786 resultados para trust management
Resumo:
Technologies such as smart meters and electricity feedback are becoming an increasingly compelling focus for HCI researchers in light of rising power prices and peak demand. We argue, however, that a pre-occupation with the goal of demand management has limited the scope of design for these technologies. In this paper we present our work-in-progress investigating the potential value of socially sharing electricity information as a means of broadening the scope of design for these devices. This paper outlines some preliminary findings gathered from a design workshop and a series of qualitative interviews with householders in Brisbane, Australia, regarding their attitudes towards electricity feedback and sharing consumption information. Preliminary findings suggest that; (1) the social sharing of electricity feedback information has the potential to be of value in better informing consumption decisions, however; (2) the potential for sharing may be constrained by attitudes towards privacy, trust and the possibility of misinformation being shared. We conclude by outlining ideas for our future research on this topic and invite comments on these ideas.
Resumo:
A Delay Tolerant Network (DTN) is one where nodes can be highly mobile, with long message delay times forming dynamic and fragmented networks. Traditional centralised network security is difficult to implement in such a network, therefore distributed security solutions are more desirable in DTN implementations. Establishing effective trust in distributed systems with no centralised Public Key Infrastructure (PKI) such as the Pretty Good Privacy (PGP) scheme usually requires human intervention. Our aim is to build and compare different de- centralised trust systems for implementation in autonomous DTN systems. In this paper, we utilise a key distribution model based on the Web of Trust principle, and employ a simple leverage of common friends trust system to establish initial trust in autonomous DTN’s. We compare this system with two other methods of autonomously establishing initial trust by introducing a malicious node and measuring the distribution of malicious and fake keys. Our results show that the new trust system not only mitigates the distribution of fake malicious keys by 40% at the end of the simulation, but it also improved key distribution between nodes. This paper contributes a comparison of three de-centralised trust systems that can be employed in autonomous DTN systems.
Resumo:
This article discusses the situation of income support claimants in Australia, constructed as faulty citizens and flawed welfare subjects. Many are on the receiving end of complex, multi-layered forms of surveillance aimed at securing socially responsible and compliant behaviours. In Australia, as in other Western countries, neoliberal economic regimes with their harsh and often repressive treatment of welfare recipients operate in tandem with a burgeoning and costly arsenal of CCTV and other surveillance and governance assemblages. Through a program of ‘Income Management’, initially targeting (mainly) Indigenous welfare recipients in Australia’s Northern Territory, the BasicsCard (administered by Centrelink, on behalf of the Australian Federal Government’s Department of Human Services) is one example of this welfare surveillance. The scheme operates by ‘quarantining’ a percentage of a claimant’s welfare entitlements to be spent by way of the BasicsCard on ‘approved’ items only. The BasicsCard scheme raises significant questions about whether it is possible to encourage people to take responsibility for themselves if they no longer have real control over the most important aspects of their lives. Some Indigenous communities have resisted the BasicsCard, criticising it because the imposition of income management leads to a loss of trust, dignity, and individual agency. Further, income management of individuals by the welfare state contradicts the purported aim that they become less ‘welfare dependent’ and more ‘self-reliant’. In highlighting issues around compulsory income management this paper makes a contribution to the largely under discussed area of income management and welfare surveillance, with its propensity for function creep, garnering large volumes of data on BasicsCard user’s approved (and declined) purchasing decisions, complete with dates, amounts, times and locations.
Resumo:
Remote dryland regions are characterised by sparse populations and socially marginalised voices which pose particular challenges to natural resource management. This paper considers the issue of how to achieve community engagement in regions with these characteristics. In doing so, the paper contributes to an expanding international research agenda focusing on the distinct characteristics of arid and semi-arid regions under the heading of 'dryland syndrome'. The paper draws on government liaison officer and local community perspectives of successful engagement in the case-study region of Lake Eyre Basin, Australia. The results demonstrate that widely recognised characteristics of successful engagement are required but insufficient for genuine engagement in remote dryland regions. In addition to building trust through community ownership, being inclusive, effective communication, and adequate resources, genuine community engagement in drylands also requires respecting the extreme conditions and extraordinary variability of these areas. Residents of dryland regions seek genuine engagement yet engage opportunistically when seasons are conducive and when tangible outcomes are visible. © 2011 The Authors. Geographical Research © 2011 Institute of Australian Geographers.
