763 resultados para trust account money in dispute
Resumo:
Mode of access: Internet.
Resumo:
Thesis (Master's)--University of Washington, 2016-06
Resumo:
This paper concerns the problem of agent trust in an electronic market place. We maintain that agent trust involves making decisions under uncertainty and therefore the phenomenon should be modelled probabilistically. We therefore propose a probabilistic framework that models agent interactions as a Hidden Markov Model (HMM). The observations of the HMM are the interaction outcomes and the hidden state is the underlying probability of a good outcome. The task of deciding whether to interact with another agent reduces to probabilistic inference of the current state of that agent given all previous interaction outcomes. The model is extended to include a probabilistic reputation system which involves agents gathering opinions about other agents and fusing them with their own beliefs. Our system is fully probabilistic and hence delivers the following improvements with respect to previous work: (a) the model assumptions are faithfully translated into algorithms; our system is optimal under those assumptions, (b) It can account for agents whose behaviour is not static with time (c) it can estimate the rate with which an agent's behaviour changes. The system is shown to significantly outperform previous state-of-the-art methods in several numerical experiments. Copyright © 2010, International Foundation for Autonomous Agents and Multiagent Systems (www.ifaamas.org). All rights reserved.
Resumo:
The Internet’s unbounded opportunity for inter-firm exchanges is limited by concerns about trust, however, little is known about the development and formation of trust in the area of electronic business-to-business relationships. Drawing on existing research the aim of paper is to explore differences arising between trust in the traditional and in the electronic business to business relationship. In addition, an overall research framework is developed which links trust formation to three dimensions: the type of interaction, the stage of the relationship lifecycle and the type of transacting organizations. These dimensions are further examined in different relationship scenarios. Finally, implications for the agri-food industry are examined.
Resumo:
Kisebb bizonytalankodás után a legtöbb közgazdászhallgató a pénz funkcióinak felsorolásába kezd, ha megkérdezik, hogyan határozná meg a pénz fogalmát. A gyakorlatiasabb, vagy a számvitel iránt elkötelezettebb diákok esetleg felidézik a banki mérleget és – részben helyesen – a pénzt kötelezettségként helyezik el benne. Mintha azonban még mindig egy kicsit pironkodnánk, hogy nem találjuk a megfelelő definíciót. És ez már így megy évszázadok óta. Jelen tanulmányban két XIX. századi közgazdász – Karl Marx és Karl Menger – néhány pénzelméleti következtetését igyekszem összehasonlítani, figyelembe véve az általuk képviselt közgazdasági elmélet alapvető eltéréseit. A mára általánosan elfogadottá váló szubjektív értékelmélet és a kissé elfeledett munkaérték-elmélet látszólag teljesen eltérő feltevéseire alapozva a két gondolkodó egészen hasonló eredményre jutott. Számukra a pénz nem egy egyszerű eszköz, sem követelés és kötelezettség, ahogyan most elkönyvelnénk, hanem áru. Eredetét nem állami törvényekből vezetik le, hanem társadalmi konszenzus során létrejött jelenségnek tekintik a pénzt, ami fölötte áll a törvényeknek, eredendően nem jelképet testesít meg, hanem különleges jószágként válik alkalmassá értékjel kifejezésére. / === / If being asked how to define money most students of economics would start listing the functions of money, or those students with more practical insight would place money as liability in the balance sheet of banks. It seems, however, as if we were still embarrassed by not finding the right definition. In the present study I am endeavouring to give a brief overview of various theoretical findings on the essence of money in the economy preceding the 19th century and then compare some money theoretical conclusions of two economists – Karl Marx and Karl Menger – considering the major differences of the economic theories represented by them. On the basis of the premises of the widely accepted subjective value theory and the somewhat forgotten labour theory of value the two 19th century thinkers came to rather similar results. For them money is not a simple means of payment, nor liability or claim, the way we would account for them now, but a special commodity. They do not attach its creation to the appearance of state laws on money as a legal tender but regard it as a social phenomenon which became capable of expressing a value token due to its peculiar characteristics.
