Search results for: trust message
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1064

Search results for: trust message

1034 Patients’ Trust in Health Care Systems

Authors: Dilara Usta, Fatos Korkmaz

Abstract:

Background: Individuals who utilise health services maintain relationships with health professionals, insurers and institutions. The nature of these relationships requires service receivers to have trust in the service providers because maintaining health services without reciprocal trust is very difficult. Therefore, individual evaluations of trust within the scope of health services have become increasingly important. Objective: To investigate patients’ trust in the health-care system and their relevant socio-demographical characteristics. Methods: This research was conducted using a descriptive design which included 493 literate patients aged 18-65 years who were hospitalised for a minimum of two days at public university and training&research hospitals in Ankara, Turkey. Patients’ trust in health-care professionals, insurers, and institutions were investigated. Data were collected using a demographic questionnaire and the Multidimensional Trust in Health-Care Systems Scale between September 2015 and April 2016. Results: The participants’ mean age was 47.7±13.1; 70% had a moderate income and 69% had a prior hospitalisation and 63.5% of the patients were satisfied with the health-care services. The mean Multidimensional Trust in Health-Care Systems Scale score for the sample was 61.5±8.3; the provider subscale had a mean of 38.1±5, the insurers subscale had a mean of 12.9±3.7, and institutions subscale had a mean of 10.6±1.9. Conclusion: Patients’ level of trust in the health-care system was above average and the trust level of the patients with higher educational and socio-economic levels was lower compared to the other patients. Health-care professionals should raise awareness about the significance of trust in the health-care system.

Keywords: delivery of health care, health care system, nursing, patients, trust

Procedia PDF Downloads 355
1033 The Problems with the Amendment of a Living Trust in South Africa

Authors: Rika van Zyl

Abstract:

It was ruled that an inter vivos trust must be amended according to the rules of the stipulatio alteri, or ‘contract in favour of a third party’, that South African adopted from its Roman-Dutch common law. The application of the principles of the stipulatio alteri on the inter vivos trust has developed in case law to imply that once the beneficiary has accepted benefits, he becomes a party to the contract. This consequently means that he must consent to any amendments that the trustees want to make. This poses practical difficulties such as finding all the beneficiaries that have accepted to sign the amendment that the trustees would want to circumvent in administering the trust. One of the questions relating to this issue is, however, whether the principles of the stipulatio alteri are correctly interpreted and consequently applied to the inter vivos trust to mean that the beneficiaries who accepted must consent to any amendment. The subsequent question relates to the rights the beneficiary receives upon acceptance. There seems to be a different view of what a vested right or a contingent right of the beneficiary means in relation to the inter vivos trust. These rights also have an impact on the amendment of a trust deed. Such an investigation and refining of the interpretation of the stipulatio alteri’s application on the inter vivos trust may result in solutions to circumvent the adverse effects of getting the beneficiary’s consent for amendments.

Keywords: inter vivos trust, stipulatio alteri, amendment, beneficiary rights

Procedia PDF Downloads 159
1032 The Effect of ‘Love Accounting’ on Gift Budgeting

Authors: Yanan Wang

Abstract:

It is proposed that when people give a gift they engage in 'love accounting', so that they will spend less on it if they include a written expression of love with it. This hypothesis was tested with college students (N = 308). It was found that participants who wrote a love message to accompany a Mother's Day gift budgeted less for the gift itself than control participants (Experiment 1), and this effect was replicated for a Christmas gift (Experiment 2). The amount of effort expended by the giver on preparing the love message did not account for the effect (Experiment 3). It is concluded that a gift and its accompanying love message are mentally computed as belonging to the same love account, implying that consumers’ excessive splurging on gifts might be controlled by writing a love message before gift shopping.

Keywords: expression of love, gift-giving, gift-budgeting, mental accounting

Procedia PDF Downloads 321
1031 Leading Virtual Project Teams in the Post Pandemic Era: Trust and Conflict Management Strategies

Authors: Vidya Badrinarayanan, Appa Iyer Sivakumar

Abstract:

