To see the other types of publications on this topic, follow the link: Untrustworthine.

Journal articles on the topic 'Untrustworthine'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Untrustworthine.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Neto, Afonso Araújo, and Marco Vieira. "Benchmarking Untrustworthiness." International Journal of Dependable and Trustworthy Information Systems 1, no. 2 (April 2010): 32–54. http://dx.doi.org/10.4018/jdtis.2010040102.

Full text
Abstract:
Benchmarking security is hard and, although there are many proposals of security metrics in the literature, no consensual quantitative security metric has been previously proposed. A key difficulty is that security is usually more influenced by what is unknown about a system than by what is known. In this paper, the authors propose the use of an untrustworthiness metric for benchmarking security. This metric, based on the idea of quantifying and exposing the trustworthiness relationship between a system and its owner, represents a powerful alternative to traditional security metrics. As an example, the authors propose a benchmark for Database Management Systems (DBMS) that can be easily used to assess and compare alternative database configurations based on minimum untrustworthiness, which is a low-cost and high-reward trust-based metric. The practical application of the benchmark in four real large database installations shows that untrustworthiness is a powerful metric for administrators to make informed security decisions by taking into account the specifics needs and characteristics of the environment being managed.
APA, Harvard, Vancouver, ISO, and other styles
2

Prole, Dragan. "Untrustworthiness of Troubadour’s mask." Zbornik Matice srpske za drustvene nauke, no. 173 (2020): 25–36. http://dx.doi.org/10.2298/zmsdn2073025p.

Full text
Abstract:
Troubadour? mask denotes a figure activated by Nietzsche in order to arrange a quarrel with his own time. Transformative capacities of its untimilyness were examined from the perspective of the contemporary instability of democratic order, recognized by bulgarian political scientist Ivan Krastev as an expression of encreasing crisis of the trust in the democratic order. Unlike Krastev?s thesis, this paper uncovers that the process of absolutization of trust caracterizes a trajectory from religious faith to antidemocratical, slave-like totalitarian submission. Its conclusion claims that maximalized trust leads to a totalitarian subject, who is unevitably dumb, speechless, deprived of language, explicitly different from all characteristics of Aristotelian political being whose crucial gift was logos. Consequently, the ruth of contemporary mistrust is not antidemocratical, as claimed by Krastev, but reflects an outstanding democratical orientation and presents a direct consequence of the resistance towards the cult of leader.
APA, Harvard, Vancouver, ISO, and other styles
3

Primiero, Giuseppe, and Laszlo Kosolosky. "The Semantics of Untrustworthiness." Topoi 35, no. 1 (December 20, 2013): 253–66. http://dx.doi.org/10.1007/s11245-013-9227-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Neumann, Peter G. "Risks in trusting untrustworthiness." Communications of the ACM 46, no. 9 (September 2003): 120. http://dx.doi.org/10.1145/903893.903924.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wallace, Laura E., Duane T. Wegener, and Richard E. Petty. "When Sources Honestly Provide Their Biased Opinion: Bias as a Distinct Source Perception With Independent Effects on Credibility and Persuasion." Personality and Social Psychology Bulletin 46, no. 3 (July 8, 2019): 439–53. http://dx.doi.org/10.1177/0146167219858654.

Full text
Abstract:
Anecdotally, attributions that others are biased pervade many domains. Yet, research examining the effects of perceptions of bias is sparse, possibly due to some prior researchers conflating bias with untrustworthiness. We sought to demonstrate that perceptions of bias and untrustworthiness are separable and have independent effects. The current work examines these differences in the persuasion domain, but this distinction has implications for other domains as well. Two experiments clarify the conceptual distinction between bias (skewed perception) and untrustworthiness (dishonesty) and three studies demonstrate that source bias can have a negative effect on persuasion and source credibility beyond any parallel effects of untrustworthiness, lack of expertise, and dislikability. The current work suggests that bias is an independent, but understudied source characteristic.
APA, Harvard, Vancouver, ISO, and other styles
6

Fujimura, Tomomi, and Kazuo Okanoya. "Untrustworthiness inhibits congruent facial reactions to happy faces." Biological Psychology 121 (December 2016): 30–38. http://dx.doi.org/10.1016/j.biopsycho.2016.09.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bergmann, Michael. "Might-Counterfactuals, Transworld Untrustworthiness and Plantinga’s Free Will Defence." Faith and Philosophy 16, no. 3 (1999): 336–51. http://dx.doi.org/10.5840/faithphil199916332.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Webb, Bianca, Alison C. Hine, and Phoebe E. Bailey. "Difficulty in differentiating trustworthiness from untrustworthiness in older age." Developmental Psychology 52, no. 6 (June 2016): 985–95. http://dx.doi.org/10.1037/dev0000126.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gollwitzer, Mario, Tobias Rothmund, Bianca Alt, and Marc Jekel. "Victim Sensitivity and the Accuracy of Social Judgments." Personality and Social Psychology Bulletin 38, no. 8 (March 22, 2012): 975–84. http://dx.doi.org/10.1177/0146167212440887.

Full text
Abstract:
Recent theorizing on the relation between victim sensitivity and unethical behavior predicts that victim sensitivity is related to an asymmetrical focus on cues associated with untrustworthiness compared to cues associated with trustworthiness. This hypothesis and its consequences for the accuracy of social predictions are investigated in this article. In Study 1, participants rated the trustworthiness of 35 computer-animated faces that differed in their emotional expression. People high in victim sensitivity rated neutral and hostile faces more untrustworthy than people low in victim sensitivity, whereas no such effect was found for friendly faces. In Study 2, participants predicted the cooperativeness of 56 targets on the basis of minimal information. The accuracy of predictions was negatively related to victim sensitivity, and people high in victim sensitivity systematically underestimated targets’ cooperativeness. Thus, the asymmetrical focus on untrustworthiness cues among victim-sensitive individuals seems to impair rather than improve their social judgments.
APA, Harvard, Vancouver, ISO, and other styles
10

Sato, Shintaro, Yong Jae Ko, Yonghwan Chang, and Mark Kay. "How Does the Negative Impact of an Athlete’s Reputational Crisis Spill Over to Endorsed and Competing Brands? The Moderating Effects of Consumer Knowledge." Communication & Sport 7, no. 3 (July 5, 2018): 385–409. http://dx.doi.org/10.1177/2167479518783461.