Resumo:
A szerzők alapvető feltételezése, hogy az ellátási láncban a bizalom ösztönzi a felek közötti elkötelezettséget. Továbbá a bizalom növeli annak a lehetőségét, hogy az ellátási lánc sikeresen működjön. Ugyanakkor, a felek közötti bizalom hiánya gyakran megnöveli a tranzakciós költségeket, és így csökkenti a hatékonyságot. A cikkben bemutatott kutatás adatgyűjtésére több országban – Franciaországban, Magyarországon, Dél-Koreában, Tunéziában és az Egyesült Államokban – került sor. Összesen 729 érvényes kérdőív érkezett vissza, amelyeket a különböző ellátási láncok résztvevői töltöttek ki. A kutatási eredmények szerint az ellátási láncokon belüli üzleti kapcsolatokban a tranzakciós költségek elméletének összetevői (kapcsolatspecifikusság és viselkedési bizonytalanság), valamint a társadalmi csereelmélet tényezői (lecserélhetőség, észlelt megelégedettség, a partner hírneve és észlelt konfliktus) szoros kapcsolatban állnak a bizalom és az elkötelezettség változóival. _____ This article is based on the assumption that trust promotes commitment between partners in the supply chain and improves the chances of return on supply chain success. In contrast, a lack of trust between them often increases transaction costs and results in inefficiency. The results of this research, based on multi-country surveys with 729 returns from France, Hungary, Korea, Tunisia and the United States on supply chain professionals, reveals a strong affect of transaction cost constructs (TCC) (asset specificity and behavioral uncertainty) and social exchange constructs (SEC) (replaceability, perceived satisfaction, partner reputation, and perceived conflict) on trust-commitment variables in partnership based supply chain relationships. This paper employed a structural equation model to extract information from the survey data. Among the findings, the research indicates that a firm’s trustcommitment in dealing with their supply chain partnership is highly associated with not only transaction cost, but more so with social exchange variables. This study may open a new research avenue in that there is another construct, SEC, beside TSC that influences the degree of trust and commitment.
Resumo:
Az üzleti célú kapcsolatok vizsgálatakor legtöbbször felmerül a bizalom fogalma is, amellyel először a szociálpszichológia és a szociológia foglalkozott. A szerző cikkében azzal foglalkozik, hogy milyen tényezők befolyásolják a bizalmat az üzleti kapcsolatokban. Ezért magyarországi szervezeteket (elsősorban üzleti vállalkozásokat) kérdezett meg kvantitatív módszer alkalmazásával. Ez az empirikus kutatás igyekszik a bizalom lehető legtöbb tényezőit összegyűjteni, ahol a kérdőívben a válaszolók egyik létező – vevői vagy beszállítói – kapcsolatukra gondolva válaszoltak a bizalmon túl a partner hírnevére, az észlelt elégedettségre és konfliktusra, az információcserére, a lecserélhetőségre, valamint a kapcsolatspecifikus beruházásokra vonatkozóan. Az eredmények azt mutatják, hogy egyik változó sem jelent kizárólagos befolyásoló erőt, hanem közösen alakítják ki a bizalom adott szintjét. _______ This article is based on the assumption that trust promotes commitment between partners in the supply chain and improves the chances of return on supply chain success. In contrast, a lack of trust between them often increases transaction costs and results in inefficiency. The results of this research, based on multi-country surveys with 729 returns from France, Hungary, Korea, Tunisia and the United States on supply chain professionals, reveals a strong affect of transaction cost constructs (TCC) (asset specificity and behavioral uncertainty) and social exchange constructs (SEC) (replaceability, perceived satisfaction, partner reputation, and perceived conflict) on trust-commitment variables in partnership based supply chain relationships. This paper employed a structural equation model to extract information from the survey data. Among the findings, the research indicates that a firm’s trustcommitment in dealing with their supply chain partnership is highly associated with not only transaction cost, but more so with social exchange variables. This study may open a new research avenue in that there is another construct, SEC, beside TSC that influences the degree of trust and commitment.
