael Bang; Aarøe, Lene

    2015-11-01

    Social trust forms the fundamental basis for social interaction within societies. Understanding the cognitive architecture of trust and the roots of individual differences in trust is of key importance. We predicted that one of the factors calibrating individual levels of trust is the intrauterine flow of nutrients from mother to child as indexed by birth weight. Birth weight forecasts both the future external environment and the internal condition of the individual in multiple ways relevant for social cognition. Specifically, we predicted that low birth weight is utilized as a forecast of a harsh environment, vulnerable condition, or both and, consequently, reduces social trust. The results of the study reported here are consistent with this prediction. Controlling for many confounds through sibling and panel designs, we found that lower birth weight reduced social trust in adulthood. Furthermore, we obtained tentative evidence that this effect is mitigated if adult environments do not induce stress. © The Author(s) 2015.

  13. 76 FR 397 - iShares Trust, et al.; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-04

    ...] iShares Trust, et al.; Notice of Application December 27, 2010. AGENCY: Securities and Exchange... from sections 17(a)(1) and (a)(2) of the Act. Applicants: iShares Trust (``Trust''), iShares, Inc. (``Corporation'') (the Trust and Corporation, together, the ``Companies'' and each a ``Company''), BlackRock Fund...

  14. 78 FR 46381 - Calamos Advisors LLC and Calamos ETF Trust; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-31

    ... Advisors LLC and Calamos ETF Trust; Notice of Application July 24, 2013. AGENCY: Securities and Exchange... Trust (`Trust). Summary of Application: Applicants request an order that permits: (a) Actively-managed... investment trusts outside of the same group of investment companies as the series to acquire Shares. Filing...

  15. 76 FR 37857 - Russell Exchange Traded Funds Trust, et al.; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-28

    ... Exchange Traded Funds Trust, et al.; Notice of Application June 22, 2011. AGENCY: Securities and Exchange... sections 12(d)(1)(A) and (B) of the Act. APPLICANTS: Russell Exchange Traded Funds Trust (formerly, U.S. One Trust, the ``Trust''), Russell Investment Management Company (``Advisor''), and ALPS Distributors...

  16. General Revenue Financing of Medicare: Who Will Bear the Burden?

    PubMed Central

    Johnson, Janet L.; Long, Stephen H.

    1982-01-01

    Two recent national advisory committees on Social Security recommended major shifts in Medicare financing to preserve the financial viability of the Social Security trust funds. This paper estimates the income redistribution consequences of the two proposals, in contrast to current law, using a micro-simulation model of taxes and premiums. These estimates show that while the current Medicare financing package is mildly progressive, the new proposals would substantially increase income redistribution under the program. Two insights provided by separate estimates, for families headed by the elderly (persons age 65 or over) versus those headed by the non-elderly, are: 1) the surprisingly large Medicare tax burdens on families headed by the elderly under the current financing package of payroll taxes, general revenues, and enrollee premiums; and 2) the substantial increases in these burdens under proposed shifts toward increased general revenue financing. PMID:10309601

  17. Identifying Social Trust in Cross-Country Analysis: Do We Really Measure the Same?

    ERIC Educational Resources Information Center

    Torpe, Lars; Lolle, Henrik

    2011-01-01

    Many see trust as an important social resource for the welfare of individuals as well as nations. It is therefore important to be able to identify trust and explain its sources. Cross-country survey analysis has been an important tool in this respect, and often one single variable is used to identify social trust understood as trust in strangers,…

  18. Study on Information Security and e-Trust in Spanish households

    NASA Astrophysics Data System (ADS)

    Aguado, José

    The study on Information Security and e-Trust in Spanish households has been conducted by INTECO (The National Institute of Communication Technologies) through the Information Security Observatory. It is a study on the incidence and trust of users in the Internet by means of measuring the frequency of the episodes of individual risk in a wide sample of users that are monitored online on a monthly basis, combining quantitative data of incidences (monthly scans of home computers) and qualitative perception data (quarterly surveys). The study is supplied with data from more than 3,000 households with Internet connection, spread across the whole country.

  19. Fostering interpersonal trust on social media: physicians' perspectives and experiences.

    PubMed

    Panahi, Sirous; Watson, Jason; Partridge, Helen

    2016-02-01

    The problem of developing and sustaining mutual trust is one of the main barriers to knowledge sharing on social media platforms such as blogs, wikis, micro-blogs and social networking websites. While many studies argue that mutual trust is necessary for online communication and knowledge sharing, few have actually explored and demonstrated how physicians can establish and sustain trusted relationships on social media. To identify approaches through which physicians establish interpersonal trust on social media. Twenty-four physicians, who were active users of social media, were interviewed using a semi-structured approach between 2013 and 2014. Snowball sampling was employed for participant recruitment. The data were analysed using a thematic analysis approach. Physicians trust their peers on social media in a slightly different way than in face-to-face communication. The study found that the majority of participants established trust on social media mainly through previous personal interaction, authenticity and relevancy of voice, professional standing, consistency of communication, peer recommendation, and non-anonymous and moderated sites. Healthcare professionals need to approach social media carefully when using it for knowledge sharing, networking and developing trusted relations with like-minded peers. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  20. Blockchain Technology: A Data Framework to Improve Validity, Trust, and Accountability of Information Exchange in Health Professions Education.

    PubMed

    Funk, Eric; Riddell, Jeff; Ankel, Felix; Cabrera, Daniel

    2018-06-12

    Health professions educators face multiple challenges, among them the need to adapt educational methods to new technologies. In the last decades multiple new digital platforms have appeared in the learning arena, including massive open online courses and social media-based education. The major critique of these novel methods is the lack of the ability to ascertain the origin, validity, and accountability of the knowledge that is created, shared, and acquired. Recently, a novel technology based on secured data storage and transmission, called blockchain, has emerged as a way to generate networks where validity, trust, and accountability can be created. Conceptually blockchain is an open, public, distributed, and secure digital registry where information transactions are secured and have a clear origin, explicit pathways, and concrete value. Health professions education based on the blockchain will potentially allow improved tracking of content and the individuals who create it, quantify educational impact on multiple generations of learners, and build a relative value of educational interventions. Furthermore, institutions adopting blockchain technology would be able to provide certification and credentialing of healthcare professionals with no intermediaries. There is potential for blockchain to significantly change the future of health professions education and radically transform how patients, professionals, educators, and learners interact around safe, valid, and accountable information.

  1. Incorporating the Last Four Digits of Social Security Numbers Substantially Improves Linking Patient Data from De-identified Hospital Claims Databases.

    PubMed

    Naessens, James M; Visscher, Sue L; Peterson, Stephanie M; Swanson, Kristi M; Johnson, Matthew G; Rahman, Parvez A; Schindler, Joe; Sonneborn, Mark; Fry, Donald E; Pine, Michael

    2015-08-01

    Assess algorithms for linking patients across de-identified databases without compromising confidentiality. Hospital discharges from 11 Mayo Clinic hospitals during January 2008-September 2012 (assessment and validation data). Minnesota death certificates and hospital discharges from 2009 to 2012 for entire state (application data). Cross-sectional assessment of sensitivity and positive predictive value (PPV) for four linking algorithms tested by identifying readmissions and posthospital mortality on the assessment data with application to statewide data. De-identified claims included patient gender, birthdate, and zip code. Assessment records were matched with institutional sources containing unique identifiers and the last four digits of Social Security number (SSNL4). Gender, birthdate, and five-digit zip code identified readmissions with a sensitivity of 98.0 percent and a PPV of 97.7 percent and identified postdischarge mortality with 84.4 percent sensitivity and 98.9 percent PPV. Inclusion of SSNL4 produced nearly perfect identification of readmissions and deaths. When applied statewide, regions bordering states with unavailable hospital discharge data had lower rates. Addition of SSNL4 to administrative data, accompanied by appropriate data use and data release policies, can enable trusted repositories to link data with nearly perfect accuracy without compromising patient confidentiality. States maintaining centralized de-identified databases should add SSNL4 to data specifications. © Health Research and Educational Trust.

  2. Managing the aftermaths of contracting in public transit organizations : employee perception of job security, organizational commitment and trust

    DOT National Transportation Integrated Search

    2001-08-01

    This study assesses how to manage the effects or outcomes of organizational change on job security and employee commitment in transit systems using trust-building, empowerment, employee reassurance, and job redesign strategies. The major findings are...

  3. Parochial trust and cooperation across 17 societies.

    PubMed

    Romano, Angelo; Balliet, Daniel; Yamagishi, Toshio; Liu, James H

    2017-11-28

    International challenges such as climate change, poverty, and intergroup conflict require countries to cooperate to solve these complex problems. However, the political tide in many countries has shifted inward, with skepticism and reluctance to cooperate with other countries. Thus, cross-societal investigations are needed to test theory about trust and cooperation within and between groups. We conducted an experimental study in 17 countries designed to test several theories that explain why, who, and where people trust and cooperate more with ingroup members, compared with outgroup members. The experiment involved several interactions in the trust game, either as a trustor or trustee. We manipulated partner group membership in the trust game (ingroup, outgroup, or unknown) and if their reputation was at stake during the interaction. In addition to the standard finding that participants trust and cooperate more with ingroup than outgroup members, we obtained findings that reputational concerns play a decisive role for promoting trust and cooperation universally across societies. Furthermore, men discriminated more in favor of their ingroup than women. Individual differences in cooperative preferences, as measured by social value orientation, predicted cooperation with both ingroup and outgroup members. Finally, we did not find support for three theories about the cross-societal conditions that influence the degree of ingroup favoritism observed across societies (e.g., material security, religiosity, and pathogen stress). We discuss the implications for promoting cooperation within and between countries. Copyright © 2017 the Author(s). Published by PNAS.

  4. Sense of security - searching for its meaning by using stories: a Participatory Action Research study in health and social care in Sweden.

    PubMed

    Petersson, Pia; Blomqvist, Kerstin

    2011-03-01

    The aim of this study was to make sense of the Swedish concept 'trygghet' by using stories from daily life in a Participatory Action Research project. In Sweden, attempts to implement core values to ensure high quality health and social care for older people are given high priority and concepts such as security and dignity are often used. As concepts are abstract they are difficult to transform into practical work. One group of six assistant nurses and one group of five Registered Nurses working in a municipality participated in Story Dialogue Method and four older women were interviewed. 'Trygghet' was found to be an internal sense - an intrinsic state based on faith and trust in oneself and others called Sense of security. External factors that strengthened Sense of security were to be part of a community, to recognize and be familiar with things and situations and to use various kinds of aids. A prerequisite for the professionals being able to support the care receivers adequately is that they have a sense of security themselves, and that they are allowed to operate in a system that facilitates for the care receivers to maintain trustworthy and reliable relations over time. © 2010 Blackwell Publishing Ltd.

  5. 78 FR 70976 - Horizons ETFs Management (USA) LLC and Horizons ETF Trust; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-27

    ... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 30803; 812-14179] Horizons ETFs Management (USA) LLC and Horizons ETF Trust; Notice of Application November 21, 2013. AGENCY: Securities and Exchange Commission (``Commission''). ACTION: Notice of an application for an order under...

  6. 75 FR 32825 - FFCM, LLC and FQF Trust; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-09

    ... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 29292; File No. 812-13748] FFCM, LLC and FQF Trust; Notice of Application June 2, 2010. AGENCY: Securities and Exchange Commission..., or cause more than 10% of the acquired company's voting stock to be owned by investment companies and...

  7. 78 FR 24447 - Goldman Sachs Trust, et al.; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-25

    ... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 30471; 812-14075] Goldman Sachs Trust, et al.; Notice of Application April 19, 2013. AGENCY: Securities and Exchange Commission..., or cause more than 10% of the acquired company's voting stock to be owned by investment companies and...

  8. Information Security and Integrity Systems

    NASA Technical Reports Server (NTRS)

    1990-01-01

    Viewgraphs from the Information Security and Integrity Systems seminar held at the University of Houston-Clear Lake on May 15-16, 1990 are presented. A tutorial on computer security is presented. The goals of this tutorial are the following: to review security requirements imposed by government and by common sense; to examine risk analysis methods to help keep sight of forest while in trees; to discuss the current hot topic of viruses (which will stay hot); to examine network security, now and in the next year to 30 years; to give a brief overview of encryption; to review protection methods in operating systems; to review database security problems; to review the Trusted Computer System Evaluation Criteria (Orange Book); to comment on formal verification methods; to consider new approaches (like intrusion detection and biometrics); to review the old, low tech, and still good solutions; and to give pointers to the literature and to where to get help. Other topics covered include security in software applications and development; risk management; trust: formal methods and associated techniques; secure distributed operating system and verification; trusted Ada; a conceptual model for supporting a B3+ dynamic multilevel security and integrity in the Ada runtime environment; and information intelligence sciences.

  9. 78 FR 70359 - WisdomTree Trust, et al.; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-25

    ...] WisdomTree Trust, et al.; Notice of Application November 20, 2013. AGENCY: Securities and Exchange...-kind in a master-feeder structure. Applicants: WisdomTree Trust (the ``Trust''), WisdomTree Asset Management, Inc. (the ``Adviser'') and WisdomTree Investments, Inc. (``WTI''). Filing Dates: The application...

  10. 78 FR 24445 - Symetra Mutual Funds Trust, et al.; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-25

    ... Mutual Funds Trust, et al.; Notice of Application April 19, 2013 AGENCY: Securities and Exchange... shareholder approval and would grant relief from certain disclosure requirements. Applicants: Symetra Mutual Funds Trust (the ``Trust'') and Symetra Investment Management, Inc. (the ``Adviser''). Filing Dates: The...

  11. 76 FR 41831 - FQF Trust, et al.; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-15

    ...] FQF Trust, et al.; Notice of Application July 11, 2011. AGENCY: Securities and Exchange Commission... Creation Units; and (e) certain registered management investment companies and unit investment trusts outside of the same group of investment companies as the series to acquire Shares. Applicants: FQF Trust...

  12. 78 FR 37623 - Transparent Value Trust, et al.; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-21

    ...] Transparent Value Trust, et al.; Notice of Application June 14, 2013. AGENCY: Securities and Exchange... (e) certain registered management investment companies and unit investment trusts outside of the same group of investment companies as the series to acquire Shares. Applicants: Transparent Value Trust...

  13. In Law We Trust? Trusted Computing and Legal Responsibility for Internet Security

    NASA Astrophysics Data System (ADS)

    Danidou, Yianna; Schafer, Burkhard

    This paper analyses potential legal responses and consequences to the anticipated roll out of Trusted Computing (TC). It is argued that TC constitutes such a dramatic shift in power away from users to the software providers, that it is necessary for the legal system to respond. A possible response is to mirror the shift in power by a shift in legal responsibility, creating new legal liabilities and duties for software companies as the new guardians of internet security.

  14. Trust recovery model of Ad Hoc network based on identity authentication scheme

    NASA Astrophysics Data System (ADS)

    Liu, Jie; Huan, Shuiyuan

    2017-05-01

    Mobile Ad Hoc network trust model is widely used to solve mobile Ad Hoc network security issues. Aiming at the problem of reducing the network availability caused by the processing of malicious nodes and selfish nodes in mobile Ad Hoc network routing based on trust model, an authentication mechanism based on identity authentication mobile Ad Hoc network is proposed, which uses identity authentication to identify malicious nodes, And trust the recovery of selfish nodes in order to achieve the purpose of reducing network congestion and improving network quality. The simulation results show that the implementation of the mechanism can effectively improve the network availability and security.

  15. Filtering SPAM in P2PSIP Communities with Web of Trust

    NASA Astrophysics Data System (ADS)

    Heikkilä, Juho; Gurtov, Andrei

    Spam is a dominant problem on email systems today. One of the reasons is the lack of infrastructure for security and trust. As Voice over IP (VoIP) communication becomes increasingly popular, proliferation of spam calls is only a matter of time. As SIP identity scheme is practically similar to email, those share the same threats. We utilized Host Identity Protocol (HIP) to provide basic security, such as end-to-end encryption. To provide call filtering, however, other tools are needed. In this paper, we suggest applying trust paths familiar from the PGP web of trust to prevent unwanted communication in P2PSIP communities.

  16. 78 FR 47440 - ERNY Financial ETF Trust, et al.; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-05

    ...] ERNY Financial ETF Trust, et al.; Notice of Application July 30, 2013. AGENCY: Securities and Exchange... (e) certain registered management investment companies and unit investment trusts outside of the same group of investment companies as the series to acquire Shares. APPLICANTS: ERNY Financial ETF Trust...

  17. 77 FR 67689 - Fidelity Aberdeen Street Trust, et al.;

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-13

    ...] Fidelity Aberdeen Street Trust, et al.; Notice of Application November 6, 2012. AGENCY: Securities and... arrangements (``Prior Order'').\\1\\ \\1\\ Colchester Street Trust, et al., Investment Company Act Release Nos... Trust, et al., Investment Company Act Release Nos. 23787 (Apr. 15, 1999) (notice) and 23831 (May 11...

  18. 75 FR 63222 - Claymore Exchange-Traded Fund Trust, et al.;

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-14

    ... Exchange-Traded Fund Trust, et al.; Notice of Application October 7, 2010. AGENCY: Securities and Exchange... Fund Trust, et al., Investment Company Act Release Nos. 27469 (Aug. 28, 2006) (notice) and 27483 (Sept... investment companies and unit investment trusts outside of the same group of investment companies as the...

  19. 78 FR 42114 - FlexShares Trust, et al.; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-15

    ...Shares Trust, et al.; Notice of Application July 9, 2013. AGENCY: Securities and Exchange Commission... exemption from sections 12(d)(1)(A) and (B) of the Act (``Prior Orders''). \\1\\ Northern Trust Investments...) (order); Northern Trust Investments, Inc., Investment Company Act Release Nos. 30045 (Apr. 24, 2012...

  20. 78 FR 69888 - ETFis Series Trust I, et al.; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-21

    ...] ETFis Series Trust I, et al.; Notice of Application November 15, 2013. AGENCY: Securities and Exchange... Units; and (e) certain registered management investment companies and unit investment trusts outside of the same group of investment companies as the series to acquire Shares. APPLICANTS: ETFis Series Trust...

  1. An Improved Quantum Proxy Blind Signature Scheme Based on Genuine Seven-Qubit Entangled State

    NASA Astrophysics Data System (ADS)

    Yang, Yuan-Yuan; Xie, Shu-Cui; Zhang, Jian-Zhong

    2017-07-01

    An improved quantum proxy blind signature scheme based on controlled teleportation is proposed in this paper. Genuine seven-qubit entangled state functions as quantum channel. We use the physical characteristics of quantum mechanics to implement delegation, signature and verification. Security analysis shows that our scheme is unforgeability, undeniability, blind and unconditionally secure. Meanwhile, we propose a trust party to provide higher security, the trust party is costless.

  2. Trust and Society: Suggestions for Further Development of Niklas Luhmann's Theory of Trust.

    PubMed

    Morgner, Christian

    2018-05-01

    This paper addresses an apparent gap in the work of Niklas Luhmann. While the issue of trust continues to receive widespread attention in the social sciences, Luhmann's interest in this topic declined following the development of his systems theory. It is argued that this decline does not reflect any diminished relevance of trust for systems theory, but rather that the architectural remodeling of theory cannot easily be applied to the issue of trust. Here, the issue of trust is reconceptualized as a connection medium. This entails a reconstruction of Luhmann's early theory of trust, especially with regard to function and social positioning. In this context, trust can in turn be linked to the concept of medium in Luhmann's late work. As a connection medium, trust mediates between the different levels of sociality-interaction, organization, and society. These theoretical considerations are employed to develop a more applied framework for empirical research, with a brief case study from southern Italy. From this perspective, the idea of trust as society's glue is seen to be overly simplistic. The common ethical understanding that more trust leads to a better society is also questioned on the grounds that social cooperation can also lead to social sclerosis. Finally, risk and trust are shown to accommodate the formation of different cultures of trust. The paper shows how Luhmann's updated version of trust can inspire current research and enhance our understanding of how trust operates in contemporary society. © 2018 Canadian Sociological Association/La Société canadienne de sociologie.

  3. Physical pain increases interpersonal trust in females.

    PubMed

    Wang, C; Gao, J; Ma, Y; Zhu, C; Dong, X-W

    2018-01-01

    People behave and interact with others differently when experiencing physical pain. Pain has dramatic effects on one's emotional responses, cognitive functions and social interaction. However, little has been known about whether and how physical pain influences interpersonal trust in social interaction. In the present study, we examined the influence of physical pain on trusting behaviour. A total of 112 healthy participants were recruited and assigned to physical pain condition (induced by Capsaicin) and control condition (with hand cream), respectively. Thirty minutes after pain induction, three decision-making tasks were conducted to measure behaviours in social interaction, including trust and trustworthiness (trust game), non-social risk-taking (risk game) and altruism (dictator game). Results showed that physical pain increased interpersonal trust among females, but not among males. Pain did not influence non-social risk-taking, altruism or trustworthiness, as evaluated by monetary transfers in those tasks. Moreover, the effect of physical pain on interpersonal trust was fully mediated by expectation of monetary profit. These findings demonstrate an effect of pain on interpersonal trust and suggest a reciprocity mechanism that the effect may be driven by self-interest rather than altruistic motivation. The pain effect on trust was evident only in females, implying distinct pain coping strategies used by both genders. The present work highlights the social component of pain and extends our understanding of mutual interactions between pain and social cognition. © 2017 European Pain Federation - EFIC®.

  4. Plasma Oxytocin Immunoreactive Products and Response to Trust in Patients with Social Anxiety Disorder

    PubMed Central

    Hoge, EA; Lawson, EA; Metcalf, CA; Keshaviah, A; Zak, PJ; Pollack, MH; Simon, NM

    2013-01-01

    Background Generalized Social Anxiety Disorder (GSAD) is characterized by excessive fear and avoidance of several types of social and performance situations. The pathophysiology is not well understood, but research in animals and humans has provided evidence that oxytocin helps regulate normal social affiliative behavior. Previous work in healthy male subjects demonstrated a rise in plasma oxytocin after receiving a high trust signal. To examine the oxytocin system in GSAD, we measured plasma oxytocin in GSAD patients and controls, before and after the social “Trust Game,” a neuroeconomic test examining trust behavior and reaction to trust using real monetary incentives. Methods Thirty-nine subjects with GSAD and 28 healthy controls provided three blood samples for oxytocin measurement before the Trust Game, and one sample after the game. Plasma estradiol was also measured at baseline. The Trust Game protocol version prioritized the sending of a signal of high cooperation and trust to all participants. All analyses controlled for gender and estradiol levels. Results Mean oxytocin levels post-Trust Game (p=0.025), and overall (area under the curve, p=0.011) were lower in GSAD patients compared to controls, after controlling for sex and estradiol. There was no significant change in oxytocin levels after the Game in either group. Conclusions We report low plasma oxytocin levels in patients with generalized social anxiety disorder during a pro-social laboratory task paradigm. Additional research will be important to further examine the relationship between oxytocin and social behavior in GSAD. PMID:22807189

  5. 77 FR 51589 - ReconTrust Company, N.A., et al.; Notice of Application and Temporary Order

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-24

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. IC-30174; 812-14068] ReconTrust Company, N.A., et... entered against ReconTrust Company, N.A. (``ReconTrust'') on August 20, 2012 by the United States District.... ReconTrust Company, N.A. No. 2:11-cv- 1460 (W.D. Wash. August 20, 2012). \\3\\ The Complaint was initially...

  6. 75 FR 9629 - Millington Securities, Inc. and Millington Unit Investment Trusts; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-03

    ... for certificates representing units of fractional undivided interest in the Series' portfolio (``Units... offering price plus a front-end sales charge. If such a market is not maintained at any time for any Series... Equity Series will not restrict their portfolio investments to ``eligible trust securities.'' D. Capital...

  7. 75 FR 26815 - AdvisorShares Investments, LLC and AdvisorShares Trust; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-12

    ... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 29264; 812-13677] AdvisorShares Investments, LLC and AdvisorShares Trust; Notice of Application May 6, 2010. AGENCY: Securities... 6(c) of the Investment Company Act of 1940 (``Act'') for an exemption from sections 2(a)(32), 5(a)(1...

  8. 77 FR 35082 - Arrow Investment Advisers, LLC and Arrow Investments Trust; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-12

    ... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 30100; 812-13937] Arrow Investment Advisers, LLC and Arrow Investments Trust; Notice of Application June 6, 2012. AGENCY: Securities... 6(c) of the Investment Company Act of 1940 (``Act'') for an exemption from sections 2(a)(32), 5(a)(1...

  9. 78 FR 79519 - IndexIQ ETF Trust, et al.; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-30

    ... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 30844; 812-14153] IndexIQ ETF Trust, et al.; Notice of Application December 23, 2013. AGENCY: Securities and Exchange Commission... Company Act of 1940 (the ``1940 Act'') for exemptions from sections 12(d)(1)(A), (B), and (C) of the 1940...

  10. Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria. Version 1.

    DTIC Science & Technology

    1987-07-01

    for Secure Computer Systema, MTR-3153, The MITRE Corporation, Bedford, MA, June 1975. 1 See, for example, M. D. Abrams and H. J. Podell , Tutorial...References References Abrams, M. D. and H. J. Podell , Tutorial: Computer and Network Security, IEEE Com- puter Society Press, 1987. Addendum to the

  11. 78 FR 78417 - Forethought Variable Insurance Trust, et al.; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-26

    ... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 30840; File No. 812-14198] Forethought Variable Insurance Trust, et al.; Notice of Application December 19, 2013. AGENCY: Securities and Exchange Commission (the ``Commission''). ACTION: Notice of an application for an order under section 12(d)(1)(J) of the Investment Company...

  12. 78 FR 48729 - Aspiriant Global Equity Trust and Aspiriant, LLC; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-09

    ... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 30640; File No. 812-14155] Aspiriant Global Equity Trust and Aspiriant, LLC; Notice of Application August 5, 2013. AGENCY: Securities and Exchange Commission (``Commission''). ACTION: Notice of an application under section 6(c) of the Investment Company Act of 1940 (``Act'')...

  13. 76 FR 51068 - Northern Trust Investments, N.A., et al.; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-17

    ... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 29752; File No. 812-13773] Northern Trust Investments, N.A., et al.; Notice of Application August 10, 2011. AGENCY: Securities and... the Investment Company Act of 1940 (the ``Act'') for an exemption from sections 2(a)(32), 5(a)(1), 22...

  14. Adolescent trust and trustworthiness: role of gender and social value orientation.

    PubMed

    Derks, Jeffrey; Lee, Nikki C; Krabbendam, Lydia

    2014-12-01

    Trusting others is an essential feature of adolescent development. The aim of this study was to investigate gender differences in trusting behavior using an experimental game and relate these to the underlying social preferences. 206 adolescents (Mage = 15.1 years, 51% girls) performed a series of one-shot Trust Games to measure their levels of trust and trustworthiness. Social value orientation, or the preference to maximize one's own outcomes (proself) or both the outcomes of self and other (prosocial) was assessed using the Triple Dominance Measure. Boys were more trusting than girls, but no gender differences on trustworthiness were found. Prosocials were more trusting and trustworthy than proselfs. In addition, gender and social value orientation were independent predictors of trust (but not trustworthiness). These findings show that the higher levels of trust in boys are not the result of a gender difference in prosocial orientation. Copyright © 2014 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  15. Natural hazard events and social capital: the social impact of natural disasters.

    PubMed

    Albrecht, Frederike

    2018-04-01

    This study investigates if and to what extent natural disasters affect social capital. Twelve different events in Europe are examined in a quantitative analysis, using data derived from the European Social Survey and the EM-DAT International Disaster Database. The study uses social trust as an indicator of social capital and offers evidence that a change in social trust is a possible occurrence during or after a disaster, but that it is not an inevitable consequence of it. The results reveal that social trust decreases after a disaster with a death toll of at least nine. Changes in social capital, therefore, are found to be more probable as the severity of the event increases. National, rather than regional, disasters lead more frequently to significant shifts in social trust. This evaluation of 12 separate cases pinpoints several disasters that have had an effect on social trust, but it does not identify any general patterns, underlining the significance of contextual dependency. © 2018 The Author(s). Disasters © Overseas Development Institute, 2018.

  16. Intelligent cloud computing security using genetic algorithm as a computational tools

    NASA Astrophysics Data System (ADS)

    Razuky AL-Shaikhly, Mazin H.

    2018-05-01

    An essential change had occurred in the field of Information Technology which represented with cloud computing, cloud giving virtual assets by means of web yet awesome difficulties in the field of information security and security assurance. Currently main problem with cloud computing is how to improve privacy and security for cloud “cloud is critical security”. This paper attempts to solve cloud security by using intelligent system with genetic algorithm as wall to provide cloud data secure, all services provided by cloud must detect who receive and register it to create list of users (trusted or un-trusted) depend on behavior. The execution of present proposal has shown great outcome.

  17. Social Support, Trust in Health Information, and Health Information-Seeking Behaviors (HISBs): A Study Using the 2012 Annenberg National Health Communication Survey (ANHCS).

    PubMed

    Yang, Qinghua; Chen, Yixin; Wendorf Muhamad, Jessica

    2017-09-01

    We proposed a conceptual model to predict health information-seeking behaviors (HISBs) from three different sources (family, the Internet, doctors). To test the model, a structural equation modeling (SEM) analysis was conducted using data from the 2012 Annenberg National Health Communication Survey (ANHCS) (N = 3,285). Findings suggest higher social support from family predicts higher trust in health information from family members (abbreviated as trust in this article). Trust is positively related to HISBs from all three sources, with the path linking trust to HISB from family being the strongest. The effect of social support on HISB from family is partially mediated by trust, while effect of social support on HISBs from the Internet/doctors is fully mediated by trust. Implications of the study are discussed.

  18. Rapid Trust Establishment for Transient Use of Unmanaged Hardware

    DTIC Science & Technology

    2006-12-01

    unclassified b . ABSTRACT unclassified c. THIS PAGE unclassified Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18 Keywords: Establishing...Validate OS Trusted Host OS (From Disk) Validate App 1 Untrusted code Trusted code (a) Boot with trust initiator ( b ) Boot trusted Host OS (c) Launch...be validated. Execution of process with Id 3535 has been blocked to minimize security risks. ( b ) Notification to the user from the trust alerter

  19. 76 FR 50773 - Pax World Funds Series Trust I and Pax World Management LLC; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-16

    ... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 29751; 812-13883] Pax World Funds Series Trust I and Pax World Management LLC; Notice of Application August 10, 2011. AGENCY.... Applicants: Pax World Funds Series Trust I (``Mutual Funds Trust'') and Pax World Management LLC (the...

  20. A protect solution for data security in mobile cloud storage

    NASA Astrophysics Data System (ADS)

    Yu, Xiaojun; Wen, Qiaoyan

    2013-03-01

    It is popular to access the cloud storage by mobile devices. However, this application suffer data security risk, especial the data leakage and privacy violate problem. This risk exists not only in cloud storage system, but also in mobile client platform. To reduce the security risk, this paper proposed a new security solution. It makes full use of the searchable encryption and trusted computing technology. Given the performance limit of the mobile devices, it proposes the trusted proxy based protection architecture. The design basic idea, deploy model and key flows are detailed. The analysis from the security and performance shows the advantage.

  1. A Game Theory Based Solution for Security Challenges in CRNs

    NASA Astrophysics Data System (ADS)

    Poonam; Nagpal, Chander Kumar

    2018-03-01

    Cognitive radio networks (CRNs) are being envisioned to drive the next generation Ad hoc wireless networks due to their ability to provide communications resilience in continuously changing environments through the use of dynamic spectrum access. Conventionally CRNs are dependent upon the information gathered by other secondary users to ensure the accuracy of spectrum sensing making them vulnerable to security attacks leading to the need of security mechanisms like cryptography and trust. However, a typical cryptography based solution is not a viable security solution for CRNs owing to their limited resources. Effectiveness of trust based approaches has always been, in question, due to credibility of secondary trust resources. Game theory with its ability to optimize in an environment of conflicting interests can be quite a suitable tool to manage an ad hoc network in the presence of autonomous selfish/malevolent/malicious and attacker nodes. The literature contains several theoretical proposals for augmenting game theory in the ad hoc networks without explicit/detailed implementation. This paper implements a game theory based solution in MATLAB-2015 to secure the CRN environment and compares the obtained results with the traditional approaches of trust and cryptography. The simulation result indicates that as the time progresses the game theory performs much better with higher throughput, lower jitter and better identification of selfish/malicious nodes.

  2. 75 FR 41247 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-15

    ... Rule Change to List and Trade Options on the Sprott Physical Gold Trust July 8, 2010. Pursuant to... Exchange Commission (``SEC'' or ``Commission'') authorized ISE to list and trade options on the SPDR Gold... list and trade options on the Sprott Physical Gold Trust. \\5\\ See Securities Exchange Act Release No...

  3. 78 FR 79511 - IndexIQ ETF Trust, et al.; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-30

    ... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 30843; File No. 812-14053] IndexIQ ETF Trust, et al.; Notice of Application December 23, 2013. AGENCY: Securities and Exchange... Investment Company Act of 1940 (the ``Act'') for an exemption from sections 2(a)(32), 5(a)(1), 22(d), and 22...

  4. 78 FR 54298 - Horizons ETFs Management (USA) LLC and Horizons ETF Trust; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-03

    ... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 30680; 812-14178] Horizons ETFs Management (USA) LLC and Horizons ETF Trust; Notice of Application August 27, 2013. AGENCY: Securities and Exchange Commission (``Commission''). ACTION: Notice of an application for an order under section 6(c) of the Investment Company Act of...

  5. 78 FR 29399 - ERNY Financial ETF Trust and ERNY Financial Advisors, LLC; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-20

    ... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 30514; 812-14146] ERNY Financial ETF Trust and ERNY Financial Advisors, LLC; Notice of Application May 13, 2013. AGENCY: Securities and Exchange Commission (``Commission''). ACTION: Notice of an application for an order under section 6(c) of the Investment Company Act of 1940...

