72 resultados para Trust receipts.
Resumo:
Algan and Cahuc (2010) argue that “inherited trust” is a key factor in explaining growth rates across countries. They derive a measure of inherited trust by linking respondents’ “home countries: in the United States General Social Survey (1972-2004) and the 2000 wave of the World Values Survey. Algan and Cahuc then estimate trust levels for people born before 1910 (inherited trust in 1935) and afterwards (inherited trust in 2000). They show a strong link between economic growth rates and inherited trust. We do not challenge this result, but we do argue that: (1) The 2000 World Values Survey has many anomalous results; (2) the estimates for inherited trust in 1935 are mostly based upon tiny samples for most ethnic heritage groups in the General Social Survey; and (3) Algan and Cahuc’s findings are based upon two-tailed rather than one-tailed tests. We reestimate their model using the more reliable waves of the World Values Survey and find much weaker relationships between inherited trust in 1935 and trust in the home country. We also suggest caution in the overall measure of inherited trust in 1935.
Resumo:
A Delay Tolerant Network (DTN) is one where nodes can be highly mobile, with long message delay times forming dynamic and fragmented networks. Traditional centralised network security is difficult to implement in such a network, therefore distributed security solutions are more desirable in DTN implementations. Establishing effective trust in distributed systems with no centralised Public Key Infrastructure (PKI) such as the Pretty Good Privacy (PGP) scheme usually requires human intervention. Our aim is to build and compare different de- centralised trust systems for implementation in autonomous DTN systems. In this paper, we utilise a key distribution model based on the Web of Trust principle, and employ a simple leverage of common friends trust system to establish initial trust in autonomous DTN’s. We compare this system with two other methods of autonomously establishing initial trust by introducing a malicious node and measuring the distribution of malicious and fake keys. Our results show that the new trust system not only mitigates the distribution of fake malicious keys by 40% at the end of the simulation, but it also improved key distribution between nodes. This paper contributes a comparison of three de-centralised trust systems that can be employed in autonomous DTN systems.
Resumo:
Trust is widely recognised as one of the key qualities that a successful leader needs to bring about change within their organization. Browning’s study aimed to identify practices which a school leader can effectively use to inspire, build, and maintain trust between themselves, their staff and Chair of governing body. The study was undertaken in two phases. Phase One was the identification of four highly trusted transformational leaders from the Australian independent schooling sector. Phase Two was a multicase study of the four school leaders. The findings provide practical advice for school leaders wishing to have a positive impact on the outcomes of the students in their school.
Resumo:
The main theme of this thesis is to allow the users of cloud services to outsource their data without the need to trust the cloud provider. The method is based on combining existing proof-of-storage schemes with distance-bounding protocols. Specifically, cloud customers will be able to verify the confidentiality, integrity, availability, fairness (or mutual non-repudiation), data freshness, geographic assurance and replication of their stored data directly, without having to rely on the word of the cloud provider.
Resumo:
Due to economic and demographic changes highly educated women play an important role on the Chinese labour market. Gender has been shown to be an important characteristic that influences behaviour in economic experiments, as have, to a lesser degree, academic major, age and income. We provide a study looking at trust and reciprocity and their determinants in a labour market laboratory experiment. Our experimental data is based on two games, the Gift Exchange Game (GEG) and a variant of this game (the Wage Promising Game, WPG) where the employer's wage offer is non-binding and the employer can choose the wage freely after observing the workers effort. We and that women are less trusting and reciprocal than men in the GEG while this cannot be found in the WPG. Letting participants play the GEG and the WPG, allows us to disentangle reciprocal and risk attitudes. While in the employer role, it seems to be that risk attitude is the main factor, this is not confirmed analysing decisions in the worker role.
Resumo:
Disagreement within the global science community about the certainty and causes of climate change has led the general public to question what to believe and who to trust on matters related to this issue. This paper reports on qualitative research undertaken with Australian residents from two rural areas to explore their perceptions of climate change and trust in information providers. While overall, residents tended to agree that climate change is a reality, perceptions varied in terms of its causes and how best to address it. Politicians, government, and the media were described as untrustworthy sources of information about climate change, with independent scientists being the most trusted. The vested interests of information providers appeared to be a key reason for their distrust. The findings highlight the importance of improved transparency and consultation with the public when communicating information about climate change and related policies.