The coronavirus pandemic has sent an important message that future project teams need to be trained to work under virtual conditions, which has already become the new norm in organizations across the world. As organizations increasingly rely on virtual teams to achieve project objectives, it is essential to comprehend how leadership functions in virtual project teams. The purpose of this research is to analyze the leadership behaviors exhibited by project managers for building trust and managing conflicts effectively in virtual project teams. This convergent parallel mixed method research was conducted by surveying 185 virtual leaders and conducting a semi-structured interview with 13 senior virtual leaders involved in managing projects across the industry sectors. The research findings indicate that establishing trust and managing conflicts were ranked as significant challenges in leading virtual project teams in the post-pandemic era. In contrast to earlier findings, our research findings suggest that productivity was not ranked as a significant challenge in leading virtual project teams. This indeed is a positive finding for organizations to consider adopting virtual project teams in the long run. Additionally, the research findings recommend that virtual leaders need to strive to build a high-trust environment and develop effective conflict resolution skills to improve the effectiveness of virtual project teams. As the project management profession struggles with low project success rates, mixed-method research aims to contribute to the knowledge in the growing research area of virtual project leadership. This research contributes to the knowledge by offering first-person accounts from senior virtual leaders on the innovative strategies they had implemented for building trust and resolving conflicts effectively in the virtual project when there were limited opportunities for face-to-face interaction on account of the pandemic. In addition, the leadership framework created as a part of this research for trust development and conflict management in virtual project teams will guide project managers to improve virtual project team effectiveness.

Keywords: conflict management, trust building, virtual leadership, virtual teams

Procedia PDF Downloads 169
1030 A New Method for Fault Detection

Authors: Mehmet Hakan Karaata, Ali Hamdan, Omer Yusuf Adam Mohamed

Abstract:

Consider a distributed system that delivers messages from a process to another. Such a system is often required to deliver each message to its destination regardless of whether or not the system components experience arbitrary forms of faults. In addition, each message received by the destination must be a message sent by a system process. In this paper, we first identify the necessary and sufficient conditions to detect some restricted form of Byzantine faults referred to as modifying Byzantine faults. An observable form of a Byzantine fault whose effect is limited to the modification of a message metadata or content, timing and omission faults, and message replay is referred to as a modifying Byzantine fault. We then present a distributed protocol to detect modifying Byzantine faults using optimal number of messages over node-disjoint paths.

Keywords: Byzantine faults, distributed systems, fault detection, network protocols, node-disjoint paths

Procedia PDF Downloads 433
1029 Perceived Organizational Justice, Trust and Employee Engagement in Bank Managers

Authors: Seemal Mazhar Khan, Tahira Mubashar

Abstract:

The present research aimed to investigate the relationship in perceived organizational justice, organizational trust and employee engagement in bank employees. It was hypothesized: there is likely to be a relationship in perceived organizational justices, organizational trust and employee engagement; perceived organizational justice and organizational trust are likely to predict employee engagement; there is likely to be effect of bank type and designation on perceived organizational justice, organizational trust and employee engagement. The sample consisted of 150 bank employees (50 from government, 50 from private and 50 from privatized banks) selected from different banks in Lahore, Pakistan. Correlational research design was used to conduct this study. Perceived Organizational Justices Questionnaire, Organizational Trust Questionnaire and Employee Engagement Scale were used for assessment. Pearson product moment correlation, hierarchical regression and multivariate analysis of covariance were applied. Results showed a positive significant relationship in perceived organizational justice and organizational engagement and there were also a positive significant relation between organizational trust and job and organizational engagement. Results showed that organizational trust predicts organizational engagement after controlling the effect of age, marital status and socio-economic status and there is a significant interaction effect of bank type and designation level on organizational trust in bank employees. The findings of the research can serve as a platform for the awareness of important antecedents of employee engagement and organizations can inculcate trust for better and improved engagement of its employees, thereby, enhancing the productivity of their employees.

Keywords: bank employees, organizational engagement, perceived organizational justice, trust

Procedia PDF Downloads 384
1028 Enhanced Automated Teller Machine Using Short Message Service Authentication Verification

Authors: Rasheed Gbenga Jimoh, Akinbowale Nathaniel Babatunde

Abstract:

The use of Automated Teller Machine (ATM) has become an important tool among commercial banks, customers of banks have come to depend on and trust the ATM conveniently meet their banking needs. Although the overwhelming advantages of ATM cannot be over-emphasized, its alarming fraud rate has become a bottleneck in it’s full adoption in Nigeria. This study examined the menace of ATM in the society another cost of running ATM services by banks in the country. The researcher developed a prototype of an enhanced Automated Teller Machine Authentication using Short Message Service (SMS) Verification. The developed prototype was tested by Ten (10) respondents who are users of ATM cards in the country and the data collected was analyzed using Statistical Package for Social Science (SPSS). Based on the results of the analysis, it is being envisaged that the developed prototype will go a long way in reducing the alarming rate of ATM fraud in Nigeria.

