Situation awareness and trust in computer-based procedures in nuclear power plant operations
DOE Office of Scientific and Technical Information (OSTI.GOV)
Throneburg, E. B.; Jones, J. M.
2006-07-01
Situation awareness and trust are two issues that need to be addressed in the design of computer-based procedures for nuclear power plants. Situation awareness, in relation to computer-based procedures, concerns the operators' knowledge of the plant's state while following the procedures. Trust concerns the amount of faith that the operators put into the automated procedures, which can affect situation awareness. This paper first discusses the advantages and disadvantages of computer-based procedures. It then discusses the known aspects of situation awareness and trust as applied to computer-based procedures in nuclear power plants. An outline of a proposed experiment is then presentedmore » that includes methods of measuring situation awareness and trust so that these aspects can be analyzed for further study. (authors)« less
Trust models in ubiquitous computing.
Krukow, Karl; Nielsen, Mogens; Sassone, Vladimiro
2008-10-28
We recapture some of the arguments for trust-based technologies in ubiquitous computing, followed by a brief survey of some of the models of trust that have been introduced in this respect. Based on this, we argue for the need of more formal and foundational trust models.
DualTrust: A Trust Management Model for Swarm-Based Autonomic Computing Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Maiden, Wendy M.
Trust management techniques must be adapted to the unique needs of the application architectures and problem domains to which they are applied. For autonomic computing systems that utilize mobile agents and ant colony algorithms for their sensor layer, certain characteristics of the mobile agent ant swarm -- their lightweight, ephemeral nature and indirect communication -- make this adaptation especially challenging. This thesis looks at the trust issues and opportunities in swarm-based autonomic computing systems and finds that by monitoring the trustworthiness of the autonomic managers rather than the swarming sensors, the trust management problem becomes much more scalable and stillmore » serves to protect the swarm. After analyzing the applicability of trust management research as it has been applied to architectures with similar characteristics, this thesis specifies the required characteristics for trust management mechanisms used to monitor the trustworthiness of entities in a swarm-based autonomic computing system and describes a trust model that meets these requirements.« less
Trusted Computing Technologies, Intel Trusted Execution Technology.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Guise, Max Joseph; Wendt, Jeremy Daniel
2011-01-01
We describe the current state-of-the-art in Trusted Computing Technologies - focusing mainly on Intel's Trusted Execution Technology (TXT). This document is based on existing documentation and tests of two existing TXT-based systems: Intel's Trusted Boot and Invisible Things Lab's Qubes OS. We describe what features are lacking in current implementations, describe what a mature system could provide, and present a list of developments to watch. Critical systems perform operation-critical computations on high importance data. In such systems, the inputs, computation steps, and outputs may be highly sensitive. Sensitive components must be protected from both unauthorized release, and unauthorized alteration: Unauthorizedmore » users should not access the sensitive input and sensitive output data, nor be able to alter them; the computation contains intermediate data with the same requirements, and executes algorithms that the unauthorized should not be able to know or alter. Due to various system requirements, such critical systems are frequently built from commercial hardware, employ commercial software, and require network access. These hardware, software, and network system components increase the risk that sensitive input data, computation, and output data may be compromised.« less
Trust Management in Swarm-Based Autonomic Computing Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Maiden, Wendy M.; Haack, Jereme N.; Fink, Glenn A.
2009-07-07
Reputation-based trust management techniques can address issues such as insider threat as well as quality of service issues that may be malicious in nature. However, trust management techniques must be adapted to the unique needs of the architectures and problem domains to which they are applied. Certain characteristics of swarms such as their lightweight ephemeral nature and indirect communication make this adaptation especially challenging. In this paper we look at the trust issues and opportunities in mobile agent swarm-based autonomic systems and find that by monitoring the trustworthiness of the autonomic managers rather than the swarming sensors, the trust managementmore » problem becomes much more scalable and still serves to protect the swarms. We also analyze the applicability of trust management research as it has been applied to architectures with similar characteristics. Finally, we specify required characteristics for trust management mechanisms to be used to monitor the trustworthiness of the entities in a swarm-based autonomic computing system.« less
On Trust Evaluation in Mobile Ad Hoc Networks
NASA Astrophysics Data System (ADS)
Nguyen, Dang Quan; Lamont, Louise; Mason, Peter C.
Trust has been considered as a social relationship between two individuals in human society. But, as computer science and networking have succeeded in using computers to automate many tasks, the concept of trust can be generalized to cover the reliability and relationships of non-human interaction, such as, for example, information gathering and data routing. This paper investigates the evaluation of trust in the context of ad hoc networks. Nodes evaluate each other’s behaviour based on observables. A node then decides whether to trust another node to have certain innate abilities. We show how accurate such an evaluation could be. We also provide the minimum number of observations required to obtain an accurate evaluation, a result that indicates that observation-based trust in ad hoc networks will remain a challenging problem. The impact of making networking decisions using trust evaluation on the network connectivity is also examined. In this manner, quantitative decisions can be made concerning trust-based routing with the knowledge of the potential impact on connectivity.
Self-Organized Service Negotiation for Collaborative Decision Making
Zhang, Bo; Zheng, Ziming
2014-01-01
This paper proposes a self-organized service negotiation method for CDM in intelligent and automatic manners. It mainly includes three phases: semantic-based capacity evaluation for the CDM sponsor, trust computation of the CDM organization, and negotiation selection of the decision-making service provider (DMSP). In the first phase, the CDM sponsor produces the formal semantic description of the complex decision task for DMSP and computes the capacity evaluation values according to participator instructions from different DMSPs. In the second phase, a novel trust computation approach is presented to compute the subjective belief value, the objective reputation value, and the recommended trust value. And in the third phase, based on the capacity evaluation and trust computation, a negotiation mechanism is given to efficiently implement the service selection. The simulation experiment results show that our self-organized service negotiation method is feasible and effective for CDM. PMID:25243228
Self-organized service negotiation for collaborative decision making.
Zhang, Bo; Huang, Zhenhua; Zheng, Ziming
2014-01-01
This paper proposes a self-organized service negotiation method for CDM in intelligent and automatic manners. It mainly includes three phases: semantic-based capacity evaluation for the CDM sponsor, trust computation of the CDM organization, and negotiation selection of the decision-making service provider (DMSP). In the first phase, the CDM sponsor produces the formal semantic description of the complex decision task for DMSP and computes the capacity evaluation values according to participator instructions from different DMSPs. In the second phase, a novel trust computation approach is presented to compute the subjective belief value, the objective reputation value, and the recommended trust value. And in the third phase, based on the capacity evaluation and trust computation, a negotiation mechanism is given to efficiently implement the service selection. The simulation experiment results show that our self-organized service negotiation method is feasible and effective for CDM.
Self-adaptive trust based ABR protocol for MANETs using Q-learning.
Kumar, Anitha Vijaya; Jeyapal, Akilandeswari
2014-01-01
Mobile ad hoc networks (MANETs) are a collection of mobile nodes with a dynamic topology. MANETs work under scalable conditions for many applications and pose different security challenges. Due to the nomadic nature of nodes, detecting misbehaviour is a complex problem. Nodes also share routing information among the neighbours in order to find the route to the destination. This requires nodes to trust each other. Thus we can state that trust is a key concept in secure routing mechanisms. A number of cryptographic protection techniques based on trust have been proposed. Q-learning is a recently used technique, to achieve adaptive trust in MANETs. In comparison to other machine learning computational intelligence techniques, Q-learning achieves optimal results. Our work focuses on computing a score using Q-learning to weigh the trust of a particular node over associativity based routing (ABR) protocol. Thus secure and stable route is calculated as a weighted average of the trust value of the nodes in the route and associativity ticks ensure the stability of the route. Simulation results show that Q-learning based trust ABR protocol improves packet delivery ratio by 27% and reduces the route selection time by 40% over ABR protocol without trust calculation.
Self-Adaptive Trust Based ABR Protocol for MANETs Using Q-Learning
Jeyapal, Akilandeswari
2014-01-01
Mobile ad hoc networks (MANETs) are a collection of mobile nodes with a dynamic topology. MANETs work under scalable conditions for many applications and pose different security challenges. Due to the nomadic nature of nodes, detecting misbehaviour is a complex problem. Nodes also share routing information among the neighbours in order to find the route to the destination. This requires nodes to trust each other. Thus we can state that trust is a key concept in secure routing mechanisms. A number of cryptographic protection techniques based on trust have been proposed. Q-learning is a recently used technique, to achieve adaptive trust in MANETs. In comparison to other machine learning computational intelligence techniques, Q-learning achieves optimal results. Our work focuses on computing a score using Q-learning to weigh the trust of a particular node over associativity based routing (ABR) protocol. Thus secure and stable route is calculated as a weighted average of the trust value of the nodes in the route and associativity ticks ensure the stability of the route. Simulation results show that Q-learning based trust ABR protocol improves packet delivery ratio by 27% and reduces the route selection time by 40% over ABR protocol without trust calculation. PMID:25254243
BIOS Security Analysis and a Kind of Trusted BIOS
NASA Astrophysics Data System (ADS)
Zhou, Zhenliu; Xu, Rongsheng
The BIOS's security threats to computer system are analyzed and security requirements for firmware BIOS are summarized in this paper. Through discussion about TCG's trust transitivity, a new approach about CRTM implementation based on BIOS is developed. In this paper, we also put forward a new trusted BIOS architecture-UTBIOS which is built on Intel Framework for EFI/UEFI. The trustworthiness of UTBIOS is based on trusted hardware TPM. In UTBIOS, trust encapsulation and trust measurement are used to construct pre-OS trust chain. Performance of trust measurement is also analyzed in the end.
Trusted computing strengthens cloud authentication.
Ghazizadeh, Eghbal; Zamani, Mazdak; Ab Manan, Jamalul-lail; Alizadeh, Mojtaba
2014-01-01
Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM). Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM) are great technologies for solving the trust and security concerns in the cloud identity environment. Single sign-on (SSO) and OpenID have been released to solve security and privacy problems for cloud identity. This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in .Net environment. Security analyzing, simulation, and BLP confidential model are three ways to evaluate and analyze our proposed model.
Trusted Computing Strengthens Cloud Authentication
2014-01-01
Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM). Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM) are great technologies for solving the trust and security concerns in the cloud identity environment. Single sign-on (SSO) and OpenID have been released to solve security and privacy problems for cloud identity. This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in .Net environment. Security analyzing, simulation, and BLP confidential model are three ways to evaluate and analyze our proposed model. PMID:24701149
Trusted measurement model based on multitenant behaviors.
Ning, Zhen-Hu; Shen, Chang-Xiang; Zhao, Yong; Liang, Peng
2014-01-01
With a fast growing pervasive computing, especially cloud computing, the behaviour measurement is at the core and plays a vital role. A new behaviour measurement tailored for Multitenants in cloud computing is needed urgently to fundamentally establish trust relationship. Based on our previous research, we propose an improved trust relationship scheme which captures the world of cloud computing where multitenants share the same physical computing platform. Here, we first present the related work on multitenant behaviour; secondly, we give the scheme of behaviour measurement where decoupling of multitenants is taken into account; thirdly, we explicitly explain our decoupling algorithm for multitenants; fourthly, we introduce a new way of similarity calculation for deviation control, which fits the coupled multitenants under study well; lastly, we design the experiments to test our scheme.
Trusted Measurement Model Based on Multitenant Behaviors
Ning, Zhen-Hu; Shen, Chang-Xiang; Zhao, Yong; Liang, Peng
2014-01-01
With a fast growing pervasive computing, especially cloud computing, the behaviour measurement is at the core and plays a vital role. A new behaviour measurement tailored for Multitenants in cloud computing is needed urgently to fundamentally establish trust relationship. Based on our previous research, we propose an improved trust relationship scheme which captures the world of cloud computing where multitenants share the same physical computing platform. Here, we first present the related work on multitenant behaviour; secondly, we give the scheme of behaviour measurement where decoupling of multitenants is taken into account; thirdly, we explicitly explain our decoupling algorithm for multitenants; fourthly, we introduce a new way of similarity calculation for deviation control, which fits the coupled multitenants under study well; lastly, we design the experiments to test our scheme. PMID:24987731
Computationally modeling interpersonal trust.
Lee, Jin Joo; Knox, W Bradley; Wormwood, Jolie B; Breazeal, Cynthia; Desteno, David
2013-01-01
We present a computational model capable of predicting-above human accuracy-the degree of trust a person has toward their novel partner by observing the trust-related nonverbal cues expressed in their social interaction. We summarize our prior work, in which we identify nonverbal cues that signal untrustworthy behavior and also demonstrate the human mind's readiness to interpret those cues to assess the trustworthiness of a social robot. We demonstrate that domain knowledge gained from our prior work using human-subjects experiments, when incorporated into the feature engineering process, permits a computational model to outperform both human predictions and a baseline model built in naiveté of this domain knowledge. We then present the construction of hidden Markov models to investigate temporal relationships among the trust-related nonverbal cues. By interpreting the resulting learned structure, we observe that models built to emulate different levels of trust exhibit different sequences of nonverbal cues. From this observation, we derived sequence-based temporal features that further improve the accuracy of our computational model. Our multi-step research process presented in this paper combines the strength of experimental manipulation and machine learning to not only design a computational trust model but also to further our understanding of the dynamics of interpersonal trust.
A Unified Theory of Trust and Collaboration
NASA Astrophysics Data System (ADS)
Cai, Guoray; Squicciarini, Anna
We consider a type of applications where collaboration and trust are tightly coupled with the need to protect sensitive information. Existing trust management technologies have been limited to offering generic mechanisms for enforcing access control policies based on exchanged credentials, and rarely deal with the situated meaning of trust in a specific collaborative context. Towards trust management for highly dynamic and collaborative activities, this paper describes a theory of trust intention and semantics that makes explicit connections between collaborative activities and trust. The model supports inferring trust state based on knowledge about state of collaborative activity. It is the first step towards a unified approach for computer-mediated trust communication in the context of collaborative work.
A Belief-based Trust Model for Dynamic Service Selection
NASA Astrophysics Data System (ADS)
Ali, Ali Shaikh; Rana, Omer F.
Provision of services across institutional boundaries has become an active research area. Many such services encode access to computational and data resources (comprising single machines to computational clusters). Such services can also be informational, and integrate different resources within an institution. Consequently, we envision a service rich environment in the future, where service consumers can intelligently decide between which services to select. If interaction between service providers/users is automated, it is necessary for these service clients to be able to automatically chose between a set of equivalent (or similar) services. In such a scenario trust serves as a benchmark to differentiate between service providers. One might therefore prioritize potential cooperative partners based on the established trust. Although many approaches exist in literature about trust between online communities, the exact nature of trust for multi-institutional service sharing remains undefined. Therefore, the concept of trust suffers from an imperfect understanding, a plethora of definitions, and informal use in the literature. We present a formalism for describing trust within multi-institutional service sharing, and provide an implementation of this; enabling the agent to make trust-based decision. We evaluate our formalism through simulation.
DualTrust: A Distributed Trust Model for Swarm-Based Autonomic Computing Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Maiden, Wendy M.; Dionysiou, Ioanna; Frincke, Deborah A.
2011-02-01
For autonomic computing systems that utilize mobile agents and ant colony algorithms for their sensor layer, trust management is important for the acceptance of the mobile agent sensors and to protect the system from malicious behavior by insiders and entities that have penetrated network defenses. This paper examines the trust relationships, evidence, and decisions in a representative system and finds that by monitoring the trustworthiness of the autonomic managers rather than the swarming sensors, the trust management problem becomes much more scalable and still serves to protect the swarm. We then propose the DualTrust conceptual trust model. By addressing themore » autonomic manager’s bi-directional primary relationships in the ACS architecture, DualTrust is able to monitor the trustworthiness of the autonomic managers, protect the sensor swarm in a scalable manner, and provide global trust awareness for the orchestrating autonomic manager.« less
Trust-Enhanced Cloud Service Selection Model Based on QoS Analysis.
Pan, Yuchen; Ding, Shuai; Fan, Wenjuan; Li, Jing; Yang, Shanlin
2015-01-01
Cloud computing technology plays a very important role in many areas, such as in the construction and development of the smart city. Meanwhile, numerous cloud services appear on the cloud-based platform. Therefore how to how to select trustworthy cloud services remains a significant problem in such platforms, and extensively investigated owing to the ever-growing needs of users. However, trust relationship in social network has not been taken into account in existing methods of cloud service selection and recommendation. In this paper, we propose a cloud service selection model based on the trust-enhanced similarity. Firstly, the direct, indirect, and hybrid trust degrees are measured based on the interaction frequencies among users. Secondly, we estimate the overall similarity by combining the experience usability measured based on Jaccard's Coefficient and the numerical distance computed by Pearson Correlation Coefficient. Then through using the trust degree to modify the basic similarity, we obtain a trust-enhanced similarity. Finally, we utilize the trust-enhanced similarity to find similar trusted neighbors and predict the missing QoS values as the basis of cloud service selection and recommendation. The experimental results show that our approach is able to obtain optimal results via adjusting parameters and exhibits high effectiveness. The cloud services ranking by our model also have better QoS properties than other methods in the comparison experiments.
Trust-Enhanced Cloud Service Selection Model Based on QoS Analysis
Pan, Yuchen; Ding, Shuai; Fan, Wenjuan; Li, Jing; Yang, Shanlin
2015-01-01
Cloud computing technology plays a very important role in many areas, such as in the construction and development of the smart city. Meanwhile, numerous cloud services appear on the cloud-based platform. Therefore how to how to select trustworthy cloud services remains a significant problem in such platforms, and extensively investigated owing to the ever-growing needs of users. However, trust relationship in social network has not been taken into account in existing methods of cloud service selection and recommendation. In this paper, we propose a cloud service selection model based on the trust-enhanced similarity. Firstly, the direct, indirect, and hybrid trust degrees are measured based on the interaction frequencies among users. Secondly, we estimate the overall similarity by combining the experience usability measured based on Jaccard’s Coefficient and the numerical distance computed by Pearson Correlation Coefficient. Then through using the trust degree to modify the basic similarity, we obtain a trust-enhanced similarity. Finally, we utilize the trust-enhanced similarity to find similar trusted neighbors and predict the missing QoS values as the basis of cloud service selection and recommendation. The experimental results show that our approach is able to obtain optimal results via adjusting parameters and exhibits high effectiveness. The cloud services ranking by our model also have better QoS properties than other methods in the comparison experiments. PMID:26606388
Self-guaranteed measurement-based quantum computation
NASA Astrophysics Data System (ADS)
Hayashi, Masahito; Hajdušek, Michal
2018-05-01
In order to guarantee the output of a quantum computation, we usually assume that the component devices are trusted. However, when the total computation process is large, it is not easy to guarantee the whole system when we have scaling effects, unexpected noise, or unaccounted for correlations between several subsystems. If we do not trust the measurement basis or the prepared entangled state, we do need to be worried about such uncertainties. To this end, we propose a self-guaranteed protocol for verification of quantum computation under the scheme of measurement-based quantum computation where no prior-trusted devices (measurement basis or entangled state) are needed. The approach we present enables the implementation of verifiable quantum computation using the measurement-based model in the context of a particular instance of delegated quantum computation where the server prepares the initial computational resource and sends it to the client, who drives the computation by single-qubit measurements. Applying self-testing procedures, we are able to verify the initial resource as well as the operation of the quantum devices and hence the computation itself. The overhead of our protocol scales with the size of the initial resource state to the power of 4 times the natural logarithm of the initial state's size.
Analysis on trust influencing factors and trust model from multiple perspectives of online Auction
NASA Astrophysics Data System (ADS)
Yu, Wang
2017-10-01
Current reputation models lack the research on online auction trading completely so they cannot entirely reflect the reputation status of users and may cause problems on operability. To evaluate the user trust in online auction correctly, a trust computing model based on multiple influencing factors is established. It aims at overcoming the efficiency of current trust computing methods and the limitations of traditional theoretical trust models. The improved model comprehensively considers the trust degree evaluation factors of three types of participants according to different participation modes of online auctioneers, to improve the accuracy, effectiveness and robustness of the trust degree. The experiments test the efficiency and the performance of our model under different scale of malicious user, under environment like eBay and Sporas model. The experimental results analysis show the model proposed in this paper makes up the deficiency of existing model and it also has better feasibility.
Li, Pengli; Zhang, Chunhua; Yi, Li
2016-07-01
The current study examined how children with Autism Spectrum Disorders (ASD) could selectively trust others based on three facial cues: the face race, attractiveness, and trustworthiness. In a computer-based hide-and-seek game, two face images, which differed significantly in one of the three facial cues, were presented as two cues for selective trust. Children had to selectively trust the own-race, attractive and trustworthy faces to get the prize. Our findings demonstrate an intact ability of selective trust based on face appearance in ASD compared to typical children: they could selectively trust the informant based on face race and attractiveness. Our results imply that despite their face recognition deficits, children with ASD are still sensitive to some aspects of face appearance.
Study on Cloud Security Based on Trust Spanning Tree Protocol
NASA Astrophysics Data System (ADS)
Lai, Yingxu; Liu, Zenghui; Pan, Qiuyue; Liu, Jing
2015-09-01
Attacks executed on Spanning Tree Protocol (STP) expose the weakness of link layer protocols and put the higher layers in jeopardy. Although the problems have been studied for many years and various solutions have been proposed, many security issues remain. To enhance the security and credibility of layer-2 network, we propose a trust-based spanning tree protocol aiming at achieving a higher credibility of LAN switch with a simple and lightweight authentication mechanism. If correctly implemented in each trusted switch, the authentication of trust-based STP can guarantee the credibility of topology information that is announced to other switch in the LAN. To verify the enforcement of the trusted protocol, we present a new trust evaluation method of the STP using a specification-based state model. We implement a prototype of trust-based STP to investigate its practicality. Experiment shows that the trusted protocol can achieve security goals and effectively avoid STP attacks with a lower computation overhead and good convergence performance.
A Trusted Portable Computing Device
NASA Astrophysics Data System (ADS)
Ming-wei, Fang; Jun-jun, Wu; Peng-fei, Yu; Xin-fang, Zhang
A trusted portable computing device and its security mechanism were presented to solve the security issues, such as the attack of virus and Trojan horse, the lost and stolen of storage device, in mobile office. It used smart card to build a trusted portable security base, virtualization to create a secure virtual execution environment, two-factor authentication mechanism to identify legitimate users, and dynamic encryption to protect data privacy. The security environment described in this paper is characteristic of portability, security and reliability. It can meet the security requirement of mobile office.
Quantum key distribution using card, base station and trusted authority
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nordholt, Jane E.; Hughes, Richard John; Newell, Raymond Thorson
Techniques and tools for quantum key distribution ("QKD") between a quantum communication ("QC") card, base station and trusted authority are described herein. In example implementations, a QC card contains a miniaturized QC transmitter and couples with a base station. The base station provides a network connection with the trusted authority and can also provide electric power to the QC card. When coupled to the base station, after authentication by the trusted authority, the QC card acquires keys through QKD with a trust authority. The keys can be used to set up secure communication, for authentication, for access control, or formore » other purposes. The QC card can be implemented as part of a smart phone or other mobile computing device, or the QC card can be used as a fillgun for distribution of the keys.« less
Quantum key distribution using card, base station and trusted authority
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nordholt, Jane Elizabeth; Hughes, Richard John; Newell, Raymond Thorson
Techniques and tools for quantum key distribution ("QKD") between a quantum communication ("QC") card, base station and trusted authority are described herein. In example implementations, a QC card contains a miniaturized QC transmitter and couples with a base station. The base station provides a network connection with the trusted authority and can also provide electric power to the QC card. When coupled to the base station, after authentication by the trusted authority, the QC card acquires keys through QKD with a trusted authority. The keys can be used to set up secure communication, for authentication, for access control, or formore » other purposes. The QC card can be implemented as part of a smart phone or other mobile computing device, or the QC card can be used as a fillgun for distribution of the keys.« less
Andrewes, Holly; Kenicer, David; McClay, Carrie-Anne; Williams, Christopher
2013-01-01
Objective This study aimed to identify if patients have adequate access to Computerised Cognitive Behavioural Therapy (cCBT) programmes in all mental health trusts across England. Design The primary researcher contacted a targeted sample of information technology (IT) leads in each mental health trust in England to complete the survey. Setting Telephone, email and postal mail were used to contact an IT lead or nominated expert from each mental health trust. Participants 48 of the 56 IT experts from each mental health trust in England responded. The experts who were chosen had sufficient knowledge of the infrastructure, technology, policies and regulations to answer all survey questions. Results 77% of trusts provided computers for direct patient use, with computers in all except one trust meeting the specifications to access cCBT. However, 24% of trusts acknowledged that the number of computers provided was insufficient to provide a trust-wide service. 71% stated that the bandwidth available was adequate to provide access to cCBT sites, yet for many trusts, internet speed was identified as unpredictable and variable between locations. IT policies in only 56% of the trusts allowed National Health Service (NHS) staff to directly support patients as they complete cCBT courses via emails to the patients’ personal email account. Only 37% allowed support via internet video calls, and only 9% allowed support via instant messaging services. Conclusions Patient access to cCBT in English NHS mental health trusts is limited by the inadequate number of computers provided to patients, unpredictable bandwidth speed and inconsistent IT policies, which restrict patients from receiving the support needed to maximise the success of this therapy. English NHS mental health trusts need to alter IT policy and improve resources to reduce the waiting time for psychological resources required for patients seeking this evidence-based therapy. PMID:23377995
Trusted Computing Management Server Making Trusted Computing User Friendly
NASA Astrophysics Data System (ADS)
Sothmann, Sönke; Chaudhuri, Sumanta
Personal Computers (PC) with build in Trusted Computing (TC) technology are already well known and widely distributed. Nearly every new business notebook contains now a Trusted Platform Module (TPM) and could be used with increased trust and security features in daily application and use scenarios. However in real life the number of notebooks and PCs where the TPM is really activated and used is still very small.
Scheduling multimedia services in cloud computing environment
NASA Astrophysics Data System (ADS)
Liu, Yunchang; Li, Chunlin; Luo, Youlong; Shao, Yanling; Zhang, Jing
2018-02-01
Currently, security is a critical factor for multimedia services running in the cloud computing environment. As an effective mechanism, trust can improve security level and mitigate attacks within cloud computing environments. Unfortunately, existing scheduling strategy for multimedia service in the cloud computing environment do not integrate trust mechanism when making scheduling decisions. In this paper, we propose a scheduling scheme for multimedia services in multi clouds. At first, a novel scheduling architecture is presented. Then, We build a trust model including both subjective trust and objective trust to evaluate the trust degree of multimedia service providers. By employing Bayesian theory, the subjective trust degree between multimedia service providers and users is obtained. According to the attributes of QoS, the objective trust degree of multimedia service providers is calculated. Finally, a scheduling algorithm integrating trust of entities is proposed by considering the deadline, cost and trust requirements of multimedia services. The scheduling algorithm heuristically hunts for reasonable resource allocations and satisfies the requirement of trust and meets deadlines for the multimedia services. Detailed simulated experiments demonstrate the effectiveness and feasibility of the proposed trust scheduling scheme.
2011-09-01
concert with a physical attack. Additionally, the importance of preventive measures implemented by a social human network to counteract a cyber attack...integrity of the data stored on specific computers. This coordinated cyber attack would have been successful if not for the trusted social network...established by Mr. Hillar Aarelaid, head of the Estonian computer 6 emergency response team (CERT). This social network consisted of Mr. Hillar Aarelaid
ERIC Educational Resources Information Center
Li, Pengli; Zhang, Chunhua; Yi, Li
2016-01-01
The current study examined how children with Autism Spectrum Disorders (ASD) could selectively trust others based on three facial cues: the face race, attractiveness, and trustworthiness. In a computer-based hide-and-seek game, two face images, which differed significantly in one of the three facial cues, were presented as two cues for selective…
Smart Grid Privacy through Distributed Trust
NASA Astrophysics Data System (ADS)
Lipton, Benjamin
Though the smart electrical grid promises many advantages in efficiency and reliability, the risks to consumer privacy have impeded its deployment. Researchers have proposed protecting privacy by aggregating user data before it reaches the utility, using techniques of homomorphic encryption to prevent exposure of unaggregated values. However, such schemes generally require users to trust in the correct operation of a single aggregation server. We propose two alternative systems based on secret sharing techniques that distribute this trust among multiple service providers, protecting user privacy against a misbehaving server. We also provide an extensive evaluation of the systems considered, comparing their robustness to privacy compromise, error handling, computational performance, and data transmission costs. We conclude that while all the systems should be computationally feasible on smart meters, the two methods based on secret sharing require much less computation while also providing better protection against corrupted aggregators. Building systems using these techniques could help defend the privacy of electricity customers, as well as customers of other utilities as they move to a more data-driven architecture.
Usability and trust in e-banking.
Pravettoni, Gabriella; Leotta, Salvatore Nuccio; Lucchiari, Claudio; Misuraca, Raffaella
2007-12-01
This study assessed the role of usability in trust of e-banking services. A questionnaire was administered to 185 Italian undergraduate working students who volunteered for the experiment (M age = 30.5 yr., SD = 3.1). Participants were differentiated on computer ability (Expert, n = 104; Nonexpert, n = 81) and e-banking use (User, n = 93; Nonusers, n = 92). Analysis showed that the website usability of e-banking services did not play a very important role for the User group. Instead, institution-based trust, e.g., the trust in the security policy of the Web merchant, customers, and the overall trust of the bank were the crucial factors in the adoption of e-banking.
hPIN/hTAN: Low-Cost e-Banking Secure against Untrusted Computers
NASA Astrophysics Data System (ADS)
Li, Shujun; Sadeghi, Ahmad-Reza; Schmitz, Roland
We propose hPIN/hTAN, a low-cost token-based e-banking protection scheme when the adversary has full control over the user's computer. Compared with existing hardware-based solutions, hPIN/hTAN depends on neither second trusted channel, nor secure keypad, nor computationally expensive encryption module.
Wang, Liangmin
2018-01-01
Today IoT integrate thousands of inter networks and sensing devices e.g., vehicular networks, which are considered to be challenging due to its high speed and network dynamics. The goal of future vehicular networks is to improve road safety, promote commercial or infotainment products and to reduce the traffic accidents. All these applications are based on the information exchange among nodes, so not only reliable data delivery but also the authenticity and credibility of the data itself are prerequisite. To cope with the aforementioned problem, trust management come up as promising candidate to conduct node’s transaction and interaction management, which requires distributed mobile nodes cooperation for achieving design goals. In this paper, we propose a trust-based routing protocol i.e., 3VSR (Three Valued Secure Routing), which extends the widely used AODV (Ad hoc On-demand Distance Vector) routing protocol and employs the idea of Sensing Logic-based trust model to enhance the security solution of VANET (Vehicular Ad-Hoc Network). The existing routing protocol are mostly based on key or signature-based schemes, which off course increases computation overhead. In our proposed 3VSR, trust among entities is updated frequently by means of opinion derived from sensing logic due to vehicles random topologies. In 3VSR the theoretical capabilities are based on Dirichlet distribution by considering prior and posterior uncertainty of the said event. Also by using trust recommendation message exchange, nodes are able to reduce computation and routing overhead. The simulated results shows that the proposed scheme is secure and practical. PMID:29538314
Sohail, Muhammad; Wang, Liangmin
2018-03-14
Today IoT integrate thousands of inter networks and sensing devices e.g., vehicular networks, which are considered to be challenging due to its high speed and network dynamics. The goal of future vehicular networks is to improve road safety, promote commercial or infotainment products and to reduce the traffic accidents. All these applications are based on the information exchange among nodes, so not only reliable data delivery but also the authenticity and credibility of the data itself are prerequisite. To cope with the aforementioned problem, trust management come up as promising candidate to conduct node's transaction and interaction management, which requires distributed mobile nodes cooperation for achieving design goals. In this paper, we propose a trust-based routing protocol i.e., 3VSR (Three Valued Secure Routing), which extends the widely used AODV (Ad hoc On-demand Distance Vector) routing protocol and employs the idea of Sensing Logic-based trust model to enhance the security solution of VANET (Vehicular Ad-Hoc Network). The existing routing protocol are mostly based on key or signature-based schemes, which off course increases computation overhead. In our proposed 3VSR, trust among entities is updated frequently by means of opinion derived from sensing logic due to vehicles random topologies. In 3VSR the theoretical capabilities are based on Dirichlet distribution by considering prior and posterior uncertainty of the said event. Also by using trust recommendation message exchange, nodes are able to reduce computation and routing overhead. The simulated results shows that the proposed scheme is secure and practical.
Multi-party quantum summation without a trusted third party based on single particles
NASA Astrophysics Data System (ADS)
Zhang, Cai; Situ, Haozhen; Huang, Qiong; Yang, Pingle
We propose multi-party quantum summation protocols based on single particles, in which participants are allowed to compute the summation of their inputs without the help of a trusted third party and preserve the privacy of their inputs. Only one participant who generates the source particles needs to perform unitary operations and only single particles are needed in the beginning of the protocols.
Buzasi, Katalin
2015-01-01
The goal of this study is to investigate whether speaking other than home languages in Sub-Saharan Africa promotes generalized trust. Based on various psychological and economic theories, a simple model is provided to illustrate how languages might shape trust through various channels. Relying on data from the Afrobarometer Project, which provides information on home and additional languages, the Index of Communication Potential (ICP) is introduced to capture the linguistic situation in the 20 sample countries. The ICP, which can be computed at any desired level of aggregation, refers to the probability that an individual can communicate with a randomly selected person in the society based on common languages. The estimated two-level hierarchical models show that, however, individual level communication potential does not seem to impact trust formation, but living in an area with higher average communication potential increases the chance of exhibiting higher trust toward unknown people. Copyright © 2014 Elsevier Inc. All rights reserved.
Game Theory Based Trust Model for Cloud Environment
Gokulnath, K.; Uthariaraj, Rhymend
2015-01-01
The aim of this work is to propose a method to establish trust at bootload level in cloud computing environment. This work proposes a game theoretic based approach for achieving trust at bootload level of both resources and users perception. Nash equilibrium (NE) enhances the trust evaluation of the first-time users and providers. It also restricts the service providers and the users to violate service level agreement (SLA). Significantly, the problem of cold start and whitewashing issues are addressed by the proposed method. In addition appropriate mapping of cloud user's application to cloud service provider for segregating trust level is achieved as a part of mapping. Thus, time complexity and space complexity are handled efficiently. Experiments were carried out to compare and contrast the performance of the conventional methods and the proposed method. Several metrics like execution time, accuracy, error identification, and undecidability of the resources were considered. PMID:26380365
26 CFR 1.584-3 - Computation of common trust fund income.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 26 Internal Revenue 7 2010-04-01 2010-04-01 true Computation of common trust fund income. 1.584-3 Section 1.584-3 Internal Revenue INTERNAL REVENUE SERVICE, DEPARTMENT OF THE TREASURY (CONTINUED) INCOME TAX (CONTINUED) INCOME TAXES (CONTINUED) Banking Institutions § 1.584-3 Computation of common trust...
Automated Intelligent Agents: Are They Trusted Members of Military Teams?
2008-12-01
computer -based team firefighting game (C3Fire). The order of presentation of the two trials (human – human vs. human – automation) was...agent. All teams played a computer -based team firefighting game (C3Fire). The order of presentation of the two trials (human – human vs. human...26 b. Participants’ Computer ..................27 C. VARIABLES .........................................27 1. Independent Variables
Trust Model to Enhance Security and Interoperability of Cloud Environment
NASA Astrophysics Data System (ADS)
Li, Wenjuan; Ping, Lingdi
Trust is one of the most important means to improve security and enable interoperability of current heterogeneous independent cloud platforms. This paper first analyzed several trust models used in large and distributed environment and then introduced a novel cloud trust model to solve security issues in cross-clouds environment in which cloud customer can choose different providers' services and resources in heterogeneous domains can cooperate. The model is domain-based. It divides one cloud provider's resource nodes into the same domain and sets trust agent. It distinguishes two different roles cloud customer and cloud server and designs different strategies for them. In our model, trust recommendation is treated as one type of cloud services just like computation or storage. The model achieves both identity authentication and behavior authentication. The results of emulation experiments show that the proposed model can efficiently and safely construct trust relationship in cross-clouds environment.
Bootstrapping and Maintaining Trust in the Cloud
2016-12-01
proliferation and popularity of infrastructure-as-a- service (IaaS) cloud computing services such as Amazon Web Services and Google Compute Engine means...IaaS trusted computing system: • Secure Bootstrapping – the system should enable the tenant to securely install an initial root secret into each cloud ...elastically instantiated and terminated. Prior cloud trusted computing solutions address a subset of these features, but none achieve all. Excalibur [31] sup
TrustRank: a Cold-Start tolerant recommender system
NASA Astrophysics Data System (ADS)
Zou, Haitao; Gong, Zhiguo; Zhang, Nan; Zhao, Wei; Guo, Jingzhi
2015-02-01
The explosive growth of the World Wide Web leads to the fast advancing development of e-commerce techniques. Recommender systems, which use personalised information filtering techniques to generate a set of items suitable to a given user, have received considerable attention. User- and item-based algorithms are two popular techniques for the design of recommender systems. These two algorithms are known to have Cold-Start problems, i.e., they are unable to effectively handle Cold-Start users who have an extremely limited number of purchase records. In this paper, we develop TrustRank, a novel recommender system which handles the Cold-Start problem by leveraging the user-trust networks which are commonly available for e-commerce applications. A user-trust network is formed by friendships or trust relationships that users specify among them. While it is straightforward to conjecture that a user-trust network is helpful for improving the accuracy of recommendations, a key challenge for using user-trust network to facilitate Cold-Start users is that these users also tend to have a very limited number of trust relationships. To address this challenge, we propose a pre-processing propagation of the Cold-Start users' trust network. In particular, by applying the personalised PageRank algorithm, we expand the friends of a given user to include others with similar purchase records to his/her original friends. To make this propagation algorithm scalable to a large amount of users, as required by real-world recommender systems, we devise an iterative computation algorithm of the original personalised TrustRank which can incrementally compute trust vectors for Cold-Start users. We conduct extensive experiments to demonstrate the consistently improvement provided by our proposed algorithm over the existing recommender algorithms on the accuracy of recommendations for Cold-Start users.
Trust and Reciprocity: Are Effort and Money Equivalent?
Vilares, Iris; Dam, Gregory; Kording, Konrad
2011-01-01
Trust and reciprocity facilitate cooperation and are relevant to virtually all human interactions. They are typically studied using trust games: one subject gives (entrusts) money to another subject, which may return some of the proceeds (reciprocate). Currently, however, it is unclear whether trust and reciprocity in monetary transactions are similar in other settings, such as physical effort. Trust and reciprocity of physical effort are important as many everyday decisions imply an exchange of physical effort, and such exchange is central to labor relations. Here we studied a trust game based on physical effort and compared the results with those of a computationally equivalent monetary trust game. We found no significant difference between effort and money conditions in both the amount trusted and the quantity reciprocated. Moreover, there is a high positive correlation in subjects' behavior across conditions. This suggests that trust and reciprocity may be character traits: subjects that are trustful/trustworthy in monetary settings behave similarly during exchanges of physical effort. Our results validate the use of trust games to study exchanges in physical effort and to characterize inter-subject differences in trust and reciprocity, and also suggest a new behavioral paradigm to study these differences. PMID:21364931
Novel technology for enhanced security and trust in communication networks
NASA Astrophysics Data System (ADS)
Milovanov, Alexander; Bukshpun, Leonid; Pradhan, Ranjit; Jannson, Tomasz
2011-06-01
A novel technology that significantly enhances security and trust in wireless and wired communication networks has been developed. It is based on integration of a novel encryption mechanism and novel data packet structure with enhanced security tools. This novel data packet structure results in an unprecedented level of security and trust, while at the same time reducing power consumption and computing/communication overhead in networks. As a result, networks are provided with protection against intrusion, exploitation, and cyber attacks and posses self-building, self-awareness, self-configuring, self-healing, and self-protecting intelligence.
Collins, Michael G.; Juvina, Ion; Gluck, Kevin A.
2016-01-01
When playing games of strategic interaction, such as iterated Prisoner's Dilemma and iterated Chicken Game, people exhibit specific within-game learning (e.g., learning a game's optimal outcome) as well as transfer of learning between games (e.g., a game's optimal outcome occurring at a higher proportion when played after another game). The reciprocal trust players develop during the first game is thought to mediate transfer of learning effects. Recently, a computational cognitive model using a novel trust mechanism has been shown to account for human behavior in both games, including the transfer between games. We present the results of a study in which we evaluate the model's a priori predictions of human learning and transfer in 16 different conditions. The model's predictive validity is compared against five model variants that lacked a trust mechanism. The results suggest that a trust mechanism is necessary to explain human behavior across multiple conditions, even when a human plays against a non-human agent. The addition of a trust mechanism to the other learning mechanisms within the cognitive architecture, such as sequence learning, instance-based learning, and utility learning, leads to better prediction of the empirical data. It is argued that computational cognitive modeling is a useful tool for studying trust development, calibration, and repair. PMID:26903892
A new security model for collaborative environments
DOE Office of Scientific and Technical Information (OSTI.GOV)
Agarwal, Deborah; Lorch, Markus; Thompson, Mary
Prevalent authentication and authorization models for distributed systems provide for the protection of computer systems and resources from unauthorized use. The rules and policies that drive the access decisions in such systems are typically configured up front and require trust establishment before the systems can be used. This approach does not work well for computer software that moderates human-to-human interaction. This work proposes a new model for trust establishment and management in computer systems supporting collaborative work. The model supports the dynamic addition of new users to a collaboration with very little initial trust placed into their identity and supportsmore » the incremental building of trust relationships through endorsements from established collaborators. It also recognizes the strength of a users authentication when making trust decisions. By mimicking the way humans build trust naturally the model can support a wide variety of usage scenarios. Its particular strength lies in the support for ad-hoc and dynamic collaborations and the ubiquitous access to a Computer Supported Collaboration Workspace (CSCW) system from locations with varying levels of trust and security.« less
Principles of Faithful Execution in the implementation of trusted objects.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tarman, Thomas David; Campbell, Philip LaRoche; Pierson, Lyndon George
2003-09-01
We begin with the following definitions: Definition: A trusted volume is the computing machinery (including communication lines) within which data is assumed to be physically protected from an adversary. A trusted volume provides both integrity and privacy. Definition: Program integrity consists of the protection necessary to enable the detection of changes in the bits comprising a program as specified by the developer, for the entire time that the program is outside a trusted volume. For ease of discussion we consider program integrity to be the aggregation of two elements: instruction integrity (detection of changes in the bits within an instructionmore » or block of instructions), and sequence integrity (detection of changes in the locations of instructions within a program). Definition: Faithful Execution (FE) is a type of software protection that begins when the software leaves the control of the developer and ends within the trusted volume of a target processor. That is, FE provides program integrity, even while the program is in execution. (As we will show below, FE schemes are a function of trusted volume size.) FE is a necessary quality for computing. Without it we cannot trust computations. In the early days of computing FE came for free since the software never left a trusted volume. At that time the execution environment was the same as the development environment. In some circles that environment was referred to as a ''closed shop:'' all of the software that was used there was developed there. When an organization bought a large computer from a vendor the organization would run its own operating system on that computer, use only its own editors, only its own compilers, only its own debuggers, and so on. However, with the continuing maturity of computing technology, FE becomes increasingly difficult to achieve« less
Examining Trust, Forgiveness and Regret as Computational Concepts
NASA Astrophysics Data System (ADS)
Marsh, Stephen; Briggs, Pamela
The study of trust has advanced tremendously in recent years, to the extent that the goal of a more unified formalisation of the concept is becoming feasible. To that end, we have begun to examine the closely related concepts of regret and forgiveness and their relationship to trust and its siblings. The resultant formalisation allows computational tractability in, for instance, artificial agents. Moreover, regret and forgiveness, when allied to trust, are very powerful tools in the Ambient Intelligence (AmI) security area, especially where Human Computer Interaction and concrete human understanding are key. This paper introduces the concepts of regret and forgiveness, exploring them from social psychological as well as a computational viewpoint, and presents an extension to Marsh's original trust formalisation that takes them into account. It discusses and explores work in the AmI environment, and further potential applications.
A method of non-contact reading code based on computer vision
NASA Astrophysics Data System (ADS)
Zhang, Chunsen; Zong, Xiaoyu; Guo, Bingxuan
2018-03-01
With the purpose of guarantee the computer information exchange security between internal and external network (trusted network and un-trusted network), A non-contact Reading code method based on machine vision has been proposed. Which is different from the existing network physical isolation method. By using the computer monitors, camera and other equipment. Deal with the information which will be on exchanged, Include image coding ,Generate the standard image , Display and get the actual image , Calculate homography matrix, Image distort correction and decoding in calibration, To achieve the computer information security, Non-contact, One-way transmission between the internal and external network , The effectiveness of the proposed method is verified by experiments on real computer text data, The speed of data transfer can be achieved 24kb/s. The experiment shows that this algorithm has the characteristics of high security, fast velocity and less loss of information. Which can meet the daily needs of the confidentiality department to update the data effectively and reliably, Solved the difficulty of computer information exchange between Secret network and non-secret network, With distinctive originality, practicability, and practical research value.
Zhang, Yong-Feng; Chiang, Hsiao-Dong
2017-09-01
A novel three-stage methodology, termed the "consensus-based particle swarm optimization (PSO)-assisted Trust-Tech methodology," to find global optimal solutions for nonlinear optimization problems is presented. It is composed of Trust-Tech methods, consensus-based PSO, and local optimization methods that are integrated to compute a set of high-quality local optimal solutions that can contain the global optimal solution. The proposed methodology compares very favorably with several recently developed PSO algorithms based on a set of small-dimension benchmark optimization problems and 20 large-dimension test functions from the CEC 2010 competition. The analytical basis for the proposed methodology is also provided. Experimental results demonstrate that the proposed methodology can rapidly obtain high-quality optimal solutions that can contain the global optimal solution. The scalability of the proposed methodology is promising.
The HEPiX Virtualisation Working Group: Towards a Grid of Clouds
NASA Astrophysics Data System (ADS)
Cass, Tony
2012-12-01
The use of virtual machine images, as for example with Cloud services such as Amazon's Elastic Compute Cloud, is attractive for users as they have a guaranteed execution environment, something that cannot today be provided across sites participating in computing grids such as the Worldwide LHC Computing Grid. However, Grid sites often operate within computer security frameworks which preclude the use of remotely generated images. The HEPiX Virtualisation Working Group was setup with the objective to enable use of remotely generated virtual machine images at Grid sites and, to this end, has introduced the idea of trusted virtual machine images which are guaranteed to be secure and configurable by sites such that security policy commitments can be met. This paper describes the requirements and details of these trusted virtual machine images and presents a model for their use to facilitate the integration of Grid- and Cloud-based computing environments for High Energy Physics.
Attack-Resistant Trust Metrics
NASA Astrophysics Data System (ADS)
Levien, Raph
The Internet is an amazingly powerful tool for connecting people together, unmatched in human history. Yet, with that power comes great potential for spam and abuse. Trust metrics are an attempt to compute the set of which people are trustworthy and which are likely attackers. This chapter presents two specific trust metrics developed and deployed on the Advogato Website, which is a community blog for free software developers. This real-world experience demonstrates that the trust metrics fulfilled their goals, but that for good results, it is important to match the assumptions of the abstract trust metric computation to the real-world implementation.
TRIBE: Trust Revision for Information Based on Evidence
2013-07-01
the 15th Bled Electronic Commerce Conference e -Reality: Constructing the e -Economy, pages 48–64, 2002. [7] A. Jøsang, R. Ismail, and C. Boyd. A survey...expectation value can be computed using Equation 3 [5]. E (w, a) = b(w) + a× u(w) = r(w) + a× 2 r(w) + s(w) + 2 (3) 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8...evidence. III. TRUST-BASED FUSION OF OPINIONS In sensing applications, an information consumer may receive many different opinions from diverse
Establishing a Cloud Computing Success Model for Hospitals in Taiwan.
Lian, Jiunn-Woei
2017-01-01
The purpose of this study is to understand the critical quality-related factors that affect cloud computing success of hospitals in Taiwan. In this study, private cloud computing is the major research target. The chief information officers participated in a questionnaire survey. The results indicate that the integration of trust into the information systems success model will have acceptable explanatory power to understand cloud computing success in the hospital. Moreover, information quality and system quality directly affect cloud computing satisfaction, whereas service quality indirectly affects the satisfaction through trust. In other words, trust serves as the mediator between service quality and satisfaction. This cloud computing success model will help hospitals evaluate or achieve success after adopting private cloud computing health care services.
Establishing a Cloud Computing Success Model for Hospitals in Taiwan
Lian, Jiunn-Woei
2017-01-01
The purpose of this study is to understand the critical quality-related factors that affect cloud computing success of hospitals in Taiwan. In this study, private cloud computing is the major research target. The chief information officers participated in a questionnaire survey. The results indicate that the integration of trust into the information systems success model will have acceptable explanatory power to understand cloud computing success in the hospital. Moreover, information quality and system quality directly affect cloud computing satisfaction, whereas service quality indirectly affects the satisfaction through trust. In other words, trust serves as the mediator between service quality and satisfaction. This cloud computing success model will help hospitals evaluate or achieve success after adopting private cloud computing health care services. PMID:28112020
A collaborative filtering recommendation algorithm based on weighted SimRank and social trust
NASA Astrophysics Data System (ADS)
Su, Chang; Zhang, Butao
2017-05-01
Collaborative filtering is one of the most widely used recommendation technologies, but the data sparsity and cold start problem of collaborative filtering algorithms are difficult to solve effectively. In order to alleviate the problem of data sparsity in collaborative filtering algorithm, firstly, a weighted improved SimRank algorithm is proposed to compute the rating similarity between users in rating data set. The improved SimRank can find more nearest neighbors for target users according to the transmissibility of rating similarity. Then, we build trust network and introduce the calculation of trust degree in the trust relationship data set. Finally, we combine rating similarity and trust to build a comprehensive similarity in order to find more appropriate nearest neighbors for target user. Experimental results show that the algorithm proposed in this paper improves the recommendation precision of the Collaborative algorithm effectively.
The Role of the National Defense Stockpile in the Supply of Strategic and Critical Materials
2008-05-09
Insurance Trust Fund and the Federal Supplementary Medical Trust Fund.53 12 Analysis of NDS Operations and Alternatives The current method of determining...requirements are based upon analysis of military, industrial, and essential civilian materials needs in light of conflict scenarios found in the National...Defense Strategy. The bulk of this analysis is done utilizing computer modeling. First, the model projects the needs for finished products and services
Preliminary Analysis of a Trusted Platform Module (TPM) Initialization Process
2007-06-01
during system startup. For a laptop, extra precaution must be taken to prevent the machine from transitioning into a Sleep or Hibernate mode, since... hibernate mode [81]. D. TEST AND AUDIT After the system has gone through the predefined initialization and configuration processes, it needs to go...Conference on Computer and Communications Security, 2004, pp. 308-317. [45] L. Sarmenta, “TPM/J java -based API for the Trusted Platform Module (TPM
26 CFR 1.172-2 - Net operating loss in case of a corporation.
Code of Federal Regulations, 2011 CFR
2011-04-01
... real estate investment trusts. For taxable years ending after October 4, 1976, the net operating loss of a qualified real estate investment trust (as defined in § 1.172-10(b)) is computed by taking into... allowed in computing the net operating loss of a qualified real estate investment trust. [T.D. 8107, 51 FR...
26 CFR 1.172-2 - Net operating loss in case of a corporation.
Code of Federal Regulations, 2010 CFR
2010-04-01
... real estate investment trusts. For taxable years ending after October 4, 1976, the net operating loss of a qualified real estate investment trust (as defined in § 1.172-10(b)) is computed by taking into... allowed in computing the net operating loss of a qualified real estate investment trust. [T.D. 8107, 51 FR...
26 CFR 1.172-2 - Net operating loss in case of a corporation.
Code of Federal Regulations, 2014 CFR
2014-04-01
... real estate investment trusts. For taxable years ending after October 4, 1976, the net operating loss of a qualified real estate investment trust (as defined in § 1.172-10(b)) is computed by taking into... allowed in computing the net operating loss of a qualified real estate investment trust. [T.D. 8107, 51 FR...
Almost human: Anthropomorphism increases trust resilience in cognitive agents.
de Visser, Ewart J; Monfort, Samuel S; McKendrick, Ryan; Smith, Melissa A B; McKnight, Patrick E; Krueger, Frank; Parasuraman, Raja
2016-09-01
We interact daily with computers that appear and behave like humans. Some researchers propose that people apply the same social norms to computers as they do to humans, suggesting that social psychological knowledge can be applied to our interactions with computers. In contrast, theories of human–automation interaction postulate that humans respond to machines in unique and specific ways. We believe that anthropomorphism—the degree to which an agent exhibits human characteristics—is the critical variable that may resolve this apparent contradiction across the formation, violation, and repair stages of trust. Three experiments were designed to examine these opposing viewpoints by varying the appearance and behavior of automated agents. Participants received advice that deteriorated gradually in reliability from a computer, avatar, or human agent. Our results showed (a) that anthropomorphic agents were associated with greater trust resilience , a higher resistance to breakdowns in trust; (b) that these effects were magnified by greater uncertainty; and c) that incorporating human-like trust repair behavior largely erased differences between the agents. Automation anthropomorphism is therefore a critical variable that should be carefully incorporated into any general theory of human–agent trust as well as novel automation design. PsycINFO Database Record (c) 2016 APA, all rights reserved
Parkinson Patients' Initial Trust in Avatars: Theory and Evidence.
Javor, Andrija; Ransmayr, Gerhard; Struhal, Walter; Riedl, René
2016-01-01
Parkinson's disease (PD) is a neurodegenerative disease that affects the motor system and cognitive and behavioral functions. Due to these impairments, PD patients also have problems in using the computer. However, using computers and the Internet could help these patients to overcome social isolation and enhance information search. Specifically, avatars (defined as virtual representations of humans) are increasingly used in online environments to enhance human-computer interaction by simulating face-to-face interaction. Our laboratory experiment investigated how PD patients behave in a trust game played with human and avatar counterparts, and we compared this behavior to the behavior of age, income, education and gender matched healthy controls. The results of our study show that PD patients trust avatar faces significantly more than human faces. Moreover, there was no significant difference between initial trust of PD patients and healthy controls in avatar faces, while PD patients trusted human faces significantly less than healthy controls. Our data suggests that PD patients' interaction with avatars may constitute an effective way of communication in situations in which trust is required (e.g., a physician recommends intake of medication). We discuss the implications of these results for several areas of human-computer interaction and neurological research.
Parkinson Patients’ Initial Trust in Avatars: Theory and Evidence
Javor, Andrija; Ransmayr, Gerhard; Struhal, Walter; Riedl, René
2016-01-01
Parkinson’s disease (PD) is a neurodegenerative disease that affects the motor system and cognitive and behavioral functions. Due to these impairments, PD patients also have problems in using the computer. However, using computers and the Internet could help these patients to overcome social isolation and enhance information search. Specifically, avatars (defined as virtual representations of humans) are increasingly used in online environments to enhance human-computer interaction by simulating face-to-face interaction. Our laboratory experiment investigated how PD patients behave in a trust game played with human and avatar counterparts, and we compared this behavior to the behavior of age, income, education and gender matched healthy controls. The results of our study show that PD patients trust avatar faces significantly more than human faces. Moreover, there was no significant difference between initial trust of PD patients and healthy controls in avatar faces, while PD patients trusted human faces significantly less than healthy controls. Our data suggests that PD patients’ interaction with avatars may constitute an effective way of communication in situations in which trust is required (e.g., a physician recommends intake of medication). We discuss the implications of these results for several areas of human-computer interaction and neurological research. PMID:27820864
Secure data sharing in public cloud
NASA Astrophysics Data System (ADS)
Venkataramana, Kanaparti; Naveen Kumar, R.; Tatekalva, Sandhya; Padmavathamma, M.
2012-04-01
Secure multi-party protocols have been proposed for entities (organizations or individuals) that don't fully trust each other to share sensitive information. Many types of entities need to collect, analyze, and disseminate data rapidly and accurately, without exposing sensitive information to unauthorized or untrusted parties. Solutions based on secure multiparty computation guarantee privacy and correctness, at an extra communication (too costly in communication to be practical) and computation cost. The high overhead motivates us to extend this SMC to cloud environment which provides large computation and communication capacity which makes SMC to be used between multiple clouds (i.e., it may between private or public or hybrid clouds).Cloud may encompass many high capacity servers which acts as a hosts which participate in computation (IaaS and PaaS) for final result, which is controlled by Cloud Trusted Authority (CTA) for secret sharing within the cloud. The communication between two clouds is controlled by High Level Trusted Authority (HLTA) which is one of the hosts in a cloud which provides MgaaS (Management as a Service). Due to high risk for security in clouds, HLTA generates and distributes public keys and private keys by using Carmichael-R-Prime- RSA algorithm for exchange of private data in SMC between itself and clouds. In cloud, CTA creates Group key for Secure communication between the hosts in cloud based on keys sent by HLTA for exchange of Intermediate values and shares for computation of final result. Since this scheme is extended to be used in clouds( due to high availability and scalability to increase computation power) it is possible to implement SMC practically for privacy preserving in data mining at low cost for the clients.
