721 resultados para Trust in go
Resumo:
The current paper presents a qualitadve study of the role of different sources of communicadon in reducing change-related uncertaintj' experienced by employees during organisadonal change. The paper examines the role of trust in influencing how employees' appraise informadon from different sources within organisadons. Interviews with 19 employees from a range of organisadons idendfy the different types of change-related uncertaindes experienced during change. In addidon, the different sources of communicadon utilised by employees are idendfied and the role each source plays in reducing the different t}'pes of uncertaint}' invesdgated. From employee responses it is evident that t)'pically supervisors are the best source of change informadon, while communicadon from senior management usually focuses on strategic issues. Employees indicate that communicadon with coworkers operates as a support mechanism providing an avenue to share grievances arising from the change. Finally, trust is idendfied as playing an important role in influencing who employees go to for informadon when experiencing uncertainty'. ImpUcadons for change management research in addidon to pracdcal implicadons are discussed.
Resumo:
Knowledge is a powerful organisational asset yet intangible and hard to manage, particularly in a project environment where there is a tendency to repeat the same mistakes rather than learn from previous project lessons. A lack of effective knowledge sharing across projects causes reinventions that are costly, and time consuming. Research on knowledge transfer has focused mainly on functional organisations and only recent attention has been directed towards knowledge transfer in projects. Furthermore, there is little evidence in the literature which examines trust in the knowledge transfer processes. This paper studies how the three types of trust - ability, benevolence, and integrity impact on knowledge transfer from the inter-project perspective. Three case studies investigated the matter. A detailed description of the work undertaken and an analysis of interviews with project professionals from large project-based organisations are presented in this paper. The key finding identifies the positive impact of ability trust on knowledge transfer. However, it was also found that perception on both integrity and benevolence varied across organisations suggesting that there can be a possible impact of organisational factors on the way trust is perceived in inter-project knowledge transfer. The paper concludes with a discussion and recommendations regarding the development of trust for inter-project environment.
Resumo:
In recent years, there is a dramatic growth in number and popularity of online social networks. There are many networks available with more than 100 million registered users such as Facebook, MySpace, QZone, Windows Live Spaces etc. People may connect, discover and share by using these online social networks. The exponential growth of online communities in the area of social networks attracts the attention of the researchers about the importance of managing trust in online environment. Users of the online social networks may share their experiences and opinions within the networks about an item which may be a product or service. The user faces the problem of evaluating trust in a service or service provider before making a choice. Recommendations may be received through a chain of friends network, so the problem for the user is to be able to evaluate various types of trust opinions and recommendations. This opinion or recommendation has a great influence to choose to use or enjoy the item by the other user of the community. Collaborative filtering system is the most popular method in recommender system. The task in collaborative filtering is to predict the utility of items to a particular user based on a database of user rates from a sample or population of other users. Because of the different taste of different people, they rate differently according to their subjective taste. If two people rate a set of items similarly, they share similar tastes. In the recommender system, this information is used to recommend items that one participant likes, to other persons in the same cluster. But the collaborative filtering system performs poor when there is insufficient previous common rating available between users; commonly known as cost start problem. To overcome the cold start problem and with the dramatic growth of online social networks, trust based approach to recommendation has emerged. This approach assumes a trust network among users and makes recommendations based on the ratings of the users that are directly or indirectly trusted by the target user.
Resumo:
Significant empirical data from the fields of management and business strategy suggest that it is a good idea for a company to make in-house the components and processes underpinning a new technology. Other evidence suggests exactly the opposite, saying that firms would be better off buying components and processes from outside suppliers. One possible explanation for this lack of convergence is that earlier research in this area has overlooked two important aspects of the problem: reputation and trust. To gain insight into how these variables may impact make-buy decisions throughout the innovation process, the Sporas algorithm for measuring reputation was added to an existing agent-based model of how firms interact with each other throughout the development of new technologies. The model�s results suggest that reputation and trust do not play a significant role in the long-term fortunes of an individual firm as it contends with technological change in the marketplace. Accordingly, this model serves as a cue for management researchers to investigate more thoroughly the temporal limitations and contingencies that determine how the trust between firms may affect the R&D process.
Resumo:
A Delay Tolerant Network (DTN) is one where nodes can be highly mobile, with long message delay times forming dynamic and fragmented networks. Traditional centralised network security is difficult to implement in such a network, therefore distributed security solutions are more desirable in DTN implementations. Establishing effective trust in distributed systems with no centralised Public Key Infrastructure (PKI) such as the Pretty Good Privacy (PGP) scheme usually requires human intervention. Our aim is to build and compare different de- centralised trust systems for implementation in autonomous DTN systems. In this paper, we utilise a key distribution model based on the Web of Trust principle, and employ a simple leverage of common friends trust system to establish initial trust in autonomous DTN’s. We compare this system with two other methods of autonomously establishing initial trust by introducing a malicious node and measuring the distribution of malicious and fake keys. Our results show that the new trust system not only mitigates the distribution of fake malicious keys by 40% at the end of the simulation, but it also improved key distribution between nodes. This paper contributes a comparison of three de-centralised trust systems that can be employed in autonomous DTN systems.