  6. Reduced reciprocal giving in social anxiety - Evidence from the Trust Game.

    PubMed

    Anderl, Christine; Steil, Regina; Hahn, Tim; Hitzeroth, Patricia; Reif, Andreas; Windmann, Sabine

    2018-06-01

    Social anxiety is known to impair interpersonal relationships. These impairments are thought to partly arise from difficulties to engage in affiliative interactions with others, such as sharing favors or reciprocating prosocial acts. Here, we examined whether individuals high compared to low in social anxiety differ in giving towards strangers in an economic game paradigm. One hundred and twenty seven non-clinical participants who had been pre-screened to be either particularly high or low in social anxiety played an incentivized Trust Game to assess trustful and reciprocal giving towards strangers in addition to providing information on real life interpersonal functioning (perceived social support and attachment style). We found that reciprocal, but not trustful giving, was significantly decreased among highly socially anxious individuals. Both social anxiety and reciprocal giving furthermore showed significant associations with self-reported real life interpersonal functioning. Participants played the Trust Game with the strategy method; results need replication with a clinical sample. Individuals high in social anxiety showed reduced reciprocal, but intact trustful giving, pointing to a constraint in responsiveness. The research may contribute to the development of new treatment and prevention programs to reduce the interpersonal impairments in socially anxious individuals. Copyright © 2017 Elsevier Ltd. All rights reserved.

  7. Trust in Health Information Sources: Survey Analysis of Variation by Sociodemographic and Tobacco Use Status in Oklahoma

    PubMed Central

    Boeckman, Lindsay M; White, Ashley H; Burbank, Andrea D; Paulson, Sjonna; Beebe, Laura A

    2018-01-01

    Background Modern technology (ie, websites and social media) has significantly changed social mores in health information access and delivery. Although mass media campaigns for health intervention have proven effective and cost-effective in changing health behavior at a population scale, this is best studied in traditional media sources (ie, radio and television). Digital health interventions are options that use short message service/text messaging, social media, and internet technology. Although exposure to these products is becoming ubiquitous, electronic health information is novel, incompletely disseminated, and frequently inaccurate, which decreases public trust. Previous research has shown that audience trust in health care providers significantly moderates health outcomes, demographics significantly influence audience trust in electronic media, and preexisting health behaviors such as smoking status significantly moderate audience receptivity to traditional mass media. Therefore, modern health educators must assess audience trust in all sources, both media (traditional and digital) and interpersonal, to balance pros and cons before structuring multicomponent community health interventions. Objective We aimed to explore current trust and moderators of trust in health information sources given recent changes in digital health information access and delivery to inform design of future health interventions in Oklahoma. Methods We conducted phone surveys of a cross-sectional sample of 1001 Oklahoma adults (age 18-65 years) in spring 2015 to assess trust in seven media sources: traditional (television and radio), electronic (online and social media), and interpersonal (providers, insurers, and family/friends). We also gathered information on known moderators of trust (sociodemographics and tobacco use status). We modeled log odds of a participant rating a source as “trustworthy” (SAS PROC SURVEYLOGISTIC), with subanalysis for confounders (sociodemographics and tobacco use). Results Oklahomans showed the highest trust in interpersonal sources: 81% (808/994) reported providers were trustworthy, 55% (550/999) for friends and family, and 48% (485/998) for health insurers. For media sources, 24% of participants (232/989) rated the internet as trustworthy, followed by 21% of participants for television (225/998), 18% for radio (199/988), and only 11% for social media (110/991). Despite this low self-reported trust in social media, 40% (406/991) of participants reported using social media for tobacco-related health information. Trust in health providers did not vary by subpopulation, but sociodemographic variables (gender, income, and education) and tobacco use status significantly moderated trust in other sources. Women were on the whole more trusting than men, trust in media decreased with income, and trust in friends and family decreased with education. Conclusions Health education interventions should incorporate digital media, particularly when targeting low-income populations. Utilizing health care providers in social media settings could leverage high-trust and low-cost features of providers and social media, respectively. PMID:29434015

  8. Trust, but verify: social media models for disaster management.

    PubMed

    Mehta, Amisha M; Bruns, Axel; Newton, Judith

    2017-07-01

    A lack of trust in the information exchanged via social media may significantly hinder decisionmaking by community members and emergency services during disasters. The need for timely information at such times, though, challenges traditional ways of establishing trust. This paper, building on a multi-year research project that combined social media data analysis and participant observation within an emergency management organisation and in-depth engagement with stakeholders across the sector, pinpoints and examines assumptions governing trust and trusting relationships in social media disaster management. It assesses three models for using social media in disaster management-information gathering, quasi-journalistic verification, and crowdsourcing-in relation to the guardianship of trust to highlight the verification process for content and source and to identify the role of power and responsibilities. The conclusions contain important implications for emergency management organisations seeking to enhance their mechanisms for incorporating user-generated information from social media sources in their disaster response efforts. © 2017 The Author(s). Disasters © Overseas Development Institute, 2017.

  9. Does inequality erode social trust? Results from multilevel models of US states and counties.

    PubMed

    Fairbrother, Malcolm; Martin, Isaac W

    2013-03-01

    Previous research has argued that income inequality reduces people's trust in other people, and that declining social trust in the United States in recent decades has been due to rising levels of income inequality. Using multilevel models fitted to data from the General Social Survey, this paper substantially qualifies these arguments. We show that while people are less trusting in US states with higher income inequality, this association holds only cross-sectionally, not longitudinally; since the 1970s, states experiencing larger increases in inequality have not suffered systematically larger declines in trust. For counties, there is no statistically significant relationship either cross-sectionally or longitudinally. There is therefore only limited empirical support for the argument that inequality influences generalized social trust; and the declining trust of recent decades certainly cannot be attributed to rising inequality. Copyright © 2012 Elsevier Inc. All rights reserved.

  10. Data on social media use related to age, gender and trust constructs of integrity, competence, concern, benevolence and identification.

    PubMed

    Warner-Søderholm, Gillian; Bertsch, Andy; Søderholm, Annika

    2018-06-01

    This article contains data collected from self-report surveys of respondents to measure 1) social media usage, 2) age, 3) gender and 4) trust, measured within five major trust constructs of a) Integrity, b) Competence, c) Concern, d) Benevolence and e) Identification. The data includes all instruments used, SPSS syntax, the raw survey data and descriptive statistics from the analyses. Raw data was entered into SPSS software and scrubbed using appropriate techniques in order to prepare the data for analysis. We believe that our dataset and instrument may give important insights related to computers in human behavior, and predicting trust antecedents in social media use such as age, gender, number of hour online and choice of content provider. We have also created a parsimonious five factor trust instrument developed from the extant literature for future research. Hence, this newly developed trust instrument can be used to measure trust not only in social media, but also in other areas such as healthcare, economics and investor relations, CSR, management and education. Moreover, the survey items developed to measure social media use are concise and may be applied to measure social media use in other contexts such as national cultural differences, marketing and tourism. For interpretation and discussion of the data and constructs, please see original article entitled "Who trusts social media" (Warner-Søderholm et al., 2018) [1].

  11. 75 FR 1007 - MetLife, Inc. and MetLife Capital Trust V; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-07

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. IC-29101; 812-13549] MetLife, Inc. and MetLife... ``Act'') for an exemption from all provisions of the Act. Summary of Application: MetLife Capital Trust V (the ``Trust'') and MetLife, Inc. (``MetLife'') request an order that would permit the Trust to...

  12. Conceptions of Trust: How Designers Approach Usable Privacy and Security

    ERIC Educational Resources Information Center

    Birge, Colin

    2013-01-01

    Designers who create user interfaces are frequently required to ask users for personal information. For the user, this is a "trust question": Do I, the user, trust the system or entity that is asking me for this information? The creation and management of these trust questions is an important aspect of the research field called usable…

  13. 17 CFR 240.16b-8 - Voting trusts.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Voting trusts. 240.16b-8... Exchange Act of 1934 Exemption of Certain Transactions from Section 16(b) § 240.16b-8 Voting trusts. Any... deposit or withdrawal from a voting trust or deposit agreement shall be exempt from section 16(b) of the...

  14. 75 FR 22639 - Pax World Funds Trust II, et al.; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-29

    ...] Pax World Funds Trust II, et al.; Notice of Application April 26, 2010. AGENCY: Securities and... investment trusts outside of the same group of investment companies as the series to acquire shares of the series (``Prior Order'').\\1\\ Applicants seek to amend the Prior Order to permit the Trust to offer a new...

  15. On Deep Learning for Trust-Aware Recommendations in Social Networks.

    PubMed

    Deng, Shuiguang; Huang, Longtao; Xu, Guandong; Wu, Xindong; Wu, Zhaohui

    2017-05-01

    With the emergence of online social networks, the social network-based recommendation approach is popularly used. The major benefit of this approach is the ability of dealing with the problems with cold-start users. In addition to social networks, user trust information also plays an important role to obtain reliable recommendations. Although matrix factorization (MF) becomes dominant in recommender systems, the recommendation largely relies on the initialization of the user and item latent feature vectors. Aiming at addressing these challenges, we develop a novel trust-based approach for recommendation in social networks. In particular, we attempt to leverage deep learning to determinate the initialization in MF for trust-aware social recommendations and to differentiate the community effect in user's trusted friendships. A two-phase recommendation process is proposed to utilize deep learning in initialization and to synthesize the users' interests and their trusted friends' interests together with the impact of community effect for recommendations. We perform extensive experiments on real-world social network data to demonstrate the accuracy and effectiveness of our proposed approach in comparison with other state-of-the-art methods.

  16. Trusted Computing Management Server Making Trusted Computing User Friendly

    NASA Astrophysics Data System (ADS)

    Sothmann, Sönke; Chaudhuri, Sumanta

    Personal Computers (PC) with build in Trusted Computing (TC) technology are already well known and widely distributed. Nearly every new business notebook contains now a Trusted Platform Module (TPM) and could be used with increased trust and security features in daily application and use scenarios. However in real life the number of notebooks and PCs where the TPM is really activated and used is still very small.

  17. Modeling cascading failures with the crisis of trust in social networks

    NASA Astrophysics Data System (ADS)

    Yi, Chengqi; Bao, Yuanyuan; Jiang, Jingchi; Xue, Yibo

    2015-10-01

    In social networks, some friends often post or disseminate malicious information, such as advertising messages, informal overseas purchasing messages, illegal messages, or rumors. Too much malicious information may cause a feeling of intense annoyance. When the feeling exceeds a certain threshold, it will lead social network users to distrust these friends, which we call the crisis of trust. The crisis of trust in social networks has already become a universal concern and an urgent unsolved problem. As a result of the crisis of trust, users will cut off their relationships with some of their untrustworthy friends. Once a few of these relationships are made unavailable, it is likely that other friends will decline trust, and a large portion of the social network will be influenced. The phenomenon in which the unavailability of a few relationships will trigger the failure of successive relationships is known as cascading failure dynamics. To our best knowledge, no one has formally proposed cascading failures dynamics with the crisis of trust in social networks. In this paper, we address this potential issue, quantify the trust between two users based on user similarity, and model the minimum tolerance with a nonlinear equation. Furthermore, we construct the processes of cascading failures dynamics by considering the unique features of social networks. Based on real social network datasets (Sina Weibo, Facebook and Twitter), we adopt two attack strategies (the highest trust attack (HT) and the lowest trust attack (LT)) to evaluate the proposed dynamics and to further analyze the changes of the topology, connectivity, cascading time and cascade effect under the above attacks. We numerically find that the sparse and inhomogeneous network structure in our cascading model can better improve the robustness of social networks than the dense and homogeneous structure. However, the network structure that seems like ripples is more vulnerable than the other two network structures. Our findings will be useful in further guiding the construction of social networks to effectively avoid the cascading propagation with the crisis of trust. Some research results can help social network service providers to avoid severe cascading failures.

  18. Social capital and trust in providers.

    PubMed

    Ahern, Melissa M; Hendryx, Michael S

    2003-10-01

    Trust in providers has been in decline in recent decades. This study attempts to identify sources of trust in characteristics of health care systems and the wider community. The design is cross-sectional. Data are from (1) the 1996 Household Survey of the Community Tracking Study, drawn from 24 Metropolitan Statistical Areas; (2) a 1996 multi-city broadcast media marketing database including key social capital indicators; (3) Interstudy; (4) the American Hospital Association; and (5) the American Medical Association. Independent variables include individual socio-demographic variables, HMO enrollment, community-level health sector variables, and social capital. The dependent variable is self-reported trust in physicians. Data are merged from the various sources and analyzed using SUDAAN. Subjects include adults in the Household Survey who responded to the items on trust in physicians (N=17,653). Trust in physicians is independently predicted by community social capital (p<0.001). Trust is also negatively related to HMO enrollment and to many individual characteristics. The effect of HMOs is not uniform across all communities. Social capital plays a role in how health care is perceived by citizens, and how health care is delivered by providers. Efforts to build trust and collaboration in a community may improve trust in physicians, health care quality, access, and preserve local health care control.

  19. African migrant patients' trust in Chinese physicians: a social ecological approach to understanding patient-physician trust.

    PubMed

    McLaughlin, Megan M; Simonson, Louis; Zou, Xia; Ling, Li; Tucker, Joseph D

    2015-01-01

    Patient trust in physicians is a critical determinant of health seeking behaviors, medication adherence, and health outcomes. A crisis of interpersonal trust exists in China, extending throughout multiple social spheres, including the healthcare system. At the same time, with increased migration from Africa to China in the last two decades, Chinese physicians must establish mutual trust with an increasingly diverse patient population. We undertook a qualitative study to identify factors affecting African migrants' trust in Chinese physicians and to identify potential mechanisms for promoting trust. We conducted semi-structured, in-depth interviews with 40 African migrants in Guangzhou, China. A modified version of the social ecological model was used as a theoretical framework. At the patient-physician level, interpersonal treatment, technical competence, perceived commitment and motive, and language concordance were associated with enhanced trust. At the health system level, two primary factors influenced African migrants' trust in their physicians: the fee-for-service payment system and lack of continuity with any one physician. Patients' social networks and the broader socio-cultural context of interactions between African migrants and Chinese locals also influenced patients' trust of their physicians. These findings demonstrate the importance of factors beyond the immediate patient-physician interaction and suggest opportunities to promote trust through health system interventions.

  20. Different mechanisms of risperidone result in improved interpersonal trust, social engagement and cooperative behavior in patients with schizophrenia compared to trifluoperazine.

    PubMed

    Tse, Wai Shing; Wong, Ann Siu Wah; Chan, Fu; Pang, Alfred Hin Tat; Bond, Alyson Jane; Chan, Chau Kiu Raymond

    2016-05-01

    Atypical antipsychotic treatment (e.g. risperidone) has been found to improve social functioning more than standard antipsychotic treatment. However, it is unclear which specific social behaviors are implicated in this improvement. The current study employed an interactive puzzle game to examine how social behaviors contribute to the improvement of social functioning by comparing patients receiving risperidone with those receiving trifluoperazine. Scores on the Positive and Negative Syndrome Scale, executive functioning, and social functioning were obtained from 24 patients with schizophrenia receiving either risperidone (n = 12) or trifluoperazine (n = 12), before their social behavior was measured in the interactive Tangrams Game. Immediately after the Tangrams Game, participants filled in two questionnaires measuring their interpersonal trust and rejection toward their game partner. Patients receiving risperidone showed more social engagement, cooperative behavior and interpersonal trust toward their game partners than those receiving trifluoperazine. Additional multivariate analysis of variance revealed that lower affiliative behavior was a function of positive symptoms; interpersonal trust had an impact on social engagement but executive functioning did not explain lower interpersonal trust or social disengagement. Improvement of social competence by risperidone might be related to the enhancement of both social behaviors and interpersonal trust as well as better symptom resolution. © 2016 The Authors. Psychiatry and Clinical Neurosciences © 2016 Japanese Society of Psychiatry and Neurology.

  1. When trust defies common security sense.

    PubMed

    Williams, Patricia A H

    2008-09-01

    Primary care medical practices fail to recognize the seriousness of security threats to their patient and practice information. This can be attributed to a lack of understanding of security concepts, underestimation of potential threats and the difficulty in configuration of security technology countermeasures. To appreciate the factors contributing to such problems, research into general practitioner security practice and perceptions of security was undertaken. The investigation focused on demographics, actual practice, issues and barriers, and practitioner perception. Poor implementation, lack of relevant knowledge and inconsistencies between principles and practice were identified as key themes. Also the results revealed an overwhelming reliance on trust in staff and in computer information systems. This clearly identified that both cultural and technical attributes contribute to the deficiencies in information security practice. The aim of this research is to understand user needs and problems when dealing with information security practice.

  2. Social capital, the miniaturization of community and cannabis smoking among young adults.

    PubMed

    Lindström, Martin

    2004-06-01

    The impact of social participation, trust and the miniaturization of community, i.e. the combination of high social participation and low trust, on cannabis smoking was investigated. The 2000 public health survey in Scania is a cross-sectional study. A total of 13,715 persons aged 18-80 years, of which 3,978 persons aged 18-34 years were included in this study, answered a postal questionnaire, which represents 59% of the random sample. A logistic regression model was used to investigate the association between the social capital variables and ever having experienced cannabis smoking. The multivariate analysis was performed to investigate the importance of possible confounders (age, country of origin and education) on the differences in having experienced cannabis smoking according to social participation, trust and their four combination categories. Cannabis smoking is not associated with social participation, but positively associated with low trust among both men and women, and the miniaturization of community, i.e. the combination of high social participation and low trust, among men. This study suggests that the miniaturization of community, i.e. the combination of high social participation and low levels of generalized trust of other people, may enhance the experience of cannabis smoking.

  3. Relationship between Primary School Teachers' Perceived Social Support and Organizational Trust Level

    ERIC Educational Resources Information Center

    Tasdan, Murat; Yalcin, Tugba

    2010-01-01

    Perceived social support and organizational trust have gained importance in organizational life along with the human relationship among organizations. While social support concept has been accepted as the support obtained from individual's surroundings, organizational trust is defined as the result of consistent behaviors based on mutual respect…

  4. New Superintendents: Trust, Networking, and Social Capital

    ERIC Educational Resources Information Center

    Ripley, Joan; Mitchell, Roxanne M.; Richman, John A.

    2013-01-01

    This instrumental case study explored how five newly appointed superintendents identified key stakeholders and built trust and social capital with stakeholders in their districts. Stakeholder, trust, and social capital theory were the lenses that guided this study. We utilized a pragmatic research design and thematic data analysis to interpret our…

  5. 78 FR 16540 - AIP Series Trust and Morgan Stanley AIP GP LP; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-15

    ... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 30420; File No. 812-14092] AIP Series Trust and Morgan Stanley AIP GP LP; Notice of Application March 11, 2013. AGENCY: Securities and Exchange Commission (``Commission''). ACTION: Notice of an application for an order under section 12(d)(1)(J) of the Investment Company Act o...

  6. 76 FR 71394 - Self-Regulatory Organizations; The Depository Trust Company; Order Approving a Proposed Rule...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-17

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65721; File No. SR-DTC-2011-07] Self-Regulatory Organizations; The Depository Trust Company; Order Approving a Proposed Rule Change as Modified by Amendment Nos. 1 and 2 Relating To a New Daily Report Subscription for Security Position Reports November 10, 2011. I. Introduction On August 24, 201...

  7. 75 FR 61786 - Northern Lights Fund Trust, et al.; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-06

    ...] Northern Lights Fund Trust, et al.; Notice of Application September 30, 2010. AGENCY: Securities and... certain financial instruments. Applicants: Northern Lights Fund Trust (``NLFT''), Arrow Investment Advisors, LLC (``AIA''), and Northern Lights Distributors, LLC (``NLD''). Filing Dates: The application was...

  8. Determinants of trust in B2C e-commerce and their relationship with consumer online trust

    NASA Astrophysics Data System (ADS)

    Bojang, Ismaila; Medvedev, Maxim A.; Spasov, Kamen B.; Matvevnina, Arina I.

    2017-12-01

    The aim of this research was to investigate specific determinants or factors that influence consumer online trust in the B2C e-commerce with a focus on consumers. Constructs such as perceived security, perceived privacy, perceived third party assurance, perceived reputation, perceived familiarity and perceived website quality and their relationship with online trust in the B2C context were studied. In conducting the research, a convenience sampling technique was adopted in carrying out the survey. Questionnaires were distributed to the target respondents and the data were analyzed using SPSS version 24. A Pearson's correlation was used to test the six hypotheses identified in this study. The results provided evidence that perceived security has the greatest influence on online trust. This was followed closely by perceived reputation and finally perceived privacy. This clearly shows that e-commerce consumer population considers these factors very imperative in engendering their trust in the virtual B2C e-commerce environment.

  9. A new security model for collaborative environments

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Agarwal, Deborah; Lorch, Markus; Thompson, Mary

    Prevalent authentication and authorization models for distributed systems provide for the protection of computer systems and resources from unauthorized use. The rules and policies that drive the access decisions in such systems are typically configured up front and require trust establishment before the systems can be used. This approach does not work well for computer software that moderates human-to-human interaction. This work proposes a new model for trust establishment and management in computer systems supporting collaborative work. The model supports the dynamic addition of new users to a collaboration with very little initial trust placed into their identity and supportsmore » the incremental building of trust relationships through endorsements from established collaborators. It also recognizes the strength of a users authentication when making trust decisions. By mimicking the way humans build trust naturally the model can support a wide variety of usage scenarios. Its particular strength lies in the support for ad-hoc and dynamic collaborations and the ubiquitous access to a Computer Supported Collaboration Workspace (CSCW) system from locations with varying levels of trust and security.« less

  10. To Trust or Not to Trust? What Drives Public Trust in Science in Social Media Engagement

    NASA Astrophysics Data System (ADS)

    Hwong, Y. L.; Oliver, C.; Van Kranendonk, M. J.

    2017-12-01

    The erosion of public trust in science is a serious concern today. This climate of distrust has real consequences, from the anti-vaccination movement to climate change denials. The age of social media promises opportunities for improved interactivity between scientists and the public, which experts hope will help improve public confidence in science. However, evidence linking social media engagement and public attitude towards science is scarce. Our study aimed to help fill this gap. We examined Twitter engagement and its impact on public trust in science, focusing on two related science issues: space science and climate change. Our datasets comprised of 10,000 randomly sampled tweets over a month's period in 2016. We used human annotation and machine learning to analyse the tweets. Results revealed the level of distrust was significantly higher in the climate change tweets. However, in the climate change network, people who engaged with science personalities trust science more than those who did not. This difference in trust levels was not present in the space science network. There the two clusters of people displayed similar levels of trust in science. Additionally, we used machine learning to predict the trust labels of tweets and conducted feature analysis to find the properties of trust-inspiring tweets. Our supervised learning algorithm was able to predict trust in science in our sample tweets with 84% accuracy. The strongest predictors of trust in science (as conveyed by tweets) were similarity, presence of URL and authenticity. Contrast this with the findings of our previous study investigating the features of highly engaging space science related social media messages, authenticity is the only feature that also inspires trust. This indicates that what works to promote engagement (e.g. `retweets', `Likes') does not necessarily build trust in science. Social media science communication is not as simple as `we engage, therefore they trust'. We suggest that social media science communication is more effective when scientists are aware of the nuances that characterise communications on virtual platforms. It may be that by being open, authentic and sensitive to the worldview of their audiences, scientists stand to get the most out of the opportunities offered by social media to improve public perception of science.

  11. The 'dark side' of social capital: trust and self-rated health in European countries.

    PubMed

    Campos-Matos, Inês; Subramanian, S V; Kawachi, Ichiro

    2016-02-01

    Generalized interpersonal trust (as an indicator of social capital) has been linked to health status at both the individual and ecological level. We sought to examine how changes in contextual and individual trust are associated with changes in self-rated health in the European Social Surveys 2002-12. A multilevel analysis using a variance components model was performed on 203 452 individuals nested within 145 country cohorts covering 35 countries. Conditional on sociodemographic covariates, we sought to examine the association between self-rated health and individual trust, country average trust and a cross-level interaction between the two. Although individual trust perceptions were significantly correlated with self-rated health [OR = 0.95, 95% confidence interval (0.94-0.96)], country-level trust was not associated [OR = 1.12, 95% confidence interval (0.95-1.32)]. There was, however, a strong crosslevel interaction between contextual and individual trust (P < 0.001), such that individuals with high interpersonal trust reported better health in contexts in which other individuals expressed high average interpersonal trust. Conversely, low trust individuals reported worse health in high trust contexts. Our findings suggest that contexts with increasing average trust can be harmful for low trust individuals, which might reflect the negative impact that social capital can have in certain groups. These findings suggest that contextual trust has a complex role in explaining health inequalities and individual self-rated health. © The Author 2015. Published by Oxford University Press on behalf of the European Public Health Association. All rights reserved.

  12. Security in Distributed Collaborative Environments: Limitations and Solutions

    NASA Astrophysics Data System (ADS)

    Saadi, Rachid; Pierson, Jean-Marc; Brunie, Lionel

    The main goal of establishing collaboration between heterogeneous environment is to create such as Pervasive context which provide nomadic users with ubiquitous access to digital information and surrounding resources. However, the constraints of mobility and heterogeneity arise a number of crucial issues related to security, especially authentication access control and privacy. First of all, in this chapter we explore the trust paradigm, specially the transitive capability to enable a trust peer to peer collaboration. In this manner, when each organization sets its own security policy to recognize (authenticate) users members of a trusted community and provide them a local access (access control), the trust transitivity between peers will allows users to gain a broad, larger and controlled access inside the pervasive environment. Next, we study the problem of user's privacy. In fact in pervasive and ubiquitous environments, nomadic users gather and exchange certificates or credential which providing them rights to access by transitivity unknown and trusted environments. These signed documents embeds increasing number of attribute that require to be filtered according to such contextual situation. In this chapter, we propose a new morph signature enabling each certificate owner to preserve his privacy by discloses or blinds some sensitive attributes according to faced situation.

  13. Plasma oxytocin immunoreactive products and response to trust in patients with social anxiety disorder.

    PubMed

    Hoge, Elizabeth A; Lawson, Elizabeth A; Metcalf, Christina A; Keshaviah, Aparna; Zak, Paul J; Pollack, Mark H; Simon, Naomi M

    2012-11-01

    Generalized Social Anxiety Disorder (GSAD) is characterized by excessive fear and avoidance of several types of social and performance situations. The pathophysiology is not well understood, but research in animals and humans has provided evidence that oxytocin helps regulate normal social affiliative behavior. Previous work in healthy male subjects demonstrated a rise in plasma oxytocin after receiving a high trust signal. To examine the oxytocin system in GSAD, we measured plasma oxytocin in GSAD patients and controls, before and after the social "Trust Game," a neuroeconomic test examining trust behavior and reaction to trust using real monetary incentives. Thirty-nine subjects with GSAD and 28 healthy controls provided three blood samples for oxytocin measurement before the Trust Game, and one sample after the game. Plasma estradiol was also measured at baseline. The Trust Game protocol version prioritized the sending of a signal of high cooperation and trust to all participants. All analyses controlled for gender and estradiol levels. Mean oxytocin levels post-Trust Game (P = .025), and overall (area under the curve, P = .011) were lower in GSADpatients compared to controls, after controlling for sex and estradiol. There was no significant change in oxytocin levels after the game in either group. We report low plasma oxytocin levels in patients with GSAD during a prosocial laboratory task paradigm. Additional research will be important to further examine the relationship between oxytocin and social behavior in GSAD. © 2012 Wiley Periodicals, Inc.

  14. Tenure security, social relations and contract choice: Endogenous matching in the Chinese land rental market

    NASA Astrophysics Data System (ADS)

    Ma, Xianlei; Zhou, Yuepeng; Shi, Xiaoping

    2017-04-01

    In China, land rental transactions have increased considerably since the 1990s, but there exists a high degree of segmentation and informal features. The rental transactions between partners with close social relations and the use of informal contracts remain a common phenomenon in many regions, which strongly reduce the potential of the land rental market to enhance productivity and equity. The current literature postulates that the insecurity of land property rights may restrict land transactions between members of same social relations. Studies conducted in China show that the land rentals between partners with closer social relations prefer informal contracts because these contracts are self-enforced based on trust and reputation. However, little literature has jointly examined the effect of land tenure security and social relations on joint decisions of partner and contract choice in the Chinese land rental market. Based on household data collected in Jiangxi and Liaoning provinces in 2015, this paper aims to examine the relationship between land tenure security perceptions, social relation and land rental contract choices in China. We differentiate between formal and informal contracts of land rental activities because they have different enforcement mechanisms and thus different risk-sharing strategy. With regards to social relations, we differ among relatives, villagers living in the same village and strangers according to social distance. In order to reduce estimation bias without accounting for endogenous matching between landlords and tenants, we investigate the joint partner and contract choices in the land rental market using a nested logit framework. The paper contributes to the literature on the effect of tenure security and social relations on land rental contracts by (i) taking into account endogenous matching between landlords and tenants, and estimating the joint decisions of partner and contract choice, and (ii) examining the effect of perceived tenure security, instead of de jure rights, on households' contract choice. The empirical results show that landlords are more likely to rent out land to tenants who live in the same village, instead of relatives and strangers. This kind of partner matching is based on consideration of both land tenure security and flexibility of rental relationships. Insecure land tenure encourages landlords to select informal contracts, because informal contracts seem to protect better protection than formal contracts as landlords are willing to match villagers. Policy implications are twofold based on our findings: 1) Land tenure reforms should put more emphasis on enhancing households' perception on tenure security and further reducing land market segmentation; 2) Measures that may be taken to stabilize rental contractual relationships may focus on the improvement of rural pension system and unemployment insurance for rural-urban migrants. Key Words: land rental market; contract choice; tenure security, social relations

  15. Social capital, the miniaturization of community and high alcohol consumption: a population-based study.

    PubMed

    Lindström, Martin

    2005-01-01

    To study the impact of social participation, trust, and the miniaturization of community, i.e. high social participation/low trust, on the risk of high alcohol consumption. The Scania 2000 public health survey is a cross-sectional, postal questionnaire study. A total of 13 604 persons aged 18-80 years were included. A logistic regression model was used to investigate the association between the social capital variables and high alcohol consumption (168.0 g/week or more for men and 108.0 g/week or more for women). The multivariate analyses analysed the importance of confounders (age, country of origin, education, and economic stress) on the risk of high alcohol consumption according to the social capital variables. A 14.0% proportion of all men and 7.8% of all women had an alcohol consumption above recommended levels. High alcohol consumption above recommended levels was not associated with social participation but negatively associated with trust among men. The miniaturization of community category, i.e. high social participation/low trust, had significantly higher risks of high alcohol consumption compared to the high social capital (high social participation/high trust) category among men. High social participation combined with low trust, i.e. the miniaturization of community, is positively associated high alcohol consumption among men. A structural/social factor which may affect the amount of alcohol consumed has thus been identified in this study.

  16. 17 CFR 230.487 - Effectiveness of registration statements filed by certain unit investment trusts.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... time of effectiveness of a series of such trust. Any such suspension, so long as it is in effect, shall... offering of the securities of a series of the unit investment trust, except the first series of such trust, may designate a date and time for such registration statement to become effective. If the registrant...

  17. 17 CFR 230.487 - Effectiveness of registration statements filed by certain unit investment trusts.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... time of effectiveness of a series of such trust. Any such suspension, so long as it is in effect, shall... offering of the securities of a series of the unit investment trust, except the first series of such trust, may designate a date and time for such registration statement to become effective. If the registrant...

  18. Methods for reliability evaluation of trust and reputation systems

    NASA Astrophysics Data System (ADS)

    Janiszewski, Marek B.

    2016-09-01

    Trust and reputation systems are a systematic approach to build security on the basis of observations of node's behaviour. Exchange of node's opinions about other nodes is very useful to indicate nodes which act selfishly or maliciously. The idea behind trust and reputation systems gets significance because of the fact that conventional security measures (based on cryptography) are often not sufficient. Trust and reputation systems can be used in various types of networks such as WSN, MANET, P2P and also in e-commerce applications. Trust and reputation systems give not only benefits but also could be a thread itself. Many attacks aim at trust and reputation systems exist, but such attacks still have not gain enough attention of research teams. Moreover, joint effects of many of known attacks have been determined as a very interesting field of research. Lack of an acknowledged methodology of evaluation of trust and reputation systems is a serious problem. This paper aims at presenting various approaches of evaluation such systems. This work also contains a description of generalization of many trust and reputation systems which can be used to evaluate reliability of such systems in the context of preventing various attacks.

  19. The use of attachment theory in the clinical dialogue with patients.

    PubMed

    Cortina, Mauricio

    2013-01-01

    Attachment theory specifically addresses the ability to use an attachment figure as a haven of safety and base of exploration. While many other relational issues are important during development, a foundation of trust based on having positive expectations that others will be available when needed is clearly relevant in the practice of psychotherapy. Yet many patients come in with histories of insecure or even disorganized attachment and have suffered different forms of maltreatment. Understanding affect-regulating strategies, defensive processes, and transference and countertransference patterns associated with insecure or disorganized patterns is enormously useful during the clinical exchange. In addition to paying attention to affect regulation strategies, it is important to note that two other motivational systems may become coopted for defensive purposes in order to cope with disorganized attachment: the caregiving system and the ranking system (the latter being the legacy of dominance hierarchies we observe in primates). The other theme in this article is the importance of paying attention to a cooperative and social engagement motivational system (sometimes referred sometimes to as a social or affiliative motive) in building a therapeutic alliance. This prosocial motive is not about safety (attachment) but about sharing and developing positive social relations with others (Cortina & Liotti, 2010). The article explores the significance of building on this cooperative and social engagement system when there is not a foundation of trust based on a secure attachment history.

  20. Combinations of social participation and trust, and association with health status-an Australian perspective.

    PubMed

    Williams, Susan L; Ronan, Kevin

    2014-12-01

    A limited number of studies have examined the 'miniaturization of community' model which is based on belief that 'new' individualistic, and narrower forms of social participation, do not promote generalized trust in others. Little is known about miniaturization of community and self-reported health, physical health and psychological health in Australia. Data from a 2009 computer-assisted-telephone-interview survey was used to investigate generalized trust, social participation and health-related quality of life in a regional Australian population (n = 1273; mean age 51.2 years). Logistic regression analyses were performed to investigate the associations between generalized trust, social participation and poor self-reported health (global self-rated, psychological and physical), and included four social participation/trust categories. A majority (67%) reported high generalized trust of others, 54% were categorized as high social participators. Miniaturization of community was a risk factor for poor self-rated psychological health across genders, and a risk factor for poor self-rated health for males. For women, low social participation (irrespective of trust level) was associated with poor self-reported health. Given current and previous findings, there is a need for further research in a range of contexts which explores the underlying concept of miniaturization of community, that is, the changes in social participation and social networks which may negatively impact community health. © The Author (2013). Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  1. Trust in Health Information Sources: Survey Analysis of Variation by Sociodemographic and Tobacco Use Status in Oklahoma.