Sanchez, Rosanna; Weinflash, Noah; Myers, Catherine E.
2016-01-01
Decisions based on trust are critical for human social interaction. We judge the trustworthiness of partners in social interactions based on a number of partner characteristics as well as experiences with those partners. These decisions are also influenced by personality. The current study examined how the personality trait of behavioral inhibition, which involves the tendency to avoid or withdraw from novelty in both social and non-social situations, is related to explicit ratings of trustworthiness as well as decisions made in the trust game. In the game, healthy young adults interacted with three fictional partners who were portrayed as trustworthy, untrustworthy or neutral through biographical information. Participants could choose to keep $1 or send $3 of virtual money to a partner. The partner could then choose to send $1.5 back to the participant or to keep the entire amount. On any trial in which the participant chose to send, the partner always reciprocated with 50% probability, irrespective of how that partner was portrayed in the biography. Behavioral inhibition was assessed through a self-report questionnaire. Finally, a reinforcement learning computational model was fit to the behavior of each participant. Self-reported ratings of trust confirmed that all participants, irrespective of behavioral inhibition, perceived differences in the moral character of the three partners (trustworthiness of good > neutral > bad partner). Decisions made in the game showed that inhibited participants tended to trust the neutral partner less than uninhibited participants. In contrast, this was not reflected in the ratings of the neutral partner (either pre- or post-game), indicating a dissociation between ratings of trustworthiness and decisions made by inhibited participants. Computational modeling showed that this was due to lower initial trust of the neutral partner rather than a higher learning rate associated with loss, suggesting an implicit bias against the neutral partner. Overall, the results suggest inhibited individuals may be predisposed to interpret neutral or ambiguous information more negatively which could, at least in part, account for the tendency to avoid unfamiliar people characteristic of behaviorally inhibited temperament, as well as its relationship to anxiety disorders. PMID:27004148
On Propagating Interpersonal Trust in Social Networks
NASA Astrophysics Data System (ADS)
Ziegler, Cai-Nicolas
The age of information glut has fostered the proliferation of data and documents on the Web, created by man and machine alike. Hence, there is an enormous wealth of minable knowledge that is yet to be extracted, in particular, on the Semantic Web. However, besides understanding information stated by subjects, knowing about their credibility becomes equally crucial. Hence, trust and trust metrics, conceived as computational means to evaluate trust relationships between individuals, come into play. Our major contribution to Semantic Web trust management through this work is twofold. First, we introduce a classification scheme for trust metrics along various axes and discuss advantages and drawbacks of existing approaches for Semantic Web scenarios. Hereby, we devise an advocacy for local group trust metrics, guiding us to the second part, which presents Appleseed, our novel proposal for local group trust computation. Compelling in its simplicity, Appleseed borrows many ideas from spreading activation models in psychology and relates their concepts to trust evaluation in an intuitive fashion. Moreover, we provide extensions for the Appleseed nucleus that make our trust metric handle distrust statements.
Economics, Education and Computers in Third World Schools.
ERIC Educational Resources Information Center
Hawkridge, David; And Others
This paper is based on a 1988-89 international cooperative study funded by the Harold Macmillan Trust. Teachers and officials in several African, Asian and Arabic-speaking countries worked with the authors in describing and evaluating how computers arrived in their schools and what the machines are used for. Considerable data on national policy…
Performativity, Fabrication and Trust: Exploring Computer-Mediated Moderation
ERIC Educational Resources Information Center
Clapham, Andrew
2013-01-01
Based on research conducted in an English secondary school, this paper explores computer-mediated moderation as a performative tool. The Module Assessment Meeting (MAM) was the moderation approach under investigation. I mobilise ethnographic data generated by a key informant, and triangulated with that from other actors in the setting, in order to…
Seismic data restoration with a fast L1 norm trust region method
NASA Astrophysics Data System (ADS)
Cao, Jingjie; Wang, Yanfei
2014-08-01
Seismic data restoration is a major strategy to provide reliable wavefield when field data dissatisfy the Shannon sampling theorem. Recovery by sparsity-promoting inversion often get sparse solutions of seismic data in a transformed domains, however, most methods for sparsity-promoting inversion are line-searching methods which are efficient but are inclined to obtain local solutions. Using trust region method which can provide globally convergent solutions is a good choice to overcome this shortcoming. A trust region method for sparse inversion has been proposed, however, the efficiency should be improved to suitable for large-scale computation. In this paper, a new L1 norm trust region model is proposed for seismic data restoration and a robust gradient projection method for solving the sub-problem is utilized. Numerical results of synthetic and field data demonstrate that the proposed trust region method can get excellent computation speed and is a viable alternative for large-scale computation.
still trust the computer from which you are making the access. Keystroke logging is the most direct way of getting login information and encryption does not protect you from it. If you don't trust the
26 CFR 1.47-5 - Estates and trusts.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 26 Internal Revenue 1 2010-04-01 2010-04-01 true Estates and trusts. 1.47-5 Section 1.47-5... Computing Credit for Investment in Certain Depreciable Property § 1.47-5 Estates and trusts. (a) In general—(1) Disposition or cessation in hands of estate or trust. If an estate or trust disposes of any...
Identity-Based Authentication for Cloud Computing
NASA Astrophysics Data System (ADS)
Li, Hongwei; Dai, Yuanshun; Tian, Ling; Yang, Haomiao
Cloud computing is a recently developed new technology for complex systems with massive-scale services sharing among numerous users. Therefore, authentication of both users and services is a significant issue for the trust and security of the cloud computing. SSL Authentication Protocol (SAP), once applied in cloud computing, will become so complicated that users will undergo a heavily loaded point both in computation and communication. This paper, based on the identity-based hierarchical model for cloud computing (IBHMCC) and its corresponding encryption and signature schemes, presented a new identity-based authentication protocol for cloud computing and services. Through simulation testing, it is shown that the authentication protocol is more lightweight and efficient than SAP, specially the more lightweight user side. Such merit of our model with great scalability is very suited to the massive-scale cloud.
2011-11-01
based perception of each team member‟s behavior and physiology with the goal of predicting unobserved variables (e.g., cognitive state). Along with...sensing technologies are showing promise as enablers of computer-based perception of each team member‟s behavior and physiology with the goal...an essential element of team performance. The perception that other team members may be unable to perform their tasks is detrimental to trust and
Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria. Version 1.
1987-07-01
for Secure Computer Systema, MTR-3153, The MITRE Corporation, Bedford, MA, June 1975. 1 See, for example, M. D. Abrams and H. J. Podell , Tutorial...References References Abrams, M. D. and H. J. Podell , Tutorial: Computer and Network Security, IEEE Com- puter Society Press, 1987. Addendum to the
26 CFR 1.50A-6 - Estates and trusts.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 26 Internal Revenue 1 2010-04-01 2010-04-01 true Estates and trusts. 1.50A-6 Section 1.50A-6... Computing Credit for Expenses of Work Incentive Programs § 1.50A-6 Estates and trusts. (a) In general—(1) Termination of employment by an estate or trust. If an estate or trust terminates (in a termination subject to...
Guo, Ping; Wang, Jin; Ji, Sai; Geng, Xue Hua; Xiong, Neal N
2015-12-01
With the pervasiveness of smart phones and the advance of wireless body sensor network (BSN), mobile Healthcare (m-Healthcare), which extends the operation of Healthcare provider into a pervasive environment for better health monitoring, has attracted considerable interest recently. However, the flourish of m-Healthcare still faces many challenges including information security and privacy preservation. In this paper, we propose a secure and privacy-preserving framework combining with multilevel trust management. In our scheme, smart phone resources including computing power and energy can be opportunistically gathered to process the computing-intensive PHI (personal health information) during m-Healthcare emergency with minimal privacy disclosure. In specific, to leverage the PHI privacy disclosure and the high reliability of PHI process and transmission in m-Healthcare emergency, we introduce an efficient lightweight encryption for those users whose trust level is low, which is based on mix cipher algorithms and pair of plain text and cipher texts, and allow a medical user to decide who can participate in the opportunistic computing to assist in processing his overwhelming PHI data. Detailed security analysis and simulations show that the proposed framework can efficiently achieve user-centric privacy protection in m-Healthcare system.
Bootstrapping and Maintaining Trust in the Cloud
2016-03-16
of infrastructure-as-a- service (IaaS) cloud computing services such as Ama- zon Web Services, Google Compute Engine, Rackspace, et. al. means that...Implementation We implemented keylime in ∼3.2k lines of Python in four components: registrar, node, CV, and tenant. The registrar offers a REST-based web ...bootstrap key K. It provides an unencrypted REST-based web service for these two functions. As described earlier, the pro- tocols for exchanging data
DOE Office of Scientific and Technical Information (OSTI.GOV)
Prowell, Stacy J; Symons, Christopher T
2015-01-01
Producing trusted results from high-performance codes is essential for policy and has significant economic impact. We propose combining rigorous analytical methods with machine learning techniques to achieve the goal of repeatable, trustworthy scientific computing.
NASA Astrophysics Data System (ADS)
Pop, Florin; Dobre, Ciprian; Mocanu, Bogdan-Costel; Citoteanu, Oana-Maria; Xhafa, Fatos
2016-11-01
Managing the large dimensions of data processed in distributed systems that are formed by datacentres and mobile devices has become a challenging issue with an important impact on the end-user. Therefore, the management process of such systems can be achieved efficiently by using uniform overlay networks, interconnected through secure and efficient routing protocols. The aim of this article is to advance our previous work with a novel trust model based on a reputation metric that actively uses the social links between users and the model of interaction between them. We present and evaluate an adaptive model for the trust management in structured overlay networks, based on a Mobile Cloud architecture and considering a honeycomb overlay. Such a model can be useful for supporting advanced mobile market-share e-Commerce platforms, where users collaborate and exchange reliable information about, for example, products of interest and supporting ad-hoc business campaigns
26 CFR 1.857-2 - Real estate investment trust taxable income and net capital gain.
Code of Federal Regulations, 2010 CFR
2010-04-01
... estate investment trust taxable income and net capital gain. (a) Real estate investment trust taxable... paid during the taxable year, and the net capital gain is excluded in computing real estate investment... 26 Internal Revenue 9 2010-04-01 2010-04-01 false Real estate investment trust taxable income and...
In Law We Trust? Trusted Computing and Legal Responsibility for Internet Security
NASA Astrophysics Data System (ADS)
Danidou, Yianna; Schafer, Burkhard
This paper analyses potential legal responses and consequences to the anticipated roll out of Trusted Computing (TC). It is argued that TC constitutes such a dramatic shift in power away from users to the software providers, that it is necessary for the legal system to respond. A possible response is to mirror the shift in power by a shift in legal responsibility, creating new legal liabilities and duties for software companies as the new guardians of internet security.
Trust - Essential Requirement and Basis for pHealth Services.
Ruotsalainen, Pekka; Blobel, Bernd
2017-01-01
Trust is a social code and glue between persons and organizations in any business domain including health. pHealth is a complex concept that is built around health service providers, individuals and artefacts such as sensors, mobile devices, networks, computers, and software applications. It has many stakeholders such as organizations, persons, patients, customers, and tele-operators. pHealth services are increasingly offered in insecure information space, and used over organizational, geographical and jurisdictional borders. This all means that trust is an essential requirement for successful pHealth services. To make pHealth a successful business, organizations offering pHealth services should establish inter-organizational trust and trusted relationship between their customers. Before starting to use services, the pHealth user should have a possibility to define how much it trusts on the service provider and on the surrounding information infrastructure. The authors' analysis show that trust models used in today's health care and e-commerce are insufficient for networked pHealth. Calculated trust as proposed by the authors is stronger than the predefined dispositional trust model currently used in health care, other's recommendations used in e-commerce and risk assessment. Until now, caused by the lack of business incentive, lack of regulatory and political pressure, pHealth providers have not demonstrated meaningful interest in moving from the current unsatisfactory situation to trust calculation by making information necessary for this methodology available. To make pHealth successful, a combination of legal, political, organizational, technological and educational efforts is needed to initiate the paradigm change and start the era of trust-based pHealth services.
Bootstrapping and Maintaining Trust in the Cloud
2016-12-01
simultaneous cloud nodes. 1. INTRODUCTION The proliferation and popularity of infrastructure-as-a- service (IaaS) cloud computing services such as...Amazon Web Services and Google Compute Engine means more cloud tenants are hosting sensitive, private, and business critical data and applications in the...thousands of IaaS resources as they are elastically instantiated and terminated. Prior cloud trusted computing solutions address a subset of these features
Diamond High Assurance Security Program: Trusted Computing Exemplar
2002-09-01
computing component, the Embedded MicroKernel Prototype. A third-party evaluation of the component will be initiated during development (e.g., once...target technologies and larger projects is a topic for future research. Trusted Computing Reference Component – The Embedded MicroKernel Prototype We...Kernel The primary security function of the Embedded MicroKernel will be to enforce process and data-domain separation, while providing primitive
Mitigating Spam Using Spatio-Temporal Reputation
2010-01-01
scalable; computation can occur in near real-time and over 500,000 emails can be scored an hour. 1 Introduction Roughly 90% of the total volume of email on...Sokolsky, and J. M. Smith. Dynamic trust management. IEEE Computer (Special Issue on Trust Mangement ), 2009. [11] P. Boykins and B. Roychowdhury
Achieving Optimal Privacy in Trust-Aware Social Recommender Systems
NASA Astrophysics Data System (ADS)
Dokoohaki, Nima; Kaleli, Cihan; Polat, Huseyin; Matskin, Mihhail
Collaborative filtering (CF) recommenders are subject to numerous shortcomings such as centralized processing, vulnerability to shilling attacks, and most important of all privacy. To overcome these obstacles, researchers proposed for utilization of interpersonal trust between users, to alleviate many of these crucial shortcomings. Till now, attention has been mainly paid to strong points about trust-aware recommenders such as alleviating profile sparsity or calculation cost efficiency, while least attention has been paid on investigating the notion of privacy surrounding the disclosure of individual ratings and most importantly protection of trust computation across social networks forming the backbone of these systems. To contribute to addressing problem of privacy in trust-aware recommenders, within this paper, first we introduce a framework for enabling privacy-preserving trust-aware recommendation generation. While trust mechanism aims at elevating recommender's accuracy, to preserve privacy, accuracy of the system needs to be decreased. Since within this context, privacy and accuracy are conflicting goals we show that a Pareto set can be found as an optimal setting for both privacy-preserving and trust-enabling mechanisms. We show that this Pareto set, when used as the configuration for measuring the accuracy of base collaborative filtering engine, yields an optimized tradeoff between conflicting goals of privacy and accuracy. We prove this concept along with applicability of our framework by experimenting with accuracy and privacy factors, and we show through experiment how such optimal set can be inferred.
NASA Astrophysics Data System (ADS)
Hou, Liqiang; Cai, Yuanli; Liu, Jin; Hou, Chongyuan
2016-04-01
A variable fidelity robust optimization method for pulsed laser orbital debris removal (LODR) under uncertainty is proposed. Dempster-shafer theory of evidence (DST), which merges interval-based and probabilistic uncertainty modeling, is used in the robust optimization. The robust optimization method optimizes the performance while at the same time maximizing its belief value. A population based multi-objective optimization (MOO) algorithm based on a steepest descent like strategy with proper orthogonal decomposition (POD) is used to search robust Pareto solutions. Analytical and numerical lifetime predictors are used to evaluate the debris lifetime after the laser pulses. Trust region based fidelity management is designed to reduce the computational cost caused by the expensive model. When the solutions fall into the trust region, the analytical model is used to reduce the computational cost. The proposed robust optimization method is first tested on a set of standard problems and then applied to the removal of Iridium 33 with pulsed lasers. It will be shown that the proposed approach can identify the most robust solutions with minimum lifetime under uncertainty.
T2AR: trust-aware ad-hoc routing protocol for MANET.
Dhananjayan, Gayathri; Subbiah, Janakiraman
2016-01-01
Secure data transfer against the malicious attacks is an important issue in an infrastructure-less independent network called mobile ad-hoc network (MANET). Trust assurance between MANET nodes is the key parameter in the high-security provision under dynamic topology variations and open wireless constraints. But, the malicious behavior of nodes reduces the trust level of the nodes that leads to an insecure data delivery. The increase in malicious attacks causes the excessive energy consumption that leads to a reduction of network lifetime. The lack of positional information update of the nodes in ad-hoc on-demand vector (AODV) protocol during the connection establishment offers less trust level between the nodes. Hence, the trust rate computation using energy and mobility models and its update are the essential tasks for secure data delivery. This paper proposes a trust-aware ad-hoc routing (T2AR) protocol to improve the trust level between the nodes in MANET. The proposed method modifies the traditional AODV routing protocol with the constraints of trust rate, energy, mobility based malicious behavior prediction. The packet sequence ID matching from the log reports of neighbor nodes determine the trust rate that avoids the malicious report generation. Besides, the direct and indirect trust observation schemes utilization increases the trust level. Besides, the received signal strength indicator utilization determines the trusted node is within the communication range or not. The comparative analysis between the proposed T2AR with the existing methods such as TRUNCMAN, RBT, GR, FBR and DICOTIDS regarding the average end-to-end delay, throughput, false positives, packet delivery ratio shows the effectiveness of T2AR in the secure MANET environment design.
26 CFR 1.48-6 - Estates and trusts.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 26 Internal Revenue 1 2010-04-01 2010-04-01 true Estates and trusts. 1.48-6 Section 1.48-6... Computing Credit for Investment in Certain Depreciable Property § 1.48-6 Estates and trusts. (a) In general. (1) In the case of an estate or trust, the basis of “new section 38 property” and the cost of “used...
Singh, Amit; Rhee, Kyung E; Brennan, Jesse J; Kuelbs, Cynthia; El-Kareh, Robert; Fisher, Erin S
2016-03-01
Increase parent/caregiver ability to correctly identify the attending in charge and define terminology of treatment team members (TTMs). We hypothesized that correct TTM identification would increase with use of an electronic communication tool. Secondary aims included assessing subjects' satisfaction with and trust of TTM and interest in computer activities during hospitalization. Two similar groups of parents/legal guardians/primary caregivers of children admitted to the Pediatric Hospital Medicine teaching service with an unplanned first admission were surveyed before (Phase 1) and after (Phase 2) implementation of a novel electronic medical record (EMR)-based tool with names, photos, and definitions of TTMs. Physicians were also surveyed only during Phase 1. Surveys assessed TTM identification, satisfaction, trust, and computer use. More subjects in Phase 2 correctly identified attending physicians by name (71% vs. 28%, P < .001) and correctly defined terms intern, resident, and attending (P ≤ .03) compared with Phase 1. Almost all subjects (>79%) and TTMs (>87%) reported that subjects' ability to identify TTMs moderately or strongly impacted satisfaction and trust. The majority of subjects expressed interest in using computers to understand TTMs in each phase. Subjects' ability to correctly identify attending physicians and define TTMs was significantly greater for those who used our tool. In our study, subjects reported that TTM identification impacted aspects of the TTM relationship, yet few could correctly identify TTMs before tool use. This pilot study showed early success in engaging subjects with the EMR in the hospital and suggests that families would engage in computer-based activities in this setting. Copyright © 2016 by the American Academy of Pediatrics.
Older Adults' Knowledge of Internet Hazards
ERIC Educational Resources Information Center
Grimes, Galen A.; Hough, Michelle G.; Mazur, Elizabeth; Signorella, Margaret L.
2010-01-01
Older adults are less likely to be using computers and less knowledgeable about Internet security than are younger users. The two groups do not differ on trust of Internet information. The younger group shows no age or gender differences. Within the older group, computer users are more trusting of Internet information, and along with those with…
26 CFR 1.50B-3 - Estates and trusts.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 26 Internal Revenue 1 2010-04-01 2010-04-01 true Estates and trusts. 1.50B-3 Section 1.50B-3... Computing Credit for Expenses of Work Incentive Programs § 1.50B-3 Estates and trusts. (a) General rule—(1) In general. In the case of an estate or trust, WIN expenses (as defined in paragraph (a) of § 1.50B-1...
Capturing Trust in Social Web Applications
NASA Astrophysics Data System (ADS)
O'Donovan, John
The Social Web constitutes a shift in information flow from the traditional Web. Previously, content was provided by the owners of a website, for consumption by the end-user. Nowadays, these websites are being replaced by Social Web applications which are frameworks for the publication of user-provided content. Traditionally, Web content could be `trusted' to some extent based on the site it originated from. Algorithms such as Google's PageRank were (and still are) used to compute the importance of a website, based on analysis of underlying link topology. In the Social Web, analysis of link topology merely tells us about the importance of the information framework which hosts the content. Consumers of information still need to know about the importance/reliability of the content they are reading, and therefore about the reliability of the producers of that content. Research into trust and reputation of the producers of information in the Social Web is still very much in its infancy. Every day, people are forced to make trusting decisions about strangers on the Web based on a very limited amount of information. For example, purchasing a product from an eBay seller with a `reputation' of 99%, downloading a file from a peer-to-peer application such as Bit-Torrent, or allowing Amazon.com tell you what products you will like. Even something as simple as reading comments on a Web-blog requires the consumer to make a trusting decision about the quality of that information. In all of these example cases, and indeed throughout the Social Web, there is a pressing demand for increased information upon which we can make trusting decisions. This chapter examines the diversity of sources from which trust information can be harnessed within Social Web applications and discusses a high level classification of those sources. Three different techniques for harnessing and using trust from a range of sources are presented. These techniques are deployed in two sample Social Web applications—a recommender system and an online auction. In all cases, it is shown that harnessing an increased amount of information upon which to make trust decisions greatly enhances the user experience with the Social Web application.
New Directions for Hardware-assisted Trusted Computing Policies (Position Paper)
NASA Astrophysics Data System (ADS)
Bratus, Sergey; Locasto, Michael E.; Ramaswamy, Ashwin; Smith, Sean W.
The basic technological building blocks of the TCG architecture seem to be stabilizing. As a result, we believe that the focus of the Trusted Computing (TC) discipline must naturally shift from the design and implementation of the hardware root of trust (and the subsequent trust chain) to the higher-level application policies. Such policies must build on these primitives to express new sets of security goals. We highlight the relationship between enforcing these types of policies and debugging, since both activities establish the link between expected and actual application behavior. We argue that this new class of policies better fits developers' mental models of expected application behaviors, and we suggest a hardware design direction for enabling the efficient interpretation of such policies.
GeoTrust Hub: A Platform For Sharing And Reproducing Geoscience Applications
NASA Astrophysics Data System (ADS)
Malik, T.; Tarboton, D. G.; Goodall, J. L.; Choi, E.; Bhatt, A.; Peckham, S. D.; Foster, I.; Ton That, D. H.; Essawy, B.; Yuan, Z.; Dash, P. K.; Fils, G.; Gan, T.; Fadugba, O. I.; Saxena, A.; Valentic, T. A.
2017-12-01
Recent requirements of scholarly communication emphasize the reproducibility of scientific claims. Text-based research papers are considered poor mediums to establish reproducibility. Papers must be accompanied by "research objects", aggregation of digital artifacts that together with the paper provide an authoritative record of a piece of research. We will present GeoTrust Hub (http://geotrusthub.org), a platform for creating, sharing, and reproducing reusable research objects. GeoTrust Hub provides tools for scientists to create `geounits'--reusable research objects. Geounits are self-contained, annotated, and versioned containers that describe and package computational experiments in an efficient and light-weight manner. Geounits can be shared on public repositories such as HydroShare and FigShare, and also using their respective APIs reproduced on provisioned clouds. The latter feature enables science applications to have a lifetime beyond sharing, wherein they can be independently verified and trust be established as they are repeatedly reused. Through research use cases from several geoscience laboratories across the United States, we will demonstrate how tools provided from GeoTrust Hub along with Hydroshare as its public repository for geounits is advancing the state of reproducible research in the geosciences. For each use case, we will address different computational reproducibility requirements. Our first use case will be an example of setup reproducibility which enables a scientist to set up and reproduce an output from a model with complex configuration and development environments. Our second use case will be an example of algorithm/data reproducibility, where in a shared data science model/dataset can be substituted with an alternate one to verify model output results, and finally an example of interactive reproducibility, in which an experiment is dependent on specific versions of data to produce the result. Toward this we will use software and data used in preparing data for the MODFLOW model in Hydrology, JupyterHub used in Hydroshare, PyLith used in Computational Infrastructure for Geodynamics, and GeoSpace Collaborative Observations and Assimilative Modeling used in space science. The GeoTrust Hub is funded through the National Science Foundation EarthCube program.
26 CFR 1.857-3 - Net income from foreclosure property.
Code of Federal Regulations, 2014 CFR
2014-04-01
... TAX (CONTINUED) INCOME TAXES (CONTINUED) Real Estate Investment Trusts § 1.857-3 Net income from... computing real estate investment trust taxable income under section 857(b)(2). (d) Gross income not subject... estate investment trust has gain of $100 from the sale of an item of foreclosure property described in...
26 CFR 1.860-3 - Interest and additions to tax.
Code of Federal Regulations, 2013 CFR
2013-04-01
... (CONTINUED) INCOME TAXES (CONTINUED) Real Estate Investment Trusts § 1.860-3 Interest and additions to tax... examples: Example 1. Corporation X is a real estate investment trust that files its income tax return on a... 1977, X reports real estate investment trust taxable income (computed without the dividends paid...
26 CFR 1.860-3 - Interest and additions to tax.
Code of Federal Regulations, 2012 CFR
2012-04-01
... (CONTINUED) INCOME TAXES (CONTINUED) Real Estate Investment Trusts § 1.860-3 Interest and additions to tax... examples: Example 1. Corporation X is a real estate investment trust that files its income tax return on a... 1977, X reports real estate investment trust taxable income (computed without the dividends paid...
26 CFR 1.857-3 - Net income from foreclosure property.
Code of Federal Regulations, 2013 CFR
2013-04-01
... TAX (CONTINUED) INCOME TAXES (CONTINUED) Real Estate Investment Trusts § 1.857-3 Net income from... computing real estate investment trust taxable income under section 857(b)(2). (d) Gross income not subject... estate investment trust has gain of $100 from the sale of an item of foreclosure property described in...
26 CFR 1.857-3 - Net income from foreclosure property.
Code of Federal Regulations, 2010 CFR
2010-04-01
... TAX (CONTINUED) INCOME TAXES Real Estate Investment Trusts § 1.857-3 Net income from foreclosure... computing real estate investment trust taxable income under section 857(b)(2). (d) Gross income not subject... estate investment trust has gain of $100 from the sale of an item of foreclosure property described in...
26 CFR 1.860-3 - Interest and additions to tax.
Code of Federal Regulations, 2014 CFR
2014-04-01
... (CONTINUED) INCOME TAXES (CONTINUED) Real Estate Investment Trusts § 1.860-3 Interest and additions to tax... examples: Example 1. Corporation X is a real estate investment trust that files its income tax return on a... 1977, X reports real estate investment trust taxable income (computed without the dividends paid...
26 CFR 1.860-3 - Interest and additions to tax.
Code of Federal Regulations, 2010 CFR
2010-04-01
... (CONTINUED) INCOME TAXES Real Estate Investment Trusts § 1.860-3 Interest and additions to tax. (a) In... examples: Example 1. Corporation X is a real estate investment trust that files its income tax return on a... 1977, X reports real estate investment trust taxable income (computed without the dividends paid...
26 CFR 1.860-3 - Interest and additions to tax.
Code of Federal Regulations, 2011 CFR
2011-04-01
... (CONTINUED) INCOME TAXES (CONTINUED) Real Estate Investment Trusts § 1.860-3 Interest and additions to tax... examples: Example 1. Corporation X is a real estate investment trust that files its income tax return on a... 1977, X reports real estate investment trust taxable income (computed without the dividends paid...
26 CFR 1.857-3 - Net income from foreclosure property.
Code of Federal Regulations, 2012 CFR
2012-04-01
... TAX (CONTINUED) INCOME TAXES (CONTINUED) Real Estate Investment Trusts § 1.857-3 Net income from... computing real estate investment trust taxable income under section 857(b)(2). (d) Gross income not subject... estate investment trust has gain of $100 from the sale of an item of foreclosure property described in...
26 CFR 1.857-3 - Net income from foreclosure property.
Code of Federal Regulations, 2011 CFR
2011-04-01
... TAX (CONTINUED) INCOME TAXES (CONTINUED) Real Estate Investment Trusts § 1.857-3 Net income from... computing real estate investment trust taxable income under section 857(b)(2). (d) Gross income not subject... estate investment trust has gain of $100 from the sale of an item of foreclosure property described in...
Power Efficient Hardware Architecture of SHA-1 Algorithm for Trusted Mobile Computing
NASA Astrophysics Data System (ADS)
Kim, Mooseop; Ryou, Jaecheol
The Trusted Mobile Platform (TMP) is developed and promoted by the Trusted Computing Group (TCG), which is an industry standard body to enhance the security of the mobile computing environment. The built-in SHA-1 engine in TMP is one of the most important circuit blocks and contributes the performance of the whole platform because it is used as key primitives supporting platform integrity and command authentication. Mobile platforms have very stringent limitations with respect to available power, physical circuit area, and cost. Therefore special architecture and design methods for low power SHA-1 circuit are required. In this paper, we present a novel and efficient hardware architecture of low power SHA-1 design for TMP. Our low power SHA-1 hardware can compute 512-bit data block using less than 7,000 gates and has a power consumption about 1.1 mA on a 0.25μm CMOS process.
Colquitt, Jason A; Lepine, Jeffery A; Piccolo, Ronald F; Zapata, Cindy P; Rich, Bruce L
2012-01-01
Past research has revealed significant relationships between organizational justice dimensions and job performance, and trust is thought to be one mediator of those relationships. However, trust has been positioned in justice theorizing in 2 different ways, either as an indicator of the depth of an exchange relationship or as a variable that reflects levels of work-related uncertainty. Moreover, trust scholars distinguish between multiple forms of trust, including affect- and cognition-based trust, and it remains unclear which form is most relevant to justice effects. To explore these issues, we built and tested a more comprehensive model of trust mediation in which procedural, interpersonal, and distributive justice predicted affect- and cognition-based trust, with those trust forms predicting both exchange- and uncertainty-based mechanisms. The results of a field study in a hospital system revealed that the trust variables did indeed mediate the relationships between the organizational justice dimensions and job performance, with affect-based trust driving exchange-based mediation and cognition-based trust driving uncertainty-based mediation.
Double Cluster Heads Model for Secure and Accurate Data Fusion in Wireless Sensor Networks
Fu, Jun-Song; Liu, Yun
2015-01-01
Secure and accurate data fusion is an important issue in wireless sensor networks (WSNs) and has been extensively researched in the literature. In this paper, by combining clustering techniques, reputation and trust systems, and data fusion algorithms, we propose a novel cluster-based data fusion model called Double Cluster Heads Model (DCHM) for secure and accurate data fusion in WSNs. Different from traditional clustering models in WSNs, two cluster heads are selected after clustering for each cluster based on the reputation and trust system and they perform data fusion independently of each other. Then, the results are sent to the base station where the dissimilarity coefficient is computed. If the dissimilarity coefficient of the two data fusion results exceeds the threshold preset by the users, the cluster heads will be added to blacklist, and the cluster heads must be reelected by the sensor nodes in a cluster. Meanwhile, feedback is sent from the base station to the reputation and trust system, which can help us to identify and delete the compromised sensor nodes in time. Through a series of extensive simulations, we found that the DCHM performed very well in data fusion security and accuracy. PMID:25608211
Patient and health care professional views and experiences of computer agent-supported health care.
Neville, Ron G; Greene, Alexandra C; Lewis, Sue
2006-01-01
To explore patient and health care professional (HCP) views towards the use of multi-agent computer systems in their GP practice. Qualitative analysis of in-depth interviews and analysis of transcriptions. Urban health centre in Dundee, Scotland. Five representative healthcare professionals and 11 patients. Emergent themes from interviews revealed participants' attitudes and beliefs, which were coded and indexed. Patients and HCPs had similar beliefs, attitudes and views towards the implementation of multi-agent systems (MAS). Both felt modern communication methods were useful to supplement, not supplant, face-to-face consultations between doctors and patients. This was based on the immense trust these patients placed in their doctors in this practice, which extended to trust in their choice of communication technology and security. Rapid access to medical information increased patients' sense of shared partnership and self-efficacy. Patients and HCPs expressed respect for each other's time and were keen to embrace technology that made interactions more efficient, including for the altruistic benefit of others less technically competent. Patients and HCPs welcomed the introduction of agent technology to the delivery of health care. Widespread use will depend more on the trust patients place in their own GP than on technological issues.
26 CFR 1.665(f)-1A - Undistributed capital gain.
Code of Federal Regulations, 2010 CFR
2010-04-01
... TAX (CONTINUED) INCOME TAXES Treatment of Excess Distributions of Trusts Applicable to Taxable Years.... (ii) The amount of taxes imposed on the trust for such year attributable to such gains, as defined in § 1.665(d)-1A, and (iii) In the case of a trust that does not use the alternative method for computing...
Health decision making: lynchpin of evidence-based practice.
Spring, Bonnie
2008-01-01
Health decision making is both the lynchpin and the least developed aspect of evidence-based practice. The evidence-based practice process requires integrating the evidence with consideration of practical resources and patient preferences and doing so via a process that is genuinely collaborative. Yet, the literature is largely silent about how to accomplish integrative, shared decision making. for evidence-based practice are discussed for 2 theories of clinician decision making (expected utility and fuzzy trace) and 2 theories of patient health decision making (transtheoretical model and reasoned action). Three suggestions are offered. First, it would be advantageous to have theory-based algorithms that weight and integrate the 3 data strands (evidence, resources, preferences) in different decisional contexts. Second, patients, not providers, make the decisions of greatest impact on public health, and those decisions are behavioral. Consequently, theory explicating how provider-patient collaboration can influence patient lifestyle decisions made miles from the provider's office is greatly needed. Third, although the preponderance of data on complex decisions supports a computational approach, such an approach to evidence-based practice is too impractical to be widely applied at present. More troublesomely, until patients come to trust decisions made computationally more than they trust their providers' intuitions, patient adherence will remain problematic. A good theory of integrative, collaborative health decision making remains needed.
Health Decision Making: Lynchpin of Evidence-Based Practice
Spring, Bonnie
2008-01-01
Health decision making is both the lynchpin and the least developed aspect of evidence-based practice. The evidence-based practice process requires integrating the evidence with consideration of practical resources and patient preferences and doing so via a process that is genuinely collaborative. Yet, the literature is largely silent about how to accomplish integrative, shared decision making. Implications for evidence-based practice are discussed for 2 theories of clinician decision making (expected utility and fuzzy trace) and 2 theories of patient health decision making (transtheoretical model and reasoned action). Three suggestions are offered. First, it would be advantageous to have theory-based algorithms that weight and integrate the 3 data strands (evidence, resources, preferences) in different decisional contexts. Second, patients, not providers, make the decisions of greatest impact on public health, and those decisions are behavioral. Consequently, theory explicating how provider-patient collaboration can influence patient lifestyle decisions made miles from the provider's office is greatly needed. Third, although the preponderance of data on complex decisions supports a computational approach, such an approach to evidence-based practice is too impractical to be widely applied at present. More troublesomely, until patients come to trust decisions made computationally more than they trust their providers’ intuitions, patient adherence will remain problematic. A good theory of integrative, collaborative health decision making remains needed. PMID:19015288
An Enhanced Privacy-Preserving Authentication Scheme for Vehicle Sensor Networks.
Zhou, Yousheng; Zhao, Xiaofeng; Jiang, Yi; Shang, Fengjun; Deng, Shaojiang; Wang, Xiaojun
2017-12-08
Vehicle sensor networks (VSNs) are ushering in a promising future by enabling more intelligent transportation systems and providing a more efficient driving experience. However, because of their inherent openness, VSNs are subject to a large number of potential security threats. Although various authentication schemes have been proposed for addressing security problems, they are not suitable for VSN applications because of their high computation and communication costs. Chuang and Lee have developed a trust-extended authentication mechanism (TEAM) for vehicle-to-vehicle communication using a transitive trust relationship, which they claim can resist various attacks. However, it fails to counter internal attacks because of the utilization of a shared secret key. In this paper, to eliminate the vulnerability of TEAM, an enhanced privacy-preserving authentication scheme for VSNs is constructed. The security of our proposed scheme is proven under the random oracle model based on the assumption of the computational Diffie-Hellman problem.
Security policies and trust in ubiquitous computing.
Joshi, Anupam; Finin, Tim; Kagal, Lalana; Parker, Jim; Patwardhan, Anand
2008-10-28
Ubiquitous environments comprise resource-constrained mobile and wearable devices and computational elements embedded in everyday artefacts. These are connected to each other using both infrastructure-based as well as short-range ad hoc networks. Limited Internet connectivity limits the use of conventional security mechanisms such as public key infrastructures and other forms of server-centric authentication. Under these circumstances, peer-to-peer interactions are well suited for not just information interchange, but also managing security and privacy. However, practical solutions for protecting mobile devices, preserving privacy, evaluating trust and determining the reliability and accuracy of peer-provided data in such interactions are still in their infancy. Our research is directed towards providing stronger assurances of the reliability and trustworthiness of information and services, and the use of declarative policy-driven approaches to handle the open and dynamic nature of such systems. This paper provides an overview of some of the challenges and issues, and points out directions for progress.
An Enhanced Privacy-Preserving Authentication Scheme for Vehicle Sensor Networks
Zhou, Yousheng; Zhao, Xiaofeng; Jiang, Yi; Shang, Fengjun; Deng, Shaojiang; Wang, Xiaojun
2017-01-01
Vehicle sensor networks (VSNs) are ushering in a promising future by enabling more intelligent transportation systems and providing a more efficient driving experience. However, because of their inherent openness, VSNs are subject to a large number of potential security threats. Although various authentication schemes have been proposed for addressing security problems, they are not suitable for VSN applications because of their high computation and communication costs. Chuang and Lee have developed a trust-extended authentication mechanism (TEAM) for vehicle-to-vehicle communication using a transitive trust relationship, which they claim can resist various attacks. However, it fails to counter internal attacks because of the utilization of a shared secret key. In this paper, to eliminate the vulnerability of TEAM, an enhanced privacy-preserving authentication scheme for VSNs is constructed. The security of our proposed scheme is proven under the random oracle model based on the assumption of the computational Diffie–Hellman problem. PMID:29292792
An integrative architecture for a sensor-supported trust management system.
Trček, Denis
2012-01-01
Trust plays a key role not only in e-worlds and emerging pervasive computing environments, but also already for millennia in human societies. Trust management solutions that have being around now for some fifteen years were primarily developed for the above mentioned cyber environments and they are typically focused on artificial agents, sensors, etc. However, this paper presents extensions of a new methodology together with architecture for trust management support that is focused on humans and human-like agents. With this methodology and architecture sensors play a crucial role. The architecture presents an already deployable tool for multi and interdisciplinary research in various areas where humans are involved. It provides new ways to obtain an insight into dynamics and evolution of such structures, not only in pervasive computing environments, but also in other important areas like management and decision making support.
Williams, Susan L; Ronan, Kevin
2014-12-01
A limited number of studies have examined the 'miniaturization of community' model which is based on belief that 'new' individualistic, and narrower forms of social participation, do not promote generalized trust in others. Little is known about miniaturization of community and self-reported health, physical health and psychological health in Australia. Data from a 2009 computer-assisted-telephone-interview survey was used to investigate generalized trust, social participation and health-related quality of life in a regional Australian population (n = 1273; mean age 51.2 years). Logistic regression analyses were performed to investigate the associations between generalized trust, social participation and poor self-reported health (global self-rated, psychological and physical), and included four social participation/trust categories. A majority (67%) reported high generalized trust of others, 54% were categorized as high social participators. Miniaturization of community was a risk factor for poor self-rated psychological health across genders, and a risk factor for poor self-rated health for males. For women, low social participation (irrespective of trust level) was associated with poor self-reported health. Given current and previous findings, there is a need for further research in a range of contexts which explores the underlying concept of miniaturization of community, that is, the changes in social participation and social networks which may negatively impact community health. © The Author (2013). Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.
A protect solution for data security in mobile cloud storage
NASA Astrophysics Data System (ADS)
Yu, Xiaojun; Wen, Qiaoyan
2013-03-01
It is popular to access the cloud storage by mobile devices. However, this application suffer data security risk, especial the data leakage and privacy violate problem. This risk exists not only in cloud storage system, but also in mobile client platform. To reduce the security risk, this paper proposed a new security solution. It makes full use of the searchable encryption and trusted computing technology. Given the performance limit of the mobile devices, it proposes the trusted proxy based protection architecture. The design basic idea, deploy model and key flows are detailed. The analysis from the security and performance shows the advantage.
Trusted Storage: Putting Security and Data Together
NASA Astrophysics Data System (ADS)
Willett, Michael; Anderson, Dave
State and Federal breach notification legislation mandates that the affected parties be notified in case of a breach of sensitive personal data, unless the data was provably encrypted. Self-encrypting hard drives provide the superior solution for encrypting data-at-rest when compared to software-based solutions. Self-encrypting hard drives, from the laptop to the data center, have been standardized across the hard drive industry by the Trusted Computing Group. Advantages include: simplified management (including keys), no performance impact, quick data erasure and drive re-purposing, no interference with end-to-end data integrity metrics, always encrypting, no cipher-text exposure, and scalability in large data centers.
Investment and repayment in a trust game after ventromedial prefrontal damage.
Moretto, Giovanna; Sellitto, Manuela; di Pellegrino, Giuseppe
2013-01-01
Although trust and reciprocity are ubiquitous in social exchange, their neurobiological substrate remains largely unknown. Here, we investigated the effect of damage to the ventromedial prefrontal cortex (vmPFC)-a brain region critical for valuing social information-on individuals' decisions in a trust game and in a risk game. In the trust game, one player, the investor, is endowed with a sum of money, which she can keep or invest. The amount she decides to invest is tripled and sent to the other player, the trustee, who then decides what fraction to return to the investor. In separate runs, ten patients with focal bilateral damage to the vmPFC and control participants made decision while playing in the role of either investor or trustee with different anonymous counterparts in each run. A risk game was also included in which the investor faced exactly the same decisions as in the trust game, but a random device (i.e., a computer), not another player, determined the final payoffs. Results showed that vmPFC patients' investments were not modulated by the type of opponent player (e.g., human vs. computer) present in the environment. Thus, vmPFC patients showed comparable risk-taking preferences both in social (trust game) and nonsocial (risk game) contexts. In stark contrast, control participants were less willing to take risk and invest when they believed that they were interacting with people than a computer. Furthermore, when acted as trustee, vmPFC patients made lower back transfers toward investors, thereby showing less reciprocity behavior. Taken together, these results indicate that social valuation and emotion subserved by vmPFC have a critical role in trusting and reciprocity decisions. The present findings support the hypothesis that vmPFC damage may impair affective systems specifically designed for mediating social transaction with other individuals.
PKI-based secure mobile access to electronic health services and data.
Kambourakis, G; Maglogiannis, I; Rouskas, A
2005-01-01
Recent research works examine the potential employment of public-key cryptography schemes in e-health environments. In such systems, where a Public Key Infrastructure (PKI) is established beforehand, Attribute Certificates (ACs) and public key enabled protocols like TLS, can provide the appropriate mechanisms to effectively support authentication, authorization and confidentiality services. In other words, mutual trust and secure communications between all the stakeholders, namely physicians, patients and e-health service providers, can be successfully established and maintained. Furthermore, as the recently introduced mobile devices with access to computer-based patient record systems are expanding, the need of physicians and nurses to interact increasingly with such systems arises. Considering public key infrastructure requirements for mobile online health networks, this paper discusses the potential use of Attribute Certificates (ACs) in an anticipated trust model. Typical trust interactions among doctors, patients and e-health providers are presented, indicating that resourceful security mechanisms and trust control can be obtained and implemented. The application of attribute certificates to support medical mobile service provision along with the utilization of the de-facto TLS protocol to offer competent confidentiality and authorization services is also presented and evaluated through experimentation, using both the 802.11 WLAN and General Packet Radio Service (GPRS) networks.
Kushlev, Kostadin; Proulx, Jason D E
2016-01-01
In an age already saturated with information, the ongoing revolution in mobile computing has expanded the realm of immediate information access far beyond our homes and offices. In addition to changing where people can access information, mobile computing has changed what information people access-from finding specific directions to a restaurant to exploring nearby businesses when on the go. Does this ability to instantly gratify our information needs anytime and anywhere have any bearing on how much we trust those around us-from neighbors to strangers? Using data from a large nationally representative survey (World Values Survey: Wave 6), we found that the more people relied on their mobile phones for information, the less they trusted strangers, neighbors and people from other religions and nationalities. In contrast, obtaining information through any other method-including TV, radio, newspapers, and even the Internet more broadly-predicted higher trust in those groups. Mobile information had no bearing on how much people trusted close others, such as their family. Although causality cannot be inferred, these findings provide an intriguing first glimpse into the possible unforeseen costs of convenient information access for the social lubricant of society-our sense of trust in one another.
Trust and Credibility in Web-Based Health Information: A Review and Agenda for Future Research
2017-01-01
Background Internet sources are becoming increasingly important in seeking health information, such that they may have a significant effect on health care decisions and outcomes. Hence, given the wide range of different sources of Web-based health information (WHI) from different organizations and individuals, it is important to understand how information seekers evaluate and select the sources that they use, and more specifically, how they assess their credibility and trustworthiness. Objective The aim of this study was to review empirical studies on trust and credibility in the use of WHI. The article seeks to present a profile of the research conducted on trust and credibility in WHI seeking, to identify the factors that impact judgments of trustworthiness and credibility, and to explore the role of demographic factors affecting trust formation. On this basis, it aimed to identify the gaps in current knowledge and to propose an agenda for future research. Methods A systematic literature review was conducted. Searches were conducted using a variety of combinations of the terms WHI, trust, credibility, and their variants in four multi-disciplinary and four health-oriented databases. Articles selected were published in English from 2000 onwards; this process generated 3827 unique records. After the application of the exclusion criteria, 73 were analyzed fully. Results Interest in this topic has persisted over the last 15 years, with articles being published in medicine, social science, and computer science and originating mostly from the United States and the United Kingdom. Documents in the final dataset fell into 3 categories: (1) those using trust or credibility as a dependent variable, (2) those using trust or credibility as an independent variable, and (3) studies of the demographic factors that influence the role of trust or credibility in WHI seeking. There is a consensus that website design, clear layout, interactive features, and the authority of the owner have a positive effect on trust or credibility, whereas advertising has a negative effect. With regard to content features, authority of the author, ease of use, and content have a positive effect on trust or credibility formation. Demographic factors influencing trust formation are age, gender, and perceived health status. Conclusions There is considerable scope for further research. This includes increased clarity of the interaction between the variables associated with health information seeking, increased consistency on the measurement of trust and credibility, a greater focus on specific WHI sources, and enhanced understanding of the impact of demographic variables on trust and credibility judgments. PMID:28630033
CONORBIT: constrained optimization by radial basis function interpolation in trust regions
Regis, Rommel G.; Wild, Stefan M.
2016-09-26
Here, this paper presents CONORBIT (CONstrained Optimization by Radial Basis function Interpolation in Trust regions), a derivative-free algorithm for constrained black-box optimization where the objective and constraint functions are computationally expensive. CONORBIT employs a trust-region framework that uses interpolating radial basis function (RBF) models for the objective and constraint functions, and is an extension of the ORBIT algorithm. It uses a small margin for the RBF constraint models to facilitate the generation of feasible iterates, and extensive numerical tests confirm that such a margin is helpful in improving performance. CONORBIT is compared with other algorithms on 27 test problems, amore » chemical process optimization problem, and an automotive application. Numerical results show that CONORBIT performs better than COBYLA, a sequential penalty derivative-free method, an augmented Lagrangian method, a direct search method, and another RBF-based algorithm on the test problems and on the automotive application.« less
A New Cloud Architecture of Virtual Trusted Platform Modules
NASA Astrophysics Data System (ADS)
Liu, Dongxi; Lee, Jack; Jang, Julian; Nepal, Surya; Zic, John
We propose and implement a cloud architecture of virtual Trusted Platform Modules (TPMs) to improve the usability of TPMs. In this architecture, virtual TPMs can be obtained from the TPM cloud on demand. Hence, the TPM functionality is available for applications that do not have physical TPMs in their local platforms. Moreover, the TPM cloud allows users to access their keys and data in the same virtual TPM even if they move to untrusted platforms. The TPM cloud is easy to access for applications in different languages since cloud computing delivers services in standard protocols. The functionality of the TPM cloud is demonstrated by applying it to implement the Needham-Schroeder public-key protocol for web authentications, such that the strong security provided by TPMs is integrated into high level applications. The chain of trust based on the TPM cloud is discussed and the security properties of the virtual TPMs in the cloud is analyzed.
Computing Information Value from RDF Graph Properties
DOE Office of Scientific and Technical Information (OSTI.GOV)
al-Saffar, Sinan; Heileman, Gregory
2010-11-08
Information value has been implicitly utilized and mostly non-subjectively computed in information retrieval (IR) systems. We explicitly define and compute the value of an information piece as a function of two parameters, the first is the potential semantic impact the target information can subjectively have on its recipient's world-knowledge, and the second parameter is trust in the information source. We model these two parameters as properties of RDF graphs. Two graphs are constructed, a target graph representing the semantics of the target body of information and a context graph representing the context of the consumer of that information. We computemore » information value subjectively as a function of both potential change to the context graph (impact) and the overlap between the two graphs (trust). Graph change is computed as a graph edit distance measuring the dissimilarity between the context graph before and after the learning of the target graph. A particular application of this subjective information valuation is in the construction of a personalized ranking component in Web search engines. Based on our method, we construct a Web re-ranking system that personalizes the information experience for the information-consumer.« less
Carlisle, Daloni
Innovative use of information technology is improving patient outcomes and making nurses' working lives easier. Nurses at a Birmingham trust are using handheld computers to record vital observations and give early warning to senior clinicians if a patient is deteriorating. The system reflects a trend for healthcare technology based around the needs of clinicians and patients.
Distributed Noise Generation for Density Estimation Based Clustering without Trusted Third Party
NASA Astrophysics Data System (ADS)
Su, Chunhua; Bao, Feng; Zhou, Jianying; Takagi, Tsuyoshi; Sakurai, Kouichi
The rapid growth of the Internet provides people with tremendous opportunities for data collection, knowledge discovery and cooperative computation. However, it also brings the problem of sensitive information leakage. Both individuals and enterprises may suffer from the massive data collection and the information retrieval by distrusted parties. In this paper, we propose a privacy-preserving protocol for the distributed kernel density estimation-based clustering. Our scheme applies random data perturbation (RDP) technique and the verifiable secret sharing to solve the security problem of distributed kernel density estimation in [4] which assumed a mediate party to help in the computation.
An Integrative Architecture for a Sensor-Supported Trust Management System
Trček, Denis
2012-01-01
Trust plays a key role not only in e-worlds and emerging pervasive computing environments, but also already for millennia in human societies. Trust management solutions that have being around now for some fifteen years were primarily developed for the above mentioned cyber environments and they are typically focused on artificial agents, sensors, etc. However, this paper presents extensions of a new methodology together with architecture for trust management support that is focused on humans and human-like agents. With this methodology and architecture sensors play a crucial role. The architecture presents an already deployable tool for multi and interdisciplinary research in various areas where humans are involved. It provides new ways to obtain an insight into dynamics and evolution of such structures, not only in pervasive computing environments, but also in other important areas like management and decision making support. PMID:23112628
Online trust, trustworthiness, or assurance?
Cheshire, Coye
2011-01-01
Every day, individuals around the world retrieve, share, and exchange information on the Internet. We interact online to share personal information, find answers to questions, make financial transactions, play social games, and maintain professional and personal relationships. Sometimes our online interactions take place between two or more humans. In other cases, we rely on computers to manage information on our behalf. In each scenario, risk and uncertainty are essential for determining possible actions and outcomes. This essay highlights common deficiencies in our understanding of key concepts such as trust, trustworthiness, cooperation, and assurance in online environments. Empirical evidence from experimental work in computer-mediated environments underscores the promises and perils of overreliance on security and assurance structures as replacements for interpersonal trust. These conceptual distinctions are critical because the future shape of the Internet will depend on whether we build assurance structures to limit and control ambiguity or allow trust to emerge in the presence of risk and uncertainty.
Computing Distrust in Social Media
2015-05-01
trusted friends and they are also likely to accept recommendations from trustworthy users. Therefore we proposed LOCABEL to exploit local and global... trustworthy [52]. To capture global information from trust/distrust, we can use user reputation scores to weight the im- portance of their recommendations...Transactions on, 22(10):1345–1359, 2010. [63] J. B. Rotter. Interpersonal trust, trustworthiness , and gullibility. American psychologist, 35(1):1
Web-Based Dissemination System for the Trusted Computing Exemplar Project
2005-06-01
6 3. Fiasco Microkernel ..............................................................................6 4. Apache Web Server...Fiasco Microkernel The next project examined was the Fiasco Microkernel developed by the Dresden University of Technology. This dissemination...System,” 1999, http://www.eros-os.org, Accessed: May 2005. [5] “The Fiasco Microkernel ,” February 2004, http://os.inf.tu-dresden.de/fiasco/, Accessed
Intelligent cloud computing security using genetic algorithm as a computational tools
NASA Astrophysics Data System (ADS)
Razuky AL-Shaikhly, Mazin H.
2018-05-01
An essential change had occurred in the field of Information Technology which represented with cloud computing, cloud giving virtual assets by means of web yet awesome difficulties in the field of information security and security assurance. Currently main problem with cloud computing is how to improve privacy and security for cloud “cloud is critical security”. This paper attempts to solve cloud security by using intelligent system with genetic algorithm as wall to provide cloud data secure, all services provided by cloud must detect who receive and register it to create list of users (trusted or un-trusted) depend on behavior. The execution of present proposal has shown great outcome.
Trust and Credibility in Web-Based Health Information: A Review and Agenda for Future Research.
Sbaffi, Laura; Rowley, Jennifer
2017-06-19
Internet sources are becoming increasingly important in seeking health information, such that they may have a significant effect on health care decisions and outcomes. Hence, given the wide range of different sources of Web-based health information (WHI) from different organizations and individuals, it is important to understand how information seekers evaluate and select the sources that they use, and more specifically, how they assess their credibility and trustworthiness. The aim of this study was to review empirical studies on trust and credibility in the use of WHI. The article seeks to present a profile of the research conducted on trust and credibility in WHI seeking, to identify the factors that impact judgments of trustworthiness and credibility, and to explore the role of demographic factors affecting trust formation. On this basis, it aimed to identify the gaps in current knowledge and to propose an agenda for future research. A systematic literature review was conducted. Searches were conducted using a variety of combinations of the terms WHI, trust, credibility, and their variants in four multi-disciplinary and four health-oriented databases. Articles selected were published in English from 2000 onwards; this process generated 3827 unique records. After the application of the exclusion criteria, 73 were analyzed fully. Interest in this topic has persisted over the last 15 years, with articles being published in medicine, social science, and computer science and originating mostly from the United States and the United Kingdom. Documents in the final dataset fell into 3 categories: (1) those using trust or credibility as a dependent variable, (2) those using trust or credibility as an independent variable, and (3) studies of the demographic factors that influence the role of trust or credibility in WHI seeking. There is a consensus that website design, clear layout, interactive features, and the authority of the owner have a positive effect on trust or credibility, whereas advertising has a negative effect. With regard to content features, authority of the author, ease of use, and content have a positive effect on trust or credibility formation. Demographic factors influencing trust formation are age, gender, and perceived health status. There is considerable scope for further research. This includes increased clarity of the interaction between the variables associated with health information seeking, increased consistency on the measurement of trust and credibility, a greater focus on specific WHI sources, and enhanced understanding of the impact of demographic variables on trust and credibility judgments. ©Laura Sbaffi, Jennifer Rowley. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 19.06.2017.
Greenberger-Horne-Zeilinger states-based blind quantum computation with entanglement concentration.
Zhang, Xiaoqian; Weng, Jian; Lu, Wei; Li, Xiaochun; Luo, Weiqi; Tan, Xiaoqing
2017-09-11
In blind quantum computation (BQC) protocol, the quantum computability of servers are complicated and powerful, while the clients are not. It is still a challenge for clients to delegate quantum computation to servers and keep the clients' inputs, outputs and algorithms private. Unfortunately, quantum channel noise is unavoidable in the practical transmission. In this paper, a novel BQC protocol based on maximally entangled Greenberger-Horne-Zeilinger (GHZ) states is proposed which doesn't need a trusted center. The protocol includes a client and two servers, where the client only needs to own quantum channels with two servers who have full-advantage quantum computers. Two servers perform entanglement concentration used to remove the noise, where the success probability can almost reach 100% in theory. But they learn nothing in the process of concentration because of the no-signaling principle, so this BQC protocol is secure and feasible.
Influencing Trust for Human-Automation Collaborative Scheduling of Multiple Unmanned Vehicles.