Resumo:
The main theme of this thesis is to allow the users of cloud services to outsource their data without the need to trust the cloud provider. The method is based on combining existing proof-of-storage schemes with distance-bounding protocols. Specifically, cloud customers will be able to verify the confidentiality, integrity, availability, fairness (or mutual non-repudiation), data freshness, geographic assurance and replication of their stored data directly, without having to rely on the word of the cloud provider.
Resumo:
Disagreement within the global science community about the certainty and causes of climate change has led the general public to question what to believe and who to trust on matters related to this issue. This paper reports on qualitative research undertaken with Australian residents from two rural areas to explore their perceptions of climate change and trust in information providers. While overall, residents tended to agree that climate change is a reality, perceptions varied in terms of its causes and how best to address it. Politicians, government, and the media were described as untrustworthy sources of information about climate change, with independent scientists being the most trusted. The vested interests of information providers appeared to be a key reason for their distrust. The findings highlight the importance of improved transparency and consultation with the public when communicating information about climate change and related policies.
Resumo:
Many activities, from disaster response to project management, require cooperation among people from multiple organizations who initially lack interpersonal relationships and trust. Upon entering inter-organizational settings, pre-existing identities and expectations, along with emergent social roles and structures, may all influence trust between colleagues. To sort out these effects, we collected time-lagged data from three cohorts of military MBA students, representing 2,224 directed dyads, shortly after they entered graduate school. Dyads that shared organizational identity, boundary-spanning roles, and similar network positions (structural equivalence) were likely to have stronger professional ties and greater trust.
Resumo:
Enterprises, both public and private, have rapidly commenced using the benefits of enterprise resource planning (ERP) combined with business analytics and “open data sets” which are often outside the control of the enterprise to gain further efficiencies, build new service operations and increase business activity. In many cases, these business activities are based around relevant software systems hosted in a “cloud computing” environment. “Garbage in, garbage out”, or “GIGO”, is a term long used to describe problems in unqualified dependency on information systems, dating from the 1960s. However, a more pertinent variation arose sometime later, namely “garbage in, gospel out” signifying that with large scale information systems, such as ERP and usage of open datasets in a cloud environment, the ability to verify the authenticity of those data sets used may be almost impossible, resulting in dependence upon questionable results. Illicit data set “impersonation” becomes a reality. At the same time the ability to audit such results may be an important requirement, particularly in the public sector. This paper discusses the need for enhancement of identity, reliability, authenticity and audit services, including naming and addressing services, in this emerging environment and analyses some current technologies that are offered and which may be appropriate. However, severe limitations to addressing these requirements have been identified and the paper proposes further research work in the area.
Resumo:
Enterprise resource planning (ERP) systems are rapidly being combined with “big data” analytics processes and publicly available “open data sets”, which are usually outside the arena of the enterprise, to expand activity through better service to current clients as well as identifying new opportunities. Moreover, these activities are now largely based around relevant software systems hosted in a “cloud computing” environment. However, the over 50- year old phrase related to mistrust in computer systems, namely “garbage in, garbage out” or “GIGO”, is used to describe problems of unqualified and unquestioning dependency on information systems. However, a more relevant GIGO interpretation arose sometime later, namely “garbage in, gospel out” signifying that with large scale information systems based around ERP and open datasets as well as “big data” analytics, particularly in a cloud environment, the ability to verify the authenticity and integrity of the data sets used may be almost impossible. In turn, this may easily result in decision making based upon questionable results which are unverifiable. Illicit “impersonation” of and modifications to legitimate data sets may become a reality while at the same time the ability to audit any derived results of analysis may be an important requirement, particularly in the public sector. The pressing need for enhancement of identity, reliability, authenticity and audit services, including naming and addressing services, in this emerging environment is discussed in this paper. Some current and appropriate technologies currently being offered are also examined. However, severe limitations in addressing the problems identified are found and the paper proposes further necessary research work for the area. (Note: This paper is based on an earlier unpublished paper/presentation “Identity, Addressing, Authenticity and Audit Requirements for Trust in ERP, Analytics and Big/Open Data in a ‘Cloud’ Computing Environment: A Review and Proposal” presented to the Department of Accounting and IT, College of Management, National Chung Chen University, 20 November 2013.)
Resumo:
This paper reports on a study of the key determinants of public trust in charitable organisations, using survey data commissioned by the Australian Charities and Not-for-profits Commission. Data analysis used partial least squares structural equation modelling to examine both antecedents of trust and the influence of trust on charitable donative intentions. We found that people tend to trust charities with which they are familiar, and which are transparent in their reporting. Organisational size, importance, reputation and national significant were also antecedents of trust. People are more likely to volunteer or donate to charities they trust. The practical implications of this are that charities seeking to enhance their volunteer and donation base should pay attention to their marketing, reputation and disclosure activities, as well as to doing good work on an ongoing basis in the community. Theoretically, the implications are that transparency and reputation do not result directly in donations and volunteering, but they do create trust, and it is trust which then leads to donations and volunteering.