Full text
Abstract:
Despite some of the recent examinations of an athlete’s reputational crisis (ARC), their negative spillover effects on endorsed and competing brands have been overlooked. The purpose of this study is to investigate the relationships between perceived severity, athlete endorser credibility (i.e., incompetence, untrustworthiness), and attitudes towards endorsed and competing brands. To enhance theoretical understanding of the phenomenon, the moderating role of consumer knowledge was also tested. Participants were recruited from Amazon Mechanical Turk ( N = 339). A multigroup structural equation model was employed to test the hypothesized model. Results indicated that the severity of an ARC is associated with the perceived incompetence and untrustworthiness of focal athletes. Perceived incompetence is associated with negative evaluation of an endorsed brand. Furthermore, this impact is significantly stronger for consumers with greater knowledge of the athletes than those who are less knowledgeable. Interestingly, competitor brands received negative impact indirectly from the athlete endorsers’ incompetence. This spillover effect is also manifested differently depending on the level of consumer knowledge.
APA, Harvard, Vancouver, ISO, and other styles
11

Lischke, Alexander, Martin Junge, Alfons O. Hamm, and Mathias Weymar. "Enhanced processing of untrustworthiness in natural faces with neutral expressions." Emotion 18, no. 2 (March 2018): 181–89. http://dx.doi.org/10.1037/emo0000318.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Mathias, T. A. "Values, the Bedrock of Successful Business." Management and Labour Studies 25, no. 3 (July 2000): 211–19. http://dx.doi.org/10.1177/0258042x0002500306.

Full text
Abstract:
That a company should be known as value-based is essential for its credibility with the public, among its employees and in the market. In a competitive world, a company or a nation which bears the label of untrustworthiness or unreliability is doomed to stagnation. What are values and what does it take to build a value-based organization?
APA, Harvard, Vancouver, ISO, and other styles
13

Gutiérrez-García, Aida, Manuel G. Calvo, and Michael W. Eysenck. "Social anxiety and detection of facial untrustworthiness: Spatio-temporal oculomotor profiles." Psychiatry Research 262 (April 2018): 55–62. http://dx.doi.org/10.1016/j.psychres.2018.01.031.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Bruni, Luigino, and Fabio Tufano. "The value of vulnerability: The transformative capacity of risky trust." Judgment and Decision Making 12, no. 4 (July 2017): 408–14. http://dx.doi.org/10.1017/s1930297500006276.

Full text
Abstract:
AbstractIn an experimental gift-exchange game, we explore the transformative capacity of vulnerable trust, which we define as trusting untrustworthy players when their untrustworthiness is common knowledge between co-players. In our experiment, there are two treatments: the “Information” treatment and the “No-Information” treatment in which we respectively disclose or not information about trustees’ trustworthiness. Our laboratory evidence consistently supports the transformative capacity of trustors’ vulnerable trust, which generates higher transfers, more trustworthiness and increased reciprocity by untrustworthy trustees.
APA, Harvard, Vancouver, ISO, and other styles
15

Moon, Ruth. "When Journalists See Themselves as Villains: The Power of Negative Discourse." Journalism & Mass Communication Quarterly 98, no. 3 (January 22, 2021): 790–807. http://dx.doi.org/10.1177/1077699020985465.

Full text
Abstract:
This article examines the way journalists talk about themselves and negotiate authority with sources, audiences, and media policy in a postconflict, developmental authoritarian state. Grounded in concepts of metajournalistic discourse and authority, the study shows how members of the journalism field in some contexts embrace a narrative that limits autonomy and situates them as untrustworthy social actors. Interviews collected over a 7-month period in Rwanda show that a shared sense of untrustworthiness defines the contemporary boundaries of the Rwandan journalism field. The findings also suggest that consensus-oriented or postconflict social contexts might encourage journalists to adopt less autonomous social roles.
APA, Harvard, Vancouver, ISO, and other styles
16

Keefe, Bruce D., Matthias Villing, Chris Racey, Samantha L. Strong, Joanna Wincenciak, and Nick E. Barraclough. "A database of whole-body action videos for the study of action, emotion, and untrustworthiness." Behavior Research Methods 46, no. 4 (March 1, 2014): 1042–51. http://dx.doi.org/10.3758/s13428-013-0439-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Voorhoeve, Alex, Arnaldur Stefánsson, and Brian Wallace. "Similarity and the trustworthiness of distributive judgements." Economics and Philosophy 35, no. 3 (December 27, 2018): 537–61. http://dx.doi.org/10.1017/s0266267118000457.

Full text
Abstract:
AbstractWhen people must either save a greater number of people from a smaller harm or a smaller number from a greater harm, do their choices reflect a reasonable moral outlook? We pursue this question with the help of an experiment. In our experiment, two-fifths of subjects employ a similarity heuristic. When alternatives appear dissimilar in terms of the number saved but similar in terms of the magnitude of harm prevented, this heuristic mandates saving the greater number. In our experiment, this leads to choices that are inconsistent with all standard theories of justice. We argue that this demonstrates the untrustworthiness of distributive judgements in cases that elicit similarity-based choice.
APA, Harvard, Vancouver, ISO, and other styles
18

Palmer, T. N., and A. Weisheimer. "A Simple Pedagogical Model Linking Initial-Value Reliability with Trustworthiness in the Forced Climate Response." Bulletin of the American Meteorological Society 99, no. 3 (March 1, 2018): 605–14. http://dx.doi.org/10.1175/bams-d-16-0240.1.

Full text
Abstract:
Abstract Although the development of seamless prediction systems is becoming increasingly common, there is still confusion regarding the relevance of information from initial-value forecasts for assessing the trustworthiness of the climate system’s response to forcing. A simple system that mimics the real climate system through its regime structure is used to illustrate this potential relevance. The more complex version of this model defines “reality” and a simplified version of the system represents the “model.” The model’s response to forcing is profoundly incorrect. However, the untrustworthiness of the model’s response to forcing can be deduced from the model’s initial-value unreliability. The nonlinearity of the system is crucial in accounting for this result.
APA, Harvard, Vancouver, ISO, and other styles
19

Brandes, Or, Avital Stern, and Guy Doron. "“I just can't trust my partner”: Evaluating associations between untrustworthiness obsessions, relationship obsessions and couples violence." Journal of Obsessive-Compulsive and Related Disorders 24 (January 2020): 100500. http://dx.doi.org/10.1016/j.jocrd.2019.100500.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Russlies, Verena. "Das unwahrscheinlich (un-)zuverlässige Erzählen in Wolfgang Herrndorfs ,,Sand“." Zeitschrift für Germanistik 31, no. 1 (January 1, 2021): 36–52. http://dx.doi.org/10.3726/92168_36.

