724,466 research outputs found

    Preferences Arising from Trust Relations

    Get PDF
    Where property has once been impressed with a trust, the quality inheres therein and in the proceeds thereof so long as the trust relation continues, provided the rights of a bonafide purchaser for value and without notice do not intervene and identification remain possible. The trust impress, in the absence of a superior equity, at once places property in the preferred class. In equity, trust property belongs to the cesiui que trust, and his claim to it cannot be defeated by the insolvency or dishonesty of the trustee, if it constitutes, in an identifiable form, a part of the trustee\u27s estate. It goes without saying that, under such circumstances, it is beyond the reach of the general creditors of the trustee

    Peace Building in Bosnia and Herzegovina: Effects of Ingroup Identification, Outgroup Trust and Intergroup Forgiveness on Intergroup Contact

    Get PDF
    The current study examines the effects of ingroup identification, outgroup trust, and intergroup forgiveness on intergroup contact quantity in the diverse cities of Sarajevo and Tuzla in Bosnia and Herzegovina. A total of 455 individuals ranging in age from 14 to 102 self-reported as either Muslim, Roman Catholic, Orthodox Christian, or Other completed a questionnaire. Analyses revealed that ingroup identification was significantly and negatively correlated with intergroup contact quantity; however, ingroup identification was not significantly correlated with outgroup trust or intergroup forgiveness. The comparison between groups revealed significant group differences across all predictor and criterion variables. To confirm whether age or community background had a moderating effect on predicting the relation between ingroup identification, outgroup trust, and intergroup forgiveness on intergroup contact quantity, moderated regression analyses were conducted. Results revealed community background, ingroup identification, and outgroup trust were all significant contributors to the model; however, age and forgiveness were not. Taken as a whole, the entire model accounted for approximately 21% of variability in intergroup contact quantity. The results from the current study reinforce the supposition that the two cities of Sarajevo and Tuzla in Bosnia and Herzegovina cannot move towards reconciliation without first understanding the effect that strong ingroup identification has on mixing with the other diverse groups, and implementing proactive measures to enhance outgroup trust and cross-community outreach. Implementing these measures in the two cities of Sarajevo and Tuzla, along with other areas in Bosnia and Herzegovina, may improve future intergroup relations and move the country closer to reconciliation and peace

    Agent Transparency for Intelligent Target Identification in the Maritime Domain, and its impact on Operator Performance, Workload and Trust

    Get PDF
    This item is only available electronically.Objective: To examine how increasing the transparency of an intelligent maritime target identification system impacts on operator performance, workload and trust in the intelligent agent. Background: Previous research has shown that operator accuracy improves with increased transparency of an intelligent agent’s decisions and recommendations. This can be at the cost of increased workload and response time, although this has not been found by all studies. Prior studies have predominately focussed on route planning and navigation, and it is unclear if the benefits of agent transparency would apply to other tasks such as target identification. Method: Twenty seven participants were required to identify a number of tracks based on a set of identification criteria and the recommendation of an intelligent agent at three transparency levels in a repeated-measures design. The intelligent agent generated an identification recommendation for each track with different levels of transparency information displayed and participants were required to determine the identity of the track. For each transparency level, 70% of the recommendations made by the intelligent agent were correct, with incorrect recommendation due to additional information that the agent was not aware of, such as information from the ship’s radar. Participants’ identification accuracy and identification time were measured, and surveys on operator subjective workload and subjective trust in the intelligent agent were collected for each transparency level. Results: The results indicated that increased transparency information improved the operators’ sensitivity to the accuracy of the agent’s decisions and produced a greater tendency Agent Transparency for Intelligent Target Identification 33 to accept the agent’s decision. Increased agent transparency facilitated human-agent teaming without increasing workload or response time when correctly accepting the intelligent agent’s decision, but increased the response time when rejecting incorrect intelligent agent’s decisions. Participants also reported a higher level of trust when the intelligent agent was more transparent. Conclusion: This study shows the ability of agent transparency to improve performance without increasing workload. Greater agent transparency is also beneficial in building operator trust in the agent. Application: The current study can inform the design and use of uninhabited vehicles and intelligent agents in the maritime context for target identification. It also demonstrates that providing greater transparency of intelligent agents can improve human-agent teaming performance for a previously unstudied task and domain, and hence suggests broader applicability for the design of intelligent agents.Thesis (M.Psych(Organisational & Human Factors)) -- University of Adelaide, School of Psychology, 201

    Group trust yields improved scalability and anomalydetection for p2p systems

    Get PDF
    This paper implements an existing computational model of trust and reputationapplied to a P2P environment, and extends the approach using a novel group trust calculationthat demonstrates improved scalability and anomaly detection for P2P systems. Our analysis isbased on results obtained by simulating a P2P environment using the JXTA open source platform.A trust and reputation model was implemented in the same platform, allowing to constructinga baseline for the behavior of the nodes using combined trust and reputation coefficients in ascenario without malicious nodes. Then simulations were conducted with malicious nodes andthe effect of trust and reputation factors were analyzed regarding their influence on the anomalydetection capacity and scalability in P2P communications. Several simulation scenarios wereconfigured and explored, considering the presence of different number of malicious nodes in theP2P environment, with both constant and variable behavior. Other scenarios included calculationsof combined trust and reputation for node groups. The results show that group trust ensure moreinteractions among nodes, even in the presence of a large number of malicious nodes (60% of thetotal), besides providing focused identification of malicious nodes inside groups