Keywords: ATM, ATM fraud, e-banking, prototyping

Procedia PDF Downloads 298
1027 Trusting Smart Speakers: Analysing the Different Levels of Trust between Technologies

Authors: Alec Wells, Aminu Bello Usman, Justin McKeown

Abstract:

The growing usage of smart speakers raises many privacy and trust concerns compared to other technologies such as smart phones and computers. In this study, a proxy measure of trust is used to gauge users’ opinions on three different technologies based on an empirical study, and to understand which technology most people are most likely to trust. The collected data were analysed using the Kruskal-Wallis H test to determine the statistical differences between the users’ trust level of the three technologies: smart speaker, computer and smart phone. The findings of the study revealed that despite the wide acceptance, ease of use and reputation of smart speakers, people find it difficult to trust smart speakers with their sensitive information via the Direct Voice Input (DVI) and would prefer to use a keyboard or touchscreen offered by computers and smart phones. Findings from this study can inform future work on users’ trust in technology based on perceived ease of use, reputation, perceived credibility and risk of using technologies via DVI.

Keywords: direct voice input, risk, security, technology, trust

Procedia PDF Downloads 175
1026 Modifying Byzantine Fault Detection Using Disjoint Paths

Authors: Mehmet Hakan Karaata, Ali Hamdan, Omer Yusuf Adam Mohamed

Abstract:

Consider a distributed system that delivers messages from a process to another. Such a system is often required to deliver each message to its destination regardless of whether or not the system components experience arbitrary forms of faults. In addition, each message received by the destination must be a message sent by a system process. In this paper, we first identify the necessary and sufficient conditions to detect some restricted form of Byzantine faults referred to as modifying Byzantine faults. An observable form of a Byzantine fault whose effect is limited to the modification of a message metadata or content, timing and omission faults, and message replay is referred to as a modifying Byzantine fault. We then present a distributed protocol to detect modifying Byzantine faults using optimal number of messages over node-disjoint paths.

Keywords: Byzantine faults, distributed systems, fault detection, network pro- tocols, node-disjoint paths

Procedia PDF Downloads 555
1025 The Effect of Change Communication towards Commitment to Change through the Role of Organizational Trust

Authors: Enno R. Farahzehan, Wustari L. Mangundjaya

Abstract:

Organizational change is necessary to develop innovation and to compete with other competitors. Organizational changes were also made to defend the existence of the organization itself. Success in implementing organizational change consists of a variety of factors, one of which is individual (employee) who run changes. The employee must have the willingness and ability in carrying out the changes. Besides, employees must also have a commitment to change for creation of the successful organizational change. This study aims to execute the effect of change communication towards commitment to change through the role of organizational trust. The respondents of this study were employees who work in organizations, which have been or are currently running organizational changes. The data were collected using Change Communication, Commitment to Change, and Organizational Trust Inventory. The data were analyzed using regression. The result showed that there is an effect among change communication towards commitment to change which is higher when mediated by organizational trust. This paper will contribute to the knowledge and implications of organizational change, that shows change communication can affect commitment to change among employee if there is trust in the organization.

Keywords: change communication, commitment to change, organizational trust, organizational change

Procedia PDF Downloads 325
1024 Anthropomorphic Interfaces For User Trust in a Highly Automated Driving

Authors: Clarisse Lawson-Guidigbe, Nicolas Louveton, Kahina Amokrane-Ferka, Jean-Marc Andre

Abstract:

Trust in automated driving systems is receiving growing attention in the research community. Anthropomorphism has been identified by past research as a trust-building factor. In this paper, we consider three anthropomorphic interfaces integrating three versions of a virtual assistant. We attempt to measure the impact of each of these interfaces on trust in the automated driving system. An experiment following a between-subject design was conducted in a driving simulator (N = 36) to evaluate participants’ performance and experience in two handover situations (a simple one and a critical one). Perception of anthropomorphism and trust was measured using scales, while participants’ experience was measured during elicitation interviews. We found no significant difference between the three interfaces regarding the perception of anthropomorphism, trust levels, or experience. However, regarding participants’ performance, we found a significant difference between the three interfaces in the simple handover situations but not the critical one. Learnings from anthropomorphism and trust measurement scales are discussed and suggestions for further research are proposed.

Keywords: highly automated driving, trust, anthropomorphic design, mindful anthropomorphism, mindless anthropomorphism

Procedia PDF Downloads 131
1023 Secure Content Centric Network

Authors: Syed Umair Aziz, Muhammad Faheem, Sameer Hussain, Faraz Idris

Abstract:

Content centric network is the network based on the mechanism of sending and receiving the data based on the interest and data request to the specified node (which has cached data). In this network, the security is bind with the content not with the host hence making it host independent and secure. In this network security is applied by taking content’s MAC (message authentication code) and encrypting it with the public key of the receiver. On the receiver end, the message is first verified and after verification message is saved and decrypted using the receiver's private key.