    PubMed

    Brown-Johnson, Cati G; Boeckman, Lindsay M; White, Ashley H; Burbank, Andrea D; Paulson, Sjonna; Beebe, Laura A

    2018-02-12

    Modern technology (ie, websites and social media) has significantly changed social mores in health information access and delivery. Although mass media campaigns for health intervention have proven effective and cost-effective in changing health behavior at a population scale, this is best studied in traditional media sources (ie, radio and television). Digital health interventions are options that use short message service/text messaging, social media, and internet technology. Although exposure to these products is becoming ubiquitous, electronic health information is novel, incompletely disseminated, and frequently inaccurate, which decreases public trust. Previous research has shown that audience trust in health care providers significantly moderates health outcomes, demographics significantly influence audience trust in electronic media, and preexisting health behaviors such as smoking status significantly moderate audience receptivity to traditional mass media. Therefore, modern health educators must assess audience trust in all sources, both media (traditional and digital) and interpersonal, to balance pros and cons before structuring multicomponent community health interventions. We aimed to explore current trust and moderators of trust in health information sources given recent changes in digital health information access and delivery to inform design of future health interventions in Oklahoma. We conducted phone surveys of a cross-sectional sample of 1001 Oklahoma adults (age 18-65 years) in spring 2015 to assess trust in seven media sources: traditional (television and radio), electronic (online and social media), and interpersonal (providers, insurers, and family/friends). We also gathered information on known moderators of trust (sociodemographics and tobacco use status). We modeled log odds of a participant rating a source as "trustworthy" (SAS PROC SURVEYLOGISTIC), with subanalysis for confounders (sociodemographics and tobacco use). Oklahomans showed the highest trust in interpersonal sources: 81% (808/994) reported providers were trustworthy, 55% (550/999) for friends and family, and 48% (485/998) for health insurers. For media sources, 24% of participants (232/989) rated the internet as trustworthy, followed by 21% of participants for television (225/998), 18% for radio (199/988), and only 11% for social media (110/991). Despite this low self-reported trust in social media, 40% (406/991) of participants reported using social media for tobacco-related health information. Trust in health providers did not vary by subpopulation, but sociodemographic variables (gender, income, and education) and tobacco use status significantly moderated trust in other sources. Women were on the whole more trusting than men, trust in media decreased with income, and trust in friends and family decreased with education. Health education interventions should incorporate digital media, particularly when targeting low-income populations. Utilizing health care providers in social media settings could leverage high-trust and low-cost features of providers and social media, respectively. ©Cati G Brown-Johnson, Lindsay M Boeckman, Ashley H White, Andrea D Burbank, Sjonna Paulson, Laura A Beebe. Originally published in JMIR Public Health and Surveillance (http://publichealth.jmir.org), 12.02.2018.

  2. Applying the SERENITY Methodology to the Domain of Trusted Electronic Archiving

    NASA Astrophysics Data System (ADS)

    Porekar, Jan; Klobučar, Tomaž; Šaljič, Svetlana; Gabrijelčič, Dušan

    We present the application of the SERENITY methodology to the domain of long-term trusted electronic archiving, sometimes also referred to as trusted digital notary services. We address the SERENITY approach from thepoint of view of a company providing security solutions in the mentioned domain and adopt the role of a solution developer. In this chapter we show a complete vertical slice through the trusted archiving domain providing: (i) the relevant S&D properties, (ii) the S&D classes and S&D patterns on both organizational and technical level, (iii) describe how S&D patterns are integrated into a trusted longterm archiving service using the SERENITY Run-Time Framework (SRF). At the end of the chapter we put in perspective what a solution developer can learn from the process of capturing security knowledge according to SERENITY methodology and we discuss how existing implementations of archiving services can benefit from SERENITY approach in the future.

  3. Social capital, trust in health information, and acceptance of Measles-Rubella vaccination campaign in Tamil Nadu: A case-control study.

    PubMed

    Palanisamy, B; Gopichandran, V; Kosalram, K

    2018-06-18

    Parents' decision about vaccination of children is influenced by social relationships and sources of information. The aim of this study was to assess the influence of social capital and trust in health information on the status of Measles-Rubella (MR) vaccination campaign in Tamil Nadu. This was a case-control study carried out in Kancheepuram district in Tamil Nadu where the MR vaccination campaign offered by Government of Tamil Nadu had poor acceptance. Cases were parents of children who had refused the MR vaccine and controls were parents having children in the same age group who had accepted the vaccine. Data on social capital and trust in health information were collected by using social capital scale developed by the researchers and trust in the source of information was measured by using simple questions on the level of trust in the information source. Nonadministration of MR vaccine was high among young parents and parents of younger children. Vaccine acceptance was higher when it was offered at school (P < 0.000) and also among parents who trusted school teachers (P < 0.003) and other school children (P < 0.014) as source of information. MR vaccine acceptance was less among parents who trusted social media and WhatsApp information. Greater levels of health-related physical social capital led to greater vaccine hesitancy. Multivariate analysis revealed that greater the age of the child, better parental attitudes toward vaccination, poorer health-related physical social capital, and greater trust in health information provided by school teachers led to overall greater acceptance of the MR vaccine. Strong homogeneous bonding social capital had a negative influence on MR vaccine acceptance. Schools and school teachers played a vital role in influencing parental decision to vaccinate.

  4. The Condition for Generous Trust.

    PubMed

    Shinya, Obayashi; Yusuke, Inagaki; Hiroki, Takikawa

    2016-01-01

    Trust has been considered the "cement" of a society and is much studied in sociology and other social sciences. Most studies, however, have neglected one important aspect of trust: it involves an act of forgiving and showing tolerance toward another's failure. In this study, we refer to this concept as "generous trust" and examine the conditions under which generous trust becomes a more viable option when compared to other types of trust. We investigate two settings. First, we introduce two types of uncertainties: uncertainty as to whether trustees have the intention to cooperate, and uncertainty as to whether trustees have enough competence to accomplish the entrusted tasks. Second, we examine the manner in which trust functions in a broader social context, one that involves matching and commitment processes. Since we expect generosity or forgiveness to work differently in the matching and commitment processes, we must differentiate trust strategies into generous trust in the matching process and that in the commitment process. Our analytical strategy is two-fold. First, we analyze the "modified" trust game that incorporates the two types of uncertainties without the matching process. This simplified setting enables us to derive mathematical results using game theory, thereby giving basic insight into the trust mechanism. Second, we investigate socially embedded trust relationships in contexts involving the matching and commitment processes, using agent-based simulation. Results show that uncertainty about partner's intention and competence makes generous trust a viable option. In contrast, too much uncertainty undermines the possibility of generous trust. Furthermore, a strategy that is too generous cannot stand alone. Generosity should be accompanied with moderate punishment. As for socially embedded trust relationships, generosity functions differently in the matching process versus the commitment process. Indeed, these two types of generous trust coexist, and their coexistence enables a society to function well.

  5. Collective Trust: A Social Indicator of Instructional Capacity

    ERIC Educational Resources Information Center

    Adams, Curt M.

    2013-01-01

    Purpose: The purpose of this study is to test the validity of using collective trust as a social indicator of instructional capacity. Design/methodology/approach: A hypothesized model was advanced for the empirical investigation. Collective trust was specified as a latent construct with observable indicators being principal trust in faculty (PTF),…

  6. Trust and social reciprocity in adolescence--a matter of perspective-taking.

    PubMed

    Fett, Anne-Kathrin J; Shergill, Sukhi S; Gromann, Paula M; Dumontheil, Iroise; Blakemore, Sarah-Jayne; Yakub, Farah; Krabbendam, Lydia

    2014-02-01

    Changes in social behaviour from childhood to adulthood have been suggested to be driven by an increased sensitivity to others' perspectives. Yet, the link between perspective-taking and social processes, such as trust and reciprocity, has rarely been investigated during adolescence. Using two trust games with a cooperative and an unfair counterpart and an online perspective-taking task with 50 adolescents, we show that those with a higher perspective-taking tendency demonstrate greater trust towards others and higher levels of trust during cooperative interactions. Both low and high perspective-takers adapted their levels of trust in response to unfair behaviour. However, high perspective-takers reduced their trust more drastically and showed more malevolent and less benevolent tit-for-tat when they were treated unfairly by their counterpart. The findings suggest that a higher perspective-taking tendency in adolescence is associated with specific mechanisms of trust and reciprocity, as opposed to undifferentiated increases in positive social behaviour towards others. Copyright © 2013 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  7. Social capital, the miniaturisation of community and consumption of homemade liquor and smuggled liquor during the past year. A population-based study.

    PubMed

    Lindström, Martin

    2005-12-01

    To study the impact of social participation, trust and the miniaturisation of community, i.e. high social participation/low trust, on consumption of homemade liquor and smuggled liquor during the past year. The Scania 2000 public health survey is a cross-sectional, postal questionnaire study. A total of 13,604 persons aged 18-80 years were included. A logistic regression model was used to investigate the association between the social capital variables and illegal alcohol consumption. The multivariate analyses analysed the importance of confounders (age, country of origin, education and economic stress) on the differences in consumption of homemade and smuggled liquor according to the social capital variables. A 28.2% proportion of all men and 14.9% of all women had consumed homemade liquor during the past year. The proportions who had consumed smuggled liquor during the past year were even higher, 40.1% among men and 21.4% among women. Both forms of illegal alcohol consumption were significantly positively associated with social participation and negatively associated with trust. The miniaturisation of community category, i.e. high social participation/low trust, had significantly higher risks of consumption during the past year of the consumption of both forms of illegally provided alcohol compared to the high social capital (high social participation/high trust) category, while the low social participation/high trust category had significantly lower risks. High social participation combined with low trust is positively associated with consumption of illegally provided alcohol. The results have implications for alcohol prevention programs, because structural/social factors that may hinder information and norms concerning illegal alcohol have been identified in this study.

  8. Social information influences trust behaviour in adolescents.

    PubMed

    Lee, Nikki C; Jolles, Jelle; Krabbendam, Lydia

    2016-01-01

    Trust plays an integral role in daily interactions within adolescents' social environment. Using a trust game paradigm, this study investigated the modulating influence of social information about three interaction partners on trust behaviour in adolescents aged 12-18 (N = 845). After receiving information about their interaction partners prior to the task, participants were most likely to share with a 'good' partner and rate this partner as most trustworthy. Over the course of the task all interaction partners showed similar levels of trustworthy behaviour, but overall participants continued to trust and view the good partner as more trustworthy than 'bad' and 'neutral' partners throughout the game. However, with age the ability to overcome prior social information and adapt trust behaviour improved: middle and late adolescents showed a larger decrease in trust of the good partner than early adolescents, and late adolescents were more likely to reward trustworthy behaviour from the negative partner. Copyright © 2015 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  9. Does community social embeddedness promote generalized trust? An experimental test of the spillover effect.

    PubMed

    Lo Iacono, Sergio

    2018-07-01

    Despite the theoretical relevance attributed to the spillover effect, little empirical research has focused on testing its causal validity. Addressing this gap in the literature, I propose a novel experimental design to test if the overall density of social links in a community promotes trustworthy and trusting behaviors with absolute strangers. Controlling for social integration (i.e. the individual number of social connections), I found that density fosters higher levels of trust. In particular, results show that people in denser communities are more likely to trust their unknown fellow citizens, encouraging isolated subjects to engage with strangers. However, evidence did not support the idea that community social embeddedness causes an increase of trustworthiness, indicating that the spillover effect works only with respect to trust. Copyright © 2018 Elsevier Inc. All rights reserved.

  10. Community trust and household health: A spatially-based approach with evidence from rural Honduras.

    PubMed

    Zarychta, Alan

    2015-12-01

    What is the relationship between community trust and household health? Scholars working to understand the effects of trust and social capital on human health tend to focus on individual characteristics or social environments, frequently without integrating these two dimensions. In light of this, the present paper makes contributions in both conceptualization and measurement. First, I develop a spatially-based approach for operationalizing community trust as the product of individual orientation and social environment. This approach highlights the need for a household to trust its neighbors and for those neighbors to reciprocate trust in order to constitute the psychological and material mechanisms critical for linking social context to individual health. Second, I illustrate the utility of this measure by evaluating the relationship between community trust and self-rated health status using an original population census survey from 2009 to 2010 for two municipalities in western Honduras (approximately 2800 households with a response rate of 94.9%). I implement spatial regression analysis and show that there is a positive and substantively meaningful relationship between community trust and household health; households that are trusting and surrounded by similarly trusting neighbors report better health status, while those in uncertain or mutually distrusting environments report worse health. The theory and results presented here suggest an important link between trust and social capital at the community level, which is particularly salient for rural regions in developing countries where health resources are scarce and community-based interventions are common. Copyright © 2015 Elsevier Ltd. All rights reserved.

  11. Commitment to nursing: results of a qualitative interview study.

    PubMed

    Gould, Dinah; Fontenla, Marina

    2006-04-01

    The aims of the study were to explore opportunities to undergo continuing professional education, family friendly policy and holding an innovative or traditional post on nurses' job satisfaction and professional and organizational commitment. Qualified nurses have become a scare resource in the National Health Service. Managers need to be aware of the work-related factors most likely to secure nurses' professional and organizational commitment which will contribute to the retention. Commitment is thought to be increased if opportunities for continuing professional education are good. Family friendly policy is also important. Less is known about the relationship between type of nursing work and commitment. An in-depth, exploratory approach to data collection were taken, employing an interview guide with open-ended questions. Data were collected with 27 nurses in clinical grades in two contrasting trusts. Family friendly policies emerged as most important in securing nursing commitment. Those in innovative posts whose work entailed social hours and greater professional autonomy also displayed greater levels of job satisfaction. Opportunities for continuing professional education had less influence on professional and organizational commitment. Providing flexible or social working hours appears to be more influential than providing opportunities for continuing professional education in securing nursing commitment in this exploratory study.

  12. Diamond High Assurance Security Program: Trusted Computing Exemplar

    DTIC Science & Technology

    2002-09-01

    computing component, the Embedded MicroKernel Prototype. A third-party evaluation of the component will be initiated during development (e.g., once...target technologies and larger projects is a topic for future research. Trusted Computing Reference Component – The Embedded MicroKernel Prototype We...Kernel The primary security function of the Embedded MicroKernel will be to enforce process and data-domain separation, while providing primitive

  13. 76 FR 56847 - Self-Regulatory Organizations; The Depository Trust Company; Notice of Filing of Proposed Rule...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-14

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65286; File No. SR-DTC-2011-07] Self-Regulatory Organizations; The Depository Trust Company; Notice of Filing of Proposed Rule Change as Modified by Amendment Nos. 1 and 2 Relating to a New Daily Report Subscription for Security Position Reports September 7, 2011. Pursuant to Section 19(b)(1) of...

  14. SSeCloud: Using secret sharing scheme to secure keys

    NASA Astrophysics Data System (ADS)

    Hu, Liang; Huang, Yang; Yang, Disheng; Zhang, Yuzhen; Liu, Hengchang

    2017-08-01

    With the use of cloud storage services, one of the concerns is how to protect sensitive data securely and privately. While users enjoy the convenience of data storage provided by semi-trusted cloud storage providers, they are confronted with all kinds of risks at the same time. In this paper, we present SSeCloud, a secure cloud storage system that improves security and usability by applying secret sharing scheme to secure keys. The system encrypts uploading files on the client side and splits encrypted keys into three shares. Each of them is respectively stored by users, cloud storage providers and the alternative third trusted party. Any two of the parties can reconstruct keys. Evaluation results of prototype system show that SSeCloud provides high security without too much performance penalty.

  15. Measurement-Device-Independent Quantum Key Distribution over Untrustful Metropolitan Network

    NASA Astrophysics Data System (ADS)

    Tang, Yan-Lin; Yin, Hua-Lei; Zhao, Qi; Liu, Hui; Sun, Xiang-Xiang; Huang, Ming-Qi; Zhang, Wei-Jun; Chen, Si-Jing; Zhang, Lu; You, Li-Xing; Wang, Zhen; Liu, Yang; Lu, Chao-Yang; Jiang, Xiao; Ma, Xiongfeng; Zhang, Qiang; Chen, Teng-Yun; Pan, Jian-Wei

    2016-01-01

    Quantum cryptography holds the promise to establish an information-theoretically secure global network. All field tests of metropolitan-scale quantum networks to date are based on trusted relays. The security critically relies on the accountability of the trusted relays, which will break down if the relay is dishonest or compromised. Here, we construct a measurement-device-independent quantum key distribution (MDIQKD) network in a star topology over a 200-square-kilometer metropolitan area, which is secure against untrustful relays and against all detection attacks. In the field test, our system continuously runs through one week with a secure key rate 10 times larger than previous results. Our results demonstrate that the MDIQKD network, combining the best of both worlds—security and practicality, constitutes an appealing solution to secure metropolitan communications.

  16. Using Trusted Resources

    MedlinePlus

    ... any risk involved in sharing your information online. Social Media Social media sites (such as Facebook, Twitter) are good ways ... when you're seeking medical information, only follow social media from reputable sources. Many trusted organizations have social ...

  17. Trust and Deception in Children with Autism Spectrum Disorders: A Social Learning Perspective.

    PubMed

    Yang, Yiying; Tian, Yuan; Fang, Jing; Lu, Haoyang; Wei, Kunlin; Yi, Li

    2017-03-01

    Previous research has demonstrated abnormal trust and deception behaviors in children with Autism Spectrum Disorders (ASD), and we aimed to examine whether these abnormalities were primarily due to their specific deficits in social learning. We tested 42 high-functioning children with ASD and 38 age- and ability-matched typically developing (TD) children in trust and deception tasks and a novel condition with reduced social components. Results indicated that while TD children improved their performance with more social components, children with ASD lacked this additional performance gain, though they performed similarly as TD children in the condition with reduced social components. Our findings highlight that deficits of ASD in trust and deception are primarily associated with failure of use of social cues.

  18. African Migrant Patients’ Trust in Chinese Physicians: A Social Ecological Approach to Understanding Patient-Physician Trust

    PubMed Central

    McLaughlin, Megan M.; Simonson, Louis; Zou, Xia; Ling, Li; Tucker, Joseph D.

    2015-01-01

    Background Patient trust in physicians is a critical determinant of health seeking behaviors, medication adherence, and health outcomes. A crisis of interpersonal trust exists in China, extending throughout multiple social spheres, including the healthcare system. At the same time, with increased migration from Africa to China in the last two decades, Chinese physicians must establish mutual trust with an increasingly diverse patient population. We undertook a qualitative study to identify factors affecting African migrants’ trust in Chinese physicians and to identify potential mechanisms for promoting trust. Methods / Principal Findings We conducted semi-structured, in-depth interviews with 40 African migrants in Guangzhou, China. A modified version of the social ecological model was used as a theoretical framework. At the patient-physician level, interpersonal treatment, technical competence, perceived commitment and motive, and language concordance were associated with enhanced trust. At the health system level, two primary factors influenced African migrants’ trust in their physicians: the fee-for-service payment system and lack of continuity with any one physician. Patients’ social networks and the broader socio-cultural context of interactions between African migrants and Chinese locals also influenced patients’ trust of their physicians. Conclusions These findings demonstrate the importance of factors beyond the immediate patient-physician interaction and suggest opportunities to promote trust through health system interventions. PMID:25965064

  19. Trying to trust: Brain activity during interpersonal social attitude change.

    PubMed

    Filkowski, Megan M; Anderson, Ian W; Haas, Brian W

    2016-04-01

    Interpersonal trust and distrust are important components of human social interaction. Although several studies have shown that brain function is associated with either trusting or distrusting others, very little is known regarding brain function during the control of social attitudes, including trust and distrust. This study was designed to investigate the neural mechanisms involved when people attempt to control their attitudes of trust or distrust toward another person. We used a novel control-of-attitudes fMRI task, which involved explicit instructions to control attitudes of interpersonal trust and distrust. Control of trust or distrust was operationally defined as changes in trustworthiness evaluations of neutral faces before and after the control-of-attitudes fMRI task. Overall, participants (n = 60) evaluated faces paired with the distrust instruction as being less trustworthy than faces paired with the trust instruction following the control-of-distrust task. Within the brain, both the control-of-trust and control-of-distrust conditions were associated with increased temporoparietal junction, precuneus (PrC), inferior frontal gyrus (IFG), and medial prefrontal cortex activity. Individual differences in the control of trust were associated with PrC activity, and individual differences in the control of distrust were associated with IFG activity. Together, these findings identify a brain network involved in the explicit control of distrust and trust and indicate that the PrC and IFG may serve to consolidate interpersonal social attitudes.

  20. 17 CFR 240.3a11-1 - Definition of the term “equity security.”

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... joint venture, or certificate of interest in a business trust; any security future on any such security..., call, straddle, or other option or privilege of buying such a security from or selling such a security...

  1. 76 FR 72462 - Bandon Capital Management, LLC and Northern Lights Fund Trust; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-23

    ... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 29864; 812-13936] Bandon Capital Management, LLC and Northern Lights Fund Trust; Notice of Application November 17, 2011. AGENCY... Capital Management, LLC (``Bandon Capital'' or the ``Adviser'') and Northern Lights Fund Trust (the...

  2. 26 CFR 1.856-3 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... TAXES Real Estate Investment Trusts § 1.856-3 Definitions. For purposes of the regulations under part II... trustees of the real estate investment trust. In the case of securities of other qualified real estate investment trusts, fair value shall not exceed market value or asset value, whichever is higher. (b) Real...

  3. 77 FR 34095 - Federated Investment Management Company and Federated ETF Trust; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-08

    ... Investment Management Company and Federated ETF Trust; Notice of Application June 1, 2012. AGENCY: Securities... (e) certain registered management investment companies and unit investment trusts outside of the same... Daniele Marchesani, Branch Chief, at (202) 551-6821 (Division of Investment Management, Office of...

  4. 31 CFR 328.2 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., DEPARTMENT OF THE TREASURY BUREAU OF THE PUBLIC DEBT RESTRICTIVE ENDORSEMENTS OF U.S. BEARER SECURITIES § 328...), incorporated trust companies (i.e., trust companies doing either a general banking business or a general trust... institutions as may be designated by the Federal Reserve banks. This definition is limited to institutions...

  5. 78 FR 41943 - Agency Information Collection Activities; Trusted Traveler Programs

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-12

    ...: Trusted Traveler Programs (Global Entry, SENTRI and FAST). OMB Number: 1651-0121. Form Numbers: 823S (SENTRI) and 823F (FAST). Abstract: This collection of information is for CBP's Trusted Traveler Programs... entry at specified southwest land border ports of entry; the Free and Secure Trade Program (FAST), which...

  6. 29 CFR 2550.403b-1 - Exemptions from trust requirement.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 9 2010-07-01 2010-07-01 false Exemptions from trust requirement. 2550.403b-1 Section 2550.403b-1 Labor Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION... AND REGULATIONS FOR FIDUCIARY RESPONSIBILITY § 2550.403b-1 Exemptions from trust requirement. (a...

  7. 78 FR 42122 - Bridge Builder Trust and Olive Street Investment Advisers, LLC; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-15

    ... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 30592; 812-14118] Bridge...: Bridge Builder Trust (the ``Trust'') and Olive Street Investment Advisers (the ``Adviser'') (collectively... the requested order as a Fund is the Bridge Builder Bond Fund. For purposes of the requested order...

  8. Cross-Sectional and Longitudinal Relations among Children's Trust Beliefs, Psychological Maladjustment and Social Relationships: Are Very High as Well as Very Low Trusting Children at Risk?

    ERIC Educational Resources Information Center

    Rotenberg, Ken J.; Boulton, Michael J.; Fox, Claire L.

    2005-01-01

    Four hundred and thirty-four children enrolled in school years 5 and 6 in the United Kingdom were administered measures of trust beliefs in peers/best friends and psychosocial functioning (internalized maladjustment, self-perceived social acceptance, social preference, and social exclusion) across an 8-month period (mean age = 9 years-9 months at…

  9. Testosterone Administration Moderates Effect of Social Environment on Trust in Women Depending on Second-to-Fourth Digit Ratio

    PubMed Central

    Buskens, Vincent; Raub, Werner; van Miltenburg, Nynke; Montoya, Estrella R.; van Honk, Jack

    2016-01-01

    Animal research has established that effects of hormones on social behaviour depend on characteristics of both individual and environment. Insight from research on humans into this interdependence is limited, though. Specifically, hardly any prior testosterone experiments in humans scrutinized the interdependency of testosterone with the social environment. Nonetheless, recent testosterone administration studies in humans repeatedly show that a proxy for individuals’ prenatal testosterone-to-estradiol ratio, second-to-fourth digit-ratio (2D:4D ratio), influences effects of testosterone administration on human social behaviour. Here, we systematically vary the characteristics of the social environment and show that, depending on prenatal sex hormone priming, testosterone administration in women moderates the effect of the social environment on trust. We use the economic trust game and compare one-shot games modelling trust problems in relations between strangers with repeated games modelling trust problems in ongoing relations between partners. As expected, subjects are more trustful in repeated than in one-shot games. In subjects prenatally relatively highly primed by testosterone, however, this effect disappears after testosterone administration. We argue that impairments in cognitive empathy may reduce the repeated game effect on trust after testosterone administration in subjects with relatively high prenatal testosterone exposure and propose a neurobiological explanation for this effect. PMID:27282952

  10. Testosterone Administration Moderates Effect of Social Environment on Trust in Women Depending on Second-to-Fourth Digit Ratio.

    PubMed

    Buskens, Vincent; Raub, Werner; van Miltenburg, Nynke; Montoya, Estrella R; van Honk, Jack

    2016-06-10

    Animal research has established that effects of hormones on social behaviour depend on characteristics of both individual and environment. Insight from research on humans into this interdependence is limited, though. Specifically, hardly any prior testosterone experiments in humans scrutinized the interdependency of testosterone with the social environment. Nonetheless, recent testosterone administration studies in humans repeatedly show that a proxy for individuals' prenatal testosterone-to-estradiol ratio, second-to-fourth digit-ratio (2D:4D ratio), influences effects of testosterone administration on human social behaviour. Here, we systematically vary the characteristics of the social environment and show that, depending on prenatal sex hormone priming, testosterone administration in women moderates the effect of the social environment on trust. We use the economic trust game and compare one-shot games modelling trust problems in relations between strangers with repeated games modelling trust problems in ongoing relations between partners. As expected, subjects are more trustful in repeated than in one-shot games. In subjects prenatally relatively highly primed by testosterone, however, this effect disappears after testosterone administration. We argue that impairments in cognitive empathy may reduce the repeated game effect on trust after testosterone administration in subjects with relatively high prenatal testosterone exposure and propose a neurobiological explanation for this effect.

  11. Direct and indirect effects of third-party relationships on interpersonal trust.

    PubMed

    Ferrin, Donald L; Dirks, Kurt T; Shah, Pri P

    2006-07-01

    Past studies of the determinants of interpersonal trust have focused primarily on how trust forms in isolated dyads. Yet within organizations, trust typically develops between individuals who are embedded in a complex web of existing and potential relationships. In this article, the authors identify 3 alternative ways in which a trustor and trustee may be linked to each other via third parties: network closure (linked via social interactions with third parties), trust transferability (linked via trusted third parties), and structural equivalence (linked via the similarity of their relationships with all potential third parties within the organization). Each of these is argued to influence interpersonal trust via a distinct social mechanism. The authors hypothesized that network closure and structural equivalence would predict interpersonal trust indirectly via their impact on interpersonal organizational citizenship behaviors performed within the interpersonal relationship, whereas trust transferability would predict trust directly. Social network analyses of data gathered from a medium-sized work organization provide substantial support for the hypotheses and also suggest important directions for future research. ((c) 2006 APA, all rights reserved).

  12. 77 FR 49048 - Self-Regulatory Organizations; The Depository Trust Company; Notice of Filing and Immediate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-15

    ... to certain issues of securities in DTC's Fast Automated Securities Transfer program (``FAST''). For securities that are part of the FAST program, the transfer agents hold the securities registered in the name...

  13. New information and social trust: asymmetry and perseverance of attributions about hazard managers.

    PubMed

    Cvetkovich, George; Siegrist, Michael; Murray, Rachel; Tragesser, Sarah

    2002-04-01

    It has been argued that news about negative events has a much stronger effect on decreasing social trust than does news about positive events on increasing it. This asymmetry principle of trust was investigated in two surveys that also investigated the perseverance of trust. The possibility that established trust attributions persevere in the face of new information raises questions about the limits of trust asymmetry. The two studies yielded evidence that both type of news (good versus bad) and initial general trust in the nuclear power industry or the food supply industry affected level of trust. Compared to individuals trusting the industry, those distrusting the industry exhibited less trust following both bad and good news events. Study I also found that judged informativeness and judged positiveness of news events were affected by type of news and general trust of the industry. Individuals low in general trust of the nuclear power industry judged both bad news and good news as less positive than did those high in general trust. Those low in general trust judged bad news as more informative than good news and than did those high in general trust. An important implication of the perseverance of trust is to focus attention on including not only the effects of information about specific events and actions, but also on the judgment processes underlying social trust. The Salient Value Similarity model is suggested as one way of accounting for these psychological processes.

  14. Distrust As a Disease Avoidance Strategy: Individual Differences in Disgust Sensitivity Regulate Generalized Social Trust.

    PubMed

    Aarøe, Lene; Osmundsen, Mathias; Petersen, Michael Bang

    2016-01-01

    Throughout human evolutionary history, cooperative contact with others has been fundamental for human survival. At the same time, social contact has been a source of threats. In this article, we focus on one particular viable threat, communicable disease, and investigate how motivations to avoid pathogens influence people's propensity to interact and cooperate with others, as measured by individual differences in generalized social trust. While extant studies on pathogen avoidance have argued that such motivations should prompt people to avoid interactions with outgroups specifically, we argue that these motivations should prompt people to avoid others more broadly. Empirically, we utilize two convenience samples and a large nationally representative sample of US citizens to demonstrate the existence of a robust and replicable effect of individual differences in pathogen disgust sensitivity on generalized social trust. We furthermore compare the effects of pathogen disgust sensitivity on generalized social trust and outgroup prejudice and explore whether generalized social trust to some extent constitutes a pathway between pathogen avoidance motivations and prejudice.

  15. Distrust As a Disease Avoidance Strategy: Individual Differences in Disgust Sensitivity Regulate Generalized Social Trust

    PubMed Central

    Aarøe, Lene; Osmundsen, Mathias; Petersen, Michael Bang

    2016-01-01

    Throughout human evolutionary history, cooperative contact with others has been fundamental for human survival. At the same time, social contact has been a source of threats. In this article, we focus on one particular viable threat, communicable disease, and investigate how motivations to avoid pathogens influence people's propensity to interact and cooperate with others, as measured by individual differences in generalized social trust. While extant studies on pathogen avoidance have argued that such motivations should prompt people to avoid interactions with outgroups specifically, we argue that these motivations should prompt people to avoid others more broadly. Empirically, we utilize two convenience samples and a large nationally representative sample of US citizens to demonstrate the existence of a robust and replicable effect of individual differences in pathogen disgust sensitivity on generalized social trust. We furthermore compare the effects of pathogen disgust sensitivity on generalized social trust and outgroup prejudice and explore whether generalized social trust to some extent constitutes a pathway between pathogen avoidance motivations and prejudice. PMID:27516744

  16. Exploring pathways for building trust in vaccination and strengthening health system resilience.

    PubMed

    Ozawa, Sachiko; Paina, Ligia; Qiu, Mary

    2016-11-15

    Trust is critical to generate and maintain demand for vaccines in low and middle income countries. However, there is little documentation on how health system insufficiencies affect trust in vaccination and the process of re-building trust once it has been compromised. We reflect on how disruptions to immunizations systems can affect trust in vaccination and can compromise vaccine utilization. We then explore key pathways for overcoming system vulnerabilities in order to restore trust, to strengthen the resilience of health systems and communities, and to promote vaccine utilization. Utilizing secondary data and a review of the literature, we developed a causal loop diagram (CLD) to map the determinants of building trust in immunizations. Using the CLD, we devised three scenarios to illustrate common vulnerabilities that compromise trust and pathways to strengthen trust and utilization of vaccines, specifically looking at weak health systems, harmful communication channels, and role of social capital. Spill-over effects, interactions and other dynamics in the CLD were then examined to assess leverage points to counter these vulnerabilities. Trust in vaccination arises from the interactions among experiences with the health system, the various forms of communication and social capital - both external and internal to communities. When experiencing system-wide shocks such as the case in Ebola-affected countries, distrust is reinforced by feedback between the health and immunization systems where distrust often lingers even after systems are restored and spills over beyond vaccination in the broader health system. Vaccine myths or anti-vaccine movements reinforce distrust. Social capital - the collective value of social networks of community members - plays a central role in increasing levels of trust. Trust is important, yet underexplored, in the context of vaccine utilization. Using a CLD to illustrate various scenarios helped to explore how common health and vaccine vulnerabilities can reinforce and spill over distrust through vicious, reinforcing feedback. Restoring trust requires a careful balance between eliminating vulnerabilities and strengthening social capital and interactions among communication channels.