Resumo:
Today's wireless networks rely mostly on infrastructural support for their operation. With the concept of ubiquitous computing growing more popular, research on infrastructureless networks have been rapidly growing. However, such types of networks face serious security challenges when deployed. This dissertation focuses on designing a secure routing solution and trust modeling for these infrastructureless networks. ^ The dissertation presents a trusted routing protocol that is capable of finding a secure end-to-end route in the presence of malicious nodes acting either independently or in collusion, The solution protects the network from active internal attacks, known to be the most severe types of attacks in an ad hoc application. Route discovery is based on trust levels of the nodes, which need to be dynamically computed to reflect the malicious behavior in the network. As such, we have developed a trust computational model in conjunction with the secure routing protocol that analyzes the different malicious behavior and quantifies them in the model itself. Our work is the first step towards protecting an ad hoc network from colluding internal attack. To demonstrate the feasibility of the approach, extensive simulation has been carried out to evaluate the protocol efficiency and scalability with both network size and mobility. ^ This research has laid the foundation for developing a variety of techniques that will permit people to justifiably trust the use of ad hoc networks to perform critical functions, as well as to process sensitive information without depending on any infrastructural support and hence will enhance the use of ad hoc applications in both military and civilian domains. ^
Resumo:
A Miller Trust is an irrevocable trust established on or before August 10, 1993, for the benefit of an individual and is used to help pay the cost of nursing facility care. The person residing in the nursing facility is designated as the beneficiary, and after the beneficiary’s death, all remaining amounts, up to the amount of Medicaid paid for the beneficiary, are paid to the State, the residuary beneficiary. Once a trust is established, a bank account for monies associated with the trust can be opened. Only certain funds, including the beneficiary’s earned and unearned income, can be deposited into the Miller Trust account. A trustee, usually a spouse or family member, is the person who administers the trust and pays out money.
Resumo:
We propose three research problems to explore the relations between trust and security in the setting of distributed computation. In the first problem, we study trust-based adversary detection in distributed consensus computation. The adversaries we consider behave arbitrarily disobeying the consensus protocol. We propose a trust-based consensus algorithm with local and global trust evaluations. The algorithm can be abstracted using a two-layer structure with the top layer running a trust-based consensus algorithm and the bottom layer as a subroutine executing a global trust update scheme. We utilize a set of pre-trusted nodes, headers, to propagate local trust opinions throughout the network. This two-layer framework is flexible in that it can be easily extensible to contain more complicated decision rules, and global trust schemes. The first problem assumes that normal nodes are homogeneous, i.e. it is guaranteed that a normal node always behaves as it is programmed. In the second and third problems however, we assume that nodes are heterogeneous, i.e, given a task, the probability that a node generates a correct answer varies from node to node. The adversaries considered in these two problems are workers from the open crowd who are either investing little efforts in the tasks assigned to them or intentionally give wrong answers to questions. In the second part of the thesis, we consider a typical crowdsourcing task that aggregates input from multiple workers as a problem in information fusion. To cope with the issue of noisy and sometimes malicious input from workers, trust is used to model workers' expertise. In a multi-domain knowledge learning task, however, using scalar-valued trust to model a worker's performance is not sufficient to reflect the worker's trustworthiness in each of the domains. To address this issue, we propose a probabilistic model to jointly infer multi-dimensional trust of workers, multi-domain properties of questions, and true labels of questions. Our model is very flexible and extensible to incorporate metadata associated with questions. To show that, we further propose two extended models, one of which handles input tasks with real-valued features and the other handles tasks with text features by incorporating topic models. Our models can effectively recover trust vectors of workers, which can be very useful in task assignment adaptive to workers' trust in the future. These results can be applied for fusion of information from multiple data sources like sensors, human input, machine learning results, or a hybrid of them. In the second subproblem, we address crowdsourcing with adversaries under logical constraints. We observe that questions are often not independent in real life applications. Instead, there are logical relations between them. Similarly, workers that provide answers are not independent of each other either. Answers given by workers with similar attributes tend to be correlated. Therefore, we propose a novel unified graphical model consisting of two layers. The top layer encodes domain knowledge which allows users to express logical relations using first-order logic rules and the bottom layer encodes a traditional crowdsourcing graphical model. Our model can be seen as a generalized probabilistic soft logic framework that encodes both logical relations and probabilistic dependencies. To solve the collective inference problem efficiently, we have devised a scalable joint inference algorithm based on the alternating direction method of multipliers. The third part of the thesis considers the problem of optimal assignment under budget constraints when workers are unreliable and sometimes malicious. In a real crowdsourcing market, each answer obtained from a worker incurs cost. The cost is associated with both the level of trustworthiness of workers and the difficulty of tasks. Typically, access to expert-level (more trustworthy) workers is more expensive than to average crowd and completion of a challenging task is more costly than a click-away question. In this problem, we address the problem of optimal assignment of heterogeneous tasks to workers of varying trust levels with budget constraints. Specifically, we design a trust-aware task allocation algorithm that takes as inputs the estimated trust of workers and pre-set budget, and outputs the optimal assignment of tasks to workers. We derive the bound of total error probability that relates to budget, trustworthiness of crowds, and costs of obtaining labels from crowds naturally. Higher budget, more trustworthy crowds, and less costly jobs result in a lower theoretical bound. Our allocation scheme does not depend on the specific design of the trust evaluation component. Therefore, it can be combined with generic trust evaluation algorithms.