Keywords: content centric network, client-server, host security threats, message authentication code, named data network, network caching, peer-to-peer

Procedia PDF Downloads 630
1022 RSU Aggregated Message Delivery for VANET

Authors: Auxeeliya Jesudoss, Ashraph Sulaiman, Ratnakar Kotnana

Abstract:

V2V communication brings up several questions of scalability issues although message sharing in vehicular ad-hoc networks comprises of both Vehicle-to-Vehicle communications (V2V) and Vehicle to Infrastructure communication (V2I). It is not an easy task for a vehicle to verify all signatures of the messages sent by its neighboring vehicles in a timely manner, without resulting in message loss. Moreover, the communication overhead of a vehicle to authenticate another vehicle would increase together with the security of the system. Another issue to be addressed is the continuous mobility of vehicles which requires at least some information on the node’s own position to be revealed to the neighboring vehicles. This may facilitate the attacker to congregate information on a node’s position or its mobility patterns. In order to tackle these issues, this paper introduces a RSU aggregated message deliverance scheme called RAMeD. With RAMeD, roadside units (RSUs) are responsible for verifying the identity of the vehicles entering in its range, collect messages from genuine vehicles and to aggregate similar messages into groups before sending them to all the vehicles in its communication range. This aggregation will tremendously improve the rate of message delivery and reduce the message lose ratio by avoiding similar messages being sent to the vehicles redundantly. The proposed protocol is analyzed extensively to evaluate its merits and efficiency for vehicular communication.

Keywords: vehicular ad-hoc networks, V2V, V2I, VANET communication, scalability, message aggregation

Procedia PDF Downloads 395
1021 Model Estimation and Error Level for Okike’s Merged Irregular Transposition Cipher

Authors: Okike Benjamin, Garba E. J. D.

Abstract:

The researcher has developed a new encryption technique known as Merged Irregular Transposition Cipher. In this cipher method of encryption, a message to be encrypted is split into parts and each part encrypted separately. Before the encrypted message is transmitted to the recipient(s), the positions of the split in the encrypted messages could be swapped to ensure more security. This work seeks to develop a model by considering the split number, S and the average number of characters per split, L as the message under consideration is split from 2 through 10. Again, after developing the model, the error level in the model would be determined.

Keywords: merged irregular transposition, error level, model estimation, message splitting

Procedia PDF Downloads 296
1020 Trust: The Enabler of Knowledge-Sharing Culture in an Informal Setting

Authors: Emmanuel Ukpe, S. M. F. D. Syed Mustapha

Abstract:

Trust in an organization has been perceived as one of the key factors behind knowledge sharing, mainly in an unstructured work environment. In an informal working environment, to instill trust among individuals is a challenge and even more in the virtual environment. The study has contributed in developing the framework for building trust in an unstructured organization in performing knowledge sharing in a virtual environment. The artifact called KAPE (Knowledge Acquisition, Processing, and Exchange) was developed for knowledge sharing for the informal organization where the framework was incorporated. It applies to Cassava farmers to facilitate knowledge sharing using web-based platform. A survey was conducted; data were collected from 382 farmers from 21 farm communities. Multiple regression technique, Cronbach’s Alpha reliability test; Tukey’s Honestly significant difference (HSD) analysis; one way Analysis of Variance (ANOVA), and all trust acceptable measures (TAM) were used to test the hypothesis and to determine noteworthy relationships. The results show a significant difference when there is a trust in knowledge sharing between farmers, the ones who have high in trust acceptable factors found in the model (M = 3.66 SD = .93) and the ones who have low on trust acceptable factors (M = 2.08 SD = .28), (t (48) = 5.69, p = .00). Furthermore, when applying Cognitive Expectancy Theory, the farmers with cognitive-consonance show higher level of trust and satisfaction with knowledge and information from KAPE, as compared with a low level of cognitive-dissonance. These results imply that the adopted trust model KAPE positively improved knowledge sharing activities in an informal environment amongst rural farmers.

Keywords: trust, knowledge, sharing, knowledge acquisition, processing and exchange, KAPE

Procedia PDF Downloads 104
1019 The Effect of Contextual Factors on Degree of Trust in Kuwaiti Business Organization

Authors: Ali Muhammad

Abstract:

The study investigates the effect of a number of contextual on the degree of trust within Kuwaiti business organizations. The model used in this study suggests that degree of trust within the organization is determined by four contextual variables, namely, centralization, formalization, role ambiguity, and procedural justice. Organizational trust refers to employee’ positive assumptions in regard to the goal and behaviors of other members in the organization according to organizational duties, relationships, experiences, and interrelatedness. According to the norm of reciprocity, individuals with high perceived organizational justice will be compelled to react positively to the organization in the form of higher degree of trust. The duty to exchange kindness for kindness. Based on the exchange theory, this research proposes that procedural justice, role clarity, and voice in the organization will lead to the perception of an organization’s discretionary positive treatment of employees and, in return enhances their trust in the organization. Survey data were collected from a sample of 206 employees working in Kuwaiti business organizations. Results of multiple regression analysis revealed that both organizational justice and formalization have positive effects on organizational trust. Furthermore, results indicate that lower degree of role ambiguity leads to higher degree of organizational trust. On the other hand, centralization was not found to have a significant effect on organizational trust. Implications of the findings and directions for future research are discussed.