Full text
Abstract:
Abstract Der Beitrag untersucht die potenziell unzuverlässige Erzählweise von Wolfgang Herrndorfs Roman Sand. Dabei werden signifikante Abweichungen von der textevozierten Leseerwartung, die u. a. auf Rezeptionskonventionen der Kriminalliteratur aufbaut, als Indizien für mimetische Unzuverlässigkeit gelesen. Obwohl der Grad erzählerischer Unzuverlässigkeit stark interpretationsabhängig bleibt, wird deutlich, dass diese im Werk hauptsächlich autoreferenzielle Funktionen übernimmt.This article examines the potential unreliable narration in Wolfgang Herrndorf’s novel Sand. In doing so, the significant discrepancies from the reader’s expectation, which among other things builds on the conventional reception of crime fiction, are read as indication for a mimetic unreliability. While the degree in which the narrative is seen as unreliable heavily depends on the interpretation, it becomes apparent that this untrustworthiness primarily takes on a self-referential role.
APA, Harvard, Vancouver, ISO, and other styles
21

Russlies, Verena. "Das unwahrscheinlich (un-)zuverlässige Erzählen in Wolfgang Herrndorfs ,,Sand“." Zeitschrift für Germanistik 31, no. 1 (January 1, 2021): 36–52. http://dx.doi.org/10.3726/92168_36.

Full text
Abstract:
Abstract Der Beitrag untersucht die potenziell unzuverlässige Erzählweise von Wolfgang Herrndorfs Roman Sand. Dabei werden signifikante Abweichungen von der textevozierten Leseerwartung, die u. a. auf Rezeptionskonventionen der Kriminalliteratur aufbaut, als Indizien für mimetische Unzuverlässigkeit gelesen. Obwohl der Grad erzählerischer Unzuverlässigkeit stark interpretationsabhängig bleibt, wird deutlich, dass diese im Werk hauptsächlich autoreferenzielle Funktionen übernimmt.This article examines the potential unreliable narration in Wolfgang Herrndorf’s novel Sand. In doing so, the significant discrepancies from the reader’s expectation, which among other things builds on the conventional reception of crime fiction, are read as indication for a mimetic unreliability. While the degree in which the narrative is seen as unreliable heavily depends on the interpretation, it becomes apparent that this untrustworthiness primarily takes on a self-referential role.
APA, Harvard, Vancouver, ISO, and other styles
22

Lipton, Jack P., Maureen O'Connor, and Bruce D. Sales. "Rethinking The Admissibility of Medical Treatises as Evidence." American Journal of Law & Medicine 17, no. 3 (1991): 209–48. http://dx.doi.org/10.1017/s0098858800009035.

Full text
Abstract:
This Article examines the issues and questions which underlie the debate over the admission of “medical treatises” into evidence. The admissibility of this type of evidence is at issue most often in litigation involving complex medico-legal issues. This Article outlines the evidentiary basis for admission of medical treatises and discusses the quality of medical treatises in an effort to determine what value to the fact-finder these treatises actually hold. The authors contend that there is an inherent untrustworthiness associated with medical treatises, but do not go so far as to suggest that medical treatises should never be admitted. The Article concludes that there is a need for greater caution in determining admissibility and recommends safeguards to better guarantee trustworthiness and reliability.
APA, Harvard, Vancouver, ISO, and other styles
23

Wallace, Laura E., Duane T. Wegener, and Richard E. Petty. "Influences of source bias that differ from source untrustworthiness: When flip-flopping is more and less surprising." Journal of Personality and Social Psychology 118, no. 4 (April 2020): 603–16. http://dx.doi.org/10.1037/pspa0000181.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Engell, Andrew D., James V. Haxby, and Alexander Todorov. "Implicit Trustworthiness Decisions: Automatic Coding of Face Properties in the Human Amygdala." Journal of Cognitive Neuroscience 19, no. 9 (September 2007): 1508–19. http://dx.doi.org/10.1162/jocn.2007.19.9.1508.

Full text
Abstract:
Deciding whether an unfamiliar person is trustworthy is one of the most important decisions in social environments. We used functional magnetic resonance imaging to show that the amygdala is involved in implicit evaluations of trustworthiness of faces, consistent with prior findings. The amygdala response increased as perceived trustworthiness decreased in a task that did not demand person evaluation. More importantly, we tested whether this response is due to an individual's idiosyncratic perception or to face properties that are perceived as untrustworthy across individuals. The amygdala response was better predicted by consensus ratings of trustworthiness than by an individual's own judgments. Individual judgments accounted for little residual variance in the amygdala after controlling for the shared variance with consensus ratings. These findings suggest that the amygdala automatically categorizes faces according to face properties commonly perceived to signal untrustworthiness.
APA, Harvard, Vancouver, ISO, and other styles
25

Teunisse, Alessandra K., Trevor I. Case, Julie Fitness, and Naomi Sweller. "I Should Have Known Better: Development of a Self-Report Measure of Gullibility." Personality and Social Psychology Bulletin 46, no. 3 (June 28, 2019): 408–23. http://dx.doi.org/10.1177/0146167219858641.

Full text
Abstract:
The aim of this research was to explore the predictors of gullibility and to develop a self-report measure of the construct. In Studies 1 to 3, exploratory and confirmatory factor analyses were conducted on a large pool of items resulting in a 12-item scale with two factors: Persuadability and Insensitivity to cues of untrustworthiness. Study 4 confirmed the criterion validity of the scale using two distinct samples: scam victims and members of the Skeptics Society. Study 5 demonstrated positive relationships between gullibility and the self-reported persuasiveness of, and likelihood of responding to, unsolicited emails. Throughout the article, analyses of a variety of measures expected to converge with the scale provided evidence for its construct validity. Overall, these studies demonstrate that the construct of gullibility is distinct from trust, negatively related to social intelligence, and that the Gullibility Scale is a reliable and valid measure of gullibility.
APA, Harvard, Vancouver, ISO, and other styles
26

Woo, Julia, Anuja Bhalerao, Monica Bawor, Meha Bhatt, Brittany Dennis, Natalia Mouravska, Laura Zielinski, and Zainab Samaan. "“Don’t Judge a Book by Its Cover”: A Qualitative Study of Methadone Patients’ Experiences of Stigma." Substance Abuse: Research and Treatment 11 (January 1, 2017): 117822181668508. http://dx.doi.org/10.1177/1178221816685087.