Clare, Andrew S; Cummings, Mary L; Repenning, Nelson P
2015-11-01
We examined the impact of priming on operator trust and system performance when supervising a decentralized network of heterogeneous unmanned vehicles (UVs). Advances in autonomy have enabled a future vision of single-operator control of multiple heterogeneous UVs. Real-time scheduling for multiple UVs in uncertain environments requires the computational ability of optimization algorithms combined with the judgment and adaptability of human supervisors. Because of system and environmental uncertainty, appropriate operator trust will be instrumental to maintain high system performance and prevent cognitive overload. Three groups of operators experienced different levels of trust priming prior to conducting simulated missions in an existing, multiple-UV simulation environment. Participants who play computer and video games frequently were found to have a higher propensity to overtrust automation. By priming gamers to lower their initial trust to a more appropriate level, system performance was improved by 10% as compared to gamers who were primed to have higher trust in the automation. Priming was successful at adjusting the operator's initial and dynamic trust in the automated scheduling algorithm, which had a substantial impact on system performance. These results have important implications for personnel selection and training for futuristic multi-UV systems under human supervision. Although gamers may bring valuable skills, they may also be potentially prone to automation bias. Priming during training and regular priming throughout missions may be one potential method for overcoming this propensity to overtrust automation. © 2015, Human Factors and Ergonomics Society.
Terwel, Bart W; Harinck, Fieke; Ellemers, Naomi; Daamen, Dancker D L
2009-08-01
Public trust in organizations that are involved in the management and use of new technologies affects lay judgments about the risks and benefits associated with these technologies. In turn, judgments about risks and benefits influence lay attitudes toward these technologies. The validity of this (indirect) effect of trust on lay attitudes toward new technologies, which is referred to as the causal chain account of trust, has up till now only been examined in correlational research. The two studies reported in this article used an experimental approach to more specifically test the causal chain account of trust in the context of carbon dioxide capture and storage technology (CCS). Complementing existing literature, the current studies explicitly distinguished between two different types of trust in organizations: competence-based trust (Study 1) and integrity-based trust (Study 2). In line with predictions, results showed that the organizational position regarding CCS implementation (pro versus con) more strongly affected people's risk and benefit perceptions and their subsequent acceptance of CCS when competence-based trust was high rather than low. In contrast, the organizational position had a greater impact on people's level of CCS acceptance when integrity-based trust was low rather than high.
A game theory-based trust measurement model for social networks.
Wang, Yingjie; Cai, Zhipeng; Yin, Guisheng; Gao, Yang; Tong, Xiangrong; Han, Qilong
2016-01-01
In social networks, trust is a complex social network. Participants in online social networks want to share information and experiences with as many reliable users as possible. However, the modeling of trust is complicated and application dependent. Modeling trust needs to consider interaction history, recommendation, user behaviors and so on. Therefore, modeling trust is an important focus for online social networks. We propose a game theory-based trust measurement model for social networks. The trust degree is calculated from three aspects, service reliability, feedback effectiveness, recommendation credibility, to get more accurate result. In addition, to alleviate the free-riding problem, we propose a game theory-based punishment mechanism for specific trust and global trust, respectively. We prove that the proposed trust measurement model is effective. The free-riding problem can be resolved effectively through adding the proposed punishment mechanism.
2007 Beyond SBIR Phase II: Bringing Technology Edge to the Warfighter
2007-08-23
Systems Trade-Off Analysis and Optimization Verification and Validation On-Board Diagnostics and Self - healing Security and Anti-Tampering Rapid...verification; Safety and reliability analysis of flight and mission critical systems On-Board Diagnostics and Self - Healing Model-based monitoring and... self - healing On-board diagnostics and self - healing ; Autonomic computing; Network intrusion detection and prevention Anti-Tampering and Trust
NASA Astrophysics Data System (ADS)
Ramalingam, Srikumar
2001-11-01
A highly secure mobile agent system is very important for a mobile computing environment. The security issues in mobile agent system comprise protecting mobile hosts from malicious agents, protecting agents from other malicious agents, protecting hosts from other malicious hosts and protecting agents from malicious hosts. Using traditional security mechanisms the first three security problems can be solved. Apart from using trusted hardware, very few approaches exist to protect mobile code from malicious hosts. Some of the approaches to solve this problem are the use of trusted computing, computing with encrypted function, steganography, cryptographic traces, Seal Calculas, etc. This paper focuses on the simulation of some of these existing techniques in the designed mobile language. Some new approaches to solve malicious network problem and agent tampering problem are developed using public key encryption system and steganographic concepts. The approaches are based on encrypting and hiding the partial solutions of the mobile agents. The partial results are stored and the address of the storage is destroyed as the agent moves from one host to another host. This allows only the originator to make use of the partial results. Through these approaches some of the existing problems are solved.
Cross-cultural differences in relationship- and group-based trust.
Yuki, Masaki; Maddux, William W; Brewer, Marilynn B; Takemura, Kosuke
2005-01-01
Two experiments explored differences in depersonalized trust (trust toward a relatively unknown target person) across cultures. Based on a recent theoretical framework that postulates predominantly different bases for group behaviors in Western cultures versus Eastern cultures, it was predicted that Americans would tend to trust people primarily based on whether they shared category memberships; however, trust for Japanese was expected to be based on the likelihood of sharing direct or indirect interpersonal links. Results supported these predictions. In both Study 1 (questionnaire study) and Study 2 (online money allocation game), Americans trusted ingroup members more than outgroup members; however, the existence of a potential indirect relationship link increased trust for outgroup members more for Japanese than for Americans. Implications for understanding group processes across cultures are discussed.
Frisse, Mark E
2016-04-01
New mobile devices, social networks, analytics, and communications technologies are emerging at an unparalleled rate. As a result, academic health centers will face both new opportunities and formidable challenges. Unlike previous transitions from paper-based systems to networked computer systems, these new technologies are the product of new entrepreneurial and commercial interests driven by consumers. As these new commercial products and services are more widely adopted, the likelihood grows that data will be used in unanticipated ways inconsistent with societal norms. Academic health centers will have to understand the implications of these technologies and engage more actively in processes governing the collection, aggregation, and use of health data produced in a new era of consumer-driven health care technology. Maintaining public trust should be a paramount concern.
Toward Scalable Trustworthy Computing Using the Human-Physiology-Immunity Metaphor
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hively, Lee M; Sheldon, Frederick T
The cybersecurity landscape consists of an ad hoc patchwork of solutions. Optimal cybersecurity is difficult for various reasons: complexity, immense data and processing requirements, resource-agnostic cloud computing, practical time-space-energy constraints, inherent flaws in 'Maginot Line' defenses, and the growing number and sophistication of cyberattacks. This article defines the high-priority problems and examines the potential solution space. In that space, achieving scalable trustworthy computing and communications is possible through real-time knowledge-based decisions about cyber trust. This vision is based on the human-physiology-immunity metaphor and the human brain's ability to extract knowledge from data and information. The article outlines future steps towardmore » scalable trustworthy systems requiring a long-term commitment to solve the well-known challenges.« less
Towards Dynamic Authentication in the Grid — Secure and Mobile Business Workflows Using GSet
NASA Astrophysics Data System (ADS)
Mangler, Jürgen; Schikuta, Erich; Witzany, Christoph; Jorns, Oliver; Ul Haq, Irfan; Wanek, Helmut
Until now, the research community mainly focused on the technical aspects of Grid computing and neglected commercial issues. However, recently the community tends to accept that the success of the Grid is crucially based on commercial exploitation. In our vision Foster's and Kesselman's statement "The Grid is all about sharing." has to be extended by "... and making money out of it!". To allow for the realization of this vision the trust-worthyness of the underlying technology needs to be ensured. This can be achieved by the use of gSET (Gridified Secure Electronic Transaction) as a basic technology for trust management and secure accounting in the presented Grid based workflow. We present a framework, conceptually and technically, from the area of the Mobile-Grid, which justifies the Grid infrastructure as a viable platform to enable commercially successful business workflows.
Authenticity techniques for PACS images and records
NASA Astrophysics Data System (ADS)
Wong, Stephen T. C.; Abundo, Marco; Huang, H. K.
1995-05-01
Along with the digital radiology environment supported by picture archiving and communication systems (PACS) comes a new problem: How to establish trust in multimedia medical data that exist only in the easily altered memory of a computer. Trust is characterized in terms of integrity and privacy of digital data. Two major self-enforcing techniques can be used to assure the authenticity of electronic images and text -- key-based cryptography and digital time stamping. Key-based cryptography associates the content of an image with the originator using one or two distinct keys and prevents alteration of the document by anyone other than the originator. A digital time stamping algorithm generates a characteristic `digital fingerprint' for the original document using a mathematical hash function, and checks that it has not been modified. This paper discusses these cryptographic algorithms and their appropriateness for a PACS environment. It also presents experimental results of cryptographic algorithms on several imaging modalities.
A trust region-based approach to optimize triple response systems
NASA Astrophysics Data System (ADS)
Fan, Shu-Kai S.; Fan, Chihhao; Huang, Chia-Fen
2014-05-01
This article presents a new computing procedure for the global optimization of the triple response system (TRS) where the response functions are non-convex quadratics and the input factors satisfy a radial constrained region of interest. The TRS arising from response surface modelling can be approximated using a nonlinear mathematical program that considers one primary objective function and two secondary constraint functions. An optimization algorithm named the triple response surface algorithm (TRSALG) is proposed to determine the global optimum for the non-degenerate TRS. In TRSALG, the Lagrange multipliers of the secondary functions are determined using the Hooke-Jeeves search method and the Lagrange multiplier of the radial constraint is located using the trust region method within the global optimality space. The proposed algorithm is illustrated in terms of three examples appearing in the quality-control literature. The results of TRSALG compared to a gradient-based method are also presented.
A WPS Based Architecture for Climate Data Analytic Services (CDAS) at NASA
NASA Astrophysics Data System (ADS)
Maxwell, T. P.; McInerney, M.; Duffy, D.; Carriere, L.; Potter, G. L.; Doutriaux, C.
2015-12-01
Faced with unprecedented growth in the Big Data domain of climate science, NASA has developed the Climate Data Analytic Services (CDAS) framework. This framework enables scientists to execute trusted and tested analysis operations in a high performance environment close to the massive data stores at NASA. The data is accessed in standard (NetCDF, HDF, etc.) formats in a POSIX file system and processed using trusted climate data analysis tools (ESMF, CDAT, NCO, etc.). The framework is structured as a set of interacting modules allowing maximal flexibility in deployment choices. The current set of module managers include: Staging Manager: Runs the computation locally on the WPS server or remotely using tools such as celery or SLURM. Compute Engine Manager: Runs the computation serially or distributed over nodes using a parallelization framework such as celery or spark. Decomposition Manger: Manages strategies for distributing the data over nodes. Data Manager: Handles the import of domain data from long term storage and manages the in-memory and disk-based caching architectures. Kernel manager: A kernel is an encapsulated computational unit which executes a processor's compute task. Each kernel is implemented in python exploiting existing analysis packages (e.g. CDAT) and is compatible with all CDAS compute engines and decompositions. CDAS services are accessed via a WPS API being developed in collaboration with the ESGF Compute Working Team to support server-side analytics for ESGF. The API can be executed using either direct web service calls, a python script or application, or a javascript-based web application. Client packages in python or javascript contain everything needed to make CDAS requests. The CDAS architecture brings together the tools, data storage, and high-performance computing required for timely analysis of large-scale data sets, where the data resides, to ultimately produce societal benefits. It is is currently deployed at NASA in support of the Collaborative REAnalysis Technical Environment (CREATE) project, which centralizes numerous global reanalysis datasets onto a single advanced data analytics platform. This service permits decision makers to investigate climate changes around the globe, inspect model trends, compare multiple reanalysis datasets, and variability.
The Double-System Architecture for Trusted OS
NASA Astrophysics Data System (ADS)
Zhao, Yong; Li, Yu; Zhan, Jing
With the development of computer science and technology, current secure operating systems failed to respond to many new security challenges. Trusted operating system (TOS) is proposed to try to solve these problems. However, there are no mature, unified architectures for the TOS yet, since most of them cannot make clear of the relationship between security mechanism and the trusted mechanism. Therefore, this paper proposes a double-system architecture (DSA) for the TOS to solve the problem. The DSA is composed of the Trusted System (TS) and the Security System (SS). We constructed the TS by establishing a trusted environment and realized related SS. Furthermore, we proposed the Trusted Information Channel (TIC) to protect the information flow between TS and SS. In a word, the double system architecture we proposed can provide reliable protection for the OS through the SS with the supports provided by the TS.
Trust-aware recommendation for improving aggregate diversity
NASA Astrophysics Data System (ADS)
Liu, Haifeng; Bai, Xiaomei; Yang, Zhuo; Tolba, Amr; Xia, Feng
2015-10-01
Recommender systems are becoming increasingly important and prevalent because of the ability of solving information overload. In recent years, researchers are paying increasing attention to aggregate diversity as a key metric beyond accuracy, because improving aggregate recommendation diversity may increase long tails and sales diversity. Trust is often used to improve recommendation accuracy. However, how to utilize trust to improve aggregate recommendation diversity is unexplored. In this paper, we focus on solving this problem and propose a novel trust-aware recommendation method by incorporating time factor into similarity computation. The rationale underlying the proposed method is that, trustees with later creation time of trust relation can bring more diverse items to recommend to their trustors than other trustees with earlier creation time of trust relation. Through relevant experiments on publicly available dataset, we demonstrate that the proposed method outperforms the baseline method in terms of aggregate diversity while maintaining almost the same recall.
Hu, Fei; Hao, Qi; Lukowiak, Marcin; Sun, Qingquan; Wilhelm, Kyle; Radziszowski, Stanisław; Wu, Yao
2010-11-01
Implantable medical devices (IMDs) have played an important role in many medical fields. Any failure in IMDs operations could cause serious consequences and it is important to protect the IMDs access from unauthenticated access. This study investigates secure IMD data collection within a telehealthcare [mobile health (m-health)] network. We use medical sensors carried by patients to securely access IMD data and perform secure sensor-to-sensor communications between patients to relay the IMD data to a remote doctor's server. To meet the requirements on low computational complexity, we choose N-th degree truncated polynomial ring (NTRU)-based encryption/decryption to secure IMD-sensor and sensor-sensor communications. An extended matryoshkas model is developed to estimate direct/indirect trust relationship among sensors. An NTRU hardware implementation in very large integrated circuit hardware description language is studied based on industry Standard IEEE 1363 to increase the speed of key generation. The performance analysis results demonstrate the security robustness of the proposed IMD data access trust model.
Interactivity Communication and Trust: Further Studies of Leadership in the Electronic Age
2005-03-01
composure, (h) favorable evaluation, and (i) decision-making effectiveness. Sample and Method. Participants (N = 146) were undergraduate students in...impairs decision quality when deceit and invalid information are introduced. Sample and Method. Participants (N = 126) were undergraduate students enrolled... undergraduate business students (N = 66) in two geographically distant U.S. universities participated in a four-week project using a web-based computer
College Education and Social Trust: An Evidence-Based Study on the Causal Mechanisms
ERIC Educational Resources Information Center
Huang, Jian; van den Brink, Henriette Maassen; Groot, Wim
2011-01-01
This paper examines the influence of college education on social trust at the individual level. Based on the literature of trust and social trust, we hypothesize that life experience/development since adulthood and perceptions of cultural/social structures are two primary channels in the causal linkage between college education and social trust.…
Trust information-based privacy architecture for ubiquitous health.
Ruotsalainen, Pekka Sakari; Blobel, Bernd; Seppälä, Antto; Nykänen, Pirkko
2013-10-08
Ubiquitous health is defined as a dynamic network of interconnected systems that offers health services independent of time and location to a data subject (DS). The network takes place in open and unsecure information space. It is created and managed by the DS who sets rules that regulate the way personal health information is collected and used. Compared to health care, it is impossible in ubiquitous health to assume the existence of a priori trust between the DS and service providers and to produce privacy using static security services. In ubiquitous health features, business goals and regulations systems followed often remain unknown. Furthermore, health care-specific regulations do not rule the ways health data is processed and shared. To be successful, ubiquitous health requires novel privacy architecture. The goal of this study was to develop a privacy management architecture that helps the DS to create and dynamically manage the network and to maintain information privacy. The architecture should enable the DS to dynamically define service and system-specific rules that regulate the way subject data is processed. The architecture should provide to the DS reliable trust information about systems and assist in the formulation of privacy policies. Furthermore, the architecture should give feedback upon how systems follow the policies of DS and offer protection against privacy and trust threats existing in ubiquitous environments. A sequential method that combines methodologies used in system theory, systems engineering, requirement analysis, and system design was used in the study. In the first phase, principles, trust and privacy models, and viewpoints were selected. Thereafter, functional requirements and services were developed on the basis of a careful analysis of existing research published in journals and conference proceedings. Based on principles, models, and requirements, architectural components and their interconnections were developed using system analysis. The architecture mimics the way humans use trust information in decision making, and enables the DS to design system-specific privacy policies using computational trust information that is based on systems' measured features. The trust attributes that were developed describe the level systems for support awareness and transparency, and how they follow general and domain-specific regulations and laws. The monitoring component of the architecture offers dynamic feedback concerning how the system enforces the polices of DS. The privacy management architecture developed in this study enables the DS to dynamically manage information privacy in ubiquitous health and to define individual policies for all systems considering their trust value and corresponding attributes. The DS can also set policies for secondary use and reuse of health information. The architecture offers protection against privacy threats existing in ubiquitous environments. Although the architecture is targeted to ubiquitous health, it can easily be modified to other ubiquitous applications.
Trust Information-Based Privacy Architecture for Ubiquitous Health
2013-01-01
Background Ubiquitous health is defined as a dynamic network of interconnected systems that offers health services independent of time and location to a data subject (DS). The network takes place in open and unsecure information space. It is created and managed by the DS who sets rules that regulate the way personal health information is collected and used. Compared to health care, it is impossible in ubiquitous health to assume the existence of a priori trust between the DS and service providers and to produce privacy using static security services. In ubiquitous health features, business goals and regulations systems followed often remain unknown. Furthermore, health care-specific regulations do not rule the ways health data is processed and shared. To be successful, ubiquitous health requires novel privacy architecture. Objective The goal of this study was to develop a privacy management architecture that helps the DS to create and dynamically manage the network and to maintain information privacy. The architecture should enable the DS to dynamically define service and system-specific rules that regulate the way subject data is processed. The architecture should provide to the DS reliable trust information about systems and assist in the formulation of privacy policies. Furthermore, the architecture should give feedback upon how systems follow the policies of DS and offer protection against privacy and trust threats existing in ubiquitous environments. Methods A sequential method that combines methodologies used in system theory, systems engineering, requirement analysis, and system design was used in the study. In the first phase, principles, trust and privacy models, and viewpoints were selected. Thereafter, functional requirements and services were developed on the basis of a careful analysis of existing research published in journals and conference proceedings. Based on principles, models, and requirements, architectural components and their interconnections were developed using system analysis. Results The architecture mimics the way humans use trust information in decision making, and enables the DS to design system-specific privacy policies using computational trust information that is based on systems’ measured features. The trust attributes that were developed describe the level systems for support awareness and transparency, and how they follow general and domain-specific regulations and laws. The monitoring component of the architecture offers dynamic feedback concerning how the system enforces the polices of DS. Conclusions The privacy management architecture developed in this study enables the DS to dynamically manage information privacy in ubiquitous health and to define individual policies for all systems considering their trust value and corresponding attributes. The DS can also set policies for secondary use and reuse of health information. The architecture offers protection against privacy threats existing in ubiquitous environments. Although the architecture is targeted to ubiquitous health, it can easily be modified to other ubiquitous applications. PMID:25099213
Liu, Zhiquan; Ma, Jianfeng; Jiang, Zhongyuan; Miao, Yinbin; Gao, Cong
2016-01-01
With the prevalence of Social Networks (SNs) and services, plenty of trust models for Trustworthy Service Recommendation (TSR) in Service-oriented SNs (S-SNs) have been proposed. The reputation-based schemes usually do not contain user preferences and are vulnerable to unfair rating attacks. Meanwhile, the local trust-based schemes generally have low reliability or even fail to work when the trust path is too long or does not exist. Thus it is beneficial to integrate them for TSR in S-SNs. This work improves the state-of-the-art Combining Global and Local Trust (CGLT) scheme and proposes a novel Integrating Reputation and Local Trust (IRLT) model which mainly includes four modules, namely Service Recommendation Interface (SRI) module, Local Trust-based Trust Evaluation (LTTE) module, Reputation-based Trust Evaluation (RTE) module and Aggregation Trust Evaluation (ATE) module. Besides, a synthetic S-SN based on the famous Advogato dataset is deployed and the well-known Discount Cumulative Gain (DCG) metric is employed to measure the service recommendation performance of our IRLT model with comparing to that of the excellent CGLT model. The results illustrate that our IRLT model is slightly superior to the CGLT model in honest environment and significantly outperforms the CGLT model in terms of the robustness against unfair rating attacks. PMID:26963089
Liu, Zhiquan; Ma, Jianfeng; Jiang, Zhongyuan; Miao, Yinbin; Gao, Cong
2016-01-01
With the prevalence of Social Networks (SNs) and services, plenty of trust models for Trustworthy Service Recommendation (TSR) in Service-oriented SNs (S-SNs) have been proposed. The reputation-based schemes usually do not contain user preferences and are vulnerable to unfair rating attacks. Meanwhile, the local trust-based schemes generally have low reliability or even fail to work when the trust path is too long or does not exist. Thus it is beneficial to integrate them for TSR in S-SNs. This work improves the state-of-the-art Combining Global and Local Trust (CGLT) scheme and proposes a novel Integrating Reputation and Local Trust (IRLT) model which mainly includes four modules, namely Service Recommendation Interface (SRI) module, Local Trust-based Trust Evaluation (LTTE) module, Reputation-based Trust Evaluation (RTE) module and Aggregation Trust Evaluation (ATE) module. Besides, a synthetic S-SN based on the famous Advogato dataset is deployed and the well-known Discount Cumulative Gain (DCG) metric is employed to measure the service recommendation performance of our IRLT model with comparing to that of the excellent CGLT model. The results illustrate that our IRLT model is slightly superior to the CGLT model in honest environment and significantly outperforms the CGLT model in terms of the robustness against unfair rating attacks.
Identity Management and Trust Services: Foundations for Cloud Computing
ERIC Educational Resources Information Center
Suess, Jack; Morooney, Kevin
2009-01-01
Increasingly, IT organizations will move from providing IT services locally to becoming an integrator of IT services--some provided locally and others provided outside the institution. As a result, institutions must immediately begin to plan for shared services and must understand the essential role that identity management and trust services play…
26 CFR 1.664-2 - Charitable remainder annuity trust.
Code of Federal Regulations, 2012 CFR
2012-04-01
... children living at his death. (ii) Power to alter amount paid to recipients. A trust is not a charitable... so elected is the valuation date for purposes of determining the interest rate and mortality tables... determining the interest rate and mortality tables. The present value of an annuity is computed under § 20...
26 CFR 1.664-2 - Charitable remainder annuity trust.
Code of Federal Regulations, 2013 CFR
2013-04-01
... children living at his death. (ii) Power to alter amount paid to recipients. A trust is not a charitable... so elected is the valuation date for purposes of determining the interest rate and mortality tables... determining the interest rate and mortality tables. The present value of an annuity is computed under § 20...
26 CFR 1.664-2 - Charitable remainder annuity trust.
Code of Federal Regulations, 2011 CFR
2011-04-01
... children living at his death. (ii) Power to alter amount paid to recipients. A trust is not a charitable... so elected is the valuation date for purposes of determining the interest rate and mortality tables... determining the interest rate and mortality tables. The present value of an annuity is computed under § 20...
26 CFR 1.664-2 - Charitable remainder annuity trust.
Code of Federal Regulations, 2014 CFR
2014-04-01
... children living at his death. (ii) Power to alter amount paid to recipients. A trust is not a charitable... so elected is the valuation date for purposes of determining the interest rate and mortality tables... determining the interest rate and mortality tables. The present value of an annuity is computed under § 20...
A Security Architecture Based on Trust Management for Pervasive Computing Systems
2005-01-01
SmartSpace framework, we extended the C2 [16] ar- chitecture, which in turn is based on the Centaurus [10] model. In Centaurus a Client can access...the services provided by the nearest Centaurus Service Manager (SM) via some short-range communi- cation. The SM acts as an active proxy by executing...The In the Centaurus project [10], the main design goal is the development of a framework for building portals to services using various types of
Only the carrot, not the stick: incorporating trust into the enforcement of regulation.
Mendoza, Juan P; Wielhouwer, Jacco L
2015-01-01
New enforcement strategies allow agents to gain the regulator's trust and consequently face a lower audit probability. Prior research suggests that, in order to prevent lower compliance, a reduction in the audit probability (the "carrot") must be compensated with the introduction of a higher penalty for non-compliance (the "stick"). However, such carrot-and-stick strategies reflect neither the concept of trust nor the strategies observed in practice. In response to this, we define trust-based regulation as a strategy that incorporates rules that allow trust to develop, and using a generic (non-cooperative) game of tax compliance, we examine whether trust-based regulation is feasible (i.e., whether, in equilibrium, a reduction in the audit probability, without ever increasing the penalty for non-compliance, does not lead to reduced compliance). The model shows that trust-based regulation is feasible when the agent sufficiently values the future. In line with the concept of trust, this strategy is feasible when the regulator is uncertain about the agent's intentions. Moreover, the model shows that (i) introducing higher penalties makes trust-based regulation less feasible, and (ii) combining trust and forgiveness can lead to a lower audit probability for both trusted and distrusted agents. Policy recommendations often point toward increasing deterrence. This model shows that the opposite can be optimal.
Schaubroeck, John; Lam, Simon S K; Peng, Ann Chunyan
2011-07-01
We develop a model in which cognitive and affective trust in the leader mediate the relationship between leader behavior and team psychological states that, in turn, drive team performance. The model is tested on a sample of 191 financial services teams in Hong Kong and the U.S. Servant leadership influenced team performance through affect-based trust and team psychological safety. Transformational leadership influenced team performance indirectly through cognition-based trust. Cognition-based trust directly influenced team potency and indirectly (through affect-based trust) influenced team psychological safety. The effects of leader behavior on team performance were fully mediated through the trust in leader variables and the team psychological states. Servant leadership explained an additional 10% of the variance in team performance beyond the effect of transformational leadership. We discuss implications of these results for research on the relationship between leader behavior and team performance, and for efforts to enhance leader development by combining knowledge from different leadership theories.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-29
... for the following securities: Index-Linked Exchangeable Notes; Equity Gold Shares; Trust Certificates; Commodity-Based Trust Shares; Currency Trust Shares; Commodity Index Trust Shares; Commodity Futures Trust Shares; Partnership Units; Trust Units; Managed Trust Securities; and Currency Warrants (together with...
Trust Model of Wireless Sensor Networks and Its Application in Data Fusion
Chen, Zhenguo; Tian, Liqin; Lin, Chuang
2017-01-01
In order to ensure the reliability and credibility of the data in wireless sensor networks (WSNs), this paper proposes a trust evaluation model and data fusion mechanism based on trust. First of all, it gives the model structure. Then, the calculation rules of trust are given. In the trust evaluation model, comprehensive trust consists of three parts: behavior trust, data trust, and historical trust. Data trust can be calculated by processing the sensor data. Based on the behavior of nodes in sensing and forwarding, the behavior trust is obtained. The initial value of historical trust is set to the maximum and updated with comprehensive trust. Comprehensive trust can be obtained by weighted calculation, and then the model is used to construct the trust list and guide the process of data fusion. Using the trust model, simulation results indicate that energy consumption can be reduced by an average of 15%. The detection rate of abnormal nodes is at least 10% higher than that of the lightweight and dependable trust system (LDTS) model. Therefore, this model has good performance in ensuring the reliability and credibility of the data. Moreover, the energy consumption of transmitting was greatly reduced. PMID:28350347
Augmenting Trust Establishment in Dynamic Systems with Social Networks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lagesse, Brent J; Kumar, Mohan; Venkatesh, Svetha
2010-01-01
Social networking has recently flourished in popularity through the use of social websites. Pervasive computing resources have allowed people stay well-connected to each other through access to social networking resources. We take the position that utilizing information produced by relationships within social networks can assist in the establishment of trust for other pervasive computing applications. Furthermore, we describe how such a system can augment a sensor infrastructure used for event observation with information from mobile sensors (ie, mobile phones with cameras) controlled by potentially untrusted third parties. Pervasive computing systems are invisible systems, oriented around the user. As a result,more » many future pervasive systems are likely to include a social aspect to the system. The social communities that are developed in these systems can augment existing trust mechanisms with information about pre-trusted entities or entities to initially consider when beginning to establish trust. An example of such a system is the Collaborative Virtual Observation (CoVO) system fuses sensor information from disaparate sources in soft real-time to recreate a scene that provides observation of an event that has recently transpired. To accomplish this, CoVO must efficently access services whilst protecting the data from corruption from unknown remote nodes. CoVO combines dynamic service composition with virtual observation to utilize existing infrastructure with third party services available in the environment. Since these services are not under the control of the system, they may be unreliable or malicious. When an event of interest occurs, the given infrastructure (bus cameras, etc.) may not sufficiently cover the necessary information (be it in space, time, or sensor type). To enhance observation of the event, infrastructure is augmented with information from sensors in the environment that the infrastructure does not control. These sensors may be unreliable, uncooperative, or even malicious. Additionally, to execute queries in soft real-time, processing must be distributed to available systems in the environment. We propose to use information from social networks to satisfy these requirements. In this paper, we present our position that knowledge gained from social activities can be used to augment trust mechanisms in pervasive computing. The system uses social behavior of nodes to predict a subset that it wants to query for information. In this context, social behavior such as transit patterns and schedules (which can be used to determine if a queried node is likely to be reliable) or known relationships, such as a phone's address book, that can be used to determine networks of nodes that may also be able to assist in retrieving information. Neither implicit nor explicit relationships necessarily imply that the user trusts an entity, but rather will provide a starting place for establishing trust. The proposed framework utilizes social network information to assist in trust establishment when third-party sensors are used for sensing events.« less
Pinheiro, Alexandre; Dias Canedo, Edna; de Sousa Junior, Rafael Timoteo; de Oliveira Albuquerque, Robson; García Villalba, Luis Javier; Kim, Tai-Hoon
2018-03-02
Cloud computing is considered an interesting paradigm due to its scalability, availability and virtually unlimited storage capacity. However, it is challenging to organize a cloud storage service (CSS) that is safe from the client point-of-view and to implement this CSS in public clouds since it is not advisable to blindly consider this configuration as fully trustworthy. Ideally, owners of large amounts of data should trust their data to be in the cloud for a long period of time, without the burden of keeping copies of the original data, nor of accessing the whole content for verifications regarding data preservation. Due to these requirements, integrity, availability, privacy and trust are still challenging issues for the adoption of cloud storage services, especially when losing or leaking information can bring significant damage, be it legal or business-related. With such concerns in mind, this paper proposes an architecture for periodically monitoring both the information stored in the cloud and the service provider behavior. The architecture operates with a proposed protocol based on trust and encryption concepts to ensure cloud data integrity without compromising confidentiality and without overloading storage services. Extensive tests and simulations of the proposed architecture and protocol validate their functional behavior and performance.
2018-01-01
Cloud computing is considered an interesting paradigm due to its scalability, availability and virtually unlimited storage capacity. However, it is challenging to organize a cloud storage service (CSS) that is safe from the client point-of-view and to implement this CSS in public clouds since it is not advisable to blindly consider this configuration as fully trustworthy. Ideally, owners of large amounts of data should trust their data to be in the cloud for a long period of time, without the burden of keeping copies of the original data, nor of accessing the whole content for verifications regarding data preservation. Due to these requirements, integrity, availability, privacy and trust are still challenging issues for the adoption of cloud storage services, especially when losing or leaking information can bring significant damage, be it legal or business-related. With such concerns in mind, this paper proposes an architecture for periodically monitoring both the information stored in the cloud and the service provider behavior. The architecture operates with a proposed protocol based on trust and encryption concepts to ensure cloud data integrity without compromising confidentiality and without overloading storage services. Extensive tests and simulations of the proposed architecture and protocol validate their functional behavior and performance. PMID:29498641
Press, Valerie G.; Meltzer, David O.; Arora, Vineet M.
2016-01-01
Summary Summary Background Wearable face-mounted computers such as Google Glass™, Microsoft HoloLens™, and Oculus’ Rift®, are increasingly being tested in hospital care. These devices challenge social etiquette, raise privacy issues, and may disrupt the intimacy of the doctor patient relationship. We aimed to determine patients’ perception of and their privacy concerns with an archetype of wearable face-mounted computer devices, Google Glass. Methods Hospitalized inpatients were asked about their familiarity with Glass, how comfortable they would be and if they would be concerned about privacy if their physician wore Glass, if the use of Glass would affect their trust in their physician, and if they would want their physician to wear Glass if it improved their care. Results Most (73%) respondents were unfamiliar with Glass, though 64% would be comfortable if their doctor wore Glass. Under half (46%) of respondents were concerned about privacy with the use of Glass. Seventy-six percent (76%) of respondents stated their doctor wearing Glass would not affect their trust in their doctor. Patients concerned about their privacy were less likely to trust their doctor if their doctor wore Glass (17% vs. 0%, p<0.01). Sixty-five percent (65%) of respondents would want their doctor to wear Glass if it improved their care. Conclusion Most patients appear open to and would want their doctor to use face-mounted wearable computers such as Glass, even when unfamiliar with this technology. While some patients expressed concerns about privacy, patients were much less concerned about wearable technologies affecting the trust they have in their physician. PMID:27730249
A methodology for secure recovery of spacecrafts based on a trusted hardware platform
NASA Astrophysics Data System (ADS)
Juliato, Marcio; Gebotys, Catherine
2017-02-01
This paper proposes a methodology for the secure recovery of spacecrafts and the recovery of its cryptographic capabilities in emergency scenarios recurring from major unintentional failures and malicious attacks. The proposed approach employs trusted modules to achieve higher reliability and security levels in space missions due to the presence of integrity check capabilities as well as secure recovery mechanisms. Additionally, several recovery protocols are thoroughly discussed and analyzed against a wide variety of attacks. Exhaustive search attacks are shown in a wide variety of contexts and are shown to be infeasible and totally independent of the computational power of attackers. Experimental results have shown that the proposed methodology allows for the fast and secure recovery of spacecrafts, demanding minimum implementation area, power consumption and bandwidth.
Configuration Tool for the Trusted Computing Exemplar Project
2009-12-01
languages were examined: Microsoft .NET [8], Apple Cocoa (Objective-C) [9], wxPython [10], and Java [11]. Since every language has its pros and...languages using the criteria described above. Based on the developer’s limited experience and knowledge of Microsoft .NET and Apple Cocoa (Objective...became a tabbed panel within a separate window panel. Figure 9 depicts this evolution of the conceptual design. In Figure 9, the table column
Extending IPsec for Efficient Remote Attestation
NASA Astrophysics Data System (ADS)
Sadeghi, Ahmad-Reza; Schulz, Steffen
When establishing a VPN to connect different sites of a network, the integrity of the involved VPN endpoints is often a major security concern. Based on the Trusted Platform Module (TPM), available in many computing platforms today, remote attestation mechanisms can be used to evaluate the internal state of remote endpoints automatically. However, existing protocols and extensions are either unsuited for use with IPsec or impose considerable additional implementation complexity and protocol overhead.
Using Covert Means to Establish Cybercraft Command and Control
2009-03-01
unknown entity. This mimics human trust patterns in many ways [15]. Take for example a human trying to find 10 a new auto mechanic or a new babysitter ...AIR UNIVERSITY AIR FORCE INSTITUTE OF TECHNOLOGY Wright-Patterson Air Force Base, Ohio APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED. The views...Department of Electrical and Computer Engineering Graduate School of Engineering and Management Air Force Institute of Technology Air University Air
Cyberbiosecurity: From Naive Trust to Risk Awareness.
Peccoud, Jean; Gallegos, Jenna E; Murch, Randall; Buchholz, Wallace G; Raman, Sanjay
2018-01-01
The cyber-physical nature of biotechnology raises unprecedented security concerns. Computers can be compromised by encoding malware in DNA sequences, and biological threats can be synthesized using publicly available data. Trust within the biotechnology community creates vulnerabilities at the interface between cyberspace and biology. Awareness is a prerequisite to managing these risks. Copyright © 2017 Elsevier Ltd. All rights reserved.
Trusted computation through biologically inspired processes
NASA Astrophysics Data System (ADS)
Anderson, Gustave W.
2013-05-01
Due to supply chain threats it is no longer a reasonable assumption that traditional protections alone will provide sufficient security for enterprise systems. The proposed cognitive trust model architecture extends the state-of-the-art in enterprise anti-exploitation technologies by providing collective immunity through backup and cross-checking, proactive health monitoring and adaptive/autonomic threat response, and network resource diversity.
Smart Cards and remote entrusting
NASA Astrophysics Data System (ADS)
Aussel, Jean-Daniel; D'Annoville, Jerome; Castillo, Laurent; Durand, Stephane; Fabre, Thierry; Lu, Karen; Ali, Asad
Smart cards are widely used to provide security in end-to-end communication involving servers and a variety of terminals, including mobile handsets or payment terminals. Sometime, end-to-end server to smart card security is not applicable, and smart cards must communicate directly with an application executing on a terminal, like a personal computer, without communicating with a server. In this case, the smart card must somehow trust the terminal application before performing some secure operation it was designed for. This paper presents a novel method to remotely trust a terminal application from the smart card. For terminals such as personal computers, this method is based on an advanced secure device connected through the USB and consisting of a smart card bundled with flash memory. This device, or USB dongle, can be used in the context of remote untrusting to secure portable applications conveyed in the dongle flash memory. White-box cryptography is used to set the secure channel and a mechanism based on thumbprint is described to provide external authentication when session keys need to be renewed. Although not as secure as end-to-end server to smart card security, remote entrusting with smart cards is easy to deploy for mass-market applications and can provide a reasonable level of security.
Trust Information and Privacy Policies - Enablers for pHealth and Ubiquitous Health.
Ruotsalainen, Pekka; Blobel, Bernd
2014-01-01
pHealth occurs in uncontrolled and unsecure environment where predefined organizational trust does not exist. To be accepted by users, pHealth requires a privacy model where privacy is a personal property, i.e., a person can perform own will and define policies which regulate how personal health information (PHI) is used. Privacy and trust are interconnected concepts. Therefore, before beginning to use pHealth services, the person needs practical and reliable information that enables her or him to determine the trustworthiness level of services. To avoid the use of blind trust, organizations, researchers, policymakers, and standardization organizations have proposed the use of dynamic context-aware policies for privacy management in pHealth. To make meaningful privacy decision, a person should understand the impact of selected policy rules on the processing of PHI in different situations. In this paper, the use of computational trust information for defining privacy polies and reducing their number is proposed. A trust value and understandable trust attributes enable a person to tailor privacy policies requested for trustworthy use of pHealth services. Trust attributes proposed are derived from privacy concerns existing in open ubiquitous environment. These attributes also force pHealth services providers to publish information needed for trust calculation and in this way to support openness and transparency.
Henderson, Julie; Coveney, John; Ward, Paul R; Taylor, Anne W
2011-08-01
Trust is a crucial component of food safety and governance. This research surveyed a random selection of the population to examine its level of trust in a variety of 'actors' and organisations in the food chain. A computer-assisted telephone interviewing (CATI) survey addressing trust in the food system was administrated during October to December 2009 to a random sample of 1,109 participants across all states (response rate 41.2%). Farmers enjoyed high levels of trust, whereas politicians were considered less trustworthy. Supermarkets were afforded more trust than media and news outlets. Logistic regression analysis determined that two socio-demographic variables - age and education level - were significantly associated with trust in food actors, with young people finding the media the least trustworthy. Our respondents invested the most trust in farmers, possibly indicating an awareness and appreciation of primary food production among the Australian public. The finding that young people's trust in the media is low challenges media use in social marketing campaigns aimed to improve health and nutrition in younger age groups. Health education, including nutrition education, needs to consider the channels of communication most suited to age and social grouping. © 2011 The Authors. ANZJPH © 2011 Public Health Association of Australia.
Only the Carrot, Not the Stick: Incorporating Trust into the Enforcement of Regulation
Mendoza, Juan P.; Wielhouwer, Jacco L.
2015-01-01
New enforcement strategies allow agents to gain the regulator’s trust and consequently face a lower audit probability. Prior research suggests that, in order to prevent lower compliance, a reduction in the audit probability (the “carrot”) must be compensated with the introduction of a higher penalty for non-compliance (the “stick”). However, such carrot-and-stick strategies reflect neither the concept of trust nor the strategies observed in practice. In response to this, we define trust-based regulation as a strategy that incorporates rules that allow trust to develop, and using a generic (non-cooperative) game of tax compliance, we examine whether trust-based regulation is feasible (i.e., whether, in equilibrium, a reduction in the audit probability, without ever increasing the penalty for non-compliance, does not lead to reduced compliance). The model shows that trust-based regulation is feasible when the agent sufficiently values the future. In line with the concept of trust, this strategy is feasible when the regulator is uncertain about the agent’s intentions. Moreover, the model shows that (i) introducing higher penalties makes trust-based regulation less feasible, and (ii) combining trust and forgiveness can lead to a lower audit probability for both trusted and distrusted agents. Policy recommendations often point toward increasing deterrence. This model shows that the opposite can be optimal. PMID:25705898
Meyer, Samantha B; Mamerow, Loreen; Taylor, Anne W; Henderson, Julie; Ward, Paul R; Coveney, John
2013-02-01
To provide baseline findings regarding Australians' trust in federal, state and local government. A computer-assisted telephone interviewing (CATI) survey was administrated during October to December 2009 to a random sample (n=1109) across Australia (response rate 41.2%). Binary logistic regression analyses were carried out by means of SPSS. Age, household size, household income, IRSD and ARIA were found to be significant indicators for trust in federal, state and local government. Trust in state government is lower for older respondents and respondents living in inner and outer regional areas. Trust in local council is lower in respondents living in inner regional areas, respondents living in disadvantaged areas, and respondents in the income bracket of $60001 to $100000. Trust in federal government is lower for older respondents and respondents living in disadvantaged areas. Of note is diminished trust in government among older, regional and lower income ($30001-$60000) respondents. Trust in all levels of government was found to be the lowest in population groups that are identified by empirical research and media to have the poorest access to government services. As a consequence, improved access to services for these populations may increase trust in health policy. Increased trust in health governance may in turn, ensure effective dissemination and implementation of health policies and that existing inequities are not perpetuated through distrust of health information and policy initiatives.
Trust-based environmental regulation.
Lange, Bettina; Gouldson, Andy
2010-10-15
Within this paper, we examine the contribution that trust-based relationships can make to achieving better-and particularly more effective, efficient and equitable-environmental regulation. While levels of trust in regulators, regulatory processes and outcomes are often discussed, the influence of trust on different actors and on different measures of regulatory performance is poorly understood. Within this paper, we define trust-based environmental regulation as a specific regulatory style that involves openness and cooperation in interaction between regulated, regulators and third-party stakeholders in order to achieve environmental protection objectives. We then discuss the pros and cons of trust relationships between regulators, regulated businesses and citizens for achieving behavioural change towards greater environmental protection. To illustrate the significance of these issues, we then examine three forms of contractual regulatory style where trust relationships are critically important: responsive regulation, self-regulation and environmental agreements. Based on this analysis, we highlight the importance of trust-based relationships, and we argue that one of the greatest contributions of trust-based environmental regulation is to challenge how we think about regulation. Trust is often understood as enabling existing regulatory relationships or in the case of self-regulation as a complement to regulation. However, we argue that the real potential of trust is to open up new ways for participants in regulatory regimes to engage in collective action, to go beyond a perception of regulation as driven by the competing interests of individual actors, and thus, to open up new channels of influence for behavioural change towards greater environmental protection. Our analysis therefore has great relevance for future research and for on-going debates on the future of regulation. Copyright © 2010. Published by Elsevier B.V.
ComTrustO: Composite Trust-Based Ontology Framework for Information and Decision Fusion
2015-07-06
based definitions and models of trust have been studied in various domains [39]. Jules et al. [27] propose an intelligent and dynamic Service Level...Cognitive and affective trust in service relationships. Journal of Business Research, 58:500–507, 2005. [27] O. Jules , A. Hafid, and M.A. Serhani
ERIC Educational Resources Information Center
Cosner, Shelby
2010-01-01
Research has revealed the importance of trust to schools and pointed to the central role that principals play in cultivating within-school trust, yet less is known about the ways that principals cultivate such trust. Moreover, divergent perspectives and varied contexts for examining trust have limited the transfer of trust scholarship to practice…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-10
... Asset. The term ``Currency,'' as used in the proposed rule, means one or more currencies, or currency...; Commodity-Based Trust Shares; Currency Trust Shares; Commodity Index Trust Shares; Commodity Futures Trust Shares; Partnership Units; Trust Units; Managed Trust Securities; and Currency Warrants. Specifically...
26 CFR 1.669(c)-1A - Special rules applicable to section 669.
Code of Federal Regulations, 2010 CFR
2010-04-01
... the 1980 Trust Y capital gain distribution. To compute A's tax under the exact method for 1974 on the... year taxpayer. Determination of the tax on the distribution under the short-cut method requires the use... income for 1975, for purposes of using the short-cut method to determine the tax from the trust T capital...
A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks
Wang, Jian; Jiang, Shuai; Fapojuwo, Abraham O.
2017-01-01
This article proposes a protocol layer trust-based intrusion detection scheme for wireless sensor networks. Unlike existing work, the trust value of a sensor node is evaluated according to the deviations of key parameters at each protocol layer considering the attacks initiated at different protocol layers will inevitably have impacts on the parameters of the corresponding protocol layers. For simplicity, the paper mainly considers three aspects of trustworthiness, namely physical layer trust, media access control layer trust and network layer trust. The per-layer trust metrics are then combined to determine the overall trust metric of a sensor node. The performance of the proposed intrusion detection mechanism is then analyzed using the t-distribution to derive analytical results of false positive and false negative probabilities. Numerical analytical results, validated by simulation results, are presented in different attack scenarios. It is shown that the proposed protocol layer trust-based intrusion detection scheme outperforms a state-of-the-art scheme in terms of detection probability and false probability, demonstrating its usefulness for detecting cross-layer attacks. PMID:28555023
A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks.
Wang, Jian; Jiang, Shuai; Fapojuwo, Abraham O
2017-05-27
This article proposes a protocol layer trust-based intrusion detection scheme for wireless sensor networks. Unlike existing work, the trust value of a sensor node is evaluated according to the deviations of key parameters at each protocol layer considering the attacks initiated at different protocol layers will inevitably have impacts on the parameters of the corresponding protocol layers. For simplicity, the paper mainly considers three aspects of trustworthiness, namely physical layer trust, media access control layer trust and network layer trust. The per-layer trust metrics are then combined to determine the overall trust metric of a sensor node. The performance of the proposed intrusion detection mechanism is then analyzed using the t-distribution to derive analytical results of false positive and false negative probabilities. Numerical analytical results, validated by simulation results, are presented in different attack scenarios. It is shown that the proposed protocol layer trust-based intrusion detection scheme outperforms a state-of-the-art scheme in terms of detection probability and false probability, demonstrating its usefulness for detecting cross-layer attacks.
NASA Astrophysics Data System (ADS)
Neveu, N.; Larson, J.; Power, J. G.; Spentzouris, L.
2017-07-01
Model-based, derivative-free, trust-region algorithms are increasingly popular for optimizing computationally expensive numerical simulations. A strength of such methods is their efficient use of function evaluations. In this paper, we use one such algorithm to optimize the beam dynamics in two cases of interest at the Argonne Wakefield Accelerator (AWA) facility. First, we minimize the emittance of a 1 nC electron bunch produced by the AWA rf photocathode gun by adjusting three parameters: rf gun phase, solenoid strength, and laser radius. The algorithm converges to a set of parameters that yield an emittance of 1.08 μm. Second, we expand the number of optimization parameters to model the complete AWA rf photoinjector (the gun and six accelerating cavities) at 40 nC. The optimization algorithm is used in a Pareto study that compares the trade-off between emittance and bunch length for the AWA 70MeV photoinjector.
Service-Oriented Architecture for NVO and TeraGrid Computing
NASA Technical Reports Server (NTRS)
Jacob, Joseph; Miller, Craig; Williams, Roy; Steenberg, Conrad; Graham, Matthew
2008-01-01
The National Virtual Observatory (NVO) Extensible Secure Scalable Service Infrastructure (NESSSI) is a Web service architecture and software framework that enables Web-based astronomical data publishing and processing on grid computers such as the National Science Foundation's TeraGrid. Characteristics of this architecture include the following: (1) Services are created, managed, and upgraded by their developers, who are trusted users of computing platforms on which the services are deployed. (2) Service jobs can be initiated by means of Java or Python client programs run on a command line or with Web portals. (3) Access is granted within a graduated security scheme in which the size of a job that can be initiated depends on the level of authentication of the user.
Is Consent Based on Trust Morally Inferior to Consent Based on Information?
Kongsholm, Nana Cecilie Halmsted; Kappel, Klemens
2017-07-01
Informed consent is considered by many to be a moral imperative in medical research. However, it is increasingly acknowledged that in many actual instances of consent to participation in medical research, participants do not employ the provided information in their decision to consent, but rather consent based on the trust they hold in the researcher or research enterprise. In this article we explore whether trust-based consent is morally inferior to information-based consent. We analyse the moral values essential to valid consent - autonomy, voluntariness, non-manipulation, and non-exploitation - and assess whether these values are less protected and promoted by consent based on trust than they are by consent based on information. We find that this is not the case, and thus conclude that trust-based consent if not morally inferior to information-based consent. © 2017 John Wiley & Sons Ltd.
26 CFR 26.2642-6 - Qualified severance.
Code of Federal Regulations, 2014 CFR
2014-04-01
... market value of the original trust's assets on the date of severance). The severance of a trust based on..., based on the fair market value of the assets on the date of severance. However, if a resulting trust is... funding purposes, by multiplying the fair market value of the asset held in the original trust as of the...
Choi, Byoung Kwon; Moon, Hyoung Koo; Nae, Eun Young
2014-01-01
We examined how subordinates' cognition- and affect-based trust in supervisors influences their feedback-seeking behavior (FSB) by considering the different cost/value perception of FSB and goal orientation (i.e., learning and performance goal orientations). Using data from 194 supervisor-subordinate dyads in South Korea, we conducted multiple regression analyses to test our hypotheses. The results showed that, whereas subordinates' cognition-based trust in supervisors positively influenced their FSB through increasing the perceived value of feedback received from supervisors, their affect-based trust in supervisors positively influenced their FSB through decreasing the perceived value of FSB. Additionally, we found that, when subordinates had high levels of learning goal orientation, the increasing influence of cognition-based trust on the value of feedback was stronger; in contrast, when subordinates had low levels of performance goal orientation, the decreasing influence of affect-based trust on the cost of FSB was stronger. The theoretical and practical implications, limitations, and suggestions for future research were discussed.
2001-09-01
Readily Available Linux has been copyrighted under the terms of the GNU General Public 5 License (GPL)1. This is a license written by the Free...GNOME and KDE . d. Portability Linux is highly compatible with many common operating systems. For...using suitable libraries, Linux is able to run programs written for other operating systems. [Ref. 8] 1 The GNU Project is coordinated by the
SHAMROCK: A Synthesizable High Assurance Cryptography and Key Management Coprocessor
2016-11-01
and excluding devices from a communicating group as they become trusted, or untrusted. An example of using rekeying to dynamically adjust group...algorithms, such as the Elliptic Curve Digital Signature Algorithm (ECDSA), work by computing a cryptographic hash of a message using, for example , the...material is based upon work supported by the Assistant Secretary of Defense for Research and Engineering under Air Force Contract No. FA8721- 05-C
Configuration Tool Prototype for the Trusted Computing Exemplar Project
2009-12-01
languages were examined: Microsoft .NET [8], Apple Cocoa (Objective-C) [9], wxPython [10], and Java [11]. Since every language has its pros and...languages using the criteria described above. Based on the developer’s limited experience and knowledge of Microsoft .NET and Apple Cocoa (Objective...a tabbed panel within a separate window panel. Figure 9 depicts this evolution of the conceptual design. In Figure 9, the table column headers are
A Secure Mobile-Based Authentication System for e-Banking
NASA Astrophysics Data System (ADS)
Rifà-Pous, Helena
Financial information is extremely sensitive. Hence, electronic banking must provide a robust system to authenticate its customers and let them access their data remotely. On the other hand, such system must be usable, affordable, and portable. We propose a challenge-response based one-time password (OTP) scheme that uses symmetric cryptography in combination with a hardware security module. The proposed protocol safeguards passwords from keyloggers and phishing attacks. Besides, this solution provides convenient mobility for users who want to bank online anytime and anywhere, not just from their own trusted computers.
A trust-region algorithm for the optimization of PSA processes using reduced-order modeling
DOE Office of Scientific and Technical Information (OSTI.GOV)
Agarwal, A.; Biegler, L.; Zitney, S.
2009-01-01
The last few decades have seen a considerable increase in the applications of adsorptive gas separation technologies, such as pressure swing adsorption (PSA); the applications range from bulk separations to trace contaminant removal. PSA processes are based on solid-gas equilibrium and operate under periodic transient conditions [1]. Bed models for these processes are therefore defined by coupled nonlinear partial differential and algebraic equations (PDAEs) distributed in space and time with periodic boundary conditions that connect the processing steps together and high nonlinearities arising from non-isothermal effects and nonlinear adsorption isotherms. As a result, the optimization of such systems for eithermore » design or operation represents a significant computational challenge to current nonlinear programming algorithms. Model reduction is a powerful methodology that permits systematic generation of cost-efficient low-order representations of large-scale systems that result from discretization of such PDAEs. In particular, low-dimensional approximations can be obtained from reduced order modeling (ROM) techniques based on proper orthogonal decomposition (POD) and can be used as surrogate models in the optimization problems. In this approach, a representative ensemble of solutions of the dynamic PDAE system is constructed by solving a higher-order discretization of the model using the method of lines, followed by the application of Karhunen-Loeve expansion to derive a small set of empirical eigenfunctions (POD modes). These modes are used as basis functions within a Galerkin's projection framework to derive a low-order DAE system that accurately describes the dominant dynamics of the PDAE system. This approach leads to a DAE system of significantly lower order, thus replacing the one obtained from spatial discretization before and making optimization problem computationally efficient [2]. The ROM methodology has been successfully applied to a 2-bed 4-step PSA process used for separating a hydrogen-methane mixture in [3]. The reduced order model developed was successfully used to optimize this process to maximize hydrogen recovery within a trust-region. We extend this approach in this work to develop a rigorous trust-region algorithm for ROM-based optimization of PSA processes. The trust-region update rules and sufficient decrease condition for the objective is used to determine the size of the trust-region. Based on the decrease in the objective function and error in the ROM, a ROM updation strategy is designed [4, 5]. The inequalities and bounds are handled in the algorithm using exact penalty formulation, and a non-smooth trust-region algorithm by Conn et al. [6] is used to handle non-differentiability. To ensure that the first order consistency condition is met and the optimum obtained from ROM-based optimization corresponds to the optimum of the original problem, a scaling function, such as one proposed by Alexandrov et al. [7], is incorporated in the objective function. Such error control mechanism is also capable of handling numerical inconsistencies such as unphysical oscillations in the state variable profiles. The proposed methodology is applied to optimize a PSA process to concentrate CO{sub 2} from a nitrogen-carbon dioxide mixture. As in [3], separate ROMs are developed for each operating step with different POD modes for each state variable. Numerical results will be presented for optimization case studies which involve maximizing CO{sub 2} recovery, feed throughput or minimizing overall power consumption.« less
Future of Assurance: Ensuring that a System is Trustworthy
NASA Astrophysics Data System (ADS)
Sadeghi, Ahmad-Reza; Verbauwhede, Ingrid; Vishik, Claire
Significant efforts are put in defining and implementing strong security measures for all components of the comput-ing environment. It is equally important to be able to evaluate the strength and robustness of these measures and establish trust among the components of the computing environment based on parameters and attributes of these elements and best practices associated with their production and deployment. Today the inventory of techniques used for security assurance and to establish trust -- audit, security-conscious development process, cryptographic components, external evaluation - is somewhat limited. These methods have their indisputable strengths and have contributed significantly to the advancement in the area of security assurance. However, shorter product and tech-nology development cycles and the sheer complexity of modern digital systems and processes have begun to decrease the efficiency of these techniques. Moreover, these approaches and technologies address only some aspects of security assurance and, for the most part, evaluate assurance in a general design rather than an instance of a product. Additionally, various components of the computing environment participating in the same processes enjoy different levels of security assurance, making it difficult to ensure adequate levels of protection end-to-end. Finally, most evaluation methodologies rely on the knowledge and skill of the evaluators, making reliable assessments of trustworthiness of a system even harder to achieve. The paper outlines some issues in security assurance that apply across the board, with the focus on the trustworthiness and authenticity of hardware components and evaluates current approaches to assurance.