Keywords: centralization, formalization, organizational justice, organizational trust, role ambiguity

Procedia PDF Downloads 176
1018 Health and the Politics of Trust: Multi-Drug-Resistant Tuberculosis in Kathmandu

Authors: Mattia Testuzza

Abstract:

Public health is a social endeavour, which involves many different actors: from extremely stratified, structured health systems to unofficial networks of people and knowledge. Health and diseases are an intertwined individual and social experiences. Both patients and health workers navigate this public space through relations of trust. Trust in healthcare goes from the personal trust between a patient and her/his doctor to the trust of both the patient and the health worker in the medical knowledge and the healthcare system. Trust it is not a given, but it is continuously negotiated, given and gained. The key to understand these essential relations of trust in health is to recognise them as a social practice, which therefore implies agency and power. In these terms, health is constantly public and made public, as trust emerges as a meaningfully political phenomenon. Trust as a power relation can be observed at play in the implementation of public health policies such as the WHO’s Directly-Observed Theraphy Short-course (DOTS), and with the increasing concern for drug-resistance that tuberculosis pose, looking at the role of trust in the healthcare delivery system and implementation of public health policies becomes significantly relevant. The ethnographic fieldwork was carried out in four months through observation of the daily practices at the National Tuberculosis Center of Nepal, and semi-structured interviews with MultiDrug-Resistant Tuberculosis (MDR-TB) patients at different stages of the treatment, their relatives, MDR-TB specialised nurses, and doctors. Throughout the research, the role which trust plays in tuberculosis treatment emerged as one fundamental ax that cuts through all the different factors intertwined with drug-resistance development, unfolding a tension between the DOTS policy, which undermines trust, and the day-to-day healthcare relations and practices which cannot function without trust. Trust also stands out as a key component of the solutions to unforeseen issues which develop from the overall uncertainty of the context - for example, political instability and extreme poverty - in which tuberculosis treatment is carried out in Nepal.

Keywords: trust, tuberculosis, drug-resistance, politics of health

Procedia PDF Downloads 238
1017 The Interplay between Consumer Knowledge, Cognitive Effort, Financial Healthiness and Trust in the Financial Marketplace

Authors: Torben Hansen

Abstract:

While trust has long been regarded as one of the most critical variables for developing and maintaining well-functioning financial customer-seller relationships it can be suggested that trust not only relates to customer trust in individual companies (narrow-scope trust). Trust also relates to the broader business context in which consumers may carry out their financial behaviour (broad-scope trust). However, despite the well-recognized significance of trust in marketing research, only few studies have investigated the role of broad-scope trust in consumer financial behaviour. Moreover, as one of its many serious outcomes, the global financial crisis has elevated the need for an improved understanding of the role of broad-scope trust in consumer financial services markets. Only a minority of US and European consumers are currently confident in financial companies and ‘financial stability’ and ‘trust’ are now among the top reasons for choosing a bank. This research seeks to address this shortcoming in the marketing literature by investigating direct and moderating effects of broad-scope trust on consumer financial behaviour. Specifically, we take an ability-effort approach to consumer financial behaviour. The ability-effort approach holds the basic premise that the quality of consumer actions is influenced by ability factors, for example consumer knowledge and cognitive effort. Our study is based on two surveys. Survey 1 comprises 1,155 bank consumers, whereas survey 2 comprises 764 pension consumers. The results indicate that broad-scope trust negatively moderates relationships between knowledge and financial healthiness and between cognitive effort and financial healthiness. In addition, it is demonstrated that broad-scope trust negatively influences cognitive effort. Specifically, the results suggest that broad-scope trust contributes to the financial well-being of consumers with limited financial knowledge and processing capabilities. Since financial companies are dependent on customers to pay their loans and bills they have a greater interest in developing relations with consumers with a healthy financial behaviour than with the opposite. Hence, financial managers should be engaged with monitoring and influencing broad-scope trust. To conclude, by taking into account the contextual effect of broad-scope trust, the present study adds to our understanding of knowledge-effort-behaviour relationship in consumer financial markets.

