19,966 research outputs found

    Trust realisation in multi-domain collaborative environments

    Get PDF
    In the Internet-age, the geographical boundaries that have previously impinged upon inter-organisational collaborations have become decreasingly important. Of more importance for such collaborations is the notion and subsequent nature of trust - this is especially so in Grid-like environments where resources are both made available and subsequently accessed and used by remote users from a multitude of institutions with a variety of different privileges spanning across the collaborating resources. In this context, the ability to dynamically negotiate and subsequently enforce security policies driven by various levels of inter-organisational trust is essential. In this paper we present a dynamic trust negotiation (DTN) model and associated prototype implementation showing the benefits and limitations DTN incurs in supporting n-tier delegation hops needed for trust realisation in multi-domain collaborative environments

    Collaborative working within UK NHS secondary care and across sectors for COPD and the impact of peer review : qualitative findings from the UK National COPD Resources and Outcomes Project

    Get PDF
    Introduction: We investigated the effects on collaborative work within the UK National Health Service (NHS) of an intervention for service quality improvement: informal, structured, reciprocated, multidisciplinary peer review with feedback and action plans. The setting was care for chronic obstructive pulmonary disease (COPD). Theory and methods: We analysed semi-structured interviews with 43 hospital respiratory consultants, nurses and general managers at 24 intervention and 11 control sites, as part of a UK randomised controlled study, the National COPD Resources and Outcomes Project (NCROP), using Scott’s conceptual framework for action (inter-organisational, intra-organisational, inter-professional and inter-individual). Three areas of care targeted by NCROP involved collaboration across primary and secondary care. Results: Hospital respiratory department collaborations with commissioners and hospital managers varied. Analysis suggested that this is related to team responses to barriers. Clinicians in unsuccessful collaborations told ‘atrocity stories’ of organisational, structural and professional barriers to service improvement. The others removed barriers by working with government and commissioner agendas to ensure continued involvement in patients’ care. Multidisciplinary peer review facilitated collaboration between participants, enabling them to meet, reconcile differences and exchange ideas across boundaries. Conclusions: The data come from the first randomised controlled trial of organisational peer review, adding to research into UK health service collaborative work, which has had a more restricted focus on inter-professional relations. NCROP peer review may only modestly improve collaboration but these data suggest it might be more effective than top-down exhortations to change when collaboration both across and within organisations is required

    Federated and autonomic management of multimedia services

    Get PDF
    Over the years, the Internet has significantly evolved in size and complexity. Additionally, the modern multimedia services it offers have considerably more stringent Quality of Service (QoS) requirements than traditional static services. These factors contribute to the ever-increasing complexity and cost to manage the Internet and its services. In the dissertation, a novel network management architecture is proposed to overcome these problems. It supports QoS-guarantees of multimedia services across the Internet, by setting up end-to-end network federations. A network federation is defined as a persistent cross-organizational agreement that enables the cooperating networks to share capabilities. Additionally, the architecture incorporates aspects from autonomic network management to tackle the ever-growing management complexity of modern communications networks. Specifically, a hierarchical approach is presented, which guarantees scalable collaboration of huge amounts of self-governing autonomic management components

    If you build it, will they come? How researchers perceive and use web 2.0

    Get PDF
    Over the past 15 years, the web has transformed the way we seek and use information. In the last 5 years in particular a set of innovative techniques – collectively termed ‘web 2.0’ – have enabled people to become producers as well as consumers of information. It has been suggested that these relatively easy-to-use tools, and the behaviours which underpin their use, have enormous potential for scholarly researchers, enabling them to communicate their research and its findings more rapidly, broadly and effectively than ever before. This report is based on a study commissioned by the Research Information Network to investigate whether such aspirations are being realised. It seeks to improve our currently limited understanding of whether, and if so how, researchers are making use of various web 2.0 tools in the course of their work, the factors that encourage or inhibit adoption, and researchers’ attitudes towards web 2.0 and other forms of communication. Context: How researchers communicate their work and their findings varies in different subjects or disciplines, and in different institutional settings. Such differences have a strong influence on how researchers approach the adoption – or not – of new information and communications technologies. It is also important to stress that ‘web 2.0’ encompasses a wide range of interactions between technologies and social practices which allow web users to generate, repurpose and share content with each other. We focus in this study on a range of generic tools – wikis, blogs and some social networking systems – as well as those designed specifically by and for people within the scholarly community. Method: Our study was designed not only to capture current attitudes and patterns of adoption but also to identify researchers’ needs and aspirations, and problems that they encounter. We began with an online survey, which collected information about researchers’ information gathering and dissemination habits and their attitudes towards web 2.0. This was followed by in-depth, semi-structured interviews with a stratified sample of survey respondents to explore in more depth their experience of web 2.0, including perceived barriers as well as drivers to adoption. Finally, we undertook five case studies of web 2.0 services to investigate their development and adoption across different communities and business models. Key findings: Our study indicates that a majority of researchers are making at least occasional use of one or more web 2.0 tools or services for purposes related to their research: for communicating their work; for developing and sustaining networks and collaborations; or for finding out about what others are doing. But frequent or intensive use is rare, and some researchers regard blogs, wikis and other novel forms of communication as a waste of time or even dangerous. In deciding if they will make web 2.0 tools and services part of their everyday practice, the key questions for researchers are the benefits they may secure from doing so, and how it fits with their use of established services. Researchers who use web 2.0 tools and services do not see them as comparable to or substitutes for other channels and means of communication, but as having their own distinctive role for specific purposes and at particular stages of research. And frequent use of one kind of tool does not imply frequent use of others as well