ERIC Educational Resources Information Center
Adler, Terry R.
2005-01-01
The Swift Trust exercise provides instructors with the opportunity to discuss the issues of managing trust and distrust perceptions in a team-based design. Lewicki, McAllister, and Bies's (1998) framework is used to allow students to experience the difficulties of deriving a common set of contract requirements based on team dynamics and…
Feltham, R K
1995-01-01
Open tendering for medical informatics systems in the UK has traditionally been lengthy and, therefore, expensive on resources for vendor and purchaser alike. Events in the United Kingdom (UK) and European Community (EC) have led to new Government guidance being published on procuring information systems for the public sector: Procurement of Information Systems Effectively (POISE). This innovative procurement process, launched in 1993, has the support of the Computing Services Association (CSA) and the Federation of the Electronics Industry (FEI). This paper gives an overview of these new UK guidelines on healthcare information system purchasing in the context of a recent procurement project with an NHS Trust Hospital. The aim of the project was to replace three aging, separate, and different laboratory computer systems with a new, integrated turnkey system offering all department modules, an Open modern computer environment, and on-line electronic links to key departmental systems, both within and external to the Trust by the end of 1994. The new system had to complement the Trust's strategy for providing a modern clinical laboratory service to the local population and meet a tight budget.
NASA Astrophysics Data System (ADS)
Bryson, Dean Edward
A model's level of fidelity may be defined as its accuracy in faithfully reproducing a quantity or behavior of interest of a real system. Increasing the fidelity of a model often goes hand in hand with increasing its cost in terms of time, money, or computing resources. The traditional aircraft design process relies upon low-fidelity models for expedience and resource savings. However, the reduced accuracy and reliability of low-fidelity tools often lead to the discovery of design defects or inadequacies late in the design process. These deficiencies result either in costly changes or the acceptance of a configuration that does not meet expectations. The unknown opportunity cost is the discovery of superior vehicles that leverage phenomena unknown to the designer and not illuminated by low-fidelity tools. Multifidelity methods attempt to blend the increased accuracy and reliability of high-fidelity models with the reduced cost of low-fidelity models. In building surrogate models, where mathematical expressions are used to cheaply approximate the behavior of costly data, low-fidelity models may be sampled extensively to resolve the underlying trend, while high-fidelity data are reserved to correct inaccuracies at key locations. Similarly, in design optimization a low-fidelity model may be queried many times in the search for new, better designs, with a high-fidelity model being exercised only once per iteration to evaluate the candidate design. In this dissertation, a new multifidelity, gradient-based optimization algorithm is proposed. It differs from the standard trust region approach in several ways, stemming from the new method maintaining an approximation of the inverse Hessian, that is the underlying curvature of the design problem. Whereas the typical trust region approach performs a full sub-optimization using the low-fidelity model at every iteration, the new technique finds a suitable descent direction and focuses the search along it, reducing the number of low-fidelity evaluations required. This narrowing of the search domain also alleviates the burden on the surrogate model corrections between the low- and high-fidelity data. Rather than requiring the surrogate to be accurate in a hyper-volume bounded by the trust region, the model needs only to be accurate along the forward-looking search direction. Maintaining the approximate inverse Hessian also allows the multifidelity algorithm to revert to high-fidelity optimization at any time. In contrast, the standard approach has no memory of the previously-computed high-fidelity data. The primary disadvantage of the proposed algorithm is that it may require modifications to the optimization software, whereas standard optimizers may be used as black-box drivers in the typical trust region method. A multifidelity, multidisciplinary simulation of aeroelastic vehicle performance is developed to demonstrate the optimization method. The numerical physics models include body-fitted Euler computational fluid dynamics; linear, panel aerodynamics; linear, finite-element computational structural mechanics; and reduced, modal structural bases. A central element of the multifidelity, multidisciplinary framework is a shared parametric, attributed geometric representation that ensures the analysis inputs are consistent between disciplines and fidelities. The attributed geometry also enables the transfer of data between disciplines. The new optimization algorithm, a standard trust region approach, and a single-fidelity quasi-Newton method are compared for a series of analytic test functions, using both polynomial chaos expansions and kriging to correct discrepancies between fidelity levels of data. In the aggregate, the new method requires fewer high-fidelity evaluations than the trust region approach in 51% of cases, and the same number of evaluations in 18%. The new approach also requires fewer low-fidelity evaluations, by up to an order of magnitude, in almost all cases. The efficacy of both multifidelity methods compared to single-fidelity optimization depends significantly on the behavior of the high-fidelity model and the quality of the low-fidelity approximation, though savings are realized in a large number of cases. The multifidelity algorithm is also compared to the single-fidelity quasi-Newton method for complex aeroelastic simulations. The vehicle design problem includes variables for planform shape, structural sizing, and cruise condition with constraints on trim and structural stresses. Considering the objective function reduction versus computational expenditure, the multifidelity process performs better in three of four cases in early iterations. However, the enforcement of a contracting trust region slows the multifidelity progress. Even so, leveraging the approximate inverse Hessian, the optimization can be seamlessly continued using high-fidelity data alone. Ultimately, the proposed new algorithm produced better designs in all four cases. Investigating the return on investment in terms of design improvement per computational hour confirms that the multifidelity advantage is greatest in early iterations, and managing the transition to high-fidelity optimization is critical.
Research of Trust Chain of Operating System
NASA Astrophysics Data System (ADS)
Li, Hongjiao; Tian, Xiuxia
Trust chain is one of the key technologies in designing secure operating system based on TC technology. Constructions of trust chain and trust models are analyzed. Future works in these directions are discussed.
Xu, Qian; Tan, Chengxiang; Fan, Zhijie; Zhu, Wenye; Xiao, Ya; Cheng, Fujia
2018-05-17
Nowadays, fog computing provides computation, storage, and application services to end users in the Internet of Things. One of the major concerns in fog computing systems is how fine-grained access control can be imposed. As a logical combination of attribute-based encryption and attribute-based signature, Attribute-based Signcryption (ABSC) can provide confidentiality and anonymous authentication for sensitive data and is more efficient than traditional "encrypt-then-sign" or "sign-then-encrypt" strategy. Thus, ABSC is suitable for fine-grained access control in a semi-trusted cloud environment and is gaining more and more attention recently. However, in many existing ABSC systems, the computation cost required for the end users in signcryption and designcryption is linear with the complexity of signing and encryption access policy. Moreover, only a single authority that is responsible for attribute management and key generation exists in the previous proposed ABSC schemes, whereas in reality, mostly, different authorities monitor different attributes of the user. In this paper, we propose OMDAC-ABSC, a novel data access control scheme based on Ciphertext-Policy ABSC, to provide data confidentiality, fine-grained control, and anonymous authentication in a multi-authority fog computing system. The signcryption and designcryption overhead for the user is significantly reduced by outsourcing the undesirable computation operations to fog nodes. The proposed scheme is proven to be secure in the standard model and can provide attribute revocation and public verifiability. The security analysis, asymptotic complexity comparison, and implementation results indicate that our construction can balance the security goals with practical efficiency in computation.
Trust transitivity in social networks.
Richters, Oliver; Peixoto, Tiago P
2011-04-05
Non-centralized recommendation-based decision making is a central feature of several social and technological processes, such as market dynamics, peer-to-peer file-sharing and the web of trust of digital certification. We investigate the properties of trust propagation on networks, based on a simple metric of trust transitivity. We investigate analytically the percolation properties of trust transitivity in random networks with arbitrary in/out-degree distributions, and compare with numerical realizations. We find that the existence of a non-zero fraction of absolute trust (i.e. entirely confident trust) is a requirement for the viability of global trust propagation in large systems: The average pair-wise trust is marked by a discontinuous transition at a specific fraction of absolute trust, below which it vanishes. Furthermore, we perform an extensive analysis of the Pretty Good Privacy (PGP) web of trust, in view of the concepts introduced. We compare different scenarios of trust distribution: community- and authority-centered. We find that these scenarios lead to sharply different patterns of trust propagation, due to the segregation of authority hubs and densely-connected communities. While the authority-centered scenario is more efficient, and leads to higher average trust values, it favours weakly-connected "fringe" nodes, which are directly trusted by authorities. The community-centered scheme, on the other hand, favours nodes with intermediate in/out-degrees, in detriment of the authorities and its "fringe" peers.
Trust Transitivity in Social Networks
Richters, Oliver; Peixoto, Tiago P.
2011-01-01
Non-centralized recommendation-based decision making is a central feature of several social and technological processes, such as market dynamics, peer-to-peer file-sharing and the web of trust of digital certification. We investigate the properties of trust propagation on networks, based on a simple metric of trust transitivity. We investigate analytically the percolation properties of trust transitivity in random networks with arbitrary in/out-degree distributions, and compare with numerical realizations. We find that the existence of a non-zero fraction of absolute trust (i.e. entirely confident trust) is a requirement for the viability of global trust propagation in large systems: The average pair-wise trust is marked by a discontinuous transition at a specific fraction of absolute trust, below which it vanishes. Furthermore, we perform an extensive analysis of the Pretty Good Privacy (PGP) web of trust, in view of the concepts introduced. We compare different scenarios of trust distribution: community- and authority-centered. We find that these scenarios lead to sharply different patterns of trust propagation, due to the segregation of authority hubs and densely-connected communities. While the authority-centered scenario is more efficient, and leads to higher average trust values, it favours weakly-connected “fringe” nodes, which are directly trusted by authorities. The community-centered scheme, on the other hand, favours nodes with intermediate in/out-degrees, in detriment of the authorities and its “fringe” peers. PMID:21483683
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-19
... required by the Paperwork Reduction Act of 1995, Public Law 104-13 (44 U.S.C. 3506(c)(2)(A)). Currently... Initial Excise Tax Return for Black Lung Benefit Trusts and Certain Related Persons, and Form 6069, Return of Excise Tax on Excess Contributions to Black Lung Benefit Trust Under Section 4953 and Computation...
ERIC Educational Resources Information Center
Francis, Andrea Ploucher
2010-01-01
With the increased availability of technology to teachers, it becomes important for researchers and educators alike to understand why teachers choose to use technology for educational purposes. In this study, I use a weak version of the Computers as Social Actors (CASA) hypothesis (Reeves and Nass, 1996; Nass and Moon, 2000) to extend the concept…
Identity-Based Verifiably Encrypted Signatures without Random Oracles
NASA Astrophysics Data System (ADS)
Zhang, Lei; Wu, Qianhong; Qin, Bo
Fair exchange protocol plays an important role in electronic commerce in the case of exchanging digital contracts. Verifiably encrypted signatures provide an optimistic solution to these scenarios with an off-line trusted third party. In this paper, we propose an identity-based verifiably encrypted signature scheme. The scheme is non-interactive to generate verifiably encrypted signatures and the resulting encrypted signature consists of only four group elements. Based on the computational Diffie-Hellman assumption, our scheme is proven secure without using random oracles. To the best of our knowledge, this is the first identity-based verifiably encrypted signature scheme provably secure in the standard model.
Merritt, Stephanie M; Ilgen, Daniel R
2008-04-01
We provide an empirical demonstration of the importance of attending to human user individual differences in examinations of trust and automation use. Past research has generally supported the notions that machine reliability predicts trust in automation, and trust in turn predicts automation use. However, links between user personality and perceptions of the machine with trust in automation have not been empirically established. On our X-ray screening task, 255 students rated trust and made automation use decisions while visually searching for weapons in X-ray images of luggage. We demonstrate that individual differences affect perceptions of machine characteristics when actual machine characteristics are constant, that perceptions account for 52% of trust variance above the effects of actual characteristics, and that perceptions mediate the effects of actual characteristics on trust. Importantly, we also demonstrate that when administered at different times, the same six trust items reflect two types of trust (dispositional trust and history-based trust) and that these two trust constructs are differentially related to other variables. Interactions were found among user characteristics, machine characteristics, and automation use. Our results suggest that increased specificity in the conceptualization and measurement of trust is required, future researchers should assess user perceptions of machine characteristics in addition to actual machine characteristics, and incorporation of user extraversion and propensity to trust machines can increase prediction of automation use decisions. Potential applications include the design of flexible automation training programs tailored to individuals who differ in systematic ways.
On the Tradeoff Between Altruism and Selfishness in MANET Trust Management
2016-04-07
to discourage selfish behaviors, using a hidden Markov model (HMM) to quanti - tatively measure the trustworthiness of nodes. Adams et al. [18...based reliability metric to predict trust-based system survivability. Section 4 analyzes numerical results obtained through the evaluation of our SPN...concepts in MANETs, trust man- agement for MANETs should consider the following design features: trust metrics must be customizable, evaluation of
Rupp, Michael A; Michaelis, Jessica R; McConnell, Daniel S; Smither, Janan A
2018-07-01
Lack of physical activity is a severe health concern in the United States with fewer than half of all Americans meeting the recommended weekly physical activity guidelines. Although wearable fitness devices can be effective in motivating people to be active, consumers are abandoning this technology soon after purchase. We examined the impact of several user (i.e. personality, age, computer self-efficacy, physical activity level) and device characteristics (trust, usability, and motivational affordances) on the behavioral intentions to use a wearable fitness device. Novice users completed a brief interaction with a fitness device similar to a first purchase experience before completing questionnaires about their interaction. We found computer self-efficacy, physical activity level, as well as personality traits indirectly increased the desire to use a fitness device and influenced the saliency of perceived motivational affordances. Additionally, trust, usability, and perceived motivational affordances were associated with increased intentions to use fitness devices. Copyright © 2018 Elsevier Ltd. All rights reserved.
Privacy Management and Networked PPD Systems - Challenges Solutions.
Ruotsalainen, Pekka; Pharow, Peter; Petersen, Francoise
2015-01-01
Modern personal portable health devices (PPDs) become increasingly part of a larger, inhomogeneous information system. Information collected by sensors are stored and processed in global clouds. Services are often free of charge, but at the same time service providers' business model is based on the disclosure of users' intimate health information. Health data processed in PPD networks is not regulated by health care specific legislation. In PPD networks, there is no guarantee that stakeholders share same ethical principles with the user. Often service providers have own security and privacy policies and they rarely offer to the user possibilities to define own, or adapt existing privacy policies. This all raises huge ethical and privacy concerns. In this paper, the authors have analyzed privacy challenges in PPD networks from users' viewpoint using system modeling method and propose the principle "Personal Health Data under Personal Control" must generally be accepted at global level. Among possible implementation of this principle, the authors propose encryption, computer understandable privacy policies, and privacy labels or trust based privacy management methods. The latter can be realized using infrastructural trust calculation and monitoring service. A first step is to require the protection of personal health information and the principle proposed being internationally mandatory. This requires both regulatory and standardization activities, and the availability of open and certified software application which all service providers can implement. One of those applications should be the independent Trust verifier.
Kuwabara, Ko
2015-03-01
Research shows that enforcing cooperation using contracts or tangible sanctions can backfire, undermining people's intrinsic motivation to cooperate: when the enforcement is removed, people are less trusting or trustworthy than when there is no enforcement to begin with. The author examines whether reputation systems have similar consequences for generalized trust and trustworthiness. Using a web-based experiment simulating online market transactions (studies 1 and 2), he shows that reputation systems can reinforce generalized trust and trustworthiness, unlike contractual enforcement or relational enforcement based on repeated interactions. In a survey experiment (study 3), he finds that recalling their eBay feedback scores made participants more trusting and trustworthy. These results are predicated on the diffuse nature of reputational enforcement to reinforce perceptions of trust and trustworthiness. These results have implications for understanding how different forms of governance affect generalized trust and trustworthiness.
Tokuda, Yasuharu; Fujii, Seiji; Jimba, Masamine; Inoguchi, Takashi
2009-01-01
Background Vertical and horizontal trust, as dimensions of social capital, may be important determinants of health. As mass media campaigns have been used extensively to promote healthy lifestyles and convey health-related information, high levels of individual trust in the media may facilitate the success of such campaigns and, hence, have a positive influence on health. However, few studies have investigated the relationship between trust levels in mass media, an aspect of vertical trust, and health. Methods Based on cross-sectional data of the general population from the AsiaBarometer Survey (2003–2006), we analyzed the relationship between self-rated health and trust in mass media, using a multilevel logistic model, adjusted for age, gender, marital status, income, education, occupation, horizontal trust, and trust in the healthcare system. Results In a total of 39082 participants (mean age 38; 49% male), 26808 (69%) were classified as in good health. By the levels of trust in mass media, there were 6399 (16%) who reported that they trust a lot, 16327 (42%) reporting trust to a degree, 9838 (25%) who do not really trust, 3307 (9%) who do not trust at all, and 191 (0.5%) who have not thought about it. In the multilevel model, trust in mass media was associated with good health (do not trust at all as the base group): the odds ratios (OR) of 1.16 (95% confidence interval (CI) = 1.05–1.27) for do not really trust; OR of 1.35 (95% CI = 1.23–1.49) for trust to a degree, and 1.57 (95% CI = 1.36–1.81) for trust a lot. Horizontal trust and trust in the healthcare system were also associated with health. Conclusion Vertical trust in mass media is associated with better health in Asian people. Since mass media is likely an important arena for public health, media trust should be enhanced to make people healthier. PMID:19161600
A Novel Trust Service Provider for Internet Based Commerce Applications.
ERIC Educational Resources Information Center
Siyal, M. Y.; Barkat, B.
2002-01-01
Presents a framework for enhancing trust in Internet commerce. Shows how trust can be provided through a network of Trust Service Providers (TSp). Identifies a set of services that should be offered by a TSp. Presents a distributed object-oriented implementation of trust services using CORBA, JAVA and XML. (Author/AEF)
Dibben, M R; Morris, S E; Lean, M E
2000-01-01
A model to explain interpersonal trust development, and its consequences for co-operative behaviour in doctor/patient partnerships derived from the context of business relationships is applied to patient/physician relationships. Threshold barriers exist against all human behaviours or actions and trust is the process by which barriers to co-operation and compliance are overcome. Dispositional trust (a psychological trait to be trusting) is dominant in the early stages of a relationship and contributes to the weight of subsequent trust development. Co-operative behaviour or compliance ultimately requires a secure situational trust emerging from consultations, which is carried forward as learnt trust and modified in each subsequent consultation. The model comprises three types of situational trust (calculus-based, knowledge-based, and identification trust) and five co-operation criteria from which to determine an individual's tendency for co- operative behaviour. These model components can be identified and mapped from a range of qualitative data, with the aim of enhancing co-operative behaviour and efficiently achieving optimal patient compliance.
Study on Information Security and e-Trust in Spanish households
NASA Astrophysics Data System (ADS)
Aguado, José
The study on Information Security and e-Trust in Spanish households has been conducted by INTECO (The National Institute of Communication Technologies) through the Information Security Observatory. It is a study on the incidence and trust of users in the Internet by means of measuring the frequency of the episodes of individual risk in a wide sample of users that are monitored online on a monthly basis, combining quantitative data of incidences (monthly scans of home computers) and qualitative perception data (quarterly surveys). The study is supplied with data from more than 3,000 households with Internet connection, spread across the whole country.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lester, Brian; Scherzinger, William
2017-01-19
Here, a new method for the solution of the non-linear equations forming the core of constitutive model integration is proposed. Specifically, the trust-region method that has been developed in the numerical optimization community is successfully modified for use in implicit integration of elastic-plastic models. Although attention here is restricted to these rate-independent formulations, the proposed approach holds substantial promise for adoption with models incorporating complex physics, multiple inelastic mechanisms, and/or multiphysics. As a first step, the non-quadratic Hosford yield surface is used as a representative case to investigate computationally challenging constitutive models. The theory and implementation are presented, discussed, andmore » compared to other common integration schemes. Multiple boundary value problems are studied and used to verify the proposed algorithm and demonstrate the capabilities of this approach over more common methodologies. Robustness and speed are then investigated and compared to existing algorithms. Through these efforts, it is shown that the utilization of a trust-region approach leads to superior performance versus a traditional closest-point projection Newton-Raphson method and comparable speed and robustness to a line search augmented scheme.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lester, Brian T.; Scherzinger, William M.
2017-01-19
A new method for the solution of the non-linear equations forming the core of constitutive model integration is proposed. Specifically, the trust-region method that has been developed in the numerical optimization community is successfully modified for use in implicit integration of elastic-plastic models. Although attention here is restricted to these rate-independent formulations, the proposed approach holds substantial promise for adoption with models incorporating complex physics, multiple inelastic mechanisms, and/or multiphysics. As a first step, the non-quadratic Hosford yield surface is used as a representative case to investigate computationally challenging constitutive models. The theory and implementation are presented, discussed, and comparedmore » to other common integration schemes. Multiple boundary value problems are studied and used to verify the proposed algorithm and demonstrate the capabilities of this approach over more common methodologies. Robustness and speed are then investigated and compared to existing algorithms. As a result through these efforts, it is shown that the utilization of a trust-region approach leads to superior performance versus a traditional closest-point projection Newton-Raphson method and comparable speed and robustness to a line search augmented scheme.« less
Authentication in Virtual Organizations: A Reputation Based PKI Interconnection Model
NASA Astrophysics Data System (ADS)
Wazan, Ahmad Samer; Laborde, Romain; Barrere, Francois; Benzekri, Abdelmalek
Authentication mechanism constitutes a central part of the virtual organization work. The PKI technology is used to provide the authentication in each organization involved in the virtual organization. Different trust models are proposed to interconnect the different PKIs in order to propagate the trust between them. While the existing trust models contain many drawbacks, we propose a new trust model based on the reputation of PKIs.
de Visser, Ewart J.; Monfort, Samuel S.; Goodyear, Kimberly; Lu, Li; O’Hara, Martin; Lee, Mary R.; Parasuraman, Raja; Krueger, Frank
2017-01-01
Objective We investigated the effects of exogenous oxytocin on trust, compliance, and team decision making with agents varying in anthropomorphism (computer, avatar, human) and reliability (100%, 50%). Background Recent work has explored psychological similarities in how we trust human-like automation compared to how we trust other humans. Exogenous administration of oxytocin, a neuropeptide associated with trust among humans, offers a unique opportunity to probe the anthropomorphism continuum of automation to infer when agents are trusted like another human or merely a machine. Method Eighty-four healthy male participants collaborated with automated agents varying in anthropomorphism that provided recommendations in a pattern recognition task. Results Under placebo, participants exhibited less trust and compliance with automated aids as the anthropomorphism of those aids increased. Under oxytocin, participants interacted with aids on the extremes of the anthropomorphism continuum similarly to placebos, but increased their trust, compliance, and performance with the avatar, an agent on the midpoint of the anthropomorphism continuum. Conclusion This study provided the first evidence that administration of exogenous oxytocin affected trust, compliance, and team decision making with automated agents. These effects provide support for the premise that oxytocin increases affinity for social stimuli in automated aids. Application Designing automation to mimic basic human characteristics is sufficient to elicit behavioral trust outcomes that are driven by neurological processes typically observed in human-human interactions. Designers of automated systems should consider the task, the individual, and the level of anthropomorphism to achieve the desired outcome. PMID:28146673
Warner-Søderholm, Gillian; Bertsch, Andy; Søderholm, Annika
2018-06-01
This article contains data collected from self-report surveys of respondents to measure 1) social media usage, 2) age, 3) gender and 4) trust, measured within five major trust constructs of a) Integrity, b) Competence, c) Concern, d) Benevolence and e) Identification. The data includes all instruments used, SPSS syntax, the raw survey data and descriptive statistics from the analyses. Raw data was entered into SPSS software and scrubbed using appropriate techniques in order to prepare the data for analysis. We believe that our dataset and instrument may give important insights related to computers in human behavior, and predicting trust antecedents in social media use such as age, gender, number of hour online and choice of content provider. We have also created a parsimonious five factor trust instrument developed from the extant literature for future research. Hence, this newly developed trust instrument can be used to measure trust not only in social media, but also in other areas such as healthcare, economics and investor relations, CSR, management and education. Moreover, the survey items developed to measure social media use are concise and may be applied to measure social media use in other contexts such as national cultural differences, marketing and tourism. For interpretation and discussion of the data and constructs, please see original article entitled "Who trusts social media" (Warner-Søderholm et al., 2018) [1].
A trust-based recommendation method using network diffusion processes
NASA Astrophysics Data System (ADS)
Chen, Ling-Jiao; Gao, Jian
2018-09-01
A variety of rating-based recommendation methods have been extensively studied including the well-known collaborative filtering approaches and some network diffusion-based methods, however, social trust relations are not sufficiently considered when making recommendations. In this paper, we contribute to the literature by proposing a trust-based recommendation method, named CosRA+T, after integrating the information of trust relations into the resource-redistribution process. Specifically, a tunable parameter is used to scale the resources received by trusted users before the redistribution back to the objects. Interestingly, we find an optimal scaling parameter for the proposed CosRA+T method to achieve its best recommendation accuracy, and the optimal value seems to be universal under several evaluation metrics across different datasets. Moreover, results of extensive experiments on the two real-world rating datasets with trust relations, Epinions and FriendFeed, suggest that CosRA+T has a remarkable improvement in overall accuracy, diversity and novelty. Our work takes a step towards designing better recommendation algorithms by employing multiple resources of social network information.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-09
... Reference Asset. The term ``Currency,'' as used in the proposed rule, means one or more currencies, or.... Description Proposed Rule 5711(e)(iii) provides that the term ``Currency Trust Shares'' as used in these...-Based Trust Shares; Currency Trust Shares; Commodity Index Trust Shares; Commodity Futures Trust Shares...
ERIC Educational Resources Information Center
Zimerman, Martin
2009-01-01
Having been in the computer industry for many years, the author is reminded of one of the earliest tenets of word processing: Saving one's work, and save it often. It's encouraging to see that people trust computers not to lose their work. Unfortunately, due to budget cuts, aging computer hardware, a possibly questionable electrical supply, and…
ERIC Educational Resources Information Center
Bhatiasevi, Veera; Naglis, Michael
2016-01-01
This research is one of the first few to investigate the adoption and usage of cloud computing in higher education in the context of developing countries, in this case Thailand. It proposes extending the technology acceptance model to integrate subjective norm, perceived convenience, trust, computer self-efficacy, and software functionality in…
Human-Computer Interaction: A Review of the Research on Its Affective and Social Aspects.
ERIC Educational Resources Information Center
Deaudelin, Colette; Dussault, Marc; Brodeur, Monique
2003-01-01
Discusses a review of 34 qualitative and non-qualitative studies related to affective and social aspects of student-computer interactions. Highlights include the nature of the human-computer interaction (HCI); the interface, comparing graphic and text types; and the relation between variables linked to HCI, mainly trust, locus of control,…
Sound Trust and the Ethics of Telecare.
Voerman, Sander A; Nickel, Philip J
2017-02-01
The adoption of web-based telecare services has raised multifarious ethical concerns, but a traditional principle-based approach provides limited insight into how these concerns might be addressed and what, if anything, makes them problematic. We take an alternative approach, diagnosing some of the main concerns as arising from a core phenomenon of shifting trust relations that come about when the physician plays a less central role in the delivery of care, and new actors and entities are introduced. Correspondingly, we propose an applied ethics of trust based on the idea that patients should be provided with good reasons to trust telecare services, which we call sound trust. On the basis of this approach, we propose several concrete strategies for safeguarding sound trust in telecare. © The Author 2016. Published by Oxford University Press, on behalf of The Journal of Medicine and Philosophy Inc. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.
Chancey, Eric T; Bliss, James P; Yamani, Yusuke; Handley, Holly A H
2017-05-01
This study provides a theoretical link between trust and the compliance-reliance paradigm. We propose that for trust mediation to occur, the operator must be presented with a salient choice, and there must be an element of risk for dependence. Research suggests that false alarms and misses affect dependence via two independent processes, hypothesized as trust in signals and trust in nonsignals. These two trust types manifest in categorically different behaviors: compliance and reliance. Eighty-eight participants completed a primary flight task and a secondary signaling system task. Participants evaluated their trust according to the informational bases of trust: performance, process, and purpose. Participants were in a high- or low-risk group. Signaling systems varied by reliability (90%, 60%) within subjects and error bias (false alarm prone, miss prone) between subjects. False-alarm rate affected compliance but not reliance. Miss rate affected reliance but not compliance. Mediation analyses indicated that trust mediated the relationship between false-alarm rate and compliance. Bayesian mediation analyses favored evidence indicating trust did not mediate miss rate and reliance. Conditional indirect effects indicated that factors of trust mediated the relationship between false-alarm rate and compliance (i.e., purpose) and reliance (i.e., process) but only in the high-risk group. The compliance-reliance paradigm is not the reflection of two types of trust. This research could be used to update training and design recommendations that are based upon the assumption that trust causes operator responses regardless of error bias.
Barker, Fiona; Court, Gemma
2011-01-01
Computers are used increasingly in patient-clinician consultations. There is the potential for PC use to have an effect on the communication process. The aim of this preliminary study was to investigate patient opinion regarding the use of PC-based note taking during diagnostic vestibular assessments. We gave a simple four-item questionnaire to 100 consecutive patients attending for vestibular assessment at a secondary referral level primary care trust audiology service. Written responses to two of the questionnaire items were subject to an inductive thematic analysis. The questionnaire was acceptable to patients, none refused to complete it. Dominant themes identified suggest that patients do perceive consistent positive benefits from the use of PC-based note taking. This pilot study's short survey instrument is usable and may provide insights into patients' perceptions of computer use in a clinical setting.
Towards Trust-based Cognitive Networks: A Survey of Trust Management for Mobile Ad Hoc Networks
2009-06-01
of trust. First, social trust refers to properties derived from social relationships . Examples of social networks are strong social ... relationships such as colleagues or relatives or loose social relationships such as school alumni or friends with common interests [44]. Social trust may...also use social relationships in evaluating the trust metric among group members by employing the concept of social networks. Yu et al. [44] define
Trust-based information system architecture for personal wellness.
Ruotsalainen, Pekka; Nykänen, Pirkko; Seppälä, Antto; Blobel, Bernd
2014-01-01
Modern eHealth, ubiquitous health and personal wellness systems take place in an unsecure and ubiquitous information space where no predefined trust occurs. This paper presents novel information model and an architecture for trust based privacy management of personal health and wellness information in ubiquitous environment. The architecture enables a person to calculate a dynamic and context-aware trust value for each service provider, and using it to design personal privacy policies for trustworthy use of health and wellness services. For trust calculation a novel set of measurable context-aware and health information-sensitive attributes is developed. The architecture enables a person to manage his or her privacy in ubiquitous environment by formulating context-aware and service provider specific policies. Focus groups and information modelling was used for developing a wellness information model. System analysis method based on sequential steps that enable to combine results of analysis of privacy and trust concerns and the selection of trust and privacy services was used for development of the information system architecture. Its services (e.g. trust calculation, decision support, policy management and policy binding services) and developed attributes enable a person to define situation-aware policies that regulate the way his or her wellness and health information is processed.
Establishment of safety paradigms and trust in emerging adult relationships.
Mullinax, Margo; Sanders, Stephanie; Higgins, Jenny; Dennis, Barbara; Reece, Michael; Fortenberry, J Dennis
2016-08-01
There is a critical need to understand the interplay between relationship trust and public health outcomes. The purpose of this study was to develop an understanding of emerging adult women's processes of establishing trust in sexual relationships. Twenty-five women aged 18-24 years participated in semi-structured interviews. Throughout the interviews, women compared and contrasted experiences in which they felt comfortable engaging in sexual intercourse with a partner versus times in which they did not feel comfortable. Analysis was based on a critical qualitative research orientation. When asked to speak to instances when they felt comfortable having sex, most women spoke about relationship trust. Many participants conceptualised trust based on past experiences with bad relationships or sexual violence. Based on their previous experiences of feeling unsafe or undervalued, emotional and physical security became prioritised in relationship development. Trust was developed through friendship, communication over time, and through shared life experiences. This research is among the first to qualitatively investigate trust formation and other impersonal dynamics related to sexual health decision-making. Insights from this study should be translated into future action by public health practitioners to promote healthy sexual relationships and communication about sexual health topics as a form of trust building.
Impact of signals and experience on trust and trusting behavior.
Chen, Ying-Hueih; Chien, Shu-Hua; Wu, Jyh-Jeng; Tsai, Pei-Yin
2010-10-01
Trust is an essential factor that drives virtual interaction and transactions on the Internet. Researchers have investigated the trust development process, and identified several important factors that form the basis for trust. This research combines the signal perspective and trust theory to examine the impact of market signals and past experience on trust formation and trusting behavior. Three market signals, including brand image, Web-site investment, and privacy policies, are identified and empirically tested to determine their impact on consumer trust. Based on 322 active Web users, the quantitative results suggest that brand image, Web-site investment, privacy policies, and past experience all positively impact trust formation. Furthermore, trust shows a positive effect on Web-site stickiness. Both theoretical and practical implications of the results are also offered.
Trust-based prayer expectancies and health among older Mexican Americans.
Krause, Neal; Hayward, R David
2014-04-01
This study assesses the health-related effects of trust-based prayer expectancies, which reflect the belief that God answers prayers at the right time and in the best way. The following relationships are evaluated in our conceptual model: (1) older Mexican Americans who attend worship services more often tend to develop a closer relationship with God; (2) people who feel close to God will be more likely to develop trust-based prayer expectancies; (3) people who endorse trust-based prayer expectancies will have greater feelings of self-esteem; and (4) higher self-esteem is associated with better self-rated health. The data support each of these relationships.
Xu, Qian; Tan, Chengxiang; Fan, Zhijie; Zhu, Wenye; Xiao, Ya; Cheng, Fujia
2018-01-01
Nowadays, fog computing provides computation, storage, and application services to end users in the Internet of Things. One of the major concerns in fog computing systems is how fine-grained access control can be imposed. As a logical combination of attribute-based encryption and attribute-based signature, Attribute-based Signcryption (ABSC) can provide confidentiality and anonymous authentication for sensitive data and is more efficient than traditional “encrypt-then-sign” or “sign-then-encrypt” strategy. Thus, ABSC is suitable for fine-grained access control in a semi-trusted cloud environment and is gaining more and more attention recently. However, in many existing ABSC systems, the computation cost required for the end users in signcryption and designcryption is linear with the complexity of signing and encryption access policy. Moreover, only a single authority that is responsible for attribute management and key generation exists in the previous proposed ABSC schemes, whereas in reality, mostly, different authorities monitor different attributes of the user. In this paper, we propose OMDAC-ABSC, a novel data access control scheme based on Ciphertext-Policy ABSC, to provide data confidentiality, fine-grained control, and anonymous authentication in a multi-authority fog computing system. The signcryption and designcryption overhead for the user is significantly reduced by outsourcing the undesirable computation operations to fog nodes. The proposed scheme is proven to be secure in the standard model and can provide attribute revocation and public verifiability. The security analysis, asymptotic complexity comparison, and implementation results indicate that our construction can balance the security goals with practical efficiency in computation. PMID:29772840
Community trust and household health: A spatially-based approach with evidence from rural Honduras.
Zarychta, Alan
2015-12-01
What is the relationship between community trust and household health? Scholars working to understand the effects of trust and social capital on human health tend to focus on individual characteristics or social environments, frequently without integrating these two dimensions. In light of this, the present paper makes contributions in both conceptualization and measurement. First, I develop a spatially-based approach for operationalizing community trust as the product of individual orientation and social environment. This approach highlights the need for a household to trust its neighbors and for those neighbors to reciprocate trust in order to constitute the psychological and material mechanisms critical for linking social context to individual health. Second, I illustrate the utility of this measure by evaluating the relationship between community trust and self-rated health status using an original population census survey from 2009 to 2010 for two municipalities in western Honduras (approximately 2800 households with a response rate of 94.9%). I implement spatial regression analysis and show that there is a positive and substantively meaningful relationship between community trust and household health; households that are trusting and surrounded by similarly trusting neighbors report better health status, while those in uncertain or mutually distrusting environments report worse health. The theory and results presented here suggest an important link between trust and social capital at the community level, which is particularly salient for rural regions in developing countries where health resources are scarce and community-based interventions are common. Copyright © 2015 Elsevier Ltd. All rights reserved.
ERIC Educational Resources Information Center
Polat, Soner
2007-01-01
The objective of this research is to display; (a) the effect of organizational justice in explaining school trust, administrator trust and organizational citizenship behavior, (b)the effect of school trust and administrator trust in explaining organizational citizenship behavior, based on perceptions related with the variables of organizational…
Trust Maximization in Social Networks
NASA Astrophysics Data System (ADS)
Zhan, Justin; Fang, Xing
Trust is a human-related phenomenon in social networks. Trust research on social networks has gained much attention on its usefulness, and on modeling propagations. There is little focus on finding maximum trust in social networks which is particularly important when a social network is oriented by certain tasks. In this paper, we propose a trust maximization algorithm based on the task-oriented social networks.
Information Hiding based Trusted Computing System Design
2014-07-18
ABSTRACT 15. SUBJECT TERMS 18. NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON a. REPORT b . ABSTRACT c. THIS PAGE 17. LIMITATION OF...system with two flip flops (FF) and some logic gates (Figure 1 ( b )). First, from Figure 1(a), we see that when the system is at state B and input is 0...FF2 is 1, which reflects the current state B , if input = 0, we can easily verify that FF1 remains unchanged, but FF2 changes to 0. This means that
Assumptions, Trust, and Names in Computer Security Protocols
2011-06-01
sharing her banking credentials with a criminal, which is clearly bad . But PKI proto- cols like this one can be used in other, less risky ways. Suppose...Figure 4.5. This is similar to a failure of PKI-based protocols in which the authority signs a bad certificate. But the interesting thing is how the... Zoo Figure 4.6: Using AdultVerify. The run is as follows: 1. As the first step in Diffie-Hellman Key Exchange, Alice picks and sends the
Volitional Trust, Autonomy Satisfaction, and Engagement at Work.
Heyns, Marita; Rothmann, Sebastiaan
2018-02-01
This study tested a structural model that identifies the nature of relationships between trust, autonomy satisfaction, and personal engagement at work. A cross-sectional survey design with a convenience sample ( n = 252) was used. The Behavioral Trust Inventory, Work-Related Basic Need Satisfaction Scale, and Work Engagement Scale were administered. While reliance-based trust did not have a significant influence on engagement, disclosure-based trust in a focal leader was found to predict satisfaction of autonomy needs and employee engagement. Mediation analyses revealed that satisfaction of the need for autonomy facilitates the influence of trust on work outcomes. More specifically, disclosure (a dimension of trust) impacted engagement via autonomy satisfaction. Overall, the model explained 44% of total variance in engagement, to which the variables proportionately contributed as follows: autonomy satisfaction = 79.58%, disclosure = 18.22%, and reliance = 2.20%. The findings provide possible directions for how leaders can leverage trust to facilitate autonomy support and higher levels of engagement.
Recommendation based on trust diffusion model.
Yuan, Jinfeng; Li, Li
2014-01-01
Recommender system is emerging as a powerful and popular tool for online information relevant to a given user. The traditional recommendation system suffers from the cold start problem and the data sparsity problem. Many methods have been proposed to solve these problems, but few can achieve satisfactory efficiency. In this paper, we present a method which combines the trust diffusion (DiffTrust) algorithm and the probabilistic matrix factorization (PMF). DiffTrust is first used to study the possible diffusions of trust between various users. It is able to make use of the implicit relationship of the trust network, thus alleviating the data sparsity problem. The probabilistic matrix factorization (PMF) is then employed to combine the users' tastes with their trusted friends' interests. We evaluate the algorithm on Flixster, Moviedata, and Epinions datasets, respectively. The experimental results show that the recommendation based on our proposed DiffTrust + PMF model achieves high performance in terms of the root mean square error (RMSE), Recall, and F Measure.
Recommendation Based on Trust Diffusion Model
Li, Li
2014-01-01
Recommender system is emerging as a powerful and popular tool for online information relevant to a given user. The traditional recommendation system suffers from the cold start problem and the data sparsity problem. Many methods have been proposed to solve these problems, but few can achieve satisfactory efficiency. In this paper, we present a method which combines the trust diffusion (DiffTrust) algorithm and the probabilistic matrix factorization (PMF). DiffTrust is first used to study the possible diffusions of trust between various users. It is able to make use of the implicit relationship of the trust network, thus alleviating the data sparsity problem. The probabilistic matrix factorization (PMF) is then employed to combine the users' tastes with their trusted friends' interests. We evaluate the algorithm on Flixster, Moviedata, and Epinions datasets, respectively. The experimental results show that the recommendation based on our proposed DiffTrust + PMF model achieves high performance in terms of the root mean square error (RMSE), Recall, and F Measure. PMID:25009827
Building trusting relationships in online health communities.
Zhao, Jing; Ha, Sejin; Widdows, Richard
2013-09-01
This study investigates consumers' use of online health communities (OHCs) for healthcare from a relationship building perspective based on the commitment-trust theory of relationships. The study proposes that perspective taking, empathic concern, self-efficacy, and network density affect the development of both cognitive and affective trust, which together determine OHC members' membership continuance intention (MCI) and knowledge contribution. Data collected from eight existing OHCs (N=255) were utilized to test the hypothesized model. Results show that perspective taking and self-efficacy can increase cognitive trust and affective trust, respectively. Network density contributes to cognitive and affective trust. Both cognitive trust and affective trust influence MCI, while only affective trust impacts members' knowledge contribution behaviors.
Research on trust calculation of wireless sensor networks based on time segmentation
NASA Astrophysics Data System (ADS)
Su, Yaoxin; Gao, Xiufeng; Qiao, Wenxin
2017-05-01
Because the wireless sensor network is different from the traditional network characteristics, it is easy to accept the intrusion from the compromise node. The trust mechanism is the most effective way to defend against internal attacks. Aiming at the shortcomings of the existing trust mechanism, a method of calculating the trust of wireless sensor networks based on time segmentation is proposed. It improves the security of the network and extends the life of the network
Limited-memory trust-region methods for sparse relaxation
NASA Astrophysics Data System (ADS)
Adhikari, Lasith; DeGuchy, Omar; Erway, Jennifer B.; Lockhart, Shelby; Marcia, Roummel F.
2017-08-01
In this paper, we solve the l2-l1 sparse recovery problem by transforming the objective function of this problem into an unconstrained differentiable function and applying a limited-memory trust-region method. Unlike gradient projection-type methods, which uses only the current gradient, our approach uses gradients from previous iterations to obtain a more accurate Hessian approximation. Numerical experiments show that our proposed approach eliminates spurious solutions more effectively while improving computational time.
Nihonsugi, Tsuyoshi; Ihara, Aya; Haruno, Masahiko
2015-02-25
The intention behind another's action and the impact of the outcome are major determinants of human economic behavior. It is poorly understood, however, whether the two systems share a core neural computation. Here, we investigated whether the two systems are causally dissociable in the brain by integrating computational modeling, functional magnetic resonance imaging, and transcranial direct current stimulation experiments in a newly developed trust game task. We show not only that right dorsolateral prefrontal cortex (DLPFC) activity is correlated with intention-based economic decisions and that ventral striatum and amygdala activity are correlated with outcome-based decisions, but also that stimulation to the DLPFC selectively enhances intention-based decisions. These findings suggest that the right DLPFC is involved in the implementation of intention-based decisions in the processing of cooperative decisions. This causal dissociation of cortical and subcortical backgrounds may indicate evolutionary and developmental differences in the two decision systems. Copyright © 2015 the authors 0270-6474/15/53412-08$15.00/0.
Interval-type and affine arithmetic-type techniques for handling uncertainty in expert systems
NASA Astrophysics Data System (ADS)
Ceberio, Martine; Kreinovich, Vladik; Chopra, Sanjeev; Longpre, Luc; Nguyen, Hung T.; Ludascher, Bertram; Baral, Chitta
2007-02-01
Expert knowledge consists of statements Sj (facts and rules). The facts and rules are often only true with some probability. For example, if we are interested in oil, we should look at seismic data. If in 90% of the cases, the seismic data were indeed helpful in locating oil, then we can say that if we are interested in oil, then with probability 90% it is helpful to look at the seismic data. In more formal terms, we can say that the implication "if oil then seismic" holds with probability 90%. Another example: a bank A trusts a client B, so if we trust the bank A, we should trust B too; if statistically this trust was justified in 99% of the cases, we can conclude that the corresponding implication holds with probability 99%. If a query Q is deducible from facts and rules, what is the resulting probability p(Q) in Q? We can describe the truth of Q as a propositional formula F in terms of Sj, i.e., as a combination of statements Sj linked by operators like &, [logical or], and [not sign]; computing p(Q) exactly is NP-hard, so heuristics are needed. Traditionally, expert systems use technique similar to straightforward interval computations: we parse F and replace each computation step with corresponding probability operation. Problem: at each step, we ignore the dependence between the intermediate results Fj; hence intervals are too wide. Example: the estimate for P(A[logical or][not sign]A) is not 1. Solution: similar to affine arithmetic, besides P(Fj), we also compute P(Fj&Fi) (or P(Fj1&...&Fjd)), and on each step, use all combinations of l such probabilities to get new estimates. Results: e.g., P(A[logical or][not sign]A) is estimated as 1.
Using Trust to Establish a Secure Routing Model in Cognitive Radio Network.
Zhang, Guanghua; Chen, Zhenguo; Tian, Liqin; Zhang, Dongwen
2015-01-01
Specific to the selective forwarding attack on routing in cognitive radio network, this paper proposes a trust-based secure routing model. Through monitoring nodes' forwarding behaviors, trusts of nodes are constructed to identify malicious nodes. In consideration of that routing selection-based model must be closely collaborative with spectrum allocation, a route request piggybacking available spectrum opportunities is sent to non-malicious nodes. In the routing decision phase, nodes' trusts are used to construct available path trusts and delay measurement is combined for making routing decisions. At the same time, according to the trust classification, different responses are made specific to their service requests. By adopting stricter punishment on malicious behaviors from non-trusted nodes, the cooperation of nodes in routing can be stimulated. Simulation results and analysis indicate that this model has good performance in network throughput and end-to-end delay under the selective forwarding attack.
The role of perceived interactivity in virtual communities: building trust and increasing stickiness
NASA Astrophysics Data System (ADS)
Wang, Hongwei; Meng, Yuan; Wang, Wei
2013-03-01
Although previous research has explored factors affecting trust building in websites, little research has been analysed from the perceived interactivity perspective in virtual communities (VCs). A research model for verifying interactivity antecedents to trust and its impact on member stickiness behaviour is presented. Two social interactivity components and two system interactivity components are, respectively, theorised as process-based antecedents and institution-based antecedents to trust in the model. Data were collected from 310 members of VCs to test the model. The results show that connectedness and reciprocity are important antecedents to trust in members, while responsiveness and active control are important antecedents to trust in systems. The results also indicate that trust has significant influence on the members' duration and retention, which are two dimensions of member stickiness measured in this research. These findings have theoretical implications for online interaction-related literature and critical business implications for practitioners of VCs.
Age Effects on Trustworthiness Activation and Trust Biases in Face Perception.
Cassidy, Brittany S; Boucher, Kathryn L; Lanie, Shelby T; Krendl, Anne C
2018-05-26
Older adults evaluate faces as being more trustworthy than do younger adults. The present work examined whether aging is associated with changes in the dynamic activation of trustworthiness categories toward faces, and if category activation relates to enhanced trust. Younger and older adults categorized faces as trustworthy or untrustworthy while computer mouse trajectories were recorded to measure dynamic category activation. Older, but not younger, adults had more dynamic category activation (i.e., trustworthy and untrustworthy) when they viewed untrustworthy versus trustworthy faces. This tendency predicted a bias (pronounced with age) toward evaluating faces as being trustworthy. A pronounced trust bias in aging may be related to greater dynamic activation of trustworthiness (versus untrustworthiness) when perceiving faces.
A longitudinal and experimental study of the impact of knowledge on the bases of institutional trust
Kimbrough, Christopher D.; Shockley, Ellie; Neal, Tess M. S.; Herian, Mitchel N.; Hamm, Joseph A.; Bornstein, Brian H.; Tomkins, Alan J.
2017-01-01
This study examined a knowledge-centered theory of institutional trust development. In the context of trust in water regulatory institutions, the moderating impact of knowledge was tested to determine if there were longitudinal changes in the bases of institutional trust as a function of increases in knowledge about a target institution. We hypothesized that as people learn about an institution with which they were previously unfamiliar, they begin to form more nuanced perceptions, distinguishing the new institution from other institutions and relying less upon their generalized trust to estimate their trust in that institution. Prior to having specific, differential information about a new institution, we expected institutional trust to be a function of generalized trust variables such as dispositional trust and trust in government. The longitudinal experiment involved 185 college students randomly assigned to one of three information conditions. Every 3 months for 15 months, participants read information about water regulatory institutions or a control institution. At each time point, participants reported their trust in and perceptions of the trust- and distrust-worthiness of the water regulatory institutions. Participants also completed measures of knowledge of water regulatory institutions, dispositional trust, and governmental trust. Our manipulation check indicated that, as expected, those in the experimental group increased in subjective knowledge of water regulatory institutions to a greater extent than those in the control condition. Consistent with our hypotheses, there was some evidence that, compared to the control group, the experimental group relied less on their general trust in government as a basis for their trust in water regulatory institutions. However, contrary to our hypotheses, there was no evidence the experimental group relied less on dispositional trust as a basis for institutional trust. There also was some evidence the experimental group’s trust in water regulatory institutions was less affected by fluctuations of trustworthiness (but not distrustworthiness) perceptions over time. This suggests that knowledge results in the development of more stable institutional trust attitudes, but that trustworthiness and distrustworthiness perceptions may operate somewhat differently when impacting trust in specific institutions. PMID:28414808
PytlikZillig, Lisa M; Kimbrough, Christopher D; Shockley, Ellie; Neal, Tess M S; Herian, Mitchel N; Hamm, Joseph A; Bornstein, Brian H; Tomkins, Alan J
2017-01-01
This study examined a knowledge-centered theory of institutional trust development. In the context of trust in water regulatory institutions, the moderating impact of knowledge was tested to determine if there were longitudinal changes in the bases of institutional trust as a function of increases in knowledge about a target institution. We hypothesized that as people learn about an institution with which they were previously unfamiliar, they begin to form more nuanced perceptions, distinguishing the new institution from other institutions and relying less upon their generalized trust to estimate their trust in that institution. Prior to having specific, differential information about a new institution, we expected institutional trust to be a function of generalized trust variables such as dispositional trust and trust in government. The longitudinal experiment involved 185 college students randomly assigned to one of three information conditions. Every 3 months for 15 months, participants read information about water regulatory institutions or a control institution. At each time point, participants reported their trust in and perceptions of the trust- and distrust-worthiness of the water regulatory institutions. Participants also completed measures of knowledge of water regulatory institutions, dispositional trust, and governmental trust. Our manipulation check indicated that, as expected, those in the experimental group increased in subjective knowledge of water regulatory institutions to a greater extent than those in the control condition. Consistent with our hypotheses, there was some evidence that, compared to the control group, the experimental group relied less on their general trust in government as a basis for their trust in water regulatory institutions. However, contrary to our hypotheses, there was no evidence the experimental group relied less on dispositional trust as a basis for institutional trust. There also was some evidence the experimental group's trust in water regulatory institutions was less affected by fluctuations of trustworthiness (but not distrustworthiness) perceptions over time. This suggests that knowledge results in the development of more stable institutional trust attitudes, but that trustworthiness and distrustworthiness perceptions may operate somewhat differently when impacting trust in specific institutions.
Comprehensive security framework for the communication and storage of medical images
NASA Astrophysics Data System (ADS)
Slik, David; Montour, Mike; Altman, Tym
2003-05-01
Confidentiality, integrity verification and access control of medical imagery and associated metadata is critical for the successful deployment of integrated healthcare networks that extend beyond the department level. As medical imagery continues to become widely accessed across multiple administrative domains and geographically distributed locations, image data should be able to travel and be stored on untrusted infrastructure, including public networks and server equipment operated by external entities. Given these challenges associated with protecting large-scale distributed networks, measures must be taken to protect patient identifiable information while guarding against tampering, denial of service attacks, and providing robust audit mechanisms. The proposed framework outlines a series of security practices for the protection of medical images, incorporating Transport Layer Security (TLS), public and secret key cryptography, certificate management and a token based trusted computing base. It outlines measures that can be utilized to protect information stored within databases, online and nearline storage, and during transport over trusted and untrusted networks. In addition, it provides a framework for ensuring end-to-end integrity of image data from acquisition to viewing, and presents a potential solution to the challenges associated with access control across multiple administrative domains and institution user bases.
ERIC Educational Resources Information Center
Nadelson, Louis; Jorcyk, Cheryl; Yang, Dazhi; Jarratt Smith, Mary; Matson, Sam; Cornell, Ken; Husting, Virginia
2014-01-01
Trust in science and scientists can greatly influence consideration of scientific developments and activities. Yet, trust is a nebulous construct based on emotions, knowledge, beliefs, and relationships. As we explored the literature regarding trust in science and scientists we discovered that no instruments were available to assess the construct,…
The most dangerous hospital or the most dangerous equation?
Tu, Yu-Kang; Gilthorpe, Mark S
2007-11-15
Hospital mortality rates are one of the most frequently selected indicators for measuring the performance of NHS Trusts. A recent article in a national newspaper named the hospital with the highest or lowest mortality in the 2005/6 financial year; a report by the organization Dr Foster Intelligence provided information with regard to the performance of all NHS Trusts in England. Basic statistical theory and computer simulations were used to explore the relationship between the variations in the performance of NHS Trusts and the sizes of the Trusts. Data of hospital standardised mortality ratio (HSMR) of 152 English NHS Trusts for 2005/6 were re-analysed. A close examination of the information reveals a pattern which is consistent with a statistical phenomenon, discovered by the French mathematician de Moivre nearly 300 years ago, described in every introductory statistics textbook: namely that variation in performance indicators is expected to be greater in small Trusts and smaller in large Trusts. From a statistical viewpoint, the number of deaths in a hospital is not in proportion to the size of the hospital, but is proportional to the square root of its size. Therefore, it is not surprising to note that small hospitals are more likely to occur at the top and the bottom of league tables, whilst mortality rates are independent of hospital sizes. This statistical phenomenon needs to be taken into account in the comparison of hospital Trusts performance, especially with regard to policy decisions.
Establishment of safety paradigms and trust in emerging adult relationships
Mullinax, Margo; Sanders, Stephanie; Higgins, Jenny; Dennis, Barbara; Reece, Michael; Fortenberry, J. Dennis
2016-01-01
There is a critical need to understand the interplay between relationship trust and public health outcomes. The purpose of this study was to develop an understanding of emerging adult women’s processes of establishing trust in sexual relationships. Twenty-five women aged 18–24 years participated in semi-structured interviews. Throughout the interviews, women compared and contrasted experiences in which they felt comfortable engaging in sexual intercourse with a partner versus times in which they did not feel comfortable. Analysis was based on a critical qualitative research orientation. When asked to speak to instances when they felt comfortable having sex, most women spoke about relationship trust. Many participants conceptualised trust based on past experiences with bad relationships or sexual violence. Based on their previous experiences of feeling unsafe or undervalued, emotional and physical security became prioritised in relationship development. Trust was developed through friendship, communication over time, and through shared life experiences. This research is among the first to qualitatively investigate trust formation and other impersonal dynamics related to sexual health decision-making. Insights from this study should be translated into future action by public health practitioners to promote healthy sexual relationships and communication about sexual health topics as a form of trust building. PMID:26943023
How Navigating Uncertainty Motivates Trust in Medicine.
Imber, Jonathan B
2017-04-01
Three significant factors in the shaping of modern medicine contribute to broad perceptions about trust in the patient-physician relationship: moral, professional, and epidemiological uncertainty. Trusting a physician depends first on trusting a person, then trusting a person's skills and training, and finally trusting the science that underwrites those skills. This essay, in part based on my book, Trusting Doctors: The Decline of Moral Authority in American Medicine (Princeton University Press, 2008), will address the forms of uncertainty that contribute to the nature of difficult encounters in the patient-physician relationship. © 2017 American Medical Association. All Rights Reserved.
GBOOST: a GPU-based tool for detecting gene-gene interactions in genome-wide case control studies.
Yung, Ling Sing; Yang, Can; Wan, Xiang; Yu, Weichuan
2011-05-01
Collecting millions of genetic variations is feasible with the advanced genotyping technology. With a huge amount of genetic variations data in hand, developing efficient algorithms to carry out the gene-gene interaction analysis in a timely manner has become one of the key problems in genome-wide association studies (GWAS). Boolean operation-based screening and testing (BOOST), a recent work in GWAS, completes gene-gene interaction analysis in 2.5 days on a desktop computer. Compared with central processing units (CPUs), graphic processing units (GPUs) are highly parallel hardware and provide massive computing resources. We are, therefore, motivated to use GPUs to further speed up the analysis of gene-gene interactions. We implement the BOOST method based on a GPU framework and name it GBOOST. GBOOST achieves a 40-fold speedup compared with BOOST. It completes the analysis of Wellcome Trust Case Control Consortium Type 2 Diabetes (WTCCC T2D) genome data within 1.34 h on a desktop computer equipped with Nvidia GeForce GTX 285 display card. GBOOST code is available at http://bioinformatics.ust.hk/BOOST.html#GBOOST.