Keywords: cognitive effort, customer-seller relationships, financial healthiness, knowledge, trust

Procedia PDF Downloads 426
1016 Changing Subjective Well-Being and Social Trust in China: 2010-2020

Authors: Mengdie Ruan

Abstract:

The authors investigate how subjective well-being (SWB) and social trust changed in China over the period 2010–2020 by relying on data from six rounds of the China Family Panel Studies (CFPS), then re-examine Easterlin’s hypothesis for China, with a more focus on the role of social trust and estimate income-compensating differentials for social trust. They find that the evolution of well-being is not sensitive to the measures of well-being one uses. Specifically, self-reported life satisfaction scores and hedonic happiness scores experienced a significant increase across all income groups from 2010 to 2020. Social trust seems to have increased based on CFPS in China for all socioeconomic classes in recent years, and male, urban resident individuals with higher income have a higher social trust at a given point in time and over time. However, when we use an alternative measure of social trust, out-group trust, which is a more valid measure of generalized trust and represents “most people”, social trust in China literally declines, and the level is extremely low. In addition, this paper also suggests that in the typical query on social trust, the term "most people" mostly denotes in-groups in China, which contrasts sharply with most Western countries where it predominantly connotes out-groups. Individual fixed effects analysis of well-being that controls for time-invariant variables reveals social trust and relative social status are important correlates of life satisfaction and happiness, whereas absolute income plays a limited role in boosting an individual’s well-being. The income-equivalent value for social capital is approximately tripling of income. It has been found that women, urban and coastal residents, and people with higher income, young people, those with high education care more about social trust in China, irrespective of measures on SWB. Policy aiming at preserving and enhancing SWB should focus on social capital besides economic growth.

Keywords: subjective well-being, life satisfaction, happiness, social trust, China

Procedia PDF Downloads 63
1015 Culture, Trust and Adaptation: A Study of International Students in Japan

Authors: Shaoyu Ye

Abstract:

This study aims to investigate the relationship between international students’ (ISs) trust of others (Japanese people and other different-language speakers) and intercultural adaptation in Japan, controlling for the effects of language abilities (both Japanese and English) and their liking of Japanese students. A total of 206 ISs completed a questionnaire survey measuring their degree of liking of general Japanese students (JSs) and trust of others, their most frequently contact persons and their communication ways, their received social support from same-language speakers, Japanese native speakers and other different-language speakers, and their degree of feeling been accepted, and so on. The following results were observed. (a) Neither Japanese language nor English language had significant effects on their sense of acceptance, while their degree of liking of JSs and trust of others had significant positive effects on it; (b) ISs’ Japanese language, along with their trust of others, led them to receive more social support from Japanese people, which helped raise their sense of acceptance in Japan; (c) ISs’ English language and their trust of others helped them receive more social support from other different- language speakers, which led them to feel been accepted in Japan. The importance of distinguishing between the effects of trust of Japanese people on intercultural adaptation and the effects of trust of other different-language speakers on intercultural adaptation is discussed.

Keywords: international students in Japan, language abilities, social support, sense of acceptance, trust of others.

Procedia PDF Downloads 355
1014 Trusting the Big Data Analytics Process from the Perspective of Different Stakeholders

Authors: Sven Gehrke, Johannes Ruhland

Abstract:

Data is the oil of our time, without them progress would come to a hold [1]. On the other hand, the mistrust of data mining is increasing [2]. The paper at hand shows different aspects of the concept of trust and describes the information asymmetry of the typical stakeholders of a data mining project using the CRISP-DM phase model. Based on the identified influencing factors in relation to trust, problematic aspects of the current approach are verified using various interviews with the stakeholders. The results of the interviews confirm the theoretically identified weak points of the phase model with regard to trust and show potential research areas.

Keywords: trust, data mining, CRISP DM, stakeholder management

Procedia PDF Downloads 84
1013 Smart Trust Management for Vehicular Networks

Authors: Amel Ltifi, Ahmed Zouinkhi, Med Salim Bouhlel

Abstract:

Spontaneous networks such as VANET are in general deployed in an open and thus easily accessible environment. Therefore, they are vulnerable to attacks. Trust management is one of a set of security solutions dedicated to this type of networks. Moreover, the strong mobility of the nodes (in the case of VANET) makes the establishment of a trust management system complex. In this paper, we present a concept of ‘Active Vehicle’ which means an autonomous vehicle that is able to make decision about trustworthiness of alert messages transmitted about road accidents. The behavior of an “Active Vehicle” is modeled using Petri Nets.

Keywords: active vehicle, cooperation, petri nets, trust management, VANET

Procedia PDF Downloads 387
1012 The Relationship between Citizens’ Perception of Public Officials’ Ethical Performance and Public Trust in the Government in Egypt

Authors: Nevine Henry Wasef

Abstract:

The research discusses how Egyptian citizens perceive the performance of public sector officials, particularly the ethical values manifested in their behavior. It aims at answering the question of how Egyptian citizens’ perception of public officials affects citizens' trust in the government at large and the process of public service delivery specifically. The hypothesis is that public opinion about civil servants’ ethical values would be proportional to citizens’ trust in the government, which means that the more citizens regard administrators with high ethical standards, the higher trust in the government they would have and vice versa. The research would focus on the independent variable of trust in the government and the dependent variable of public perception of administrators’ ethical performance. The data would be collected through surveys designed to measure the public evaluation of public officials they are interacting with and the quality of services delivered to them. The study concludes that implementing ethical values in public administration has a crucial role in improving citizens’ trust in the government based on various case studies of governments that successfully adopted ethical training programs for their civil servants.