  17. Information Exchange and Information Disclosure in Social Networking Web Sites: Mediating Role of Trust

    ERIC Educational Resources Information Center

    Mital, Monika; Israel, D.; Agarwal, Shailja

    2010-01-01

    Purpose: The purpose of this paper is to examine the mediating effect of trust on the relationship between the type of information exchange (IE) and information disclosure (ID) on social networking web sites (SNWs). Design/methodology/approach: Constructs were developed for type of IE and trust. To understand the mediating role of trust a…

  18. Trust in Anonymity Networks

    NASA Astrophysics Data System (ADS)

    Sassone, Vladimiro; Hamadou, Sardaouna; Yang, Mu

    Anonymity is a security property of paramount importance, as we move steadily towards a wired, online community. Its import touches upon subjects as different as eGovernance, eBusiness and eLeisure, as well as personal freedom of speech in authoritarian societies. Trust metrics are used in anonymity networks to support and enhance reliability in the absence of verifiable identities, and a variety of security attacks currently focus on degrading a user's trustworthiness in the eyes of the other users. In this paper, we analyse the privacy guarantees of the Crowds anonymity protocol, with and without onion forwarding, for standard and adaptive attacks against the trust level of honest users.

  19. A Trust-Based Adaptive Probability Marking and Storage Traceback Scheme for WSNs

    PubMed Central

    Liu, Anfeng; Liu, Xiao; Long, Jun

    2016-01-01

    Security is a pivotal issue for wireless sensor networks (WSNs), which are emerging as a promising platform that enables a wide range of military, scientific, industrial and commercial applications. Traceback, a key cyber-forensics technology, can play an important role in tracing and locating a malicious source to guarantee cybersecurity. In this work a trust-based adaptive probability marking and storage (TAPMS) traceback scheme is proposed to enhance security for WSNs. In a TAPMS scheme, the marking probability is adaptively adjusted according to the security requirements of the network and can substantially reduce the number of marking tuples and improve network lifetime. More importantly, a high trust node is selected to store marking tuples, which can avoid the problem of marking information being lost. Experimental results show that the total number of marking tuples can be reduced in a TAPMS scheme, thus improving network lifetime. At the same time, since the marking tuples are stored in high trust nodes, storage reliability can be guaranteed, and the traceback time can be reduced by more than 80%. PMID:27043566

  20. A Survey on Trust Management for Mobile Ad Hoc Networks

    DTIC Science & Technology

    2011-11-01

    expects, trust is dangerous implying the possible betrayal of trust. In his comments on Lagerspetz’s book titled Trust: The Tacit Demand, Lahno [24...AODV Zouridaki et al. (2005 ) [79] (2006) [80] Secure routing Direct observation [79][80] Reputation by secondhand information [80] Packet dropping...areas of signal processing, wireless communications, sensor and mobile ad hoc networks. He is co-editor of the book Wireless Sensor Networks: Signal

  1. Enhancing the Activity of the DLPFC with tDCS Alters Risk Preference without Changing Interpersonal Trust

    PubMed Central

    Zheng, Haoli; Wang, Siqi; Guo, Wenmin; Chen, Shu; Luo, Jun; Ye, Hang; Huang, Daqiang

    2017-01-01

    Interpersonal trust plays an essential role in economic interactions and social development. Extensive behavioral experiments have examined the nature of trust, particularly the question of whether trusting decisions are connected to risk preferences or risk attitudes. Various laboratory observations have been reported regarding the difference between trust and risk, and neural imaging studies have demonstrated that the right dorsolateral prefrontal cortex (rDLPFC) is more activated when individuals decide to trust other human beings compared with individuals decide to invest in a non-social risk condition. Moreover, the rDLPFC has been found to exhibit an intimate relationship with risk preference in previous neuroscience studies. However, the causal relationship between the rDLPFC and trust has rarely been revealed. Whether modulating the excitability of the rDLPFC, which shares roles in both trust and risk decisions, alters the trust or risk preference of participants remains unknown. In the present study, we aimed to provide evidence of a direct link between the neural and behavioral results through the application of transcranial direct current stimulation (tDCS) over the rDLPFC. We found that activating the rDLPFC altered the risk preferences of our participants, whereas no such significant effect over interpersonal trust was observed. Our findings indicate that enhancing the excitability of the rDLPFC using tDCS leads to more conservative decision-makings in a risk game, and this effect is specific to non-social risk rather than social-related trust. PMID:28232785

  2. In the shadow of the welfare society ill-health and symptoms, psychological exposure and lifestyle habits among social security recipients: a national survey study.

    PubMed

    Baigi, Amir; Lindgren, Eva-Carin; Starrin, Bengt; Bergh, Håkan

    2008-09-22

    In Sweden social security is a means-tested financial allowance. The Social Services Act states that an individual is entitled to financial support when his/her needs are not met in any other way. The aim of the present study was to analyse the prevalence and impact of various illness factors and symptoms in social security recipients compared to non-recipients in a welfare state, in this case Sweden. A simple random sample of 20 100 individuals was selected from a national survey that covered all individuals in the 18-84 year age group in Sweden. A postal survey was thereafter conducted. Multiple logistic regression was employed as a statistical test. Odds ratio (OR) and a 95% confidence interval (CI) was used. Social security recipients were found to have a significantly higher risk in most of the studied variables. Reduced psychological wellbeing measured by means of the GHQ12 was significantly higher in this group compared to the rest of the population (OR 1.41 CI 1.03-1.94) and their lack of trust was greater (OR 1.96, CI 1.45-2.66). They reported more sleep disturbances (OR 2.16, CI 1.58-2.94) and suffered from anxiety (OR 1.74, CI 1.28-2.36). Their dental health was worse (OR 2.44, CI 1.82-3.28) and they had more pain in their hands and legs (OR 1.57, CI 1.16-2.12). Social security recipients were more often humiliated (OR 1.79, CI 1.31-2.44) and exposed to threat (OR 1.69, CI 1.09-2.61). They were less physically active (OR 1.56, CI 1.17-2.08), had a poorer diet (OR 1.95, CI 1.45-2.63) and were more often smokers (OR 3.20, CI 2.37-4.33). The challenge for the welfare state consists of recognising the significance of both structural and lifestyle factors as a means of reducing the health gap.

  3. Trusted Operations on Sensor Data †

    PubMed Central

    Joosen, Wouter; Michiels, Sam; Hughes, Danny

    2018-01-01

    The widespread use of mobile devices has allowed the development of participatory sensing systems that capture various types of data using the existing or external sensors attached to mobile devices. Gathering data from such anonymous sources requires a mechanism to establish the integrity of sensor readings. In many cases, sensor data need to be preprocessed on the device itself before being uploaded to the target server while ensuring the chain of trust from capture to the delivery of the data. This can be achieved by a framework that provides a means to implement arbitrary operations to be performed on trusted sensor data, while guaranteeing the security and integrity of the data. This paper presents the design and implementation of a framework that allows the capture of trusted sensor data from both external and internal sensors on a mobile phone along with the development of trusted operations on sensor data while providing a mechanism for performing predefined operations on the data such that the chain of trust is maintained. The evaluation shows that the proposed system ensures the security and integrity of sensor data with minimal performance overhead. PMID:29702601

  4. Secure password-based authenticated key exchange for web services

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Liang, Fang; Meder, Samuel; Chevassut, Olivier

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options inmore » the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.« less

  5. HealthTrust: a social network approach for retrieving online health videos.

    PubMed

    Fernandez-Luque, Luis; Karlsen, Randi; Melton, Genevieve B

    2012-01-31

    Social media are becoming mainstream in the health domain. Despite the large volume of accurate and trustworthy health information available on social media platforms, finding good-quality health information can be difficult. Misleading health information can often be popular (eg, antivaccination videos) and therefore highly rated by general search engines. We believe that community wisdom about the quality of health information can be harnessed to help create tools for retrieving good-quality social media content. To explore approaches for extracting metrics about authoritativeness in online health communities and how these metrics positively correlate with the quality of the content. We designed a metric, called HealthTrust, that estimates the trustworthiness of social media content (eg, blog posts or videos) in a health community. The HealthTrust metric calculates reputation in an online health community based on link analysis. We used the metric to retrieve YouTube videos and channels about diabetes. In two different experiments, health consumers provided 427 ratings of 17 videos and professionals gave 162 ratings of 23 videos. In addition, two professionals reviewed 30 diabetes channels. HealthTrust may be used for retrieving online videos on diabetes, since it performed better than YouTube Search in most cases. Overall, of 20 potential channels, HealthTrust's filtering allowed only 3 bad channels (15%) versus 8 (40%) on the YouTube list. Misleading and graphic videos (eg, featuring amputations) were more commonly found by YouTube Search than by searches based on HealthTrust. However, some videos from trusted sources had low HealthTrust scores, mostly from general health content providers, and therefore not highly connected in the diabetes community. When comparing video ratings from our reviewers, we found that HealthTrust achieved a positive and statistically significant correlation with professionals (Pearson r₁₀ = .65, P = .02) and a trend toward significance with health consumers (r₇ = .65, P = .06) with videos on hemoglobinA(1c), but it did not perform as well with diabetic foot videos. The trust-based metric HealthTrust showed promising results when used to retrieve diabetes content from YouTube. Our research indicates that social network analysis may be used to identify trustworthy social media in health communities.

  6. Personal Trust Increases Cooperation beyond General Trust

    PubMed Central

    Acedo-Carmona, Cristina; Gomila, Antoni

    2014-01-01

    In this paper we present a new methodology which, while allowing for anonymous interaction, it also makes possible to compare decisions of cooperating or defecting when playing games within a group, according to whether or not players personally trust each other. The design thus goes beyond standard approaches to the role of trust in fostering cooperation, which is restricted to general trust. It also allows considering the role of the topology of the social network involved may play in the level of cooperation found. The results of this work support the idea that personal trust promotes cooperation beyond the level of general trust. We also found that this effect carries over to the whole group, making it more cohesive, but that higher levels of cohesion rely on a particular topology. As a conclusion, we hypothesize that personal trust is a psychological mechanism evolved to make human social life possible in the small groups our ancestors lived in, and that this mechanism persists and plays a role in sustaining cooperation and social cohesion. PMID:25144539

  7. A layered trust information security architecture.

    PubMed

    de Oliveira Albuquerque, Robson; Villalba, Luis Javier García; Orozco, Ana Lucila Sandoval; Buiati, Fábio; Kim, Tai-Hoon

    2014-12-01

    Information can be considered the most important asset of any modern organization. Securing this information involves preserving confidentially, integrity and availability, the well-known CIA triad. In addition, information security is a risk management job; the task is to manage the inherent risks of information disclosure. Current information security platforms do not deal with the different facets of information technology. This paper presents a layered trust information security architecture (TISA) and its creation was motivated by the need to consider information and security from different points of view in order to protect it. This paper also extends and discusses security information extensions as a way of helping the CIA triad. Furthermore, this paper suggests information representation and treatment elements, operations and support components that can be integrated to show the various risk sources when dealing with both information and security. An overview of how information is represented and treated nowadays in the technological environment is shown, and the reason why it is so difficult to guarantee security in all aspects of the information pathway is discussed.

  8. Being trusted: How team generational age diversity promotes and undermines trust in cross-boundary relationships.

    PubMed

    Williams, Michele

    2016-04-01

    We examine how demographic context influences the trust that boundary spanners experience in their dyadic relationships with clients. Because of the salience of age as a demographic characteristic as well as the increasing prevalence of age diversity and intergenerational conflict in the workplace, we focus on team age diversity as a demographic social context that affects trust between boundary spanners and their clients. Using social categorization theory and theories of social capital, we develop and test our contextual argument that a boundary spanner's experience of being trusted is influenced by the social categorization processes that occur in dyadic interactions with a specific client and, simultaneously, by similar social categorization processes that influence the degree to which the client team as a whole serves as a cooperative resource for demographically similar versus dissimilar boundary spanner-client dyads. Using a sample of 168 senior boundary spanners from the consulting industry, we find that generational diversity among client team members from a client organization undermines the perception of being trusted within homogeneous boundary spanner-client dyads while it enhances the perception of being trusted within heterogeneous dyads. The perception of being trusted is an important aspect of cross-boundary relationships because it influences coordination and the costs associated with coordination. © 2015 The Author Journal of Organizational Behavior Published by John Wiley & Sons Ltd.

  9. Being trusted: How team generational age diversity promotes and undermines trust in cross‐boundary relationships

    PubMed Central

    2015-01-01

    Summary We examine how demographic context influences the trust that boundary spanners experience in their dyadic relationships with clients. Because of the salience of age as a demographic characteristic as well as the increasing prevalence of age diversity and intergenerational conflict in the workplace, we focus on team age diversity as a demographic social context that affects trust between boundary spanners and their clients. Using social categorization theory and theories of social capital, we develop and test our contextual argument that a boundary spanner's experience of being trusted is influenced by the social categorization processes that occur in dyadic interactions with a specific client and, simultaneously, by similar social categorization processes that influence the degree to which the client team as a whole serves as a cooperative resource for demographically similar versus dissimilar boundary spanner–client dyads. Using a sample of 168 senior boundary spanners from the consulting industry, we find that generational diversity among client team members from a client organization undermines the perception of being trusted within homogeneous boundary spanner–client dyads while it enhances the perception of being trusted within heterogeneous dyads. The perception of being trusted is an important aspect of cross‐boundary relationships because it influences coordination and the costs associated with coordination. © 2015 The Author Journal of Organizational Behavior Published by John Wiley & Sons Ltd PMID:27721558

  10. Can centralized sanctioning promote trust in social dilemmas? A two-level trust game with incomplete information.

    PubMed

    Wang, Raymond Yu; Ng, Cho Nam

    2015-01-01

    The problem of trust is a paradigmatic social dilemma. Previous literature has paid much academic attention on effects of peer punishment and altruistic third-party punishment on trust and human cooperation in dyadic interactions. However, the effects of centralized sanctioning institutions on decentralized reciprocity in hierarchical interactions remain to be further explored. This paper presents a formal two-level trust game with incomplete information which adds an authority as a strategic purposive actor into the traditional trust game. This model allows scholars to examine the problem of trust in more complex game theoretic configurations. The analysis demonstrates how the centralized institutions might change the dynamics of reciprocity between the trustor and the trustee. Findings suggest that the sequential equilibria of the newly proposed two-level model simultaneously include the risk of placing trust for the trustor and the temptation of short-term defection for the trustee. Moreover, they have shown that even a slight uncertainty about the type of the newly introduced authority might facilitate the establishment of trust and reciprocity in social dilemmas.

  11. Can Centralized Sanctioning Promote Trust in Social Dilemmas? A Two-Level Trust Game with Incomplete Information

    PubMed Central

    Wang, Raymond Yu; Ng, Cho Nam

    2015-01-01

    The problem of trust is a paradigmatic social dilemma. Previous literature has paid much academic attention on effects of peer punishment and altruistic third-party punishment on trust and human cooperation in dyadic interactions. However, the effects of centralized sanctioning institutions on decentralized reciprocity in hierarchical interactions remain to be further explored. This paper presents a formal two-level trust game with incomplete information which adds an authority as a strategic purposive actor into the traditional trust game. This model allows scholars to examine the problem of trust in more complex game theoretic configurations. The analysis demonstrates how the centralized institutions might change the dynamics of reciprocity between the trustor and the trustee. Findings suggest that the sequential equilibria of the newly proposed two-level model simultaneously include the risk of placing trust for the trustor and the temptation of short-term defection for the trustee. Moreover, they have shown that even a slight uncertainty about the type of the newly introduced authority might facilitate the establishment of trust and reciprocity in social dilemmas. PMID:25879752

  12. 7 CFR 1822.269 - Security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 12 2014-01-01 2013-01-01 true Security. 1822.269 Section 1822.269 Agriculture..., Procedures, and Authorizations § 1822.269 Security. Each loan will be secured by a mortgage on the property purchased or improved with the loan, and a security interest in the funds held by the corporation in trust...

  13. 7 CFR 1822.269 - Security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 12 2013-01-01 2013-01-01 false Security. 1822.269 Section 1822.269 Agriculture..., Procedures, and Authorizations § 1822.269 Security. Each loan will be secured by a mortgage on the property purchased or improved with the loan, and a security interest in the funds held by the corporation in trust...

  14. 7 CFR 1822.269 - Security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 12 2011-01-01 2011-01-01 false Security. 1822.269 Section 1822.269 Agriculture..., Procedures, and Authorizations § 1822.269 Security. Each loan will be secured by a mortgage on the property purchased or improved with the loan, and a security interest in the funds held by the corporation in trust...

  15. 7 CFR 1822.269 - Security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 12 2010-01-01 2010-01-01 false Security. 1822.269 Section 1822.269 Agriculture..., Procedures, and Authorizations § 1822.269 Security. Each loan will be secured by a mortgage on the property purchased or improved with the loan, and a security interest in the funds held by the corporation in trust...

  16. 7 CFR 1822.269 - Security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 12 2012-01-01 2012-01-01 false Security. 1822.269 Section 1822.269 Agriculture..., Procedures, and Authorizations § 1822.269 Security. Each loan will be secured by a mortgage on the property purchased or improved with the loan, and a security interest in the funds held by the corporation in trust...

  17. Evaluation of IT security – genesis and its state-of-art

    NASA Astrophysics Data System (ADS)

    Livshitz, I. I.; Neklyudov, A. V.; Lontsikh, P. A.

    2018-05-01

    It is topical to evolve processes of an evaluation of the IT security nowadays. Formation and application of common evaluation approaches to the IT component, which are processed by the governmental and civil organizations, are still not solving problem. Successful processing of the independent evaluation for conformity with a security standard is supposed to be the main criteria of a suitability of any IT component to be used in a trusted computer system. The solution of the mentioned-above problem is suggested through the localization of all research, development and producing processes in a national trusted area (digital sovereignty).

  18. A methodology for secure recovery of spacecrafts based on a trusted hardware platform

    NASA Astrophysics Data System (ADS)

    Juliato, Marcio; Gebotys, Catherine

    2017-02-01

    This paper proposes a methodology for the secure recovery of spacecrafts and the recovery of its cryptographic capabilities in emergency scenarios recurring from major unintentional failures and malicious attacks. The proposed approach employs trusted modules to achieve higher reliability and security levels in space missions due to the presence of integrity check capabilities as well as secure recovery mechanisms. Additionally, several recovery protocols are thoroughly discussed and analyzed against a wide variety of attacks. Exhaustive search attacks are shown in a wide variety of contexts and are shown to be infeasible and totally independent of the computational power of attackers. Experimental results have shown that the proposed methodology allows for the fast and secure recovery of spacecrafts, demanding minimum implementation area, power consumption and bandwidth.

  19. Social trust and the management of threatened and endangered species: A study of communities of interest and communities of place.

    Treesearch

    George T. Cvetkovich; Patricia L Winter

    2002-01-01

    Social trust, the willingness to rely on those with formal responsibility to develop policies and make decisions, facilitates effective management of environmental issues, including wildlife management. National polls suggest that the public trusts government agencies to solve environmental problems, yet such trust is low (or non-existent) in areas of controversy, such...

  20. Young Children's Trust Beliefs in Peers: Relations to Social Competence and Interactive Behaviors in a Peer Group

    ERIC Educational Resources Information Center

    Chin, Jui-Chih

    2014-01-01

    Research Findings: The aim of this study was to explore the relations between children's trust beliefs and social competence as well as social preference. In addition, this study examined how children with different trust belief profiles may differ in their peer interactive behaviors. A total of 47 children ages 5 to 6 participated in this study.…

  1. Capturing Trust in Social Web Applications

    NASA Astrophysics Data System (ADS)

    O'Donovan, John

    The Social Web constitutes a shift in information flow from the traditional Web. Previously, content was provided by the owners of a website, for consumption by the end-user. Nowadays, these websites are being replaced by Social Web applications which are frameworks for the publication of user-provided content. Traditionally, Web content could be `trusted' to some extent based on the site it originated from. Algorithms such as Google's PageRank were (and still are) used to compute the importance of a website, based on analysis of underlying link topology. In the Social Web, analysis of link topology merely tells us about the importance of the information framework which hosts the content. Consumers of information still need to know about the importance/reliability of the content they are reading, and therefore about the reliability of the producers of that content. Research into trust and reputation of the producers of information in the Social Web is still very much in its infancy. Every day, people are forced to make trusting decisions about strangers on the Web based on a very limited amount of information. For example, purchasing a product from an eBay seller with a `reputation' of 99%, downloading a file from a peer-to-peer application such as Bit-Torrent, or allowing Amazon.com tell you what products you will like. Even something as simple as reading comments on a Web-blog requires the consumer to make a trusting decision about the quality of that information. In all of these example cases, and indeed throughout the Social Web, there is a pressing demand for increased information upon which we can make trusting decisions. This chapter examines the diversity of sources from which trust information can be harnessed within Social Web applications and discusses a high level classification of those sources. Three different techniques for harnessing and using trust from a range of sources are presented. These techniques are deployed in two sample Social Web applications—a recommender system and an online auction. In all cases, it is shown that harnessing an increased amount of information upon which to make trust decisions greatly enhances the user experience with the Social Web application.

  2. Association between social capital and the prevalence of gestational diabetes mellitus: An interim report of the Japan Environment and Children's Study.

    PubMed

    Mizuno, Satoshi; Nishigori, Hidekazu; Sugiyama, Takashi; Takahashi, Fumiaki; Iwama, Noriyuki; Watanabe, Zen; Sakurai, Kasumi; Ishikuro, Mami; Obara, Taku; Tatsuta, Nozomi; Nishijima, Ichiko; Fujiwara, Ikuma; Arima, Takahiro; Kuriyama, Shinichi; Metoki, Hirohito; Nakai, Kunihiko; Inadera, Hidekuni; Yaegashi, Nobuo

    2016-10-01

    Social capital is generally defined as the quality and frequency of social interactions with relatives, neighbors, and society. Social capital refers to broad concepts of social interactions and structures in individuals, communities and societies such as trust (e.g., neighborhood trust, which is social cohesion with neighbors) and social support (e.g., emotional support, which is the level of the feeling of being loved). Studies during the last few decades have shown that there is a significant inverse association between social capital and the prevalences of diseases such as depression and acute coronary syndrome. Significant inverse associations between trust, social support and the prevalence of diabetes have also been shown. However, associations between social capital and the prevalence of gestational diabetes mellitus (GDM) are less clear. We used the primary dataset of the Japan Environment and Children's Study (JECS), including 10,228 mothers with recorded obstetric outcomes from January to December 2011. In this study, we included 8874 the 10,228 participants. Diagnosis of GDM was determined using the criteria of the Japan Diabetes Society (JDS). The quality and quantity of social capital were measured with nine questions on a self-administered questionnaire during the second or third trimester. Using principal component analysis (PCA), we distinguished the following three components (indices) of social capital: (A) index of all nine questions about social capital, (B) index of emotional support and neighborhood trust and (C) index of generalized trust. The high factor loading variants of indices were as follows; (A) all nine variants, (B) five variants about emotional support and neighborhood trust and (C) two variants about generalized trust. Multivariate random effect modeling was used to calculate the odd ratios (ORs) for evaluating the association between these indices of social capital and the prevalence of GDM. This model was adjusted for baseline characteristics such as family income, BMI before pregnancy and smoking during pregnancy. Of the 8874 participants, 204 women developed GDM (2.30%). Multivariable logistic regression analysis showed that index B, the index of emotional support and neighborhood trust (adjusted OR: 0.651, 95% CI: 0.429, 0.987) was significantly and independently associated with the prevalence of GDM. We found that the 5-question index of emotional support and neighborhood trust is significantly associated with the prevalence of GDM during pregnancy. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  3. Right-wing authoritarianism and stereotype-driven expectations interact in shaping intergroup trust in one-shot vs multiple-round social interactions

    PubMed Central

    Aglioti, Salvatore Maria; Liuzza, Marco Tullio

    2017-01-01

    Trust towards unrelated individuals is often conditioned by information about previous social interactions that can be derived from either personal or vicarious experience (e.g., reputation). Intergroup stereotypes can be operationalized as expectations about other groups’ traits/attitudes/behaviors that heavily influence our behavioral predictions when interacting with them. In this study we investigated the role of perceived social dimensions of the Stereotype Content Model (SCM)–Warmth (W) and Competence (C)—in affecting trusting behavior towards different European national group members during the Trust Game. Given the well-known role of ideological attitudes in regulating stereotypes, we also measured individual differences in right-wing authoritarianism (RWA). In Experiment 1, we designed an online survey to study one-shot intergroup trust decisions by employing putative members of the European Union states which were also rated along SCM dimensions. We found that low-RWA participants’ trusting behavior was driven by perceived warmth (i.e., the dimension signaling the benevolence of social intentions) when interacting with low-C groups. In Experiment 2, we investigated the dynamics of trust in a multiple-round version of the European Trust Game. We found that in low-RWA participants trusting behavior decreased over time when interacting with high-W groups (i.e., expected to reciprocate trust), but did not change when interacting with low-W groups (i.e., expected not to reciprocate trust). Moreover, we found that high-RWA participants’ trusting behavior decreased when facing low-W groups but not high-W ones. This suggests that low-RWA individuals employ reputational priors but are also permeable to external evidence when learning about others’ trustworthiness. In contrast, high-RWA individuals kept relying on stereotypes despite contextual information. These results confirm the pivotal role played by reputational priors triggered by perceived warmth in shaping social interactions. PMID:29284019

  4. Right-wing authoritarianism and stereotype-driven expectations interact in shaping intergroup trust in one-shot vs multiple-round social interactions.

    PubMed

    Ponsi, Giorgia; Panasiti, Maria Serena; Aglioti, Salvatore Maria; Liuzza, Marco Tullio

    2017-01-01

    Trust towards unrelated individuals is often conditioned by information about previous social interactions that can be derived from either personal or vicarious experience (e.g., reputation). Intergroup stereotypes can be operationalized as expectations about other groups' traits/attitudes/behaviors that heavily influence our behavioral predictions when interacting with them. In this study we investigated the role of perceived social dimensions of the Stereotype Content Model (SCM)-Warmth (W) and Competence (C)-in affecting trusting behavior towards different European national group members during the Trust Game. Given the well-known role of ideological attitudes in regulating stereotypes, we also measured individual differences in right-wing authoritarianism (RWA). In Experiment 1, we designed an online survey to study one-shot intergroup trust decisions by employing putative members of the European Union states which were also rated along SCM dimensions. We found that low-RWA participants' trusting behavior was driven by perceived warmth (i.e., the dimension signaling the benevolence of social intentions) when interacting with low-C groups. In Experiment 2, we investigated the dynamics of trust in a multiple-round version of the European Trust Game. We found that in low-RWA participants trusting behavior decreased over time when interacting with high-W groups (i.e., expected to reciprocate trust), but did not change when interacting with low-W groups (i.e., expected not to reciprocate trust). Moreover, we found that high-RWA participants' trusting behavior decreased when facing low-W groups but not high-W ones. This suggests that low-RWA individuals employ reputational priors but are also permeable to external evidence when learning about others' trustworthiness. In contrast, high-RWA individuals kept relying on stereotypes despite contextual information. These results confirm the pivotal role played by reputational priors triggered by perceived warmth in shaping social interactions.

  5. A Distributed Energy-Aware Trust Management System for Secure Routing in Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Stelios, Yannis; Papayanoulas, Nikos; Trakadas, Panagiotis; Maniatis, Sotiris; Leligou, Helen C.; Zahariadis, Theodore

    Wireless sensor networks are inherently vulnerable to security attacks, due to their wireless operation. The situation is further aggravated because they operate in an infrastructure-less environment, which mandates the cooperation among nodes for all networking tasks, including routing, i.e. all nodes act as “routers”, forwarding the packets generated by their neighbours in their way to the sink node. This implies that malicious nodes (denying their cooperation) can significantly affect the network operation. Trust management schemes provide a powerful tool for the detection of unexpected node behaviours (either faulty or malicious). Once misbehaving nodes are detected, their neighbours can use this information to avoid cooperating with them either for data forwarding, data aggregation or any other cooperative function. We propose a secure routing solution based on a novel distributed trust management system, which allows for fast detection of a wide set of attacks and also incorporates energy awareness.

  6. A Survey on Trust Management for Mobile Ad Hoc Networks

    DTIC Science & Technology

    2010-07-01

    betrayal of trust. In his comments on Lagerspetz’s book titled Trust: The Tacit Demand, Lahno [24] describes the author’s view on trust as a moral...extension of AODV Zouridaki et al. (2005 ) [79] (2006) [80] Secure routing Direct observation [79][80] Reputation by secondhand information [80...the broad areas of signal processing, wireless communications, sensor and mobile ad hoc networks. He is co-editor of the book Wireless Sensor Networks

  7. 3VSR: Three Valued Secure Routing for Vehicular Ad Hoc Networks using Sensing Logic in Adversarial Environment

    PubMed Central

    Wang, Liangmin

    2018-01-01

    Today IoT integrate thousands of inter networks and sensing devices e.g., vehicular networks, which are considered to be challenging due to its high speed and network dynamics. The goal of future vehicular networks is to improve road safety, promote commercial or infotainment products and to reduce the traffic accidents. All these applications are based on the information exchange among nodes, so not only reliable data delivery but also the authenticity and credibility of the data itself are prerequisite. To cope with the aforementioned problem, trust management come up as promising candidate to conduct node’s transaction and interaction management, which requires distributed mobile nodes cooperation for achieving design goals. In this paper, we propose a trust-based routing protocol i.e., 3VSR (Three Valued Secure Routing), which extends the widely used AODV (Ad hoc On-demand Distance Vector) routing protocol and employs the idea of Sensing Logic-based trust model to enhance the security solution of VANET (Vehicular Ad-Hoc Network). The existing routing protocol are mostly based on key or signature-based schemes, which off course increases computation overhead. In our proposed 3VSR, trust among entities is updated frequently by means of opinion derived from sensing logic due to vehicles random topologies. In 3VSR the theoretical capabilities are based on Dirichlet distribution by considering prior and posterior uncertainty of the said event. Also by using trust recommendation message exchange, nodes are able to reduce computation and routing overhead. The simulated results shows that the proposed scheme is secure and practical. PMID:29538314

  8. 3VSR: Three Valued Secure Routing for Vehicular Ad Hoc Networks using Sensing Logic in Adversarial Environment.

    PubMed

    Sohail, Muhammad; Wang, Liangmin

    2018-03-14

    Today IoT integrate thousands of inter networks and sensing devices e.g., vehicular networks, which are considered to be challenging due to its high speed and network dynamics. The goal of future vehicular networks is to improve road safety, promote commercial or infotainment products and to reduce the traffic accidents. All these applications are based on the information exchange among nodes, so not only reliable data delivery but also the authenticity and credibility of the data itself are prerequisite. To cope with the aforementioned problem, trust management come up as promising candidate to conduct node's transaction and interaction management, which requires distributed mobile nodes cooperation for achieving design goals. In this paper, we propose a trust-based routing protocol i.e., 3VSR (Three Valued Secure Routing), which extends the widely used AODV (Ad hoc On-demand Distance Vector) routing protocol and employs the idea of Sensing Logic-based trust model to enhance the security solution of VANET (Vehicular Ad-Hoc Network). The existing routing protocol are mostly based on key or signature-based schemes, which off course increases computation overhead. In our proposed 3VSR, trust among entities is updated frequently by means of opinion derived from sensing logic due to vehicles random topologies. In 3VSR the theoretical capabilities are based on Dirichlet distribution by considering prior and posterior uncertainty of the said event. Also by using trust recommendation message exchange, nodes are able to reduce computation and routing overhead. The simulated results shows that the proposed scheme is secure and practical.

  9. The Condition for Generous Trust

    PubMed Central

    Shinya, Obayashi; Yusuke, Inagaki; Hiroki, Takikawa

    2016-01-01

    Trust has been considered the “cement” of a society and is much studied in sociology and other social sciences. Most studies, however, have neglected one important aspect of trust: it involves an act of forgiving and showing tolerance toward another’s failure. In this study, we refer to this concept as “generous trust” and examine the conditions under which generous trust becomes a more viable option when compared to other types of trust. We investigate two settings. First, we introduce two types of uncertainties: uncertainty as to whether trustees have the intention to cooperate, and uncertainty as to whether trustees have enough competence to accomplish the entrusted tasks. Second, we examine the manner in which trust functions in a broader social context, one that involves matching and commitment processes. Since we expect generosity or forgiveness to work differently in the matching and commitment processes, we must differentiate trust strategies into generous trust in the matching process and that in the commitment process. Our analytical strategy is two-fold. First, we analyze the “modified” trust game that incorporates the two types of uncertainties without the matching process. This simplified setting enables us to derive mathematical results using game theory, thereby giving basic insight into the trust mechanism. Second, we investigate socially embedded trust relationships in contexts involving the matching and commitment processes, using agent-based simulation. Results show that uncertainty about partner’s intention and competence makes generous trust a viable option. In contrast, too much uncertainty undermines the possibility of generous trust. Furthermore, a strategy that is too generous cannot stand alone. Generosity should be accompanied with moderate punishment. As for socially embedded trust relationships, generosity functions differently in the matching process versus the commitment process. Indeed, these two types of generous trust coexist, and their coexistence enables a society to function well. PMID:27893759

  10. Improving TSA’s Public Image: Customer-Focused Initiatives to Encourage Public Trust and Confidence

    DTIC Science & Technology

    2013-12-01

    INITIATIVES TO ENCOURAGE PUBLIC TRUST AND CONFIDENCE Patricia S. Bierle Customer Support and Quality Improvement Manager, Transportation Security...PUBLIC IMAGE: CUSTOMER-FOCUSED INITIATIVES TO ENCOURAGE PUBLIC TRUST AND CONFIDENCE by Patricia S. Bierle December 2013 Thesis Co-Advisors...33 e . Government Leaders Impact Public Opinion ........................35 f. Aviation Stakeholders Also Impact

  11. 78 FR 36616 - Self-Regulatory Organizations; The Depository Trust Company; Order Approving Proposed Rule Change...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-18

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69741; File No. SR-DTC-2013-03] Self-Regulatory Organizations; The Depository Trust Company; Order Approving Proposed Rule Change in Connection With the Implementation of The Foreign Account Tax Compliance Act (FATCA) June 12, 2013. On April 22, 2013, The Depository Trust Company (``DTC'') filed...