On Target Localization Using Combined RSS and AoA Measurements
Beko, Marko; Dinis, Rui
2018-01-01
This work revises existing solutions for a problem of target localization in wireless sensor networks (WSNs), utilizing integrated measurements, namely received signal strength (RSS) and angle of arrival (AoA). The problem of RSS/AoA-based target localization became very popular in the research community recently, owing to its great applicability potential and relatively low implementation cost. Therefore, here, a comprehensive study of the state-of-the-art (SoA) solutions and their detailed analysis is presented. The beginning of this work starts by considering the SoA approaches based on convex relaxation techniques (more computationally complex in general), and it goes through other (less computationally complex) approaches, as well, such as the ones based on the generalized trust region sub-problems framework and linear least squares. Furthermore, a detailed analysis of the computational complexity of each solution is reviewed. Furthermore, an extensive set of simulation results is presented. Finally, the main conclusions are summarized, and a set of future aspects and trends that might be interesting for future research in this area is identified. PMID:29671832
Combinations of SNP genotypes from the Wellcome Trust Case Control Study of bipolar patients.
Mellerup, Erling; Jørgensen, Martin Balslev; Dam, Henrik; Møller, Gert Lykke
2018-04-01
Combinations of genetic variants are the basis for polygenic disorders. We examined combinations of SNP genotypes taken from the 446 729 SNPs in The Wellcome Trust Case Control Study of bipolar patients. Parallel computing by graphics processing units, cloud computing, and data mining tools were used to scan The Wellcome Trust data set for combinations. Two clusters of combinations were significantly associated with bipolar disorder. One cluster contained 68 combinations, each of which included five SNP genotypes. Of the 1998 patients, 305 had combinations from this cluster in their genome, but none of the 1500 controls had any of these combinations in their genome. The other cluster contained six combinations, each of which included five SNP genotypes. Of the 1998 patients, 515 had combinations from the cluster in their genome, but none of the 1500 controls had any of these combinations in their genome. Clusters of combinations of genetic variants can be considered general risk factors for polygenic disorders, whereas accumulation of combinations from the clusters in the genome of a patient can be considered a personal risk factor.
1990-10-04
methods Category 6: Cryptographic methods (hard/ software ) - Tested countermeasures and standard means - Acknowledgements As the number of antivirus ...Skulason), only our own antiviruses have been mentioned in the catalog. We hope to include the major antivirus packages in the future. The current...Center GTE SRI International Trusted Information Systems, Inc. Grumann Data Systems SRI International Software Engineering Institute Trusted
Trust-based learning and behaviors for convoy obstacle avoidance
NASA Astrophysics Data System (ADS)
Mikulski, Dariusz G.; Karlsen, Robert E.
2015-05-01
In many multi-agent systems, robots within the same team are regarded as being fully trustworthy for cooperative tasks. However, the assumption of trustworthiness is not always justified, which may not only increase the risk of mission failure, but also endanger the lives of friendly forces. In prior work, we addressed this issue by using RoboTrust to dynamically adjust to observed behaviors or recommendations in order to mitigate the risks of illegitimate behaviors. However, in the simulations in prior work, all members of the convoy had knowledge of the convoy goal. In this paper, only the lead vehicle has knowledge of the convoy goals and the follow vehicles must infer trustworthiness strictly from lead vehicle performance. In addition, RoboTrust could only respond to observed performance and did not dynamically learn agent behavior. In this paper, we incorporate an adaptive agent-specific bias into the RoboTrust algorithm that modifies its trust dynamics. This bias is learned incrementally from agent interactions, allowing good agents to benefit from faster trust growth and slower trust decay and bad agents to be penalized with slower trust growth and faster trust decay. We then integrate this new trust model into a trust-based controller for decentralized autonomous convoy operations. We evaluate its performance in an obstacle avoidance mission, where the convoy attempts to learn the best speed and following distances combinations for an acceptable obstacle avoidance probability.
Carpiano, Richard M; Fitterer, Lisa M
2014-09-01
Health research on personal social capital has often utilized measures of respondents' perceived trust of others as either a proxy for one's social capital in the absence of more focused measures or as a subjective component of social capital. Little empirical work has evaluated the validity of such practices. We test the construct validity of two trust measures used commonly in health research on social capital-generalized trust and trust of neighbors-with respect to measures of people's general network-, organization-, family-, friend-, and neighborhood-based social capital and the extent to which these two trust measures are associated with self-rated general health and mental health when social capital measures are included in the same models. Analyses of 2008 Canadian General Social Survey data (response rate 57.3%) indicate that generalized trust and trust of neighbors are both positively-yet modestly-associated with measures of several domains of network-based social capital. Both trust measures are positively associated with general and mental health, but these associations remain robust after adjusting for social capital measures. Our findings suggest that (a) trust is conceptually distinct from social capital, (b) trust measures are inadequate proxies for actual personal social networks, and (c) trust measures may only be capturing psychological aspects relevant to-but not indicative of-social capital. Though links between perceived trust and health deserve study, health research on social capital needs to utilize measures of respondents' actual social networks and their inherent resources. Copyright © 2014 Elsevier Ltd. All rights reserved.
Trust recovery model of Ad Hoc network based on identity authentication scheme
NASA Astrophysics Data System (ADS)
Liu, Jie; Huan, Shuiyuan
2017-05-01
Mobile Ad Hoc network trust model is widely used to solve mobile Ad Hoc network security issues. Aiming at the problem of reducing the network availability caused by the processing of malicious nodes and selfish nodes in mobile Ad Hoc network routing based on trust model, an authentication mechanism based on identity authentication mobile Ad Hoc network is proposed, which uses identity authentication to identify malicious nodes, And trust the recovery of selfish nodes in order to achieve the purpose of reducing network congestion and improving network quality. The simulation results show that the implementation of the mechanism can effectively improve the network availability and security.
Social Trust, Social Partner Time and Television Time
ERIC Educational Resources Information Center
Patulny, Roger
2011-01-01
Social trust is an important phenomenon, but the influence of important time-based measures upon trust has not been examined. Such measures include social contact and anti-social activity, such as television watching, which allows for the co-presence of other people. This paper reports on associations between trust and weighted means of co-present…
Trust, control strategies and allocation of function in human-machine systems.
Lee, J; Moray, N
1992-10-01
As automated controllers supplant human intervention in controlling complex systems, the operators' role often changes from that of an active controller to that of a supervisory controller. Acting as supervisors, operators can choose between automatic and manual control. Improperly allocating function between automatic and manual control can have negative consequences for the performance of a system. Previous research suggests that the decision to perform the job manually or automatically depends, in part, upon the trust the operators invest in the automatic controllers. This paper reports an experiment to characterize the changes in operators' trust during an interaction with a semi-automatic pasteurization plant, and investigates the relationship between changes in operators' control strategies and trust. A regression model identifies the causes of changes in trust, and a 'trust transfer function' is developed using time series analysis to describe the dynamics of trust. Based on a detailed analysis of operators' strategies in response to system faults we suggest a model for the choice between manual and automatic control, based on trust in automatic controllers and self-confidence in the ability to control the system manually.
On Design and Implementation of Neural-Machine Interface for Artificial Legs
Zhang, Xiaorong; Liu, Yuhong; Zhang, Fan; Ren, Jin; Sun, Yan (Lindsay); Yang, Qing
2011-01-01
The quality of life of leg amputees can be improved dramatically by using a cyber physical system (CPS) that controls artificial legs based on neural signals representing amputees’ intended movements. The key to the CPS is the neural-machine interface (NMI) that senses electromyographic (EMG) signals to make control decisions. This paper presents a design and implementation of a novel NMI using an embedded computer system to collect neural signals from a physical system - a leg amputee, provide adequate computational capability to interpret such signals, and make decisions to identify user’s intent for prostheses control in real time. A new deciphering algorithm, composed of an EMG pattern classifier and a post-processing scheme, was developed to identify the user’s intended lower limb movements. To deal with environmental uncertainty, a trust management mechanism was designed to handle unexpected sensor failures and signal disturbances. Integrating the neural deciphering algorithm with the trust management mechanism resulted in a highly accurate and reliable software system for neural control of artificial legs. The software was then embedded in a newly designed hardware platform based on an embedded microcontroller and a graphic processing unit (GPU) to form a complete NMI for real time testing. Real time experiments on a leg amputee subject and an able-bodied subject have been carried out to test the control accuracy of the new NMI. Our extensive experiments have shown promising results on both subjects, paving the way for clinical feasibility of neural controlled artificial legs. PMID:22389637
Ye, Yinjiao
2011-01-01
The past few decades have witnessed a dramatic increase in consumers seeking health information online. However, the quality of such information remains questionable, and the trustworthiness of online health information has become a hot topic, whereas little attention has been paid to how consumers evaluate online health information credibility. This study builds on theoretical perspectives of trust such as personal-capital-based, social-capital-based, and transfer-based, and it examines various correlates of consumer trust in online health information. The author analyzed the 2007 Health Information National Trends Survey data (N = 7,674). Results showed that consumer trust in online health information did not correlate with personal capital such as income, education, and health status. Social capital indicated by visiting social networking Web sites was not associated with trust in online health information either. Nevertheless, trust in online health information transferred from traditional mass media and government health agencies to the Internet, and it varied by such information features as easiness to locate and to understand. Age appeared to be a key factor in understanding the correlates of trust in online health information. Theoretical and empirical implications of the results are discussed.
A Preliminary Mixed-Method Investigation of Trust and Hidden Signals in Medical Consultations
Riva, Silvia; Monti, Marco; Iannello, Paola; Pravettoni, Gabriella; Schulz, Peter J.; Antonietti, Alessandro
2014-01-01
Background Several factors influence patients' trust, and trust influences the doctor-patient relationship. Recent literature has investigated the quality of the personal relationship and its dynamics by considering the role of communication and the elements that influence trust giving in the frame of general practitioner (GP) consultations. Objective We analysed certain aspects of the interaction between patients and GPs to understand trust formation and maintenance by focusing on communication channels. The impact of socio-demographic variables in trust relationships was also evaluated. Method A cross-sectional design using concurrent mixed qualitative and quantitative research methods was employed. One hundred adults were involved in a semi-structured interview composed of both qualitative and quantitative items for descriptive and exploratory purposes. The study was conducted in six community-based departments adjacent to primary care clinics in Trento, Italy. Results The findings revealed that patients trusted their GP to a high extent by relying on simple signals that were based on the quality of the one-to-one communication and on behavioural and relational patterns. Patients inferred the ability of their GP by adopting simple heuristics based mainly on the so-called social “honest signals” rather than on content-dependent features. Furthermore, socio-demographic variables affected trust: less literate and elderly people tended to trust more. Conclusions This study is unique in attempting to explore the role of simple signals in trust relationships within medical consultation: people shape trust and give meaning to their relationships through a powerful channel of communication that orbits not around words but around social relations. The findings have implications for both clinicians and researchers. For doctors, these results suggest a way of thinking about encounters with patients. For researchers, the findings underline the importance of analysing some new key factors around trust for future investigations in medical practice and education. PMID:24618683
Economic Profits Enhance Trust, Perceived Integrity and Memory of Fairness in Interpersonal Judgment
Eto, Keisuke; Watanabe, Shigeru; Kawabata, Hideaki
2012-01-01
Does money lead to trust in personality and intention of others? Humans have a strong tendency to judge the intention of others from their sequent behaviors. In general, people trust others who behave fairly, but not always. Here we show that judgments of both intentional aspects and memory of intentional behavior are automatically influenced by unintentional benefits from the behaviors of others. We conducted a reward-manipulated and repeated trust game by using real participants interacting with moving image partners on a computer screen. The participants assessed likability, trustworthiness, and perceived integrity of the partners in pre- and post-game questionnaires. The results of judgments of all three dimensions and the memory of frequency of each partner's fair behavior (sharing) were strongly influenced by profitability in the trust game, even though all partners shared 75% of the profit and participants were told that profitability was randomly assigned to each partner. Furthermore, these effects were moderated by the gender of the participants: males were more sensitive to monetary profits than were females. The results reveal that humans automatically trust, approve the integrity of, and recall well the fair behavior of others who provide affectively positive outcomes such as monetary profits. We call this phenomenon the “affect ripple effect”. PMID:23251552
ERIC Educational Resources Information Center
Goh, See-Kwong; Sandhu, Manjit-Singh
2014-01-01
The purpose of this research is to examine the influence of affect-based trust and cognition-based trust on knowledge sharing behaviour by adopting the theory of planned behaviour in selected universities in Malaysia. The research adopted survey method and a total of 545 participants from 30 universities. Multiple regression was used to assess the…
Teachers' Beliefs about the Development of Teacher-Adolescent Trust
ERIC Educational Resources Information Center
Russell, Shannon L.; Wentzel, Kathryn R.; Donlan, Alice E.
2016-01-01
In this study, we examined teachers' beliefs concerning the meaning and nature of teacher--student trust in a diverse sample of secondary-school teachers (n = 34). Using a grounded-theory approach, a process model of teacher-adolescent trust emerged based on semi-structured interviews and focus groups. Antecedents of trust could be categorised as…
Patients' Race, Ethnicity, Language, and Trust in a Physician
ERIC Educational Resources Information Center
Stepanikova, Irena; Mollborn, Stefanie; Cook, Karen S.; Thom, David H.; Kramer, Roderick M.
2006-01-01
We examine whether racial/ethnic/language-based variation in measured levels of patients' trust in a physician depends on the survey items used to measure that trust. Survey items include: (1) a direct measure of patients' trust that the doctor will put the patient's medical needs above all other considerations, and (2) three indirect measures of…
How Much Do You Trust Me? Learning a Case-Based Model of Inverse Trust
2014-10-01
155–156 5. Jian, J.Y., Bisantz, A.M., Drury , C.G.: Foundations for an empirically determined scale of trust in automated systems. International...517–527 8. Carlson, M.S., Desai, M., Drury , J.L., Kwak, H., Yanco, H.A.: Identifying factors that influence trust in automated cars and medical
Framework model and principles for trusted information sharing in pervasive health.
Ruotsalainen, Pekka; Blobel, Bernd; Nykänen, Pirkko; Seppälä, Antto; Sorvari, Hannu
2011-01-01
Trustfulness (i.e. health and wellness information is processed ethically, and privacy is guaranteed) is one of the cornerstones for future Personal Health Systems, ubiquitous healthcare and pervasive health. Trust in today's healthcare is organizational, static and predefined. Pervasive health takes place in an open and untrusted information space where person's lifelong health and wellness information together with contextual data are dynamically collected and used by many stakeholders. This generates new threats that do not exist in today's eHealth systems. Our analysis shows that the way security and trust are implemented in today's healthcare cannot guarantee information autonomy and trustfulness in pervasive health. Based on a framework model of pervasive health and risks analysis of ubiquitous information space, we have formulated principles which enable trusted information sharing in pervasive health. Principles imply that the data subject should have the right to dynamically verify trust and to control the use of her health information, as well as the right to set situation based context-aware personal policies. Data collectors and processors have responsibilities including transparency of information processing, and openness of interests, policies and environmental features. Our principles create a base for successful management of privacy and information autonomy in pervasive health. They also imply that it is necessary to create new data models for personal health information and new architectures which support situation depending trust and privacy management.
Kweekel, Liselotte; Gerrits, Trudie; Rijnders, Marlies; Brown, Patrick
2017-03-01
CenteringPregnancy (CP) is a specific model of group-based prenatal care for women, implemented in 44 midwifery practices in The Netherlands since 2011. Women have evaluated CP positively, especially in terms of social support, and improvements have been made in birthweight and preterm-birth outcomes; however, there is limited understanding as to why. The purpose of this study was to examine the mechanisms that create trusting relationships within CP to better understand CP outcomes and effectiveness. A qualitative study was conducted using in-depth interviews with 26 (former) CP participants, alongside observations of CP sessions. All interviews were transcribed and analyzed following open, axial, and selective coding. Most women characterized trust as a positive expectation about how others would respond to sensitive information that was shared within the group. Trust emerged within the data as a multidimensional concept and several preconditions seemed crucial in building trusting relations: vulnerability, communication, reciprocity, chemistry, and atmosphere. The facilitating of interpersonal trust among CP participants enhanced group processes, especially as a basis for social support by which women said they were more eager to share sensitive information in a trusting environment. Processes of trust were interwoven within various CP group dynamics. Trust facilitated social support which in turn enabled reassurance and the building of women's self-confidence. © 2016 Wiley Periodicals, Inc.
Humor and preschoolers' trust: Sensitivity to changing intentions.
Hoicka, Elena; Butcher, Jessica; Malla, Felicity; Harris, Paul L
2017-02-01
This research demonstrates that preschoolers (a) avoid trusting informants with humorous intentions when learning novel information and (b) flexibly consider current intentions rather than initial intentions when determining who to trust. In Study 1 (N=61), 3- and 4-year-olds based their trust on intentions or intentional cues alone, trusting a sincere informant over a joker, even when no prior accuracy or inaccuracy was displayed. In Study 2 (N=32), 3- and 4-year-olds flexibly based their trust on the informants' current intentions or intentional cues rather than their initial ones. Children trusted a sincere informant, who originally joked, over a joker, who was originally sincere. In Study 3 (N=89), 3-, 4-, and 5-year-olds tracked changing intentions, and not just intentional cues, in determining who to trust. Children trusted an informant who joked during training trials but was sincere during test trials over an informant who was ignorant during training trials and was sincere during test trials. However, if the ignorant informant became knowledgeable and the joker continued to joke, the pattern reversed. This is the first study to show that preschoolers consider intentions to joke when learning information. This is also the first study to show that preschoolers do not see trust as stable but rather see it as a function of changing intentions. Copyright © 2016 Elsevier Inc. All rights reserved.
Security management based on trust determination in cognitive radio networks
NASA Astrophysics Data System (ADS)
Li, Jianwu; Feng, Zebing; Wei, Zhiqing; Feng, Zhiyong; Zhang, Ping
2014-12-01
Security has played a major role in cognitive radio networks. Numerous researches have mainly focused on attacking detection based on source localization and detection probability. However, few of them took the penalty of attackers into consideration and neglected how to implement effective punitive measures against attackers. To address this issue, this article proposes a novel penalty mechanism based on cognitive trust value. The main feature of this mechanism has been realized by six functions: authentication, interactive, configuration, trust value collection, storage and update, and punishment. Data fusion center (FC) and cluster heads (CHs) have been put forward as a hierarchical architecture to manage trust value of cognitive users. Misbehaving users would be punished by FC by declining their trust value; thus, guaranteeing network security via distinguishing attack users is of great necessity. Simulation results verify the rationality and effectiveness of our proposed mechanism.
Qi, Yue; Li, Qi; Du, Feng
2018-01-01
In the era of globalization, people meet strangers from different countries more often than ever. Previous research indicates that impressions of trustworthiness based on facial appearance play an important role in interpersonal cooperation behaviors. The current study examined whether additional information about socioeconomic status (SES), including national prosperity and individual monthly income, affects facial judgments and appearance-based trust decisions. Besides reproducing previous conclusions that trustworthy faces receive more money than untrustworthy faces, the present study showed that high-income individuals were judged as more trustworthy than low-income individuals, and also were given more money in a trust game. However, trust behaviors were not modulated by the nationality of the faces. The present research suggests that people are more likely to trust strangers with a high income, compared with individuals with a low income.
Application of Game Theory to Improve the Defense of the Smart Grid
2012-03-01
Computer Systems and Networks ...............................................22 2.4.2 Trust Models ...systems. In this environment, developers assumed deterministic communications mediums rather than the “best effort” models provided in most modern... models or computational models to validate the SPSs design. Finally, the study reveals concerns about the performance of load rejection schemes
The Mathematics and Computer Science Learning Center (MLC).
ERIC Educational Resources Information Center
Abraham, Solomon T.
The Mathematics and Computer Science Learning Center (MLC) was established in the Department of Mathematics at North Carolina Central University during the fall semester of the 1982-83 academic year. The initial operations of the MLC were supported by grants to the University from the Burroughs-Wellcome Company and the Kenan Charitable Trust Fund.…
Online trust building through third party trust transfer and third party protection
NASA Astrophysics Data System (ADS)
Wandoko, Wanda; Saleh Abbas, Bahtiar; Budiastuti, Dyah; Kosala, Raymond
2017-03-01
The primary objective of this research is to develop an online trust building mechanism for SME (Small Medium Enterprise). Trust is very important in e-commerce. The nature of online shopping has a greater uncertainty than offline shopping. Seeing as there is an uncertainty that can produce risks, a prospective buyer’s trust is needed. A lot of people’s unwillingness to shop online is caused by their lack of trust toward e-commerce. E-commerce is said to be one of the ways for SME to compete with bigger companies. However, building trust requires immense time and cost. SME with limited resources may experience difficulties in building trust just with their own resources. Base on literature research that needs to be validated in next research, we found that trust can be built through trust transfer from the reputable and well-known trust-mark issuer, and third party protection such as escrow account service and credit card issuer.
Influences of satisfaction with telecare and family trust in older Taiwanese people.
Tsai, Chung-Hung; Kuo, Yu-Ming; Uei, Shu-Lin
2014-01-27
The level of trust given towards telecare by the family members of older people using the service is extremely important. Family trust may be an influential factor in deciding whether to use such services. This study focuses on older people's satisfaction with telecare and examines their family's trust in telecare services. Influences on intention to continue using telecare services are also explored. A questionnaire-based survey on 60 communities dwelling older people who had been receiving telecare services in the past two years was employed. This study developed a satisfaction and trust scale based on previous studies. Our results show that older people's satisfaction with telecare services and families' trust were influential in decided whether to continue to use of telecare services. These findings can help medical institutions to better insight into the user experience of telecare to help them provide future services that better comply with clients' desires and requirements.
Conchie, Stacey M; Taylor, Paul J; Donald, Ian J
2012-01-01
Although safety-specific transformational leadership is known to encourage employee safety voice behaviors, less is known about what makes this style of leadership effective. We tested a model that links safety-specific transformational leadership to safety voice through various dimensions of trust. Data from 150 supervisor-employee dyads from the United Kingdom oil industry supported our predictions that the effects of safety-specific transformational leadership are sequentially mediated by affect-based trust beliefs and disclosure trust intentions. Moreover, we found that reliance trust intentions moderated the effect of disclosure: employees' disclosure intentions mediated the effects of affect-based trust on safety voice behaviors only when employees' intention to rely on their leader was moderate to high. These findings suggest that leaders seeking to encourage safety voice behaviors should go beyond "good reason" arguments and develop affective bonds with their employees.
Pellowski, Jennifer A; Price, Devon M; Allen, Aerielle M; Eaton, Lisa A; Kalichman, Seth C
2017-09-01
The purpose of this study was to examine the relationships between medical mistrust and trust and to determine if these measures differentially predict antiretroviral therapy (ART) medication adherence for African-American adults living with HIV. A total of 458 HIV positive African-Americans completed a cross-sectional survey. Self-reported ART adherence was collected using the visual-analog scale. The Beliefs About Medicines Questionnaire was used to assess medication necessity and concern beliefs. All measures of medical mistrust and trust were significantly negatively correlated, ranging from r = -.339 to -.504. Race-based medical mistrust significantly predicted medication necessity and concern beliefs, whereas general medical mistrust only significantly predicted medication concerns. Both measures of trust significantly predicted medication necessity beliefs and medication concerns. Higher levels of race-based medical mistrust predicted lower medication adherence, whereas, neither trust in own physician nor trust in health care provider significantly predicted medication adherence. However, trust in own physician significantly predicted medication necessity beliefs, which predicted medication adherence. Trust and mistrust are not simply opposites of one another. These findings provide evidence for the complexity of understanding the relationship between health care trust, mistrust and patient-related health beliefs and behaviours.
Efficiency and security problems of anonymous key agreement protocol based on chaotic maps
NASA Astrophysics Data System (ADS)
Yoon, Eun-Jun
2012-07-01
In 2011, Niu-Wang proposed an anonymous key agreement protocol based on chaotic maps in [Niu Y, Wang X. An anonymous key agreement protocol based on chaotic maps. Commun Nonlinear Sci Simulat 2011;16(4):1986-92]. Niu-Wang's protocol not only achieves session key agreement between a server and a user, but also allows the user to anonymously interact with the server. Nevertheless, this paper points out that Niu-Wang's protocol has the following efficiency and security problems: (1) The protocol has computational efficiency problem when a trusted third party decrypts the user sending message. (2) The protocol is vulnerable to Denial of Service (DoS) attack based on illegal message modification by an attacker.
Computational Psychometrics in Communication and Implications in Decision Making.
Cipresso, Pietro; Villani, Daniela; Repetto, Claudia; Bosone, Lucia; Balgera, Anna; Mauri, Maurizio; Villamira, Marco; Antonietti, Alessandro; Riva, Giuseppe
2015-01-01
Recent investigations emphasized the role of communication features on behavioral trust and reciprocity in economic decision making but no studies have been focused on the effect of communication on affective states in such a context. Thanks to advanced methods of computational psychometrics, in this study, affective states were deeply examined using simultaneous and synchronized recordings of gazes and psychophysiological signals in 28 female students during an investment game. Results showed that participants experienced different affective states according to the type of communication (personal versus impersonal). In particular, participants involved in personal communication felt more relaxed than participants involved in impersonal communication. Moreover, personal communication influenced reciprocity and participants' perceptions about trust and reciprocity. Findings were interpreted in the light of the Arousal/Valence Model and self-disclosure process.
Computational Psychometrics in Communication and Implications in Decision Making
Repetto, Claudia; Bosone, Lucia; Balgera, Anna; Mauri, Maurizio; Villamira, Marco; Antonietti, Alessandro
2015-01-01
Recent investigations emphasized the role of communication features on behavioral trust and reciprocity in economic decision making but no studies have been focused on the effect of communication on affective states in such a context. Thanks to advanced methods of computational psychometrics, in this study, affective states were deeply examined using simultaneous and synchronized recordings of gazes and psychophysiological signals in 28 female students during an investment game. Results showed that participants experienced different affective states according to the type of communication (personal versus impersonal). In particular, participants involved in personal communication felt more relaxed than participants involved in impersonal communication. Moreover, personal communication influenced reciprocity and participants' perceptions about trust and reciprocity. Findings were interpreted in the light of the Arousal/Valence Model and self-disclosure process. PMID:26339285
Study of the Use of Ada in Trusted Computing Bases (TCBs) to be Certified at, or Below, the B3 Level
1989-04-01
of th . Each M class, fran Cl throh B3, is described. nTe tor ajor steadings of TcBs, Security policy , Acxntability, Ass-ranre, and D Mnt.Iticn, am...the system’s security policy . Data - Information with a specific physical representation. Discreticnary A C Itrol - A means of restricting access to...including hardware firmware, and software - the cambination of which is responsible for enforcing a security policy . A TCB consists of one or more
ACM TOMS replicated computational results initiative
Heroux, Michael Allen
2015-06-03
In this study, the scientific community relies on the peer review process for assuring the quality of published material, the goal of which is to build a body of work we can trust. Computational journals such as The ACM Transactions on Mathematical Software (TOMS) use this process for rigorously promoting the clarity and completeness of content, and citation of prior work. At the same time, it is unusual to independently confirm computational results.
A Theoretical Analysis: Physical Unclonable Functions and The Software Protection Problem
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nithyanand, Rishab; Solis, John H.
2011-09-01
Physical Unclonable Functions (PUFs) or Physical One Way Functions (P-OWFs) are physical systems whose responses to input stimuli (i.e., challenges) are easy to measure (within reasonable error bounds) but hard to clone. This property of unclonability is due to the accepted hardness of replicating the multitude of uncontrollable manufacturing characteristics and makes PUFs useful in solving problems such as device authentication, software protection, licensing, and certified execution. In this paper, we focus on the effectiveness of PUFs for software protection and show that traditional non-computational (black-box) PUFs cannot solve the problem against real world adversaries in offline settings. Our contributionsmore » are the following: We provide two real world adversary models (weak and strong variants) and present definitions for security against the adversaries. We continue by proposing schemes secure against the weak adversary and show that no scheme is secure against a strong adversary without the use of trusted hardware. Finally, we present a protection scheme secure against strong adversaries based on trusted hardware.« less
Friend, Catherine; Fox Hamilton, Nicola
2016-09-01
Where humans have been found to detect lies or deception only at the rate of chance in offline face-to-face communication (F2F), computer-mediated communication (CMC) online can elicit higher rates of trust and sharing of personal information than F2F. How do levels of trust and empathetic personality traits like perspective taking (PT) relate to deception detection in real-time CMC compared to F2F? A between groups correlational design (N = 40) demonstrated that, through a paired deceptive conversation task with confederates, levels of participant trust could predict accurate detection online but not offline. Second, participant PT abilities could not predict accurate detection in either conversation medium. Finally, this study found that conversation medium also had no effect on deception detection. This study finds support for the effects of the Truth Bias and online disinhibition in deception, and further implications in law enforcement are discussed.
de Vries, Peter W; van den Berg, Stéphanie M; Midden, Cees
2015-12-01
The present research addresses the question of how trust in systems is formed when unequivocal information about system accuracy and reliability is absent, and focuses on the interaction of indirect information (others' evaluations) and direct (experiential) information stemming from the interaction process. Trust in decision-supporting technology, such as route planners, is important for satisfactory user interactions. Little is known, however, about trust formation in the absence of outcome feedback, that is, when users have not yet had opportunity to verify actual outcomes. Three experiments manipulated others' evaluations ("endorsement cues") and various forms of experience-based information ("process feedback") in interactions with a route planner and measured resulting trust using rating scales and credits staked on the outcome. Subsequently, an overall analysis was conducted. Study 1 showed that effectiveness of endorsement cues on trust is moderated by mere process feedback. In Study 2, consistent (i.e., nonrandom) process feedback overruled the effect of endorsement cues on trust, whereas inconsistent process feedback did not. Study 3 showed that although the effects of consistent and inconsistent process feedback largely remained regardless of face validity, high face validity in process feedback caused higher trust than those with low face validity. An overall analysis confirmed these findings. Experiential information impacts trust even if outcome feedback is not available, and, moreover, overrules indirect trust cues-depending on the nature of the former. Designing systems so that they allow novice users to make inferences about their inner workings may foster initial trust. © 2015, Human Factors and Ergonomics Society.
Bonner, Gloria; Williams, Sharon; Wilkie, Diana; Hart, Alysha; Burnett, Glenda; Peacock, Geraldine
2017-12-01
An initial and vital important step in recruiting participants for church-based hospice and palliative care research is the establishment of trust and credibility within the church community. Mistrust of medical research is an extremely important barrier hindering recruitment in African American (AA) communities. A church-based EOL dementia education project is currently being conducted at four large urban AA churches. Church leaders voiced mistrust concerns of previous researchers who conducted investigations in their faith-based institutions. We explored strategies to ameliorate the mistrust concerns. Specific aim: To identify trust-rebuilding elements for researchers following others who violated trust of AA church leaders. Face-to-face, in-depth interviews were conducted from a convenient sample of four established AA church leaders. Interviews were held in the informants' churches to promote candor and comfort in revealing sensitive information about trust /mistrust. Content analysis framework was used to analyze the data. Elements identified from the analysis were then used to create themes. Multidimensional overarching themes emerged from the analysis included: Experience with researchers (positive and extremely negative), violation of trust and trust building strategies. Findings suggest that researchers who wish to conduct successful studies in the AA religious institutions must implement trust rebuilding strategies that include mutual respect, collaboration and partnership building. If general moral practices continue to be violated, threat to future hospice and palliative care research within the institutions may prevail. Thus, potential benefits are thwarted for the church members, AA community, and advancement of EOL care scholarship.
TrustBuilder2: A Reconfigurable Framework for Trust Negotiation
NASA Astrophysics Data System (ADS)
Lee, Adam J.; Winslett, Marianne; Perano, Kenneth J.
To date, research in trust negotiation has focused mainly on the theoretical aspects of the trust negotiation process, and the development of proof of concept implementations. These theoretical works and proofs of concept have been quite successful from a research perspective, and thus researchers must now begin to address the systems constraints that act as barriers to the deployment of these systems. To this end, we present TrustBuilder2, a fully-configurable and extensible framework for prototyping and evaluating trust negotiation systems. TrustBuilder2 leverages a plug-in based architecture, extensible data type hierarchy, and flexible communication protocol to provide a framework within which numerous trust negotiation protocols and system configurations can be quantitatively analyzed. In this paper, we discuss the design and implementation of TrustBuilder2, study its performance, examine the costs associated with flexible authorization systems, and leverage this knowledge to identify potential topics for future research, as well as a novel method for attacking trust negotiation systems.
25 CFR 115.712 - What is the interest rate earned on money in a trust account?
Code of Federal Regulations, 2010 CFR
2010-04-01
... 25 Indians 1 2010-04-01 2010-04-01 false What is the interest rate earned on money in a trust... and Interests § 115.712 What is the interest rate earned on money in a trust account? The rate of interest on a trust account changes based on how the money is invested and how those investments perform. ...
The Role of Social Trust in Reducing Long-Term Truancy and Forming Human Capital in Japan
ERIC Educational Resources Information Center
Yamamura, Eiji
2011-01-01
This paper attempts to examine how social trust influences human capital formation using prefectural level data in Japan. To this end, I constructed a proxy for social trust, based on the Japanese General Social Surveys. After controlling for socioeconomic factors, I found that social trust plays an important role in reducing the rate of long-term…
Information Security and Integrity Systems
NASA Technical Reports Server (NTRS)
1990-01-01
Viewgraphs from the Information Security and Integrity Systems seminar held at the University of Houston-Clear Lake on May 15-16, 1990 are presented. A tutorial on computer security is presented. The goals of this tutorial are the following: to review security requirements imposed by government and by common sense; to examine risk analysis methods to help keep sight of forest while in trees; to discuss the current hot topic of viruses (which will stay hot); to examine network security, now and in the next year to 30 years; to give a brief overview of encryption; to review protection methods in operating systems; to review database security problems; to review the Trusted Computer System Evaluation Criteria (Orange Book); to comment on formal verification methods; to consider new approaches (like intrusion detection and biometrics); to review the old, low tech, and still good solutions; and to give pointers to the literature and to where to get help. Other topics covered include security in software applications and development; risk management; trust: formal methods and associated techniques; secure distributed operating system and verification; trusted Ada; a conceptual model for supporting a B3+ dynamic multilevel security and integrity in the Ada runtime environment; and information intelligence sciences.
An Experimental Testbed for Evaluation of Trust and Reputation Systems
NASA Astrophysics Data System (ADS)
Kerr, Reid; Cohen, Robin
To date, trust and reputation systems have often been evaluated using methods of their designers’ own devising. Recently, we demonstrated that a number of noteworthy trust and reputation systems could be readily defeated, revealing limitations in their original evaluations. Efforts in the trust and reputation community to develop a testbed have yielded a successful competition platform, ART. This testbed, however, is less suited to general experimentation and evaluation of individual trust and reputation technologies. In this paper, we propose an experimentation and evaluation testbed based directly on that used in our investigations into security vulnerabilities in trust and reputation systems for marketplaces. We demonstrate the advantages of this design, towards the development of more thorough, objective evaluations of trust and reputation systems.
Code of Federal Regulations, 2013 CFR
2013-01-01
... in several mutual funds whose portfolios contain stock in a small computer company. Each mutual fund... computer company. Example 2 to paragraph (a): A nonsupervisory employee of the Department of Energy owns... shares in the XYZ Health Sciences Fund, a sector mutual fund invested primarily in health-related...
Code of Federal Regulations, 2011 CFR
2011-01-01
... in several mutual funds whose portfolios contain stock in a small computer company. Each mutual fund... computer company. Example 2 to paragraph (a): A nonsupervisory employee of the Department of Energy owns... shares in the XYZ Health Sciences Fund, a sector mutual fund invested primarily in health-related...
Code of Federal Regulations, 2010 CFR
2010-01-01
... in several mutual funds whose portfolios contain stock in a small computer company. Each mutual fund... computer company. Example 2 to paragraph (a): A nonsupervisory employee of the Department of Energy owns... shares in the XYZ Health Sciences Fund, a sector mutual fund invested primarily in health-related...
Code of Federal Regulations, 2012 CFR
2012-01-01
... in several mutual funds whose portfolios contain stock in a small computer company. Each mutual fund... computer company. Example 2 to paragraph (a): A nonsupervisory employee of the Department of Energy owns... shares in the XYZ Health Sciences Fund, a sector mutual fund invested primarily in health-related...
Code of Federal Regulations, 2014 CFR
2014-01-01
... in several mutual funds whose portfolios contain stock in a small computer company. Each mutual fund... computer company. Example 2 to paragraph (a): A nonsupervisory employee of the Department of Energy owns... shares in the XYZ Health Sciences Fund, a sector mutual fund invested primarily in health-related...
Securing Secrets and Managing Trust in Modern Computing Applications
ERIC Educational Resources Information Center
Sayler, Andy
2016-01-01
The amount of digital data generated and stored by users increases every day. In order to protect this data, modern computing systems employ numerous cryptographic and access control solutions. Almost all of such solutions, however, require the keeping of certain secrets as the basis of their security models. How best to securely store and control…
Summary Report for the Army Research Organization (ARO) Workshop on Social Trust Computing
2010-09-14
5 2.5 Munindar Singh . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2.6 Ugur Kuter...12 2 1 Attendees • Jen Golbeck (UMD) • Ugur Kuter (UMD) • Jim Hendler (RPI) • John O’Donnovan (UCSB...social computing applications, such as those involving personal, communal, organizational, and contractual relationships. 2.6 Ugur Kuter Every day, people
Diffusion-based recommendation with trust relations on tripartite graphs
NASA Astrophysics Data System (ADS)
Wang, Ximeng; Liu, Yun; Zhang, Guangquan; Xiong, Fei; Lu, Jie
2017-08-01
The diffusion-based recommendation approach is a vital branch in recommender systems, which successfully applies physical dynamics to make recommendations for users on bipartite or tripartite graphs. Trust links indicate users’ social relations and can provide the benefit of reducing data sparsity. However, traditional diffusion-based algorithms only consider rating links when making recommendations. In this paper, the complementarity of users’ implicit and explicit trust is exploited, and a novel resource-allocation strategy is proposed, which integrates these two kinds of trust relations on tripartite graphs. Through empirical studies on three benchmark datasets, our proposed method obtains better performance than most of the benchmark algorithms in terms of accuracy, diversity and novelty. According to the experimental results, our method is an effective and reasonable way to integrate additional features into the diffusion-based recommendation approach.
Understanding Is Key: An Analysis of Factors Pertaining to Trust in a Real-World Automation System.
Balfe, Nora; Sharples, Sarah; Wilson, John R
2018-06-01
This paper aims to explore the role of factors pertaining to trust in real-world automation systems through the application of observational methods in a case study from the railway sector. Trust in automation is widely acknowledged as an important mediator of automation use, but the majority of the research on automation trust is based on laboratory work. In contrast, this work explored trust in a real-world setting. Experienced rail operators in four signaling centers were observed for 90 min, and their activities were coded into five mutually exclusive categories. Their observed activities were analyzed in relation to their reported trust levels, collected via a questionnaire. The results showed clear differences in activity, even when circumstances on the workstations were very similar, and significant differences in some trust dimensions were found between groups exhibiting different levels of intervention and time not involved with signaling. Although the empirical, lab-based studies in the literature have consistently found that reliability and competence of the automation are the most important aspects of trust development, understanding of the automation emerged as the strongest dimension in this study. The implications are that development and maintenance of trust in real-world, safety-critical automation systems may be distinct from artificial laboratory automation. The findings have important implications for emerging automation concepts in diverse industries including highly automated vehicles and Internet of things.
Capon, Adam; Gillespie, James; Rolfe, Margaret; Smith, Wayne
2015-04-26
Policy makers and regulators are constantly required to make decisions despite the existence of substantial uncertainty regarding the outcomes of their proposed decisions. Understanding stakeholder views is an essential part of addressing this uncertainty, which provides insight into the possible social reactions and tolerance of unpredictable risks. In the field of nanotechnology, large uncertainties exist regarding the real and perceived risks this technology may have on society. Better evidence is needed to confront this issue. We undertook a computer assisted telephone interviewing (CATI) survey of the Australian public and a parallel survey of those involved in nanotechnology from the academic, business and government sectors. Analysis included comparisons of proportions and logistic regression techniques. We explored perceptions of nanotechnology risks both to health and in a range of products. We examined views on four trust actors. The general public's perception of risk was significantly higher than that expressed by other stakeholders. The public bestows less trust in certain trust actors than do academics or government officers, giving its greatest trust to scientists. Higher levels of public trust were generally associated with lower perceptions of risk. Nanotechnology in food and cosmetics/sunscreens were considered riskier applications irrespective of stakeholder, while familiarity with nanotechnology was associated with a reduced risk perception. Policy makers should consider the disparities in risk and trust perceptions between the public and influential stakeholders, placing greater emphasis on risk communication and the uncertainties of risk assessment in these areas of higher concern. Scientists being the highest trusted group are well placed to communicate the risks of nanotechnologies to the public.
Gopichandran, Vijayaprasad; Chetlapalli, Satish Kumar
2013-01-01
Background Trust is a forward-looking covenant between the patient and the doctor where the patient optimistically accepts his/her vulnerability. Trust is known to improve the clinical outcomes. Objectives To explore the factors that determine patients’ trust in doctors and to segment the community based on factors which drive their trust. Setting Resource-poor urban and rural settings in Tamil Nadu, a state in southern India. Participants A questionnaire was administered to a sample of 625 adult community-dwelling respondents from four districts of Tamil Nadu, India, chosen by multistage sampling strategy. Outcome measures The outcomes were to understand the main domains of factors influencing trust in doctors and to segment the community based on which of these domains predominantly influenced their trust. Results Factor analysis revealed five main categories, namely, comfort with the doctor, doctor with personal involvement with the patient, behaviourally competent doctor, doctor with a simple appearance and culturally competent doctor, which explained 49.3% of the total variance. Using k-means cluster analysis the respondents were segmented into four groups, namely, those who have ‘comfort-based trust’, ‘emotionally assessed trust’, who were predominantly older and belonging to lower socioeconomic status, those who had ‘personal trust’, who were younger people from higher socioeconomic strata of the community and the group who had ‘objectively assessed trust’, who were younger women. Conclusions Trust in doctors seems to be influenced by the doctor's behaviuor, perceived comfort levels, personal involvement with the patient, and to a lesser extent by cultural competence and doctor's physical appearance. On the basis of these dimensions, the community can be segmented into distinct groups, and trust building can happen in a strategic manner which may lead to improvement in perceived quality of care. PMID:24302512
Critchley, Christine; Nicol, Dianne; Otlowski, Margaret
2015-01-01
The necessity for biobanks to share their resources with third parties poses potential risks to public trust and the intention to participate in genetic research. We explore the effects of data sharing and the type of third-party access (public vs. private) on public trust and, in turn, the intention to participate in biobank research. An experimental design was used to assess a national sample of 1,701 Australians via a computer-assisted telephone interview. The results revealed that trust and the intention to participate significantly decreased in relation to private compared to public biobanks, and when access to third-party researchers was allowed compared to when it was not. Somewhat surprisingly, no differences were found in relation to the third party being international compared to Australian, but trust and the intention to participate were significantly eroded when private third parties were allowed access. Those with a university education were particularly distrustful of private biobanks and biobanks that allowed access, while those who were more aware of genetic databases appeared more confident with biobanks sharing with private-sector third parties. The pattern of results suggests that public awareness of the need for biobanks to share their resources widely needs to be increased to maintain public trust and support. © 2015 S. Karger AG, Basel.
Statis Program Analysis for Reliable, Trusted Apps
2017-02-01
flexibility to system design. However, it is challenging for a static analysis to compute or verify properties about a system that uses implicit control...sources might affect the variable’s value. The type qualifier @Sink indicates where (information computed from) the value might be output. These...upper bound on the set of sensitive sources that were actually used to compute the value. If the type of x is qualified by @Source({INTERNET, LOCATION
A Model for Calculated Privacy and Trust in pHealth Ecosystems.
Ruotsalainen, Pekka; Blobel, Bernd
2018-01-01
A pHealth ecosystem is a community of service users and providers. It is also a dynamic socio-technical system. One of its main goals is to help users to maintain their personal health status. Another goal is to give economic benefit to stakeholders which use personal health information existing in the ecosystem. In pHealth ecosystems, a huge amount of health related data is collected and used by service providers such as data extracted from the regulated health record and information related to personal characteristics, genetics, lifestyle and environment. In pHealth ecosystems, there are different kinds of service providers such as regulated health care service providers, unregulated health service providers, ICT service providers, researchers and industrial organizations. This fact together with the multidimensional personal health data used raises serious privacy concerns. Privacy is a necessary enabler for successful pHealth, but it is also an elastic concept without any universally agreed definition. Regardless of what kind of privacy model is used in dynamic socio-technical systems, it is difficult for a service user to know the privacy level of services in real life situations. As privacy and trust are interrelated concepts, the authors have developed a hybrid solution where knowledge got from regulatory privacy requirements and publicly available privacy related documents is used for calculation of service providers' specific initial privacy value. This value is then used as an estimate for the initial trust score. In this solution, total trust score is a combination of recommended trust, proposed trust and initial trust. Initial privacy level is a weighted arithmetic mean of knowledge and user selected weights. The total trust score for any service provider in the ecosystem can be calculated deploying either a beta trust model or the Fuzzy trust calculation method. The prosed solution is easy to use and to understand, and it can be also automated. It is possible to develop a computer application that calculates a situation-specific trust score, and to make it freely available on the Internet.
Trust regions in Kriging-based optimization with expected improvement
NASA Astrophysics Data System (ADS)
Regis, Rommel G.
2016-06-01
The Kriging-based Efficient Global Optimization (EGO) method works well on many expensive black-box optimization problems. However, it does not seem to perform well on problems with steep and narrow global minimum basins and on high-dimensional problems. This article develops a new Kriging-based optimization method called TRIKE (Trust Region Implementation in Kriging-based optimization with Expected improvement) that implements a trust-region-like approach where each iterate is obtained by maximizing an Expected Improvement (EI) function within some trust region. This trust region is adjusted depending on the ratio of the actual improvement to the EI. This article also develops the Kriging-based CYCLONE (CYClic Local search in OptimizatioN using Expected improvement) method that uses a cyclic pattern to determine the search regions where the EI is maximized. TRIKE and CYCLONE are compared with EGO on 28 test problems with up to 32 dimensions and on a 36-dimensional groundwater bioremediation application in appendices supplied as an online supplement available at http://dx.doi.org/10.1080/0305215X.2015.1082350. The results show that both algorithms yield substantial improvements over EGO and they are competitive with a radial basis function method.
Overdetermined shooting methods for computing standing water waves with spectral accuracy
NASA Astrophysics Data System (ADS)
Wilkening, Jon; Yu, Jia
2012-01-01
A high-performance shooting algorithm is developed to compute time-periodic solutions of the free-surface Euler equations with spectral accuracy in double and quadruple precision. The method is used to study resonance and its effect on standing water waves. We identify new nucleation mechanisms in which isolated large-amplitude solutions, and closed loops of such solutions, suddenly exist for depths below a critical threshold. We also study degenerate and secondary bifurcations related to Wilton's ripples in the traveling case, and explore the breakdown of self-similarity at the crests of extreme standing waves. In shallow water, we find that standing waves take the form of counter-propagating solitary waves that repeatedly collide quasi-elastically. In deep water with surface tension, we find that standing waves resemble counter-propagating depression waves. We also discuss the existence and non-uniqueness of solutions, and smooth versus erratic dependence of Fourier modes on wave amplitude and fluid depth. In the numerical method, robustness is achieved by posing the problem as an overdetermined nonlinear system and using either adjoint-based minimization techniques or a quadratically convergent trust-region method to minimize the objective function. Efficiency is achieved in the trust-region approach by parallelizing the Jacobian computation, so the setup cost of computing the Dirichlet-to-Neumann operator in the variational equation is not repeated for each column. Updates of the Jacobian are also delayed until the previous Jacobian ceases to be useful. Accuracy is maintained using spectral collocation with optional mesh refinement in space, a high-order Runge-Kutta or spectral deferred correction method in time and quadruple precision for improved navigation of delicate regions of parameter space as well as validation of double-precision results. Implementation issues for transferring much of the computation to a graphic processing units are briefly discussed, and the performance of the algorithm is tested for a number of hardware configurations.
An Adaptive Reputation-Based Algorithm for Grid Virtual Organization Formation
NASA Astrophysics Data System (ADS)
Cui, Yongrui; Li, Mingchu; Ren, Yizhi; Sakurai, Kouichi
A novel adaptive reputation-based virtual organization formation is proposed. It restrains the bad performers effectively based on the consideration of the global experience of the evaluator and evaluates the direct trust relation between two grid nodes accurately by consulting the previous trust value rationally. It also consults and improves the reputation evaluation process in PathTrust model by taking account of the inter-organizational trust relationship and combines it with direct and recommended trust in a weighted way, which makes the algorithm more robust against collusion attacks. Additionally, the proposed algorithm considers the perspective of the VO creator and takes required VO services as one of the most important fine-grained evaluation criterion, which makes the algorithm more suitable for constructing VOs in grid environments that include autonomous organizations. Simulation results show that our algorithm restrains the bad performers and resists against fake transaction attacks and badmouth attacks effectively. It provides a clear advantage in the design of a VO infrastructure.
Han, Guangjie; Liu, Li; Jiang, Jinfang; Shu, Lei; Rodrigues, Joel J.P.C.
2016-01-01
Localization is one of the hottest research topics in Underwater Wireless Sensor Networks (UWSNs), since many important applications of UWSNs, e.g., event sensing, target tracking and monitoring, require location information of sensor nodes. Nowadays, a large number of localization algorithms have been proposed for UWSNs. How to improve location accuracy are well studied. However, few of them take location reliability or security into consideration. In this paper, we propose a Collaborative Secure Localization algorithm based on Trust model (CSLT) for UWSNs to ensure location security. Based on the trust model, the secure localization process can be divided into the following five sub-processes: trust evaluation of anchor nodes, initial localization of unknown nodes, trust evaluation of reference nodes, selection of reference node, and secondary localization of unknown node. Simulation results demonstrate that the proposed CSLT algorithm performs better than the compared related works in terms of location security, average localization accuracy and localization ratio. PMID:26891300
Trust-Guided Behavior Adaptation Using Case-Based Reasoning
2015-08-01
the same behaviors were evaluated in each set. To account for this, the similarity function looks at the overlap between the two sets and ignores...interruptions would reduce the cost of case genera- tion. 6 Related Work Existing approaches for measuring inverse trust differ from our own in that...where a case- based reasoning system considers the reliability of a case’s source, also takes trust into account . Our work also has sim- ilarities
Consider the source: Children link the accuracy of text-based sources to the accuracy of the author.
Vanderbilt, Kimberly E; Ochoa, Karlena D; Heilbrun, Jayd
2018-05-06
The present research investigated whether young children link the accuracy of text-based information to the accuracy of its author. Across three experiments, three- and four-year-olds (N = 231) received information about object labels from accurate and inaccurate sources who provided information both in text and verbally. Of primary interest was whether young children would selectively rely on information provided by more accurate sources, regardless of the form in which the information was communicated. Experiment 1 tested children's trust in text-based information (e.g., books) written by an author with a history of either accurate or inaccurate verbal testimony and found that children showed greater trust in books written by accurate authors. Experiment 2 replicated the findings of Experiment 1 and extended them by showing that children's selective trust in more accurate text-based sources was not dependent on experience trusting or distrusting the author's verbal testimony. Experiment 3 investigated this understanding in reverse by testing children's trust in verbal testimony communicated by an individual who had authored either accurate or inaccurate text-based information. Experiment 3 revealed that children showed greater trust in individuals who had authored accurate rather than inaccurate books. Experiment 3 also demonstrated that children used the accuracy of text-based sources to make inferences about the mental states of the authors. Taken together, these results suggest children do indeed link the reliability of text-based sources to the reliability of the author. Statement of Contribution Existing knowledge Children use sources' prior accuracy to predict future accuracy in face-to-face verbal interactions. Children who are just learning to read show increased trust in text bases (vs. verbal) information. It is unknown whether children consider authors' prior accuracy when judging the accuracy of text-based information. New knowledge added by this article Preschool children track sources' accuracy across communication mediums - from verbal to text-based modalities and vice versa. Children link the reliability of text-based sources to the reliability of the author. © 2018 The British Psychological Society.
Lindström, Martin
2008-06-01
To investigate whether political mistrust in the Riksdag (the national parliament in Sweden) is an independent characteristic of cannabis smokers, or whether it reflects low confidence in people in general, and therefore low social capital. The 2004 public health survey in Skåne is a cross-sectional postal questionnaire study answered by 27,757 respondents aged 18-80 with a 59% response rate providing data on political trust, cannabis smoking, and potential confounders. 13.9% of the men and 8.3% of the women had smoked cannabis; 17.3% of the male and 11.6% of the female respondents reported no trust at all in the Riksdag, and another 38.2% and 36.2%, respectively, reported a moderate political trust. Young age, high education, unemployment, low generalized trust in other people, and lower levels of political trust were associated with cannabis smoking, even after multiple adjustments. The groups men with no trust at all in the Riksdag, and women with high trust, not particularly high political trust and no political trust at all had significantly higher odds ratios of cannabis smoking than the very high trust reference category. The results thus somewhat differed between men and women. Low political trust is associated with cannabis smoking, independently of trust in people in general.
Trust and Online Reputation Systems
NASA Astrophysics Data System (ADS)
Kwan, Ming; Ramachandran, Deepak
Web 2.0 technologies provide organizations with unprecedented opportunities to expand and solidify relationships with their customers, partners, and employees—while empowering firms to define entirely new business models focused on sharing information in online collaborative environments. Yet, in and of themselves, these technologies cannot ensure productive online interactions. Leading enterprises that are experimenting with social networks and online communities are already discovering this fact and along with it, the importance of establishing trust as the foundation for online collaboration and transactions. Just as today's consumers must feel secure to bank, exchange personal information and purchase products and services online; participants in Web 2.0 initiatives will only accept the higher levels of risk and exposure inherent in e-commerce and Web collaboration in an environment of trust. Indeed, only by attending to the need to cultivate online trust with customers, partners and employees will enterprises ever fully exploit the expanded business potential posed by Web 2.0. But developing online trust is no easy feat. While various preliminary attempts have occurred, no definitive model for establishing or measuring it has yet been established. To that end, nGenera has identified three, distinct dimensions of online trust: reputation (quantitative-based); relationship (qualitative-based) and process (system-based). When considered together, they form a valuable model for understanding online trust and a toolbox for cultivating it to support Web 2.0 initiatives.
Distributed Trust Management for Validating SLA Choreographies
NASA Astrophysics Data System (ADS)
Haq, Irfan Ul; Alnemr, Rehab; Paschke, Adrian; Schikuta, Erich; Boley, Harold; Meinel, Christoph
For business workflow automation in a service-enriched environment such as a grid or a cloud, services scattered across heterogeneous Virtual Organizations (VOs) can be aggregated in a producer-consumer manner, building hierarchical structures of added value. In order to preserve the supply chain, the Service Level Agreements (SLAs) corresponding to the underlying choreography of services should also be incrementally aggregated. This cross-VO hierarchical SLA aggregation requires validation, for which a distributed trust system becomes a prerequisite. Elaborating our previous work on rule-based SLA validation, we propose a hybrid distributed trust model. This new model is based on Public Key Infrastructure (PKI) and reputation-based trust systems. It helps preventing SLA violations by identifying violation-prone services at service selection stage and actively contributes in breach management at the time of penalty enforcement.
Haesevoets, Tessa; Reinders Folmer, Chris; Van Hiel, Alain
2015-01-01
Despite the popularity of financial compensation as a means for addressing trust violations, the question whether (more) money can indeed buy trust back remains largely unexplored. In the present research, we focus on the role of violation type and compensation size. The results of a scenario study and a laboratory experiment show that financial compensation can effectively promote the restoration of trust for transgressions that indicate a lack of competence. Conversely, for transgressions which signal a lack of integrity, financial compensation is not an effective tool to repair trust. Moreover, our findings indicate that for both violation types, overcompensation has no positive effects on top of the impact of equal compensation. These findings therefore show that when it comes to trust, money cannot buy everything.
Stuck, Rachel E; Rogers, Wendy A
2017-06-01
As the population of older adults increase so will the need for care providers, both human and robot. Trust is a key aspect to establish and maintain a successful older adult-care provider relationship. However, due to trust volatility it is essential to understand it within specific contexts. This proposed mixed methods study will explore what dimensions of trust emerge as important within the human-human and human-robot dyads in older adults and care providers. First, this study will help identify key qualities that support trust in a care provider relationship. By understanding what older adults perceive as needing to trust humans and robots for various care tasks, we can begin to provide recommendations based on user expectations for design to support trust.
