scholarly journals Relational trust and positional power between school principals and teachers in Chile: A study of primary schools

2018 ◽  
Vol 48 (1) ◽  
pp. 64-81
Author(s):  
José Weinstein ◽  
Dagmar Raczynski ◽  
Javiera Peña

The article analyses the trust relationship between principals and teachers in primary schools in the specific Chilean educational context. The analysis is based on the concept of school trust, emphasizing Bryk and Tschannen-Moran’s classic works. A mixed sequential quantitative–qualitative research methodology is used, including both a survey and a qualitative case study carried out in nine schools. The main results, include: principals and teachers take a different approach when forging trust they have in one another. While principals confer this trust, teachers earn it. Likewise, principals mainly set the tone, intensity and scope of the trust relationship; principals are more critical of teachers, mainly questioning certain aspects of their professional skills. Conversely, teachers normally base trust on more personal matters; individual traits of both principals and teachers have little impact on their relational trust, the exception being the number of years teachers have been on the job. While for teachers there are hardly any differences (and this changes only when it comes to the prevailing principal’s leadership), among principals, differences emerge from schools’ size, socio-economic level and public or private status; and a final discussion propounds the importance of the educational context when analysing trust relationships and positional power in schools.

2011 ◽  
Vol 13 (2) ◽  
pp. 56-85 ◽  
Author(s):  
Nora S. Eggen

In the Qur'an we find different concepts of trust situated within different ethical discourses. A rather unambiguous ethico-religious discourse of the trust relationship between the believer and God can be seen embodied in conceptions of tawakkul. God is the absolute wakīl, the guardian, trustee or protector. Consequently He is the only holder of an all-encompassing trusteeship, and the normative claim upon the human being is to trust God unconditionally. There are however other, more polyvalent, conceptions of trust. The main discussion in this article evolves around the conceptions of trust as expressed in the polysemic notion of amāna, involving both trust relationships between God and man and inter-human trust relationships. This concept of trust involves both trusting and being trusted, although the strongest and most explicit normative claim put forward is on being trustworthy in terms of social ethics as well as in ethico-religious discourse. However, ‘trusting’ when it comes to fellow human beings is, as we shall see, framed in the Qur'an in less absolute terms, and conditioned by circumstantial factors; the Qur'anic antithesis to social trust is primarily betrayal, ‘khiyāna’, rather than mistrust.


2014 ◽  
Vol 14 (1) ◽  
pp. 5394-5397
Author(s):  
Sourabh S. Mahajan ◽  
S.K. Pathan

Peer-to-Peer systems enables the interactions of peers to accomplish tasks. Attacks of peers with malicious can be reduced by establishing trust relationship among peers. In this paper we presents algorithms which helps a peer to reason about trustworthiness of other peers based on interactions in the past and recommendations. Local information is used to create trust network of peers and does not need to deal with global information. Trustworthiness of peers in providing services can be describedby Service metric and recommendation metric. Parameters considered for evaluating interactions and recommendations are Recentness, Importance and Peer Satisfaction. Trust relationships helps a good peer to isolate malicious peers.


Author(s):  
Carolina Nieva Boza ◽  
Teresa Lleixà Arribas

Purpose: This study seeks to analyze the involvement of the various stakeholders related to the educational context, namely school management team, teaching staff, families, and students, to foster the social inclusion of immigrant girls through their participation in physical activities. Methods: Data consisted of interviews and focus group sessions involving 19 physical education (PE) teachers from state primary schools in Catalonia, Spain. Results: The involvement of the stakeholders can foster greater inclusion of such immigrant girls through initiatives, such as: extracurricular physical activities specifically designed for them; the creation of specific spaces for their physical activities; a greater number of PE class hours for immigrant newcomer pupils; supportive feedback for these girls from PE teachers; and greater consideration of these girls’ interests and preference in PE programming. Conclusion: These findings suggest that the greater the degree of involvement and cohesion among the various parties, the higher the likelihood of successful social inclusion.


Author(s):  
Philda Mandisa Mbane ◽  
France Machaba

This chapter investigates the school management teams' views on managing curriculum delivery and assessment in primary schools at Germiston, Ekurhuleni South District in Gauteng Province, South Africa. The following research questions premise the study: What are SMTs' views on managing curriculum delivery and assessment strategies at primary schools? The study applies a qualitative research methodology, which is explorative and descriptive. Five primary school SMTs based on their managing teaching experiences in the Germiston area, at Ekurhuleni District are purposefully selected for interviews. The study's findings summarized as strategies that contribute to the effective management of curriculum assessment, the role of the school assessment teams in managing curriculum assessment, and teacher competencies and attitudes to the effective managing of curriculum assessment in classrooms.


2000 ◽  
Vol 26 (1) ◽  
Author(s):  
A. S. Engelbrecht ◽  
B. E. Cloete

In view of the importance of interpersonal trust as recognized by organizational scholars and the problems associated with the study of trust in organizations, the development of a conceptual model of organizational trust is essential. The aim of this study was to establish empirically the validity of a theoretically sound model of trust in the South African work context. The overall results confirmed a positive relationship between interpersonal trust, trustworthiness and successful trust relationships. The propensity to trust, as well as the length of the supervisorsubordinate relationship, however, did not prove to have a moderating effect on trustworthiness. Opsomming In die lig van die belangrike rol wat navorsers aan vertroue heg en die probleme verbonde aan die bestudering van vertroue in organisasies, is die ontwikkeling van'n konseptuele model van organisatoriese vertroue essensieel. Die doel van hierdie studie was om empiries te bepaal of 'n teoreties gefundeerde model van vertroue in die Suid-Afrikaanse werkskonteks geldig is. In die algemeen bevestig die resultate die bestaan van n beduidend positiewe verband tussen interpersoonlike vertroue, vertrouenswaardigheid en n suksesvolle vertrouensverhouding. Vertrouensgeneigdheid sowel as lengte van toesighouerondergeskikte verhouding het egter nie 'n moderende invloed op vertrouenswaardigheid getoon nie.