  12. Social capital and the miniaturization of community among daily and intermittent smokers: a population-based study.

    PubMed

    Lindström, Martin

    2003-02-01

    The impact of social participation, trust, and the miniaturization of community on daily and intermittent smoking was investigated. The 2000 public health survey in Scania is a cross-sectional study. A total of 13,715 persons answered a postal questionnaire, which represents 59% of the random sample. A logistic regression model was used to investigate the association between the social capital variables and daily and intermittent smoking. The multivariate analysis was performed by using a logistic regression model to investigate the importance of possible confounders (age, country of origin, education, and snuff consumption) on the differences in daily and intermittent smoking between high versus low social participation, trust, and their four combination categories. The differences in the prevalences of the 13 social participation subitems between the high social capital and miniaturization of community categories were compared by t tests. Daily smoking is negatively associated with both social participation and trust, while intermittent smoking is positively associated with social participation and negatively associated with trust. This latter combination, named "the miniaturization of community," is an indirect measure of the ideologically and culturally increasingly narrow forms of social participation that excludes generalised trust to other people. Study circles, meetings of organisations, theatre/cinema, arts exhibition, and gathering of relatives are more prevalent in the high social capital category, while visit(s) to night club/entertainment is more prevalent in the miniaturization of community category. Low social capital is associated with daily smoking. "The miniaturization of community," i.e., high social participation and low trust, is significantly associated with intermittent smoking. The results have direct implications for smoking prevention strategies.

  13. Pupil-mimicry conditions trust in partners: moderation by oxytocin and group membership

    PubMed Central

    De Dreu, Carsten K. W.

    2017-01-01

    Across species, oxytocin, an evolutionarily ancient neuropeptide, facilitates social communication by attuning individuals to conspecifics' social signals, fostering trust and bonding. The eyes have an important signalling function; and humans use their salient and communicative eyes to intentionally and unintentionally send social signals to others, by contracting the muscles around their eyes and pupils. In our earlier research, we observed that interaction partners with dilating pupils are trusted more than partners with constricting pupils. But over and beyond this effect, we found that the pupil sizes of partners synchronize and that when pupils synchronously dilate, trust is further boosted. Critically, this linkage between mimicry and trust was bound to interactions between ingroup members. The current study investigates whether these findings are modulated by oxytocin and sex of participant and partner. Using incentivized trust games with partners from ingroup and outgroup whose pupils dilated, remained static or constricted, this study replicates our earlier findings. It further reveals that (i) male participants withhold trust from partners with constricting pupils and extend trust to partners with dilating pupils, especially when given oxytocin rather than placebo; (ii) female participants trust partners with dilating pupils most, but this effect is blunted under oxytocin; (iii) under oxytocin rather than placebo, pupil dilation mimicry is weaker and pupil constriction mimicry stronger; and (iv) the link between pupil constriction mimicry and distrust observed under placebo disappears under oxytocin. We suggest that pupil-contingent trust is parochial and evolved in social species in and because of group life. PMID:28250181

  14. Social capital and active membership in the Ghana National Health Insurance Scheme - a mixed method study.

    PubMed

    Fenenga, Christine J; Nketiah-Amponsah, Edward; Ogink, Alice; Arhinful, Daniel K; Poortinga, Wouter; Hutter, Inge

    2015-11-02

    People's decision to enroll in a health insurance scheme is determined by socio-cultural and socio-economic factors. On request of the National health Insurance Authority (NHIA) in Ghana, our study explores the influence of social relationships on people's perceptions, behavior and decision making to enroll in the National Health Insurance Scheme. This social scheme, initiated in 2003, aims to realize accessible quality healthcare services for the entire population of Ghana. We look at relationships of trust and reciprocity between individuals in the communities (so called horizontal social capital) and between individuals and formal health institutions (called vertical social capital) in order to determine whether these two forms of social capital inhibit or facilitate enrolment of clients in the scheme. Results can support the NHIA in exploiting social capital to reach their objective and strengthen their policy and practice. We conducted 20 individual- and seven key-informant interviews, 22 focus group discussions, two stakeholder meetings and a household survey, using a random sample of 1903 households from the catchment area of 64 primary healthcare facilities. The study took place in Greater Accra Region and Western Regions in Ghana between June 2011 and March 2012. While social developments and increased heterogeneity seem to reduce community solidarity in Ghana, social networks remain common in Ghana and are valued for their multiple benefits (i.e. reciprocal trust and support, information sharing, motivation, risk sharing). Trusting relations with healthcare and insurance providers are, according healthcare clients, based on providers' clear communication, attitude, devotion, encouragement and reliability of services. Active membership of the NHIS is positive associated with community trust, trust in healthcare providers and trust in the NHIS (p-values are .009, .000 and .000 respectively). Social capital can motivate clients to enroll in health insurance. Fostering social capital through improving information provision to communities and engaging community groups in health care and NHIS services can facilitate peoples' trust in these institutions and their active participation in the scheme.

  15. Learning to trust: social feedback normalizes trust behavior in first-episode psychosis and clinical high risk.

    PubMed

    Lemmers-Jansen, Imke L J; Fett, Anne-Kathrin J; Hanssen, Esther; Veltman, Dick J; Krabbendam, Lydia

    2018-06-13

    Psychosis is characterized by problems in social functioning that exist well before illness onset, and in individuals at clinical high risk (CHR) for psychosis. Trust is an essential element for social interactions that is impaired in psychosis. In the trust game, chronic patients showed reduced baseline trust, impaired response to positive social feedback, and attenuated brain activation in reward and mentalizing areas. We investigated whether first-episode psychosis patients (FEP) and CHR show similar abnormalities in the neural and behavioral mechanisms underlying trust. Twenty-two FEP, 17 CHR, and 43 healthy controls performed two trust games, with a cooperative and an unfair partner in the fMRI scanner. Region of interest analyses were performed on mentalizing and reward processing areas, during the investment and outcome phases of the games. Compared with healthy controls, FEP and CHR showed reduced baseline trust, but like controls, learned to trust in response to cooperative and unfair feedback. Symptom severity was not associated with baseline trust, however in FEP associated with reduced response to feedback. The only group differences in brain activation were that CHR recruited the temporo-parietal junction (TPJ) more than FEP and controls during investment in the unfair condition. This hyper-activation in CHR was associated with greater symptom severity. Reduced baseline trust may be associated with risk for psychotic illness, or generally with poor mental health. Feedback learning is still intact in CHR and FEP, as opposed to chronic patients. CHR however show distinct neural activation patterns of hyper-activation of the TPJ.

  16. Alexa, Can I Trust You?

    PubMed Central

    Chung, Hyunji; Iorga, Michaela; Voas, Jeffrey; Lee, Sangjin

    2017-01-01

    Security diagnostics expose vulnerabilities and privacy threats that exist in commercial Intelligent Virtual Assistants (IVA) – diagnostics offer the possibility of securer IVA ecosystems. PMID:29213147

  17. Understanding the Link between Social Organization and Crime in Rural Communities

    PubMed Central

    Chilenski, Sarah M.; Syvertsen, Amy K.; Greenberg, Mark T.

    2015-01-01

    Rural communities make up much of America's heartland, yet we know little about their social organization, and how elements of their social organization relate to crime rates. The current study sought to remedy this gap by examining the associations between two measures of social organization – collective efficacy and social trust – with a number of structural community characteristics, local crime rates, and perceptions of safety in a sample of 27 rural and small town communities in two states. Measures of collective efficacy, social trust, and perceived safety, were gathered from key community members in 2006; other measures were drawn from the 2000 Census and FBI Uniform Crime Reporting system. A series of competing hypotheses were tested to examine the relative importance of social trust and collective efficacy in predicting local crime rates. Results do not support the full generalization of the social disorganization model. Correlational analyses showed that neither collective efficacy nor social trust had a direct association with community crime, nor did they mediate the associations between community structural characteristics and crime. However, perceived safety mediated the association between community crime and both measures of social organization. Analyses suggest that social trust may be more important than collective efficacy when understanding the effect of crime on a community's culture in rural areas. Understanding these associations in rural settings can aid decision makers in shaping policies to reduce crime and juvenile delinquency. PMID:26120326

  18. Dynamic Trust Models between Users over Social Networks

    DTIC Science & Technology

    2016-03-30

    SUPPLEMENTARY NOTES 14. ABSTRACT In this project, by focusing on a number of word -of- mouth communication websites, we attempted to...analyzed evolution of trust networks in social media sites from a perspective of mediators. To this end, we proposed two stochastic models that...focusing on a number of word -of- mouth communication websites, we first attempt to construct dynamic trust models between users that enable to explain trust

  19. Default distrust? An fMRI investigation of the neural development of trust and cooperation

    PubMed Central

    Gromann, Paula M.; Giampietro, Vincent; Shergill, Sukhi S.; Krabbendam, Lydia

    2014-01-01

    The tendency to trust and to cooperate increases from adolescence to adulthood. This social development has been associated with improved mentalizing and age-related changes in brain function. Thus far, there is limited imaging data investigating these associations. We used two trust games with a trustworthy and an unfair partner to explore the brain mechanisms underlying trust and cooperation in subjects ranging from adolescence to mid-adulthood. Increasing age was associated with higher trust at the onset of social interactions, increased levels of trust during interactions with a trustworthy partner and a stronger decline in trust during interactions with an unfair partner. Our findings demonstrate a behavioural shift towards higher trust and an age-related increase in the sensitivity to others’ negative social signals. Increased brain activation in mentalizing regions, i.e. temporo-parietal junction, posterior cingulate and precuneus, supported the behavioural change. Additionally, age was associated with reduced activation in the reward-related orbitofrontal cortex and caudate nucleus during interactions with a trustworthy partner, possibly reflecting stronger expectations of trustworthiness. During unfair interactions, age-related increases in anterior cingulate activation, an area implicated in conflict monitoring, may mirror the necessity to inhibit pro-social tendencies in the face of the partner’s actual levels of cooperation. PMID:23202661

  20. Social Diversity, Institutions and Trust: A Cross-National Analysis

    ERIC Educational Resources Information Center

    Tsai, Ming-Chang; Laczko, Leslie; Bjornskov, Christian

    2011-01-01

    This cross-national investigation examines hypotheses derived from two major alternative perspectives on the determinants of trust in contemporary societies. Is a society's level of generalized trust a function of its ethnic composition, or of its type of governance and political system? The argument that social diversity (ethnic, linguistic, and…

  1. The Radius of Trust: Religion, Social Embeddedness and Trust in Strangers

    ERIC Educational Resources Information Center

    Welch, Michael R.; Sikkink, David; Loveland, Matthew T.

    2007-01-01

    Data from the 2002 Religion and Public Activism Survey were used to examine relationships among measures of religious orientation, embeddedness in social networks and the level of trust individuals direct toward others. Results from ordered logistic regression analysis demonstrate that Catholics and members of other denominations show…

  2. A Meta-Analysis of the Effect of Education on Social Capital

    ERIC Educational Resources Information Center

    Huang, Jian; van den Brink, Henriette Maassen; Groot, Wim

    2009-01-01

    To assess the empirical estimates of the effect of education on social trust and social participation--the basic dimensions of individual social capital--a meta-analysis is applied, synthesizing 154 evaluations on social trust, and 286 evaluations on social participation. The publication bias problem is given special emphasis in the meta-analysis.…

  3. The Effectiveness of Health Care Information Technologies: Evaluation of Trust, Security Beliefs, and Privacy as Determinants of Health Care Outcomes

    PubMed Central

    2018-01-01

    Background The diffusion of health information technologies (HITs) within the health care sector continues to grow. However, there is no theory explaining how success of HITs influences patient care outcomes. With the increase in data breaches, HITs’ success now hinges on the effectiveness of data protection solutions. Still, empirical research has only addressed privacy concerns, with little regard for other factors of information assurance. Objective The objective of this study was to study the effectiveness of HITs using the DeLone and McLean Information Systems Success Model (DMISSM). We examined the role of information assurance constructs (ie, the role of information security beliefs, privacy concerns, and trust in health information) as measures of HIT effectiveness. We also investigated the relationships between information assurance and three aspects of system success: attitude toward health information exchange (HIE), patient access to health records, and perceived patient care quality. Methods Using structural equation modeling, we analyzed the data from a sample of 3677 cancer patients from a public dataset. We used R software (R Project for Statistical Computing) and the Lavaan package to test the hypothesized relationships. Results Our extension of the DMISSM to health care was supported. We found that increased privacy concerns reduce the frequency of patient access to health records use, positive attitudes toward HIE, and perceptions of patient care quality. Also, belief in the effectiveness of information security increases the frequency of patient access to health records and positive attitude toward HIE. Trust in health information had a positive association with attitudes toward HIE and perceived patient care quality. Trust in health information had no direct effect on patient access to health records; however, it had an indirect relationship through privacy concerns. Conclusions Trust in health information and belief in the effectiveness of information security safeguards increases perceptions of patient care quality. Privacy concerns reduce patients’ frequency of accessing health records, patients’ positive attitudes toward HIE exchange, and overall perceived patient care quality. Health care organizations are encouraged to implement security safeguards to increase trust, the frequency of health record use, and reduce privacy concerns, consequently increasing patient care quality. PMID:29643052

  4. 17 CFR 239.18 - Form S-11, for registration under the Securities Act of 1933 of securities of certain real estate...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... under the Securities Act of 1933 of securities of certain real estate companies. 239.18 Section 239.18... Securities Act of 1933 of securities of certain real estate companies. This form shall be used for registration under the Securities Act of 1933 of (a) securities issued by real estate investment trusts, as...

  5. 17 CFR 239.18 - Form S-11, for registration under the Securities Act of 1933 of securities of certain real estate...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... under the Securities Act of 1933 of securities of certain real estate companies. 239.18 Section 239.18... Securities Act of 1933 of securities of certain real estate companies. This form shall be used for registration under the Securities Act of 1933 of (a) securities issued by real estate investment trusts, as...

  6. Tax authorities' interaction with taxpayers: A conception of compliance in social dilemmas by power and trust

    PubMed Central

    Gangl, Katharina; Hofmann, Eva; Kirchler, Erich

    2015-01-01

    Tax compliance represents a social dilemma in which the short-term self-interest to minimize tax payments is at odds with the collective long-term interest to provide sufficient tax funds for public goods. According to the Slippery Slope Framework, the social dilemma can be solved and tax compliance can be guaranteed by power of tax authorities and trust in tax authorities. The framework, however, remains silent on the dynamics between power and trust. The aim of the present theoretical paper is to conceptualize the dynamics between power and trust by differentiating coercive and legitimate power and reason-based and implicit trust. Insights into this dynamic are derived from an integration of a wide range of literature such as on organizational behavior and social influence. Conclusions on the effect of the dynamics between power and trust on the interaction climate between authorities and individuals and subsequent individual motivation of cooperation in social dilemmas such as tax contributions are drawn. Practically, the assumptions on the dynamics can be utilized by authorities to increase cooperation and to change the interaction climate from an antagonistic climate to a service and confidence climate. PMID:25859096

  7. Tax authorities' interaction with taxpayers: A conception of compliance in social dilemmas by power and trust.

    PubMed

    Gangl, Katharina; Hofmann, Eva; Kirchler, Erich

    2015-02-01

    Tax compliance represents a social dilemma in which the short-term self-interest to minimize tax payments is at odds with the collective long-term interest to provide sufficient tax funds for public goods. According to the Slippery Slope Framework, the social dilemma can be solved and tax compliance can be guaranteed by power of tax authorities and trust in tax authorities. The framework, however, remains silent on the dynamics between power and trust. The aim of the present theoretical paper is to conceptualize the dynamics between power and trust by differentiating coercive and legitimate power and reason-based and implicit trust. Insights into this dynamic are derived from an integration of a wide range of literature such as on organizational behavior and social influence. Conclusions on the effect of the dynamics between power and trust on the interaction climate between authorities and individuals and subsequent individual motivation of cooperation in social dilemmas such as tax contributions are drawn. Practically, the assumptions on the dynamics can be utilized by authorities to increase cooperation and to change the interaction climate from an antagonistic climate to a service and confidence climate.

  8. Oxytocin can hinder trust and cooperation in borderline personality disorder.

    PubMed

    Bartz, Jennifer; Simeon, Daphne; Hamilton, Holly; Kim, Suah; Crystal, Sarah; Braun, Ashley; Vicens, Victor; Hollander, Eric

    2011-10-01

    We investigated the effects of intranasal oxytocin (OXT) on trust and cooperation in borderline personality disorder (BPD), a disorder marked by interpersonal instability and difficulties with cooperation. Although studies in healthy adults show that intranasal OXT increases trust, individuals with BPD may show an altered response to exogenous OXT because the effects of OXT on trust and pro-social behavior may vary depending on the relationship representations and expectations people possess and/or altered OXT system functioning in BPD. BPD and control participants received intranasal OXT and played a social dilemma game with a partner. Results showed that OXT produced divergent effects in BPD participants, decreasing trust and the likelihood of cooperative responses. Additional analyses focusing on individual differences in attachment anxiety and avoidance across BPD and control participants indicate that these divergent effects were driven by the anxiously attached, rejection-sensitive participants. These data suggest that OXT does not uniformly facilitate trust and pro-social behavior in humans; indeed, OXT may impede trust and pro-social behavior depending on chronic interpersonal insecurities, and/or possible neurochemical differences in the OXT system. Although popularly dubbed the 'hormone of love', these data suggest a more circumspect answer to the question of who will benefit from OXT.

  9. Public Sector Unionization: Understanding the Rise in Membership Rates and Impact on Homeland Security

    DTIC Science & Technology

    2011-12-01

    Travelers were reluctant to fly, flights were cancelled or had minimal passengers onboard as the public lost trust in the safety of air travel . 10...could be pulled into service to replace the striking screeners, airlines could cancel flights, and Americans could lose trust in air travel security...passenger travel , economic benefits of air travel enable globalization of world markets. Products and goods transported by air represent 35% of all

  10. AF-TRUST, Air Force Team for Research in Ubiquitous Secure Technology

    DTIC Science & Technology

    2010-07-26

    Charles Sutton, J. D. Tygar, and Kai Xia. Book chapter in Jeffrey J. P. Tsai and Philip S. Yu (eds.) Machine Learning in Cyber Trust: Security, Privacy...enterprise, tactical, embedded systems and command and control levels. From these studies, commissioned by Dr . Sekar Chandersekaran of the Secretary of the...Data centers avoid IP Multicast because of a series of problems with the technology. • Dr . Multicast (the MCMD), a system that maps traditional I PMC

  11. National Computer Security Conference (13th) Held in Washington, DC on 1-4 October, 1990. Procedings. Volume 1: Information Systems Security: Standards - The Key to the Future

    DTIC Science & Technology

    1990-10-04

    methods Category 6: Cryptographic methods (hard/ software ) - Tested countermeasures and standard means - Acknowledgements As the number of antivirus ...Skulason), only our own antiviruses have been mentioned in the catalog. We hope to include the major antivirus packages in the future. The current...Center GTE SRI International Trusted Information Systems, Inc. Grumann Data Systems SRI International Software Engineering Institute Trusted

  12. Research on trust calculation of wireless sensor networks based on time segmentation

    NASA Astrophysics Data System (ADS)

    Su, Yaoxin; Gao, Xiufeng; Qiao, Wenxin

    2017-05-01

    Because the wireless sensor network is different from the traditional network characteristics, it is easy to accept the intrusion from the compromise node. The trust mechanism is the most effective way to defend against internal attacks. Aiming at the shortcomings of the existing trust mechanism, a method of calculating the trust of wireless sensor networks based on time segmentation is proposed. It improves the security of the network and extends the life of the network

  13. Investigating Public trust in Expert Knowledge: Narrative, Ethics, and Engagement.

    PubMed

    Camporesi, Silvia; Vaccarella, Maria; Davis, Mark

    2017-03-01

    "Public Trust in Expert Knowledge: Narrative, Ethics, and Engagement" examines the social, cultural, and ethical ramifications of changing public trust in the expert biomedical knowledge systems of emergent and complex global societies. This symposium was conceived as an interdisciplinary project, drawing on bioethics, the social sciences, and the medical humanities. We settled on public trust as a topic for our work together because its problematization cuts across our fields and substantive research interests. For us, trust is simultaneously a matter of ethics, social relations, and the cultural organization of meaning. We share a commitment to narrative inquiry across our fields of expertise in the bioethics of transformative health technologies, public communications on health threats, and narrative medicine. The contributions to this symposium have applied, in different ways and with different effects, this interdisciplinary mode of inquiry, supplying new reflections on public trust, expertise, and biomedical knowledge.

  14. Are maternal social networks and perceptions of trust associated with suspected autism spectrum disorder in offspring? A population-based study in Japan.

    PubMed

    Fujiwara, Takeo; Kawachi, Ichiro

    2014-01-01

    To investigate the associations of maternal social networks and perceptions of trust with the prevalence of suspected autism spectrum disorders in 18-month-old offspring in Japan. Questionnaires included measurements of maternal social networks (number of relatives or friends they could call upon for assistance), maternal perceptions of trust, mutual assistance (i.e. individual measures of "cognitive social capital"), and social participation (i.e. individual measures of "structural social capital") as well as the Modified Checklist for Autism in Toddlers to detect suspected autism spectrum disorder (ASD). These tools were mailed to all families with 18-month-old toddlers in Chiba, a city near Tokyo (N = 6061; response rate: 64%). The association between social capital or social network indicators and suspected ASD were analyzed, adjusted for covariates by logistic regression analysis. Low maternal social trust was found to be significantly positively associated with suspected ASD in toddlers compared with high maternal social trust (adjusted odds ratio [OR]: 1.82, 95% confidence interval [CI]: 1.38 to 2.40); mutual aid was also significantly positively related (low vs. high: OR, 2.08, 95% CI: 1.59 to 2.73 [corrected]). However, maternal community participation showed U-shape association with suspected ASD of offspring. Maternal social network showed consistent inverse associations with suspected ASD of offspring, regardless of the type of social connection (e.g., relatives, neighbors, or friends living outside of their neighborhood). Mothers' cognitive social capital and social networks, but not structural social capital, might be associated with suspected ASD in offspring.

  15. Neural correlates of trust.

    PubMed

    Krueger, Frank; McCabe, Kevin; Moll, Jorge; Kriegeskorte, Nikolaus; Zahn, Roland; Strenziok, Maren; Heinecke, Armin; Grafman, Jordan

    2007-12-11

    Trust is a critical social process that helps us to cooperate with others and is present to some degree in all human interaction. However, the underlying brain mechanisms of conditional and unconditional trust in social reciprocal exchange are still obscure. Here, we used hyperfunctional magnetic resonance imaging, in which two strangers interacted online with one another in a sequential reciprocal trust game while their brains were simultaneously scanned. By designing a nonanonymous, alternating multiround game, trust became bidirectional, and we were able to quantify partnership building and maintenance. Using within- and between-brain analyses, an examination of functional brain activity supports the hypothesis that the preferential activation of different neuronal systems implements these two trust strategies. We show that the paracingulate cortex is critically involved in building a trust relationship by inferring another person's intentions to predict subsequent behavior. This more recently evolved brain region can be differently engaged to interact with more primitive neural systems in maintaining conditional and unconditional trust in a partnership. Conditional trust selectively activated the ventral tegmental area, a region linked to the evaluation of expected and realized reward, whereas unconditional trust selectively activated the septal area, a region linked to social attachment behavior. The interplay of these neural systems supports reciprocal exchange that operates beyond the immediate spheres of kinship, one of the distinguishing features of the human species.

  16. Neural correlates of trust

    PubMed Central

    Krueger, Frank; McCabe, Kevin; Moll, Jorge; Kriegeskorte, Nikolaus; Zahn, Roland; Strenziok, Maren; Heinecke, Armin; Grafman, Jordan

    2007-01-01

    Trust is a critical social process that helps us to cooperate with others and is present to some degree in all human interaction. However, the underlying brain mechanisms of conditional and unconditional trust in social reciprocal exchange are still obscure. Here, we used hyperfunctional magnetic resonance imaging, in which two strangers interacted online with one another in a sequential reciprocal trust game while their brains were simultaneously scanned. By designing a nonanonymous, alternating multiround game, trust became bidirectional, and we were able to quantify partnership building and maintenance. Using within- and between-brain analyses, an examination of functional brain activity supports the hypothesis that the preferential activation of different neuronal systems implements these two trust strategies. We show that the paracingulate cortex is critically involved in building a trust relationship by inferring another person's intentions to predict subsequent behavior. This more recently evolved brain region can be differently engaged to interact with more primitive neural systems in maintaining conditional and unconditional trust in a partnership. Conditional trust selectively activated the ventral tegmental area, a region linked to the evaluation of expected and realized reward, whereas unconditional trust selectively activated the septal area, a region linked to social attachment behavior. The interplay of these neural systems supports reciprocal exchange that operates beyond the immediate spheres of kinship, one of the distinguishing features of the human species. PMID:18056800

  17. Implicit race attitudes predict trustworthiness judgments and economic trust decisions

    PubMed Central

    Stanley, Damian A.; Sokol-Hessner, Peter; Banaji, Mahzarin R.; Phelps, Elizabeth A.

    2011-01-01

    Trust lies at the heart of every social interaction. Each day we face decisions in which we must accurately assess another individual's trustworthiness or risk suffering very real consequences. In a global marketplace of increasing heterogeneity with respect to nationality, race, and multiple other social categories, it is of great value to understand how implicitly held attitudes about group membership may support or undermine social trust and thereby implicitly shape the decisions we make. Recent behavioral and neuroimaging work suggests that a common mechanism may underlie the expression of implicit race bias and evaluations of trustworthiness, although no direct evidence of a connection exists. In two behavioral studies, we investigated the relationship between implicit race attitude (as measured by the Implicit Association Test) and social trust. We demonstrate that race disparity in both an individual's explicit evaluations of trustworthiness and, more crucially, his or her economic decisions to trust is predicted by that person's bias in implicit race attitude. Importantly, this relationship is robust and is independent of the individual's bias in explicit race attitude. These data demonstrate that the extent to which an individual invests in and trusts others with different racial backgrounds is related to the magnitude of that individual's implicit race bias. The core dimension of social trust can be shaped, to some degree, by attitudes that reside outside conscious awareness and intention. PMID:21518877

  18. Implicit race attitudes predict trustworthiness judgments and economic trust decisions.

    PubMed

    Stanley, Damian A; Sokol-Hessner, Peter; Banaji, Mahzarin R; Phelps, Elizabeth A

    2011-05-10

    Trust lies at the heart of every social interaction. Each day we face decisions in which we must accurately assess another individual's trustworthiness or risk suffering very real consequences. In a global marketplace of increasing heterogeneity with respect to nationality, race, and multiple other social categories, it is of great value to understand how implicitly held attitudes about group membership may support or undermine social trust and thereby implicitly shape the decisions we make. Recent behavioral and neuroimaging work suggests that a common mechanism may underlie the expression of implicit race bias and evaluations of trustworthiness, although no direct evidence of a connection exists. In two behavioral studies, we investigated the relationship between implicit race attitude (as measured by the Implicit Association Test) and social trust. We demonstrate that race disparity in both an individual's explicit evaluations of trustworthiness and, more crucially, his or her economic decisions to trust is predicted by that person's bias in implicit race attitude. Importantly, this relationship is robust and is independent of the individual's bias in explicit race attitude. These data demonstrate that the extent to which an individual invests in and trusts others with different racial backgrounds is related to the magnitude of that individual's implicit race bias. The core dimension of social trust can be shaped, to some degree, by attitudes that reside outside conscious awareness and intention.

  19. 25 CFR 152.34 - Approval of mortgages and deeds of trust.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Approval of mortgages and deeds of trust. 152.34 Section 152.34 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR LAND AND WATER ISSUANCE OF PATENTS IN FEE, CERTIFICATES OF COMPETENCY, REMOVAL OF RESTRICTIONS, AND SALE OF CERTAIN INDIAN LANDS Mortgages and Deeds of Trust to Secure Loans to...

  20. Placebo treatment facilitates social trust and approach behavior.

    PubMed

    Yan, Xinyuan; Yong, Xue; Huang, Wenhao; Ma, Yina

    2018-05-29

    Placebo effect refers to beneficial changes induced by the use of inert treatment, such as placebo-induced relief of physical pain and attenuation of negative affect. To date, we know little about whether placebo treatment could facilitate social functioning, a crucial aspect for well-being of a social species. In the present study, we develop and validate a paradigm to induce placebo effects on social trust and approach behavior (social placebo effect), and show robust evidence that placebo treatment promotes trust in others and increases preference for a closer interpersonal distance. We further examine placebo effects in real-life social interaction and show that placebo treatment makes single, but not pair-bonded, males keep closer to an attractive first-met female and perceive less social anxiety in the female. Finally, we show evidence that the effects of placebo treatment on social trust and approach behavior can be as strong as the effect of intranasal administration of oxytocin, a neuropeptide known for its function in facilitating social cognition and behavior. The finding of the social placebo effect extends our understanding of placebo effects on improvement of physical, mental, and social well-being and suggests clinical potentials in the treatment of social dysfunction.

  1. 46 CFR 287.8 - Investment of funds in securities.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 8 2010-10-01 2010-10-01 false Investment of funds in securities. 287.8 Section 287.8... OPERATORS ESTABLISHMENT OF CONSTRUCTION RESERVE FUNDS § 287.8 Investment of funds in securities. (a...), or securities which are not legal for investment of trust funds. Whenever the Administration approves...

  2. 46 CFR 287.8 - Investment of funds in securities.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 8 2011-10-01 2011-10-01 false Investment of funds in securities. 287.8 Section 287.8... OPERATORS ESTABLISHMENT OF CONSTRUCTION RESERVE FUNDS § 287.8 Investment of funds in securities. (a...), or securities which are not legal for investment of trust funds. Whenever the Administration approves...

  3. Adolescent Development of Trust. CIRCLE Working Paper 61

    ERIC Educational Resources Information Center

    Flanagan, Connie; Gallay, Leslie

    2008-01-01

    The purpose of this project was to gain a better understanding of dimensions of trust and inter-relationships between those dimensions during the adolescent years. Drawing from survey data collected at the beginning and end of a semester in eighty middle- and high-school social studies classes, relationships were assessed between: social trust,…

  4. Social Trust and the Growth of Schooling

    ERIC Educational Resources Information Center

    Bjornskov, Christian

    2009-01-01

    The paper develops a simple model to examine how social trust might affect the growth of schooling through lowering transaction costs associated with employing educated individuals. In a sample of 52 countries, the paper thereafter provides empirical evidence that trust has led to faster growth of schooling in the period 1960-2000. The findings…

  5. The Neurobiology of Trust and Schooling

    ERIC Educational Resources Information Center

    Sankey, Derek

    2018-01-01

    Are there neurobiological reasons why we are willing to trust other people and why "trust" and moral values such as "care" play a quite pivotal role in our social lives and the judgements we make, including our social interactions and judgements made in the context of schooling? In pursuing this question, this paper largely…

  6. Isolated and Skeptical: Social Engagement and Trust in Information Sources Among Smokers

    PubMed Central

    Blake, Kelly; Hesse, Bradford W.; Ackerson, Leland K.

    2014-01-01

    Our study compared indicators of social engagement and trust among current, former, and never smokers. Multinomial regression analyses of data from the 2005 U.S. Health Information National Trends Survey (n=5586) were conducted to identify independent associations between social engagement, trust in health information sources, and smoking status. Never smokers (odds ratio (OR)=2.08) and former smokers (OR=2.48) were significantly more likely to belong to community organizations than current smokers. Never (OR=4.59) and former smokers (OR=1.96) were more likely than current smokers to attend religious services. Never smokers (OR=1.38) were significantly more likely than current smokers to use the Internet. Former smokers (OR=1.41) were more likely than current smokers to be married. Compared to current smokers, never smokers were significantly more likely to trust health care professionals (OR=1.52) and less likely to trust the Internet (OR=0.59) for health information. Current smokers are less socially engaged and less trusting of information resources than non-smokers. PMID:21340632

  7. Inconsistency and social decision making in patients with Borderline Personality Disorder.

    PubMed

    Preuss, Nora; Brändle, Laura S; Hager, Oliver M; Haynes, Melanie; Fischbacher, Urs; Hasler, Gregor

    2016-09-30

    Inconsistent social behavior is a core psychopathological feature of borderline personality disorder. The goal of the present study was to examine inconsistency in social decision-making using simple economic social experiments. We investigated the decisions of 17 female patients with BPD, 24 patients with major depressive disorder (MDD), and 36 healthy controls in three single shot economic experiments measuring trust, cooperation, and punishment. BPD severity was assessed using the Zanarini Rating Scale for BPD. Investments across identical one-shot trust and punishment games were significantly more inconsistent in BPD patients than in controls. Such inconsistencies were only found in the social risk conditions of the trust and punishment conditions but not in the non-social control conditions. MDD patients did not show such inconsistencies. Furthermore, social support was negatively correlated with inconsistent decision-making in the trust and punishment game, which underscores the clinical relevance of this finding. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  8. Identifying the Role of Common Interests in Online User Trust Formation

    PubMed Central

    Ji, Lei; Liu, Jian-Guo; Hou, Lei; Guo, Qiang

    2015-01-01

    Despite enormous recent efforts in detecting the mechanism of the social relation formation in online social systems, the underlying rules between the common interests and social relations are still under dispute. Do online users befriend others who have similar tastes, or do their tastes become more similar after they become friends? In this paper, we investigate the correlation between online user trust formation and their common interests, measured by the overlap rate ρ and taste similarity θ respectively. The trust relation creation time is set as the zero timestamp. The statistical results before and after the trust formation for an online network, namely Epinions, show that, the overlap rate ρ increases greatly before the trust formation, while it would increase smoothly after the creation of the trust relation. Comparing with the empirical results, two null models are presented by shuffling the temporal behaviors of online users, which suggests that the accumulation of the common interests can result in the trust formation. Furthermore, we investigate the taste similarity θ of the common interests, which can reflect the users’ preference on their common interests. The empirical results show that the taste similarity θ is rapidly increased around the day when users trust the others. That is, the similar tastes on the common interests among users lead to the trust formation. Finally, we report that the user degree can also influence the effect of the taste similarity θ on user trust formation. This work may shed some light for deeply understanding the evolution mechanism of the online social systems. PMID:26161853

  9. Identifying the Role of Common Interests in Online User Trust Formation.

    PubMed

    Ji, Lei; Liu, Jian-Guo; Hou, Lei; Guo, Qiang

    2015-01-01

    Despite enormous recent efforts in detecting the mechanism of the social relation formation in online social systems, the underlying rules between the common interests and social relations are still under dispute. Do online users befriend others who have similar tastes, or do their tastes become more similar after they become friends? In this paper, we investigate the correlation between online user trust formation and their common interests, measured by the overlap rate ρ and taste similarity θ respectively. The trust relation creation time is set as the zero timestamp. The statistical results before and after the trust formation for an online network, namely Epinions, show that, the overlap rate ρ increases greatly before the trust formation, while it would increase smoothly after the creation of the trust relation. Comparing with the empirical results, two null models are presented by shuffling the temporal behaviors of online users, which suggests that the accumulation of the common interests can result in the trust formation. Furthermore, we investigate the taste similarity θ of the common interests, which can reflect the users' preference on their common interests. The empirical results show that the taste similarity θ is rapidly increased around the day when users trust the others. That is, the similar tastes on the common interests among users lead to the trust formation. Finally, we report that the user degree can also influence the effect of the taste similarity θ on user trust formation. This work may shed some light for deeply understanding the evolution mechanism of the online social systems.