Tajeddine, Ayman; Kayssi, Ayman; Chehab, Ali; Elhajj, Imad; Itani, Wassim
2015-01-01
In this paper, we present CENTERA, a CENtralized Trust-based Efficient Routing protocol with an appropriate authentication scheme for wireless sensor networks (WSN). CENTERA utilizes the more powerful base station (BS) to gather minimal neighbor trust information from nodes and calculate the best routes after isolating different types of “bad” nodes. By periodically accumulating these simple local observations and approximating the nodes' battery lives, the BS draws a global view of the network, calculates three quality metrics—maliciousness, cooperation, and compatibility—and evaluates the Data Trust and Forwarding Trust values of each node. Based on these metrics, the BS isolates “bad”, “misbehaving” or malicious nodes for a certain period, and put some nodes on probation. CENTERA increases the node's bad/probation level with repeated “bad” behavior, and decreases it otherwise. Then it uses a very efficient method to distribute the routing information to “good” nodes. Based on its target environment, and if required, CENTERA uses an authentication scheme suitable for severely constrained nodes, ranging from the symmetric RC5 for safe environments under close administration, to pairing-based cryptography (PBC) for hostile environments with a strong attacker model. We simulate CENTERA using TOSSIM and verify its correctness and show some energy calculations. PMID:25648712
Tajeddine, Ayman; Kayssi, Ayman; Chehab, Ali; Elhajj, Imad; Itani, Wassim
2015-02-02
In this paper, we present CENTERA, a CENtralized Trust-based Efficient Routing protocol with an appropriate authentication scheme for wireless sensor networks (WSN). CENTERA utilizes the more powerful base station (BS) to gather minimal neighbor trust information from nodes and calculate the best routes after isolating different types of "bad" nodes. By periodically accumulating these simple local observations and approximating the nodes' battery lives, the BS draws a global view of the network, calculates three quality metrics-maliciousness, cooperation, and compatibility-and evaluates the Data Trust and Forwarding Trust values of each node. Based on these metrics, the BS isolates "bad", "misbehaving" or malicious nodes for a certain period, and put some nodes on probation. CENTERA increases the node's bad/probation level with repeated "bad" behavior, and decreases it otherwise. Then it uses a very efficient method to distribute the routing information to "good" nodes. Based on its target environment, and if required, CENTERA uses an authentication scheme suitable for severely constrained nodes, ranging from the symmetric RC5 for safe environments under close administration, to pairing-based cryptography (PBC) for hostile environments with a strong attacker model. We simulate CENTERA using TOSSIM and verify its correctness and show some energy calculations.
Is It a Trust Issue? Factors That Influence Trust for Persons Living With HIV/AIDS.
Krause, Denise D; May, Warren L
2016-09-01
Trust in one's health care provider, trust in the health care system in general, and even trust in one's community affects engagement in HIV-related health care. This article examines the issue of trust among a random sample of HIV-infected individuals residing in Mississippi, an area hard-hit by the HIV/AIDS epidemic. Five constructs based on survey responses from these individuals were developed: (1) trust in one's provider to offer the best possible medical care, (2) trust in one's provider to protect patient privacy, (3) willingness to disclose HIV status to one's provider, (4) trust in the health care system, and (5) trust in one's community. Findings suggest that interventions to improve trust in providers to deliver the highest quality of care should be targeted to young people, African Americans, and the more highly educated. Interventions to increase trust in providers to protect privacy should focus on creating and strengthening social support groups or networks that build relationships and foster trust. Interventions aimed to increase community trust also should be targeted to young people. This information is useful to researchers, policy makers, health care providers, and organizations interested in prioritizing interventions and strategies that have the greatest potential to reduce health disparities in HIV diagnosis and treatment in the Deep South. © 2016 Society for Public Health Education.
Bonner, Gloria; Williams, Sharon; Wilkie, Diana; Hart, Alysha; Burnett, Glenda; Peacock, Geraldine
2017-01-01
Background An initial and vital important step in recruiting participants for church-based hospice and palliative care research is the establishment of trust and credibility within the church community. Mistrust of medical research is an extremely important barrier hindering recruitment in African American (AA) communities. A church-based EOL dementia education project is currently being conducted at four large urban AA churches. Church leaders voiced mistrust concerns of previous researchers who conducted investigations in their faith-based institutions. We explored strategies to ameliorate the mistrust concerns. Specific aim To identify trust-rebuilding elements for researchers following others who violated trust of AA church leaders. Methods Face-to-face, in-depth interviews were conducted from a convenient sample of four established AA church leaders. Interviews were held in the informants’ churches to promote candor and comfort in revealing sensitive information about trust/mistrust. Content analysis framework was used to analyze the data. Elements identified from the analysis were then used to create themes. Results Multidimensional overarching themes emerged from the analysis included: Experience with researchers (positive and extremely negative), violation of trust and trust building strategies. Conclusions Findings suggest that researchers who wish to conduct successful studies in the AA religious institutions must implement trust rebuilding strategies that include mutual respect, collaboration and partnership building. If general moral practices continue to be violated, threat to future hospice and palliative care research within the institutions may prevail. Thus, potential benefits are thwarted for the church members, AA community, and advancement of EOL care scholarship. PMID:27577723
Kim, H H-S
2018-05-01
This research examined the associations between two types of trust, generalized and particularized, and self-rated health among immigrants. Data were drawn from the World Values Survey (WVS6), the latest wave of cross-sectional surveys based on face-to-face interviews. The immigrant subsample analyzed herein contains 3108 foreign-born individuals clustered from 51 countries. Given the hierarchically nested data, two-level logistic regressions models were estimated using HLM (Hierarchical Linear Modeling) 7.1. At the individual level, net of socio-economic and demographic factors (age, gender, marital status, education, income, neighborhood security, and subjective well-being), particularized trust was positively related to physical health (odds ratio [OR] = 1.11, P < .001). Generalized trust, however, was not a significant predictor. At the country level, based on alternative models, the aggregate measure of particularized trust was negatively associated with subjective health. The odds of being healthy were on average about 30% lower. The interdisciplinary literature on social determinants of health has largely focused on the salubrious impact of trust and other forms of social capital on physical well-being. Many previous studies based on general, not immigrant, populations also did not differentiate between generalized and particularized types of trust. Results from this study suggest that this conceptual distinction is critical in understanding how and to what extent the two are differentially related to immigrant well-being across multiple levels of analysis. Copyright © 2018 The Royal Society for Public Health. Published by Elsevier Ltd. All rights reserved.
Wills, Olivia; Reynolds, Gemma; Puustinen-Hopper, Kaisa; Roberts, Jennifer
2018-01-01
In this paper we explored the effects of exposure to images of the suffering and vulnerability of others on altruistic, trust-based, and reciprocated incentivized economic decisions, accounting for differences in participants’ dispositional empathy and reported in-group trust for their recipient(s). This was done using a pictorial priming task, framed as a memory test, and a triadic economic game design. Using the largest experimental sample to date to explore this issue, our integrated analysis of two online experiments (total N = 519), found statistically consistent evidence that exposure to images of suffering and vulnerability (vs. neutral images) increased altruistic in-group giving as measured by the “triple dictator game”, and that the manipulation was significantly more effective in those who reported lower trust for their recipients. The experimental manipulation also significantly increased altruistic giving in the standard “dictator game” and trust-based giving in the “investment game”, but only in those who were lower in in-group trust and also high in affective or cognitive empathy. Complementary qualitative evidence revealed the strongest motivations associated with increased giving in the experimental condition were greater assumed reciprocation and a lower aversion to risk. However, no consistent effects of the experimental manipulation on participants’ reciprocated decisions were observed. These findings suggest that, as well as altruistic decision-making in the “triple dictator game”, collaboratively witnessing the suffering of others may heighten trust-based in-group giving in the “investment game” for some people, but the effects are heterogeneous and sensitive to context. PMID:29561883
Powell, Philip A; Wills, Olivia; Reynolds, Gemma; Puustinen-Hopper, Kaisa; Roberts, Jennifer
2018-01-01
In this paper we explored the effects of exposure to images of the suffering and vulnerability of others on altruistic, trust-based, and reciprocated incentivized economic decisions, accounting for differences in participants' dispositional empathy and reported in-group trust for their recipient(s). This was done using a pictorial priming task, framed as a memory test, and a triadic economic game design. Using the largest experimental sample to date to explore this issue, our integrated analysis of two online experiments (total N = 519), found statistically consistent evidence that exposure to images of suffering and vulnerability (vs. neutral images) increased altruistic in-group giving as measured by the "triple dictator game", and that the manipulation was significantly more effective in those who reported lower trust for their recipients. The experimental manipulation also significantly increased altruistic giving in the standard "dictator game" and trust-based giving in the "investment game", but only in those who were lower in in-group trust and also high in affective or cognitive empathy. Complementary qualitative evidence revealed the strongest motivations associated with increased giving in the experimental condition were greater assumed reciprocation and a lower aversion to risk. However, no consistent effects of the experimental manipulation on participants' reciprocated decisions were observed. These findings suggest that, as well as altruistic decision-making in the "triple dictator game", collaboratively witnessing the suffering of others may heighten trust-based in-group giving in the "investment game" for some people, but the effects are heterogeneous and sensitive to context.
Trusted Advisors, Decision Models and Other Keys to Communicating Science to Decision Makers
NASA Astrophysics Data System (ADS)
Webb, E.
2006-12-01
Water resource management decisions often involve multiple parties engaged in contentious negotiations that try to navigate through complex combinations of legal, social, hydrologic, financial, and engineering considerations. The standard approach for resolving these issues is some form of multi-party negotiation, a formal court decision, or a combination of the two. In all these cases, the role of the decision maker(s) is to choose and implement the best option that fits the needs and wants of the community. However, each path to a decision carries the risk of technical and/or financial infeasibility as well as the possibility of unintended consequences. To help reduce this risk, decision makers often rely on some type of predictive analysis from which they can evaluate the projected consequences of their decisions. Typically, decision makers are supported in the analysis process by trusted advisors who engage in the analysis as well as the day to day tasks associated with multi-party negotiations. In the case of water resource management, the analysis is frequently a numerical model or set of models that can simulate various management decisions across multiple systems and output results that illustrate the impact on areas of concern. Thus, in order to communicate scientific knowledge to the decision makers, the quality of the communication between the analysts, the trusted advisor, and the decision maker must be clear and direct. To illustrate this concept, a multi-attribute decision analysis matrix will be used to outline the value of computer model-based collaborative negotiation approaches to guide water resources decision making and communication with decision makers. In addition, the critical role of the trusted advisor and other secondary participants in the decision process will be discussed using examples from recent water negotiations.
HealthTrust: a social network approach for retrieving online health videos.
Fernandez-Luque, Luis; Karlsen, Randi; Melton, Genevieve B
2012-01-31
Social media are becoming mainstream in the health domain. Despite the large volume of accurate and trustworthy health information available on social media platforms, finding good-quality health information can be difficult. Misleading health information can often be popular (eg, antivaccination videos) and therefore highly rated by general search engines. We believe that community wisdom about the quality of health information can be harnessed to help create tools for retrieving good-quality social media content. To explore approaches for extracting metrics about authoritativeness in online health communities and how these metrics positively correlate with the quality of the content. We designed a metric, called HealthTrust, that estimates the trustworthiness of social media content (eg, blog posts or videos) in a health community. The HealthTrust metric calculates reputation in an online health community based on link analysis. We used the metric to retrieve YouTube videos and channels about diabetes. In two different experiments, health consumers provided 427 ratings of 17 videos and professionals gave 162 ratings of 23 videos. In addition, two professionals reviewed 30 diabetes channels. HealthTrust may be used for retrieving online videos on diabetes, since it performed better than YouTube Search in most cases. Overall, of 20 potential channels, HealthTrust's filtering allowed only 3 bad channels (15%) versus 8 (40%) on the YouTube list. Misleading and graphic videos (eg, featuring amputations) were more commonly found by YouTube Search than by searches based on HealthTrust. However, some videos from trusted sources had low HealthTrust scores, mostly from general health content providers, and therefore not highly connected in the diabetes community. When comparing video ratings from our reviewers, we found that HealthTrust achieved a positive and statistically significant correlation with professionals (Pearson r₁₀ = .65, P = .02) and a trend toward significance with health consumers (r₇ = .65, P = .06) with videos on hemoglobinA(1c), but it did not perform as well with diabetic foot videos. The trust-based metric HealthTrust showed promising results when used to retrieve diabetes content from YouTube. Our research indicates that social network analysis may be used to identify trustworthy social media in health communities.
Huggable Communication Medium Maintains Level of Trust during Conversation Game.
Takahashi, Hideyuki; Ban, Midori; Osawa, Hirotaka; Nakanishi, Junya; Sumioka, Hidenobu; Ishiguro, Hiroshi
2017-01-01
There have been several attempts in recent years to develop a remote communication device using sensory modalities other than speech that would induce a user's positive experience with his/her conversation partner. Specifically, Hugvie is a human-shaped pillow as well as a remote communication device enabling users to combine a hugging experience with telecommunication to improve the quality of remote communication. The present research is based on the hypothesis that using Hugvie maintains users' level of trust toward their conversation partners in situations prone to suspicion. The level of trust felt toward other remote game players was compared between participants using Hugvie and those using a basic communication device while playing a modified version of Werewolf , a conversation-based game, designed to evaluate trust. Although there are always winners and losers in the regular version of Werewolf , the rules were modified to generate a possible scenario in which no enemy was present among the players and all players would win if they trusted each other. We examined the effect of using Hugvie while playing Werewolf on players' level of trust toward each other and our results demonstrated that in those using Hugvie , the level of trust toward other players was maintained.
Huggable Communication Medium Maintains Level of Trust during Conversation Game
Takahashi, Hideyuki; Ban, Midori; Osawa, Hirotaka; Nakanishi, Junya; Sumioka, Hidenobu; Ishiguro, Hiroshi
2017-01-01
There have been several attempts in recent years to develop a remote communication device using sensory modalities other than speech that would induce a user’s positive experience with his/her conversation partner. Specifically, Hugvie is a human-shaped pillow as well as a remote communication device enabling users to combine a hugging experience with telecommunication to improve the quality of remote communication. The present research is based on the hypothesis that using Hugvie maintains users’ level of trust toward their conversation partners in situations prone to suspicion. The level of trust felt toward other remote game players was compared between participants using Hugvie and those using a basic communication device while playing a modified version of Werewolf, a conversation-based game, designed to evaluate trust. Although there are always winners and losers in the regular version of Werewolf, the rules were modified to generate a possible scenario in which no enemy was present among the players and all players would win if they trusted each other. We examined the effect of using Hugvie while playing Werewolf on players’ level of trust toward each other and our results demonstrated that in those using Hugvie, the level of trust toward other players was maintained. PMID:29118727
Case-Based Behavior Adaptation Using an Inverse Trust Metric
2014-06-01
Jian, Bisantz, and Drury 2000; Muir 1987), about how trust- worthy the robot was behaving. However, this might not be practical in situations that are...5). Carlson, M. S.; Desai, M.; Drury , J. L.; Kwak, H.; and Yanco, H. A. 2014. Identifying factors that influence trust in automated cars and medical...and Drury , C. G. 2000. Foundations for an empirically determined scale of trust in automated systems. International Journal of Cogni- tive Ergonomics
Predictors of Interpersonal Trust in Virtual Distributed Teams
2008-09-01
understand systems that are very complex in nature . Such understanding is essential to facilitate building or maintaining operators’ mental models of the...a significant impact on overall system performance. Specifically, the level of automation that combined human generation of options with computer...and/or computer servers had a significant impact on automated system performance. Additionally, Parasuraman, Sheridan, & Wickens (2000) proposed
ERIC Educational Resources Information Center
Tasdan, Murat; Yalcin, Tugba
2010-01-01
Perceived social support and organizational trust have gained importance in organizational life along with the human relationship among organizations. While social support concept has been accepted as the support obtained from individual's surroundings, organizational trust is defined as the result of consistent behaviors based on mutual respect…
Assessing Estonian Mothers' Involvement in Their Children's Education and Trust in Teachers
ERIC Educational Resources Information Center
Kikas, Eve; Peets, Katlin; Niilo, Airi
2011-01-01
Questionnaires assessing mothers' involvement in children's education and their trust in teachers were developed for the usage in Estonian kindergartens and elementary schools. The scales were adapted based on the questionnaires by Fantuzzo and colleagues (parental involvement) and Adams and Christenson (trust). Mothers of 454 kindergarten…
The Development of Trust in Residential Environmental Education Programs
ERIC Educational Resources Information Center
Ardoin, Nicole M.; DiGiano, Maria L.; O'Connor, Kathleen; Podkul, Timothy E.
2017-01-01
Trust, a relational phenomenon that is an important building block of interpersonal relationships and within society, can also be an intermediary outcome of field-based environmental education programs. Trust creates a foundation for collaboration and decision-making, which are core to many ultimate outcomes of environmental education. Yet,…
Understanding Is Key: An Analysis of Factors Pertaining to Trust in a Real-World Automation System
Balfe, Nora; Sharples, Sarah; Wilson, John R.
2018-01-01
Objective: This paper aims to explore the role of factors pertaining to trust in real-world automation systems through the application of observational methods in a case study from the railway sector. Background: Trust in automation is widely acknowledged as an important mediator of automation use, but the majority of the research on automation trust is based on laboratory work. In contrast, this work explored trust in a real-world setting. Method: Experienced rail operators in four signaling centers were observed for 90 min, and their activities were coded into five mutually exclusive categories. Their observed activities were analyzed in relation to their reported trust levels, collected via a questionnaire. Results: The results showed clear differences in activity, even when circumstances on the workstations were very similar, and significant differences in some trust dimensions were found between groups exhibiting different levels of intervention and time not involved with signaling. Conclusion: Although the empirical, lab-based studies in the literature have consistently found that reliability and competence of the automation are the most important aspects of trust development, understanding of the automation emerged as the strongest dimension in this study. The implications are that development and maintenance of trust in real-world, safety-critical automation systems may be distinct from artificial laboratory automation. Application: The findings have important implications for emerging automation concepts in diverse industries including highly automated vehicles and Internet of things. PMID:29613815
26 CFR 1.651(b)-1 - Deduction for distributions to beneficiaries.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Deduction for distributions to beneficiaries. In computing its taxable income, a simple trust is allowed a...), relating to tax-exempt interest, foreign income, and excluded dividends. For example: Assume that the...
Social capital, political trust, and health locus of control: a population-based study.
Lindström, Martin
2011-02-01
To investigate the association between political trust in the Riksdag and lack of belief in the possibility to influence one's own health (external locus of control), taking horizontal trust into account. The 2008 public health survey in Skåne is a cross-sectional postal questionnaire study with a 55% participation rate. A random sample of 28,198 persons aged 18-80 years participated. Logistic regression models were used to investigate the associations between political trust in the Riksdag (an aspect of vertical trust) and lack of belief in the possibility to influence one's own health (external locus of control). The multiple regression analyses included age, country of birth, education, and horizontal trust in other people. A 33.7% of all men and 31.8% of all women lack internal locus of control. Low (external) health locus of control is more common in higher age groups, among people born outside Sweden, with lower education, low horizontal trust, low political trust, and no opinion concerning political trust. Respondents with not particularly strong political trust, no political trust at all and no opinion have significantly higher odds ratios of external locus of control throughout the multiple regression analyses. Low political trust in the Riksdag seems to be independently associated with external health locus of control.
Leader-member exchange and safety citizenship behavior: The mediating role of coworker trust.
Jiang, Li; Li, Feng; Li, YongJuan; Li, Rui
2017-01-01
To achieve high safety levels, mere compliance with safety regulations is not sufficient; employees must be proactive and demonstrate safety citizenship behaviors. Trust is considered as a mechanism for facilitating the effects of a leader on employee citizenship behaviors. Increasingly research has focused on the role of trust in a safety context; however, the role of coworker trust has been overlooked. The mediating role of coworker trust in the relationship between the leader-member exchange and safety citizenship behavior is the focus of this field study. Front-line employees from an air traffic control center and an airline maintenance department completed surveys measuring leader-member exchange, co-worker trust, and safety citizenship behavior. Structural Equation Modeling revealed affective and cognitive trust in coworkers is influenced by leader-member exchange. A trust-based mediation model where cognitive trust and affective trust mediate the relationship between the leader-member exchange and safety citizenship behavior emerged. Results of this study add to our understanding of the relationship between leader-member exchange and safety behavior. The effect of co-worker trust and the extent to which employees participate in workplace safety practice were identified as critical factors. The findings show that managers need to focus on developing cognitive and affective coworker trust to improve safety citizenship behaviors.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Webb, Erik Karl; Tidwell, Vincent Carroll
2009-10-01
This document outlines ways to more effectively communicate with U.S. Federal decision makers by outlining the structure, authority, and motivations of various Federal groups, how to find the trusted advisors, and how to structure communication. All three branches of Federal governments have decision makers engaged in resolving major policy issues. The Legislative Branch (Congress) negotiates the authority and the resources that can be used by the Executive Branch. The Executive Branch has some latitude in implementation and prioritizing resources. The Judicial Branch resolves disputes. The goal of all decision makers is to choose and implement the option that best fitsmore » the needs and wants of the community. However, understanding the risk of technical, political and/or financial infeasibility and possible unintended consequences is extremely difficult. Primarily, decision makers are supported in their deliberations by trusted advisors who engage in the analysis of options as well as the day-to-day tasks associated with multi-party negotiations. In the best case, the trusted advisors use many sources of information to inform the process including the opinion of experts and if possible predictive analysis from which they can evaluate the projected consequences of their decisions. The paper covers the following: (1) Understanding Executive and Legislative decision makers - What can these decision makers do? (2) Finding the target audience - Who are the internal and external trusted advisors? (3) Packaging the message - How do we parse and integrate information, and how do we use computer simulation or models in policy communication?« less
Smirnova, Michelle; Owens, Jennifer Gatewood
2017-06-01
Trust is crucial to optimal care. When trust is compromised, patients, doctors, and others involved in the provision of health care may not act in patients' best interests, particularly when dealing with prescription (Rx) drugs. Patients must trust that doctors are giving them the proper treatment, including access to Rx drugs only when medically necessary. They must also trust themselves to use these drugs properly. Likewise, doctors must trust the patient's ability to use medications appropriately. Given the recent rise in illicit Rx drug use in the U.S., we seek to understand how women articulate levels of trust in doctors and themselves and if different combinations of trust and distrust impact how they acquire, use, and articulate their experiences with Rx drugs. To this end, we identified and interviewed 40 women incarcerated in the U.S., who were deeply entrenched in illicit Rx drug use prior to prison. Based upon this research, we argue that illicit Rx drug use may be tied to different combinations of trust and distrust in individual doctors (interpersonal trust), the field of medicine (institutional trust), and the users themselves (self trust). How these women acquire Rx drugs: through doctors, friends, family, or the street market are influenced by combinations of interpersonal, institutional, and self trust. Copyright © 2017 Elsevier Ltd. All rights reserved.
Haesevoets, Tessa; Reinders Folmer, Chris; Van Hiel, Alain
2015-01-01
Despite the popularity of financial compensation as a means for addressing trust violations, the question whether (more) money can indeed buy trust back remains largely unexplored. In the present research, we focus on the role of violation type and compensation size. The results of a scenario study and a laboratory experiment show that financial compensation can effectively promote the restoration of trust for transgressions that indicate a lack of competence. Conversely, for transgressions which signal a lack of integrity, financial compensation is not an effective tool to repair trust. Moreover, our findings indicate that for both violation types, overcompensation has no positive effects on top of the impact of equal compensation. These findings therefore show that when it comes to trust, money cannot buy everything. PMID:26714025
Social capital, political trust and self-reported psychological health: a population-based study.
Lindstrom, Martin; Mohseni, Mohabbat
2009-02-01
This study investigates the association between political trust (an aspect of institutional trust) in the Riksdag (the national parliament in Sweden) and self-reported psychological health, taking generalized (horizontal) trust in other people into account. The 2004 public health survey in Skåne in Southern Sweden is a cross-sectional postal questionnaire study that was answered by 27,757 respondents aged 18-80 yielding a 59% response rate. A logistic regression model was used to investigate the associations between political trust and self-reported psychological health adjusting for possible confounders (age, country of origin, education, economic stress and generalized trust in other people i.e. horizontal trust). We found that 13.0% of the men and 18.9% of the women reported poor psychological health. A total of 17.3% and 11.6% of the male and female respondents, respectively, reported that they had no trust at all in the national parliament, and another 38.2% and 36.2%, respectively, reported that their political trust was not particularly high. Respondents in younger age groups, born abroad, with high education, high levels of economic stress, low horizontal trust and low political trust had significantly higher levels of self-reported poor psychological health. There was a significant association between low political trust and low horizontal trust. After adjustments for age, country of origin, education and economic stress, the inclusion of horizontal trust reduced the odds ratios of self-reported poor psychological health in the "no political trust at all" category compared to the "very high political trust" category from 1.6 to 1.4 among men and from 1.7 to 1.4 among women. It is concluded that low political trust in the Riksdag seems to be significantly and positively associated with poor mental health.
Measuring physicians' trust: A scoping review with implications for public policy.
Wilk, Adam S; Platt, Jodyn E
2016-09-01
Increasingly, physicians are expected to work in productive, trusting relationships with other health system stakeholders to improve patient and system outcomes. A better understanding of physicians' trust is greatly needed. This study assesses the state of the literature on physicians' trust in patients, other health care providers, institutions, and data systems or technology, and identifies key themes, dimensions of trust considered, quantitative measures used, and opportunities for further development via a scoping review. Peer-reviewed, English-language research articles were identified for inclusion in this study based on systematic searches of the Ovid/Medline, Pubmed, Proquest, Scopus, Elsevier, and Web of Science databases. Search terms included "trust" along with "physician," "doctor," "primary care provider," "family practitioner," "family practice," "generalist," "general practitioner," "general practice," "internist," "internal medicine," or "health professional," and plausible variants. Among the relevant articles identified (n = 446), the vast majority focused on patient trust in physicians (81.2%). Among articles examining physicians' trust, rigorous investigations of trust are rare, narrowly focused, and imprecise in their discussion of trust. Robust investigations of the effects of trust or distrust-as opposed to trust's determinants-and studies using validated quantitative trust measures are particularly rare. Studies typically measured trust using the language of confidence, effective communication, or cooperation, rarely or never capturing other important dimensions of trust, such as fidelity, the trustee's reputation, social capital, vulnerability, and acceptance. Research employing new, validated measures of physicians' trust, especially trust in institutions, may be highly informative to health system leaders and policymakers seeking to hone and enhance tools for improving the effectiveness and efficiency of the health care system. Copyright © 2016 Elsevier Ltd. All rights reserved.
Swift Trust in Distributed Ad Hoc Teams
2007-10-04
individus sont perçus. Et les abus de confiance commis pendant la mission ont nui temporairement à la réputation de leurs auteurs , mais ils n’ont...of theory and research argue that trust may emerge in teams even when the development of conventional person-based trust is challenged. 1.3.1 Swift...good deal of theory (and some research) espouses the importance of “swift trust” in environments where conventional trust would otherwise be
TANDEM: A Trust-Based Agent Framework for Networked Decision Making
2015-09-10
selective (20–80 %), while the rest are good citizens, trust acts as a method to isolate misbehaving agents. If the majority of the agents have high...competence and low selectivity, then they can use trust to isolate route information around the misbehaving agents, improving Comm and Steps. The impact is...more dramatic when only 20–40 % of the agents are misbehaving . However, using trust results in reduced SA as the information available at the
Recording pressure ulcer risk assessment and incidence.
Plaskitt, Anne; Heywood, Nicola; Arrowsmith, Michaela
2015-07-15
This article reports on the introduction of an innovative computer-based system developed to record and report pressure ulcer risk and incidence at an acute NHS trust. The system was introduced to ensure that all patients have an early pressure ulcer risk assessment, which prompts staff to initiate appropriate management if a pressure ulcer is detected, thereby preventing further patient harm. Initial findings suggest that this electronic process has helped to improve the timeliness and accuracy of data on pressure ulcer risk and incidence. In addition, it has resulted in a reduced number of reported hospital-acquired pressure ulcers.
The importance of multiple performance criteria for understanding trust in risk managers.
Johnson, Branden B; White, Mathew P
2010-07-01
Effective risk management requires balancing several, sometimes competing, goals, such as protecting public health and ensuring cost control. Research examining public trust of risk managers has largely focused on trust that is unspecified or for a single goal. Yet it can be reasonable to have a high level of trust in one aspect of a target's performance but not another. Two studies involving redevelopment of contaminated land (Study 1) and drinking water standards (Study 2) present preliminary evidence on the value of distinguishing between performance criteria for understanding of trust. Study 1 assessed perceptions of several trust targets (councilors, developers, scientists, residents) on their competence (capacity to achieve goals) and willingness to take action under uncertainty for four criteria. Study 2 assessed competence, willingness, and trust for five criteria regarding a single government agency. In both studies overall trust in each target was significantly better explained by considering perceptions of their performance on multiple criteria than on the single criterion of public health. In Study 1, the influence of criteria also varied plausibly across trust targets (e.g., willingness to act under uncertainty increased trust in developers on cost control and councilors on local economic improvement, but decreased it for both targets on environmental protection). Study 2 showed that explained variance in trust increased with both dimension- and trust-based measures of criteria. Further conceptual and methodological development of the notion of multiple trust criteria could benefit our understanding of stated trust judgments.
Trust, conflict, and cooperation: a meta-analysis.
Balliet, Daniel; Van Lange, Paul A M
2013-09-01
Many theories of trust emphasize that trust is most relevant to behavior in situations involving a conflict of interests. However, it is not clear how trust relates to behavior across situations that differ in the degree of conflicting interest: Does trust matter more when the conflict of interest is small or large? According to an interdependence perspective, trust becomes an especially important determinant of behavior in situations involving larger, compared to smaller, degrees of conflicting interests. To examine this perspective, we conducted a meta-analysis involving 212 effect sizes on the relation between trust (both state and dispositional trust in others) and cooperation in social dilemmas-situations that involve varying degrees of conflict between self-interest and collective interest. Results revealed that the positive relation between trust and cooperation is stronger when there is a larger, compared to smaller, degree of conflict. We also examined several other possible moderators of the relation between trust and cooperation. The relation between trust and cooperation was stronger during individual, compared to intergroup, interactions but did not vary as a function of the situation being either a one-shot or repeated interaction. We also find differences across countries in the extent that people condition their own cooperation based on their trust in others. We discuss how the results support an emerging consensus about trust being limited to situations of conflict and address some theoretical and societal implications for our understanding of how and why trust is so important to social interactions and relationships. (c) 2013 APA, all rights reserved.
Reputation offsets trust judgments based on social biases among Airbnb users.
Abrahao, Bruno; Parigi, Paolo; Gupta, Alok; Cook, Karen S
2017-09-12
To provide social exchange on a global level, sharing-economy companies leverage interpersonal trust between their members on a scale unimaginable even a few years ago. A challenge to this mission is the presence of social biases among a large heterogeneous and independent population of users, a factor that hinders the growth of these services. We investigate whether and to what extent a sharing-economy platform can design artificially engineered features, such as reputation systems, to override people's natural tendency to base judgments of trustworthiness on social biases. We focus on the common tendency to trust others who are similar (i.e., homophily) as a source of bias. We test this argument through an online experiment with 8,906 users of Airbnb, a leading hospitality company in the sharing economy. The experiment is based on an interpersonal investment game, in which we vary the characteristics of recipients to study trust through the interplay between homophily and reputation. Our findings show that reputation systems can significantly increase the trust between dissimilar users and that risk aversion has an inverse relationship with trust given high reputation. We also present evidence that our experimental findings are confirmed by analyses of 1 million actual hospitality interactions among users of Airbnb.
NASA Astrophysics Data System (ADS)
Lenzini, Gabriele
We describe an existing software architecture for context and proximity aware services that enables trust-based and context-aware authentication. A service is proximity aware when it automatically detects the presence of entities in its proximity. Authentication is context-aware when it uses contextual information to discern among different identities and to evaluate to which extent they are authentic. The software architecture that we describe here is functioning in our Institute: It manages a sensor network to detect the presence and location of users and their devices. A context manager is responsible to merge the different sources of contextual information, to solve potential contradictions, and to determine the level of authentication of the identity of the person approaching one of the services offered in the coffee-break corners of our Institute. In our solution for context-aware authentication, sensors are managed as if they were recommenders having subjective belief, disbelief, and uncertainty (i.e., trust) on the position and identity of users. A sensor’s subjective trust depends on what it has been sensing in the environment. We discuss the results of an array of simulations that we conducted to validate our concept of trust-based and context-aware authentication. We use Subjective Logic to manage trust.
Reputation offsets trust judgments based on social biases among Airbnb users
Abrahao, Bruno; Parigi, Paolo; Gupta, Alok; Cook, Karen S.
2017-01-01
To provide social exchange on a global level, sharing-economy companies leverage interpersonal trust between their members on a scale unimaginable even a few years ago. A challenge to this mission is the presence of social biases among a large heterogeneous and independent population of users, a factor that hinders the growth of these services. We investigate whether and to what extent a sharing-economy platform can design artificially engineered features, such as reputation systems, to override people’s natural tendency to base judgments of trustworthiness on social biases. We focus on the common tendency to trust others who are similar (i.e., homophily) as a source of bias. We test this argument through an online experiment with 8,906 users of Airbnb, a leading hospitality company in the sharing economy. The experiment is based on an interpersonal investment game, in which we vary the characteristics of recipients to study trust through the interplay between homophily and reputation. Our findings show that reputation systems can significantly increase the trust between dissimilar users and that risk aversion has an inverse relationship with trust given high reputation. We also present evidence that our experimental findings are confirmed by analyses of 1 million actual hospitality interactions among users of Airbnb. PMID:28847948
An empirical test of competing theories of hazard-related trust: the case of GM food.
Allum, Nick
2007-08-01
Few scholars doubt the importance of trust in explaining variation in public perception of technological risk. Relatively little, however, is known about the particular types of judgments that people use in granting or withholding trust. This article presents findings from an empirical study that explores several dimensions of trust relevant for citizens' judgments of scientists involved in the development of GM food. The relationship between particular dimensions of trust and perceptions of GM food risk is also explored, using structural equation modeling. Results suggest that trust judgments based on the perception of shared values are most important in relation to GM food risk, but that judgments about scientists' technical competence are also important.
Facilitating trust engenderment in secondary school nurse interactions with students.
Summach, Anne H J
2011-04-01
School nurses are involved in a complex framework of interactions with students, other professionals, parents, and administrators. Trust between nurse and student is critical for interaction effectiveness. The goal of this study was to understand through phenomenology the process of engendering trust in school nurse-high school student interactions. The qualitative approach explored school nurse perceptions of experiences interacting with students, yielding insights into nurse- and setting-based factors contributing to the development of trust. Subthemes within these included key behaviors and attributes enhancing trust engenderment in school nurse-student interactions. Study findings were well supported by the existing nursing and psychological research literature. Nurses that purposefully strive to develop trust in young people will maximize adolescent health results.
Trust-Based Cooperative Games and Control Strategies for Autonomous Military Convoys
2013-01-01
52] S. Goering, "Postnatal Reproductive Autonomy: Promoting Relational Autonomy and Self-Trust in New Parents," Bioethics , vol. 23, no. 1, pp. 9-19...Systems," Proceedings of the IEEE, vol. 95, no. 1, pp. 215-233, January 2007. [105] O. O’Neill, Autonomy and Trust in Bioethics . Cambridge: Cambridge
Student Trust and Its Antecedents in Higher Education.
ERIC Educational Resources Information Center
Ghosh, Amit K.; Whipple, Thomas W.; Bryan, Glenn
2001-01-01
Based on the belief that long-term marketing costs for colleges can be reduced by focusing on building trust, studied the antecedents to trust in students and alumni. Data collected from 250 students and alumni indicated that strategic plans that improve perceived sincerity, expertise, and congeniality of a college can be successfully used to…
On Deep Learning for Trust-Aware Recommendations in Social Networks.
Deng, Shuiguang; Huang, Longtao; Xu, Guandong; Wu, Xindong; Wu, Zhaohui
2017-05-01
With the emergence of online social networks, the social network-based recommendation approach is popularly used. The major benefit of this approach is the ability of dealing with the problems with cold-start users. In addition to social networks, user trust information also plays an important role to obtain reliable recommendations. Although matrix factorization (MF) becomes dominant in recommender systems, the recommendation largely relies on the initialization of the user and item latent feature vectors. Aiming at addressing these challenges, we develop a novel trust-based approach for recommendation in social networks. In particular, we attempt to leverage deep learning to determinate the initialization in MF for trust-aware social recommendations and to differentiate the community effect in user's trusted friendships. A two-phase recommendation process is proposed to utilize deep learning in initialization and to synthesize the users' interests and their trusted friends' interests together with the impact of community effect for recommendations. We perform extensive experiments on real-world social network data to demonstrate the accuracy and effectiveness of our proposed approach in comparison with other state-of-the-art methods.
Mixed strategy and coevolution dynamics in social networks
NASA Astrophysics Data System (ADS)
Zhong, Weicai; Abbass, Hussein A.; Bender, Axel; Liu, Jing
2011-01-01
We investigate coevolution dynamics of both individual strategies and social ties as they adapt within the snowdrift game with mixed strategies. We propose a partner selection mechanism based on the concept of trust. Here trust is considered an instrument for an individual both selecting the right partners and being selected amongst other potential partners. Based on her local views of the system, the focal individual dismisses the link from the partner with the lowest trust and rewires to the partner’s partner with the highest trust. It is shown that such a trust-based partner switching mechanism favors the emergence of cooperators. Furthermore, when the number of an individual’s partners is restricted (which is a metaphor of limited capacities and capabilities of an individual in real environments), surprising assortative mixing patterns are formed in the emerging network and change the network’s degree distribution from a power-law distribution to an asymmetrically U-shaped distribution. This plays a leading role in preventing global avalanches triggered by perturbations acting on the state of the highly connected individuals.
... already registered, you will receive periodic updates and communications from American Brain Tumor Association. Keep me logged in. What's this? Remembers your login information for your convenience. Use only on trusted, private computers. Privacy Policy Spam Control Text: Please leave this ...
... already registered, you will receive periodic updates and communications from American Brain Tumor Association. Keep me logged in. What's this? Remembers your login information for your convenience. Use only on trusted, private computers. Privacy Policy Spam Control Text: Please leave this ...
The Handicap Principle for Trust in Computer Security, the Semantic Web and Social Networking
NASA Astrophysics Data System (ADS)
Ma, Zhanshan (Sam); Krings, Axel W.; Hung, Chih-Cheng
Communication is a fundamental function of life, and it exists in almost all living things: from single-cell bacteria to human beings. Communication, together with competition and cooperation,arethree fundamental processes in nature. Computer scientists are familiar with the study of competition or 'struggle for life' through Darwin's evolutionary theory, or even evolutionary computing. They may be equally familiar with the study of cooperation or altruism through the Prisoner's Dilemma (PD) game. However, they are likely to be less familiar with the theory of animal communication. The objective of this article is three-fold: (i) To suggest that the study of animal communication, especially the honesty (reliability) of animal communication, in which some significant advances in behavioral biology have been achieved in the last three decades, should be on the verge to spawn important cross-disciplinary research similar to that generated by the study of cooperation with the PD game. One of the far-reaching advances in the field is marked by the publication of "The Handicap Principle: a Missing Piece of Darwin's Puzzle" by Zahavi (1997). The 'Handicap' principle [34][35], which states that communication signals must be costly in some proper way to be reliable (honest), is best elucidated with evolutionary games, e.g., Sir Philip Sidney (SPS) game [23]. Accordingly, we suggest that the Handicap principle may serve as a fundamental paradigm for trust research in computer science. (ii) To suggest to computer scientists that their expertise in modeling computer networks may help behavioral biologists in their study of the reliability of animal communication networks. This is largely due to the historical reason that, until the last decade, animal communication was studied with the dyadic paradigm (sender-receiver) rather than with the network paradigm. (iii) To pose several open questions, the answers to which may bear some refreshing insights to trust research in computer science, especially secure and resilient computing, the semantic web, and social networking. One important thread unifying the three aspects is the evolutionary game theory modeling or its extensions with survival analysis and agreement algorithms [19][20], which offer powerful game models for describing time-, space-, and covariate-dependent frailty (uncertainty and vulnerability) and deception (honesty).
Alarcon, Gene M; Gamble, Rose F; Ryan, Tyler J; Walter, Charles; Jessup, Sarah A; Wood, David W; Capiola, August
2018-07-01
Computer programs are a ubiquitous part of modern society, yet little is known about the psychological processes that underlie reviewing code. We applied the heuristic-systematic model (HSM) to investigate the influence of computer code comments on perceptions of code trustworthiness. The study explored the influence of validity, placement, and style of comments in code on trustworthiness perceptions and time spent on code. Results indicated valid comments led to higher trust assessments and more time spent on the code. Properly placed comments led to lower trust assessments and had a marginal effect on time spent on code; however, the effect was no longer significant after controlling for effects of the source code. Low style comments led to marginally higher trustworthiness assessments, but high style comments led to longer time spent on the code. Several interactions were also found. Our findings suggest the relationship between code comments and perceptions of code trustworthiness is not as straightforward as previously thought. Additionally, the current paper extends the HSM to the programming literature. Copyright © 2018 Elsevier Ltd. All rights reserved.
Thom, D H; Bloch, D A; Segal, E S
1999-02-01
To investigate the effect of a one-day workshop in which physicians were taught trust-building behaviors on their patients' levels of trust and on outcomes of care. In 1994, the study recruited 20 community-based family physicians and enrolled 412 consecutive adult patients from those physicians' practices. Ten of the physicians (the intervention group) were randomly assigned to receive a one-day training course in building and maintaining patients' trust. Outcomes were patients' trust in their physicians, patients' and physicians' satisfaction with the office visit, continuity in the patient-physician relationship, patients' adherence to their treatment plans, and the numbers of diagnostic tests and referrals. Physicians and patients in the intervention and control groups were similar in demographic and other data. There was no significant difference in any outcome. Although their overall ratings were not statistically significantly different, the patients of physicians in the intervention group reported more positive physician behaviors than did the patients of physicians in the control group. The trust-building workshop had no measurable effect on patients' trust or on outcomes hypothesized to be related to trust.
LeBlanc, Dominic; Power, Adam H; DeRose, Guy; Duncan, Audra; Dubois, Luc
2018-05-18
Patient-based decision aids and other multimedia tools have been developed to help enrich the preoperative discussion between surgeon and patient. Use of these tools, however, can be time-consuming and logistically challenging. We investigated whether simply showing patients their images from preoperative computed tomography (CT) or angiography would improve patients' satisfaction with the preoperative discussion. We also examined whether this improved the patient's understanding and trust and whether it contributed to increased preoperative anxiety. Patients undergoing either elective abdominal aortic aneurysm repair or lower limb revascularization were randomly assigned to either standard perioperative discussion or perioperative discussion and review of images (CT image or angiogram). Randomization was concealed and stratified by surgeon. Primary outcome was patient satisfaction with the preoperative discussion as measured by a validated 7-item scale (score, 0-28), with higher scores indicating improved satisfaction. Secondary outcomes included patient understanding, patient anxiety, patient trust, and length of preoperative discussion. Scores were compared using t-test. Overall, 51 patients were randomized, 25 to the intervention arm (discussion and imaging) and 26 to the control arm. Most patients were male (69%), and the average age was 70 years. Forty percent of patients underwent abdominal aortic aneurysm repair, whereas 60% underwent lower limb revascularization. Patient satisfaction with the discussion was generally high, with no added improvement when preoperative images were reviewed (mean score, 24.9 ± 3.02 vs 24.8 ± 2.93; P = .88). Similarly, there was no difference in the patient's anxiety, level of trust, or understanding when the imaging review was compared with standard discussion. There was a trend toward longer preoperative discussions in the group that underwent imaging review (8.18 vs 6.35 minutes; P = .07). Showing patients their CT or angiography images during the preoperative discussion does not improve the patient's satisfaction with the consent discussion. Similarly, there was no effect on the patient's trust, understanding, or anxiety level. Our conclusions are limited by the lack of a standardized measure of patient understanding and not measuring outcomes postoperatively, both of which should be considered in future studies. Copyright © 2018 Society for Vascular Surgery. Published by Elsevier Inc. All rights reserved.
Hype and public trust in science.
Master, Zubin; Resnik, David B
2013-06-01
Social scientists have begun elucidating the variables that influence public trust in science, yet little is known about hype in biotechnology and its effects on public trust. Many scholars claim that hyping biotechnology results in a loss of public trust, and possibly public enthusiasm or support for science, because public expectations of the biotechnological promises will be unmet. We argue for the need for empirical research that examines the relationships between hype, public trust, and public enthusiasm/support. We discuss the complexities in designing empirical studies that provide evidence for a causal link between hype, public trust, and public enthusiasm/support, but also illustrate how this may be remedied. Further empirical research on hype and public trust is needed in order to improve public communication of science and to design evidence-based education on the responsible conduct of research for scientists. We conclude that conceptual arguments made on hype and public trust must be nuanced to reflect our current understanding of this relationship.
Hype and Public Trust in Science
Resnik, David B.
2014-01-01
Social scientists have begun elucidating the variables that influence public trust in science, yet little is known about hype in biotechnology and its effects on public trust. Many scholars claim that hyping biotechnology results in a loss of public trust, and possibly public enthusiasm or support for science, because public expectations of the biotechnological promises will be unmet. We argue for the need for empirical research that examines the relationships between hype, public trust, and public enthusiasm/support. We discuss the complexities in designing empirical studies that provide evidence for a causal link between hype, public trust, and public enthusiasm/support, but also illustrate how this may be remedied. Further empirical research on hype and public trust is needed in order to improve public communication of science and to design evidence-based education on the responsible conduct of research for scientists. We conclude that conceptual arguments made on hype and public trust must be nuanced to reflect our current understanding of this relationship. PMID:22045550
The role of organizational trust in safety climate's influence on organizational outcomes.
Kath, Lisa M; Magley, Vicki J; Marmet, Matthew
2010-09-01
Based on elements of social exchange theory and other conceptualizations of trust, a model was developed situating organizational trust as a central component to the relationship that safety climate has with organizational outcomes. Specifically, the model specified that two facets of safety climate--upward safety communication and management attitudes toward safety--would be positively related to organizational trust. Increased levels of trust would then predict increased motivation to engage in safe job-related behaviors, increased job satisfaction, and decreased turnover intentions. Another hypothesis investigated whether job safety relevance would moderate the relationship between safety climate and trust. Online survey research was conducted with 599 employees from 97 work groups across a New England grocery store chain. Hierarchical linear modeling indicated support for trust mediating the relationship between safety climate and organizational outcomes; further, the relationship between safety climate and trust was stronger within work groups where safety was more relevant. 2009 Elsevier Ltd. All rights reserved.
The Condition for Generous Trust.
Shinya, Obayashi; Yusuke, Inagaki; Hiroki, Takikawa
2016-01-01
Trust has been considered the "cement" of a society and is much studied in sociology and other social sciences. Most studies, however, have neglected one important aspect of trust: it involves an act of forgiving and showing tolerance toward another's failure. In this study, we refer to this concept as "generous trust" and examine the conditions under which generous trust becomes a more viable option when compared to other types of trust. We investigate two settings. First, we introduce two types of uncertainties: uncertainty as to whether trustees have the intention to cooperate, and uncertainty as to whether trustees have enough competence to accomplish the entrusted tasks. Second, we examine the manner in which trust functions in a broader social context, one that involves matching and commitment processes. Since we expect generosity or forgiveness to work differently in the matching and commitment processes, we must differentiate trust strategies into generous trust in the matching process and that in the commitment process. Our analytical strategy is two-fold. First, we analyze the "modified" trust game that incorporates the two types of uncertainties without the matching process. This simplified setting enables us to derive mathematical results using game theory, thereby giving basic insight into the trust mechanism. Second, we investigate socially embedded trust relationships in contexts involving the matching and commitment processes, using agent-based simulation. Results show that uncertainty about partner's intention and competence makes generous trust a viable option. In contrast, too much uncertainty undermines the possibility of generous trust. Furthermore, a strategy that is too generous cannot stand alone. Generosity should be accompanied with moderate punishment. As for socially embedded trust relationships, generosity functions differently in the matching process versus the commitment process. Indeed, these two types of generous trust coexist, and their coexistence enables a society to function well.
Sheikh, Zainab; Hoeyer, Klaus
2018-06-01
Trust features prominently in a number of policy documents that have been issued in recent years to facilitate data sharing and international collaboration in medical research. However, it often remains unclear what is meant by 'trust'. By exploring a concrete international collaboration between Denmark and Pakistan, we develop a way of unpacking trust that shifts focus from what trust 'is' to what people invest in relationships and what references to trust do for them in these relationships. Based on interviews in both Pakistan and Denmark with people who provide blood samples and health data for the same laboratory, we find that when participants discuss trust they are trying to shape their relationship to researchers while simultaneously communicating important hopes, fears and expectations. The types of trust people talk about are never unconditional, but involve awareness of uncertainties and risks. There are different things at stake for people in different contexts, and therefore it is not the same to trust researchers in Pakistan as it is in Denmark, even when participants donate to the same laboratory. We conclude that casual references to 'trust' in policy documents risk glossing over important local differences and contribute to a de-politicization of basic inequalities in access to healthcare.
Use of Trust Vectors in Support of the CyberCraft Initiative
2007-03-01
for determining the trust value of a recommendation path [3]. Xiong and Liu [23] proposed a trust model for peer-to-peer (P2P) eCommerce transactions...Amount of Satisfaction: This is based on the feedback from the other peer in an eCommerce transaction. Feedback is the basis for most trust models in...a P2P eCommerce environment. Number of Transactions: As the name suggests, this is the number of transac- tions performed by the rated peer in a
2005-07-01
policies in pervasive computing environments. In this context, the owner of information sources (e.g. user, sensor, application, or organization...work in decentralized trust management and semantic web technologies . Section 3 introduces an Information Disclosure Agent architecture for...Norman Sadeh July 2005 CMU-ISRI-05-113 School of Computer Science, Carnegie Mellon University 5000 Forbes Avenue, Pittsburgh, PA, 15213
Understanding and Harnessing the Power of Ideas, Persuasion, and Trust
2013-09-17
thought leaders from across the behavioral, social, political, anthropological and computer sciences to aid in the identification of current knowledge...engagement of over 40 global thought leaders from across the behavioral, social, political, anthropological and computer sciences to aid in the...Chair: RTO Symposium on the Role of Humans in Automated 2002 Systems. Oct 2002; Warsaw, Poland . Member, NATO Technical Group on Battle Space
Evaluation of IT security – genesis and its state-of-art
NASA Astrophysics Data System (ADS)
Livshitz, I. I.; Neklyudov, A. V.; Lontsikh, P. A.
2018-05-01
It is topical to evolve processes of an evaluation of the IT security nowadays. Formation and application of common evaluation approaches to the IT component, which are processed by the governmental and civil organizations, are still not solving problem. Successful processing of the independent evaluation for conformity with a security standard is supposed to be the main criteria of a suitability of any IT component to be used in a trusted computer system. The solution of the mentioned-above problem is suggested through the localization of all research, development and producing processes in a national trusted area (digital sovereignty).
Examining Factors Affecting Attitudes toward Nuclear Power in Taiwan
NASA Astrophysics Data System (ADS)
Chan, Tzu-Jen
Nuclear power has become a major issue in Taiwan for several decades. The objective of the present study is to obtain evidence about the major determinants contributing to attitudes toward nuclear power, by investigating socioeconomic factors, environmental attitudes, knowledge of issues, trust, and risk perception, in shaping nuclear attitudes. A face-to-face survey was conducted using paper-based questionnaires from July 2014 to September 2014. Finally, 364 surveys were collected, of which 356 met validation requirements. The findings showed (1) knowledge of issues, trust in university scientists, trust in environmental groups, and risk perception directly influence attitudes toward nuclear power. (2) Risk perception is directly influenced by trust in nuclear authorities, trust in environmental groups, environmental attitudes, and party preference. (3) Gender, age, and party preference directly influence knowledge, trust in nuclear authorities, or trust in university scientists. The potential explanations and implications of findings are discussed.
Junewicz, Alexandra; Kleinert, Kelly J; Dubler, Nancy Neveloff; Caplan, Arthur
2017-09-01
Despite the critical importance of patient-physician trust, it may be compromised among vulnerable patients, such as (1) incarcerated patients and (2) those patients who have been victims of trauma. The purpose of this study was to examine patient-physician trust among forensic and civilian psychiatric inpatient populations and to explore whether it varied based on a patient's history of incarceration and/or victimization. A trust survey (WFPTS) and a trauma instrument (LEC-5) were administered to 93 patients hospitalized on forensic and civilian psychiatric hospital units in a large, urban public hospital. Results showed no difference in patient-physician trust between incarcerated and civilian patients. Similarly, there was no effect of a history of physical assault or sexual assault on ratings of patient-physician trust. However, the hospitalized civilian and forensic patients who reported being the victim of weapons assault had significantly lower patient-physician trust scores than their counterparts.
Aitken, Mhairi; Cunningham-Burley, Sarah; Pagliari, Claudia
2016-01-01
The Scottish Health Informatics Programme (SHIP) was a Scotland-wide research programme exploring ways of collecting, managing and analysing electronic patient records for health research. As part of the SHIP public engagement work stream, a series of eight focus groups and a stakeholder workshop were conducted to explore perceptions of the role, relevance and functions of trust (or trustworthiness) in relation to research practices. The findings demonstrate that the public’s relationships of trust and/or mistrust in science and research are not straightforward. This paper aims to move beyond simple descriptions of whether publics trust researchers, or in whom members of the public place their trust, and to explore more fully the bases of public trust/mistrust in science, what trust implies and equally what it means for research/researchers to be trustworthy. This has important implications for public engagement in interdisciplinary projects. PMID:28066123
Influences on Immunization Decision-Making among US Parents of Young Children.
Chung, Yunmi; Schamel, Jay; Fisher, Allison; Frew, Paula M
2017-12-01
Objectives This study assessed influences on vaccination decisions among parents of young children and examined common vaccination information and advice sources. Methods Using panel samples of parents of children under 7 years, web-based surveys were conducted in 2012 (n = 2603) and 2014 (n = 2518). A vaccine decision-making typology (non-hesitant acceptors, hesitant acceptors, delayers, and refusers) was established and weighted population estimates of potential factors influencing parental vaccination decision (e.g., provider influence, source of information and advice) were computed by year and decision type. Results Delayers and refusers were more likely than acceptors to know someone whose child experienced a severe reaction to a vaccine or delayed/refused vaccine(s). High proportions of delayers (2012: 33.4%, 2014: 33.9%) and refusers (2012: 49.6%, 2014: 58.6%) reported selecting their healthcare provider based on whether the provider would allow them to delay/refuse vaccines. Providers were the most frequently reported trusted vaccine information source among all parents, though more often by acceptors than refusers (2012, 2014: p < 0.01). We found differing patterns of provider advice-seeking and internet as a reliable vaccine information source by group. Among those who had considered delay/refusal, trust in their healthcare provider's advice was the most common reason cited for their decision reversal. Conclusions for Practice Provider trust and communication along with varying degrees of personal-network influences likely contribute to immunization decisions of parents. Vaccine hesitant parents often seek providers amenable to accommodating their vaccine beliefs. Providers may benefit from vaccine communication training as their recommendations may influence hesitant parents to immunize their children.
Jardine, Cynthia G; Banfield, Laura; Driedger, S Michelle; Furgal, Christopher M
2013-01-01
The development and implementation of a remediation plan for the residual arsenic trioxide stored at the former Giant Mine site in the Canadian Northwest Territories has raised important issues related to trust. Social and individual trust of those responsible for making decisions on risks is critically important in community judgements on risk and the acceptability of risk management decisions. Trust is known to be affected by value similarity and confidence in past performance, which serve as interacting sources of cooperation in acting toward a common goal. To explore the elements of trust associated with the development and implementation of the Giant Mine Remediation Plan. Semi-structured interviews were conducted with eight purposively selected key informants representing both various interested and affected parties and the two government proponents. Five primary issues related to trust were identified by the participants: (1) a historical legacy of mistrust between the community (particularly Aboriginal peoples) and government; (2) barriers to building trust with the federal government; (3) limited community input and control over the decision-making process; (4) the conflicted and confounded role of the government agencies being both proponent and regulator, and the resulting need for independent oversight; and (5) distrust of the government to commit to the perpetual care required for the remediation option selected. The dual-mode model of trust and confidence was shown to be a useful framework for understanding the pivotal role of trust in the development of the Giant Mine Remediation Plan. Failure to recognize issues of trust based on value dissimilarity and lack of confidence based on past performance have resulted in a lack of cooperation characterized by delayed remediation and a prolonged and expensive consultation process. Government recognition of the importance of trust to these issues will hopefully improve future communication and public engagement endeavours.
