966 resultados para inter-partner trust
Resumo:
In this response to Tom G. K. Bryce and Stephen P. Day’s (Cult Stud Sci Educ. doi:10.1007/s11422-013-9500-0, 2013) original article, I share with them their interest in the teaching of climate change in school science, but I widen it to include other contemporary complex socio-scientific issues that also need to be discussed. I use an alternative view of the relationship between science, technology and society, supported by evidence from both science and society, to suggest science-informed citizens as a more realistic outcome image of school science than the authors’ one of mini-scientists. The intellectual independence of students Bryce and Day assume, and intend for school science, is countered with an active intellectual dependence. It is only in relation to emerging and uncertain scientific contexts that students should be taught about scepticism, but they also need to learn when, and why to trust science as an antidote to the expressions of doubting it. Some suggestions for pedagogies that could lead to these new learnings are made. The very recent fifth report of the IPCC answers many of their concerns about climate change.
Resumo:
There is increasing evidence of a weakened platform of consumer trust in mass produced food products. The resistance shown by consumers to the agro-industrial paradigm is evident in an emergent phase of reflexive consumerism, public reactions to an overly-concentrated retail sector and the rise of alternative food networks such as farmers' markets and organic box schemes. Supermarkets are responding strategically by aiming to manufacture new trust relations with consumers. This paper identifies three key strategies of trust manufacturing: (i) reputational enhancement though the institution of “behind the scenes,” business-to-business private standards; (ii) direct quality claims via private standard certification badges on food products, and ; (iii) discursive claimsmaking through symbolic representations of “authenticity” and “tradition.” Drawing upon the food governance literature and a “visual sociology” of supermarkets and supermarket produce, we highlight how trust is both commoditized and increasingly embedded into the marketing of mass-produced foods.
Resumo:
Purpose This paper examines the relationship between flood exposure and levels of social trust among a cohort of adult men from refugee backgrounds who were affected by the 2011 Queensland floods in Australia. Design/methodology/approach A quantitative questionnaire was administered to 141 men from refugee backgrounds almost two years after the 2011 Queensland floods. The survey was administered in person by trained peer in-terviewers, and included a number of standardised instruments assessing respondents’ so-cio-demographic characteristics, levels of social trust towards and from neighbours, the police, the wider Australian community, and the media, and exposure to and impact of the floods. Multiple logistic regression analyses were used to assess the relationship between flood exposure and social trust adjusting for pre-disaster levels of trust and other potentially confounding variables. Findings Participants with higher levels of flood exposure were significantly more likely to report greater levels of trust both towards and from their neighbours, the wider Australian community, and the media, and they were also more likely to believe that most people can be trusted. Research limitations/implications Although the study reports on data collected two years after the floods, the analysis has adjusted for pre-disaster measures of social trust and other socio-demographic variables. Originality/value Our paper has highlighted the important place of social trust and social capital for refugee communities in a post-disaster setting. Disaster responses that support social capital among marginalised populations are critical to increasing community resilience and supporting recovery.
Resumo:
In order to dynamically reduce voltage unbalance along a low voltage distribution feeder, a smart residential load transfer system is discussed. In this scheme, residential loads can be transferred from one phase to another to minimize the voltage unbalance along the feeder. Each house is supplied through a static transfer switch and a controller. The master controller, installed at the transformer, observes the power consumption in each house and will determine which house(s) should be transferred from an initially connected phase to another in order to keep the voltage unbalance minimum. The performance of the smart load transfer scheme is demonstrated by simulations.
Resumo:
In this environmental scan of research and policy literature, the authors consider various definitions of trust as they seek to address and inform the hypothesis that ‘a culture of trust enhances performance’ in schools. The discussion draws on the work of the Australian Institute for Teaching and School Leadership in school leadership and research by Caldwell and Harris (2008) to consider ways in which trust is linked to performance in schools and organisations. It explores the concept of trust as a form of capital available to schools, and highlights how successful school leaders work to align trust, strategy and passion in implementing effective change. At the heart of the review is the relationship between trust and school improvement. An adapted model of the elements of a culture of trust developed by Bryk and Schneider in their influential study of trust in school reform in Chicago is used to frame this aspect of the review. The authors identify four essential categories of relationships that enable schools to be described as having a culture of trust. The review concludes with a discussion of the relationship between trust and school governance.