Full text
Abstract:
Introduction: Despite its efficacy and widespread use, methadone maintenance treatment (MMT) continues to be widely stigmatized. Reducing the stigma surrounding MMT will help improve the accessibility, retention, and treatment outcomes in MMT. Methods: Semi-structured interviews were conducted with 18 adults undergoing MMT. Thematic content analysis was used to identify overarching themes. Results: In total, 78% of participants reported having experienced stigma surrounding MMT. Common stereotypes associated with MMT patients included the following: methadone as a way to get high, incompetence, untrustworthiness, lack of willpower, and heroin junkies. Participants reported that stigma resulted in lower self-esteem; relationship conflicts; reluctance to initiate, access, or continue MMT; and distrust toward the health care system. Public awareness campaigns, education of health care workers, family therapy, and community meetings were cited as potential stigma-reduction strategies. Discussion and Conclusion: Stigma is a widespread and serious issue that adversely affects MMT patients’ quality of life and treatment. More efforts are needed to combat MMT-related stigma.
APA, Harvard, Vancouver, ISO, and other styles
27

PytlikZillig, Lisa M., Shiyuan Wang, Leen-Kiat Soh, Alan J. Tomkins, Ashok Samal, Tonya K. Bernadt, and Michael J. Hayes. "Exploring Reactions to Hacktivism Among STEM College Students: A Preliminary Model of Hacktivism Support and Resistance." Social Science Computer Review 33, no. 4 (September 4, 2014): 479–97. http://dx.doi.org/10.1177/0894439314546815.

Full text
Abstract:
This study investigated the predictors of support for and resistance to hacktivism in a sample of 78 science, technology, engineering, and mathematics majors at a Midwestern university. Results from surveys about real-world instances of hacktivism indicate different preexisting global attitudes predict specific situational hacktivism support (predicted by admiration) versus resistance (predicted by willingness to report). Also, participants gave greater weight to their perceptions of hacktivist (rather than target) trustworthiness/untrustworthiness. Comparisons among different facets of trustworthiness suggest perceptions of shared values with and integrity of the hacktivists are especially important for predicting support and resistance. Participants also were more supportive of hacktivism rated as having higher utilitarian value but not less supportive of hacktivism initiated for retribution. Mediation analyses indicated that situation perceptions significantly mediated the effects of global attitudes on hacktivism support/resistance, but that the significance of specific mediators was inconsistent across analyses. This suggests that the importance of mediators may depend on specific context.
APA, Harvard, Vancouver, ISO, and other styles
28

Kijewski, Sara, and Markus Freitag. "Civil War and the Formation of Social Trust in Kosovo." Journal of Conflict Resolution 62, no. 4 (September 16, 2016): 717–42. http://dx.doi.org/10.1177/0022002716666324.

Full text
Abstract:
While a new, growing subset of the literature argues that armed conflict does not necessarily erode social cohesion in the postwar era, we challenge this perspective and examine how civil war experiences shape social trust in Kosovo after the war from 1998 to 1999. Based on a nationwide survey conducted in 2010 and the disaggregated conflict event data set of the Armed Conflict Location & Event Data Project, we simultaneously analyze the impact of individual war-related experiences and exposure to war in the community through hierarchical analyses of twenty-six municipalities. Our findings confirm that civil war is negatively related to social trust. This effect proves to be more conclusive for individual war experiences than for contextual war exposure. Arguably, the occurrence of instances of violence with lasting psychological as well as social structural consequences provides people with clear evidence of the untrustworthiness, uncooperativeness, and hostility of others, diminishing social trust in the aftermath of war.
APA, Harvard, Vancouver, ISO, and other styles
29

Álvarez-Amorós, José A. "Revisiting ‘Third-Person’ Narrative Unreliability." Poetica 52, no. 3-4 (December 23, 2021): 361–86. http://dx.doi.org/10.30965/25890530-05201015.

Full text
Abstract:
Abstract Taking its cue from the critical treatment given to unreliable narration by Wayne C. Booth and his early followers, and in contrast to the claims often made in the field of authentication theory, this paper seeks to join the debate on “third-person” narrative unreliability by outlining an inclusive approach to this phenomenon in which the “person” parameter need not be a determining factor. To theorize and illustrate this approach, a methodological context is first developed by juxtaposing Genette’s revisionist stance on voice and perception with Booth’s 1961 dismissal of the vocal issue and his controversial assimilation of tellers and observers. Then Ryan’s dissenting views are addressed by identifying common ground between her idea of the impersonal narrator and the principles of inclusivity which precisely rest on the impersonating potential of that figure. Finally the inclusive conception of unreliability is shown at work in three Jamesian tales – “The Aspern Papers” (1888), “The Liar” (1888), and “The Beast in the Jungle” (1903) – whose different vocal options do not seem to immunize their narrators against charges of untrustworthiness.
APA, Harvard, Vancouver, ISO, and other styles
30

ROBERTS, JONATHAN. "Trust and Early Years Childcare: Parents’ Relationships with Private, State and Third Sector Providers in England." Journal of Social Policy 40, no. 4 (April 14, 2011): 695–715. http://dx.doi.org/10.1017/s0047279411000225.

Full text
Abstract:
AbstractRelationships of trust are central to the provision of public services. There are, however, concerns that public service reform may disrupt established trust relations. One such reform is the provision of services by a mix of organisations from state, for-profit and third sectors. This paper reports upon an empirical study of the trust relationships between parents and diverse organisations providing early years childcare. It considers whether organisational form or sector is perceived to be a significant indicator of trustworthiness or untrustworthiness, and examines organisational behaviours which may support or hinder trusting relationships. The paper reports that a priori signals, such as sector, have little effect on decisions to trust. Instead, parents actively construct trust through observation of and interactions with providers. Attention therefore shifts to trust-producing organisational behaviours, such as transparency, and to trust-reducing behaviours, such as staff turnover. The paper identifies some benefit in provision through an integrated centre, where parents develop trust over time prior to preschool childcare use. Such a process may be particularly helpful to parents who face disadvantage.
APA, Harvard, Vancouver, ISO, and other styles
31

Piterová, Ivana. "Institutional trust and the perceived trustworthiness of the unemployed and attitudes to sanctions on the unemployed: An analysis of ESS Round 8 data." Intersections 8, no. 4 (2022): 132–48. http://dx.doi.org/10.17356/ieejsp.v8i4.961.