Resumo:
This book showcases the development and evaluation of innovative examples of pain management initiatives by advanced practitioners. It considers each service development or community initiative both in terms of advanced practice nursing and pain management. There is a wide range of examples of innovation in pain management included - from the introduction of ketamine use in one trust, to wider issues around meeting the needs of pain management in the community. The book considers issues including use of research, education and interprofessional working in the advanced practitioner role. Each chapter looks at development of the service, challenges of implementation, evaluation of the service's success and justifying the importance of the advanced nurse in the service's achievements.
Resumo:
Many activities, from disaster response to project management, require cooperation among people from multiple organizations who initially lack interpersonal relationships and trust. Upon entering inter-organizational settings, pre-existing identities and expectations, along with emergent social roles and structures, may all influence trust between colleagues. To sort out these effects, we collected time-lagged data from three cohorts of military MBA students, representing 2,224 directed dyads, shortly after they entered graduate school. Dyads that shared organizational identity, boundary-spanning roles, and similar network positions (structural equivalence) were likely to have stronger professional ties and greater trust.
Resumo:
An increasing number of countries are faced with an aging population increasingly needing healthcare services. For any e-health information system, the need for increased trust by such clients with potentially little knowledge of any security scheme involved is paramount. In addition notable scalability of any system has become a critical aspect of system design, development and ongoing management. Meanwhile cryptographic systems provide the security provisions needed for confidentiality, authentication, integrity and non-repudiation. Cryptographic key management, however, must be secure, yet efficient and effective in developing an attitude of trust in system users. Digital certificate-based Public Key Infrastructure has long been the technology of choice or availability for information security/assurance; however, there appears to be a notable lack of successful implementations and deployments globally. Moreover, recent issues with associated Certificate Authority security have damaged trust in these schemes. This paper proposes the adoption of a centralised public key registry structure, a non-certificate based scheme, for large scale e-health information systems. The proposed structure removes complex certificate management, revocation and a complex certificate validation structure while maintaining overall system security. Moreover, the registry concept may be easier for both healthcare professionals and patients to understand and trust.
Resumo:
Enterprise resource planning (ERP) systems are rapidly being combined with “big data” analytics processes and publicly available “open data sets”, which are usually outside the arena of the enterprise, to expand activity through better service to current clients as well as identifying new opportunities. Moreover, these activities are now largely based around relevant software systems hosted in a “cloud computing” environment. However, the over 50- year old phrase related to mistrust in computer systems, namely “garbage in, garbage out” or “GIGO”, is used to describe problems of unqualified and unquestioning dependency on information systems. However, a more relevant GIGO interpretation arose sometime later, namely “garbage in, gospel out” signifying that with large scale information systems based around ERP and open datasets as well as “big data” analytics, particularly in a cloud environment, the ability to verify the authenticity and integrity of the data sets used may be almost impossible. In turn, this may easily result in decision making based upon questionable results which are unverifiable. Illicit “impersonation” of and modifications to legitimate data sets may become a reality while at the same time the ability to audit any derived results of analysis may be an important requirement, particularly in the public sector. The pressing need for enhancement of identity, reliability, authenticity and audit services, including naming and addressing services, in this emerging environment is discussed in this paper. Some current and appropriate technologies currently being offered are also examined. However, severe limitations in addressing the problems identified are found and the paper proposes further necessary research work for the area. (Note: This paper is based on an earlier unpublished paper/presentation “Identity, Addressing, Authenticity and Audit Requirements for Trust in ERP, Analytics and Big/Open Data in a ‘Cloud’ Computing Environment: A Review and Proposal” presented to the Department of Accounting and IT, College of Management, National Chung Chen University, 20 November 2013.)
