989 resultados para Cognitive trust
Resumo:
It is widely documented that nurses experience work-related stress [Quine, L., 1998. Effects of stress in an NHS trust: a study. Nursing Standard 13 (3), 36-41; Charnley, E., 1999. Occupational stress in the newly qualified staff nurse. Nursing Standard 13 (29), 32-37; McGrath, A., Reid, N., Boore, J., 2003. Occupational stress in nursing. International Journal of Nursing Studies 40, 555-565; McVicar, A., 2003. Workplace stress in nursing: a literature review. Journal of Advanced Nursing 44 (6), 633-642; Bruneau, B., Ellison, G., 2004. Palliative care stress in a UK community hospital: evaluation of a stress-reduction programme. International Journal of Palliative Nursing 10 (6), 296-304; Jenkins, R., Elliott, P., 2004. Stressors, burnout and social support: nurses in acute mental health settings. Journal of Advanced Nursing 48 (6), 622-631], with cancer nursing being identified as a particularly stressful occupation [Hinds, P.S., Sanders, C.B., Srivastava, D.K., Hickey, S., Jayawardene, D., Milligan, M., Olsen, M.S., Puckett, P., Quargnenti, A., Randall, E.A., Tyc, V., 1998. Testing the stress-response sequence model in paediatric oncology nursing. Journal of Advanced Nursing 28 (5), 1146-1157; Barnard, D., Street, A., Love, A.W., 2006. Relationships between stressors, work supports and burnout among cancer nurses. Cancer Nursing 29 (4), 338-345]. Terminologies used to capture this stress are burnout [Pines, A.M., and Aronson, E., 1988. Career Burnout: Causes and Cures. Free Press, New York], compassion stress [Figley, C.R., 1995. Compassion Fatigue. Brunner/Mazel, New York], emotional contagion [Miller, K.I., Stiff, J.B., Ellis, B.H., 1988. Communication and empathy as precursors to burnout among human service workers. Communication Monographs 55 (9), 336-341] or simply the cost of caring (Figley, 1995). However, in the mental health field such as psychology and counselling, there is terminology used to captivate this impact, vicarious traumatisation. Vicarious traumatisation is a process through which the therapist's inner experience is negatively transformed through empathic engagement with client's traumatic material [Pearlman, L.A., Saakvitne, K.W., 1995a. Treating therapists with vicarious traumatization and secondary traumatic stress disorders. In: Figley, C.R. (Ed.), Compassion Fatigue: Coping with Secondary Traumatic Stress Disorder in Those Who Treat the Traumatized. Brunner/Mazel, New York, pp. 150-177]. Trauma not only affects individuals who are primarily present, but also those with whom they discuss their experience. If an individual has been traumatised as a result of a cancer diagnosis and shares this impact with oncology nurses, there could be a risk of vicarious traumatisation in this population. However, although Thompson [2003. Vicarious traumatisation: do we adequately support traumatised staff? The Journal of Cognitive Rehabilitation 24-25] suggests that vicarious traumatisation is a broad term used for workers from any profession, it has not yet been empirically determined if oncology nurses experience vicarious traumatisation. This purpose of this paper is to introduce the concept of vicarious traumatisation and argue that it should be explored in oncology nursing. The review will highlight that empirical research in vicarious traumatisation is largely limited to the mental health professions, with a strong recommendation for the need to empirically determine whether this concept exists in oncology nursing.
Resumo:
We consider transmit antenna selection (TAS) in cognitive multiple-input multiple-output (MIMO) relay networks, as an interference-aware design for secondary users (SUs) to ensure power and interference constraints of multiple primary users (PUs). In doing so, we derive new exact and asymptotic expressions for the outage probability of TAS with maximal ratio combining (TAS/MRC) and with selection combining (TAS/SC) over Rayleigh fading. The proposed analysis and simulations highlight that TAS/MRC and TAS/SC with decode-and-forward relaying achieve the same diversity order in cognitive MIMO networks, which scales with the minimum number of antennas at the SUs. Furthermore, we accurately characterize the outage gap between TAS/MRC and TAS/SC relaying as a concise ratio of their array gains.
Resumo:
This letter proposes several relay selection policies for secure communication in cognitive decode-and-forward (DF) relay networks, where a pair of cognitive relays are opportunistically selected for security protection against eavesdropping. The first relay transmits the secrecy information to the destination,
and the second relay, as a friendly jammer, transmits the jamming signal to confound the eavesdropper. We present new exact closed-form expressions for the secrecy outage probability. Our analysis and simulation results strongly support our conclusion that the proposed relay selection policies can enhance the performance of secure cognitive radio. We also confirm that the error floor phenomenon is created in the absence of jamming.
Resumo:
Cognitive radio has emerged as an essential recipe for future high-capacity high-coverage multi-tier hierarchical networks. Securing data transmission in these networks is of utmost importance. In this paper, we consider the cognitive wiretap channel and propose multiple antennas to secure the transmission at the physical layer, where the eavesdropper overhears the transmission from the secondary transmitter to the secondary receiver. The secondary receiver and the eavesdropper are equipped with multiple antennas, and passive eavesdropping is considered where the channel state information of the eavesdropper’s channel is not available at the secondary transmitter. We present new closedform expressions for the exact and asymptotic secrecy outage probability. Our results reveal the impact of the primary network on the secondary network in the presence of a multi-antenna wiretap channel.