Full text
Abstract:
The topic of unemployment benefits, especially conditional ones, generates a lot of discussion and is associated with differences in attitudes among both people and countries. This paper aims to analyse the perceptions of the trustworthiness of the unemployed and institutional trust in relation to attitudes to sanctions on the unemployed who refuse to work for certain reasons. Data from the 8th Round of the European Social Survey (2016) focusing on preferences for sanctions on the unemployed who refuse work were analysed. The sample consisted of 9,620 respondents from 22 European countries who answered three selected questions. A two-level regression analysis proved that the perceived trustworthiness of the unemployed, gender, age, education and subjective income were significant predictors of attitudes to sanctions for the unemployed, while institutional trust at the country level moderated this relationship. The perceived untrustworthiness of the unemployed lessened the preference for maintaining benefits in the case of refusal to work; this association is weaker in countries with a higher level of institutional trust. Accordingly, increasing trust at all levels can decrease the pressure on unemployment insurance systems.
APA, Harvard, Vancouver, ISO, and other styles
32

Capraro, Valerio, Francesca Giardini, Daniele Vilone, and Mario Paolucci. "Partner selection supported by opaque reputation promotes cooperative behavior." Judgment and Decision Making 11, no. 6 (November 2016): 589–600. http://dx.doi.org/10.1017/s1930297500004800.

Full text
Abstract:
AbstractReputation plays a major role in human societies, and it has been proposed as an explanation for the evolution of cooperation. While the majority of previous studies equates reputation with a transparent and complete history of players’ past decisions, reputations in real life are often ambiguous and opaque. Using web-based experiments, we explore the extent to which opaque reputation works in isolating defectors, with and without partner selection opportunities. We found that low reputation works as a signal of untrustworthiness, whereas medium or high reputations are not taken into account by subjects for orienting their choices. Reputation without partner selection does not promote cooperative behavior; that is, defectors do not turn into cooperators only for the sake of getting a positive reputation. Finally, in a third study, when reputation is pivotal to selection, then a substantial proportion of would-be-defectors turn into cooperators. Taken together, these results provide insights about the characteristics of reputation and about the way in which humans make use of it when selecting partners, and also when knowing that they will be selected.
APA, Harvard, Vancouver, ISO, and other styles
33

Yi, Yang. "Application of Blockchain Technology Based on Privacy Data Protection in RMB Internationalization Path." Mobile Information Systems 2022 (September 7, 2022): 1–10. http://dx.doi.org/10.1155/2022/1904593.

Full text
Abstract:
With the integration of industrial Internet of Things technology and traditional industries, industrial Internet of Things has profoundly changed the production mode, organization mode, and business model of traditional industries. While people are enjoying the convenience brought by the Internet, their concerns about personal privacy are gradually increasing. Maintaining the value stability of RMB payment means and the security and efficiency of RMB settlement system are the key measures to promote the internationalization of RMB. Aiming at the problem of data insecurity and untrustworthiness in traditional information systems, this paper proposes a data protection technology for information systems based on blockchain. In the hierarchical authority information system, multichain structure is adopted to divide the authority of nodes in each layer, so that only the nodes with corresponding authority can access and operate data. Private digital currency, which is based on blockchain technology and represented by payment token and stable currency, helps to improve the defects of the agent banking model but increases additional market risks and trust risks. Blockchain technology adopts special networking technology and consensus mechanism. Therefore, in blockchain privacy protection, the focus of blockchain privacy protection is identity information and transaction information.
APA, Harvard, Vancouver, ISO, and other styles
34

Xu, Gang, Shiyuan Xu, Yibo Cao, Fan Yun, Yu Cui, Yiying Yu, and Ke Xiao. "PPSEB: A Postquantum Public-Key Searchable Encryption Scheme on Blockchain for E-Healthcare Scenarios." Security and Communication Networks 2022 (March 29, 2022): 1–13. http://dx.doi.org/10.1155/2022/3368819.

Full text
Abstract:
In the current E-healthcare scenarios, medical institutions are used to encrypt the information and store it in an Electronic Health Record (EHR) system in order to ensure the privacy of medical information. To realize data sharing, a Public-key Encryption with Keyword Search (PEKS) scheme is indispensable, ensuring doctors search for medical information in the state of ciphertext. However, the traditional PEKS scheme cannot resist the keyword guessing quantum computing attacks, and its security depends on the confidentiality of the secret key. In addition, classical PEKS hand over the search process to a third party, affecting the search results’ accuracy. Therefore, we proposed a postquantum Public-key Searchable Encryption scheme on Blockchain (PPSEB) for E-healthcare scenarios. Firstly, we utilized a lattice-based cryptographic primitive to ensure the security of the search process and achieve forward security to avoid key leakage of medical information. Secondly, we introduced blockchain technology to solve the problem of third-party untrustworthiness in the search process. Finally, through security analysis, we prove the correctness and forward security of the solution in the E-healthcare scenarios, and the comprehensive performance evaluation demonstrates the efficiency of our scheme compared with other existing schemes.
APA, Harvard, Vancouver, ISO, and other styles
35

.M, Ms Mahalakshmi, and Dr Dinesh Senduraja. "Enthusiasm Adeptness in Wireless Position finder Multiuse building Via Envelope Severe Technique." International Journal of Engineering and Computer Science 10, no. 12 (December 19, 2021): 25464–72. http://dx.doi.org/10.18535/ijecs/v10i12.4646.