Resumo:
Enterprises, both public and private, have rapidly commenced using the benefits of enterprise resource planning (ERP) combined with business analytics and “open data sets” which are often outside the control of the enterprise to gain further efficiencies, build new service operations and increase business activity. In many cases, these business activities are based around relevant software systems hosted in a “cloud computing” environment. “Garbage in, garbage out”, or “GIGO”, is a term long used to describe problems in unqualified dependency on information systems, dating from the 1960s. However, a more pertinent variation arose sometime later, namely “garbage in, gospel out” signifying that with large scale information systems, such as ERP and usage of open datasets in a cloud environment, the ability to verify the authenticity of those data sets used may be almost impossible, resulting in dependence upon questionable results. Illicit data set “impersonation” becomes a reality. At the same time the ability to audit such results may be an important requirement, particularly in the public sector. This paper discusses the need for enhancement of identity, reliability, authenticity and audit services, including naming and addressing services, in this emerging environment and analyses some current technologies that are offered and which may be appropriate. However, severe limitations to addressing these requirements have been identified and the paper proposes further research work in the area.
Resumo:
An increasing number of countries are faced with an aging population increasingly needing healthcare services. For any e-health information system, the need for increased trust by such clients with potentially little knowledge of any security scheme involved is paramount. In addition notable scalability of any system has become a critical aspect of system design, development and ongoing management. Meanwhile cryptographic systems provide the security provisions needed for confidentiality, authentication, integrity and non-repudiation. Cryptographic key management, however, must be secure, yet efficient and effective in developing an attitude of trust in system users. Digital certificate-based Public Key Infrastructure has long been the technology of choice or availability for information security/assurance; however, there appears to be a notable lack of successful implementations and deployments globally. Moreover, recent issues with associated Certificate Authority security have damaged trust in these schemes. This paper proposes the adoption of a centralised public key registry structure, a non-certificate based scheme, for large scale e-health information systems. The proposed structure removes complex certificate management, revocation and a complex certificate validation structure while maintaining overall system security. Moreover, the registry concept may be easier for both healthcare professionals and patients to understand and trust.
Resumo:
Enterprise resource planning (ERP) systems are rapidly being combined with “big data” analytics processes and publicly available “open data sets”, which are usually outside the arena of the enterprise, to expand activity through better service to current clients as well as identifying new opportunities. Moreover, these activities are now largely based around relevant software systems hosted in a “cloud computing” environment. However, the over 50- year old phrase related to mistrust in computer systems, namely “garbage in, garbage out” or “GIGO”, is used to describe problems of unqualified and unquestioning dependency on information systems. However, a more relevant GIGO interpretation arose sometime later, namely “garbage in, gospel out” signifying that with large scale information systems based around ERP and open datasets as well as “big data” analytics, particularly in a cloud environment, the ability to verify the authenticity and integrity of the data sets used may be almost impossible. In turn, this may easily result in decision making based upon questionable results which are unverifiable. Illicit “impersonation” of and modifications to legitimate data sets may become a reality while at the same time the ability to audit any derived results of analysis may be an important requirement, particularly in the public sector. The pressing need for enhancement of identity, reliability, authenticity and audit services, including naming and addressing services, in this emerging environment is discussed in this paper. Some current and appropriate technologies currently being offered are also examined. However, severe limitations in addressing the problems identified are found and the paper proposes further necessary research work for the area. (Note: This paper is based on an earlier unpublished paper/presentation “Identity, Addressing, Authenticity and Audit Requirements for Trust in ERP, Analytics and Big/Open Data in a ‘Cloud’ Computing Environment: A Review and Proposal” presented to the Department of Accounting and IT, College of Management, National Chung Chen University, 20 November 2013.)
Resumo:
Trust is widely recognized as one of the key qualities that a successful leader needs to bring about change within his/her organization. Literature has also shown that trust plays a pivotal role in effective school leadership. However, little research has been undertaken to identify specific actions of a transformational school leader enabling him/her to develop purposeful relationships of trust with his/her staff and Chair of the school’s governing body. Using a theoretical framework of transformational leadership in the context of the independent schooling sector in Australia, a multicase study of four highly trusted, transformational school leaders revealed 10 key trust building practices in the Head–staff dyad and three practices in the Head–Chair dyad. These practices were independent of the leader’s personal attributes. The study also revealed an inextricable link between trust and transformational leadership.
