Search results for: TRUST IN MATERNITY SERVICES - Bridge of Knowledge

Search

Search results for: TRUST IN MATERNITY SERVICES

Filters

total: 1070
filtered: 810

clear all filters


Chosen catalog filters

  • Category

  • Year

  • Options

clear Chosen catalog filters disabled

Search results for: TRUST IN MATERNITY SERVICES

  • Building Confidence and Trust in Ireland's National Maternity Services Workforce –What matters most and how?

    Publication
    • A. Ojo
    • N. Rizun
    • G. S. Grace
    • W. Przychodzen
    • M. Isazad Mashinchi
    • C. Foley
    • D. Rohde

    - HEALTH POLICY - Year 2023

    National surveys on care experiences are increasingly adopted as regulatory mechanisms for improving care quality and increasing public trust in healthcare services. Based on data collected as part of Ireland's 2020 National Maternity Experience Survey, this study investigates care-related factors that contribute most to confidence and trust in the professional workforce (or carers) within Irish maternity services. The survey covered...

    Full text to download in external service

  • Generating actionable evidence from free-text feedback to improve maternity and acute hospital experiences: A computational text analytics & predictive modelling approach

    Publication
    • A. Ojo
    • N. Rizun
    • M. Isazad Mashinchi
    • G. Walsh
    • J. Gruda
    • M. N. Narayana
    • M. Venosa
    • C. Foley
    • D. Rohde
    • R. Flynn

    - EUROPEAN JOURNAL OF PUBLIC HEALTH - Year 2023

    Background Patient experience surveys are a key source of evidence for supporting decision-making and quality improvement in healthcare services. These surveys contain two main types of questions: closed and open-ended, asking about patients’ care experiences. Apart from the knowledge obtained from analysing closed-ended questions, invaluable insights can be gleaned from free-text data. Advanced analytics techniques are increasingly...

    Full text to download in external service

  • Impact of Usability Website Attributes on Users’ Trust, Satisfaction and Loyalty

    This paper presents the results of an experimental study aimed at identifying possible relationships among website usability characteristics, consumer satisfaction, trust and loyalty. These factors regard not only customer satisfaction in a transactional sense, but in the long term they may affect e-customer behavior, opinions, recommendations and attitudes toward using on-line services in general. The study was performed with...

    Full text to download in external service

  • Validation of Services Supporting Healthcare Standards Conformance

    The paper presents the results of experimental validation of a set of innovative software services supporting processes of achieving, assessing and maintaining conformance with standards and regulations. The study involved several hospitals implementing the Accreditation Standard promoted by the Polish Ministry of Health. First we introduce NOR-STA services that implement the TRUST-IT methodology of argument management. Then we...

    Full text available to download

  • Supporting Assurance by Evidence-based Argument Services

    Structured arguments based on evidence are used in many domains, including systems engineering, quality assurance and standards conformance. Development, maintenance and assessment of such arguments is addressed by TRUST-IT methodology outlined in this paper. The effective usage of TRUST-IT requires an adequate tool support. We present a platform of software services, called NOR-STA, available in the Internet, supporting key activities...

    Full text available to download

  • Prioritising national healthcare service issues from free text feedback – A computational text analysis & predictive modelling approach

    Publication

    - DECISION SUPPORT SYSTEMS - Year 2024

    Patient experience surveys have become a key source of evidence for supporting decision-making and continuous quality improvement within healthcare services. To harness free-text feedback collected as part of these surveys for additional insights, text analytics methods are increasingly employed when the data collected is not amenable to traditional qualitative analysis due to volume. However, while text analytics techniques offer...

    Full text available to download

  • Trust-IT - a framework for trust cases

    Publication

    - Year 2007

    Artykul prezentuje wyniki uzyskane w ramach prac zmierzających do wytworzenia zintegrowanego srodowiska wspomagającego analizę zaufania do systemów i infrastruktur informatycznych. Elementy tego środowiska obejmują język i metodykę trorzenia i pielęgnacji dowodów zaufania (ang. trust case), mtode integrowania z nimi materiału dowodowego, narzędzia wspomagajace zarządzanie dowodami zaufania oraz scenariusze ich wykorzystania w różnych...

  • Comparative conformance cases for monitoring multiple implementations of critical requirements

    Publication

    The paper presents the concept and the mechanism of comparative conformance cases which support conformance monitoring in situations where a standard or other set of requirements are being implemented at multiple sites. The mechanism is enabled by NOR-STA services which implement the TRUST-IT methodology and are deployed in the cloud in accordance with the SaaS model. In the paper we introduce the concept of comparative conformance...