Full text
Abstract:
The wireless instrument complex is an ad – hoc network. It consists of small light weighted wireless nodes called device nodes. The systematic model that allows us to derive some correct results vis-à-vis energy consumption and difficulty. Also, some main contemplations about the application of the proposed technique in a real instrument network, i.e., by taking into account erasure channels, MAC- layer overhead, and actual computational properties of nodes. The effect of important parameters such as nodes’ concentration and program range through both extensive mockups and an methodical study of the trade-off between energy saving, convolution, and untrustworthiness of the proposed technique. A novel approach that splits the inventive messages into quite a lot of containers such that each node in the network will forward only small sub containers. The intense procedure is achieved applying the Packet Unbearable algorithm and the Chinese deposit proposition algorithm (CDP) which is characterized by a simple modular detachment between integers. The sink node, once all sub sachets is received correctly, will recombine them, thus reconstructing the original message. The excruciating process is especially helpful for those forwarding nodes that are more solicited than others due to their situation inside the network.
APA, Harvard, Vancouver, ISO, and other styles
36

Alexander, Catherine. "Homeless in the homeland: Housing protests in Kazakhstan." Critique of Anthropology 38, no. 2 (March 19, 2018): 204–20. http://dx.doi.org/10.1177/0308275x18758872.

Full text
Abstract:
This article tracks housing protests in Kazakhstan’s former capital city, Almaty, from 1989 to 2016 for what they reveal about shifting ideas of rights and obligations between citizens and state. Three broad models of moral economies of housing emerge: the first, during the Soviet period, where equal access to housing was nominally in return for labour; the second, during the early Republican period when pro-Kazakh policies favoured previously marginalised ethnic Kazakhs, and, the third, in the period 2004 – 2008, when the country’s wealth increased, before the financial crash and the plunging value of the local currency. This last period was when a professional class was increasingly valorised by the government with housing support mechanisms created specifically for them. Protests in each period highlight the failures of each model to provide secure, adequate housing. A constant theme of ‘illegal legality’ and informal practices, variously construed by citizens as moral, pragmatic or immoral, have consistently undermined both the achievement of housing promises and the safety and security of housing. The article explores the paradox of why citizens continue to demand help and interventions from the state amidst such pervasive untrustworthiness.
APA, Harvard, Vancouver, ISO, and other styles
37

Dearborn, Carly, and Sam Meister. "Failure as process." Alexandria: The Journal of National and International Library and Information Issues 27, no. 2 (August 2017): 83–93. http://dx.doi.org/10.1177/0955749017722076.

Full text
Abstract:
Disaster, loss, and failure preoccupy the minds of many digital preservation professionals, and yet, despite the prominence of digital disaster planning guidelines which seem to anticipate failure, there is limited discussion of experience with preservation system or network failures, which are often framed as inevitable in digital preservation. Despite this framing, negative perceptions of failure influence the digital preservation discourse by associating failure with poor planning, unreliability, and untrustworthiness on the part of institutions. This article will interrogate the issue of failure within the digital preservation field and consider the need for more conversations around network failure and recovery. The authors will argue that failure is part of the process of digital preservation and more honest conversations around this topic will contribute to the practice of openness and transparency within the digital preservation community. To illustrate these issues, the authors will discuss the actual hardware failures experienced by the MetaArchive Cooperative, a community-based distributed digital preservation network, and how the Cooperative’s utilization of the LOCKSS software allowed it to recover from those failures. Additionally, the lessons learned and resulting changes the Cooperative made to technical infrastructure, hardware diversity, policies and procedures will be shared.
APA, Harvard, Vancouver, ISO, and other styles
38

Brown, Carys. "Catholic politics and creating trust in eighteenth-century England." British Catholic History 33, no. 4 (September 6, 2017): 622–44. http://dx.doi.org/10.1017/bch.2017.28.

Full text
Abstract:
In eighteenth-century law and print, English Catholics were portrayed as entirely untrustworthy, and their exclusion from all aspects of English society encouraged. Yet, as many local studies have shown, there were numerous individual cases of relatively peaceful coexistence between Protestants and Catholics in this period. This article explores why this was the case by examining how Catholics overcame labels of untrustworthiness on a local level. Using the remarkable political influence of one high-status Catholic in the first half of the eighteenth century as a case study, it questions the utility of “pragmatism” as an explanation for instances of peaceful coexistence in this period. Instead it focuses on the role that deliberate Catholic resistance to legal disabilities played in allowing them to be considered as trustworthy individuals in their localities. The resulting picture of coexistence points towards a moderation of the historiographical emphasis on mutual compromise between confessions in favour of attention to the determined resilience of minority groups. In explaining this, this article makes the broader point that the influence of trust, long important in studies of early modern economic, political, and social relationships, is ripe for exploration in the context of interconfessional relations.
APA, Harvard, Vancouver, ISO, and other styles
39

Lammasniemi, Laura. "“Precocious Girls”: Age of Consent, Class and Family in Late Nineteenth-Century England." Law and History Review 38, no. 1 (February 2020): 241–66. http://dx.doi.org/10.1017/s073824802000005x.

Full text
Abstract:
A fixed legal age of consent is used to determine when a person has the capacity to consent to sex yet in the late Victorian period the idea became a vehicle through which to address varied social concerns, from child prostitution and child sexual abuse to chastity and marriageability of working-class girls. This article argues that the Criminal Law Amendment Act (CLAA) 1885, the Act that raised the age of consent from thirteen to sixteen, and its application were driven by constructions of gender in conjunction with those of social class and working class family. The article firstly argues that CLAA 1885 and related campaigns reinforced class boundaries, and largely framed the working class family as absent, thereby, requiring the law to step in as a surrogate parent to protect the girl child. Secondly, the paper focuses on narratives emerging from the archives and argues that while narratives of capacity and protection in particular were key concepts behind reforms, the courts showed limited understanding of these terms. Instead, the courts focused on notions resistance, consent, and untrustworthiness of the victim, even when these concepts were not relevant to the proceedings due to victims' young age.
APA, Harvard, Vancouver, ISO, and other styles
40

Meconi, Federica, and Paola Sessa. "Perceived untrustworthiness of a face goes beyond its race when it comes to empathizing with others' pain: An event-related potentials study." International Journal of Psychophysiology 94, no. 2 (November 2014): 173. http://dx.doi.org/10.1016/j.ijpsycho.2014.08.742.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Zhang, Xianchao, You Wang, Nan Mou, and Wenxin Liang. "Propagating Both Trust and Distrust with Target Differentiation for Combating Web Spam." Proceedings of the AAAI Conference on Artificial Intelligence 25, no. 1 (August 4, 2011): 1292–97. http://dx.doi.org/10.1609/aaai.v25i1.8083.