Resumo:
In this paper, we analyze the performance of cognitive amplify-and-forward (AF) relay networks with beamforming under the peak interference power constraint of the primary user (PU). We focus on the scenario that beamforming is applied at the multi-antenna secondary transmitter and receiver. Also, the secondary relay network operates in channel state information-assisted AF mode, and the signals undergo independent Nakagami-m fading. In particular, closed-form expressions for the outage probability and symbol error rate (SER) of the considered network over Nakagami-m fading are presented. More importantly, asymptotic closed-form expressions for the outage probability and SER are derived. These tractable closed-form expressions for the network performance readily enable us to evaluate and examine the impact of network parameters on the system performance. Specifically, the impact of the number of antennas, the fading severity parameters, the channel mean powers, and the peak interference power is addressed. The asymptotic analysis manifests that the peak interference power constraint imposed on the secondary relay network has no effect on the diversity gain. However, the coding gain is affected by the fading parameters of the links from the primary receiver to the secondary relay network
Resumo:
In this paper, we investigate secure device-to-device (D2D) communication in energy harvesting large-scale cognitive cellular networks. The energy constrained D2D transmitter harvests energy from multi-antenna equipped power beacons (PBs), and communicates with the corresponding receiver using the spectrum of the cellular base stations (BSs). We introduce a power transfer model and an information signal model to enable wireless energy harvesting and secure information transmission. In the power transfer model, we propose a new power transfer policy, namely, best power beacon (BPB) power transfer. To characterize the power transfer reliability of the proposed policy, we derive new closed-form expressions for the exact power outage probability and the asymptotic power outage probability with large antenna arrays at PBs. In the information signal model, we present a new comparative framework with two receiver selection schemes: 1) best receiver selection (BRS), and 2) nearest receiver selection (NRS). To assess the secrecy performance, we derive new expressions for the secrecy throughput considering the two receiver selection schemes using the BPB power transfer policies. We show that secrecy performance improves with increasing densities of PBs and D2D receivers because of a larger multiuser diversity gain. A pivotal conclusion is reached that BRS achieves better secrecy performance than NRS but demands more instantaneous feedback and overhead.
Resumo:
A multiuser scheduling multiple-input multiple-output (MIMO) cognitive radio network (CRN) with space-time block coding (STBC) is considered in this paper, where one secondary base station (BS) communicates with one secondary user (SU) selected from K candidates. The joint impact of imperfect channel state information (CSI) in BS → SUs and BS → PU due to channel estimation errors and feedback delay on the outage performance is firstly investigated. We obtain the exact outage probability expressions for the considered network under the peak interference power IP at PU and maximum transmit power Pm at BS which cover perfect/imperfect CSI scenarios in BS → SUs and BS → PU. In addition, asymptotic expressions of outage probability in high SNR region are also derived from which we obtain several important insights into the system design. For example, only with perfect CSIs in BS → SUs, i.e., without channel estimation errors and feedback delay, the multiuser diversity can be exploited. Finally, simulation results confirm the correctness of our analysis.
Resumo:
We consider transmit antenna selection with receive generalized selection combining (TAS/GSC) for cognitive decodeand-forward (DF) relaying in Nakagami-m fading channels. In an effort to assess the performance, the probability density function and the cumulative distribution function of the endto-end SNR are derived using the moment generating function, from which new exact closed-form expressions for the outage probability and the symbol error rate are derived. We then derive a new closed-form expression for the ergodic capacity. More importantly, by deriving the asymptotic expressions for the outage probability and the symbol error rate, as well as the high SNR approximations of the ergodic capacity, we establish new design insights under the two distinct constraint scenarios: 1) proportional interference power constraint, and 2) fixed interference power constraint. Several pivotal conclusions are reached. For the first scenario, the full diversity order of the
outage probability and the symbol error rate is achieved, and the high SNR slope of the ergodic capacity is 1/2. For the second scenario, the diversity order of the outage probability and the symbol error rate is zero with error floors, and the high SNR slope of the ergodic capacity is zero with capacity ceiling.
Resumo:
The effects of e-commerce institutional mechanisms on trust and online purchase have traditionally been understood in the initial online purchase context. This study extends this literature by exploring the role of e-commerce institutional mechanisms in the online repurchase context. In doing so, it responds to the emerging call for understanding the institutional context under which customer trust operates in an e-commerce environment. Specifically, this study introduces a key moderator, perceived effectiveness of e-commerce institutional mechanisms (PEEIM), to the relationships between trust, satisfaction, and repurchase intention. Drawing on the theory of organizational trust, and based on a survey of 362 returning online customers, we find that PEEIM negatively moderates the relationship between trust in an online vendor and online customer repurchase intention, as it decreases the importance of trust to promoting repurchase behavior. We also find that PEEIM positively moderates the relationship between customer satisfaction and trust as it enhances the customer’s reliance on past transaction experience with the vendor to reevaluate trust in the vendor. Consistent with the predictions made in the literature, PEEIM does not directly affect trust or repurchase intention. Academic and practical implications and future research directions are discussed.
Resumo:
Special Joint Issue - Irish Marketing Review and Journal of the Korean Academy of Marketing Science