Resumo:
In this report, what is known about human trafficking involving marriage and partner migration to Australia is described, drawing on primary information obtained from victim/survivor testimonies, stakeholder knowledge and expertise, and reported cases that progressed through the Australian justice system. It confirms what some stakeholders in the human trafficking area have long suspected—that marriage and partner migration have been used to facilitate the trafficking of people into Australia.
Resumo:
Among the processes contributing to the progressive acquisition of the highly malignant phenotype in breast cancer are ovarian-independent growth, antioestrogen resistance and increased metastatic potential. We have previously observed that increased invasiveness and development of ovarian-independent growth occur independently. In an attempt to define the inter-relationships between these processes further, we have compared the phenotypes of ovarian-independent, invasive and antioestrogen-resistant sublines of the ovarian-dependent human breast cancer cell line MCF-7. Cells acquiring ovarian-independent growth can retain sensitivity to anti-oestrogens. One clone of MCF-7 cells selected for stable antioestrogen resistance has become non-tumorigenic but its invasive potential remains unaltered. Thus, acquisitions of some characteristics of the progressed phenotype can occur independently. This phenomenon of independent parameters in phenotypic progression could partly explain the considerable intra- and intertumour heterogeneity characteristic of breast tumours.
Resumo:
This project is a breakthrough in developing new scientific approaches for the design, development and evaluation of inter-vehicle communications, networking and positioning systems as part of Cooperative Intelligent Transportation Systems ensuring the safety of both roads and rail networks. This research focused on the elicitation, specification, analysis and validation of requirements for Vehicle-to-Vehicle communications and networking, and Vehicle-to-Vehicle positioning, which are accomplished with the research platform developed for this study. A number of mathematical models for communications, networking and positioning were developed from which simulations and field experiments were conducted to evaluate the overall performance of the platform. The outcomes of this research significantly contribute to improving the performance of the communications and positioning components of Cooperative Intelligent Transportation Systems.
Resumo:
Passively protected railway crossings are a major rail safety issue in Australia. Such crossings cannot be upgraded as such crossings are too numerous and the cost involved is prohibitive. Advanced Driver Assistance Systems (ADAS) have been shown to improve road safety and are widely used. These systems could be a solution to improve safety of passively protected crossings at a lower cost. Such complementary ADAS could result in driver’s over-trust due to the absence of Humane Machine Interface reflecting the quality of the information or the state of the ADAS (failure status). This paper demonstrates that driver’s exposure to crossing exhibiting fail-safe and non-fail safe properties could result in improperly allocating trust between technologies. We conducted a driving simulator study where participants (N=58) were exposed to three types of level crossing warning system on passive and active crossings. The results show that a significant proportion of participants over-trust the ADAS. Such drivers exhibit the same driving performance with the ADAS as when exposed to infrastructure based active crossing protection. They do not take the necessary safety precautions as they have a faster speed approach, reduced number of gaze toward the rail tracks and fail to stop at the crossing.
Resumo:
This article examines important insurance and trust law issues that may confront trustees charged with the governance and protection of unique properties with broad community and heritage significance. Often trustee roles are assumed by community leaders without full appreciation of the potential difficulties and consequences when unforeseen circumstances arise. Three recent New Zealand court decisions in relation to the deconstruction and repair of the Christchurch Cathedral and to the interim construction of a transitional"cardboard Cathedral" highlight how difficult - and legally exposed - the role of trustee can be. The Cathedral cases go to the heart of defining the core purpose for which a Trust is created and examine the scope of discretion in fulfilling this charge its Trustees carry. Arising in the wake of the devastating Christchurch earthquakes, the Cathedral's Trustees were called upon to consider the best directions forward for a criplled and dangerous building subject to potential demolition, the wellbeing of the Cathedral's direct community, and the broader heritage and identity factors that this 'heart' of Christchurch represented. In the context of a seemingly grossly underinsured material damage cover - and faced with broader losses across the Diocese's holdings - the Trustees found that their sense of mission failed to gel with that of a community-based heritage buildings preservation trust. The High Court had to consider how monies received under the material damage policy could be applied by the Trustee in deconstructing, reinstating or repairing the Cathedral and if monies could be partly deployed to create an interim solution in the former of a transitional cathedral - all this in the context of the site-specific purpose of the Cathedral trust. The cases emphasise further the need to assess professionally the nature and quantum of cover effected to protect against various risks. In addition, in the case of historic or unusual buildings extra care must be exercised to take account additional costs associated with reinstatement so as to substantially retain the character and intrinsic value of such properties.