Full text
Abstract:
Propagating trust/distrust from a set of seed (good/bad) pages to the entire Web has been widely used to combat Web spam. It has been mentioned that a combined use of good and bad seeds can lead to better results. However, little work has been known to realize this insight successfully. A serious issue of existing algorithms is that trust/distrust is propagated in non-differential ways. However, it seems to be impossible to implement differential propagation if only trust or distrust is propagated. In this paper, we view that each Web page has both a trustworthy side and an untrustworthy side, and assign two scores to each Web page: T-Rank, scoring the trustworthiness, and D-Rank, scoring the untrustworthiness. We then propose an integrated framework which propagates both trust and distrust. In the framework, the propagation of T-Rank/D-Rank is penalized by the target's current D-Rank/T-Rank. In this way, propagating both trust and distrust with target differentiation is implemented. The proposed Trust-Distrust Rank (TDR) algorithm not only makes full use of both good seeds and bad seeds, but also overcomes the disadvantages of both existing trust propagation and distrust propagation algorithms. Experimental results show that TDR outperforms other typical anti-spam algorithms under various criteria.
APA, Harvard, Vancouver, ISO, and other styles
42

Benamer, Sarah. "Not so hysterical now? Psychotherapy, menopause, and hysterectomy." Attachment: New Directions in Psychotherapy and Relational Psychoanalysis 15, no. 2 (December 22, 2021): 236–52. http://dx.doi.org/10.33212/att.v15n2.2021.236.

Full text
Abstract:
In the context of the body, the essentially female; wombs, menstrual cycles, and concurrent hormones, have seen women ascribed madness, insatiability, untrustworthiness, and danger. Female bodies have been identified in selective parts, considered in abstract, or envisaged as having overwhelming power over the mind. “Hysteria”, the problematic neurosis of uterine origin was at the heart of early psychoanalysis. This diagnosis enshrines a slippage from the physical to the fantastical, and ultimately to the denial of the lived reality of women’s and girl’s bodies. In apparent collusion with patriarchy the neglect of some female bodily experience is perpetuated in contemporary psychoanalytic theory. Nowhere is this more evident than around menopause and hysterectomy (as experienced by either client or therapist). There has been little or no exploration of how practitioners might best support clients for whom menopause is significant, or how we might facilitate women before or after gynaecological surgery. It is as if removal and psychological loss of the same female body parts that our forebears used to so neatly differentiate, diagnose, and pathologise women are now not of note. I am interested as to how we as psychotherapists reclaim female body narratives from this outdated theoretical paradigm to best serve clients experiencing menopause, gynaecological surgery, and mid life in the twenty-first century.
APA, Harvard, Vancouver, ISO, and other styles
43

Alzahrani, Alaa Ahmed. "Exploring Depictions of Bedouins in Travels in Arabia Deserta by Charles Doughty." International Journal of Applied Linguistics and English Literature 7, no. 7 (December 1, 2018): 58. http://dx.doi.org/10.7575/aiac.ijalel.v.7n.7p.58.

Full text
Abstract:
The discourse of Orientalism has often been explored from a Critical Discourse Analysis (CDA) perspective in fiction works and news media published in the 20th and 21st centuries. What remains a largely unexplored area is Oriental views in non-fiction Western writings of the 19th century. One of the key books describing the people of Arabia from this era is Charles Doughty’s (1888) Travels in Arabia Deserta. For this reason, this study analyzed one chapter from this book to explore Doughty’s representation of the Arabian Peninsula Bedouins. By drawing on CDA and the Appraisal framework, this study identified evaluative lexical items used by Doughty to describe the Bedouins and related these lexical choices to three Oriental themes identified in the literature: (1) Oriental inferiority, (2) Oriental barbarity, and (3) Oriental untrustworthiness. An examination of the Oriental themes in Doughty’s book highlights two characteristics of the discourse of Orientalism. One is the underlying cultural superiority of the West and the other is the interdependence of texts describing the people of Arabia. As such, this paper supports the idea that what is encompassed by the label “discourse of Orientalism” can include even seemingly neutral descriptions of people of Arabia, and that existing representations of Arabs are a product of an accumulated body of work rather than from one specific text.
APA, Harvard, Vancouver, ISO, and other styles
44

Hou, Chunna, and Zhijun Liu. "The Survival Processing Advantage of Face: The Memorization of the (Un)Trustworthy Face Contributes More to Survival Adaptation." Evolutionary Psychology 17, no. 2 (April 1, 2019): 147470491983972. http://dx.doi.org/10.1177/1474704919839726.

Full text
Abstract:
Researchers have found that compared with other existing conditions (e.g., pleasantness), information relevant to survival produced a higher rate of retrieval; this effect is known as the survival processing advantage (SPA). Previous experiments have examined that the advantage of memory can be extended to some different types of visual pictorial material, such as pictures and short video clips, but there were some arguments for whether face stimulus could be seen as a boundary condition of SPA. The current work explores whether there is a mnemonic advantage to different trustworthiness of face for human adaptation. In two experiments, we manipulated the facial trustworthiness (untrustworthy, neutral, and trustworthy), which is believed to provide information regarding survival decisions. Participants were asked to predict their avoidance or approach response tendency, when encountering strangers (represented by three classified faces of trustworthiness) in a survival scenario and the control scenario. The final surprise memory tests revealed that it was better to recognize both the trustworthy faces and untrustworthy faces, when the task was related to survival. Experiment 1 demonstrated the existence of a SPA in the bipolarity of facial untrustworthiness and trustworthiness. In Experiment 2, we replicated the SPA of trustworthy and untrustworthy face recognitions using a matched design, where we found this kind of memory benefits only in recognition tasks but not in source memory tasks. These results extend the generality of SPAs to face domain.
APA, Harvard, Vancouver, ISO, and other styles
45

FeldmanHall, Oriel, Joseph E. Dunsmoor, Alexa Tompary, Lindsay E. Hunter, Alexander Todorov, and Elizabeth A. Phelps. "Stimulus generalization as a mechanism for learning to trust." Proceedings of the National Academy of Sciences 115, no. 7 (January 29, 2018): E1690—E1697. http://dx.doi.org/10.1073/pnas.1715227115.