  10. Pupil-mimicry conditions trust in partners: moderation by oxytocin and group membership.

    PubMed

    Kret, Mariska E; De Dreu, Carsten K W

    2017-03-15

    Across species, oxytocin, an evolutionarily ancient neuropeptide, facilitates social communication by attuning individuals to conspecifics' social signals, fostering trust and bonding. The eyes have an important signalling function; and humans use their salient and communicative eyes to intentionally and unintentionally send social signals to others, by contracting the muscles around their eyes and pupils. In our earlier research, we observed that interaction partners with dilating pupils are trusted more than partners with constricting pupils. But over and beyond this effect, we found that the pupil sizes of partners synchronize and that when pupils synchronously dilate, trust is further boosted. Critically, this linkage between mimicry and trust was bound to interactions between ingroup members. The current study investigates whether these findings are modulated by oxytocin and sex of participant and partner. Using incentivized trust games with partners from ingroup and outgroup whose pupils dilated, remained static or constricted, this study replicates our earlier findings. It further reveals that (i) male participants withhold trust from partners with constricting pupils and extend trust to partners with dilating pupils, especially when given oxytocin rather than placebo; (ii) female participants trust partners with dilating pupils most, but this effect is blunted under oxytocin; (iii) under oxytocin rather than placebo, pupil dilation mimicry is weaker and pupil constriction mimicry stronger; and (iv) the link between pupil constriction mimicry and distrust observed under placebo disappears under oxytocin. We suggest that pupil-contingent trust is parochial and evolved in social species in and because of group life. © 2017 The Authors.

  11. Honesty-humility under threat: Self-uncertainty destroys trust among the nice guys.

    PubMed

    Pfattheicher, Stefan; Böhm, Robert

    2018-01-01

    Recent research on humans' prosociality has highlighted the crucial role of Honesty-Humility, a basic trait in the HEXACO personality model. There is overwhelming evidence that Honesty-Humility predicts prosocial behavior across a vast variety of situations. In the present contribution, we cloud this rosy picture, examining a condition under which individuals high in Honesty-Humility reduce prosocial behavior. Specifically, we propose that under self-uncertainty, it is particularly those individuals high in Honesty-Humility who reduce trust in unknown others and become less prosocial. In 5 studies, we assessed Honesty-Humility, manipulated self-uncertainty, and measured interpersonal trust or trust in social institutions using behavioral or questionnaire measures. In Study 1, individuals high (vs. low) in Honesty-Humility showed higher levels of trust. This relation was mediated by their positive social expectations about the trustworthiness of others. Inducing self-uncertainty decreased trust, particularly in individuals high in Honesty-Humility (Studies 2-5). Making use of measuring the mediator (Studies 2 and 3) and applying a causal chain design (Studies 4a and 4b), it is shown that individuals high in Honesty-Humility reduced trust because self-uncertainty decreased positive social expectations about others. We end with an applied perspective, showing that Honesty-Humility is predictive of trust in social institutions (e.g., trust in the police; Study 5a), and that self-uncertainty undermined trust in the police especially for individuals high in Honesty-Humility (Study 5b). By these means, the present research shows that individuals high in Honesty-Humility are not unconditionally prosocial. Further implications for Honesty-Humility as well as for research on self-uncertainty and trust are discussed. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  12. A Layered Trust Information Security Architecture

    PubMed Central

    de Oliveira Albuquerque, Robson; García Villalba, Luis Javier; Sandoval Orozco, Ana Lucila; Buiati, Fábio; Kim, Tai-Hoon

    2014-01-01

    Information can be considered the most important asset of any modern organization. Securing this information involves preserving confidentially, integrity and availability, the well-known CIA triad. In addition, information security is a risk management job; the task is to manage the inherent risks of information disclosure. Current information security platforms do not deal with the different facets of information technology. This paper presents a layered trust information security architecture (TISA) and its creation was motivated by the need to consider information and security from different points of view in order to protect it. This paper also extends and discusses security information extensions as a way of helping the CIA triad. Furthermore, this paper suggests information representation and treatment elements, operations and support components that can be integrated to show the various risk sources when dealing with both information and security. An overview of how information is represented and treated nowadays in the technological environment is shown, and the reason why it is so difficult to guarantee security in all aspects of the information pathway is discussed. PMID:25470490

  13. Forming social capital--does participatory planning foster trust in institutions?

    PubMed

    Menzel, Susanne; Buchecker, Matthias; Schulz, Tobias

    2013-12-15

    Participatory planning that includes interest groups and municipal representatives has been presented as a means to deal with the increasing difficulty to reach arrangements due to progressively scarce land resources. Under dispute is whether collaborative forms of planning augment social capital or whether they might actually cause the destruction of such a valuable social commodity. In this paper we focus on trust in institution as a specific dimension of social capital because we argue that this is one of the effects the convenors of such participatory planning procedures are most interested in. We pursue a pre-post design and survey advisory group members of five on-going river-related planning processes in Switzerland. Controlling for generalised trust, we investigate how trust in institutions is affected over time by the quality of such processes and the degree of participation they offer. We find that generalised trust is highly correlated with initial levels of trust and so is process quality. Particularly the latter finding challenges the usually assumed direction of causality according to which process quality influences trust building. Additionally, we find a positive (non-significant) effect of process quality on changes in trust, while a higher degree of participation rather seems to hinder trust building. We suppose this indicates that under the conditions of limited time and resources more attention should be paid to how to improve the quality of participatory processes than putting much effort in increasing the degree of participation. Copyright © 2013 Elsevier Ltd. All rights reserved.

  14. Does school social capital modify socioeconomic inequality in mental health? A multi-level analysis in Danish schools.

    PubMed

    Nielsen, Line; Koushede, Vibeke; Vinther-Larsen, Mathilde; Bendtsen, Pernille; Ersbøll, Annette Kjær; Due, Pernille; Holstein, Bjørn E

    2015-09-01

    It seems that social capital in the neighbourhood has the potential to reduce socioeconomic differences in mental health among adolescents. Whether school social capital is a buffer in the association between socioeconomic position and mental health among adolescents remains uncertain. The aim of this study is therefore to examine if the association between socioeconomic position and emotional symptoms among adolescents is modified by school social capital. The Health Behaviour in School-aged Children Methodology Development Study 2012 provided data on 3549 adolescents aged 11-15 in two municipalities in Denmark. Trust in the school class was used as an indicator of school social capital. Prevalence of daily emotional symptoms in each socioeconomic group measured by parents' occupational class was calculated for each of the three categories of school classes: school classes with high trust, moderate trust and low trust. Multilevel logistic regression analyses with parents' occupational class as the independent variable and daily emotional symptoms as the dependent variable were conducted stratified by level of trust in the school class. The prevalence of emotional symptoms was higher among students in school classes with low trust (12.9%) compared to school classes with high trust (7.2%) (p < 0.01). In school classes with low level of trust, the odds ratio for daily emotional symptoms was 1.89 (95% CI 1.25-2.86) in the low socioeconomic group compared to the high socioeconomic group. In school classes characterised by high and moderate trust, there were no statistically significant differences in emotional symptoms between high and low socioeconomic groups. Although further studies are needed, this cross-sectional study suggests that school social capital may reduce mental health problems and diminish socioeconomic inequality in mental health among adolescents. Copyright © 2015 Elsevier Ltd. All rights reserved.

  15. The relationship between higher social trust and lower late HIV diagnosis and mortality differs by race/ethnicity: results from a state-level analysis

    PubMed Central

    Ransome, Yusuf; Batson, Ashley; Galea, Sandro; Kawachi, Ichiro; Nash, Denis; Mayer, Kenneth H.

    2017-01-01

    Abstract Introduction: Black men who have sex with men (MSM) continue to suffer a disproportionate burden of new HIV diagnoses and mortality. To better understand some of the reasons for these profound disparities, we examined whether the association between social trust and late HIV diagnosis and mortality differed by race/ethnicity, and investigated potential indirect effects of any observed differences. Methods: We performed generalized structural equation modelling to assess main and interaction associations between trust among one’s neighbours in 2009 (i.e. social trust) and race/ethnicity (Black, White, and Hispanic) predicting late HIV diagnosis (a CD4 count ≤200 cell/µL within three months of a new HIV diagnosis) rates and all-cause mortality rates of persons ever diagnosed late with HIV, across 47 American states for the years 2009–2013. We examined potential indirect effects of state-level HIV testing between social trust and late HIV diagnosis. Social trust data were from the Gallup Healthways Survey, HIV data from the Centers for Disease Control and Prevention, and HIV testing from the Behavioral Risk Factor Surveillance System. Covariates included state-level structural, healthcare, and socio-demographic factors including income inequality, healthcare access, and population density. We stratified analysis by transmission group (male-to-male, heterosexual, and injection drug use (IDU)). Results: States with higher levels of social trust had lower late HIV diagnosis rates: Adjusted Rate Ratio [aRR] were consistent across risk groups (0.57; 95%CI 0.53–0.62, male-to-male), (aRR 0.58; 95%CI 0.54–0.62, heterosexual) and (aRR 0.64; 95%CI 0.60–0.69, IDU). Those associations differed by race/ethnicity (all p < 0.001). The associations were most protective for Blacks followed by Hispanics, and least protective for Whites. HIV testing mediated between 18 and 32% of the association between social trust and late HIV diagnosis across transmission group but for Blacks relative to Whites only. Social trust was associated with lower all-cause mortality rates and that association varied by race/ethnicity within the male-to-male and IDU transmission groups only. Conclusions: Social trust may promote timely HIV testing, which can facilitate earlier HIV diagnosis, thus it can be a useful determinant to monitor the relationship with HIV care continuum outcomes especially for racial/ethnic minority groups disproportionately infected by HIV. PMID:28406271

  16. The relationship between higher social trust and lower late HIV diagnosis and mortality differs by race/ethnicity: results from a state-level analysis.

    PubMed

    Ransome, Yusuf; Batson, Ashley; Galea, Sandro; Kawachi, Ichiro; Nash, Denis; Mayer, Kenneth H

    2017-04-06

    Black men who have sex with men (MSM) continue to suffer a disproportionate burden of new HIV diagnoses and mortality. To better understand some of the reasons for these profound disparities, we examined whether the association between social trust and late HIV diagnosis and mortality differed by race/ethnicity, and investigated potential indirect effects of any observed differences. We performed generalized structural equation modelling to assess main and interaction associations between trust among one's neighbours in 2009 (i.e. social trust) and race/ethnicity (Black, White, and Hispanic) predicting late HIV diagnosis (a CD4 count ≤200 cell/µL within three months of a new HIV diagnosis) rates and all-cause mortality rates of persons ever diagnosed late with HIV, across 47 American states for the years 2009-2013. We examined potential indirect effects of state-level HIV testing between social trust and late HIV diagnosis. Social trust data were from the Gallup Healthways Survey, HIV data from the Centers for Disease Control and Prevention, and HIV testing from the Behavioral Risk Factor Surveillance System. Covariates included state-level structural, healthcare, and socio-demographic factors including income inequality, healthcare access, and population density. We stratified analysis by transmission group (male-to-male, heterosexual, and injection drug use (IDU)). States with higher levels of social trust had lower late HIV diagnosis rates: Adjusted Rate Ratio [aRR] were consistent across risk groups (0.57; 95%CI 0.53-0.62, male-to-male), (aRR 0.58; 95%CI 0.54-0.62, heterosexual) and (aRR 0.64; 95%CI 0.60-0.69, IDU). Those associations differed by race/ethnicity (all p < 0.001). The associations were most protective for Blacks followed by Hispanics, and least protective for Whites. HIV testing mediated between 18 and 32% of the association between social trust and late HIV diagnosis across transmission group but for Blacks relative to Whites only. Social trust was associated with lower all-cause mortality rates and that association varied by race/ethnicity within the male-to-male and IDU transmission groups only. Social trust may promote timely HIV testing, which can facilitate earlier HIV diagnosis, thus it can be a useful determinant to monitor the relationship with HIV care continuum outcomes especially for racial/ethnic minority groups disproportionately infected by HIV.

  17. CYBER SUPPLY CHAIN SECURITY: CAN THE BACKDOOR BE CLOSED WITH TRUSTED DESIGN, MANUFACTURING AND SUPPLY

    DTIC Science & Technology

    2016-08-01

    components from making it into DoD systems. The benefits of trusted design and manufacturing would likely cost more, but would confidently minimize DoD...compromise products too high for an attacker. If the costs and effort needed are greater than the benefit to conduct an attack, malicious actors are...simplicity may be a better approach. While there are potential benefits to built-in hardware and software security, there may be just as many

  18. "I can't do this, it's too much": building social inclusion in cancer diagnosis and treatment experiences of Aboriginal people, their carers and health workers.

    PubMed

    Treloar, Carla; Gray, Rebecca; Brener, Loren; Jackson, Clair; Saunders, Veronica; Johnson, Priscilla; Harris, Magdalena; Butow, Phyllis; Newman, Christy

    2014-04-01

    Social inclusion theory has been used to understand how people at the margins of society engage with service provision. The aim of this paper was to explore the cancer care experiences of Aboriginal people in NSW using a social inclusion lens. Qualitative interviews were conducted with 22 Aboriginal people with cancer, 18 carers of Aboriginal people and 16 health care workers. Participants' narratives described experiences that could be considered to be situational factors in social inclusion such as difficulties in managing the practical and logistic aspects of accessing cancer care. Three factors were identified as processes of social inclusion that tied these experiences together including socio-economic security, trust (or mistrust arising from historic and current experience of discrimination), and difficulties in knowing the system of cancer treatment. These three factors may act as barriers to the social inclusion of Aboriginal people in cancer treatment. This challenges the cancer care system to work to acknowledge these forces and create practical and symbolic responses, in partnership with Aboriginal people, communities and health organisations.

  19. Trust Management Considerations For the Cooperative Infrastructure Defense Framework: Trust Relationships, Evidence, and Decisions

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Maiden, Wendy M.

    Cooperative Infrastructure Defense (CID) is a hierarchical, agent-based, adaptive, cyber-security framework designed to collaboratively protect multiple enclaves or organizations participating in a complex infrastructure. CID employs a swarm of lightweight, mobile agents called Sensors designed to roam hosts throughout a security enclave to find indications of anomalies and report them to host-based Sentinels. The Sensors’ findings become pieces of a larger puzzle, which the Sentinel puts together to determine the problem and respond per policy as given by the enclave-level Sergeant agent. Horizontally across multiple enclaves and vertically within each enclave, authentication and access control technologies are necessary but insufficientmore » authorization mechanisms to ensure that CID agents continue to fulfill their roles in a trustworthy manner. Trust management fills the gap, providing mechanisms to detect malicious agents and offering more robust mechanisms for authorization. This paper identifies the trust relationships throughout the CID hierarchy, the types of trust evidence that could be gathered, and the actions that the CID system could take if an entity is determined to be untrustworthy.« less

  20. [Trust-promoting variables in child-adult interaction].

    PubMed

    Esser, M; Petermann, F

    1985-01-01

    As interpersonal trust is recognized as a central variable in child-psychotherapy, and as psychological research has not yet developed strategies to advance interpersonal trust, the question arose by which social behavior variables children's trust is determined in the interaction process between adults and children. After having developed a most concrete definition of trust in terms of social interaction behavior, everyday pedagogical interaction sequences involving adults and children were analyzed in order to identify behavioral elements or patterns of interaction conducive to trust. According to the hypotheses, the behavior classes "positive adult reaction", "adult trusting behavior" and the interaction pattern "positive adult response to child trusting behavior" were found as conducive to interpersonal trust in children. Furthermore the realisation of the pattern "alternation of trusting child behavior and positive adult behavior" for a longer period of interaction was identified as material to the foundation of interpersonal trust. The realisation of that pattern is encouraged by positive and permanent reinforcement of different child reactions by the adult and by the child's readiness to react trustfully to positive adult behavior.

  1. Damage to the insula is associated with abnormal interpersonal trust

    PubMed Central

    Belfi, Amy M.; Koscik, Timothy R.; Tranel, Daniel

    2015-01-01

    Reciprocal trust is a crucial component of cooperative, mutually beneficial social relationships. Previous research using tasks that require judging and developing interpersonal trust has suggested that the insula may be an important brain region underlying these processes (King-Casas et al., 2008). Here, using a neuropsychological approach, we investigated the role of the insula in reciprocal trust during the Trust Game (TG), an interpersonal economic exchange. Consistent with previous research, we found that neurologically normal adults reciprocate trust in kind, i.e., they increase trust in response to increases from their partners, and decrease trust in response to decreases. In contrast, individuals with damage to the insula displayed abnormal expressions of trust. Specifically, these individuals behaved benevolently (expressing misplaced trust) when playing the role of investor, and malevolently (violating their partner’s trust) when playing the role of the trustee. Our findings lend further support to the idea that the insula is important for expressing normal interpersonal trust, perhaps because the insula helps to recognize risk during decision-making and to identify social norm violations. PMID:25846668

  2. Understanding Knowledge Sharing between IT Professionals--An Integration of Social Cognitive and Social Exchange Theory

    ERIC Educational Resources Information Center

    Tsai, Ming-Tien; Cheng, Nai-Chang

    2012-01-01

    The research includes various constructs based on social exchange theory and social cognitive theory. This study mainly explored the relationships among organisational justice, trust, commitment and knowledge-sharing cognition and verified their mediating effects through two variables of trust and commitment. A survey utilising a questionnaire was…

  3. Does Intelligence Foster Generalized Trust? An Empirical Test Using the UK Birth Cohort Studies

    ERIC Educational Resources Information Center

    Sturgis, Patrick; Read, Sanna; Allum, Nick

    2010-01-01

    Social, or "generalized" trust is often characterised as the "attitudinal dimension" of social capital. It has been posited as key to a host of normatively desirable outcomes at the societal and individual levels. Yet the origins of individual variation in trust remain something of a mystery and continue to be a source of…

  4. Social capital, the miniaturization of community and assessment of patient satisfaction in primary healthcare: a population-based study.

    PubMed

    Lindström, Martin; Axén, Elin

    2004-01-01

    A study was undertaken to assess the impact of social participation, trust and the miniaturization of community, i.e. high social participation/low trust, on two measures of patient dissatisfaction in primary healthcare. The Scania 2000 public-health survey is a cross-sectional, postal questionnaire study. A total of 3,456 persons aged 18-80 years who had a regular doctor within the primary healthcare system were included. A logistic regression model was used to investigate the association between the social capital variables and dissatisfaction. Multivariate analysis analysed the importance of confounders on the differences in lack of general openness and lack of information concerning treatment in accordance with social capital variables. Lack of openness is positively associated with low trust, the miniaturization of community and low social capital, while lack of information is not significantly associated with the miniaturization of community, but to a lesser extent with low trust and low social capital. Low levels of trust and the miniaturization of community may enhance non-specific patient dissatisfaction such as experience of lack of openness by the patient. In contrast, the miniaturization of community was not significantly associated with the more specific "lack of information". The results have implications for the evaluation of patient dissatisfaction. Copyright 2004 Taylor & Francis

  5. Chimpanzees trust conspecifics to engage in low-cost reciprocity.

    PubMed

    Engelmann, Jan M; Herrmann, Esther; Tomasello, Michael

    2015-02-22

    Many of humans' most important social interactions rely on trust, including most notably among strangers. But little is known about the evolutionary roots of human trust. We presented chimpanzees (Pan troglodytes) with a modified version of the human trust game--trust in reciprocity--in which subjects could opt either to obtain a small but safe reward on their own or else to send a larger reward to a partner and trust her to reciprocate a part of the reward that she could not access herself. In a series of three studies, we found strong evidence that in interacting with a conspecific, chimpanzees show spontaneous trust in a novel context; flexibly adjust their level of trust to the trustworthiness of their partner and develop patterns of trusting reciprocity over time. At least in some contexts then, trust in reciprocity is not unique to humans, but rather has its evolutionary roots in the social interactions of humans' closest primate relatives. © 2015 The Author(s) Published by the Royal Society. All rights reserved.

  6. 78 FR 20701 - Munder Series Trust, et al.;

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-05

    ... designed to ensure that the Sub-Advisers comply with a Sub- Advised Series' investment objectives, policies...] Munder Series Trust, et al.; Notice of Application March 29, 2013. AGENCY: Securities and Exchange... would grant relief from certain disclosure requirements. [[Page 20702

  7. An Experimental Testbed for Evaluation of Trust and Reputation Systems

    NASA Astrophysics Data System (ADS)

    Kerr, Reid; Cohen, Robin

    To date, trust and reputation systems have often been evaluated using methods of their designers’ own devising. Recently, we demonstrated that a number of noteworthy trust and reputation systems could be readily defeated, revealing limitations in their original evaluations. Efforts in the trust and reputation community to develop a testbed have yielded a successful competition platform, ART. This testbed, however, is less suited to general experimentation and evaluation of individual trust and reputation technologies. In this paper, we propose an experimentation and evaluation testbed based directly on that used in our investigations into security vulnerabilities in trust and reputation systems for marketplaces. We demonstrate the advantages of this design, towards the development of more thorough, objective evaluations of trust and reputation systems.

  8. Neural Signatures of Trust During Human-Automation Interactions

    DTIC Science & Technology

    2016-04-01

    magnetic resonance imaging by manipulating the reliability of advice from a human or automated luggage inspector framed as experts. HAT and HHT were...human-human trust, human-automation trust, brain, functional magnetic resonance imaging 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18...behavioral X-ray luggage-screening task with functional magnetic resonance imaging (fMRI) and manipulated reliabilities of advice (unknown to the

  9. Department of Defense International Space Cooperation Strategy

    DTIC Science & Technology

    2017-01-01

    Secretary of Defense on .January 18. 2017. the unclassified version provides DoD’s approach for invigorating cooperation and collaboration with trusted ...Cooperation Strategy (ISCS) establishes DoD’ s approach for invigorating cooperation and collaboration with trusted allies and partners across the...collaborating with trusted allies and partners to address shared security challenges by leveraging allies’ and partners ’ capabilities to enhance space mission

  10. 26 CFR 1.851-5 - Examples.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... TAXES (CONTINUED) Regulated Investment Companies and Real Estate Investment Trusts § 1.851-5 Examples. The provisions of section 851 may be illustrated by the following examples: Example 1. Investment...: Percent Cash 5 Government securities 10 Securities of regulated investment companies 20 Securities of...

  11. 26 CFR 1.851-5 - Examples.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... TAXES (CONTINUED) Regulated Investment Companies and Real Estate Investment Trusts § 1.851-5 Examples. The provisions of section 851 may be illustrated by the following examples: Example 1. Investment...: Percent Cash 5 Government securities 10 Securities of regulated investment companies 20 Securities of...

  12. 26 CFR 1.851-5 - Examples.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... TAXES (CONTINUED) Regulated Investment Companies and Real Estate Investment Trusts § 1.851-5 Examples. The provisions of section 851 may be illustrated by the following examples: Example 1. Investment...: Percent Cash 5 Government securities 10 Securities of regulated investment companies 20 Securities of...

  13. 26 CFR 1.851-5 - Examples.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... TAXES (CONTINUED) Regulated Investment Companies and Real Estate Investment Trusts § 1.851-5 Examples. The provisions of section 851 may be illustrated by the following examples: Example 1. Investment...: Percent Cash 5 Government securities 10 Securities of regulated investment companies 20 Securities of...

  14. eHealth in Belgium, a new "secure" federal network: role of patients, health professions and social security services.

    PubMed

    France, Francis Roger

    2011-02-01

    eHealth platform is the official federal network in Belgium (created by law on 21 August 2008) devoted to a secure exchange of health data in many types of applications, such as health care purposes, simplification of administrative procedures and contribution to health policy. It implies a controlled access to decentralized databases and uses encrypted personal data. The national identification number has been chosen in order to authenticate the requester, the patient, and the receiver of information exchange. Authorizations have to be respected in order to obtain personal health data. Several questions are raised about its security: the lack of mandatory request for systematic journaling on accesses to the electronic patient record as well as the absence of explicit procedures for sanctions in case of unauthorized access, the new role of social security administration in managing security where a eHealth manager can be both judge and party (in the function of trusted third party for health data encryption and of a required lawyer for texts proposed by physicians to the Commission for the protection of private life). Another critic concerns the number of physicians in minority and the absence of patients' delegates in the eHealth Board. At a time when the patient is becoming a partner in the care team, should not he be the gate-keeper for the access to his own health record? How could networks help him to get the appropriate knowledge to contribute to care and to write his testament of life? Recent laws (on private life, patient rights and euthanasia) have contributed to a behavioural change in citizens and physician attitudes. Recommendations are made in order to improve the acceptability of eHealth platform. Copyright © 2010 Elsevier Ireland Ltd. All rights reserved.

  15. Are Maternal Social Networks and Perceptions of Trust Associated with Suspected Autism Spectrum Disorder in Offspring? A Population-Based Study in Japan

    PubMed Central

    Fujiwara, Takeo; Kawachi, Ichiro

    2014-01-01

    Objective To investigate the associations of maternal social networks and perceptions of trust with the prevalence of suspected autism spectrum disorders in 18-month-old offspring in Japan. Methods Questionnaires included measurements of maternal social networks (number of relatives or friends they could call upon for assistance), maternal perceptions of trust, mutual assistance (i.e. individual measures of “cognitive social capital”), and social participation (i.e. individual measures of “structural social capital”) as well as the Modified Checklist for Autism in Toddlers to detect suspected autism spectrum disorder (ASD). These tools were mailed to all families with 18-month-old toddlers in Chiba, a city near Tokyo (N = 6061; response rate: 64%). The association between social capital or social network indicators and suspected ASD were analyzed, adjusted for covariates by logistic regression analysis. Results Low maternal social trust was found to be significantly positively associated with suspected ASD in toddlers compared with high maternal social trust (adjusted odds ratio [OR]: 1.82, 95% confidence interval [CI]: 1.38 to 2.40); mutual aid was also significantly positively related (low vs. high: OR, 1.82, 95% CI: 1.38 to 2.40). However, maternal community participation showed U-shape association with suspected ASD of offspring. Maternal social network showed consistent inverse associations with suspected ASD of offspring, regardless of the type of social connection (e.g., relatives, neighbors, or friends living outside of their neighborhood). Conclusions Mothers' cognitive social capital and social networks, but not structural social capital, might be associated with suspected ASD in offspring. PMID:24983630

  16. A Hybrid Authentication and Authorization Process for Control System Networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Manz, David O.; Edgar, Thomas W.; Fink, Glenn A.

    2010-08-25

    Convergence of control system and IT networks require that security, privacy, and trust be addressed. Trust management continues to plague traditional IT managers and is even more complex when extended into control system networks, with potentially millions of entities, a mission that requires 100% availability. Yet these very networks necessitate a trusted secure environment where controllers and managers can be assured that the systems are secure and functioning properly. We propose a hybrid authentication management protocol that addresses the unique issues inherent within control system networks, while leveraging the considerable research and momentum in existing IT authentication schemes. Our hybridmore » authentication protocol for control systems provides end device to end device authentication within a remote station and between remote stations and control centers. Additionally, the hybrid protocol is failsafe and will not interrupt communication or control of vital systems in a network partition or device failure. Finally, the hybrid protocol is resilient to transitory link loss and can operate in an island mode until connectivity is reestablished.« less

  17. 26 CFR 2.1-8 - Investment of funds in securities.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 26 Internal Revenue 14 2010-04-01 2010-04-01 false Investment of funds in securities. 2.1-8... (CONTINUED) MARITIME CONSTRUCTION RESERVE FUND § 2.1-8 Investment of funds in securities. (a) Obligations of... securities which are not legal for investment of trust funds. Whenever the Administration approves the...

  18. 26 CFR 2.1-8 - Investment of funds in securities.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 26 Internal Revenue 14 2011-04-01 2010-04-01 true Investment of funds in securities. 2.1-8 Section... (CONTINUED) MARITIME CONSTRUCTION RESERVE FUND § 2.1-8 Investment of funds in securities. (a) Obligations of... securities which are not legal for investment of trust funds. Whenever the Administration approves the...

  19. HealthTrust: A Social Network Approach for Retrieving Online Health Videos

    PubMed Central

    Karlsen, Randi; Melton, Genevieve B

    2012-01-01

    Background Social media are becoming mainstream in the health domain. Despite the large volume of accurate and trustworthy health information available on social media platforms, finding good-quality health information can be difficult. Misleading health information can often be popular (eg, antivaccination videos) and therefore highly rated by general search engines. We believe that community wisdom about the quality of health information can be harnessed to help create tools for retrieving good-quality social media content. Objectives To explore approaches for extracting metrics about authoritativeness in online health communities and how these metrics positively correlate with the quality of the content. Methods We designed a metric, called HealthTrust, that estimates the trustworthiness of social media content (eg, blog posts or videos) in a health community. The HealthTrust metric calculates reputation in an online health community based on link analysis. We used the metric to retrieve YouTube videos and channels about diabetes. In two different experiments, health consumers provided 427 ratings of 17 videos and professionals gave 162 ratings of 23 videos. In addition, two professionals reviewed 30 diabetes channels. Results HealthTrust may be used for retrieving online videos on diabetes, since it performed better than YouTube Search in most cases. Overall, of 20 potential channels, HealthTrust’s filtering allowed only 3 bad channels (15%) versus 8 (40%) on the YouTube list. Misleading and graphic videos (eg, featuring amputations) were more commonly found by YouTube Search than by searches based on HealthTrust. However, some videos from trusted sources had low HealthTrust scores, mostly from general health content providers, and therefore not highly connected in the diabetes community. When comparing video ratings from our reviewers, we found that HealthTrust achieved a positive and statistically significant correlation with professionals (Pearson r 10 = .65, P = .02) and a trend toward significance with health consumers (r 7 = .65, P = .06) with videos on hemoglobinA1 c, but it did not perform as well with diabetic foot videos. Conclusions The trust-based metric HealthTrust showed promising results when used to retrieve diabetes content from YouTube. Our research indicates that social network analysis may be used to identify trustworthy social media in health communities. PMID:22356723

  20. The Role of Trust in CenteringPregnancy: Building Interpersonal Trust Relationships in Group-Based Prenatal Care in The Netherlands.

    PubMed

    Kweekel, Liselotte; Gerrits, Trudie; Rijnders, Marlies; Brown, Patrick

    2017-03-01

    CenteringPregnancy (CP) is a specific model of group-based prenatal care for women, implemented in 44 midwifery practices in The Netherlands since 2011. Women have evaluated CP positively, especially in terms of social support, and improvements have been made in birthweight and preterm-birth outcomes; however, there is limited understanding as to why. The purpose of this study was to examine the mechanisms that create trusting relationships within CP to better understand CP outcomes and effectiveness. A qualitative study was conducted using in-depth interviews with 26 (former) CP participants, alongside observations of CP sessions. All interviews were transcribed and analyzed following open, axial, and selective coding. Most women characterized trust as a positive expectation about how others would respond to sensitive information that was shared within the group. Trust emerged within the data as a multidimensional concept and several preconditions seemed crucial in building trusting relations: vulnerability, communication, reciprocity, chemistry, and atmosphere. The facilitating of interpersonal trust among CP participants enhanced group processes, especially as a basis for social support by which women said they were more eager to share sensitive information in a trusting environment. Processes of trust were interwoven within various CP group dynamics. Trust facilitated social support which in turn enabled reassurance and the building of women's self-confidence. © 2016 Wiley Periodicals, Inc.

  1. 17 CFR 239.17c - Form N-6, registration statement for separate accounts organized as unit investment trusts that...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... insurance policies. Form N-6 shall be used for registration under the Securities Act of 1933 of securities... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Form N-6, registration... policies. 239.17c Section 239.17c Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION...

  2. Social Security reform: evaluating current proposals. Latest results of the EBRI-SSASIM2 policy simulation model.

    PubMed

    Copeland, C; VanDerhei, J; Salisbury, D L

    1999-06-01

    The present Social Security program has been shown to be financially unsustainable in the future without modification to the current program. The purpose of this Issue Brief, EBRI's fourth in a series on Social Security reform, is threefold: to illustrate new features of the EBRI-SSASIM2 policy simulation model not available in earlier EBRI publications, to expand quantitative analysis to specific proposals, and to evaluate the uncertainty involved in proposals that rely on equity investment. This analysis compares the Gregg/Breaux-Kolbe/Stenholm (GB-KS) and Moynihan/Kerrey proposals with three generic or "traditional" reforms: increasing taxes, reducing benefits, and/or increasing the retirement age. Both proposals would create individual accounts by "carving out" funds from current Social Security payroll taxes. This analysis also examines other proposed changes that would "add on" to existing Social Security funds through the use of general revenue transfers and/or investment in the equities market. President Clinton has proposed a general revenue transfer and the collective investment of some of the OASDI trust fund assets in equities. Reps. Archer and Shaw have proposed a general revenue tax credit to establish individual accounts that would be invested partially in the equities markets. When comparing Social Security reform proposals that would specifically alter benefit levels, the Moynihan/Kerrey bill compares quite favorably with the other proposals in both benefit levels and payback ratios, when individuals elect to use the individual account option. In contrast, the GB-KS bills do not compare quite as favorably for their benefit levels, but do compare favorably in terms of payback ratios. An important comparison in these bills is the administrative costs of managing the individual accounts, since benefits can be lowered by up to 23 percent when going from the assumed low to high administrative costs. Moreover, allowing individuals to decide whether to save the 2 percent of their OASDI taxable income or to receive higher takehome pay, as would be allowed in Moynihan/Kerrey, could lead to substantial differences in ultimate retirement income. Allowing for individual investment choices and using actual 401(k) participant allocation data, as opposed to an assumed average allocation for everyone, results in substantial differences in account balances. The Archer/Shaw approach mandates a 60 percent/40 percent equity/bond split specifically to avoid the variations in returns that arise from individual investment allocation decisions. Although there are greater chances for higher returns for equity investment in the president's proposal, there are also greater chances for worse outcomes. This is also true for other reforms that would invest Social Security assets in equities.