Resumo:
In this response to Tom G. K. Bryce and Stephen P. Day’s (Cult Stud Sci Educ. doi:10.1007/s11422-013-9500-0, 2013) original article, I share with them their interest in the teaching of climate change in school science, but I widen it to include other contemporary complex socio-scientific issues that also need to be discussed. I use an alternative view of the relationship between science, technology and society, supported by evidence from both science and society, to suggest science-informed citizens as a more realistic outcome image of school science than the authors’ one of mini-scientists. The intellectual independence of students Bryce and Day assume, and intend for school science, is countered with an active intellectual dependence. It is only in relation to emerging and uncertain scientific contexts that students should be taught about scepticism, but they also need to learn when, and why to trust science as an antidote to the expressions of doubting it. Some suggestions for pedagogies that could lead to these new learnings are made. The very recent fifth report of the IPCC answers many of their concerns about climate change.
Resumo:
There is increasing evidence of a weakened platform of consumer trust in mass produced food products. The resistance shown by consumers to the agro-industrial paradigm is evident in an emergent phase of reflexive consumerism, public reactions to an overly-concentrated retail sector and the rise of alternative food networks such as farmers' markets and organic box schemes. Supermarkets are responding strategically by aiming to manufacture new trust relations with consumers. This paper identifies three key strategies of trust manufacturing: (i) reputational enhancement though the institution of “behind the scenes,” business-to-business private standards; (ii) direct quality claims via private standard certification badges on food products, and ; (iii) discursive claimsmaking through symbolic representations of “authenticity” and “tradition.” Drawing upon the food governance literature and a “visual sociology” of supermarkets and supermarket produce, we highlight how trust is both commoditized and increasingly embedded into the marketing of mass-produced foods.
Resumo:
Purpose This paper examines the relationship between flood exposure and levels of social trust among a cohort of adult men from refugee backgrounds who were affected by the 2011 Queensland floods in Australia. Design/methodology/approach A quantitative questionnaire was administered to 141 men from refugee backgrounds almost two years after the 2011 Queensland floods. The survey was administered in person by trained peer in-terviewers, and included a number of standardised instruments assessing respondents’ so-cio-demographic characteristics, levels of social trust towards and from neighbours, the police, the wider Australian community, and the media, and exposure to and impact of the floods. Multiple logistic regression analyses were used to assess the relationship between flood exposure and social trust adjusting for pre-disaster levels of trust and other potentially confounding variables. Findings Participants with higher levels of flood exposure were significantly more likely to report greater levels of trust both towards and from their neighbours, the wider Australian community, and the media, and they were also more likely to believe that most people can be trusted. Research limitations/implications Although the study reports on data collected two years after the floods, the analysis has adjusted for pre-disaster measures of social trust and other socio-demographic variables. Originality/value Our paper has highlighted the important place of social trust and social capital for refugee communities in a post-disaster setting. Disaster responses that support social capital among marginalised populations are critical to increasing community resilience and supporting recovery.
Resumo:
In this environmental scan of research and policy literature, the authors consider various definitions of trust as they seek to address and inform the hypothesis that ‘a culture of trust enhances performance’ in schools. The discussion draws on the work of the Australian Institute for Teaching and School Leadership in school leadership and research by Caldwell and Harris (2008) to consider ways in which trust is linked to performance in schools and organisations. It explores the concept of trust as a form of capital available to schools, and highlights how successful school leaders work to align trust, strategy and passion in implementing effective change. At the heart of the review is the relationship between trust and school improvement. An adapted model of the elements of a culture of trust developed by Bryk and Schneider in their influential study of trust in school reform in Chicago is used to frame this aspect of the review. The authors identify four essential categories of relationships that enable schools to be described as having a culture of trust. The review concludes with a discussion of the relationship between trust and school governance.