Keywords: trust, distrust, ethics, performance, integrity, values, public service

Procedia PDF Downloads 75
1011 Idiocenntrism to innovative action, multi-level perspective on moderating effects of emotional self-regulation, trust and CSR

Authors: Shuhong Wang, Xiang Yi

Abstract:

Through a survey of approximately 340 employees from four Chinese companies and employing cross-level analysis, this study reveals that certain cultural syndromes may exert both direct and indirect influences on such behaviors. Notably, individuals with a strong individualistic self-concept are more inclined towards innovative actions compared to their less individualistic counterparts. This research also identifies several moderating factors. For instance, trust amplifies the positive relationship between individualism and innovative actions, particularly at higher trust levels. The paper concludes by highlighting its theoretical contributions, and practical implications, and suggesting directions for future research.

Keywords: Innovation, Self-Determination Theory, Trust, Team dynamic, Allocentrism

Procedia PDF Downloads 48
1010 Security Design of Root of Trust Based on RISC-V

Authors: Kang Huang, Wanting Zhou, Shiwei Yuan, Lei Li

Abstract:

Since information technology develops rapidly, the security issue has become an increasingly critical for computer system. In particular, as cloud computing and the Internet of Things (IoT) continue to gain widespread adoption, computer systems need to new security threats and attacks. The Root of Trust (RoT) is the foundation for providing basic trusted computing, which is used to verify the security and trustworthiness of other components. Design a reliable Root of Trust and guarantee its own security are essential for improving the overall security and credibility of computer systems. In this paper, we discuss the implementation of self-security technology based on the RISC-V Root of Trust at the hardware level. To effectively safeguard the security of the Root of Trust, researches on security safeguard technology on the Root of Trust have been studied. At first, a lightweight and secure boot framework is proposed as a secure mechanism. Secondly, two kinds of memory protection mechanism are built to against memory attacks. Moreover, hardware implementation of proposed method has been also investigated. A series of experiments and tests have been carried on to verify to effectiveness of the proposed method. The experimental results demonstrated that the proposed approach is effective in verifying the integrity of the Root of Trust’s own boot rom, user instructions, and data, ensuring authenticity and enabling the secure boot of the Root of Trust’s own system. Additionally, our approach provides memory protection against certain types of memory attacks, such as cache leaks and tampering, and ensures the security of root-of-trust sensitive information, including keys.

Keywords: root of trust, secure boot, memory protection, hardware security

Procedia PDF Downloads 183
1009 VANETs: Security Challenges and Future Directions

Authors: Jared Oluoch

Abstract:

Connected vehicles are equipped with wireless sensors that aid in Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) communication. These vehicles will in the near future provide road safety, improve transport efficiency, and reduce traffic congestion. One of the challenges for connected vehicles is how to ensure that information sent across the network is secure. If security of the network is not guaranteed, several attacks can occur, thereby compromising the robustness, reliability, and efficiency of the network. This paper discusses existing security mechanisms and unique properties of connected vehicles. The methodology employed in this work is exploratory. The paper reviews existing security solutions for connected vehicles. More concretely, it discusses various cryptographic mechanisms available, and suggests areas of improvement. The study proposes a combination of symmetric key encryption and public key cryptography to improve security. The study further proposes message aggregation as a technique to overcome message redundancy. This paper offers a comprehensive overview of connected vehicles technology, its applications, its security mechanisms, open challenges, and potential areas of future research.

Keywords: VANET, connected vehicles, 802.11p, WAVE, DSRC, trust, security, cryptography

Procedia PDF Downloads 297
1008 The Effect of Supplier Trust and Top Management Involvement on Supply Chain Risk Management through Buyer-Supplier Relationship

Authors: Hotlan Siagian, Han Tae Hee

Abstract:

This study aims to examine the effect of supplier trust and top management involvement on the supply chain risk management through buyer-supplier relationship. The population of the research is 44 Korean companies domiciled in East and Central Java of Indonesia. The respondent consists of a top management level from each company. Data collection used a questionnaire designed with five-item Likert scale. Collected data were analyzed using structural equation modeling (SEM) technique with SmartPLS software version 3.0 to examine the hypotheses. The result revealed that supplier trust has an effect on supply chain risk management, top management involvement affects supply chain risk management, supplier trust influences buyer-supplier relationship, top management involvement affects the buyer-supplier relationship, and buyer-supplier relationship affects supply chain risk management. The last finding is that buyer-supplier relationship empirically mediates the effect of supplier trust and top management involvement.

Keywords: buyer supplier relationship, supplier trust, supply chain risk management, top management involvement

Procedia PDF Downloads 205
1007 The Role of Personality Type as Predictor of Trust among Ridesharing Community: Study in Nebengers Community Jakarta

Authors: Firdaus Amri, Ima Sri Rahmani

Abstract:

Traffic jam becomes the main problem among the people in a metropolitan city, especially in Indonesia. Nebengers, as one of ridesharing community in Indonesia, offer solutions against this problem. Nebengers is a social media community that connect people who want to give the ride and who want to ask for the ride. But in reality, Nebengers still have quite problems, especially regarding the safety issue. Practically, in this issue, they (people in Nebengers) only depend on trust between the one who gives the ride and who asks for the ride. Trust is defined as an expectation that partners, including potential partners, have goodwill and benign intent in their dealing with one and another. This paper will examine the role of personality type as predictor of trust among Nebengers community. Hexaco Personality consists of six dimensions (honesty-humility, emotionality, agreeableness, conscientiousness, extraversion, and openness to experience) is used in this research. By using snowball sampling, we took 250 respondents from Nebengers community as participants for this research. They complete questionnaires which are provided in online form. The role of each personality type as a basic analysis to understand trust among Nebengers community will be discussed in this research.

Keywords: Nebengers, personality type, ridesharing, trust

Procedia PDF Downloads 346
1006 How Message Framing and Temporal Distance Affect Word of Mouth

Authors: Camille Lacan, Pierre Desmet

Abstract:

In the crowdfunding model, a campaign succeeds by collecting the funds required over a predefined duration. The success of a CF campaign depends both on the capacity to attract members of the online communities concerned, and on the community members’ involvement in online word-of-mouth recommendations. To maximize the campaign's success probability, project creators (i.e., an organization appealing for financial resources) send messages to contributors to ask them to issue word of mouth. Internet users relay information about projects through Word of Mouth which is defined as “a critical tool for facilitating information diffusion throughout online communities”. The effectiveness of these messages depends on the message framing and the time at which they are sent to contributors (i.e., at the start of the campaign or close to the deadline). This article addresses the following question: What are the effect of message framing and temporal distance on the willingness to share word of mouth? Drawing on Perspectives Theory and Construal Level Theory, this study examines the interplay between message framing (Gains vs. Losses) and temporal distance (message while the deadline is coming vs. far) on intention to share word of mouth. A between-subject experimental design is conducted to test the research model. Results show significant differences between a loss-framed message (lack of benefits if the campaign fails) associated with a short deadline (ending tomorrow) compared to a gain-framed message (benefits if the campaign succeeds) associated with a distant deadline (ending in three months). However, this effect is moderated by the anticipated regret of a campaign failure and the temporal orientation. These moderating effects contribute to specifying the boundary condition of the framing effect. Handling the message framing and the temporal distance are thus the key decisions to influence the willingness to share word of mouth.

Keywords: construal levels, crowdfunding, message framing, word of mouth

Procedia PDF Downloads 240
1005 The Mediation Role of Loneliness in the Relationship between Interpersonal Trust and Empathy

Authors: Ghazal Doostmohammadi, Susan Rahimzadeh

Abstract:

Aim: This research aimed to investigate the relationship between empathy and interpersonal trust and recognize the mediating role of loneliness between them in both genders. Methods: With a correlational descriptive design, 192 university students (130 female and 62 male) responded to the questionnaires on “empathy quotient,” “loneliness,” and “interpersonal trust” tests. These tests were designed and validated by experts in the field. Data were analysed using Pearson correlation and path analysis, which is a statistical technique that uses standard linear regression equations to determine the degree of conformity of a theoretical causal model with reality. Results: The data analysis showed that there was no significant correlation between interpersonal trust, both with loneliness (t=0.169) and empathy (t=0.186), while there was a significant negative correlation (t=0.359) between empathy and loneliness. This means that there is an inverse correlation between empathy and loneliness. The path analysis confirmed the hypothesis of the research about the mediating role of loneliness between empathy and interpersonal trust. But gender did not play a role in this relationship. Conclusion: As an outcome, clinical professionals and education trainers should pay more attention to interpersonal trust as a basic need and try to recreate and shape it to prevent people's social breakdown, and on the other hand, self-disclosure training (especially in Men), expression of feelings and courage should be given double importance to prevent the consequences of loneliness.

Keywords: empathy, loneliness, interpersonal trust, gender

Procedia PDF Downloads 65