    Dynamic trust negotiation for decentralised e-health collaborations

    Get PDF
    In the Internet-age, the geographical boundaries that have previously impinged upon inter-organisational collaborations have become decreasingly important. Of more importance for such collaborations is the notion and subsequent nature of security and trust - this is especially so in open collaborative environments like the Grid where resources can be both made available, subsequently accessed and used by remote users from a multitude of institutions with a variety of different privileges spanning across the collaboration. In this context, the ability to dynamically negotiate and subsequently enforce security policies driven by various levels of inter-organisational trust is essential. Numerous access control solutions exist today to address aspects of inter-organisational security. These include the use of centralised access control lists where all collaborating partners negotiate and agree on privileges required to access shared resources. Other solutions involve delegating aspects of access right management to trusted remote individuals in assigning privileges to their (remote) users. These solutions typically entail negotiations and delegations which are constrained by organisations, people and the static rules they impose. Such constraints often result in a lack of flexibility in what has been agreed; difficulties in reaching agreement, or once established, in subsequently maintaining these agreements. Furthermore, these solutions often reduce the autonomous capacity of collaborating organisations because of the need to satisfy collaborating partners demands. This can result in increased security risks or reducing the granularity of security policies. Underpinning this is the issue of trust. Specifically trust realisation between organisations, between individuals, and/or between entities or systems that are present in multi-domain authorities. Trust negotiation is one approach that allows and supports trust realisation. The thesis introduces a novel model called dynamic trust negotiation (DTN) that supports n-tier negotiation hops for trust realisation in multi-domain collaborative environments with specific focus on e-Health environments. DTN describes how trust pathways can be discovered and subsequently how remote security credentials can be mapped to local security credentials through trust contracts, thereby bridging the gap that makes decentralised security policies difficult to define and enforce. Furthermore, DTN shows how n-tier negotiation hops can limit the disclosure of access control policies and how semantic issues that exist with security attributes in decentralised environments can be reduced. The thesis presents the results from the application of DTN to various clinical trials and the implementation of DTN to Virtual Organisation for Trials of Epidemiological Studies (VOTES). The thesis concludes that DTN can address the issue of realising and establishing trust between systems or agents within the e-Health domain, such as the clinical trials domain

    Built to Change: Catalytic Capacity-Building in Nonprofit Organizations

    Get PDF
    Summarizes the results of a broad survey of programs, and business and nonprofit experts, in the field of organizational effectiveness

    A flexible architecture for privacy-aware trust management

    Get PDF
    In service-oriented systems a constellation of services cooperate, sharing potentially sensitive information and responsibilities. Cooperation is only possible if the different participants trust each other. As trust may depend on many different factors, in a flexible framework for Trust Management (TM) trust must be computed by combining different types of information. In this paper we describe the TAS3 TM framework which integrates independent TM systems into a single trust decision point. The TM framework supports intricate combinations whilst still remaining easily extensible. It also provides a unified trust evaluation interface to the (authorization framework of the) services. We demonstrate the flexibility of the approach by integrating three distinct TM paradigms: reputation-based TM, credential-based TM, and Key Performance Indicator TM. Finally, we discuss privacy concerns in TM systems and the directions to be taken for the definition of a privacy-friendly TM architecture.\u

    The Pudding of Trust

    Get PDF
    Trust - "reliance on the integrity, ability, or character of a person or thing" - is pervasive in social systems. We constantly apply it in interactions between people, organizations, animals, and even artifacts. We use it instinctively and implicitly in closed and static systems, or consciously and explicitly in open or dynamic systems. An epitome for the former case is a small village, where everybody knows everybody, and the villagers instinctively use their knowledge or stereotypes to trust or distrust their neighbors. A big city exemplifies the latter case, where people use explicit rules of behavior in diverse trust relationships. We already use trust in computing systems extensively, although usually subconsciously. The challenge for exploiting trust in computing lies in extending the use of trust-based solutions, first to artificial entities such as software agents or subsystems, then to human users' subconscious choices

    Re-Framing the knowledge to action challenge through NIHR knowledge mobilisation research fellows. Comment on “CIHR Health System Impact Fellows: Reflections on ‘Driving Change’ Within the Health System"

    Get PDF
    The ambition of the Canadian Institutes for Health Research (CIHR) Health Service Impact (HIS) Fellowship initiative to modernise the health system is impressive. Embedded researchers who work between academia and non-academic settings offer an opportunity to reframe the problem of evidence uptake as a product of a gap between those who produce knowledge and those who use it. As such, there has been an increasing interest in the potential of people in embedded research roles to work with stakeholders in the co-production of knowledge to address service challenges. In this commentary, we draw on research and experiential evidence of an embedded researcher initiative, which has similar intentions to the HIS Fellowships programme: the National Institute for Health Research (NIHR) Knowledge Mobilisation Research Fellowship (KMRF) scheme. We outline the similarities and differences between the two schemes, and then consider the work, characteristics and skills, and organisational arrangements evident in operationalising these types of roles
    corecore