Higgs, Ashlea; Diwersy, Mario
2014-02-01
About 25 years ago, one of our colleagues joined the Wellcome Trust, the world's second largest private biomedical funder. At the time, computers and the Internet were not a regular part of everyday work routines. Today, a quarter of a century later, the Wellcome Trust and other forward thinking funders are leading the way in integrating software, systems, and information technology into their funding processes. While not all research funders have been technologically proactive--some have only recently switched to electronic applications and others still operate with largely document-based processes-almost all funders experience some level of difficulty when it comes to translating technological advances into operational efficiencies and strategic insights. Also, although there are exceptions, funders generally do not share notes. That is scary. It is a rich and perhaps troubling irony that even while they invest billions of dollars in groundbreaking research to solve some of the world's greatest challenges, many funders struggle to find effective solutions to what can seem like pedestrian information challenges:
Solving constrained inverse problems for waveform tomography with Salvus
NASA Astrophysics Data System (ADS)
Boehm, C.; Afanasiev, M.; van Driel, M.; Krischer, L.; May, D.; Rietmann, M.; Fichtner, A.
2016-12-01
Finding a good balance between flexibility and performance is often difficult within domain-specific software projects. To achieve this balance, we introduce Salvus: an open-source high-order finite element package built upon PETSc and Eigen, that focuses on large-scale full-waveform modeling and inversion. One of the key features of Salvus is its modular design, based on C++ mixins, that separates the physical equations from the numerical discretization and the mathematical optimization. In this presentation we focus on solving inverse problems with Salvus and discuss (i) dealing with inexact derivatives resulting, e.g., from lossy wavefield compression, (ii) imposing additional constraints on the model parameters, e.g., from effective medium theory, and (iii) integration with a workflow management tool. We present a feasible-point trust-region method for PDE-constrained inverse problems that can handle inexactly computed derivatives. The level of accuracy in the approximate derivatives is controlled by localized error estimates to ensure global convergence of the method. Additional constraints on the model parameters are typically cheap to compute without the need for further simulations. Hence, including them in the trust-region subproblem introduces only a small computational overhead, but ensures feasibility of the model in every iteration. We show examples with homogenization constraints derived from effective medium theory (i.e. all fine-scale updates must upscale to a physically meaningful long-wavelength model). Salvus has a built-in workflow management framework to automate the inversion with interfaces to user-defined misfit functionals and data structures. This significantly reduces the amount of manual user interaction and enhances reproducibility which we demonstrate for several applications from the laboratory to global scale.
Rural Roots: News, Information, and Commentary from the Rural School and Community Trust, 2002.
ERIC Educational Resources Information Center
Yaunches, Alison, Ed.; Loveland, Elaina, Ed.
2002-01-01
This document contains the six issues of "Rural Roots" published bimonthly in 2002. A newsletter of the Rural School and Community Trust, "Rural Roots" provides news, information, and commentary from the Rural Trust and highlights the wide variety of place-based education work happening in rural schools and communities across…
Rural Roots: News, Information, and Commentary from the Rural School and Community Trust, 2000-2001.
ERIC Educational Resources Information Center
Westra, Kathryn E., Ed.; Yaunches, H. Alison, Ed.
2001-01-01
This document contains the first eight issues of "Rural Roots"--two published in 2000 and six published bimonthly in 2001. A newsletter of the Rural School and Community Trust, "Rural Roots" provides news, information, and commentary from the Rural Trust and highlights the wide variety of place-based education work happening in…
Tutor Trust Primary: Evaluation Report and Executive Summary
ERIC Educational Resources Information Center
Buchanan, Emily; Worth, Jack; Aston, Helen
2015-01-01
The Tutor Trust is a Manchester-based charity that aims to provide affordable small group and one to one tuition to schools. The Trust recruits university students and recent graduates, which enables it to provide tuition at a competitive rate. It predominantly aims to support schools in challenging communities and pupils who are looked-after or…
Organizational Trust of Mobbing Victims: A Study of Turkish Teachers
ERIC Educational Resources Information Center
Ertürk, Abbas
2016-01-01
The purpose of this study is to investigate the relationship between mobbing behaviour faced by high schools teachers and their organizational trust. The study was based on the survey model. 418 teachers from five different prefectures in the province of Ankara participated in the survey. The NAQ negative acts scale and organizational trust scale…
ERIC Educational Resources Information Center
Demant, Jakob; Ravn, Signe
2013-01-01
This article discusses how Danish parents and their children communicate trust. Based on Niklas Luhmann's sociological theory, the article explores new aspects of communication about alcohol-related rules. The analysis shows how the parents emphasize the importance of communicating trust, while the adolescents, on the other hand, observe the…
Trust in the Medical Profession: Conceptual and Measurement Issues
Hall, Mark A; Camacho, Fabian; Dugan, Elizabeth; Balkrishnan, Rajesh
2002-01-01
Objective To develop and test a multi-item measure for general trust in physicians, in contrast with trust in a specific physician. Data Sources Random national telephone survey of 502 adult subjects with a regular physician and source of payment. Study Design Based on a multidimensional conceptual model, a large pool of candidate items was generated, tested, and revised using focus groups, expert reviewers, and pilot testing. The scale was analyzed for its factor structure, internal consistency, construct validity, and other psychometric properties. Principal Findings The resulting 11-item scale measuring trust in physicians generally is consistent with most aspects of the conceptual model except that it does not include the dimension of confidentiality. This scale has a single-factor structure, good internal consistency (alpha=.89), and good response variability (range=11–54; mean=33.5; SD=6.9). This scale is related to satisfaction with care, trust in one's physician, following doctors' recommendations, having no prior disputes with physicians, not having sought second opinions, and not having changed doctors. No association was found with race/ethnicity. While general trust and interpersonal trust are qualitatively similar, they are only moderately correlated with each other and general trust is substantially lower. Conclusions Emerging research on patients' trust has focused on interpersonal trust in a specific, known physician. Trust in physicians in general is also important and differs significantly from interpersonal physician trust. General physician trust potentially has a strong influence on important behaviors and attitudes, and on the formation of interpersonal physician trust. PMID:12479504
Blind quantum computation with identity authentication
NASA Astrophysics Data System (ADS)
Li, Qin; Li, Zhulin; Chan, Wai Hong; Zhang, Shengyu; Liu, Chengdong
2018-04-01
Blind quantum computation (BQC) allows a client with relatively few quantum resources or poor quantum technologies to delegate his computational problem to a quantum server such that the client's input, output, and algorithm are kept private. However, all existing BQC protocols focus on correctness verification of quantum computation but neglect authentication of participants' identity which probably leads to man-in-the-middle attacks or denial-of-service attacks. In this work, we use quantum identification to overcome such two kinds of attack for BQC, which will be called QI-BQC. We propose two QI-BQC protocols based on a typical single-server BQC protocol and a double-server BQC protocol. The two protocols can ensure both data integrity and mutual identification between participants with the help of a third trusted party (TTP). In addition, an unjammable public channel between a client and a server which is indispensable in previous BQC protocols is unnecessary, although it is required between TTP and each participant at some instant. Furthermore, the method to achieve identity verification in the presented protocols is general and it can be applied to other similar BQC protocols.
CD-ROMs review 1995-1997: a multicentre pilot trial.
Grey-Lloyd, J
1998-03-01
This article describes an evaluation of CD-ROMs carried out at four NHS Trust Libraries in Wales. It covers interactive CD-ROMs which take the form of either computer assisted learning programs, encyclopaedia or well-known text books.
Neural correlates of economic game playing.
Krueger, Frank; Grafman, Jordan; McCabe, Kevin
2008-12-12
The theory of games provides a mathematical formalization of strategic choices, which have been studied in both economics and neuroscience, and more recently has become the focus of neuroeconomics experiments with human and non-human actors. This paper reviews the results from a number of game experiments that establish a unitary system for forming subjective expected utility maps in the brain, and acting on these maps to produce choices. Social situations require the brain to build an understanding of the other person using neuronal mechanisms that share affective and intentional mental states. These systems allow subjects to better predict other players' choices, and allow them to modify their subjective utility maps to value pro-social strategies. New results for a trust game are presented, which show that the trust relationship includes systems common to both trusting and trustworthy behaviour, but they also show that the relative temporal positions of first and second players require computations unique to that role.
Numerical optimization in Hilbert space using inexact function and gradient evaluations
NASA Technical Reports Server (NTRS)
Carter, Richard G.
1989-01-01
Trust region algorithms provide a robust iterative technique for solving non-convex unstrained optimization problems, but in many instances it is prohibitively expensive to compute high accuracy function and gradient values for the method. Of particular interest are inverse and parameter estimation problems, since function and gradient evaluations involve numerically solving large systems of differential equations. A global convergence theory is presented for trust region algorithms in which neither function nor gradient values are known exactly. The theory is formulated in a Hilbert space setting so that it can be applied to variational problems as well as the finite dimensional problems normally seen in trust region literature. The conditions concerning allowable error are remarkably relaxed: relative errors in the gradient error condition is automatically satisfied if the error is orthogonal to the gradient approximation. A technique for estimating gradient error and improving the approximation is also presented.
NASA Astrophysics Data System (ADS)
Zacharias, Marios; Giustino, Feliciano
Electron-phonon interactions are of fundamental importance in the study of the optical properties of solids at finite temperatures. Here we present a new first-principles computational technique based on the Williams-Lax theory for performing predictive calculations of the optical spectra, including quantum zero-point renormalization and indirect absorption. The calculation of the Williams-Lax optical spectra is computationally challenging, as it involves the sampling over all possible nuclear quantum states. We develop an efficient computational strategy for performing ''one-shot'' finite-temperature calculations. These require only a single optimal configuration of the atomic positions. We demonstrate our methodology for the case of Si, C, and GaAs, yielding absorption coefficients in good agreement with experiment. This work opens the way for systematic calculations of optical spectra at finite temperature. This work was supported by the UK EPSRC (EP/J009857/1 and EP/M020517/) and the Leverhulme Trust (RL-2012-001), and the Graphene Flagship (EU-FP7-604391).
Stout, Jeffrey N; Tisdall, M Dylan; McDaniel, Patrick; Gagoski, Borjan; Bolar, Divya S; Grant, Patricia Ellen; Adalsteinsson, Elfar
2017-12-01
Subject motion may cause errors in estimates of blood T 2 when using the T 2 -relaxation under spin tagging (TRUST) technique on noncompliant subjects like neonates. By incorporating 3D volume navigators (vNavs) into the TRUST pulse sequence, independent measurements of motion during scanning permit evaluation of these errors. The effects of integrated vNavs on TRUST-based T 2 estimates were evaluated using simulations and in vivo subject data. Two subjects were scanned with the TRUST+vNav sequence during prescribed movements. Mean motion scores were derived from vNavs and TRUST images, along with a metric of exponential fit quality. Regression analysis was performed between T 2 estimates and mean motion scores. Also, motion scores were determined from independent neonatal scans. vNavs negligibly affected venous blood T 2 estimates and better detected subject motion than fit quality metrics. Regression analysis showed that T 2 is biased upward by 4.1 ms per 1 mm of mean motion score. During neonatal scans, mean motion scores of 0.6 to 2.0 mm were detected. Motion during TRUST causes an overestimate of T 2 , which suggests a cautious approach when comparing TRUST-based cerebral oxygenation measurements of noncompliant subjects. Magn Reson Med 78:2283-2289, 2017. © 2017 International Society for Magnetic Resonance in Medicine. © 2017 International Society for Magnetic Resonance in Medicine.
Securing the AliEn File Catalogue - Enforcing authorization with accountable file operations
NASA Astrophysics Data System (ADS)
Schreiner, Steffen; Bagnasco, Stefano; Sankar Banerjee, Subho; Betev, Latchezar; Carminati, Federico; Vladimirovna Datskova, Olga; Furano, Fabrizio; Grigoras, Alina; Grigoras, Costin; Mendez Lorenzo, Patricia; Peters, Andreas Joachim; Saiz, Pablo; Zhu, Jianlin
2011-12-01
The AliEn Grid Services, as operated by the ALICE Collaboration in its global physics analysis grid framework, is based on a central File Catalogue together with a distributed set of storage systems and the possibility to register links to external data resources. This paper describes several identified vulnerabilities in the AliEn File Catalogue access protocol regarding fraud and unauthorized file alteration and presents a more secure and revised design: a new mechanism, called LFN Booking Table, is introduced in order to keep track of access authorization in the transient state of files entering or leaving the File Catalogue. Due to a simplification of the original Access Envelope mechanism for xrootd-protocol-based storage systems, fundamental computational improvements of the mechanism were achieved as well as an up to 50% reduction of the credential's size. By extending the access protocol with signed status messages from the underlying storage system, the File Catalogue receives trusted information about a file's size and checksum and the protocol is no longer dependent on client trust. Altogether, the revised design complies with atomic and consistent transactions and allows for accountable, authentic, and traceable file operations. This paper describes these changes as part and beyond the development of AliEn version 2.19.
The relationship between organizational trust and nurse administrators’ productivity in hospitals
Bahrami, Susan; Hasanpour, Marzieh; Rajaeepour, Saeed; Aghahosseni, Taghi; Hodhodineghad, Nilofar
2012-01-01
Context: Management of health care organizations based on employee’s mutual trust will increase the improvement in functions and tasks. Aims: The present study was performed to investigate the relationship between organizational trust and the nurse administrators’ productivity in educational health centers of in Health-Education Centers of Isfahan University of Medical Sciences. Settings and Design: This research was a descriptive and correlational study. Materials and Methods: The population included all nurse administrators. In this research, 165 nurses were selected through random sampling method. Data collection instruments were organizational trust questionnaire based on Robbins’s model and productivity questionnaire based on Hersy and Blanchard’s model. Validity of these questionnaires was determined through content validity and their reliability was calculated through Cranach’s alpha. Statistical analysis was used: The data analysis was done using the SPSS (18) statistical software. Results: The indicators of organizational trust such as loyalty, competence, honesty, and stability were more than average level but explicitness indicator was at average level. The components of productivity such as ability, job knowledge, environmental compatibility, performance feedback, and validity were more than average level but motivation factor was at average level and organizational support was less than average level. There were a significant multiple correlations between organizational trust and productivity. Beta coefficients among organizational trust and productivity were significant and no autocorrelation existed and regression model was significant. Conclusions: Committed employees, timely performing the tasks and developing the sense of responsibility among employees can enhance production and productivity in the health care organizations. PMID:23922588
Integrated Social and QoS Trust-Based Routing in Mobile Ad Hoc Delay Tolerant Networks
2010-11-15
d-connectivity, honesty, or unselfishness) with: encounter*,. , A ^// m = / (3) {•p ounter,x r. , . .-, ( Ti x m (t), ifm =j ^indirect. X, T...take into account node »’ s belief in node m in the calculation ofT(jreet’ x(t + At). This models the decay of trust as trust is derived from a distant...directly based on node /’ s past experiences with node m up to time t + At, including the current encounter. Taking the fact that /? a + /?2 = 1, we obtain
Montague, Enid; Asan, Onur
2012-01-01
The present study investigated factors that explain patient trust in health technology and the relationship between patient trust in technology and trust in their care provider. Sociotechnical systems theory states that changes in one part of the system are likely related to other parts of the system. Therefore, attitudes about technologies, like trust, are likely related to other aspects of the system. Contributing to appropriate trust at the technological, interpersonal, and system levels can potentially lead to positive health outcomes. The study described in this manuscript used data collected from 101 patients with a Trust in Medical Technology instrument. The instrument measured patients' trust in (1) their providers, (2) the technology, and (3) how their providers used the technology. Measure 3 was positively associated with measures 1 and 2, while measures 1 and 2 were not positively or negatively associated with one another. These results may indicate that patient assessments of the trustworthiness of care providers and technologies are based on their observations of how providers use technologies. Though patients are not active users of technologies in health care, the results of this study show that their perceptions of how providers use technology are related to their trust in both technology and the care provider. Study findings have implications for how trust is conceptualised and measured in interpersonal relationships and in technologies.
Feng, Renjian; Xu, Xiaofeng; Zhou, Xiang; Wan, Jiangwen
2011-01-01
For wireless sensor networks (WSNs), many factors, such as mutual interference of wireless links, battlefield applications and nodes exposed to the environment without good physical protection, result in the sensor nodes being more vulnerable to be attacked and compromised. In order to address this network security problem, a novel trust evaluation algorithm defined as NBBTE (Node Behavioral Strategies Banding Belief Theory of the Trust Evaluation Algorithm) is proposed, which integrates the approach of nodes behavioral strategies and modified evidence theory. According to the behaviors of sensor nodes, a variety of trust factors and coefficients related to the network application are established to obtain direct and indirect trust values through calculating weighted average of trust factors. Meanwhile, the fuzzy set method is applied to form the basic input vector of evidence. On this basis, the evidence difference is calculated between the indirect and direct trust values, which link the revised D-S evidence combination rule to finally synthesize integrated trust value of nodes. The simulation results show that NBBTE can effectively identify malicious nodes and reflects the characteristic of trust value that 'hard to acquire and easy to lose'. Furthermore, it is obvious that the proposed scheme has an outstanding advantage in terms of illustrating the real contribution of different nodes to trust evaluation.
Miething, Alexander; Almquist, Ylva B; Edling, Christofer; Rydgren, Jens; Rostila, Mikael
2017-05-01
This study explored the sex-specific associations between friendship trust and the psychological well-being of young Swedes from late adolescence to early adulthood. A random sample of native Swedes born in 1990 was surveyed at age 19 years and again at age 23 years regarding their own well-being and their relationships with a maximum of five self-named peers. The response rate was 31.3%, resulting in 782 cases to be analysed. We used sex-stratified structural equation models to explore the associations between trust and well-being. Psychological well-being was constructed as the latent variable in the measurement part. The structural part accounted for the autocorrelation of trust with respect to well-being over time and incorporated the cross-lagged effects between late adolescence and early adulthood. It was found that trust increased while well-being decreased for young men and remained stable for young women from 19 to 23 years of age. The young women reported lower well-being at both time points, whereas no sex difference was found for trust. Based on model fit comparisons, a simple model without forward or reward causation was accepted for young men, whereas reversed causation from well-being to trust was suggested for young women. Subsequent analysis based on these assumptions confirmed the reversed effect for young women. The findings suggest that young people do not benefit from trustful social relations to the same extent as adult populations. Young women who express impaired well-being run a greater risk of being members of networks characterized by low friendship trust over time.
Finance salaries. Account the cost.
Robling, Andy
2003-02-06
Post-qualification salaries have increased by 4-7 per cent, a slowdown on last year's figures when increases were often more than 10 per cent. The highest increases this year tended to be in medium-sized trusts where newly qualified accountants' salaries rose 8.2 per cent. Directors of finance in large trusts earn about 20 per cent more than in medium trusts and about 40 per cent more than in small ones. Newly qualified accountants in large trusts earn 5 per cent more than in medium-sized trusts and 13 per cent more than in small ones. The survey is based on an analysis of salaries from Hays' jobs database, and salaries of registered candidates.
ERIC Educational Resources Information Center
Lamping, Sally; Blase, Dean Woodring
2012-01-01
This innovative guide shows teachers how to transform high-school English students into passionate readers with a trust-based approach that honors both student choice and teacher expertise. The authors begin with a series of reflective invitations to help teachers rediscover trust in themselves and in their students. The book offers methods for…
ReTrust: attack-resistant and lightweight trust management for medical sensor networks.
He, Daojing; Chen, Chun; Chan, Sammy; Bu, Jiajun; Vasilakos, Athanasios V
2012-07-01
Wireless medical sensor networks (MSNs) enable ubiquitous health monitoring of users during their everyday lives, at health sites, without restricting their freedom. Establishing trust among distributed network entities has been recognized as a powerful tool to improve the security and performance of distributed networks such as mobile ad hoc networks and sensor networks. However, most existing trust systems are not well suited for MSNs due to the unique operational and security requirements of MSNs. Moreover, similar to most security schemes, trust management methods themselves can be vulnerable to attacks. Unfortunately, this issue is often ignored in existing trust systems. In this paper, we identify the security and performance challenges facing a sensor network for wireless medical monitoring and suggest it should follow a two-tier architecture. Based on such an architecture, we develop an attack-resistant and lightweight trust management scheme named ReTrust. This paper also reports the experimental results of the Collection Tree Protocol using our proposed system in a network of TelosB motes, which show that ReTrust not only can efficiently detect malicious/faulty behaviors, but can also significantly improve the network performance in practice.
78 FR 45616 - Proposed Collection; Comment Request for Form 8960
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-29
... that allows certain individuals (via Form 1040), and estates and trusts (via Form 1041), to compute a 3.8% tax which will be reported on Form 1040 or Form 1041. Current Actions: Form 8960 is a new tax...
Innovations for Grid Security from Trusted Computing
NASA Astrophysics Data System (ADS)
Mao, Wenbo
Bruno Crispo: But why do you need to chain the certificates, I don’t understand. Usually I look for, for example, storage, and then I go find somewhere that can provide the storage I need, but why do I need a chain?
Trusted Computing Exemplar: Life Cycle Management Plan
2014-12-12
Provost The report ...OPNAV N2/N6. Further distribution of all or part of this report is authorized. This report was prepared by...THIS PAGE INTENTIONALLY LEFT BLANK 35 REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden
What Is Trust? Ethics and Risk Governance in Precision Medicine and Predictive Analytics
Adjekum, Afua; Ienca, Marcello
2017-01-01
Abstract Trust is a ubiquitous term used in emerging technology (e.g., Big Data, precision medicine), innovation policy, and governance literatures in particular. But what exactly is trust? Even though trust is considered a critical requirement for the successful deployment of precision medicine initiatives, nonetheless, there is a need for further conceptualization with regard to what qualifies as trust, and what factors might establish and sustain trust in precision medicine, predictive analytics, and large-scale biology. These new fields of 21st century medicine and health often deal with the “futures” and hence, trust gains a temporal and ever-present quality for both the present and the futures anticipated by new technologies and predictive analytics. We address these conceptual gaps that have important practical implications in the way we govern risk and unknowns associated with emerging technologies in biology, medicine, and health broadly. We provide an in-depth conceptual analysis and an operative definition of trust dynamics in precision medicine. In addition, we identify three main types of “trust facilitators”: (1) technical, (2) ethical, and (3) institutional. This three-dimensional framework on trust is necessary to building and maintaining trust in 21st century knowledge-based innovations that governments and publics invest for progressive societal change, development, and sustainable prosperity. Importantly, we analyze, identify, and deliberate on the dimensions of precision medicine and large-scale biology that have carved out trust as a pertinent tool to its success. Moving forward, we propose a “points to consider” on how best to enhance trust in precision medicine and predictive analytics. PMID:29257733
Joni, Saj-nicole A
2004-03-01
Leaders who rely forever on the same internal advisers, entrusting them with issues of ever greater sensitivity and consequence, run the risk of being sold short and possibly betrayed. Alternatively, lone-wolf leaders who trust no one may make enormous, yet preventable, mistakes when trying to sort through difficult decisions. A sophisticated understanding of trust can protect leaders from both fates. During the past decade, author and consultant Saj-nicole Joni studied leadership in more than 150 European and North American companies. Her research reveals three fundamental types of trustpersonal trust, expertise trust, and structural trust. Executives may persevere in relationships that are based on personal trust, no matter how exalted their leadership roles become. But such relationships are unlikely to remain static. They also probably won't provide the kinds of deep, often specialized knowledge leaders need. In circumstances where advisers' competence matters as much as their character, expertise trust--reliance on an adviser's ability in a specific subject--enters the picture. In organizations, leaders develop expertise trust by working closely with people who consistently demonstrate their mastery of particular subjects or processes. Structural trust refers to how roles and ambitions influence advisers' perspectives and candor. It shifts constantly as people rise through organizations. High-level structural trust can provide leaders with pure insight and information--but advisers in positions of the highest structural trust generally reside outside organizations. These advisers provide leaders with insights that their organizations cannot. High-performing leaders' most enduring--and most valuable--relationships are characterized by enormous levels of all three kinds of trust.
What Is Trust? Ethics and Risk Governance in Precision Medicine and Predictive Analytics.
Adjekum, Afua; Ienca, Marcello; Vayena, Effy
2017-12-01
Trust is a ubiquitous term used in emerging technology (e.g., Big Data, precision medicine), innovation policy, and governance literatures in particular. But what exactly is trust? Even though trust is considered a critical requirement for the successful deployment of precision medicine initiatives, nonetheless, there is a need for further conceptualization with regard to what qualifies as trust, and what factors might establish and sustain trust in precision medicine, predictive analytics, and large-scale biology. These new fields of 21st century medicine and health often deal with the "futures" and hence, trust gains a temporal and ever-present quality for both the present and the futures anticipated by new technologies and predictive analytics. We address these conceptual gaps that have important practical implications in the way we govern risk and unknowns associated with emerging technologies in biology, medicine, and health broadly. We provide an in-depth conceptual analysis and an operative definition of trust dynamics in precision medicine. In addition, we identify three main types of "trust facilitators": (1) technical, (2) ethical, and (3) institutional. This three-dimensional framework on trust is necessary to building and maintaining trust in 21st century knowledge-based innovations that governments and publics invest for progressive societal change, development, and sustainable prosperity. Importantly, we analyze, identify, and deliberate on the dimensions of precision medicine and large-scale biology that have carved out trust as a pertinent tool to its success. Moving forward, we propose a "points to consider" on how best to enhance trust in precision medicine and predictive analytics.
ERIC Educational Resources Information Center
Bente, Gary; Ruggenberg, Sabine; Kramer, Nicole C.; Eschenburg, Felix
2008-01-01
This study analyzes the influence of avatars on social presence, interpersonal trust, perceived communication quality, nonverbal behavior, and visual attention in Net-based collaborations using a comparative approach. A real-time communication window including a special avatar interface was integrated into a shared collaborative workspace.…
A Multidisciplinary Osteoporosis Service-Based Action Research Study
ERIC Educational Resources Information Center
Whitehead, Dean; Keast, John; Montgomery, Val; Hayman, Sue
2004-01-01
Objective: To investigate an existing Trust-based osteoporosis service's preventative activity, determine any issues and problems and use this data to reorganise the service, as part of a National Health Service Executive/Regional Office-commissioned and funded study. Setting: A UK Hospital Trust's Osteoporosis Service. Design & Method: A…
Soldiers Have to Eat Soup Together for a Long Time
2007-03-10
negatively impacted unit cohesion. The definition of cohesion used for this project is that of “ social cohesion ” or trust based on shared successes...fight.” 9 Napoleon was referring to social cohesion or trust based on shared successes during training and operations. The DoD’s mobilization
Trust and risk: a model for medical education.
Damodaran, Arvin; Shulruf, Boaz; Jones, Philip
2017-09-01
Health care delivery, and therefore medical education, is an inherently risky business. Although control mechanisms, such as external audit and accreditation, are designed to manage risk in clinical settings, another approach is 'trust'. The use of entrustable professional activities (EPAs) represents a deliberate way in which this is operationalised as a workplace-based assessment. Once engaged with the concept, clinical teachers and medical educators may have further questions about trust. This narrative overview of the trust literature explores how risk, trust and control intersect with current thinking in medical education, and makes suggestions for potential directions of enquiry. Beyond EPAs, the importance of trust in health care and medical education is reviewed, followed by a brief history of trust research in the wider literature. Interpersonal and organisational levels of trust and a model of trust from the management literature are used to provide the framework with which to decipher trust decisions in health care and medical education, in which risk and vulnerability are inherent. In workplace learning and assessment, the language of 'trust' may offer a more authentic and practical vocabulary than that of 'competency' because clinical and professional risks are explicitly considered. There are many other trust relationships in health care and medical education. At the most basic level, it is helpful to clearly delineate who is the trustor, the trustee, and for what task. Each relationship has interpersonal and organisational elements. Understanding and considered utilisation of trust and control mechanisms in health care and medical education may lead to systems that maturely manage risk while actively encouraging trust and empowerment. © 2017 John Wiley & Sons Ltd and The Association for the Study of Medical Education.
Wu, Chien-Te; Fan, Yang-Teng; Du, Ye-Rong; Yang, Tien-Tun; Liu, Ho-Ling; Yen, Nai-Shing; Chen, Shu-Heng; Hsung, Ray-May
2018-01-01
Trust is essential for mutually beneficial human interactions in economic exchange and politics and people's social identities notably have dramatic effects on trust behaviors toward others. Previous literature concerning social identities generally suggests that people tend to show in-group favoritism toward members who share the same identity. However, how our brains process signals of identity while facing uncertain situations in interpersonal interactions remains largely unclear. To address this issue, we performed an fMRI experiment with 54 healthy adults who belonged to two identity groups of opposing political orientations. The identity information of participants was extracted from a large-scale social survey on the 2012 Taiwan presidential election. Accordingly, participants were categorized as either the Kuomintang (KMT) or the Democratic Progressive Party (DPP) supporters. During the experiment, participants played trust games with computer agents with labels of the same or the opposing political identity. Interestingly, our results suggest that the behaviors of the two groups cannot be equally attributed to in-group favoritism. Behaviorally, only the DPP supporter group showed a significant trust preference toward in-group members, which did not hold for the KMT supporter group. Consistently, neurophysiological findings further revealed that only the DPP supporter group showed neuronal responses to both unexpected negative feedback from in-group members in anterior insula, temporoparietal junction, and dorsal lateral prefrontal cortex, as well as to unexpected rewards from out-group members in caudate. These findings therefore suggest that acquired identities play a more complex role in modulating people's social expectation in interpersonal trust behaviors under identity-relevant contexts.
Software Certification for Temporal Properties With Affordable Tool Qualification
NASA Technical Reports Server (NTRS)
Xia, Songtao; DiVito, Benedetto L.
2005-01-01
It has been recognized that a framework based on proof-carrying code (also called semantic-based software certification in its community) could be used as a candidate software certification process for the avionics industry. To meet this goal, tools in the "trust base" of a proof-carrying code system must be qualified by regulatory authorities. A family of semantic-based software certification approaches is described, each different in expressive power, level of automation and trust base. Of particular interest is the so-called abstraction-carrying code, which can certify temporal properties. When a pure abstraction-carrying code method is used in the context of industrial software certification, the fact that the trust base includes a model checker would incur a high qualification cost. This position paper proposes a hybrid of abstraction-based and proof-based certification methods so that the model checker used by a client can be significantly simplified, thereby leading to lower cost in tool qualification.
Kao, Danny Tengti
2009-04-01
Mobile commerce (M-commerce) has been acknowledged as one of the most representative transaction types driving e-commerce worldwide; however, the potential security threats that keep consumers from M-commerce still confound the M-commerce industry. This research attempts to explore two questions: What are the dimensions of transaction trust that may significantly affect consumers' intentions to adopt M-commerce, and what are the cultural dimensions that may significantly moderate the impact of transaction trust on consumers' intentions to adopt M-commerce? A research framework based on the BATE model and Hofstede's cultural dimensions was established to identify how transaction trust and cultural value affect consumers' intentions to adopt M-commerce. Results revealed that transaction trust significantly affects consumers' intentions to adopt M-commerce. However, while uncertainty avoidance moderates the impacts of business trust and security on consumers' intentions of M-commerce adoption, both individualism/collectivism and long-term/short-term orientation moderate the relationship between security trust and consumers' intentions of M-commerce adoption.
Chen, Hong; Li, Xu; Li, Bingbing; Huang, Ailong
2017-10-01
Female sex workers are at high risk for depression in China but they are understudied and underserved. Based on cognitive models of depression, dysfunctional beliefs about oneself and others may act as vulnerability factors for depression. However, the association between negative trust and depression is still under debate. The present study aimed to test the hypothesis that negative trust positively relates to depression through thwarted belongingness among female sex workers. Four hundred and fifty-seven participants completed measures of negative trust, thwarted belongingness, and depression. Stepwise multiple linear regression analyses showed that both negative trust and thwarted belongingness significantly positively predicted depression, and thwarted belongingness was positively predicted by negative trust. The results from the mediation analysis suggest that thwarted belongingness might be an underlying mechanism linking negative trust and depression. Psychological interventions could focus on helping female sex workers form and strengthen meaningful social connectedness (the behavioral/observable indicators of the constructs of thwarted belongingness). Copyright © 2017. Published by Elsevier B.V.
Exploring the Genetic Etiology of Trust in Adolescents: Combined Twin and DNA Analyses.
Wootton, Robyn E; Davis, Oliver S P; Mottershaw, Abigail L; Wang, R Adele H; Haworth, Claire M A
2016-12-01
Behavioral traits generally show moderate to strong genetic influence, with heritability estimates of around 50%. Some recent research has suggested that trust may be an exception because it is more strongly influenced by social interactions. In a sample of over 7,000 adolescent twins from the United Kingdom's Twins Early Development Study, we found broad sense heritability estimates of 57% for generalized trust and 51% for trust in friends. Genomic-relatedness-matrix restricted maximum likelihood (GREML) estimates in the same sample indicate that 21% of the narrow sense genetic variance can be explained by common single nucleotide polymorphisms for generalized trust and 43% for trust in friends. As expected, this implies a large amount of unexplained heritability, although power is low for estimating DNA-based heritability. The missing heritability may be accounted for by interactions between DNA and the social environment during development or via gene-environment correlations with rare variants. How these genes and environments correlate seem especially important for the development of trust.
Exploring the Genetic Etiology of Trust in Adolescents: Combined Twin and DNA Analyses
Wootton, Robyn E.; Davis, Oliver S. P.; Mottershaw, Abigail L.; Wang, R. Adele H.; Haworth, Claire M. A.
2017-01-01
Behavioral traits generally show moderate to strong genetic influence, with heritability estimates of around 50%. Some recent research has suggested that trust may be an exception because it is more strongly influenced by social interactions. In a sample of over 7,000 adolescent twins from the United Kingdom’s Twins Early Development Study, we found broad sense heritability estimates of 57% for generalized trust and 51% for trust in friends. Genomic-relatedness-matrix restricted maximum likelihood (GREML) estimates in the same sample indicate that 21% of the narrow sense genetic variance can be explained by common single nucleotide polymorphisms for generalized trust and 43% for trust in friends. As expected, this implies a large amount of unexplained heritability, although power is low for estimating DNA-based heritability. The missing heritability may be accounted for by interactions between DNA and the social environment during development or via gene–environment correlations with rare variants. How these genes and environments correlate seem especially important for the development of trust. PMID:27852354
Neural signatures of trust in reciprocity: a coordinate-based meta-analysis
Bellucci, Gabriele; Chernyak, Sergey V.; Goodyear, Kimberly; Eickhoff, Simon B.; Krueger, Frank
2017-01-01
Trust in reciprocity (TR) is defined as the risky decision to invest valued resources in another party with the hope of mutual benefit. Several fMRI studies have investigated the neural correlates of TR in one-shot and multi-round versions of the investment game (IG). However, an overall characterization of the underlying neural networks remains elusive. Here, we employed a coordinate-based meta-analysis (activation likelihood estimation method, 30 papers) to investigate consistent brain activations in each of the IG stages (i.e., the trust, reciprocity and feedback stage). Our results showed consistent activations in the anterior insula (AI) during trust decisions in the one-shot IG and decisions to reciprocate in the multi-round IG, likely related to representations of aversive feelings. Moreover, decisions to reciprocate also consistently engaged the intraparietal sulcus, probably involved in evaluations of the reciprocity options. On the contrary, trust decisions in the multi-round IG consistently activated the ventral striatum, likely associated with reward prediction error signals. Finally, the dorsal striatum was found consistently recruited during the feedback stage of the multi-round IG, likely related to reinforcement learning. In conclusion, our results indicate different neural networks underlying trust, reciprocity and feedback learning. These findings suggest that although decisions to trust and reciprocate may elicit aversive feelings likely evoked by the uncertainty about the decision outcomes and the pressing requirements of social standards, multiple interactions allow people to build interpersonal trust for cooperation via a learning mechanism by which they arguably learn to distinguish trustworthy from untrustworthy partners. PMID:27859899
Neural signatures of trust in reciprocity: A coordinate-based meta-analysis.
Bellucci, Gabriele; Chernyak, Sergey V; Goodyear, Kimberly; Eickhoff, Simon B; Krueger, Frank
2017-03-01
Trust in reciprocity (TR) is defined as the risky decision to invest valued resources in another party with the hope of mutual benefit. Several fMRI studies have investigated the neural correlates of TR in one-shot and multiround versions of the investment game (IG). However, an overall characterization of the underlying neural networks remains elusive. Here, a coordinate-based meta-analysis was employed (activation likelihood estimation method, 30 articles) to investigate consistent brain activations in each of the IG stages (i.e., the trust, reciprocity and feedback stage). Results showed consistent activations in the anterior insula (AI) during trust decisions in the one-shot IG and decisions to reciprocate in the multiround IG, likely related to representations of aversive feelings. Moreover, decisions to reciprocate also consistently engaged the intraparietal sulcus, probably involved in evaluations of the reciprocity options. On the contrary, trust decisions in the multiround IG consistently activated the ventral striatum, likely associated with reward prediction error signals. Finally, the dorsal striatum was found consistently recruited during the feedback stage of the multiround IG, likely related to reinforcement learning. In conclusion, our results indicate different neural networks underlying trust, reciprocity, and feedback learning. These findings suggest that although decisions to trust and reciprocate may elicit aversive feelings likely evoked by the uncertainty about the decision outcomes and the pressing requirements of social standards, multiple interactions allow people to build interpersonal trust for cooperation via a learning mechanism by which they arguably learn to distinguish trustworthy from untrustworthy partners. Hum Brain Mapp 38:1233-1248, 2017. © 2016 Wiley Periodicals, Inc. © 2016 Wiley Periodicals, Inc.
Pössel, Patrick; Winkeljohn Black, Stephanie; Bjerg, Annie C; Jeppsen, Benjamin D; Wooldridge, Don T
2014-06-01
Significant associations of private prayer with mental health have been found, while mechanisms underlying these associations are largely unknown. This cross-sectional online study (N = 325, age 35.74, SD 18.50, 77.5 % females) used path modeling to test if trust-based beliefs (whether, when, and how prayers are answered) mediated the associations of prayer frequency with the Anxiety, Confusion, and Depression Profile of Mood States-Short Form scales. The association of prayer and depression was fully mediated by trust-based beliefs; associations with anxiety and confusion were partially mediated. Further, the interaction of prayer frequency by stress was associated with anxiety.
Iterative procedures for space shuttle main engine performance models
NASA Technical Reports Server (NTRS)
Santi, L. Michael
1989-01-01
Performance models of the Space Shuttle Main Engine (SSME) contain iterative strategies for determining approximate solutions to nonlinear equations reflecting fundamental mass, energy, and pressure balances within engine flow systems. Both univariate and multivariate Newton-Raphson algorithms are employed in the current version of the engine Test Information Program (TIP). Computational efficiency and reliability of these procedures is examined. A modified trust region form of the multivariate Newton-Raphson method is implemented and shown to be superior for off nominal engine performance predictions. A heuristic form of Broyden's Rank One method is also tested and favorable results based on this algorithm are presented.
Monitoring Springs in the Mojave Desert Using Landsat Time Series Analysis
NASA Technical Reports Server (NTRS)
Potter, Christopher S.
2018-01-01
The purpose of this study, based on Landsat satellite data was to characterize variations and trends over 30 consecutive years (1985-2016) in perennial vegetation green cover at over 400 confirmed Mojave Desert spring locations. These springs were surveyed between in 2015 and 2016 on lands managed in California by the U.S. Bureau of Land Management (BLM) and on several land trusts within the Barstow, Needles, and Ridgecrest BLM Field Offices. The normalized difference vegetation index (NDVI) from July Landsat images was computed at each spring location and a trend model was first fit to the multi-year NDVI time series using least squares linear regression.Â
David Deardorff; Kathryn Wadsworth
1996-01-01
The New Mexico State Land Office has initiated a rare plant survey of state trust land, an inventory and assessment of riparian areas on the trust land, and the development of a biological resources data base and information management system. Some riparian sites that still belong to the trust have been negatively impacted by livestock such that biological quality and...
78 FR 72451 - Net Investment Income Tax
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-02
... Net Investment Income Tax AGENCY: Internal Revenue Service (IRS), Treasury. ACTION: Withdrawal of... computation of net investment income. The regulations affect individuals, estates, and trusts whose incomes... investment income for such taxable year, or (B) the excess (if any) of: (i) The individual's modified...
Exploratory study of the impacts of Mutual Health Organizations on social dynamics in Benin.
Ridde, Valery; Haddad, Slim; Yacoubou, Moussa; Yacoubou, Ismaelou
2010-08-01
The primary aim of Mutual Health Organizations (MHOs) is the financial protection of their members. However, given their community-based, participative and voluntary nature, it is conceivable that MHOs, as social organizations, would affect social dynamics. In an exploratory study in Benin, we studied social dynamics related to mutual aid, relationships of trust, and empowerment. Four MHOs, as contrasted cases, were selected from among the 11 in the region. Focus groups (n = 20) and individual interviews (n = 29) were conducted with members, non-members, and elected leaders of the four MHOs, and with professionals from the health facilities concerned. We carried out a qualitative thematic analysis of the content. Mutual aid practices, which pre-date MHOs, can be mobilized to promote MHO membership. Mutual aid practices are based on relationships of trust. The primary reason for joining an MHO is to improve financial accessibility to health services. Non-members see that members have a strong sense of empowerment in this regard, based on a high level of trust in MHOs and their elected leaders, even if their trust in health professionals is not as strong. Non-members share these feelings of confidence in MHOs and their leadership, although they trust health professionals somewhat less than do the members. The MHOs' low penetration rate therefore cannot be explained by lack of trust, as this study shows that, even with some distrust of the professionals, the overall level of trust in MHOs is high and MHOs and their leaders function as intermediaries with health professionals. Other explanatory factors are the lack of information available to villagers and, most especially, the problems they face in being able to pay the MHO premiums. Copyright 2010 Elsevier Ltd. All rights reserved.
Actuarial status of the old-age and survivors insurance and disability insurance trust funds.
Ballantyne, H C
1982-06-01
The 1982 Annual Report of the Board of Trustees of the Old-Age and Survivors Insurance (OASI) and Disability Insurance (DI) Trust Funds indicates sever financial problems in both the short and the long range. The short-range financial status is significantly worse than was estimated last year, after enactment of the 1981 legislation, because of continuing unfavorable economic conditions. The estimated long-range deficit is the same as the deficit that was estimated last year before the 1981 legislation and is therefore somewhat worse than was estimated immediately after enactment of the legislation. Under present law, which authorizes temporary interfund borrowing amount the OASI, DI, and Hospital Insurance (HI) Trust Funds, the OASI Trust Fund would become unable to pay benefits on time by July 1983. The assets of the DI Trust Fund, on the other hand, are expected to grow rapidly in both the short and long range. If the assets of both the OASI and DI Trust Funds were combined, however, the two funds would still become unable to pay benefits on time by the latter half of 1983, based on all four sets of economic and demographic assumptions in the 1982 report. Even if the temporary interfund borrowing authority in present law were extended, the combined assets of the OASI, DI, and HI Trust Funds would become insufficient to pay benefits on time by 1984, based on the two less favorable sets of assumptions in the 1982 report. Based on the other two, more favorable, sets of assumptions, the three combined funds could pay benefits on time through the 1980's but there would be little or no margin of safety to permit timely payment of benefits if economic conditions are even slightly less favorable.
HealthTrust: A Social Network Approach for Retrieving Online Health Videos
Karlsen, Randi; Melton, Genevieve B
2012-01-01
Background Social media are becoming mainstream in the health domain. Despite the large volume of accurate and trustworthy health information available on social media platforms, finding good-quality health information can be difficult. Misleading health information can often be popular (eg, antivaccination videos) and therefore highly rated by general search engines. We believe that community wisdom about the quality of health information can be harnessed to help create tools for retrieving good-quality social media content. Objectives To explore approaches for extracting metrics about authoritativeness in online health communities and how these metrics positively correlate with the quality of the content. Methods We designed a metric, called HealthTrust, that estimates the trustworthiness of social media content (eg, blog posts or videos) in a health community. The HealthTrust metric calculates reputation in an online health community based on link analysis. We used the metric to retrieve YouTube videos and channels about diabetes. In two different experiments, health consumers provided 427 ratings of 17 videos and professionals gave 162 ratings of 23 videos. In addition, two professionals reviewed 30 diabetes channels. Results HealthTrust may be used for retrieving online videos on diabetes, since it performed better than YouTube Search in most cases. Overall, of 20 potential channels, HealthTrust’s filtering allowed only 3 bad channels (15%) versus 8 (40%) on the YouTube list. Misleading and graphic videos (eg, featuring amputations) were more commonly found by YouTube Search than by searches based on HealthTrust. However, some videos from trusted sources had low HealthTrust scores, mostly from general health content providers, and therefore not highly connected in the diabetes community. When comparing video ratings from our reviewers, we found that HealthTrust achieved a positive and statistically significant correlation with professionals (Pearson r 10 = .65, P = .02) and a trend toward significance with health consumers (r 7 = .65, P = .06) with videos on hemoglobinA1 c, but it did not perform as well with diabetic foot videos. Conclusions The trust-based metric HealthTrust showed promising results when used to retrieve diabetes content from YouTube. Our research indicates that social network analysis may be used to identify trustworthy social media in health communities. PMID:22356723
Cross-Cultural Trust Networks and Advancing Education Equity in Place-Based Partnerships
ERIC Educational Resources Information Center
Banks, Amber Joy
2017-01-01
Research suggests that trust can be a foundational element for the success and sustainability of multi-organizational partnerships focused on advancing education equity in a particular neighborhood or region. As these place-based strategies gain popularity in the U.S., collaborators are increasingly required to navigate relationships where racial…
Lindström, Martin
2008-05-01
To investigate the association between political trust in the Riksdag (the national parliament in Sweden) and having purchased illegal liquor during the past 12 months. The 2004 public health survey in Skåne is a cross-sectional postal questionnaire study answered by 27,757 respondents aged 18-80 with a 59% response rate. A logistic regression model was used to investigate the associations between political trust and having purchased illegal liquor during the past 12 months. Multivariate analyses of political trust and having purchased illegal liquor were performed in order to investigate the importance of possible confounders (including generalized/horizontal trust in other people). A 21.2% fraction of the men and 9.6% of the women had purchased illegal alcohol during the past 12 months. A total of 17.3% and 11.6% of the male and female respondents, respectively, reported that they had no trust at all in the national parliament, and another 38.2% and 36.2%, respectively, reported that their political trust was not particularly high. Respondents in younger age groups, with medium/low education, economic stress, low horizontal trust and not particularly high and no political trust at all and no opinion had significantly higher levels of having purchased illegal liquor. The significant odds ratios of having purchased illegal liquor in the not particularly high political trust and no political trust at all categories were somewhat reduced although still significant after multiple adjustments. The results suggest that political trust may have an independent effect on the propensity to purchase illegal liquor in Sweden.
How Residents Develop Trust in Interns: A Multi-Institutional Mixed-Methods Study.
Sheu, Leslie; O'Sullivan, Patricia S; Aagaard, Eva M; Tad-Y, Darlene; Harrell, Heather E; Kogan, Jennifer R; Nixon, James; Hollander, Harry; Hauer, Karen E
2016-10-01
Although residents trust interns to provide patient care, little is known about how trust forms. Using a multi-institutional mixed-methods study design, the authors interviewed (March-September 2014) internal medicine (IM) residents in their second or third postgraduate year at a single institution to address how they develop trust in interns. Transcript analysis using grounded theory yielded a model for resident trust. Authors tested (January-March 2015) the model with residents from five IM programs using a two-section quantitative survey (38 items; 31 rated 0 = not at all to 100 = very much; 7 rated 0 = strongly disagree to 100 = strongly agree) to identify influences on how residents form trust. Qualitative analysis of 29 interviews yielded 14 themes within five previously identified factors of trust (resident, intern, relationship, task, and context). Of 478 residents, 376 (78.7%) completed the survey. Factor analysis yielded 11 factors that influence trust. Respondents rated interns' characteristics (reliability, competence, and propensity to make errors) highest when indicating importance to trust (respective means 86.3 [standard deviation = 9.7], 76.4 [12.9], and 75.8 [20.0]). They also rated contextual factors highly as influencing trust (access to an electronic medical record, duty hours, and patient characteristics; respective means 79.8 [15.3], 73.1 [14.4], and 71.9 [20.0]). Residents form trust based on primarily intern- and context-specific factors. Residents appear to consider trust in a way that prioritizes interns' execution of essential patient care tasks safely within the complexities and constraints of the hospital environment.
Patient-physician trust among adults of rural Tamil Nadu: a community-based survey.
Baidya, M; Gopichandran, V; Kosalram, K
2014-01-01
Trust is the acceptance of a vulnerable situation in which the truster believes that the trustee will act in the truster's best interests. The cornerstone of the patient-physician relationship is "trust". Despite the intensity and importance of trust relationship of patients toward their physician, the phenomenon is rarely studied in developing countries. Our study aimed to explore the concept of patient-physician trust among adults of rural Tamil Nadu to assess the factors affecting patient-physician trust relationship and patient satisfaction. A cross-sectional descriptive household survey was carried out on 112 individuals selected by a multistage random sampling method. Men and women aged above 40 years who have visited a health care service at least once during the last 5 years were included in the study. Thom et al's modification of the Anderson and Dedrick Physician Trust scale was used to measure patient trust in physician. Trust is a one-dimensional construct in the surveyed population as revealed by an exploratory factor analysis which extracted one component explaining 50% of the overall variance. Trust influences patient's self-reported satisfaction (β coefficient of 0.048; P < 0.001) and remains independent of all the other factors assessed in the study such as, age, gender, education, self-reported health status, time spent with the physician, physician's gender, physician's age, and medical specialty that the physician belongs to. Physician's gender, physician's age, self-reported health status, and time spent with the physician were significantly associated with satisfaction with the physician. Trust in physicians seems to not depend on any of the assessed factors and largely seems to be implicit in the physician-patient relationship. Trust in physician is associated with patient satisfaction. Further studies are needed to assess trust in physicians in developing country settings.
The Effect of Hospital Service Quality on Patient's Trust.
Zarei, Ehsan; Daneshkohan, Abbas; Khabiri, Roghayeh; Arab, Mohammad
2015-01-01
The trust is meant the belief of the patient to the practitioner or the hospital based on the concept that the care provider seeks the best for the patient and will provide the suitable care and treatment for him/her. One of the main determinants of patient's trust is the service quality. This study aimed to examine the effect of quality of services provided in private hospitals on the patient's trust. In this descriptive cross-sectional study, 969 patients were selected using the consecutive method from eight private general hospitals of Tehran, Iran, in 2010. Data were collected through a questionnaire containing 20 items (14 items for quality, 6 items for trust) and its validity and reliability were confirmed. Data were analyzed using descriptive statistics and multivariate regression. The mean score of patients' perception of trust was 3.80 and 4.01 for service quality. Approximately 38% of the variance in patient trust was explained by service quality dimensions. Quality of interaction and process (P < 0.001) were the strongest factors in predicting patient's trust, but the quality of the environment had no significant effect on the patients' degree of trust. The interaction quality and process quality were the key determinants of patient's trust in the private hospitals of Tehran. To enhance the patients' trust, quality improvement efforts should focus on service delivery aspects such as scheduling, timely and accurate doing of the service, and strengthening the interpersonal aspects of care and communication skills of doctors, nurses and staff.
Effects of adaptive degrees of trust on coevolution of quantum strategies on scale-free networks.
Li, Qiang; Chen, Minyou; Perc, Matjaž; Iqbal, Azhar; Abbott, Derek
2013-10-15
We study the impact of adaptive degrees of trust on the evolution of cooperation in the quantum prisoner's dilemma game. In addition to the strategies, links between players are also subject to evolution. Starting with a scale-free interaction network, players adjust trust towards their neighbors based on received payoffs. The latter governs the strategy adoption process, while trust governs the rewiring of links. As soon as the degree of trust towards a neighbor drops to zero, the link is rewired to another randomly chosen player within the network. We find that for small temptations to defect cooperators always dominate, while for intermediate and strong temptations a single quantum strategy is able to outperform all other strategies. In general, reciprocal trust remains within close relationships and favors the dominance of a single strategy. Due to coevolution, the power-law degree distributions transform to Poisson distributions.
Effects of adaptive degrees of trust on coevolution of quantum strategies on scale-free networks
NASA Astrophysics Data System (ADS)
Li, Qiang; Chen, Minyou; Perc, Matjaž; Iqbal, Azhar; Abbott, Derek
2013-10-01
We study the impact of adaptive degrees of trust on the evolution of cooperation in the quantum prisoner's dilemma game. In addition to the strategies, links between players are also subject to evolution. Starting with a scale-free interaction network, players adjust trust towards their neighbors based on received payoffs. The latter governs the strategy adoption process, while trust governs the rewiring of links. As soon as the degree of trust towards a neighbor drops to zero, the link is rewired to another randomly chosen player within the network. We find that for small temptations to defect cooperators always dominate, while for intermediate and strong temptations a single quantum strategy is able to outperform all other strategies. In general, reciprocal trust remains within close relationships and favors the dominance of a single strategy. Due to coevolution, the power-law degree distributions transform to Poisson distributions.
The Condition for Generous Trust
Shinya, Obayashi; Yusuke, Inagaki; Hiroki, Takikawa
2016-01-01
Trust has been considered the “cement” of a society and is much studied in sociology and other social sciences. Most studies, however, have neglected one important aspect of trust: it involves an act of forgiving and showing tolerance toward another’s failure. In this study, we refer to this concept as “generous trust” and examine the conditions under which generous trust becomes a more viable option when compared to other types of trust. We investigate two settings. First, we introduce two types of uncertainties: uncertainty as to whether trustees have the intention to cooperate, and uncertainty as to whether trustees have enough competence to accomplish the entrusted tasks. Second, we examine the manner in which trust functions in a broader social context, one that involves matching and commitment processes. Since we expect generosity or forgiveness to work differently in the matching and commitment processes, we must differentiate trust strategies into generous trust in the matching process and that in the commitment process. Our analytical strategy is two-fold. First, we analyze the “modified” trust game that incorporates the two types of uncertainties without the matching process. This simplified setting enables us to derive mathematical results using game theory, thereby giving basic insight into the trust mechanism. Second, we investigate socially embedded trust relationships in contexts involving the matching and commitment processes, using agent-based simulation. Results show that uncertainty about partner’s intention and competence makes generous trust a viable option. In contrast, too much uncertainty undermines the possibility of generous trust. Furthermore, a strategy that is too generous cannot stand alone. Generosity should be accompanied with moderate punishment. As for socially embedded trust relationships, generosity functions differently in the matching process versus the commitment process. Indeed, these two types of generous trust coexist, and their coexistence enables a society to function well. PMID:27893759
Breuer, Christina; Hüffmeier, Joachim; Hertel, Guido
2016-08-01
Team trust has often been discussed both as requirement and as challenge for team effectiveness, particularly in virtual teams. However, primary studies on the relationship between trust and team effectiveness have provided mixed findings. The current review summarizes existing studies on team trust and team effectiveness based on meta-analytic methodology. In general, we assumed team trust to facilitate coordination and cooperation in teams, and therefore to be positively related with team effectiveness. Moreover, team virtuality and documentation of interactions were considered as moderators of this relationship because they should affect perceived risks during teamwork. While team virtuality should increase, documentation of interaction should decrease the relationship between team trust and team effectiveness. Findings from 52 studies with 54 independent samples (representing 12,615 individuals in 1,850 teams) confirmed our assumptions. In addition to the positive overall relationship between team trust and team effectiveness criteria (ρ = .33), the relationship between team trust and team performance was stronger in virtual teams (ρ = .33) as compared to face-to-face teams (ρ = .22), and weaker when team interactions were documented (ρ = .20) as compared to no such documentation (ρ = .29). Thus, documenting team interactions seems to be a viable complement to trust-building activities, particularly in virtual teams. (PsycINFO Database Record (c) 2016 APA, all rights reserved).
Nitzlnader, Michael; Schreier, Günter
2014-01-01
Dealing with data from different source domains is of increasing importance in today's large scale biomedical research endeavours. Within the European Network for Cancer research in Children and Adolescents (ENCCA) a solution to share such data for secondary use will be established. In this paper the solution arising from the aims of the ENCCA project and regulatory requirements concerning data protection and privacy is presented. Since the details of secondary biomedical dataset utilisation are often not known in advance, data protection regulations are met with an identity management concept that facilitates context-specific pseudonymisation and a way of data aggregation using a hidden reference table later on. Phonetic hashing is proposed to prevent duplicated patient registration and re-identification of patients is possible via a trusted third party only. Finally, the solution architecture allows for implementation in a distributed computing environment, including cloud-based elements.
NASA Technical Reports Server (NTRS)
1985-01-01
The primary purpose of the Aerospace Computer Security Conference was to bring together people and organizations which have a common interest in protecting intellectual property generated in space. Operational concerns are discussed, taking into account security implications of the space station information system, Space Shuttle security policies and programs, potential uses of probabilistic risk assessment techniques for space station development, key considerations in contingency planning for secure space flight ground control centers, a systematic method for evaluating security requirements compliance, and security engineering of secure ground stations. Subjects related to security technologies are also explored, giving attention to processing requirements of secure C3/I and battle management systems and the development of the Gemini trusted multiple microcomputer base, the Restricted Access Processor system as a security guard designed to protect classified information, and observations on local area network security.
NASA Astrophysics Data System (ADS)
Setiyoko, A.; Dharma, I. G. W. S.; Haryanto, T.
2017-01-01
Multispectral data and hyperspectral data acquired from satellite sensor have the ability in detecting various objects on the earth ranging from low scale to high scale modeling. These data are increasingly being used to produce geospatial information for rapid analysis by running feature extraction or classification process. Applying the most suited model for this data mining is still challenging because there are issues regarding accuracy and computational cost. This research aim is to develop a better understanding regarding object feature extraction and classification applied for satellite image by systematically reviewing related recent research projects. A method used in this research is based on PRISMA statement. After deriving important points from trusted sources, pixel based and texture-based feature extraction techniques are promising technique to be analyzed more in recent development of feature extraction and classification.
Improving the trust in results of numerical simulations and scientific data analytics
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cappello, Franck; Constantinescu, Emil; Hovland, Paul
This white paper investigates several key aspects of the trust that a user can give to the results of numerical simulations and scientific data analytics. In this document, the notion of trust is related to the integrity of numerical simulations and data analytics applications. This white paper complements the DOE ASCR report on Cybersecurity for Scientific Computing Integrity by (1) exploring the sources of trust loss; (2) reviewing the definitions of trust in several areas; (3) providing numerous cases of result alteration, some of them leading to catastrophic failures; (4) examining the current notion of trust in numerical simulation andmore » scientific data analytics; (5) providing a gap analysis; and (6) suggesting two important research directions and their respective research topics. To simplify the presentation without loss of generality, we consider that trust in results can be lost (or the results’ integrity impaired) because of any form of corruption happening during the execution of the numerical simulation or the data analytics application. In general, the sources of such corruption are threefold: errors, bugs, and attacks. Current applications are already using techniques to deal with different types of corruption. However, not all potential corruptions are covered by these techniques. We firmly believe that the current level of trust that a user has in the results is at least partially founded on ignorance of this issue or the hope that no undetected corruptions will occur during the execution. This white paper explores the notion of trust and suggests recommendations for developing a more scientifically grounded notion of trust in numerical simulation and scientific data analytics. We first formulate the problem and show that it goes beyond previous questions regarding the quality of results such as V&V, uncertainly quantification, and data assimilation. We then explore the complexity of this difficult problem, and we sketch complementary general approaches to address it. This paper does not focus on the trust that the execution will actually complete. The product of simulation or of data analytic executions is the final element of a potentially long chain of transformations, where each stage has the potential to introduce harmful corruptions. These corruptions may produce results that deviate from the user-expected accuracy without notifying the user of this deviation. There are many potential sources of corruption before and during the execution; consequently, in this white paper we do not focus on the protection of the end result after the execution.« less
Trust Based Evaluation of Wikipedia's Contributors
NASA Astrophysics Data System (ADS)
Krupa, Yann; Vercouter, Laurent; Hübner, Jomi Fred; Herzig, Andreas
Wikipedia is an encyclopedia on which anybody can change its content. Some users, self-proclaimed "patrollers", regularly check recent changes in order to delete or correct those which are ruining articles integrity. The huge quantity of updates leads some articles to remain polluted a certain time before being corrected. In this work, we show how a multiagent trust model can help patrollers in their task of controlling the Wikipedia. To direct the patrollers verification towards suspicious contributors, our work relies on a formalisation of Castelfranchi & Falcone's social trust theory to assist them by representing their trust model in a cognitive way.
Trust Building in Virtual Communities
NASA Astrophysics Data System (ADS)
Mezgár, István
By using different types of communication networks various groups of people can come together according to their private or business interest forming a Virtual Community. In these communities cooperation and collaboration plays an important role. As trust is the base of all human interactions this fact is even more valid in case of virtual communities. According to different experiments the level of trust in virtual communities is highly influenced by the way/mode of communication and by the duration of contact. The paper discusses the ways of trust building focusing on communication technologies and security aspects in virtual communities.
Krieger, Janice L.; Stellefson, Michael L.
2017-01-01
Disparities in online health information accessibility are partially due to varying levels of eHealth literacy and perceived trust. This study examined the relationship between eHealth literacy and perceived trust in online health communication channels and sources among diverse socio-demographic groups. A stratified sample of Black/African Americans (n = 402) and Caucasians (n = 409) completed a web-based survey that measured eHealth literacy and perceived trustworthiness of online health communication channels and information sources. eHealth literacy positively predicted perceived trust in online health communication channels and sources, but disparities existed by socio-demographic factors. Segmenting audiences according to eHealth literacy level provides a detailed understanding of how perceived trust in discrete online health communication channels and information sources vary among diverse audiences. Black/AAs with low eHealth literacy had high perceived trust in YouTube and Twitter, while Black/AAs with high eHealth literacy had high perceived trust in online government and religious organizations. Older adults with low eHealth literacy had high perceived trust in Facebook but low perceived trust in online support groups. Researchers and practitioners should consider the socio-demographics and eHealth literacy level of an intended audience when tailoring information through trustworthy online health communication channels and information sources. PMID:28001489
Paige, Samantha R; Krieger, Janice L; Stellefson, Michael L
2017-01-01
Disparities in online health information accessibility are partially due to varying levels of eHealth literacy and perceived trust. This study examined the relationship between eHealth literacy and perceived trust in online health communication channels and sources among diverse sociodemographic groups. A stratified sample of Black/African Americans (n = 402) and Caucasians (n = 409) completed a Web-based survey that measured eHealth literacy and perceived trustworthiness of online health communication channels and information sources. eHealth literacy positively predicted perceived trust in online health communication channels and sources, but disparities existed by sociodemographic factors. Segmenting audiences according to eHealth literacy level provides a detailed understanding of how perceived trust in discrete online health communication channels and information sources varies among diverse audiences. Black/African Americans with low eHealth literacy had high perceived trust in YouTube and Twitter, whereas Black/African Americans with high eHealth literacy had high perceived trust in online government and religious organizations. Older adults with low eHealth literacy had high perceived trust in Facebook but low perceived trust in online support groups. Researchers and practitioners should consider the sociodemographics and eHealth literacy level of an intended audience when tailoring information through trustworthy online health communication channels and information sources.
Using Cryptography to Improve Conjunction Analysis
NASA Astrophysics Data System (ADS)
Hemenway, B.; Welser, B.; Baiocchi, D.
2012-09-01
Coordination of operations between satellite operators is becoming increasingly important to prevent collisions. Unfortunately, this coordination is often handicapped by a lack of trust. Coordination and cooperation between satellite operators can take many forms, however, one specific area where cooperation between operators would yield significant benefits is in the computation of conjunction analyses. Passively collected orbital are of generally of too low fidelity to be of use in conjunction analyses. Each operator, however, maintains high fidelity data about their own satellites. These high fidelity data are significantly more valuable in calculating conjunction analyses than the lower-fidelity data. If operators were to share their high fidelity data overall space situational awareness could be improved. At present, many operators do not share data and as a consequence space situational awareness suffers. Restrictive data sharing policies are primarily motivated by privacy concerns on the part of the satellite operators, as each operator is reluctant or unwilling to share data that might compromise its political or commercial interests. In order to perform the necessary conjunction analyses while still maintaining the privacy of their own data, a few operators have entered data sharing agreements. These operators provide their private data to a trusted outside party, who then performs the conjunction analyses and reports the results to the operators. These types of agreements are not an ideal solution as they require a degree of trust between the parties, and the cost of employing the trusted party can be large. In this work, we present and analyze cryptographic tools that would allow satellite operators to securely calculate conjunction analyses without the help of a trusted outside party, while provably maintaining the privacy of their own orbital information. For example, recent advances in cryptographic protocols, specifically in the area of secure Multiparty Computation (MPC) have the potential to allow satellite operators to perform the necessary conjunction analyses without the need to reveal their orbital information to anyone. This talk will describe how MPC works, and how we propose to use it to facilitate secure information sharing between satellite operators.
On Tradeoffs between Trust and Survivability using a Game Theoretic Approach
2016-04-13
On Tradeoffs between Trust and Survivability using a Game Theoretic Approach Jin-Hee Cho and Ananthram Swami U.S. Army Research Laboratory...introduces a game theoretic approach, namely Aoyagi’s game theory based on positive collusion of players. This approach improves group trust by...communication and networking field [17]. We employ a game theoretic approach, namely Aoyagi’s game theory [2], to introduce the concept of positive
Swift Trust: Implications for Whole of Government/Comprehensive Approach (WoG/CA) Missions
2014-09-01
departments who have no history together must quickly coalesce into an effective team, often in response to a crisis or a top governmental priority...efficient and effective performance (Dirks, 1999). Assumed to be particularly important during a crisis (Webb, 1996); trust in such situations works...to keep authority decentralized, lines of communication open and behavior flexible (Mishra, 1996). 2.1 Knowledge- and category-based trust As
Trust-Based Analysis of an Air Force Collision Avoidance System
2015-12-01
that test pilots’ trust depended on a number of factors, including the development of a nuisance free algorithm, designing fly-up evasive maneuvers...revealed that test pilots’ trust depended on a number of factors, including the development of a nuisance- free algorithm, designing fly-up evasive ...the terrain collision evasion maneuver. To overcome these limitations, Auto-GCAS was developed with a number of innovative approaches and solutions
DOT National Transportation Integrated Search
2018-01-01
With the release of the Bitcoin concept into the public domain in late 2008, the world of cryptocurrency (electronic currency such as Bitcoin, Ethereum, and hundreds of others) and distributed computing gained a new kind of trust protocol called b...
Parikh, Priti P; Brown, Ronald; White, Mary; Markert, Ronald J; Eustace, Rosemary; Tchorz, Kathryn
2015-06-15
Assessment of interpersonal and psychosocial competencies during end-of-life care training is essential. This study reports the relationship between simulation-based end-of-life care Objective Structured Clinical Examination ratings and communication skills, trust, and self-assessed empathy along with the perceptions of students regarding their training experiences. Medical students underwent simulation-based end-of-life care OSCE training that involved standardized patients who evaluated students' communication skills and physician trust with the Kalamazoo Essential Elements Communication Checklist and the Wake Forest Physician Trust Scale. Students also completed the Jefferson Scale of Physician Empathy. Pearson correlation was used to examine the relationship between OSCE performance grades and communication, trust, and empathy scores. Student comments were analyzed using the constant comparative method of analysis to identify dominant themes. The 389 students (mean age 26.6 ± 2.8 y; 54.5% female) had OSCE grades that were positively correlated with physician trust scores (r = 0.325, P < 0.01) and communication skills (r = 0.383, P < 0.01). However, OSCE grades and self-reported empathy were not related (r = 0.021, P = 0.68). Time of clerkship differed for OSCE grade and physician trust scores; however, there was no trend identified. No differences were noted between the time of clerkship and communication skills or empathy. Overall, students perceived simulation-based end-of-life care training to be a valuable learning experience and appreciated its placement early in clinical training. We found that simulation-based OSCE training in palliative and end-of-life care can be effectively conducted during a surgery clerkship. Moreover, the standardized patient encounters combined with the formal assessment of communication skills, physician trust, and empathy provide feedback to students at an early phase of their professional life. The positive and appreciative comments of students regarding the opportunity to practice difficult patient conversations suggest that attention to these professional characteristics and skills is a valued element of clinical training and conceivably a step toward better patient outcomes and satisfaction. Copyright © 2015 Elsevier Inc. All rights reserved.
Multipartite entanglement verification resistant against dishonest parties.
Pappa, Anna; Chailloux, André; Wehner, Stephanie; Diamanti, Eleni; Kerenidis, Iordanis
2012-06-29
Future quantum information networks will consist of quantum and classical agents, who have the ability to communicate in a variety of ways with trusted and untrusted parties and securely delegate computational tasks to untrusted large-scale quantum computing servers. Multipartite quantum entanglement is a fundamental resource for such a network and, hence, it is imperative to study the possibility of verifying a multipartite entanglement source in a way that is efficient and provides strong guarantees even in the presence of multiple dishonest parties. In this Letter, we show how an agent of a quantum network can perform a distributed verification of a source creating multipartite Greenberger-Horne-Zeilinger (GHZ) states with minimal resources, which is, nevertheless, resistant against any number of dishonest parties. Moreover, we provide a tight tradeoff between the level of security and the distance between the state produced by the source and the ideal GHZ state. Last, by adding the resource of a trusted common random source, we can further provide security guarantees for all honest parties in the quantum network simultaneously.
Honor among thieves: The interaction of team and member deviance on trust in the team.
Schabram, Kira; Robinson, Sandra L; Cruz, Kevin S
2018-05-03
In this article, we examine member trust in deviant teams. We contend that a member's trust in his or her deviant team depends on the member's own deviant actions; although all members will judge the actions of their deviant teams as rational evidence that they should not be trusted, deviant members, but not honest members, can hold on to trust in their teams because of a sense of connection to the team. We tested our predictions in a field study of 562 members across 111 teams and 24 organizations as well as in an experiment of 178 participants in deviant and non-deviant teams. Both studies show that honest members experience a greater decline in trust as team deviance goes up. Moreover, our experiment finds that deviant members have as much trust in their deviant teams as honest members do in honest teams, but only in teams with coordinated rather than independent acts of deviance, in which deviant members engage in a variety of ongoing dynamics foundational to a sense of connection and affective-based trust. (PsycINFO Database Record (c) 2018 APA, all rights reserved).
Wang, Xin; Wang, Ying; Sun, Hongbin
2016-01-01
In social media, trust and distrust among users are important factors in helping users make decisions, dissect information, and receive recommendations. However, the sparsity and imbalance of social relations bring great difficulties and challenges in predicting trust and distrust. Meanwhile, there are numerous inducing factors to determine trust and distrust relations. The relationship among inducing factors may be dependency, independence, and conflicting. Dempster-Shafer theory and neural network are effective and efficient strategies to deal with these difficulties and challenges. In this paper, we study trust and distrust prediction based on the combination of Dempster-Shafer theory and neural network. We firstly analyze the inducing factors about trust and distrust, namely, homophily, status theory, and emotion tendency. Then, we quantify inducing factors of trust and distrust, take these features as evidences, and construct evidence prototype as input nodes of multilayer neural network. Finally, we propose a framework of predicting trust and distrust which uses multilayer neural network to model the implementing process of Dempster-Shafer theory in different hidden layers, aiming to overcome the disadvantage of Dempster-Shafer theory without optimization method. Experimental results on a real-world dataset demonstrate the effectiveness of the proposed framework. PMID:27034651
Methods for reliability evaluation of trust and reputation systems
NASA Astrophysics Data System (ADS)
Janiszewski, Marek B.
2016-09-01
Trust and reputation systems are a systematic approach to build security on the basis of observations of node's behaviour. Exchange of node's opinions about other nodes is very useful to indicate nodes which act selfishly or maliciously. The idea behind trust and reputation systems gets significance because of the fact that conventional security measures (based on cryptography) are often not sufficient. Trust and reputation systems can be used in various types of networks such as WSN, MANET, P2P and also in e-commerce applications. Trust and reputation systems give not only benefits but also could be a thread itself. Many attacks aim at trust and reputation systems exist, but such attacks still have not gain enough attention of research teams. Moreover, joint effects of many of known attacks have been determined as a very interesting field of research. Lack of an acknowledged methodology of evaluation of trust and reputation systems is a serious problem. This paper aims at presenting various approaches of evaluation such systems. This work also contains a description of generalization of many trust and reputation systems which can be used to evaluate reliability of such systems in the context of preventing various attacks.
Scott Barss, Karen
2012-04-30
Educating nurses to provide evidence-based, non-intrusive spiritual care in today's pluralistic context is both daunting and essential. Qualitative research is needed to investigate what helps nurse educators feel more prepared to meet this challenge. This paper presents findings from an interpretive phenomenological analysis of the experience of nurse educators who used the T.R.U.S.T. Model for Inclusive Spiritual Care in their clinical teaching. The T.R.U.S.T. Model is an evidence-based, non-linear resource developed by the author and piloted in the undergraduate nursing program in which she teaches. Three themes are presented: "The T.R.U.S.T. Model as a bridge to spiritual exploration"; "blockades to the bridge"; and "unblocking the bridge". T.R.U.S.T. was found to have a positive influence on nurse educators' comfort and confidence in the teaching of spiritual care. Recommendations for maximizing the model's positive impact are provided, along with "embodied" resources to support holistic teaching and learning about spiritual care.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Maiden, Wendy M.
Cooperative Infrastructure Defense (CID) is a hierarchical, agent-based, adaptive, cyber-security framework designed to collaboratively protect multiple enclaves or organizations participating in a complex infrastructure. CID employs a swarm of lightweight, mobile agents called Sensors designed to roam hosts throughout a security enclave to find indications of anomalies and report them to host-based Sentinels. The Sensors’ findings become pieces of a larger puzzle, which the Sentinel puts together to determine the problem and respond per policy as given by the enclave-level Sergeant agent. Horizontally across multiple enclaves and vertically within each enclave, authentication and access control technologies are necessary but insufficientmore » authorization mechanisms to ensure that CID agents continue to fulfill their roles in a trustworthy manner. Trust management fills the gap, providing mechanisms to detect malicious agents and offering more robust mechanisms for authorization. This paper identifies the trust relationships throughout the CID hierarchy, the types of trust evidence that could be gathered, and the actions that the CID system could take if an entity is determined to be untrustworthy.« less
Goals of Care or Goals of Trust? How Family Members Perceive Goals for Dying Nursing Home Residents.
Rosemond, Cherie; Hanson, Laura C; Zimmerman, Sheryl
2017-04-01
Dementia affects more than 5 million Americans, and is a leading cause of death. Family members of nursing home (NH) residents with advanced dementia report difficulty making decisions about care toward the end of life. As part of a randomized trial testing an intervention to improve decision making, this qualitative study aimed to understand how family decision makers experienced goal-based decision making in advance of the death of their relative. This qualitative study was conducted as part of the goals of care clinical trial. Study participants (n = 16) were family decision makers in North Carolina whose relative with advanced dementia died after participating in the goals of care intervention. Semi-structured interviews were analyzed using a qualitative description approach. Family members' experience of decision making and death differed based on the presence or absence of trusting relationships with NH staff. Family members who reported trust described a positive end-of-life experience and less need for prescribed goals of care discussions. In the absence of trust, family members reported that goals of care discussions were ignored by staff or created confusion. Among family members of persons who recently died from dementia in NHs, expressions of trust in staff were strongly related to perceptions of decision making about goals of care. Although goals of care discussions may potentially promote communication to earn trust, the presence of pre-existing trust ultimately influenced the decision making and end-of-life experiences of residents and families.
Service quality, trust, and patient satisfaction in interpersonal-based medical service encounters.
Chang, Ching-Sheng; Chen, Su-Yueh; Lan, Yi-Ting
2013-01-16
Interaction between service provider and customer is the primary core of service businesses of different natures, and the influence of trust on service quality and customer satisfaction could not be ignored in interpersonal-based service encounters. However, lack of existing literature on the correlation between service quality, patient trust, and satisfaction from the prospect of interpersonal-based medical service encounters has created a research gap in previous studies. Therefore, this study attempts to bridge such a gap with an evidence-based practice study. We adopted a cross-sectional design using a questionnaire survey of outpatients in seven medical centers of Taiwan. Three hundred and fifty copies of questionnaire were distributed, and 285 valid copies were retrieved, with a valid response rate of 81.43%. The SPSS 14.0 and AMOS 14.0 (structural equation modeling) statistical software packages were used for analysis. Structural equation modeling clarifies the extent of relationships between variables as well as the chain of cause and effect. Restated, SEM results do not merely show empirical relationships between variables when defining the practical situation. For this reason, SEM was used to test the hypotheses. Perception of interpersonal-based medical service encounters positively influences service quality and patient satisfaction. Perception of service quality among patients positively influences their trust. Perception of trust among patients positively influences their satisfaction. According to the findings, as interpersonal-based medical service encounters will positively influence service quality and patient satisfaction, and the differences for patients' perceptions of the professional skill and communication attitude of personnel in interpersonal-based medical service encounters will influence patients' overall satisfaction in two ways: (A) interpersonal-based medical service encounter directly affects patient satisfaction, which represents a direct effect; and (B) service quality and patient trust are used as intervening variables to affect patient satisfaction, which represents an indirect effect. Due to differences in the scale, resources and costs among medical institutions of different levels, it is a most urgent and concerning issue of how to control customers' demands and preferences and adopt correct marketing concepts under the circumstances of intense competition in order to satisfy the public and build up a competitive edge for medical institutions.
Wu, Chien-Te; Fan, Yang-Teng; Du, Ye-Rong; Yang, Tien-Tun; Liu, Ho-Ling; Yen, Nai-Shing; Chen, Shu-Heng; Hsung, Ray-May
2018-01-01
Trust is essential for mutually beneficial human interactions in economic exchange and politics and people’s social identities notably have dramatic effects on trust behaviors toward others. Previous literature concerning social identities generally suggests that people tend to show in-group favoritism toward members who share the same identity. However, how our brains process signals of identity while facing uncertain situations in interpersonal interactions remains largely unclear. To address this issue, we performed an fMRI experiment with 54 healthy adults who belonged to two identity groups of opposing political orientations. The identity information of participants was extracted from a large-scale social survey on the 2012 Taiwan presidential election. Accordingly, participants were categorized as either the Kuomintang (KMT) or the Democratic Progressive Party (DPP) supporters. During the experiment, participants played trust games with computer agents with labels of the same or the opposing political identity. Interestingly, our results suggest that the behaviors of the two groups cannot be equally attributed to in-group favoritism. Behaviorally, only the DPP supporter group showed a significant trust preference toward in-group members, which did not hold for the KMT supporter group. Consistently, neurophysiological findings further revealed that only the DPP supporter group showed neuronal responses to both unexpected negative feedback from in-group members in anterior insula, temporoparietal junction, and dorsal lateral prefrontal cortex, as well as to unexpected rewards from out-group members in caudate. These findings therefore suggest that acquired identities play a more complex role in modulating people’s social expectation in interpersonal trust behaviors under identity-relevant contexts. PMID:29456496
Lindström, M
2009-07-01
To investigate the associations between vertical (institutional) political trust in the Riksdag and daily smoking and smoking cessation. Cross-sectional study. In total, 27,757 individuals aged 18-80 years answered a postal questionnaire, which represents 59% of the random sample. A logistic regression model was used to investigate the associations between political trust in the Riksdag and daily smoking and smoking cessation. A multivariate analysis was performed to investigate the importance of possible confounders on the differences in daily smoking and smoking cessation according to political trust. In total, 14.9% of the men and 18.1% of the women were daily smokers. Middle-aged respondents were significantly more likely to be daily smokers than the young. The proportion of ever smokers who had quit smoking increased with age. Respondents with low generalized trust in other people [odds ratio (OR) 1.6, 95% confidence interval (CI) 1.5-1.8 among men; OR 1.7, 95% CI 1.5-1.8 among women] and not high political trust/no political trust at all (OR 1.6, 95% CI 1.4-1.8 among men; OR 1.8, 95% CI 1.6-2.0 among women) had significantly higher ORs of daily smoking. Men and women with not particularly high political trust/no political trust at all and no opinion of the Riksdag had significantly lower ORs of smoking cessation than people with very high/high political trust. These associations remained significant after multiple adjustments. The results suggest that political trust is independently associated with both daily smoking and smoking cessation.
The Effect of Hospital Service Quality on Patient's Trust
Zarei, Ehsan; Daneshkohan, Abbas; Khabiri, Roghayeh; Arab, Mohammad
2014-01-01
Background: The trust is meant the belief of the patient to the practitioner or the hospital based on the concept that the care provider seeks the best for the patient and will provide the suitable care and treatment for him/her. One of the main determinants of patient’s trust is the service quality. Objectives: This study aimed to examine the effect of quality of services provided in private hospitals on the patient’s trust. Patients and Methods: In this descriptive cross-sectional study, 969 patients were selected using the consecutive method from eight private general hospitals of Tehran, Iran, in 2010. Data were collected through a questionnaire containing 20 items (14 items for quality, 6 items for trust) and its validity and reliability were confirmed. Data were analyzed using descriptive statistics and multivariate regression. Results: The mean score of patients' perception of trust was 3.80 and 4.01 for service quality. Approximately 38% of the variance in patient trust was explained by service quality dimensions. Quality of interaction and process (P < 0.001) were the strongest factors in predicting patient’s trust, but the quality of the environment had no significant effect on the patients' degree of trust. Conclusions: The interaction quality and process quality were the key determinants of patient’s trust in the private hospitals of Tehran. To enhance the patients' trust, quality improvement efforts should focus on service delivery aspects such as scheduling, timely and accurate doing of the service, and strengthening the interpersonal aspects of care and communication skills of doctors, nurses and staff. PMID:25763258
Clustering recommendations to compute agent reputation
NASA Astrophysics Data System (ADS)
Bedi, Punam; Kaur, Harmeet
2005-03-01
Traditional centralized approaches to security are difficult to apply to multi-agent systems which are used nowadays in e-commerce applications. Developing a notion of trust that is based on the reputation of an agent can provide a softer notion of security that is sufficient for many multi-agent applications. Our paper proposes a mechanism for computing reputation of the trustee agent for use by the trustier agent. The trustier agent computes the reputation based on its own experience as well as the experience the peer agents have with the trustee agents. The trustier agents intentionally interact with the peer agents to get their experience information in the form of recommendations. We have also considered the case of unintentional encounters between the referee agents and the trustee agent, which can be directly between them or indirectly through a set of interacting agents. The clustering is done to filter off the noise in the recommendations in the form of outliers. The trustier agent clusters the recommendations received from referee agents on the basis of the distances between recommendations using the hierarchical agglomerative method. The dendogram hence obtained is cut at the required similarity level which restricts the maximum distance between any two recommendations within a cluster. The cluster with maximum number of elements denotes the views of the majority of recommenders. The center of this cluster represents the reputation of the trustee agent which can be computed using c-means algorithm.
A Conceptual Framework and Principles for Trusted Pervasive Health
Blobel, Bernd Gerhard; Seppälä, Antto Veikko; Sorvari, Hannu Olavi; Nykänen, Pirkko Anneli
2012-01-01
Background Ubiquitous computing technology, sensor networks, wireless communication and the latest developments of the Internet have enabled the rise of a new concept—pervasive health—which takes place in an open, unsecure, and highly dynamic environment (ie, in the information space). To be successful, pervasive health requires implementable principles for privacy and trustworthiness. Objective This research has two interconnected objectives. The first is to define pervasive health as a system and to understand its trust and privacy challenges. The second goal is to build a conceptual model for pervasive health and use it to develop principles and polices which can make pervasive health trustworthy. Methods In this study, a five-step system analysis method is used. Pervasive health is defined using a metaphor of digital bubbles. A conceptual framework model focused on trustworthiness and privacy is then developed for pervasive health. On that model, principles and rules for trusted information management in pervasive health are defined. Results In the first phase of this study, a new definition of pervasive health was created. Using this model, differences between pervasive health and health care are stated. Reviewed publications demonstrate that the widely used principles of predefined and static trust cannot guarantee trustworthiness and privacy in pervasive health. Instead, such an environment requires personal dynamic and context-aware policies, awareness, and transparency. A conceptual framework model focused on information processing in pervasive health is developed. Using features of pervasive health and relations from the framework model, new principles for trusted pervasive health have been developed. The principles propose that personal health data should be under control of the data subject. The person shall have the right to verify the level of trust of any system which collects or processes his or her health information. Principles require that any stakeholder or system collecting or processing health data must support transparency and shall publish its trust and privacy attributes and even its domain specific policies. Conclusions The developed principles enable trustworthiness and guarantee privacy in pervasive health. The implementation of principles requires new infrastructural services such as trust verification and policy conflict resolution. After implementation, the accuracy and usability of principles should be analyzed. PMID:22481297
A conceptual framework and principles for trusted pervasive health.
Ruotsalainen, Pekka Sakari; Blobel, Bernd Gerhard; Seppälä, Antto Veikko; Sorvari, Hannu Olavi; Nykänen, Pirkko Anneli
2012-04-06
Ubiquitous computing technology, sensor networks, wireless communication and the latest developments of the Internet have enabled the rise of a new concept-pervasive health-which takes place in an open, unsecure, and highly dynamic environment (ie, in the information space). To be successful, pervasive health requires implementable principles for privacy and trustworthiness. This research has two interconnected objectives. The first is to define pervasive health as a system and to understand its trust and privacy challenges. The second goal is to build a conceptual model for pervasive health and use it to develop principles and policies which can make pervasive health trustworthy. In this study, a five-step system analysis method is used. Pervasive health is defined using a metaphor of digital bubbles. A conceptual framework model focused on trustworthiness and privacy is then developed for pervasive health. On that model, principles and rules for trusted information management in pervasive health are defined. In the first phase of this study, a new definition of pervasive health was created. Using this model, differences between pervasive health and health care are stated. Reviewed publications demonstrate that the widely used principles of predefined and static trust cannot guarantee trustworthiness and privacy in pervasive health. Instead, such an environment requires personal dynamic and context-aware policies, awareness, and transparency. A conceptual framework model focused on information processing in pervasive health is developed. Using features of pervasive health and relations from the framework model, new principles for trusted pervasive health have been developed. The principles propose that personal health data should be under control of the data subject. The person shall have the right to verify the level of trust of any system which collects or processes his or her health information. Principles require that any stakeholder or system collecting or processing health data must support transparency and shall publish its trust and privacy attributes and even its domain specific policies. The developed principles enable trustworthiness and guarantee privacy in pervasive health. The implementation of principles requires new infrastructural services such as trust verification and policy conflict resolution. After implementation, the accuracy and usability of principles should be analyzed.
26 CFR 1.668(b)-1A - Tax on distribution.
Code of Federal Regulations, 2010 CFR
2010-04-01
...)-1A Internal Revenue INTERNAL REVENUE SERVICE, DEPARTMENT OF THE TREASURY (CONTINUED) INCOME TAX (CONTINUED) INCOME TAXES Treatment of Excess Distributions of Trusts Applicable to Taxable Years Beginning... the section 666 amounts in the beneficiary's gross income and the tax for such year computed without...
Code of Federal Regulations, 2010 CFR
2010-04-01
... Revenue INTERNAL REVENUE SERVICE, DEPARTMENT OF THE TREASURY (CONTINUED) INCOME TAX (CONTINUED) INCOME TAXES Real Estate Investment Trusts § 1.856-5 Interest. (a) In general. In computing the percentage... 75-percent requirement, the apportionment shall be made as follows: (i) If the loan value of the real...
Keller, Johannes; Mayo, Ruth; Greifeneder, Rainer; Pfattheicher, Stefan
2015-01-01
The current research suggests that taking self-regulatory mechanisms into account provides insights regarding individuals' responses to threats in social interactions. In general, based on the notion that a prevention-focused orientation of self-regulation is associated with a need for security and a vigilant tendency to avoid losses and other types of negative events we advocate that a prevention-focused orientation, both as a disposition as well as a situationally induced state, lowers generalized trust, thus hindering cooperation within social interactions that entail threats. Specifically, we found that the more individuals' habitual self-regulatory orientation is dominated by a prevention focus, the less likely they are to score high on a self-report measure of generalized trust (Study 1), and to express trust in a trust game paradigm as manifested in lower sums of transferred money (Studies 2 and 3). Similar findings were found when prevention focus was situationally manipulated (Study 4). Finally, one possible factor underlying the impact of prevention-focused self-regulation on generalized trust was demonstrated as individuals with a special sensitivity to negative information were significantly affected by a subtle prevention focus manipulation (versus control condition) in that they reacted with reduced trust in the trust game (Study 5). In sum, the current findings document the crucial relevance of self-regulatory orientations as conceptualized in regulatory focus theory regarding generalized trust and responses to threats within a social interaction. The theoretical and applied implications of the findings are discussed.
How Supervisor Experience Influences Trust, Supervision, and Trainee Learning: A Qualitative Study.
Sheu, Leslie; Kogan, Jennifer R; Hauer, Karen E
2017-09-01
Appropriate trust and supervision facilitate trainees' growth toward unsupervised practice. The authors investigated how supervisor experience influences trust, supervision, and subsequently trainee learning. In a two-phase qualitative inductive content analysis, phase one entailed reviewing 44 internal medicine resident and attending supervisor interviews from two institutions (July 2013 to September 2014) for themes on how supervisor experience influences trust and supervision. Three supervisor exemplars (early, developing, experienced) were developed and shared in phase two focus groups at a single institution, wherein 23 trainees validated the exemplars and discussed how each impacted learning (November 2015). Phase one: Four domains of trust and supervision varying with experience emerged: data, approach, perspective, clinical. Early supervisors were detail oriented and determined trust depending on task completion (data), were rule based (approach), drew on their experiences as trainees to guide supervision (perspective), and felt less confident clinically compared with more experienced supervisors (clinical). Experienced supervisors determined trust holistically (data), checked key aspects of patient care selectively and covertly (approach), reflected on individual experiences supervising (perspective), and felt comfortable managing clinical problems and gauging trainee abilities (clinical). Phase two: Trainees felt the exemplars reflected their experiences, described their preferences and learning needs shifting over time, and emphasized the importance of supervisor flexibility to match their learning needs. With experience, supervisors differ in their approach to trust and supervision. Supervisors need to trust themselves before being able to trust others. Trainees perceive these differences and seek supervision approaches that align with their learning needs.
Lago, Rozilaine Redi; Peter, Elizabeth; Bógus, Cláudia Maria
2017-03-08
People seeking care for substance use (PSCSU) experience deep social and health inequities. Harm reduction can be a moral imperative to approach these persons. The purpose of this study was to explore relationships among users, health care providers, relatives, and society regarding harm reduction in mental health care, using a trust approach rooted in feminist ethics. A qualitative study was conducted in a mental health service for PSCSU, and included fifteen participants who were health care providers, users, and their relatives. Individual in-depth and group interviews, participant observation, and a review of patients' records and service reports were conducted. Three nested levels of (dis)trust were identified: (dis)trust in the treatment, (dis)trust in the user, and self-(dis)trust of the user, revealing the interconnections among different layers of trust. (Dis)trust at each level can amplify or decrease the potential for a positive therapeutic response in users, their relatives' support, and how professionals act and build innovations in care. Distrust was more abundant than trust in participants' reports, revealing the fragility of trust and the focus on abstinence within this setting. The mismatch between wants and needs of users and the expectations and requirements of a society and mental health care system based on a logic of "fixing" has contributed to distrust and stigma. Therefore, we recommend policies that increase the investment in harm reduction education and practice that target service providers, PSCSU, and society to change the context of distrust identified.
Rcorrector: efficient and accurate error correction for Illumina RNA-seq reads.
Song, Li; Florea, Liliana
2015-01-01
Next-generation sequencing of cellular RNA (RNA-seq) is rapidly becoming the cornerstone of transcriptomic analysis. However, sequencing errors in the already short RNA-seq reads complicate bioinformatics analyses, in particular alignment and assembly. Error correction methods have been highly effective for whole-genome sequencing (WGS) reads, but are unsuitable for RNA-seq reads, owing to the variation in gene expression levels and alternative splicing. We developed a k-mer based method, Rcorrector, to correct random sequencing errors in Illumina RNA-seq reads. Rcorrector uses a De Bruijn graph to compactly represent all trusted k-mers in the input reads. Unlike WGS read correctors, which use a global threshold to determine trusted k-mers, Rcorrector computes a local threshold at every position in a read. Rcorrector has an accuracy higher than or comparable to existing methods, including the only other method (SEECER) designed for RNA-seq reads, and is more time and memory efficient. With a 5 GB memory footprint for 100 million reads, it can be run on virtually any desktop or server. The software is available free of charge under the GNU General Public License from https://github.com/mourisl/Rcorrector/.
Kinematics and Hydrodynamics of Burst-and-Coast Strategy in Carangiform Swimming
NASA Astrophysics Data System (ADS)
Han, Pan; Dong, Haibo; di Santo, Valentina; Lauder, George
2017-11-01
In this work, burst-and-coast swimming hydrodynamics of a trout is studied using a combined experimental and computational approach. The associated kinematics is reconstructed from the output of a high-speed photogrammetry system. The hydrodynamic performance and wake structures are then investigated using an in-house immersed-boundary-method based flow solver and compared with those found in steady undulatory swimming. Results have shown that the carangiform swimmer uses a completely different trust producing strategy when conducts burst-and-coast swimming. Comparing to steady swimming, the trunk curvature of the fish has increased twofold during the burst phase. As a result, it contributes about 15% of total trust during the swimming. Results have also shown that the thrust produced by the caudal fin has increased by tenfold during burst swimming due to larger flapping amplitude and pitching angle. Vortex dynamics analysis has shown that unlike the steady swimming, vortex rings formed during burst swimming result in a stronger downstream jet, which suggests a new thrust enhancement mechanism in carangiform swimming. This work was funded by the Office of Naval Research under Program Director Dr B. Brizzolara, MURI Grant Number N00014-14-1-0533.
Trust-Threshold Based Routing in Mobile Ad Hoc Delay Tolerant Networks
2011-02-15
A £) I e- A "flt x rj(t), ifm *jand\\Ri\\=0 (4) if m * j and\\R{\\ > 0 The indirect trust evaluation toward nodej is given in Equation 4 above...Pfn. Pfp 1% U 300 5 (5 min) (In [l,4] m / s a 90% toh 0.8:0.2 E„ [12. 24] hrs ’ A ’* m [160.480| mm TlDS iOOs 5.1 Optimal Trust Thresholds for...Evaluation t-r, encounter.X(t . A ,\\ ;r„, _ i Tim (t+At), tfm-j e-^’xrj(t), ifm +l W The direct trust evaluation of nodey is given in
Reliability based design optimization: Formulations and methodologies
NASA Astrophysics Data System (ADS)
Agarwal, Harish
Modern products ranging from simple components to complex systems should be designed to be optimal and reliable. The challenge of modern engineering is to ensure that manufacturing costs are reduced and design cycle times are minimized while achieving requirements for performance and reliability. If the market for the product is competitive, improved quality and reliability can generate very strong competitive advantages. Simulation based design plays an important role in designing almost any kind of automotive, aerospace, and consumer products under these competitive conditions. Single discipline simulations used for analysis are being coupled together to create complex coupled simulation tools. This investigation focuses on the development of efficient and robust methodologies for reliability based design optimization in a simulation based design environment. Original contributions of this research are the development of a novel efficient and robust unilevel methodology for reliability based design optimization, the development of an innovative decoupled reliability based design optimization methodology, the application of homotopy techniques in unilevel reliability based design optimization methodology, and the development of a new framework for reliability based design optimization under epistemic uncertainty. The unilevel methodology for reliability based design optimization is shown to be mathematically equivalent to the traditional nested formulation. Numerical test problems show that the unilevel methodology can reduce computational cost by at least 50% as compared to the nested approach. The decoupled reliability based design optimization methodology is an approximate technique to obtain consistent reliable designs at lesser computational expense. Test problems show that the methodology is computationally efficient compared to the nested approach. A framework for performing reliability based design optimization under epistemic uncertainty is also developed. A trust region managed sequential approximate optimization methodology is employed for this purpose. Results from numerical test studies indicate that the methodology can be used for performing design optimization under severe uncertainty.
Detection of communities with Naming Game-based methods
Ribeiro, Carlos Henrique Costa
2017-01-01
Complex networks are often organized in groups or communities of agents that share the same features and/or functions, and this structural organization is built naturally with the formation of the system. In social networks, we argue that the dynamic of linguistic interactions of agreement among people can be a crucial factor in generating this community structure, given that sharing opinions with another person bounds them together, and disagreeing constantly would probably weaken the relationship. We present here a computational model of opinion exchange that uncovers the community structure of a network. Our aim is not to present a new community detection method proper, but to show how a model of social communication dynamics can reveal the (simple and overlapping) community structure in an emergent way. Our model is based on a standard Naming Game, but takes into consideration three social features: trust, uncertainty and opinion preference, that are built over time as agents communicate among themselves. We show that the separate addition of each social feature in the Naming Game results in gradual improvements with respect to community detection. In addition, the resulting uncertainty and trust values classify nodes and edges according to role and position in the network. Also, our model has shown a degree of accuracy both for non-overlapping and overlapping communities that are comparable with most algorithms specifically designed for topological community detection. PMID:28797097
Modeling cascading failures with the crisis of trust in social networks
NASA Astrophysics Data System (ADS)
Yi, Chengqi; Bao, Yuanyuan; Jiang, Jingchi; Xue, Yibo
2015-10-01
In social networks, some friends often post or disseminate malicious information, such as advertising messages, informal overseas purchasing messages, illegal messages, or rumors. Too much malicious information may cause a feeling of intense annoyance. When the feeling exceeds a certain threshold, it will lead social network users to distrust these friends, which we call the crisis of trust. The crisis of trust in social networks has already become a universal concern and an urgent unsolved problem. As a result of the crisis of trust, users will cut off their relationships with some of their untrustworthy friends. Once a few of these relationships are made unavailable, it is likely that other friends will decline trust, and a large portion of the social network will be influenced. The phenomenon in which the unavailability of a few relationships will trigger the failure of successive relationships is known as cascading failure dynamics. To our best knowledge, no one has formally proposed cascading failures dynamics with the crisis of trust in social networks. In this paper, we address this potential issue, quantify the trust between two users based on user similarity, and model the minimum tolerance with a nonlinear equation. Furthermore, we construct the processes of cascading failures dynamics by considering the unique features of social networks. Based on real social network datasets (Sina Weibo, Facebook and Twitter), we adopt two attack strategies (the highest trust attack (HT) and the lowest trust attack (LT)) to evaluate the proposed dynamics and to further analyze the changes of the topology, connectivity, cascading time and cascade effect under the above attacks. We numerically find that the sparse and inhomogeneous network structure in our cascading model can better improve the robustness of social networks than the dense and homogeneous structure. However, the network structure that seems like ripples is more vulnerable than the other two network structures. Our findings will be useful in further guiding the construction of social networks to effectively avoid the cascading propagation with the crisis of trust. Some research results can help social network service providers to avoid severe cascading failures.
Facilitating a just and trusting culture.
Pattison, Jill; Kline, Theresa
2015-01-01
The purpose of this paper is to identify managerial and organizational characteristics and behaviors that facilitate the fostering of a just and trusting culture within the healthcare system. Two studies were conducted. The initial qualitative one was used to identify themes based on interviews with health care workers that facilitate a just and trusting culture. The quantitative one used a policy-capturing design to determine which factors were most likely to predict outcomes of manager and organizational trust. The factors of violation type (ability vs integrity), providing an explanation or not, blame vs no blame by manager, and blame vs no blame by organization were all significant predictors of perceptions of trust. Limitations to the generalizability of findings included both a small and non-representative sample from one health care region. The present findings can be useful in developing training systems for managers and organizational executive teams for managing medical error events in a manner that will help develop a just and trusting culture. A just and trusting culture should enhance the likelihood of reporting medical errors. Improved reporting, in turn, should enhance patient safety. This is the first field study experimentally manipulating aspects of organizational trust within the health care sector. The use of policy-capturing is a unique feature that sheds light into the decision-making of health care workers as to the efficaciousness of particular managerial and organizational characteristics that impact a just and trusting culture.
Chang, Su-Chao; Chou, Chi-Min
2012-11-01
The objective of this study was to determine empirically the role of constraint-based and dedication-based influences as drivers of the intention to continue using online shopping websites. Constraint-based influences consist of two variables: trust and perceived switching costs. Dedication-based influences consist of three variables: satisfaction, perceived usefulness, and trust. The current results indicate that both constraint-based and dedication-based influences are important drivers of the intention to continue using online shopping websites. The data also shows that trust has the strongest total effect on online shoppers' intention to continue using online shopping websites. In addition, the results indicate that the antecedents of constraint-based influences, technical bonds (e.g., perceived operational competence and perceived website interactivity) and social bonds (e.g., perceived relationship investment, community building, and intimacy) have indirect positive effects on the intention to continue using online shopping websites. Based on these findings, this research suggests that online shopping websites should build constraint-based and dedication-based influences to enhance user's continued online shopping behaviors simultaneously.
Hermann, M
2002-05-01
The rigorous implementation of clear preoperative information is mandatory for the patient's understanding, acceptance and written informed consent to all diagnostic and surgical procedures. In the present study, I evaluated whether new media are suitable for conveying basic information to patients; I analysed the merits of computerized animation to illustrate a difficult treatment process, i.e., the progressive steps of a thyroid operation, in comparison to the use of conventional flyers. 3D animation software was employed to illustrate the basic anatomy of the thyroid and the larnyx; the principle of thyroidectomy was explained by visualizing the surgical procedure step by step. Finally, the possible complications that may result from the intraoperative manipulations were also visually explained. Eighty patients entered a prospective randomisation: on the day before surgery, group 1 watched the computer animation, whereas group 2 was given the identical information in a written text (= standard flyer). The evaluation included a questionnaire with scores of 1-5, rating the patients' understanding, subjective and objective knowledge, emotional factors like anxiety and trust, and the willingness to undergo an operation. Understanding of and subjective knowledge about the surgical procedure and possible complications, the degree of trust in professional treatment, the reduction in anxiety and readiness for the operation were significantly better after watching the computer animation than after reading the text. However, active knowledge did not improve significantly. The interest in the preoperative information was high in both groups. The benefit of computer animation was enhanced in a second inquiry; patients who had only read the text had a significant improvement in parameters after an additional exposure to the video animation. Preoperative surgical information can be optimized by presenting the operative procedure via computer animation. Nowadays, several types of new media such as the world wide web, CD, DVD, and digital TV are readily available and--as shown here--suitable for effective visual explanation. Most patients are familiar with acquiring new information by one of these means. An appropriately designed 3D repre-sentation is met with a high level of acceptance, as the present study clearly shows. Modern patient-based information systems are necessary. They can no longer be the sole responsibility of the medical profession, but must be on the agenda of hospital managements and of medical care systems as well.
ERIC Educational Resources Information Center
Schaubroeck, John; Lam, Simon S. K.; Peng, Ann Chunyan
2011-01-01
We develop a model in which cognitive and affective trust in the leader mediate the relationship between leader behavior and team psychological states that, in turn, drive team performance. The model is tested on a sample of 191 financial services teams in Hong Kong and the U.S. Servant leadership influenced team performance through affect-based…
Ward, Paul R; Rokkas, Philippa; Cenko, Clinton; Pulvirenti, Mariastella; Dean, Nicola; Carney, A Simon; Meyer, Samantha
2017-05-05
Waiting times for hospital appointments, treatment and/or surgery have become a major political and health service problem, leading to national maximum waiting times and policies to reduce waiting times. Quantitative studies have documented waiting times for various types of surgery and longer waiting times in public vs private hospitals. However, very little qualitative research has explored patient experiences of waiting, how this compares between public and private hospitals, and the implications for trust in hospitals and healthcare professionals. The aim of this paper is to provide a deep understanding of the impact of waiting times on patient trust in public and private hospitals. A qualitative study in South Australia, including 36 in-depth interviews (18 from public and 18 from private hospitals). Data collection occurred in 2012-13, and data were analysed using pre-coding, followed by conceptual and theoretical categorisation. Participants differentiated between experiences of 'waiting for' (e.g. for specialist appointments and surgery) and 'waiting in' (e.g. in emergency departments and outpatient clinics) public and private hospitals. Whilst 'waiting for' public hospitals was longer than private hospitals, this was often justified and accepted by public patients (e.g. due to reduced government funding), therefore it did not lead to distrust of public hospitals. Private patients had shorter 'waiting for' hospital services, increasing their trust in private hospitals and distrust of public hospitals. Public patients also recounted many experiences of longer 'waiting in' public hospitals, leading to frustration and anxiety, although they rarely blamed or distrusted the doctors or nurses, instead blaming an underfunded system and over-worked staff. Doctors and nurses were seen to be doing their best, and therefore trustworthy. Although public patients experienced longer 'waiting for' and 'waiting in' public hospitals, it did not lead to widespread distrust in public hospitals or healthcare professionals. Private patients recounted largely positive stories of reduced 'waiting for' and 'waiting in' private hospitals, and generally distrusted public hospitals. The continuing trust by public patients in the face of negative experiences may be understood as a form of exchange trust norm, in which institutional trust is based on base-level expectations of consistency and minimum standards of care and safety. The institutional trust by private patients may be understood as a form of communal trust norm, whereby trust is based on the additional and higher-level expectations of flexibility, reduced waiting and more time with healthcare professionals.
Power and trust in organizational relations: an empirical study in Turkish public hospitals.
Bozaykut, Tuba; Gurbuz, F Gulruh
2015-01-01
Given the salience of the interplay between trust and power relations in organizational settings, this paper examines the perceptions of social power and its effects on trust in supervisors within the context of public hospitals. Following the theoretical background from which the study model is developed, the recent situation of hospitals within Turkish healthcare system is discussed to further elucidate the working conditions of physicians. Sample data were collected employing a structured questionnaire that was distributed to physicians working at seven different public hospitals. The statistical analyses indicate that perceptions of supervisors' social power affect subordinates' trust in supervisors. Although coercive power is found to have the greatest impact on trust in supervisors, the influence of the power base is weak. In addition, the results show that perceptions of social power differ between genders. However, the results do not support any of the hypotheses regarding the relations between trust in supervisors and the examined demographic variables. Copyright © 2014 John Wiley & Sons, Ltd.
Gut reactions: moral conviction, religiosity, and trust in authority.
Wisneski, Daniel C; Lytle, Brad L; Skitka, Linda J
2009-09-01
Theory and research point to different ways moral conviction and religiosity connect to trust in political authorities to decide controversial issues of the day. Specifically, we predicted that stronger moral convictions would be associated with greater distrust in authorities such as the U.S. Supreme Court making the "right" decisions regarding controversial issues. Conversely, we predicted that stronger religiosity would be associated with greater trust in authorities. We tested these hypotheses using a survey of a nationally representative sample of Americans (N = 727) that assessed the degree to which people trusted the U.S. Supreme Court to rule on the legal status of physician-assisted suicide. Results indicated that greater religiosity was associated with greater trust in the U.S. Supreme Court to decide this issue, and that stronger moral convictions about physician-assisted suicide were associated with greater distrust in the U.S. Supreme Court to decide this issue. Also, the processes underlying religious trust and distrust based on moral convictions were more quick and visceral than slow and carefully considered.
Tarn, Derjung M.; Meredith, Lisa S.; Kagawa-Singer, Marjorie; Matsumura, Shinji; Bito, Seiji; Oye, Robert K.; Liu, Honghu; Kahn, Katherine L.; Fukuhara, Shunichi; Wenger, Neil S.
2005-01-01
PURPOSE Trust is a cornerstone of the physician-patient relationship. We investigated the relation of patient characteristics, religiosity, acculturation, physician ethnicity, and insurance-mandated physician change to levels of trust in Japanese American and Japanese patients. METHODS A self-administered, cross-sectional questionnaire in English and Japanese (completed in the language of their choice) was given to community-based samples of 539 English-speaking Japanese Americans, 340 Japanese-speaking Japanese Americans, and 304 Japanese living in Japan. RESULTS Eighty-seven percent of English-speaking Japanese Americans, 93% of Japanese-speaking Japanese Americans, and 58% of Japanese living in Japan responded to trust items and reported mean trust scores of 83, 80, and 68, respectively, on a scale ranging from 0 to 100. In multivariate analyses, English-speaking and Japanese-speaking Japanese American respondents reported more trust than Japanese respondents living in Japan (P values <.001). Greater religiosity (P <.001), less desire for autonomy (P <.001), and physician-patient relationships of longer duration (P <.001) were related to increased trust. Among Japanese Americans, more acculturated respondents reported more trust (P <.001), and Japanese physicians were trusted more than physicians of another ethnicity. Among respondents prompted to change physicians because of insurance coverage, the 48% who did not want to switch reported less trust in their current physician than in their former physician (mean score of 82 vs 89, P <.001). CONCLUSIONS Religiosity, autonomy preference, and acculturation were strongly related to trust in one’s physician among the Japanese American and Japanese samples studied and may provide avenues to enhance the physician-patient relationship. The strong relationship of trust with patient-physician ethnic match and the loss of trust when patients, in retrospect, report leaving a preferred physician suggest unintended consequences to patients not able to continue with their preferred physicians. PMID:16046567
Trust makers, breakers and brokers: building trust in the Australian food system
2013-01-01
Background The importance of consumer trust in the food supply has previously been identified, and dimensions of consumer trust in food—who they trust and the type of trust that they exhibit—has been explored. However, there is a lack of research about the mechanisms through which consumer trust in the food supply is developed, maintained, broken and repaired. This study seeks to address this gap by exploring if, and how, consumer trust in the food supply is considered by the media, food industry and governments when responding to food scares. The aim of the research is to develop models of trust building that can be implemented following food scares. Methods Semi-structured interviews will be undertaken with media, public relations officials and policy makers in Australia, New Zealand and the United Kingdom. Participants will be recruited through purposive sampling and will be asked to discuss a hypothetical case study outlining a food incident, and any experiences of specific food scares. Models of trust development, maintenance and repair will be developed from interview data. Comment on these models will be sought from experts in food-related organizations through a Delphi study, where participants will be asked to consider the usefulness of the models. Participants’ comments will be used to revise the models until consensus is reached on the suitability and usability of the models. Discussion This study will contribute to the literature about systems-based trust, and explore trust as a social and regulatory process. The protocol and results will be of interest and use to the food industry, food regulators, consumer advocate groups, media seeking to report food-related issues and policy makers concerned with public health and consumer health and well-being. This research represents an important contribution to the translation of the theoretical conceptualizations of trust into practical use in the context of food. PMID:23496819
Trust makers, breakers and brokers: building trust in the Australian food system.
Wilson, Annabelle; Coveney, John; Henderson, Julie; Meyer, Samantha; Calnan, Michael; Caraher, Martin; Webb, Trevor; Elliott, Anthony; Ward, Paul
2013-03-15
The importance of consumer trust in the food supply has previously been identified, and dimensions of consumer trust in food-who they trust and the type of trust that they exhibit-has been explored. However, there is a lack of research about the mechanisms through which consumer trust in the food supply is developed, maintained, broken and repaired. This study seeks to address this gap by exploring if, and how, consumer trust in the food supply is considered by the media, food industry and governments when responding to food scares. The aim of the research is to develop models of trust building that can be implemented following food scares. Semi-structured interviews will be undertaken with media, public relations officials and policy makers in Australia, New Zealand and the United Kingdom. Participants will be recruited through purposive sampling and will be asked to discuss a hypothetical case study outlining a food incident, and any experiences of specific food scares. Models of trust development, maintenance and repair will be developed from interview data. Comment on these models will be sought from experts in food-related organizations through a Delphi study, where participants will be asked to consider the usefulness of the models. Participants' comments will be used to revise the models until consensus is reached on the suitability and usability of the models. This study will contribute to the literature about systems-based trust, and explore trust as a social and regulatory process. The protocol and results will be of interest and use to the food industry, food regulators, consumer advocate groups, media seeking to report food-related issues and policy makers concerned with public health and consumer health and well-being. This research represents an important contribution to the translation of the theoretical conceptualizations of trust into practical use in the context of food.
Anonymity-preserving Reputation Management System for health sector
Hamid, Zara; Abdul, Wadood; Ghouzali, Sanaa; Khan, Abid; Malik, Saif Ur Rehman; Shaukat Khan, Mansoor; Nawaz, Sarfraz
2018-01-01
In health sector, trust is considered important because it indirectly influences the quality of health care through patient satisfaction, adherence and the continuity of its relationship with health care professionals and the promotion of accurate and timely diagnoses. One of the important requirements of TRSs in the health sector is rating secrecy, which mandates that the identification information about the service consumer should be kept secret to prevent any privacy violation. Anonymity and trust are two imperative objectives, and no significant explicit efforts have been made to achieve both of them at the same time. In this paper, we present a framework for solving the problem of reconciling trust with anonymity in the health sector. Our solution comprises Anonymous Reputation Management (ARM) protocol and Context-aware Trustworthiness Assessment (CTA) protocol. ARM protocol ensures that only those service consumers who received a service from a specific service provider provide a recommendation score anonymously with in the specified time limit. The CTA protocol computes the reputation of a user as a service provider and as a recommender. To determine the correctness of the proposed ARM protocol, formal modelling and verification are performed using High Level Petri Nets (HLPN) and Z3 Solver. Our simulation results verify the accuracy of the proposed context-aware trust assessment scheme. PMID:29649267
From 'automation' to 'autonomy': the importance of trust repair in human-machine interaction.
de Visser, Ewart J; Pak, Richard; Shaw, Tyler H
2018-04-09
Modern interactions with technology are increasingly moving away from simple human use of computers as tools to the establishment of human relationships with autonomous entities that carry out actions on our behalf. In a recent commentary, Peter Hancock issued a stark warning to the field of human factors that attention must be focused on the appropriate design of a new class of technology: highly autonomous systems. In this article, we heed the warning and propose a human-centred approach directly aimed at ensuring that future human-autonomy interactions remain focused on the user's needs and preferences. By adapting literature from industrial psychology, we propose a framework to infuse a unique human-like ability, building and actively repairing trust, into autonomous systems. We conclude by proposing a model to guide the design of future autonomy and a research agenda to explore current challenges in repairing trust between humans and autonomous systems. Practitioner Summary: This paper is a call to practitioners to re-cast our connection to technology as akin to a relationship between two humans rather than between a human and their tools. To that end, designing autonomy with trust repair abilities will ensure future technology maintains and repairs relationships with their human partners.