    Full text available to download

  • Security of Web Services

    Publication

    - Year 2006

    Artykuł przedstawia zagadnienia związane tematycznie z Web Services. W szczególności dotyczy problemów związanych z zapewniwniem poufności i integralności danych. Zdefiniowano model bezpieczeństwa Web Services integrujący trzy główne technologie: SOAP, UDDI, WSDL.

  • Modelling Of Commercial Websites. A New Perspective On Usability And Customer Relation

    From an economic point of view, a critical aspect of online services is their ability to retain customers. The aim of presented study was the use of a layered model VIPR (Visual - Interaction - Process - Relation ) for commercial services online. The indicator of trust and establishing lasting relationships were assessment achieved from experienced users of commercial online services (n = 207), obtained by means of Web Credibility...

    Full text available to download

  • Reputacja i zaufanie w systemach teleinformatycznych z podmiotami anonimowymi  podejście dynamiczne

    Abstrakcją współczesnego systemu teleinformatycznego jest system wieloagentowy z autonomicznymi, racjonalnymi i wirtualnie anonimowymi agentami wchodzącymi we wzajemne interakcje dla wymiany usług. W referacie uzasadniono konieczność projektowania dla niego podsystemu budowy reputacji i zaufania oraz odpowiednich analiz w ujęciu dynamicznym. Dokonano przeglądu motywacyjnie zgodnych mechanizmów uczciwego raportowania usług oraz...

  • Supporting compliance with safety standards by trust case templates

    Publication

    - Year 2007

    Standard Compliance (SC) Framework presented in this paper encompasses methods and tools which provide support for application of standards. The framework is based on trust case methodology. A trust case is a data structure which represents a justification that an object (a system, an infrastructure, an organization) exhibits certain properties. It contains an argument and related evidence which support claimed properties. A trust...

  • Factors of successful client co-production in knowledge-intensive business services

    Publication

    Purpose This paper aims to explore the topic of client co-production in knowledge-intensive business services (KIBS). The paper first sketches a theoretical background and reviews previous studies on factors affecting successful client co-production in such companies and then examines these factors via case study research among a small KIBS company and its five customers. Design/methodology/approach The paper is based on an in-depth...

    Full text available to download

  • Client co-production in knowledge-intensive business services (KIBS): Case study analysis

    Publication

    Purpose: This paper aims to explore the topic of client co-production in knowledge-intensive business services (KIBS). The paper first sketches a theoretical background and reviews previous studies on factors affecting successful client co-production in such companies and then examines these factors via case study research among a small KIBS company and its five customers. Methodology: The paper is based on an in-depth analysis...

    Full text available to download

  • Platform governance for sustainable development: Reshaping citizen-administration relationships in the digital age

    Publication

    - GOVERNMENT INFORMATION QUARTERLY - Year 2018

    Changing governance paradigms has been shaping and reshaping the landscape of citizen-administration relationships, from impartial application of rules and regulations by administration to exercise its authority over citizens (bureaucratic paradigm), through provision of public services by administration to fulfil the needs of citizens (consumerist paradigm), to responsibility-sharing between administration and citizens for policy...

    Full text available to download

  • A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS

    The research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated....

    Full text to download in external service

  • Trust Case: justifying trust in an IT solution

    Publication

    - Year 2005

    W artykule prezentujemy podejście wykorzystane przy budowie dowodu zaufania (ang. trust case) do DRIVE, infrastruktury informatycznej wspomagającej dystrybucję i podawanie leków. Cele DRIVE obejmowały bezpieczniejszą i mniej kosztowną dystrybucję leków. Dowód zaufania reprezentuje argumentację przemawiającą za tym, że DRIVE jest godne zaufania. Składa się on z żądań (ang. claims) postulujących pewne związane z zaufaniem własności...

  • An Approach to Trust Case Development

    Publication

    - Year 2003

    In the paper we present an approach to the architectural trust case development for DRIVE, the IT infrastructure supporting the processes of drugs distribution and application. The objectives of DRIVE included safer and cheaper drugs distribution and application. A trust case represents an argument supporting the trustworthiness of the system. It is decomposed into claims that postulate some trust related properties. Claims differ...

    Full text available to download

  • Trust triggers and barriers in intercultural teams

    Intercultural teams are more and more popular nowadays — they constitute a serious challenge in terms of effective cooperation and trust building, however. The article presents the potential problems that can affect intercultural cooperation and stresses the power of trust in cultural diversity conditions. The ten-factor model of intercultural team trust is presented. The main aim was to answer the questions: what are the differences...

    Full text available to download

  • Trust case - a case for trustworthiness of IT infrastructures

    Publication

    - Year 2005

    Artykuł prezentuje podejście do budowy argumentów (trust case) uzasadniających zaufanie do systemów i infrastruktur IT. Wprowadza system pojęć związanych ze strukturą i treścią trust case, identyfikuje udziałowców trust case oraz dyskutuje możliwość wsparcia narzędziowego procesu zarządzanie trust case. Omawia równiez krótko dotychczasowe zastosowania tego podejścia.

  • Trust Dynamics Analysis of CTR Scheme Subversion under Virtual Anonymity and Trust-Unaware Partner Selection

    Publication

    - Year 2016

    We propose a framework to study Markovian trust value dynamics in a centralized Computational Trust and Reputation (CTR) scheme under trust-unaware partner selection using a mean-value approximation. Analytically founded answers are sought to questions like: Can dishonest agents subvert the CTR scheme (i.e., acquire higher trust values than honest agents)? Is indirect reciprocity incentivized? Is there a qualitative impact of a...

    Full text to download in external service

  • Dis/Trust and data-driven technologies

    Publication

    - Internet Policy Review - Year 2023

    This concept paper contextualises, defines, and systematises the concepts of trust and distrust (and their interrelations), providing a critical review of existing literature so as to identify gaps, disjuncture, and continuities in the use of these concepts across the social sciences and in the context of the consolidation of the digital society. Firstly, the development of the concept of trust is explored by looking at its use...

    Full text available to download

  • Trust and Distrust in e-Democracy

    Publication

    - Year 2022

    In the digital government research literature, the concept of trust is typically used as a precondition for the adoption of digital technology in the public sector or an outcome of a roadmap leading up to such adoption. The concept plays a central role in many decisions linked to the planning, adoption and management of the public sector technology. In contrast, the concept of distrust is almost neglected in such literature but,...

    Full text to download in external service

  • Trust and Distrust in e-Democracy

    Publication

    - Year 2022

    In the digital government research literature, the concept of trust is typically used as a precondition for the adoption of digital technology in the public sector or an outcome of a roadmap leading up to such adoption. The concept plays a central role in many decisions linked to the planning, adoption and management of the public sector technology. In contrast, the concept of...

    Full text available to download

  • An approach to evaluation of arguments in trust cases

    Publication

    - Year 2008

    Trustworthiness of IT systems can be justified using the concept of a trust case. A trust case is an argument structure which encompasses justification and evidence supporting claimed properties of a system. It represents explicitly an expert's way of assessing that a certain object has certain properties. Trust cases can be developed collaboratively on the basis of evidence and justification of varying quality. They can be complex...

  • Argument strategies and patterns of the Trust-IT framework

    Artykuł dotyczy metodologicznego i narzędziowego środowiska Trust-IT wspierającego budowę dowodów zaufania (ang. trust case), a w szczególności strategii tworzenia dowodu zaufania. Strategia uzależniona jest od właściwości systemu (lub innego rozważanego obiektu), która podlega analizie w ramach dowodu zaufania. W artykule zaprezentowano dwie strategie: oparta na ryzyku i oparta na standardach oraz omówiono kilka często stosowanych...

  • Clustering Context Items into User Trust Levels

    An innovative trust-based security model for Internet systems is proposed. The TCoRBAC model operates on user profiles built on the history of user with system interaction in conjunction with multi-dimensional context information. There is proposed a method of transforming the high number of possible context value variants into several user trust levels. The transformation implements Hierarchical Agglomerative Clustering strategy....

    Full text available to download

  • Using evidence based arguments to support trust

    Publication

    - Year 2013

    Wprowadzono podstawowe koncepcje metodyki TRUST-IT: argumentu i dowodu, modelu argumentacji, szablonu argumentacji, oceny argumentu oraz kontekstu aplikacyjnego. Przedstawiono zakres funkcjonalności, modele udostepniania oraz politykę bezpieczeństwa informacji związane z usługami NOR-STA wspomagającymi zastosowania metodyki TRUST-IT. Przedstawiono również dotychczasowe doświadczenia związane z wdrażaniam uzług NOR-STA w różnych...

    Full text to download in external service

  • Representing and appraising Toulmin model arguments in trust cases

    Publication

    The paper presents a Toulmin-based argument model used in trust cases, which allows to argue various properties of IT systems. Argument patterns encountered in trust cases are discussed together with some real-life examples. A method of argument appraisal is introduced together with the corresponding aggregation mechanism. Practical applications of trust cases in industrial and research projects are outlined.

    Full text available to download

  • User Trust Levels and Their Impact on System Security and Usability

    A multilateral trust between a user and a system is considered. First of all we concentrate on user trust levels associated with the context-oriented CoRBAC model. Consequently, there were computed user profiles on the basis of its implementation in the information processing system “My GUT”. Furthermore, analysis of these profiles and the impact of user trust levels on system security and usability have been discussed.

    Full text available to download

  • Supporting Compliance with Security Standards by Trust Case Templates

    Publication

    - Year 2007

    Trust Cases are used to justify that a given object (a system, an infrastructure, an organization) exhibits certain properties. One of possible applications of trust cases is related to the processes of achieving and demonstrating the compliance with standards. A Trust Case Template derived from a given standard constitutes a skeleton of justification (encompassing evidence and argumentation) of the compliance with the standard....

  • Implementing decisional trust: a first approach for smart reliable systems

    Publication

    - CYBERNETICS AND SYSTEMS - Year 2009

    In this article, we introduce the necessary elements that must be integrated in order to achieve a decisional technology that is trustworthy. Thus, we refer to such technology as decisional trust. For us, decisional trust can be achieved through the use of elements such as the decisional DNA, reflexive ontologies, and security models; and therefore, we present in this article a framework that was used for the implementation of...

    Full text to download in external service

  • Trust Management Method for Wireless Sensor Networks

    Publication

    - Year 2017

    A Wireless Sensor Network (WSN) is a network of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data to the main location. The first wireless network that bore any real resemblance to a modern WSN is the Sound Surveillance System (SOSUS), developed by the United States Military in the 1950s to detect and track Soviet...

    Full text available to download

  • How can we justify trust in software based systems?

    Publication

    - Year 2005

    Artykuł wprowadza pojęcie ''trust case'' i wyjasnia jego znaczenie w kontekście systemów informatycznych. Przedstawia również doświadczenia zdobyte w trakcie budowy trust case dla złożonego systemu IT przeznaczonego do wspomagania procesów dystrybucji i stosowania leków. Przedstawia również szereg otwartych problemów badawczych dotyczacych budowy i zarządzanie dowodami zaufania (trust case).

  • Trust in Electronic Word-of-Mouth (eWOM): the concept and the most important determinants

    Publication

    - Year 2022

    eWOM and trust in it is now the most important factor in determining buyers' purchasing behavior. Familiarity with the determinants of trust establishes the formation of appropriate marketing activities. However, the growing number of new forms of eWOM and its increasingly complex and multidimensional nature have created a lot of confusion. The article aims to organize the concepts related to trust in eWOM, to indicate the most...

    Full text to download in external service

  • A theoretical framework for understanding trust and distrust in internet voting

    Publication

    - Year 2022

    Each and every case of success and failure in the implementation of internet voting is permeated by a common element: the concept of trust. Several researchers highlighted the relevance of creating trust for the successful implementation of technology [15] and, in particular, of internet voting [13]. But the concept itself is complex and challenging to define, for one fundamental reason: it is a concept of everyday social use...

    Full text available to download

  • Wyróżniki modelu biznesu przedsiębiorstwa inteligentnego

    Publication

    - Year 2016

    Burzliwa zmiana środowiska biznesowego wpływa na ludzi tak, że generują oczekiwania na wyroby i usługi zaspokajające ich dotychczasowe i nowe potrzeby w coraz większym stopniu. W ten sposób przed menedżerami powstają wciąż nowe, bardziej skomplikowane i wysublimowane wymagania. W takich uwarunkowaniach prowadzenia biznesu sukces osiąga to przedsiębiorstwo, które jest inteligentne. W takiej perspektywie celem badań było wyłonienie...

  • Relationships between Trust and Collaborative Culture in The Context of Tacit Knowledge Sharing

    The literature review presents a lot of theoretical and empirical evidence that Trust affects Collaborative Culture. The opposite also proves to be true: Collaborative Culture influences Trust. The main hypothesis presented in this paper says that both these factors are strongly correlated and modify each other. This study examines the mutual relationship of the said variables in the context of Tacit Knowledge Sharing based on...