Resumo:
The global financial crsis, corporate failures and scandals in amny countries raise significant questions audit quality. In the UK, the FRC took the unprecedented step of codifying audit quality in its ‘Audit Quality Framework’. We analyze the extent to which audit firms, professional bodies, and investors considered the FRC proposals sufficient for addressing concerns about audit quality. Using impression management and legitimacy as a framework to analyze stakeholder responses we go beyond audit quality drivers identified by the FRC. In contrast to the drivers identified by the FRC, our focus on transparency, expertise, professionalism and commercialization of the audit shows that FRC, audit firms and professional bodies have mainly focused on issues which possibly do not pose a threat to the commercial interest of audit firms. Overall, our analysis shows that regulatory and professional bodies engaged in image management and the promotion of audit quality in an attempt to remedy tarnished image and augment their legitimacy and standing. In attempting to restore trust and legitimacy regulatory bodies, such as the FRC, have to reconcile complex often contradictory stakeholder demands.
Resumo:
This chapter analyses the copyright law framework needed to ensure open access to outputs of the Australian academic and research sector such as journal articles and theses. It overviews the new knowledge landscape, the principles of copyright law, the concept of open access to knowledge, the recently developed open content models of copyright licensing and the challenges faced in providing greater access to knowledge and research outputs.
Resumo:
Peak electricity demand requires substantial investment to update transmission, distribution and generation infrastructure. A successful community peak demand reduction project was examined to identify residential consumer motivational and contextual factors involved in their decision to adopt/not adopt interventions. Energy professionals actively worked to achieve community 'peer' membership and by becoming a trusted information source, facilitated voluntary home energy assessment requests from over 80% of the residential community. By combining and tailoring interventions to the specific needs and motivations of individual householders and the community, interventions promoting energy conservation and efficiency can be effective in achieving sustained reduction in peak demand.
Resumo:
Interest in the area of collaborative Unmanned Aerial Vehicles (UAVs) in a Multi-Agent System is growing to compliment the strengths and weaknesses of the human-machine relationship. To achieve effective management of multiple heterogeneous UAVs, the status model of the agents must be communicated to each other. This paper presents the effects on operator Cognitive Workload (CW), Situation Awareness (SA), trust and performance by increasing the autonomy capability transparency through text-based communication of the UAVs to the human agents. The results revealed a reduction in CW, increase in SA, increase in the Competence, Predictability and Reliability dimensions of trust, and the operator performance.
Resumo:
Purpose In the mainstream relationship management literature, critical appraisal of the relationship paradigm in an international setting is virtually non-existent. The extant literature reveals a gap in terms of linking relationship management theories with international management. Furthermore, little research attention has been paid to synthesise the existing theories in a cohesive manner towards developing a theoretical paradigm in the interface of the importer-supplier relationship dyad. Thus, the purpose of this paper is to strengthen the theoretical grounds of relationship marketing in an international setting in an importer-exporter relationship context. Design/methodology/approach The paper follows a comprehensive review approach and applies the fundamental theory of trust and commitment to identify the relational factors. More precisely, the paper identifies and applies other relevant theories such as internationalisation process theory, resource-based theory of the firm, dependence theory and transaction cost theory in developing an innovative theoretical paradigm. Findings Based on the integration of extant theories, this paper proposes a new direction in the theoretical realm of the trust and commitment building process within an importer and supplier relationship management paradigm. The research concludes that trust and commitment are the focal factors within the international relational paradigm. Research limitations/implications The proposed research direction suggests an emerging framework integrating mainstream theoretical variables of trust and commitment in importer and foreign-supplier context. This novel framework has the potential for use in further research. Originality/value This paper advances a grounded theoretical exploration within an international management domain in the context of importers and foreign-suppliers.
Resumo:
This paper reports on a study of the key determinants of public trust in charitable organisations, using survey data commissioned by the Australian Charities and Not-for-profits Commission. Data analysis used partial least squares structural equation modelling to examine both antecedents of trust and the influence of trust on charitable donative intentions. We found that people tend to trust charities with which they are familiar, and which are transparent in their reporting. Organisational size, importance, reputation and national significant were also antecedents of trust. People are more likely to volunteer or donate to charities they trust. The practical implications of this are that charities seeking to enhance their volunteer and donation base should pay attention to their marketing, reputation and disclosure activities, as well as to doing good work on an ongoing basis in the community. Theoretically, the implications are that transparency and reputation do not result directly in donations and volunteering, but they do create trust, and it is trust which then leads to donations and volunteering.