Resumo:
Many activities, from disaster response to project management, require cooperation among people from multiple organizations who initially lack interpersonal relationships and trust. Upon entering inter-organizational settings, pre-existing identities and expectations, along with emergent social roles and structures, may all influence trust between colleagues. To sort out these effects, we collected time-lagged data from three cohorts of military MBA students, representing 2,224 directed dyads, shortly after they entered graduate school. Dyads that shared organizational identity, boundary-spanning roles, and similar network positions (structural equivalence) were likely to have stronger professional ties and greater trust.
Resumo:
Enterprises, both public and private, have rapidly commenced using the benefits of enterprise resource planning (ERP) combined with business analytics and “open data sets” which are often outside the control of the enterprise to gain further efficiencies, build new service operations and increase business activity. In many cases, these business activities are based around relevant software systems hosted in a “cloud computing” environment. “Garbage in, garbage out”, or “GIGO”, is a term long used to describe problems in unqualified dependency on information systems, dating from the 1960s. However, a more pertinent variation arose sometime later, namely “garbage in, gospel out” signifying that with large scale information systems, such as ERP and usage of open datasets in a cloud environment, the ability to verify the authenticity of those data sets used may be almost impossible, resulting in dependence upon questionable results. Illicit data set “impersonation” becomes a reality. At the same time the ability to audit such results may be an important requirement, particularly in the public sector. This paper discusses the need for enhancement of identity, reliability, authenticity and audit services, including naming and addressing services, in this emerging environment and analyses some current technologies that are offered and which may be appropriate. However, severe limitations to addressing these requirements have been identified and the paper proposes further research work in the area.
Resumo:
An increasing number of countries are faced with an aging population increasingly needing healthcare services. For any e-health information system, the need for increased trust by such clients with potentially little knowledge of any security scheme involved is paramount. In addition notable scalability of any system has become a critical aspect of system design, development and ongoing management. Meanwhile cryptographic systems provide the security provisions needed for confidentiality, authentication, integrity and non-repudiation. Cryptographic key management, however, must be secure, yet efficient and effective in developing an attitude of trust in system users. Digital certificate-based Public Key Infrastructure has long been the technology of choice or availability for information security/assurance; however, there appears to be a notable lack of successful implementations and deployments globally. Moreover, recent issues with associated Certificate Authority security have damaged trust in these schemes. This paper proposes the adoption of a centralised public key registry structure, a non-certificate based scheme, for large scale e-health information systems. The proposed structure removes complex certificate management, revocation and a complex certificate validation structure while maintaining overall system security. Moreover, the registry concept may be easier for both healthcare professionals and patients to understand and trust.
Resumo:
Enterprise resource planning (ERP) systems are rapidly being combined with “big data” analytics processes and publicly available “open data sets”, which are usually outside the arena of the enterprise, to expand activity through better service to current clients as well as identifying new opportunities. Moreover, these activities are now largely based around relevant software systems hosted in a “cloud computing” environment. However, the over 50- year old phrase related to mistrust in computer systems, namely “garbage in, garbage out” or “GIGO”, is used to describe problems of unqualified and unquestioning dependency on information systems. However, a more relevant GIGO interpretation arose sometime later, namely “garbage in, gospel out” signifying that with large scale information systems based around ERP and open datasets as well as “big data” analytics, particularly in a cloud environment, the ability to verify the authenticity and integrity of the data sets used may be almost impossible. In turn, this may easily result in decision making based upon questionable results which are unverifiable. Illicit “impersonation” of and modifications to legitimate data sets may become a reality while at the same time the ability to audit any derived results of analysis may be an important requirement, particularly in the public sector. The pressing need for enhancement of identity, reliability, authenticity and audit services, including naming and addressing services, in this emerging environment is discussed in this paper. Some current and appropriate technologies currently being offered are also examined. However, severe limitations in addressing the problems identified are found and the paper proposes further necessary research work for the area. (Note: This paper is based on an earlier unpublished paper/presentation “Identity, Addressing, Authenticity and Audit Requirements for Trust in ERP, Analytics and Big/Open Data in a ‘Cloud’ Computing Environment: A Review and Proposal” presented to the Department of Accounting and IT, College of Management, National Chung Chen University, 20 November 2013.)