    Full text available to download

  • Integration of Services into Workflow Applications

    Publication

    - Year 2015

    Describing state-of-the-art solutions in distributed system architectures, Integration of Services into Workflow Applications presents a concise approach to the integration of loosely coupled services into workflow applications. It discusses key challenges related to the integration of distributed systems and proposes solutions, both in terms of theoretical aspects such as models and workflow scheduling algorithms, and technical...

    Full text to download in external service

  • The effects of perceived risk, brand value, and brand trust on eWOM

    Publication

    Unrestricted access to the Internet, mobile devices, social applications and offering shopping comment options via online stores and platforms, encourages customers to generate online reviews about brands. That is why it became important to learn about the factors that motivate customers to create electronic word of mouth (eWOM). The survey aimed to check if there are links between perceived brand value, perceived risk, brand trust...

    Full text available to download

  • Trust in Food

    Publication

    - Year 2019

    Full text to download in external service

  • Trust in Food

    Publication

    - Year 2018

    Full text to download in external service

  • Trust in Food

    Publication

    - Year 2018

    Full text to download in external service

  • Systematics of intelligent transport systems services

    Recent years have seen a more intensified deployment of Intelligent Transport Systems (ITS) in Polish cities. Work is also underway on the implementation of ITS on the national roads within the National Traffic Management System (KSZR). The research project RID-4D (part of Road Innovations), is designed to fill the gap, which is the lack of systematics of ITS services in Poland. The paper presents a proposal of ITS services systematics,...

    Full text available to download

  • Praca z normą Common Criteria wspomagana szablonami Trust Case

    Trust Case stanowi strukturę danych zawierającą argumentację oraz związany z nią materiał dowodowy uzasadniający, że interesujący nas obiekt (system, infrastruktura, organizacja) posiada wskazane własności. Metoda jest przedmiotem intensywnych badań. Jeden z kierunków rozwoju dotyczy tworzenia szablonów oceny zgodności ze standardami. Szablon Trust Case jest odwzorowaniem wymagań zawartych w normie w strukturę drzewa dowodowego....

  • A decentralised model of the regulating ancillary services market

    Publication

    - Acta Energetica - Year 2011

    The article presents a model of regulating ancillary services provision in a dencetralised manner. A concept of the operation of local markets for ancillary services is presented.

    Full text available to download

  • The KLC Cultures' Synergy Power, Trust, and Tacit Knowledge for Organizational Intelligence

    Publication

    This paper examines the impact of knowledge, learning, and collaboration culturessynergy (the KLC approach) on organizational adaptability. The SEM analysis method was applied to verify the critical assumption of this paper: that the KLC approach and trust support knowledge-sharing processes (tacit and explicit) and are critical for organizational intelligence activation.Specifically, the empirical evidence, based on a 640-case...

    Full text available to download

  • An integrated e-learning services management system providing HD videoconferencing and CAA services

    Publication

    - Year 2012

    In this paper we present a novel e-learning services management system, designed to provide highly modifiable platform for various e-learning tools, able to fulfill its function in any network connectivity conditions (including no connectivity scenario). The system can scale from very simple setup (adequate for servicing a single exercise) to a large, distributed solution fit to support an enterprise. Strictly modular architecture...

    Full text to download in external service

  • Smart Services for Improving eCommerce

    Publication

    - Year 2020

    The level of customer support provided by the existing eCom-merce solutions assumes that the person using the functionality of theshop has sufficient knowledge to decide on the purchase transaction. Alow conversion rate indicates that customers are more likely to seekknowledge about the particular product than finalize the transaction.This is facilitated by the continuous development of customers’ digi-tal...

  • Enhancing Availability for Critical Services

    Publication
    • T. Gomes
    • L. Martins
    • R. Girão-Silva
    • D. Tipper
    • A. Pašić
    • B. Vass
    • L. Garrote
    • U. J. Nunes
    • M. Zachariasen
    • J. Rak

    - Year 2020

    Traditional approaches to provide classes of resilient service take the physical network availability as an input and then deploy redundancy and restoration techniques at various layers, often without full knowledge of mappings between layers. This makes it hard (and often inefficient) to ensure the high availability required by critical services which are typically a small fraction of the total traffic. Here, the innovative technique...

    Full text to download in external service