    New Approaches to Traffic Management Solution – With Reference to Sowerby Bridge

    Get PDF
    BACKGROUND This study was commissioned by the Civic Trust to identify new approaches to traffic management solutions for Sowerby Bridge. The objective of the overall study was to identify low cost, innovative solutions to problems created by high volumes of traffic using the A58. This road is the main shopping street in Sowerby Bridge. In our brief it was stressed that any new road construction, such as a by-pass, was not a feasible or acceptable solution due to the severe vertical gradients surrounding Sowerby Bridge. The town is on the brink of a major programme of regeneration. A nationally important canoe slalom course has been created, the riverside mill area fronting onto the River Calder is being developed for commercial and leisure use, and there is a proposal to reopen the Rochdale Canal. In view of this it is essential to ensure that traffic on the A58 is managed so as to minimise its effect on the environment and trade, without adversely affecting local access. In writing our report we have separated the problem and solution identification stages. The solution identification stage is reported in Working Paper 263 (Hopkinson et al 1988b). The final stage of our study, which involves presenting our final solutions back to the users of Sowerby Bridge for comment, is to be reported in a forthcoming report, WP 265 (Hopkinson et al, 1988c)

    Identifying Traffic Problems in a Heavily Trafficked Urban Environment– Reference to Sowerby Bridge

    Get PDF
    1.1 BACKGROUND This study was commissioned by the Civic Trust to identify new approaches to traffic management solutions for Sowerby Bridge. The objective of the overall study was to identify low cost, innovative solutions to problems created by high volumes of traffic using the A58. This road is the main shopping street in Sowerby Bridge. In our brief it was stressed that any new road construction such as a by-pass was not a feasible or acceptable solution due to the severe vertical gradients surrounding Sowerby Bridge. Further, the town is on the brink of a major programme of regeneration. A nationally important canoe slalom has been created; the riverside mill area fronting onto the River Calder is being developed for commercial and leisure use and there is a proposal to reopen the Rochdale Canal. In view of this it is essential to ensure that traffic on the A58 is managed so as to minimise its effect on the environment and trade, without adversely affecting local access. In writing our report we have separated the problem and solution identification stages. The solution identification stage is reported in a companion report (Hopkinson et all 1988b). A further stage of our study which involves presenting our final solutions back to the users of Sowerby Bridge for comment is to be reported in a forthcoming report, WP 265 (Hopkinson et al, 1988c). 1.2 INTRODUCTION This Working Paper describes the methods used and findings from the first stage of our study carried out during October and November 1987 to identify the problems experienced by the users of Sowerby Bridge. Here it is intended to draw conclusions about the approach adopted to elicit people's impressions about problems, the way in which this information was interpreted and the applicability of the method to other situations

    A method for identifying genetic heterogeneity within phenotypically defined disease subgroups.

    Get PDF
    Many common diseases show wide phenotypic variation. We present a statistical method for determining whether phenotypically defined subgroups of disease cases represent different genetic architectures, in which disease-associated variants have different effect sizes in two subgroups. Our method models the genome-wide distributions of genetic association statistics with mixture Gaussians. We apply a global test without requiring explicit identification of disease-associated variants, thus maximizing power in comparison to standard variant-by-variant subgroup analysis. Where evidence for genetic subgrouping is found, we present methods for post hoc identification of the contributing genetic variants. We demonstrate the method on a range of simulated and test data sets, for which expected results are already known. We investigate subgroups of individuals with type 1 diabetes (T1D) defined by autoantibody positivity, establishing evidence for differential genetic architecture with positivity for thyroid-peroxidase-specific antibody, driven generally by variants in known T1D-associated genomic regions.We acknowledge the help of the Diabetes and Inflammation Laboratory Data Service for access and quality control procedures on the data sets used in this study. The JDRF/Wellcome Trust Diabetes and Inflammation Laboratory is in receipt of a Wellcome Trust Strategic Award (107212; J.A.T.) and receives funding from the NIHR Cambridge Biomedical Research Centre. J.L. is funded by the NIHR Cambridge Biomedical Research Centre and is on the Wellcome Trust PhD program in Mathematical Genomics and Medicine at the University of Cambridge. C.W. is funded by the MRC (grant MC_UP_1302/5). We thank M. Simmonds, S. Gough, J. Franklyn, and O. Brand for sharing their AITD genetic association data set and all patients with AITD and control subjects for participating in this study. The AITD UK national collection was funded by the Wellcome Trust. The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript

    Know Your Source : Assessing Credibility Online

    Full text link
    Credibility is the amount of trust that a resource, an argument, a piece of advice or a Web page engenders. It is the composite of the quality of research or observation and the reasoning or interpretation of the writer or speaker. The system that I will share incorporates and distills these criteria and helps to frame the critical thought process when encountering a new site without any obvious redeeming credentials. Since this is tax time of year, this system is named the I.R.S. audit: Identification, Reputation, and Sources

    Biometric Authentication Based on Electrocardiogram

    Get PDF
    The life of modern society is impossible without trust. To ensure trust in the digital world, various encryption algorithms and password policies are used. Passwords are used in a variety of applications from banking applications to email. The advantages of passwords include ease of use and widespread distribution. Forgotten password can be restored or changed. Password weaknesses are largely related to the human factor. Many users use passwords such as “1234” or “qwerty,” and they are also willing to share passwords with friends and colleagues. Vulnerabilities are also associated with software and hardware manufacturers. Many Wi-Fi routers preset very simple passwords, which many users leave unchanged. There are questions for manufacturers of mobile applications. Due to the imperfection of their software, personal data of users often leak. Due to the prevalence of social networks, new authentication methods have appeared. On many websites, you can use accounts from Facebook  or Gmail.com for authentication. If hackers manage to break into large IT vendors, then millions of accounts will be leaked. Many common password problems can be overcome with biometric identification. In particular, biometric data are very difficult to fake; they usually do not change over time. Widespread methods of biometric identification, such as fingerprinting, retina recognition, and voice recognition have various vulnerabilities unfortunately
    • …
    corecore