Full text
Abstract:
How do humans learn to trust unfamiliar others? Decisions in the absence of direct knowledge rely on our ability to generalize from past experiences and are often shaped by the degree of similarity between prior experience and novel situations. Here, we leverage a stimulus generalization framework to examine how perceptual similarity between known individuals and unfamiliar strangers shapes social learning. In a behavioral study, subjects play an iterative trust game with three partners who exhibit highly trustworthy, somewhat trustworthy, or highly untrustworthy behavior. After learning who can be trusted, subjects select new partners for a second game. Unbeknownst to subjects, each potential new partner was parametrically morphed with one of the three original players. Results reveal that subjects prefer to play with strangers who implicitly resemble the original player they previously learned was trustworthy and avoid playing with strangers resembling the untrustworthy player. These decisions to trust or distrust strangers formed a generalization gradient that converged toward baseline as perceptual similarity to the original player diminished. In a second imaging experiment we replicate these behavioral gradients and leverage multivariate pattern similarity analyses to reveal that a tuning profile of activation patterns in the amygdala selectively captures increasing perceptions of untrustworthiness. We additionally observe that within the caudate adaptive choices to trust rely on neural activation patterns similar to those elicited when learning about unrelated, but perceptually familiar, individuals. Together, these findings suggest an associative learning mechanism efficiently deploys moral information encoded from past experiences to guide future choice.
APA, Harvard, Vancouver, ISO, and other styles
46

Koeckritz, René, André Beauducel, Johanna Hundhausen, Anika Redolfi, and Anja Leue. "Does concealing familiarity evoke other processes than concealing untrustworthiness? – Different forms of concealed information modulate P3 effects." Personality Neuroscience 2 (2019). http://dx.doi.org/10.1017/pen.2019.4.

Full text
Abstract:
Abstract It was investigated whether concealing learned stimulus attributes (i.e., trustworthiness vs. untrustworthiness) has similar effects on the P3 amplitude than concealing stimulus familiarity. According to salience hypothesis, known, deceptive stimuli (probe) are (perceived) more relevant than truthful, unknown stimuli (irrelevant) evoking a more positive probe P3 amplitude. When all stimuli are known, concealing information is more cognitively demanding than non-concealing information evoking a less positive P3 amplitude according to the mental effort account. Ninety-seven participants concealed knowledge of previously learned faces in the familiarity condition (probe vs. irrelevant stimuli). In the trustworthiness condition, participants concealed untrustworthiness to previously learned faces and responded truthfully to previously learned trustworthy and untrustworthy faces (known, concealed vs. known, truthful stimuli). The parietal mean P3 amplitude was more positive for probe stimuli than for irrelevant stimuli in the familiarity condition providing evidence for the salience hypothesis. In the trustworthiness condition, concealing untrustworthiness showed the smallest parietal mean P3 amplitude suggesting evidence for the mental effort hypothesis. Individual differences of perpetrator’s sensitivity to injustice modulated the P3 amplitude in the trustworthiness condition.
APA, Harvard, Vancouver, ISO, and other styles
47

Hein, Fee-Elisabeth, and Anja Leue. "Concealing Untrustworthiness: The Role of Conflict Monitoring in a Social Deception Task." Frontiers in Psychology 12 (August 20, 2021). http://dx.doi.org/10.3389/fpsyg.2021.718334.

Full text
Abstract:
Deception studies emphasize the important role of event-related potentials (ERPs) to uncover deceptive behavior based on underlying neuro-cognitive processes. The role of conflict monitoring as indicated by the frontal N2 component during truthful and deceptive responses was investigated in an adapted Concealed Information Test (CIT). Previously memorized pictures of faces should either be indicated as truthfully trustworthy, truthfully untrustworthy or trustworthy while concealing the actual untrustworthiness (untrustworthy-probe). Mean, baseline-to-peak and peak-to-peak amplitudes were calculated to examine the robustness of ERP findings across varying quantification techniques. Data of 30 participants (15 female; age: M = 23.73 years, SD = 4.09) revealed longer response times and lower correct rates for deceptive compared to truthful trustworthy responses. The frontal N2 amplitude was more negative for untrustworthy-probe and truthful untrustworthy compared to truthful trustworthy stimuli when measured as mean or baseline-to-peak amplitude. Results suggest that deception evokes conflict monitoring and ERP quantifications are differentially sensitive to a-priori hypotheses.
APA, Harvard, Vancouver, ISO, and other styles
48

Cowan, Katie. "Creation of Fear in an Online Environment." Crossing Borders: Student Reflections on Global Social Issues 2, no. 1 (November 30, 2020). http://dx.doi.org/10.31542/cb.v2i1.1988.

Full text
Abstract:
This study examined public reactions on Twitter about Donald Trump’s messages regarding the COVID-19 pandemic, which created fear in the public, therefore promoting an increase in panic buying. A content analysis of 52 relevant tweets between March 16 and April 3 identified several themes of public reactions to the messages that were transmitted by Donald Trump about COVID-19, including: incompetence, harm, untrustworthiness, political agenda, misinformation, distraction, lack of empathy, and the dismissal of solving panic buying. The most prevalent theme was the incompetence of Donald Trump, which created fear; therefore panic buying increased among the public.
APA, Harvard, Vancouver, ISO, and other styles
49

Wallace, Laura E., Duane T. Wegener, Madison E. Quinn, and Anna J. Ross. "Influences of Position Justification on Perceived Bias: Immediate Effects and Carryover Across Persuasive Messages." Personality and Social Psychology Bulletin, October 13, 2020, 014616722096367. http://dx.doi.org/10.1177/0146167220963678.

Full text
Abstract:
The current research examined how people infer whether novel sources are biased based on their ability to justify their position. Across nine studies, when sources provided weak versus strong arguments, message recipients perceived the source as more biased. This effect held controlling for other possible inferences, such as lack of expertise or untrustworthiness. This research also examined whether perceived source bias on one message can carry over to ambiguously related future persuasive messages. Studies 6 to 8 demonstrated that perceivers use both the perceived bias from an initial message and the argument quality of the second message to determine a source’s bias on the new topic. Finally, perceived bias carried over from an initial message can influence persuasion on a second topic (Study 9). Ultimately, the present work provides insight into factors that affect perceived bias and the dynamic consequences of those perceptions.
APA, Harvard, Vancouver, ISO, and other styles
50

Shin, Sohyoun, and Matthew L. Meuter. "UNTRUSTWORTHINESS IN STUDENT TEAMS: a CROSS-CULTURAL COMPARISON BETWEEN DIFFERENT THINKING CULTURES OF THE U.S. AND SOUTH KOREA." Marketing Education Review, September 14, 2022, 1–18. http://dx.doi.org/10.1080/10528008.2022.2122726.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography