Trusting the State, Trusting Each Other? The Effect of Institutional Trust on Social Trust

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Reflections on Trusting Trust Revisited

S ecurity is often described as a weak-link phenomenon. Ken Thompson in his 1983 Turing Award Lecture [3] described how a compiler could be modified to plant a Trojan horse into the system's login authentication program so that it would accept a known password. In addition, the C compiler could be altered to propagate this change when it was recompiled from its (unmodified) source code. The sys...

متن کامل

Symposium: Trust Relationships Part 1 of 2: Trusting and Non-trusting on the Internet

... The Puzzle: The Internet is a wonderful innovation, allowing people around the world to communicate, trade, and obtain services. ... As compared to verification cost in real space, verification cost on the Internet is higher. ... Internet, and perhaps also real space, activities are policed by private sector institutions and professional gatekeepers. ... Not surprisingly, they are mostly th...

متن کامل

Countering Trusting Trust through Diverse Double-Compiling

• Huge benefits – Controlling a compiler controls everything it compiles – Controlling 2-3 compilers would control almost every computer worldwide • Risks low – no viable detection technique • Costs low...medium – Requires one-time write of trusted binary • Not necessarily easy, but someone can, one-time, & not designed to withstand determined attack – Even if costs were high, the power to cont...

متن کامل

Trusting Online: Nurturing Trust in Virtual Teams

Internet-mediated virtual teamworking is increasingly becoming an integral part of the work life for many people in information societies. This paper reports an investigation on the development of trust relationships in virtual teamworking. The main objectives of this study are to identify forms of trust relationships in virtual teamworking and to understand how such trust relationships operate...

متن کامل

Beyond Planted Bugs in "Trusting Trust": The Input-Processing Frontier

It’s been nearly thirty years from Ken Thompson’s “Reflections on Trusting Trust” and its famous verdict that “You can’t trust code that you did not totally create yourself.” If there is one practical lesson that the Internet taught us since then, it is that one cannot even trust one’s own code so long as that code meets arbitrary inputs from the Internet. Sooner or later a mixture of bugs or f...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Political Behavior

سال: 2015

ISSN: 0190-9320,1573-6687

DOI: 10.1007/s11109-015-9322-8