Resumo:
Investors value the special attributes of monetary assets (e.g., exchangeability, liquidity, and safety) and pay a premium for holding them in the form of a lower return rate -- The user cost of holding monetary assets can be measured approximately by the difference between the returns on illiquid risky assets and those of safer liquid assets -- A more appropriate measure should adjust this difference by the differential risk of the assets in question -- We investigate the impact that time non-separable preferences has on the estimation of the risk-adjusted user cost of money -- Using U.K. data from 1965Q1 to 2011Q1, we estimate a habit-based asset pricing model with money in the utility function and find that the risk adjustment for risky monetary assets is negligible -- Thus, researchers can dispense with risk adjusting the user cost of money in constructing monetary aggregate indexes
Resumo:
Recent decisions of the Family Court of Australian reflect concerns over the adversarial nature of the legal process. The processes and procedures of the judicial system militate against a detailed examination of the issues and rights of the parties in dispute. The limitations of the family law framework are particularly demonstrated in disputes over the custody of children where the Court has tended to neglect the rights and interests of the primary carer. An alternative "unified family court" framework will be examined in which the Court pursues a more active and interventionist approach in the determination of family law disputes.
Resumo:
An important aspect of designing any product is validation. Virtual design process (VDP) is an alternative to hardware prototyping in which analysis of designs can be done without manufacturing physical samples. In recent years, VDP have been generated either for animation or filming applications. This paper proposes a virtual reality design process model on one of the applications when used as a validation tool. This technique is used to generate a complete design guideline and validation tool of product design. To support the design process of a product, a virtual environment and VDP method were developed that supports validation and an initial design cycle performed by a designer. The product model car carrier is used as illustration for which virtual design was generated. The loading and unloading sequence of the model for the prototype was generated using automated reasoning techniques and was completed by interactively animating the product in the virtual environment before complete design was built. By using the VDP process critical issues like loading, unloading, Australian Design rules (ADR) and clearance analysis were done. The process would save time, money in physical sampling and to large extent in complete math generation. Since only schematic models are required, it saves time in math modelling and handling of bigger size assemblies due to complexity of the models. This extension of VDP process for design evaluation is unique and was developed, implemented successfully. In this paper a Toll logistics and J Smith and Sons car carrier which is developed under author’s responsibility has been used to illustrate our approach of generating design validation via VDP.
Resumo:
This study explores teenager perceptions towards advertising in the online social networking environment. The future of online social networking sites is dependant upon the continued support of advertisers in this new medium, which is linked to the acceptance of advertising on these sites by their targeted audience. This exploratory study used the qualitative research methods of focus groups and in-depth personal interviews to gain insights from the teenager participants. The literature review in Chapter Two examined the previous research into advertising theories, consumer attitudes and issues such as advertising avoidance, advertising as a service and trust and privacy in the online social networking environment. The teenage consumer was also examined as were the influences of social identity theory. From this literature review eleven propositions were formed which provided a structure to the analysis of the research. Chapter Three outlined the multi-method research approach of using focus groups and in-depth interviews. The key findings were outlined in Chapter Four and Chapter Five provides discussion regarding these findings and the implications for theory and advertising practice. The main findings from this study suggest that teenagers have very high levels of advertising avoidance and are sceptical towards advertising on their online social networking sites. They have an inherent distrust of commercial messages in the online social networking environment; however they are extremely trusting with the information that they disclose online. They believe that if their site is classified as private, then the information disclosed on this site is not accessible to anyone. The study explores the reasons behind these views. This research has resulted in the identification of seven motivations behind online social networking use. A new model of advertising avoidance in the online social networking environment is also presented and discussed. This model makes a contribution towards filling the gap in available research on online social networking sites and advertising perception. The findings of this study have also resulted in the identification of the characteristics of online social networking sites as an advertising medium. The newness of online social networking sites coupled with the enthusiastic adoption of online social networking by the teenage demographic means that this exploratory study will be of interest to both academics and practitioners alike.