  3. Trust estimation of the semantic web using semantic web clustering

    NASA Astrophysics Data System (ADS)

    Shirgahi, Hossein; Mohsenzadeh, Mehran; Haj Seyyed Javadi, Hamid

    2017-05-01

    Development of semantic web and social network is undeniable in the Internet world these days. Widespread nature of semantic web has been very challenging to assess the trust in this field. In recent years, extensive researches have been done to estimate the trust of semantic web. Since trust of semantic web is a multidimensional problem, in this paper, we used parameters of social network authority, the value of pages links authority and semantic authority to assess the trust. Due to the large space of semantic network, we considered the problem scope to the clusters of semantic subnetworks and obtained the trust of each cluster elements as local and calculated the trust of outside resources according to their local trusts and trust of clusters to each other. According to the experimental result, the proposed method shows more than 79% Fscore that is about 11.9% in average more than Eigen, Tidal and centralised trust methods. Mean of error in this proposed method is 12.936, that is 9.75% in average less than Eigen and Tidal trust methods.

  4. Black Jack Pershing: Partnerships in Warfare

    DTIC Science & Technology

    2010-04-01

    polygamy . Finally, he moved about unescorted to show his trust in tribal leaders and their ability to provide for local security. Perhaps the key...understanding to influence behavior and build trust. He avoided taboo issues like slavery and polygamy , and constantly reassured his partners that

  5. Double Cluster Heads Model for Secure and Accurate Data Fusion in Wireless Sensor Networks

    PubMed Central

    Fu, Jun-Song; Liu, Yun

    2015-01-01

    Secure and accurate data fusion is an important issue in wireless sensor networks (WSNs) and has been extensively researched in the literature. In this paper, by combining clustering techniques, reputation and trust systems, and data fusion algorithms, we propose a novel cluster-based data fusion model called Double Cluster Heads Model (DCHM) for secure and accurate data fusion in WSNs. Different from traditional clustering models in WSNs, two cluster heads are selected after clustering for each cluster based on the reputation and trust system and they perform data fusion independently of each other. Then, the results are sent to the base station where the dissimilarity coefficient is computed. If the dissimilarity coefficient of the two data fusion results exceeds the threshold preset by the users, the cluster heads will be added to blacklist, and the cluster heads must be reelected by the sensor nodes in a cluster. Meanwhile, feedback is sent from the base station to the reputation and trust system, which can help us to identify and delete the compromised sensor nodes in time. Through a series of extensive simulations, we found that the DCHM performed very well in data fusion security and accuracy. PMID:25608211

  6. A secured e-tendering modeling using misuse case approach

    NASA Astrophysics Data System (ADS)

    Mohd, Haslina; Robie, Muhammad Afdhal Muhammad; Baharom, Fauziah; Darus, Norida Muhd; Saip, Mohamed Ali; Yasin, Azman

    2016-08-01

    Major risk factors relating to electronic transactions may lead to destructive impacts on trust and transparency in the process of tendering. Currently, electronic tendering (e-tendering) systems still remain uncertain in issues relating to legal and security compliance and most importantly it has an unclear security framework. Particularly, the available systems are lacking in addressing integrity, confidentiality, authentication, and non-repudiation in e-tendering requirements. Thus, one of the challenges in developing an e-tendering system is to ensure the system requirements include the function for secured and trusted environment. Therefore, this paper aims to model a secured e-tendering system using misuse case approach. The modeling process begins with identifying the e-tendering process, which is based on the Australian Standard Code of Tendering (AS 4120-1994). It is followed by identifying security threats and their countermeasure. Then, the e-tendering was modelled using misuse case approach. The model can contribute to e-tendering developers and also to other researchers or experts in the e-tendering domain.

  7. Trustworthy data collection from implantable medical devices via high-speed security implementation based on IEEE 1363.

    PubMed

    Hu, Fei; Hao, Qi; Lukowiak, Marcin; Sun, Qingquan; Wilhelm, Kyle; Radziszowski, Stanisław; Wu, Yao

    2010-11-01

    Implantable medical devices (IMDs) have played an important role in many medical fields. Any failure in IMDs operations could cause serious consequences and it is important to protect the IMDs access from unauthenticated access. This study investigates secure IMD data collection within a telehealthcare [mobile health (m-health)] network. We use medical sensors carried by patients to securely access IMD data and perform secure sensor-to-sensor communications between patients to relay the IMD data to a remote doctor's server. To meet the requirements on low computational complexity, we choose N-th degree truncated polynomial ring (NTRU)-based encryption/decryption to secure IMD-sensor and sensor-sensor communications. An extended matryoshkas model is developed to estimate direct/indirect trust relationship among sensors. An NTRU hardware implementation in very large integrated circuit hardware description language is studied based on industry Standard IEEE 1363 to increase the speed of key generation. The performance analysis results demonstrate the security robustness of the proposed IMD data access trust model.

  8. Power and trust in organizational relations: an empirical study in Turkish public hospitals.

    PubMed

    Bozaykut, Tuba; Gurbuz, F Gulruh

    2015-01-01

    Given the salience of the interplay between trust and power relations in organizational settings, this paper examines the perceptions of social power and its effects on trust in supervisors within the context of public hospitals. Following the theoretical background from which the study model is developed, the recent situation of hospitals within Turkish healthcare system is discussed to further elucidate the working conditions of physicians. Sample data were collected employing a structured questionnaire that was distributed to physicians working at seven different public hospitals. The statistical analyses indicate that perceptions of supervisors' social power affect subordinates' trust in supervisors. Although coercive power is found to have the greatest impact on trust in supervisors, the influence of the power base is weak. In addition, the results show that perceptions of social power differ between genders. However, the results do not support any of the hypotheses regarding the relations between trust in supervisors and the examined demographic variables. Copyright © 2014 John Wiley & Sons, Ltd.

  9. Gender, trust and cooperation in environmental social dilemmas.

    PubMed

    Irwin, Kyle; Edwards, Kimberly; Tamburello, Jeffrey A

    2015-03-01

    This research addresses gender differences in environmental protection efforts. Recent work indicates that, across a variety of domains, women are more generous, charitable, and prosocial than men. Despite above-average levels of these motivators for cooperation, considerable experimental research points to no difference in cooperation between genders. What can explain women's lower-than-expected cooperation levels? Prior research indicates that, compared to men, women are less trusting and respond to fear incentives in social dilemmas - they are concerned about being exploited. We test these arguments in the context of environmental behaviors and argue that lower trust and greater responses to fear incentives mean that women's cooperation is predicated on trust. For men, trust does not predict environmental cooperation. The current research represents the first empirical test of these arguments. Using data from the General Social Survey we focus on private sphere behaviors and political participation and predict an interaction between gender and trust on cooperation. Results support this prediction. Copyright © 2014 Elsevier Inc. All rights reserved.

  10. Partisan strength, political trust and generalized trust in the United States: An analysis of the General Social Survey, 1972-2014.

    PubMed

    Hooghe, Marc; Oser, Jennifer

    2017-11-01

    The literature on political parties suggests that strong partisan identities are associated with citizens' effective interaction with the political system, and with higher levels of political trust. Traditionally, party identity therefore is seen as a mechanism that allows for political integration. Simultaneously, however, political parties have gained recent attention for their role in promoting societal polarization by reinforcing competing and even antagonistic group identities. This article uses General Social Survey data from 1972 - 2014 to investigate the relationship between partisan strength and both political and generalized trust. The findings show that increases in partisan strength are positively related to political trust, but negatively related to generalized trust. This suggests that while partisan strength is indeed an important linkage mechanism for the political system, it is also associated with a tendency toward social polarization, and this corrosive effect thus far has not gained sufficient attention in literature on party identity. Copyright © 2017 Elsevier Inc. All rights reserved.

  11. 31 CFR 205.27 - How are Interest Calculation Costs calculated?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... & Planning Trust Fund (CFDA 20.205); Airport Improvement Trust Fund (CFDA 20.106); Federal Transit Capital Improvement Trust Fund (CFDA 20.500); Federal Transit Capital & Operating Assistance Trust Fund (CFDA 20.507); and Social Security—Disability Insurance Trust Fund (CFDA 96.001); and (2) The aggregate payments from...

  12. 31 CFR 205.27 - How are Interest Calculation Costs calculated?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... & Planning Trust Fund (CFDA 20.205); Airport Improvement Trust Fund (CFDA 20.106); Federal Transit Capital Improvement Trust Fund (CFDA 20.500); Federal Transit Capital & Operating Assistance Trust Fund (CFDA 20.507); and Social Security—Disability Insurance Trust Fund (CFDA 96.001); and (2) The aggregate payments from...

  13. Social interactions, trust and risky alcohol consumption.

    PubMed

    Seid, Abdu Kedir

    2016-12-01

    The association of social capital and alcohol consumption is one of the most robust empirical findings in health economics of the past decade. However, the direction of the relationship between the two is heavily dependent on which dimension of social capital is studied and which alcohol measure is used. In this paper, we examine the effect of social interactions and generalised trust on drinking in the general Danish population survey. Participants (n = 2569) were recruited as part of a larger study. The double-hurdle model for the volume of alcohol consumption and the multivariate logistic model for heavy episodic drinking were estimated. We found evidence that social networking with male friends, membership in voluntary organisations, and generalised trust were significantly associated with the mean volume of alcohol consumption and heavy drinking. We also observed that social support at the community level had a buffering effect against heavy episodic drinking. The findings support previous findings in which social interactions and generalised trust were found to predict individuals' volume of drinking and heavy episodic drinking. However, the results varied across the indicators.

  14. The Use of Social Media to Recruit Participants With Rare Conditions: Lynch Syndrome as an Example

    PubMed Central

    Parker, Wendy M; Hennig, Kelsey; Sisson, Faith; Bruzzone, Linda L

    2017-01-01

    Background Social media is increasingly being used as a means of recruiting participants, particularly for investigators whose areas of interest involve rare conditions or hard-to-reach populations. However, much of the literature to date has focused on paid advertisement recruitment. Objective We used Lynch syndrome (LS), a rare hereditary cancer syndrome, as a model to demonstrate the successful partnership between researchers and a Web-based patient education and advocacy organization to facilitate participant recruitment. Methods Recruitment was undertaken in partnership with Lynch Syndrome International (LSI), an advocacy organization with a strong social media presence. After LSI published our study information, participants followed up via email or phone call. Following prescreening and consent, interested and eligible participants were then sent a secure survey link. Results Within 36 hours of a single Facebook post by the site administrators for LSI, over 150 individuals responded via phone or email. Sixty-five individuals were sent the survey link and 57 individuals completed the survey (88% response rate). Of note, these 57 individuals were geographically diverse within the Unites States, representing LS patients from 26 different states. Conclusions This approach has several advantages, including recruitment through a trusted source outside of a clinical setting, higher response rates, and cost-effectiveness with a small research team in a relatively short amount of time. Overall, social media recruitment with a trusted online partner can be highly effective in hard-to-reach clinical populations, such as patients with LS. However, this approach requires additional effort for eligibility screening. PMID:28115298

  15. A multi-domain trust management model for supporting RFID applications of IoT

    PubMed Central

    Li, Feng

    2017-01-01

    The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system, in which trust establishment among entities from heterogeneous domains without past interaction or prior agreed policy, is a challenge. The current trust management mechanisms in the literature do not meet the specific requirements in multi-domain RFID systems. Therefore, this paper analyzes the special challenges on trust management in multi-domain RFID systems, and identifies the implications and the requirements of the challenges on the solutions to the trust management of multi-domain RFID systems. A multi-domain trust management model is proposed, which provides a hierarchical trust management framework include a diversity of trust evaluation and establishment approaches. The simulation results and analysis show that the proposed method has excellent ability to deal with the trust relationships, better security, and higher accuracy rate. PMID:28708855

  16. A multi-domain trust management model for supporting RFID applications of IoT.

    PubMed

    Wu, Xu; Li, Feng

    2017-01-01

    The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system, in which trust establishment among entities from heterogeneous domains without past interaction or prior agreed policy, is a challenge. The current trust management mechanisms in the literature do not meet the specific requirements in multi-domain RFID systems. Therefore, this paper analyzes the special challenges on trust management in multi-domain RFID systems, and identifies the implications and the requirements of the challenges on the solutions to the trust management of multi-domain RFID systems. A multi-domain trust management model is proposed, which provides a hierarchical trust management framework include a diversity of trust evaluation and establishment approaches. The simulation results and analysis show that the proposed method has excellent ability to deal with the trust relationships, better security, and higher accuracy rate.

  17. The Effectiveness of Health Care Information Technologies: Evaluation of Trust, Security Beliefs, and Privacy as Determinants of Health Care Outcomes.

    PubMed

    Kisekka, Victoria; Giboney, Justin Scott

    2018-04-11

    The diffusion of health information technologies (HITs) within the health care sector continues to grow. However, there is no theory explaining how success of HITs influences patient care outcomes. With the increase in data breaches, HITs' success now hinges on the effectiveness of data protection solutions. Still, empirical research has only addressed privacy concerns, with little regard for other factors of information assurance. The objective of this study was to study the effectiveness of HITs using the DeLone and McLean Information Systems Success Model (DMISSM). We examined the role of information assurance constructs (ie, the role of information security beliefs, privacy concerns, and trust in health information) as measures of HIT effectiveness. We also investigated the relationships between information assurance and three aspects of system success: attitude toward health information exchange (HIE), patient access to health records, and perceived patient care quality. Using structural equation modeling, we analyzed the data from a sample of 3677 cancer patients from a public dataset. We used R software (R Project for Statistical Computing) and the Lavaan package to test the hypothesized relationships. Our extension of the DMISSM to health care was supported. We found that increased privacy concerns reduce the frequency of patient access to health records use, positive attitudes toward HIE, and perceptions of patient care quality. Also, belief in the effectiveness of information security increases the frequency of patient access to health records and positive attitude toward HIE. Trust in health information had a positive association with attitudes toward HIE and perceived patient care quality. Trust in health information had no direct effect on patient access to health records; however, it had an indirect relationship through privacy concerns. Trust in health information and belief in the effectiveness of information security safeguards increases perceptions of patient care quality. Privacy concerns reduce patients' frequency of accessing health records, patients' positive attitudes toward HIE exchange, and overall perceived patient care quality. Health care organizations are encouraged to implement security safeguards to increase trust, the frequency of health record use, and reduce privacy concerns, consequently increasing patient care quality. ©Victoria Kisekka, Justin Scott Giboney. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 11.04.2018.

  18. PKI-based secure mobile access to electronic health services and data.

    PubMed

    Kambourakis, G; Maglogiannis, I; Rouskas, A

    2005-01-01

    Recent research works examine the potential employment of public-key cryptography schemes in e-health environments. In such systems, where a Public Key Infrastructure (PKI) is established beforehand, Attribute Certificates (ACs) and public key enabled protocols like TLS, can provide the appropriate mechanisms to effectively support authentication, authorization and confidentiality services. In other words, mutual trust and secure communications between all the stakeholders, namely physicians, patients and e-health service providers, can be successfully established and maintained. Furthermore, as the recently introduced mobile devices with access to computer-based patient record systems are expanding, the need of physicians and nurses to interact increasingly with such systems arises. Considering public key infrastructure requirements for mobile online health networks, this paper discusses the potential use of Attribute Certificates (ACs) in an anticipated trust model. Typical trust interactions among doctors, patients and e-health providers are presented, indicating that resourceful security mechanisms and trust control can be obtained and implemented. The application of attribute certificates to support medical mobile service provision along with the utilization of the de-facto TLS protocol to offer competent confidentiality and authorization services is also presented and evaluated through experimentation, using both the 802.11 WLAN and General Packet Radio Service (GPRS) networks.

  19. Predicting Social Trust with Binary Logistic Regression

    ERIC Educational Resources Information Center

    Adwere-Boamah, Joseph; Hufstedler, Shirley

    2015-01-01

    This study used binary logistic regression to predict social trust with five demographic variables from a national sample of adult individuals who participated in The General Social Survey (GSS) in 2012. The five predictor variables were respondents' highest degree earned, race, sex, general happiness and the importance of personally assisting…

  20. Towards Building Trusted Multinational Civil-Military Relationships Using Social Networks

    DTIC Science & Technology

    2011-06-01

    Half the world - 3 billion people - own a cell phone. Most are, or soon will be, capable of direct connection to social networking sites . “When...S. Hiltz, and K. Passerini, Trust and Privacy Concern within social networking sites : A comparision of Facebook and MySpace, in Americas

  1. Consumer trust to a Web site: moderating effect of attitudes toward online shopping.

    PubMed

    San Martín, Sonia; Camarero, Carmen

    2008-10-01

    In this paper, authors suggest a model that reflects the role played by the Web site characteristics and the previous level of satisfaction as determinant factors of trust in the Web site. Also, authors consider the moderating effects of consumers' motives and inhibitors to purchase online. Results show that satisfaction with previous purchases, the Web site security and privacy policies, and service quality are the main determinants of trust. Also, the motives and inhibitors the individuals perceive when buying online determine the type of signals they consider to trust.

  2. The 2008 financial crisis: Changes in social capital and its association with psychological wellbeing in the United Kingdom - A panel study.

    PubMed

    Lindström, Martin; Giordano, Giuseppe N

    2016-03-01

    The global financial crisis of 2008 was described by the IMF as the worst recession since the Great Depression. This historic event provided the backdrop to this United Kingdom (UK) longitudinal study of changes in associations between social capital and psychological wellbeing. Past longitudinal studies have reported that the presence of social capital may buffer against adverse mental health outcomes. This study adds to existing literature by employing data from the British Household Panel Survey and tracking the same individuals (N = 11,743) pre- and immediately post-crisis (years 2007-09). With longitudinal, multilevel logistic regression modelling, we aimed to compare the buffering effects of individual-level social capital (generalised trust and social participation) against worse psychological wellbeing (GHQ-12) during and immediately after the 2008 financial crisis. After comparing the same individuals over time, results showed that stocks of social capital (generalised trust) were significantly depleted across the UK during the crisis, from 40% trusting others in 2007 to 32% in 2008. Despite this drop, the buffering effect of trust against worse psychological wellbeing was pronounced in 2008; those not trusting had an increased risk of worse psychological wellbeing in 2008 compared with the previous year in fully adjusted models (OR = 1.49, 95% CI (1.34-1.65). Levels of active participation increased across the timeframe of this study but were not associated with psychological health. From our empirical evidence, decision makers should be made aware of how events such as the crisis (and the measures taken to counter its effects) could negatively impact on a Nation's trust levels. Furthermore, past research implies that the positive effects of trust on psychological wellbeing evident in this study may only be short-term; therefore, decision makers should also prioritise policies that restore trust levels to improve the psychological wellbeing of the population. Copyright © 2016 The Authors. Published by Elsevier Ltd.. All rights reserved.

  3. Understanding and applying principles of social cognition and decision making in adaptive environmental governance.

    PubMed

    DeCaro, Daniel A; Arnol, Craig Anthony Tony; Boama, Emmanuel Frimpong; Garmestani, Ahjond S

    2017-03-01

    Environmental governance systems are under greater pressure to adapt and to cope with increased social and ecological uncertainty from stressors like climate change. We review principles of social cognition and decision making that shape and constrain how environmental governance systems adapt. We focus primarily on the interplay between key decision makers in society and legal systems. We argue that adaptive governance must overcome three cooperative dilemmas to facilitate adaptation: (1) encouraging collaborative problem solving, (2) garnering social acceptance and commitment, and (3) cultivating a culture of trust and tolerance for change and uncertainty. However, to do so governance systems must cope with biases in people's decision making that cloud their judgment and create conflict. These systems must also satisfy people's fundamental needs for self-determination, fairness, and security, ensuring that changes to environmental governance are perceived as legitimate, trustworthy, and acceptable. We discuss the implications of these principles for common governance solutions (e.g., public participation, enforcement) and conclude with methodological recommendations. We outline how scholars can investigate the social cognitive principles involved in cases of adaptive governance.

  4. Understanding and applying principles of social cognition and decision making in adaptive environmental governance

    PubMed Central

    DeCaro, Daniel A.; Arnol, Craig Anthony (Tony); Boama, Emmanuel Frimpong; Garmestani, Ahjond S.

    2018-01-01

    Environmental governance systems are under greater pressure to adapt and to cope with increased social and ecological uncertainty from stressors like climate change. We review principles of social cognition and decision making that shape and constrain how environmental governance systems adapt. We focus primarily on the interplay between key decision makers in society and legal systems. We argue that adaptive governance must overcome three cooperative dilemmas to facilitate adaptation: (1) encouraging collaborative problem solving, (2) garnering social acceptance and commitment, and (3) cultivating a culture of trust and tolerance for change and uncertainty. However, to do so governance systems must cope with biases in people’s decision making that cloud their judgment and create conflict. These systems must also satisfy people’s fundamental needs for self-determination, fairness, and security, ensuring that changes to environmental governance are perceived as legitimate, trustworthy, and acceptable. We discuss the implications of these principles for common governance solutions (e.g., public participation, enforcement) and conclude with methodological recommendations. We outline how scholars can investigate the social cognitive principles involved in cases of adaptive governance. PMID:29780425

  5. 13 CFR 120.352 - Use of proceeds.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 120.352 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Special Purpose Loans Qualified Employee Trusts (esop) § 120.352 Use of proceeds. Loan proceeds may be used for two purposes. (a) Qualified employer securities. A qualified employee trust may relend loan proceeds to the...

  6. 13 CFR 120.352 - Use of proceeds.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 120.352 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Special Purpose Loans Qualified Employee Trusts (esop) § 120.352 Use of proceeds. Loan proceeds may be used for two purposes. (a) Qualified employer securities. A qualified employee trust may relend loan proceeds to the...

  7. 13 CFR 120.352 - Use of proceeds.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 120.352 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Special Purpose Loans Qualified Employee Trusts (esop) § 120.352 Use of proceeds. Loan proceeds may be used for two purposes. (a) Qualified employer securities. A qualified employee trust may relend loan proceeds to the...

  8. 13 CFR 120.352 - Use of proceeds.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 120.352 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Special Purpose Loans Qualified Employee Trusts (esop) § 120.352 Use of proceeds. Loan proceeds may be used for two purposes. (a) Qualified employer securities. A qualified employee trust may relend loan proceeds to the...

  9. 13 CFR 120.352 - Use of proceeds.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 120.352 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Special Purpose Loans Qualified Employee Trusts (esop) § 120.352 Use of proceeds. Loan proceeds may be used for two purposes. (a) Qualified employer securities. A qualified employee trust may relend loan proceeds to the...

  10. 78 FR 51254 - Self-Regulatory Organizations; The Depository Trust Company; Notice of Filing and Immediate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-20

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70198; File No. SR-DTC-2013-09] Self-Regulatory... Change To Eliminate Special Procedures for Securities Offered Pursuant to Regulation S, Category 3, Under the Securities Act of 1933 August 14, 2013. Pursuant to Section 19(b)(1) of the Securities Exchange...

  11. 17 CFR 240.16a-13 - Change in form of beneficial ownership.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... exercise or conversion of a derivative security or deposit into or withdrawal from a voting trust, that... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Change in form of beneficial ownership. 240.16a-13 Section 240.16a-13 Commodity and Securities Exchanges SECURITIES AND EXCHANGE...

  12. An Investigation of Children's Peer Trust across Culture: Is the Composition of Peer Trust Universal?

    ERIC Educational Resources Information Center

    Betts, Lucy R.; Rotenberg, Ken J.; Petrocchi, Serena; Lecciso, Flavia; Sakai, Atsushi; Maeshiro, Kazumi; Judson, Helen

    2014-01-01

    The components of children's trust in same-gender peers (trust beliefs, ascribed trustworthiness, and dyadic reciprocal trust) were examined in samples of 8-11-year-olds from the UK, Italy, and Japan. Trust was assessed by children's ratings of the extent to which same-gender classmates kept promises and kept secrets. Social relations analyses…

  13. Usability and trust in e-banking.

    PubMed

    Pravettoni, Gabriella; Leotta, Salvatore Nuccio; Lucchiari, Claudio; Misuraca, Raffaella

    2007-12-01

    This study assessed the role of usability in trust of e-banking services. A questionnaire was administered to 185 Italian undergraduate working students who volunteered for the experiment (M age = 30.5 yr., SD = 3.1). Participants were differentiated on computer ability (Expert, n = 104; Nonexpert, n = 81) and e-banking use (User, n = 93; Nonusers, n = 92). Analysis showed that the website usability of e-banking services did not play a very important role for the User group. Instead, institution-based trust, e.g., the trust in the security policy of the Web merchant, customers, and the overall trust of the bank were the crucial factors in the adoption of e-banking.

  14. Trust is a must: What is involved in trusting those who manage forest fires?

    Treesearch

    Adam Liljeblad; Bill Borrie; Alan Watson

    2010-01-01

    Trust is a complicated emotion. In the past, many social scientists have studied trust. They discovered that trust involves a number of beliefs and emotions. The scientists in this study were interested in learning more about trust. They believed that forest managers can do a better job if people trust them to do what is best for citizens and the environment (figure 1...

  15. We Engage, Therefore They Trust? A Study of Social Media Engagement and Public Trust in Science

    NASA Astrophysics Data System (ADS)

    Hwong, Y. L.; Oliver, C.; Van Kranendonk, M. J.

    2017-12-01

    Our society relies heavily on the trust that the public places in science to work. Given science's importance, the growing distrust in science is a cause for concern. Thanks to their participatory nature, social media have been touted as the promising tool for public engagement to restore public trust in science. These digital platforms have transformed the landscape of science communication yet little is known about their impact on public trust in science. This study probed several aspects of public trust in science as expressed on Twitter, focusing on two related science issues: space science and climate change. Our datasets comprised of 10,000 randomly sampled tweets over a month's period in 2016. We used human annotation and machine learning as our approach. Results indicated that the perceived contentiousness of a science issue has a significant impact on public trust. The level of distrust is higher in the climate change tweets than in the space science tweets, despite climate scientists being almost four times as active as space scientists in engaging with sceptics. However, people who engaged with scientists in the climate change network displayed a higher level of trust in science compared with those who did not. This effect was not observed in the space science network - in this network, there is no significant difference in trust levels between people who engaged with scientists and those who did not. Additionally, our machine learning study revealed that trust in science (as conveyed by tweets) can be predicted. The supervised learning algorithm that we developed was able to predict the trust labels of tweets in our sample with an accuracy of 84%. A further feature analysis indicated that similarity, presence of URL and authenticity are the properties of trust-inspiring tweets. Based on these findings, we argue that social media science communication is not as straightforward as `we engage, therefore they trust'. Public attitude towards science is often issue-dependent, and the way scientists communicate on social media has a significant impact on public perception.

  16. Collective Trust: Why Schools Can't Improve without It

    ERIC Educational Resources Information Center

    Forsyth, Patrick B.; Adams, Curt M.; Hoy, Wayne K.

    2011-01-01

    The culmination of nearly three decades of research, "Collective Trust" offers new insight and practical knowledge on the social construction of trust for school improvement. The authors argue that "collective trust" is not merely an average trust score for a group, but rather an independent concept with distinctive origins and consequences. The…

  17. Assess and enhance public trust

    Treesearch

    Patricia Winter; James Absher; Alan Watson

    2007-01-01

    Trust is a form of social capital, facilitating effective land management, communication and collaboration. Although trust in the Forest Service is at least moderately high for most publics, evidence of a lack of trust and outright distrust has been found in some communities. However, the amount, types, and conditions of trust necessary for effective management to...

  18. Social Capital, Trust, Economic Stress and Religion in a Cohort of 87,134 Thai Adults

    PubMed Central

    Yiengprugsawan, Vasoontara; Seubsman, Sam-ang; Lim, Lynette; Sleigh, Adrian

    2011-01-01

    Social capital includes collective features such as social trust, norms, and networks. This paper examines social capital-related variables against demographic, socioeconomic and geographic characteristics of 87,134 adult distance-learning students from Sukhothai Thammathirat Open University. We have found economic stress to be higher in non-married groups, lower income groups, and those residing in rural areas. Social trust was higher among married, especially with higher income and those in rural areas. Those who were separated, divorced or widowed and those with lower socioeconomic status had the highest economic stress and the least social trust. These groups also reported high importance of religious belief, karma and spiritual belief, along with lower income groups. Despite having high economic stress, social interaction with and support from families were found to be high among those not-married, with lower income, and in rural areas. As Thailand urbanises and progresses economically, diverse patterns of social capital have emerged and some changes might have offset others. For example, we have shown that economic stress associated with low income tends to co-occur with high social interaction and family support. This observation should be reassuring to policymakers aiming to preserve and promote social capital as Thailand continues to urbanise and modernise. PMID:22003268

  19. Get them before they get you: trust, trustworthiness, and social cognition in boys with and without externalizing behavior problems.

    PubMed

    Sharp, Carla; Ha, Carolyn; Fonagy, Peter

    2011-05-01

    Economic exchange games have rarely been applied to examine psychopathology in youth. In the current study we adapted a trust game to investigate the relations between externalizing behavior problems, trust, and trustworthiness. We were particularly interested in the differential modulating impact of "known identity" (vs. anonymous) condition of the task. Second, we examined whether anomalies in trust behavior would correspond to social cognition manifested in children with externalizing problems. A total of 171 (79 age-matched pairs) boys (mean age = 12.84; SD = 1.80) were recruited from community groups where social networks and relationships amongst peers have been established. A trust game was played under two conditions: an anonymous version where the identity of the trust game partner was not known and a "known identity" version where identities were revealed. Results supported the conclusion that boys with externalizing behavior problems are generally less trustworthy, but not less trusting and that this was true especially for the known identity version of the game. Moreover, anomalies in trust behavior were associated with hostile intentions, but not reflective of a general theory of mind deficit. This study contributes to an emerging literature using economic exchange games to investigate real-time, real-life exchanges in relation to psychopathology.

  20. When is selective self-presentation effective? An investigation of the moderation effects of "self-esteem" and "social trust".

    PubMed

    Kim, Yoonkyung; Baek, Young Min

    2014-11-01

    This study investigates the relationship between selective self-presentation and online life satisfaction, and how this relationship is influenced by respondents' perceptions of "self" (operationalized by "self-esteem") and "others" (operationalized by "social trust"). Relying on survey data from 712 Korean online users, two important findings were detected in our study. First, the positive relationship between selective self-presentation and online life satisfaction becomes more prominent among people with low self-esteem compared to those with high self-esteem, and second, this positive relationship is enhanced among people with high levels of social trust compared to those with low trust levels. Theoretical and practical implications of our findings as well as potential limitations are discussed.

  1. What are children's trusts? Early findings from a national survey.

    PubMed

    Bachmann, M O; Reading, R; Husbands, C; O'Brien, M; Thoburn, J; Shemilt, I; Watson, J; Jones, N; Haynes, R; Mugford, M

    2006-03-01

    The Children Act 2004 and National Service Framework for Children, Young People and Maternity Services require fuller integration of health, education and social services for children and young people in England and Wales. The UK government supported the establishment of 35 experimental children's trust pathfinders (henceforth called children's trusts) in England. A questionnaire was completed by managers in all 35 children's trusts a year after their start. Children's trust documents were examined. Census and performance indicators were compared between children's trust areas and the rest of England. Children's trust areas had demographic and social characteristics typical of England. All children's trusts aimed to improve health, education and social services by greater managerial and service integration. All had boards representing the three sectors; other agencies' representation varied. Two-thirds of children's trusts had moved towards pooling budgets in at least some service areas. At this stage in their development, some had prioritized joint procurement or provision of services, with formal managerial structures, while others favoured an informal strategic planning, co-ordination and information sharing approach. The commonest priorities for services development were for disabled children (16 children's trusts), followed by early intervention (11) and mental health services (8). The diverse strategies adopted by these 35 children's trusts during their first year is due to their own characteristics and to the way government strategy developed during this period. Whilst some prioritized organizational development, joint financing and commissioning, and information sharing, others laid more emphasis on mechanisms for bringing front-line professionals closer together. Their experiences are of value to others deciding how best to integrate children's services.

  2. 75 FR 4626 - Order Granting a Temporary Exemption From Certain Government Securities Act Provisions and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-28

    ... accommodate customer clearing of credit default swaps that reference government securities. Treasury is also... regulations impose obligations concerning financial responsibility, protection of customer securities and... clearance of credit default swaps (CDS)\\8\\ transactions on behalf of customers of ICE Trust clearing members...

  3. 22 CFR 1203.735-205 - Financial interests.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ..., or other corporate securities under the trust will be exempt to the same extent as provided in... of investing in equity or debt securities: Provided, That the fair value of the interest involved... the purpose of investing in equity or debt securities, the interest of the employee in any enterprise...

  4. 22 CFR 1203.735-205 - Financial interests.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ..., or other corporate securities under the trust will be exempt to the same extent as provided in... of investing in equity or debt securities: Provided, That the fair value of the interest involved... the purpose of investing in equity or debt securities, the interest of the employee in any enterprise...

  5. 22 CFR 1203.735-205 - Financial interests.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ..., or other corporate securities under the trust will be exempt to the same extent as provided in... of investing in equity or debt securities: Provided, That the fair value of the interest involved... the purpose of investing in equity or debt securities, the interest of the employee in any enterprise...

  6. 22 CFR 1203.735-205 - Financial interests.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ..., or other corporate securities under the trust will be exempt to the same extent as provided in... of investing in equity or debt securities: Provided, That the fair value of the interest involved... the purpose of investing in equity or debt securities, the interest of the employee in any enterprise...