2011 ◽  
pp. 29-50 ◽  
Author(s):  
Weiliang Zhao ◽  
Vijay Varadharajan ◽  
George Bryan

In this chapter, we provide a formal definition of trust relationship with a strict mathematical structure that can reflect many of the commonly used notions of trust. Based on this formal definition, we propose a unified taxonomy framework of trust. Under the taxonomy framework, we discuss classification of trust. In particular, we address the base level authentication trust at the lower layer and a hierarchy of trust relationships at a higher level. We provide a set of definitions, propositions, and operations based on the relations of trust relationships. Then we define and discuss properties of trust direction and trust symmetry. We define the trust scope label in order to describe the scope and diversity of trust relationship. All the definitions about the properties of trust become elements of the unified taxonomy framework of trust. Some example scenarios are provided to illustrate the concepts in the taxonomy framework. The taxonomy framework of trust will provide accurate terms and useful tools for enabling the analysis, design, and implementation of trust. The taxonomy framework of trust is first part of research for the overall methodology of trust relationships and trust management in distributed systems.


Author(s):  
Yun Bai ◽  
Wandong Cai

A trust-based recommendation system recommends the resources needed for users by system rating data and users' trust relationship. In current relevant work, an over-generalized trust relationship is likely to be considered without exploiting the relationship between trust information and interest fields, affecting the precision and reliability of the recommendation. This research, therefore, proposes a users' interest-field-based trust circle model. Based on different interest fields, it exploits potential implicit trust relationships in separated layers. Besides, it conducts user rating by combining explicit trust relationships. This model not only considers the matching between trust information and fields, but also explores the implicit trust relationships between users do not revealed in specific fields, thus it is able to improve the precision and coverage of rating prediction. The experiments made with the Epinions data set proved that the recommendation model based on trust circle exploiting in users' interest fields proposed in this research, is able to effectively improve the precision and coverage of the recommendation rating prediction, compared with the traditional recommendation algorithm based on generalized trust relationship.


2021 ◽  
Vol 63 (3) ◽  
pp. 163-186
Author(s):  
Slađana Ćurčić

The paper considers teaching contents in comparative systems of primary and secondary education, which are important for the development of security culture of young people and based on the expanded security agenda and new educational needs in that context. Methodologically, the paper is based on a review of the existing literature and the analysis of certain strategic documents in the field of education and security. Special focus was placed on the practice in the Republic of Serbia and previous activities in this field. The initial aim was to gain insight into certain foreign experiences and experiences of the Republic of Serbia, regarding the representation of security contents in primary and secondary education, and - on the basis of this - to try to consider the development of security culture in the educational context. It was found that among the analyzed countries Poland, Slovenia and Russia have a special subject dedicated to security topics within their education systems and it is noticeable that there is such an effort in other countries, but for now, security contents are mostly implemented in the existing subjects. Regarding the Republic of Serbia, it is concluded, that the potential introduction of a special subject dedicated to security topics in secondary schools and the enrichment of existing subjects with the security content in primary schools, may result in the improvement of general security of the youth.


Author(s):  
Ivonne Thomas ◽  
Christoph Meinel

One of the main reasons is the problem of establishing trust relationships between independent parties—a problem inherent to open environments with multiple trust domains. In open environments, participants often do not know each other, but nevertheless require an existing trust relationship to perform critical transactions. Governments, commercial organizations, and academia alike have addressed this issue by providing better assurance guidelines for identity management. The outcome is a number of identity assurance frameworks that identify and cluster certain security criteria into levels of trust or levels of assurance (LoA). These approaches are described, compared, and assessed with regard to their role towards a reliable identity management across the Internet. Limitations are identified and trust levels for attributes are proposed as potential fields for further research.


Author(s):  
Zhengping Wu ◽  
Alfred C. Weaver

Web services are increasingly utilized in people’s daily lives to achieve various functionalities. Trustworthiness has become a critical factor for service provision and governance. The lack of effective trust establishment mechanisms impedes the deployment of diverse trust models for web services. One important issue is that collaborating organizations need mechanisms to bridge extant relationships among cooperating parties. Meanwhile, a trust establishment mechanism for web services must ensure privacy and owner control at all times due to the subjectivity of trust relationships. As an alternative and complementary approach to direct trust establishment, we describe an indirect trust establishment mechanism to bridge and build new trust relationships from extant trust relationships with privacy protection. Another issue is the lack of mechanisms that can directly establish trust relationships with privacy-preserving capabilities for web services. Current web service technologies encourage a service requester to reveal all its private attributes in a pre-packaged digital credential to the service provider to fulfill the requirements for verification. This may lead to privacy leakage. We propose a mechanism whereby the service requester discovers the service provider’s requirements from a web service policy document, then formulates a trust primitive by associating a set of attributes in a pre-packaged credential with a semantic name, signed with the requester’s digital signature, to negotiate a trust relationship. Thus the service requester’s privacy is preserved because only those attributes required to build a trust relationship are revealed.


Sign in / Sign up

Export Citation Format

Share Document