  7. Self-rated health, generalized trust, and the Affordable Care Act: A US panel study, 2006-2014.

    PubMed

    Mewes, Jan; Giordano, Giuseppe Nicola

    2017-10-01

    Previous research shows that generalized trust, the belief that most people can be trusted, is conducive to people's health. However, only recently have longitudinal studies suggested an additional reciprocal pathway from health back to trust. Drawing on a diverse body of literature that shows how egalitarian social policy contributes to the promotion of generalized trust, we hypothesize that this other 'reverse' pathway could be sensitive to health insurance context. Drawing on nationally representative US panel data from the General Social Survey, we examine whether the Affordable Care Act of 2010 could have had influence on the deteriorating impact of worsening self-rated health (SRH) on generalized trust. Firstly, using two-wave panel data (2008-2010, N = 1403) and employing random effects regression models, we show that a lack of health insurance coverage negatively determines generalized trust in the United States. However, this association is attenuated when additionally controlling for (perceived) income inequality. Secondly, utilizing data from two separate three-wave panel studies from the US General Social Survey (2006-10; N = 1652; 2010-2014; N = 1187), we employ fixed-effects linear regression analyses to control for unobserved heterogeneity from time-invariant factors. We demonstrate that worsening SRH was a stronger predictor for a decrease in generalized trust prior (2006-2010) to the implementation of the Affordable Care Act. Further, the negative effect of fair/poor SRH seen in the 2006-2010 data becomes attenuated in the 2010-2014 panel data. We thus find evidence for a substantial weakening of the previously established negative impact of decreasing SRH on generalized trust, coinciding with the most significant US healthcare reforms in decades. Social policy and healthcare policy implications are discussed. Copyright © 2017 The Author(s). Published by Elsevier Ltd.. All rights reserved.

  8. Trust, cooperation, and equality: a psychological analysis of the formation of social capital.

    PubMed

    Cozzolino, Philip J

    2011-06-01

    Research suggests that in modern Western culture there is a positive relationship between the equality of resources and the formation of trust and cooperation, two psychological components of social capital. Two studies elucidate the psychological processes underlying that relationship. Study 1 experimentally tested the influence of resource distributions on the formation of trust and intentions to cooperate; individuals receiving a deficit of resources and a surplus of resources evidenced lower levels of social capital (i.e., trust and cooperation) than did individuals receiving equal amounts. Analyses revealed the process was affective for deficit participants and cognitive for surplus participants. Study 2 provided suggestive support for the affective-model of equality and social capital using proxy variables in the 1996 General Social Survey data set. Results suggest support for a causal path of unequal resource distributions generating affective experiences and cognitive concerns of justice, which mediate disengagement and distrust of others. ©2010 The British Psychological Society.

  9. Social capital and health in Kenya: A multilevel analysis.

    PubMed

    Musalia, John

    2016-10-01

    Despite the acknowledgment that social capital is an important predictor of good health and overall well being in wealthy countries, little empirical research has been conducted in developing countries, particularly in Africa, to examine this relationship. This study examines the association between cognitive (trust) and structural (membership in organization) social capital on health at both the individual and contextual levels. Health was measured using answers to a subjective question on physical health and anxiety/worry suffered by individuals within the last 30 days. This study utilized Afrobarometer data collected in Kenya in 2005 to examine this relationship using multilevel logistic statistical modeling. Upon controlling for socioeconomic and demographic factors, social capital was found to be significantly associated with anxiety/worry and physical health in Kenya. Membership in organizations was associated with increased odds (OR = 1.34, 95%CI: 1.02-1.76) of physical health problems, while individual trust was associated with a 6% (OR = 0.94, 95%CI: 0.90-0.99) reduction in the likelihood of physical health problems. Conversely, generalized trust was associated with a 37% reduction in the odds (OR = 0.63, 95%CI: 0.40-0.99) of anxiety/worry, while individual trust was associated with a 5% reduction (OR = 0.95, 95%CI: 0.90-1.00) of anxiety/worry. With the exception of membership in an organization that exacerbates physical health, both individual level trust and generalized trust were associated with better health outcomes in Kenya. The availability of social organizations at the contextual level was associated with worsening anxiety/worry although the effect size was small. These results show that social capital, particularly trust, is a concept that can apply to different social and cultural contexts and can potentially be harnessed to improve health in settings that suffer from resource poverty. Copyright © 2016 Elsevier Ltd. All rights reserved.

  10. 76 FR 58059 - Investment Managers Series Trust, et al.; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-19

    ...] Investment Managers Series Trust, et al.; Notice of Application September 13, 2011. AGENCY: Securities and... approval and would grant relief from certain disclosure requirements. Applicants: Investment Managers... successors (any such entity, together with Palmer Square, an ``Adviser''); (b) uses the manager of managers...

  11. 78 FR 39793 - ETF Issuer Solutions Inc., et al.; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-02

    ... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 30568; 812-14080] ETF... sections 12(d)(1)(A) and (B) of the Act. Applicants: ETF Issuer Solutions Inc. (``ETFis''), ETF Actively Managed Trust (``Trust) and ETF Distributors LLC (``Distributor''). Summary of Application: Applicants...

  12. Correlates of consumer trust in online health information: findings from the health information national trends survey.

    PubMed

    Ye, Yinjiao

    2011-01-01

    The past few decades have witnessed a dramatic increase in consumers seeking health information online. However, the quality of such information remains questionable, and the trustworthiness of online health information has become a hot topic, whereas little attention has been paid to how consumers evaluate online health information credibility. This study builds on theoretical perspectives of trust such as personal-capital-based, social-capital-based, and transfer-based, and it examines various correlates of consumer trust in online health information. The author analyzed the 2007 Health Information National Trends Survey data (N = 7,674). Results showed that consumer trust in online health information did not correlate with personal capital such as income, education, and health status. Social capital indicated by visiting social networking Web sites was not associated with trust in online health information either. Nevertheless, trust in online health information transferred from traditional mass media and government health agencies to the Internet, and it varied by such information features as easiness to locate and to understand. Age appeared to be a key factor in understanding the correlates of trust in online health information. Theoretical and empirical implications of the results are discussed.

  13. How do we trust strangers? The neural correlates of decision making and outcome evaluation of generalized trust

    PubMed Central

    Wang, Yiwen; Zhang, Zhen; Jing, Yiming; Valadez, Emilio A.

    2016-01-01

    This study investigates the brain correlates of decision making and outcome evaluation of generalized trust (i.e. trust in unfamiliar social agents)—a core component of social capital which facilitates civic cooperation and economic exchange. We measured 18 (9 male) Chinese participants’ event-related potentials while they played the role of the trustor in a one-shot trust game with unspecified social agents (trustees) allegedly selected from a large representative sample. At the decision-making phase, greater N2 amplitudes were found for trustors’ distrusting decisions compared to trusting decisions, which may reflect greater cognitive control exerted to distrust. Source localization identified the precentral gyrus as one possible neuronal generator of this N2 component. At the outcome evaluation phase, principal components analysis revealed that the so called feedback-related negativity was in fact driven by a reward positivity, which was greater in response to gain feedback compared to loss feedback. This reduced reward positivity following loss feedback may indicate that the absence of reward for trusting decisions was unexpected by the trustor. In addition, we found preliminary evidence suggesting that the decision-making processes may differ between high trustors and low trustors. PMID:27317927

  14. The dynamics of socio-connective trust within support networks accessed by informal caregivers.

    PubMed

    Ray, Robin A; Street, Annette F

    2011-03-01

    This article introduces the concept of socio-connective trust, the synapse between the social structures and processes that underpin relationships in supportive care networks. Data from an ethnographic case study of 18 informal caregivers providing in-home care for people with life-limiting illness were analysed drawing on theoretical concepts from the work of Giddens and writings on social capital, as well as the construction of trust in the caregiving literature. While conceptions of trust were found to contribute to understanding supportive care relationships, they did not account for the dynamic nature of the availability and use of support networks. Instead, informal caregivers undertook ongoing reflexive negotiation of relationship boundaries in response to their own conception of the current situation and their perception of trust in their relationships with the various members of the support network. The concept of socio-connective trust describes the movement and flow of the flexible bonds that influence relationships among care networks and determine the type and range of support accessed by informal caregivers. Understanding the complexities of socio-connective trust in caregiving relationships will assist health and social care workers to mobilize relevant resources to support informal caregivers.

  15. Social capital, political trust and experience of cannabis smoking: a population-based study in southern Sweden.

    PubMed

    Lindström, Martin

    2008-06-01

    To investigate whether political mistrust in the Riksdag (the national parliament in Sweden) is an independent characteristic of cannabis smokers, or whether it reflects low confidence in people in general, and therefore low social capital. The 2004 public health survey in Skåne is a cross-sectional postal questionnaire study answered by 27,757 respondents aged 18-80 with a 59% response rate providing data on political trust, cannabis smoking, and potential confounders. 13.9% of the men and 8.3% of the women had smoked cannabis; 17.3% of the male and 11.6% of the female respondents reported no trust at all in the Riksdag, and another 38.2% and 36.2%, respectively, reported a moderate political trust. Young age, high education, unemployment, low generalized trust in other people, and lower levels of political trust were associated with cannabis smoking, even after multiple adjustments. The groups men with no trust at all in the Riksdag, and women with high trust, not particularly high political trust and no political trust at all had significantly higher odds ratios of cannabis smoking than the very high trust reference category. The results thus somewhat differed between men and women. Low political trust is associated with cannabis smoking, independently of trust in people in general.

  16. Augmenting Trust Establishment in Dynamic Systems with Social Networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lagesse, Brent J; Kumar, Mohan; Venkatesh, Svetha

    2010-01-01

    Social networking has recently flourished in popularity through the use of social websites. Pervasive computing resources have allowed people stay well-connected to each other through access to social networking resources. We take the position that utilizing information produced by relationships within social networks can assist in the establishment of trust for other pervasive computing applications. Furthermore, we describe how such a system can augment a sensor infrastructure used for event observation with information from mobile sensors (ie, mobile phones with cameras) controlled by potentially untrusted third parties. Pervasive computing systems are invisible systems, oriented around the user. As a result,more » many future pervasive systems are likely to include a social aspect to the system. The social communities that are developed in these systems can augment existing trust mechanisms with information about pre-trusted entities or entities to initially consider when beginning to establish trust. An example of such a system is the Collaborative Virtual Observation (CoVO) system fuses sensor information from disaparate sources in soft real-time to recreate a scene that provides observation of an event that has recently transpired. To accomplish this, CoVO must efficently access services whilst protecting the data from corruption from unknown remote nodes. CoVO combines dynamic service composition with virtual observation to utilize existing infrastructure with third party services available in the environment. Since these services are not under the control of the system, they may be unreliable or malicious. When an event of interest occurs, the given infrastructure (bus cameras, etc.) may not sufficiently cover the necessary information (be it in space, time, or sensor type). To enhance observation of the event, infrastructure is augmented with information from sensors in the environment that the infrastructure does not control. These sensors may be unreliable, uncooperative, or even malicious. Additionally, to execute queries in soft real-time, processing must be distributed to available systems in the environment. We propose to use information from social networks to satisfy these requirements. In this paper, we present our position that knowledge gained from social activities can be used to augment trust mechanisms in pervasive computing. The system uses social behavior of nodes to predict a subset that it wants to query for information. In this context, social behavior such as transit patterns and schedules (which can be used to determine if a queried node is likely to be reliable) or known relationships, such as a phone's address book, that can be used to determine networks of nodes that may also be able to assist in retrieving information. Neither implicit nor explicit relationships necessarily imply that the user trusts an entity, but rather will provide a starting place for establishing trust. The proposed framework utilizes social network information to assist in trust establishment when third-party sensors are used for sensing events.« less

  17. Trust transitivity in social networks.

    PubMed

    Richters, Oliver; Peixoto, Tiago P

    2011-04-05

    Non-centralized recommendation-based decision making is a central feature of several social and technological processes, such as market dynamics, peer-to-peer file-sharing and the web of trust of digital certification. We investigate the properties of trust propagation on networks, based on a simple metric of trust transitivity. We investigate analytically the percolation properties of trust transitivity in random networks with arbitrary in/out-degree distributions, and compare with numerical realizations. We find that the existence of a non-zero fraction of absolute trust (i.e. entirely confident trust) is a requirement for the viability of global trust propagation in large systems: The average pair-wise trust is marked by a discontinuous transition at a specific fraction of absolute trust, below which it vanishes. Furthermore, we perform an extensive analysis of the Pretty Good Privacy (PGP) web of trust, in view of the concepts introduced. We compare different scenarios of trust distribution: community- and authority-centered. We find that these scenarios lead to sharply different patterns of trust propagation, due to the segregation of authority hubs and densely-connected communities. While the authority-centered scenario is more efficient, and leads to higher average trust values, it favours weakly-connected "fringe" nodes, which are directly trusted by authorities. The community-centered scheme, on the other hand, favours nodes with intermediate in/out-degrees, in detriment of the authorities and its "fringe" peers.

  18. Trust Transitivity in Social Networks

    PubMed Central

    Richters, Oliver; Peixoto, Tiago P.

    2011-01-01

    Non-centralized recommendation-based decision making is a central feature of several social and technological processes, such as market dynamics, peer-to-peer file-sharing and the web of trust of digital certification. We investigate the properties of trust propagation on networks, based on a simple metric of trust transitivity. We investigate analytically the percolation properties of trust transitivity in random networks with arbitrary in/out-degree distributions, and compare with numerical realizations. We find that the existence of a non-zero fraction of absolute trust (i.e. entirely confident trust) is a requirement for the viability of global trust propagation in large systems: The average pair-wise trust is marked by a discontinuous transition at a specific fraction of absolute trust, below which it vanishes. Furthermore, we perform an extensive analysis of the Pretty Good Privacy (PGP) web of trust, in view of the concepts introduced. We compare different scenarios of trust distribution: community- and authority-centered. We find that these scenarios lead to sharply different patterns of trust propagation, due to the segregation of authority hubs and densely-connected communities. While the authority-centered scenario is more efficient, and leads to higher average trust values, it favours weakly-connected “fringe” nodes, which are directly trusted by authorities. The community-centered scheme, on the other hand, favours nodes with intermediate in/out-degrees, in detriment of the authorities and its “fringe” peers. PMID:21483683

  19. Increasing interpersonal trust through divergent thinking.

    PubMed

    Sellaro, Roberta; Hommel, Bernhard; de Kwaadsteniet, Erik W; van de Groep, Suzanne; Colzato, Lorenza S

    2014-01-01

    Interpersonal trust is an essential ingredient of many social relationships but how stable is it actually, and how is it controlled? There is evidence that the degree of trust into others might be rather volatile and can be affected by manipulations like drawing attention to personal interdependence or independence. Here we investigated whether the degree of interpersonal trust can be biased by inducing either a more integrative or a more focused/exclusive cognitive control mode by means of a creativity task requiring divergent or convergent thinking, respectively. Participants then performed the trust game, which provides an index of interpersonal trust by assessing the money units one participant (the trustor) transfers to another (the trustee). As expected, trustors transferred significantly more money to trustees after engaging in divergent thinking as compared to convergent thinking. This observation provides support for the idea that interpersonal trust is controlled by domain-general (i.e., not socially dedicated) cognitive states.

  20. Bulimic symptoms and the social withdrawal syndrome.

    PubMed

    Rotenberg, Ken J; Bharathi, Carla; Davies, Helen; Finch, Tom

    2013-08-01

    One hundred and thirty-seven undergraduates (81 females; mean age = 21 years-10 months) completed the Bulimic SEDS subscale and standardized measures of trust beliefs in close others (mother, father, and friend), disclosure to them, and loneliness. Structural Equation Modelling yielded: (1) a negative path between Bulimic Symptoms and trust beliefs, (2) a positive path between trust beliefs and disclosure, (3) a negative path between trust beliefs and loneliness, and (4) a negative path between disclosure and loneliness. As expected, trust beliefs statistically mediated the relations between Bulimic Symptoms and both disclosure and loneliness and disclosure statistically mediated the relation between trust beliefs and loneliness. The findings supported the conclusion that individuals with bulimia nervosa are prone to the social withdrawal syndrome comprising a coherent and integrated pattern of low trust beliefs in close others, low disclosure to close others, and high loneliness. Copyright © 2013 Elsevier Ltd. All rights reserved.

  1. Increasing interpersonal trust through divergent thinking

    PubMed Central

    Sellaro, Roberta; Hommel, Bernhard; de Kwaadsteniet, Erik W.; van de Groep, Suzanne; Colzato, Lorenza S.

    2014-01-01

    Interpersonal trust is an essential ingredient of many social relationships but how stable is it actually, and how is it controlled? There is evidence that the degree of trust into others might be rather volatile and can be affected by manipulations like drawing attention to personal interdependence or independence. Here we investigated whether the degree of interpersonal trust can be biased by inducing either a more integrative or a more focused/exclusive cognitive control mode by means of a creativity task requiring divergent or convergent thinking, respectively. Participants then performed the trust game, which provides an index of interpersonal trust by assessing the money units one participant (the trustor) transfers to another (the trustee). As expected, trustors transferred significantly more money to trustees after engaging in divergent thinking as compared to convergent thinking. This observation provides support for the idea that interpersonal trust is controlled by domain-general (i.e., not socially dedicated) cognitive states. PMID:24936194

  2. Cambodian Parental Involvement: The Role of Parental Beliefs, Social Networks, and Trust

    ERIC Educational Resources Information Center

    Eng, Sothy; Szmodis, Whitney; Mulsow, Miriam

    2014-01-01

    The role of social capital (parental beliefs, social networks, and trust) as a predictor of parental involvement in Cambodian children's education was examined, controlling for human capital (family socioeconomic status). Parents of elementary students (n = 273) were interviewed face to face in Cambodia. Teacher contact scored highest, followed by…

  3. Social capital influence in illicit drug use among racial/ethnic groups in the United States.

    PubMed

    Reynoso-Vallejo, Humberto

    2011-01-01

    Data from the 2003 National Survey on Drug Use and Health was utilized to elucidate the relationship between individual-level social capital and illicit drug use among racial/ethnic groups. Analysis of variance indicated that Whites had different perceptions of social capital compared to other groups, in measures of social participation, neighborhood cohesion, trust, and norms of reciprocity. Logistic regression analysis showed that individual-level social capital, measured by trust and norms of reciprocity, was weakly associated with illicit drug use. However, individuals with higher social participation were less likely to have used illicit drugs ever or during the month prior to the interview. The association between social capital and illicit drug use is discussed, as well as the role of social participation in illicit drug use. Rather than an individual-level measure of social capital, future research should employ a neighborhood-level measure of social capital that aggregates neighborhood cohesion, trust, norms of reciprocity, and social participation. Copyright © Taylor & Francis Group, LLC

  4. The association between social capital measures and self-reported health among Muslim majority nations.

    PubMed

    Kim, Harris Hyun-soo

    2014-10-01

    Much evidence suggests that social capital (e.g. networks, trust, organizational memberships) has a significant effect on self-reported health. Previous research, however, has focused primarily on Western countries. The current research seeks to remedy this problem by investigating the association between multiple social capital indicators and subjective health in a novel empirical setting. The data come from the Comparative Values Survey of Islamic Countries (1999-2006) which consists of probabilistic samples from Muslim majority nations. Three-way multilevel analysis is used to examine the social determinants of health. Statistical results from hierarchical linear modeling shows that frequent contact with strong and intermediate ties (i.e. family members and friends, respectively) is significant, while interaction with weak ties (coworkers) has no association. General trust and trust in the central government are also significantly related to subjective health, as is trust in religious authority, albeit in an inverse way. This study calls for a more contingent view of the relationship between social capital and self-reported health. Future research needs to take this into consideration in hypothesizing and testing the potential health benefits of social capital.

  5. Promoting Trust in the Registered Nurse-Patient Relationship.

    PubMed

    Leslie, Jamie Lynn; Lonneman, William

    2016-01-01

    The establishment of trust in the registered nurse (RN)-patient relationship promotes patient engagement and improves the likelihood that the patient will be an active member of the patient care team. The purpose of this article is to examine nursing literature to identify the antecedents, attributes, and outcomes of trusting relationships between RNs and patients in home healthcare. Antecedents of trust for the RN-patient relationship included 1) meeting a need, 2) respect, 3) attention to time, 4) continuity of care, and 5) the initial visit. Attributes of trust between RN and patient in the home healthcare setting were identified as communication, connection, and reciprocity. For the RN and patient who established mutual trust, patients demonstrated better adaptation and collaboration for improvement of health, expressed a sense of security, and indicated a willingness to engage in additional trusting relationships. Barriers to a trusting relationship included a lack of respect and incompetent and/or unethical care.

  6. Effects of Direct Social Experience on Trust Decisions and Neural Reward Circuitry

    PubMed Central

    Fareri, Dominic S.; Chang, Luke J.; Delgado, Mauricio R.

    2012-01-01

    The human striatum is integral for reward-processing and supports learning by linking experienced outcomes with prior expectations. Recent endeavors implicate the striatum in processing outcomes of social interactions, such as social approval/rejection, as well as in learning reputations of others. Interestingly, social impressions often influence our behavior with others during interactions. Information about an interaction partner’s moral character acquired from biographical information hinders updating of expectations after interactions via top down modulation of reward circuitry. An outstanding question is whether initial impressions formed through experience similarly modulate the ability to update social impressions at the behavioral and neural level. We investigated the role of experienced social information on trust behavior and reward-related BOLD activity. Participants played a computerized ball-tossing game with three fictional partners manipulated to be perceived as good, bad, or neutral. Participants then played an iterated trust game as investors with these same partners while undergoing fMRI. Unbeknownst to participants, partner behavior in the trust game was random and unrelated to their ball-tossing behavior. Participants’ trust decisions were influenced by their prior experience in the ball-tossing game, investing less often with the bad partner compared to the good and neutral. Reinforcement learning models revealed that participants were more sensitive to updating their beliefs about good and bad partners when experiencing outcomes consistent with initial experience. Increased striatal and anterior cingulate BOLD activity for positive versus negative trust game outcomes emerged, which further correlated with model-derived prediction error learning signals. These results suggest that initial impressions formed from direct social experience can be continually shaped by consistent information through reward learning mechanisms. PMID:23087604

  7. Trust and Reputation Management for Critical Infrastructure Protection

    NASA Astrophysics Data System (ADS)

    Caldeira, Filipe; Monteiro, Edmundo; Simões, Paulo

    Today's Critical Infrastructures (CI) depend of Information and Communication Technologies (ICT) to deliver their services with the required level of quality and availability. ICT security plays a major role in CI protection and risk prevention for single and also for interconnected CIs were cascading effects might occur because of the interdependencies that exist among different CIs. This paper addresses the problem of ICT security in interconnected CIs. Trust and reputation management using the Policy Based Management paradigm is the proposed solution to be applied at the CI interconnection points for information exchange. The proposed solution is being applied to the Security Mediation Gateway being developed in the European FP7 MICIE project, to allow for information exchange among interconnected CIs.

  8. How community trust was gained by an NGO in Malawi, Central Africa, to mitigate the impact of HIV/AIDS.

    PubMed

    MacIntyre, Linda M; Waters, Catherine M; Rankin, Sally H; Schell, Ellen; Laviwa, Jones; Luhanga, Melton Richard

    2013-07-01

    Trust is valuable social capital that is essential for effective partnerships to improve a community's health. Yet, how to establish trust in culturally diverse communities is elusive for many researchers, practitioners, and agencies. The purpose of this qualitative study was to obtain perspectives of individuals working for a nongovernmental organization (NGO) about gaining community trust in Malawi in order to mitigate the impact of HIV/AIDS. Twenty-six interviews were conducted over 12 months. Content analysis revealed the relationship between NGO staff and the community is crucial to gaining community trust. Gender, social context, and religious factors influence the establishment of trust within the relationship, but NGO assumptions about the community can erode community trust. Nurses and other health professionals working with the NGOs can help create conditions to build trust in an ethically and culturally sensitive manner whereby communities can develop processes to address their own health concerns.

  9. Reputation offsets trust judgments based on social biases among Airbnb users.

    PubMed

    Abrahao, Bruno; Parigi, Paolo; Gupta, Alok; Cook, Karen S

    2017-09-12

    To provide social exchange on a global level, sharing-economy companies leverage interpersonal trust between their members on a scale unimaginable even a few years ago. A challenge to this mission is the presence of social biases among a large heterogeneous and independent population of users, a factor that hinders the growth of these services. We investigate whether and to what extent a sharing-economy platform can design artificially engineered features, such as reputation systems, to override people's natural tendency to base judgments of trustworthiness on social biases. We focus on the common tendency to trust others who are similar (i.e., homophily) as a source of bias. We test this argument through an online experiment with 8,906 users of Airbnb, a leading hospitality company in the sharing economy. The experiment is based on an interpersonal investment game, in which we vary the characteristics of recipients to study trust through the interplay between homophily and reputation. Our findings show that reputation systems can significantly increase the trust between dissimilar users and that risk aversion has an inverse relationship with trust given high reputation. We also present evidence that our experimental findings are confirmed by analyses of 1 million actual hospitality interactions among users of Airbnb.

  10. Reputation offsets trust judgments based on social biases among Airbnb users

    PubMed Central

    Abrahao, Bruno; Parigi, Paolo; Gupta, Alok; Cook, Karen S.

    2017-01-01

    To provide social exchange on a global level, sharing-economy companies leverage interpersonal trust between their members on a scale unimaginable even a few years ago. A challenge to this mission is the presence of social biases among a large heterogeneous and independent population of users, a factor that hinders the growth of these services. We investigate whether and to what extent a sharing-economy platform can design artificially engineered features, such as reputation systems, to override people’s natural tendency to base judgments of trustworthiness on social biases. We focus on the common tendency to trust others who are similar (i.e., homophily) as a source of bias. We test this argument through an online experiment with 8,906 users of Airbnb, a leading hospitality company in the sharing economy. The experiment is based on an interpersonal investment game, in which we vary the characteristics of recipients to study trust through the interplay between homophily and reputation. Our findings show that reputation systems can significantly increase the trust between dissimilar users and that risk aversion has an inverse relationship with trust given high reputation. We also present evidence that our experimental findings are confirmed by analyses of 1 million actual hospitality interactions among users of Airbnb. PMID:28847948

  11. Social Networking Sites: College Students' Patterns of Use and Concerns for Privacy and Trust by Gender, Ethnicity, and Employment Status

    ERIC Educational Resources Information Center

    Kyei-Blankson, Lydia; Iyer, Kamakshi S.; Subramanian, Lavanya

    2016-01-01

    Social Networking Sites (SNSs) are web-based facilities that allow for social interaction, sharing, communication and collaboration in today's world. In the current study, patterns of use of social media among students at a public Midwestern university are examined. In addition, students were surveyed regarding concerns for privacy and trust and…

  12. Wider-community Segregation and the Effect of Neighbourhood Ethnic Diversity on Social Capital: An Investigation into Intra-Neighbourhood Trust in Great Britain and London

    PubMed Central

    Laurence, James

    2016-01-01

    Extensive research has demonstrated that neighbourhood ethnic diversity is negatively associated with intra-neighbourhood social capital. This study explores the role of segregation and integration in this relationship. To do so it applies three-level hierarchical linear models to two sets of data from across Great Britain and within London, and examines how segregation across the wider-community in which a neighbourhood is nested impacts trust amongst neighbours. This study replicates the increasingly ubiquitous finding that neighbourhood diversity is negatively associated with neighbour-trust. However, we demonstrate that this relationship is highly dependent on the level of segregation across the wider-community in which a neighbourhood is nested. Increasing neighbourhood diversity only negatively impacts neighbour-trust when nested in more segregated wider-communities. Individuals living in diverse neighbourhoods nested within integrated wider-communities experience no trust-penalty. These findings show that segregation plays a critical role in the neighbourhood diversity/trust relationship, and that its absence from the literature biases our understanding of how ethnic diversity affects social cohesion. PMID:28989199

  13. Wider-community Segregation and the Effect of Neighbourhood Ethnic Diversity on Social Capital: An Investigation into Intra-Neighbourhood Trust in Great Britain and London.

    PubMed

    Laurence, James

    2017-10-01

    Extensive research has demonstrated that neighbourhood ethnic diversity is negatively associated with intra-neighbourhood social capital. This study explores the role of segregation and integration in this relationship. To do so it applies three-level hierarchical linear models to two sets of data from across Great Britain and within London, and examines how segregation across the wider-community in which a neighbourhood is nested impacts trust amongst neighbours. This study replicates the increasingly ubiquitous finding that neighbourhood diversity is negatively associated with neighbour-trust. However, we demonstrate that this relationship is highly dependent on the level of segregation across the wider-community in which a neighbourhood is nested. Increasing neighbourhood diversity only negatively impacts neighbour-trust when nested in more segregated wider-communities. Individuals living in diverse neighbourhoods nested within integrated wider-communities experience no trust-penalty. These findings show that segregation plays a critical role in the neighbourhood diversity/trust relationship, and that its absence from the literature biases our understanding of how ethnic diversity affects social cohesion.

  14. 78 FR 20149 - Sage Quant Management LLC, et al.; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-03

    ... Quant Management LLC, et al.; Notice of Application March 28, 2013. AGENCY: Securities and Exchange...)(1)(A) and 12(d)(1)(B) of the Act. Applicants: Sage Quant Management LLC (``Adviser''), and Sage Quant ETF Trust (``Trust'') and ETF Distributors LLC. SUMMARY: Summary of Application: Applicants...

  15. 75 FR 69486 - Self-Regulatory Organizations; The Depository Trust Company; Notice of Filing and Immediate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-12

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63208A; File No. SR-DTC-2010-13] Self-Regulatory Organizations; The Depository Trust Company; Notice of Filing and Immediate Effectiveness of Proposed Rule Change To Implement a Disincentive Fee Associated With the Deposit Automation Management...

  16. 78 FR 17240 - Krane Funds Advisors LLC., et al.; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-20

    ... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 30425; 812-13989] Krane... Investment Company Act of 1940 (``Act'') for an exemption from sections 2(a)(32), 5(a)(1), 22(d) and 22(e) of... Trust (``Trust'') and SEI Investments Distribution Company (``Distributor''). SUMMARY: Summary of...

  17. Discovering and Mitigating Software Vulnerabilities through Large-Scale Collaboration

    ERIC Educational Resources Information Center

    Zhao, Mingyi

    2016-01-01

    In today's rapidly digitizing society, people place their trust in a wide range of digital services and systems that deliver latest news, process financial transactions, store sensitive information, etc. However, this trust does not have a solid foundation, because software code that supports this digital world has security vulnerabilities. These…

  18. Water security - Nation state and international security implications

    USGS Publications Warehouse

    Tindall, James A.; Andrew A. Campbell,

    2009-01-01

    A terrorist attack such as poisoning and sabotage of the national water supply and water-quality infrastructure of the continental United States or any country, could disrupt the delivery of vital human services, threaten both public health and the environment, potentially cause mass casualties and pose grave public concern for homeland security. Most significantly, an attack on water resources would weaken social cohesion and trust in government. A threat to continuity of services is a potential threat to continuity of government since both are necessary for continuity of operations. Water infrastructure is difficult to protect, as it extends over vast areas across the U.S. and for which ownership is overwhelmingly nonfederal (approximately 85 percent). Since the 9111 attacks, federal dam operators and water and wastewater utilities have established counter measures. Similar measures have been taken in countries around the world. These include enhanced physical security, improved coordination between corporate ownership, Department of Homeland Security, and local law enforcement, and research into risk assessment and vulnerability analysis to ensure greater system safety. A key issue is the proportionate additional resources directed at public and private sector specific priorities. Agencies that have the scientific and technological ability to leverage resources, exploit integrated science approaches, focus on interdisciplinary practices, utilize informatics expertise and employ a wide use of evolving technologies should play a key role in water security and related issues.

  19. The impact of social deprivation on paranoia, hallucinations, mania and depression: the role of discrimination social support, stress and trust.

    PubMed

    Wickham, Sophie; Taylor, Peter; Shevlin, Mark; Bentall, Richard P

    2014-01-01

    The negative implications of living in a socially unequal society are now well documented. However, there is poor understanding of the pathways from specific environmental risk to symptoms. Here we examine the associations between social deprivation, depression, and psychotic symptoms using the 2007 Adult Psychiatric Morbidity Survey, a cross-sectional dataset including 7,353 individuals. In addition we looked at the mediating role of stress, discrimination, trust and lack of social support. We found that the participants' neighbourhood index of multiple deprivation (IMD) significantly predicted psychosis and depression. On inspection of specific psychotic symptoms, IMD predicted paranoia, but not hallucinations or hypomania. Stress and trust partially mediated the relationship between IMD and paranoid ideation. Stress, trust and a lack of social support fully mediated the relationship between IMD and depression. Future research should focus on the role deprivation and social inequalities plays in specific manifestations of psychopathology and investigate mechanisms to explain those associations that occur. Targeting the mediating mechanisms through appropriate psychological intervention may go some way to dampen the negative consequences of living in an unjust society; ameliorating economic injustice may improve population mental health.

  20. The Impact of Social Deprivation on Paranoia, Hallucinations, Mania and Depression: The Role of Discrimination Social Support, Stress and Trust

    PubMed Central

    Wickham, Sophie; Taylor, Peter; Shevlin, Mark; Bentall, Richard P.

    2014-01-01

    The negative implications of living in a socially unequal society are now well documented. However, there is poor understanding of the pathways from specific environmental risk to symptoms. Here we examine the associations between social deprivation, depression, and psychotic symptoms using the 2007 Adult Psychiatric Morbidity Survey, a cross-sectional dataset including 7,353 individuals. In addition we looked at the mediating role of stress, discrimination, trust and lack of social support. We found that the participants' neighbourhood index of multiple deprivation (IMD) significantly predicted psychosis and depression. On inspection of specific psychotic symptoms, IMD predicted paranoia, but not hallucinations or hypomania. Stress and trust partially mediated the relationship between IMD and paranoid ideation. Stress, trust and a lack of social support fully mediated the relationship between IMD and depression. Future research should focus on the role deprivation and social inequalities plays in specific manifestations of psychopathology and investigate mechanisms to explain those associations that occur. Targeting the mediating mechanisms through appropriate psychological intervention may go some way to dampen the negative consequences of living in an unjust society; ameliorating economic injustice may improve population mental health. PMID:25162703

Top