• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1856
  • 734
  • 240
  • 143
  • 86
  • 76
  • 70
  • 63
  • 60
  • 56
  • 36
  • 24
  • 22
  • 11
  • 10
  • Tagged with
  • 3985
  • 776
  • 602
  • 437
  • 415
  • 400
  • 325
  • 299
  • 296
  • 296
  • 274
  • 261
  • 255
  • 240
  • 230
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1081

Do negócio fiduciário à fidúcia / From the fiduciary contract to the trust

Milena Donato Oliva 13 September 2013 (has links)
A presente tese estuda o negócio fiduciário e suas potencialidades no direito brasileiro, especialmente quando associado à técnica do patrimônio separado. Embora o legislador tenha se utilizado da titularidade fiduciária elemento essencial do negócio fiduciário e da afetação patrimonial para variadas atividades, não previu modelo geral que habilitasse os particulares a entabularem ajustes fiduciários com patrimônio separado para as mais diversas finalidades. Por isso que, no Brasil, falta instituto que pudesse ser equiparado ao trust contido na Convenção de Haia sobre a Lei Aplicável aos Trusts e sobre o Reconhecimento Deles. As tentativas de incorporação de tal modelo jurídico no direito pátrio não lograram êxito até o momento e o cenário normativo brasileiro permanece fragmentado. A tese, assim, examina a conformação atual do direito pátrio em relação ao negócio fiduciário e as utilidades que adviriam da introdução da fidúcia como categoria ampla de negócio fiduciário com patrimônio separado. Nessa direção, a tese investiga (i) a admissibilidade do negócio fiduciário no direito brasileiro; (ii) a disciplina jurídica que lhe é aplicável; (iii) os efeitos da utilização da propriedade resolúvel aos negócios fiduciários, bem como da aposição das cláusulas de inalienabilidade, impenhorabilidade e incomunicabilidade; (iv) as potencialidades funcionais e limites do negócio fiduciário; (v) a disciplina jurídica do trust a que se refere a Convenção de Haia; (vi) a adoção pelo legislador da técnica da separação patrimonial conjugada com a titularidade fiduciária; (vii) a tipificação do negócio de fidúcia como aquele que possibilitaria a criação, pelos particulares, de titularidade fiduciária e patrimônio separado; (viii) o negócio de fidúcia como maneira de se incorporar os elementos essenciais do trust contido na Convenção de Haia; e (ix) a relevância da tipificação do negócio de fidúcia como meio de suprir determinadas lacunas do direito brasileiro / This thesis studies fiduciary contracts and their potentials in Brazilian law, especially when they are associated with the technique of separate estate. Although Brazilian law already deploys fiduciary ownership an essential element of the fiduciary contract and separate estate as a mean to regulate many activities, it does not lay down a legal model enabling people to use these techniques for general purposes. Therefore, still lacks in Brazil a legal framework similar to the trust as described by The Hague Convention on the Law Applicable to Trusts and on their Recognition. Attempts to incorporate this legal model in Brazilian law have not been successful so far; therefore, Brazilian legal framework remains fragmented. In this context, the thesis examines the current regulation of the fiduciary contract in Brazilian Law, and the benefits that would result from the introduction of fiducia, understood as a comprehensive legal model combining the techniques of fiduciary contract and separate estate. To this end, the thesis investigates (i) the admissibility of fiduciary contracts in Brazilian law; (ii) the rules applicable to it; (iii) the stipulation of resoluble ownership in fiduciary contracts and the stipulation in these contracts of inalienability, unseazability and incommunicability clauses; (iv) the potentials and limitations of fiduciary contracts in Brazilian law; (v) the legal regulation of trusts as they are described by the Hague Convention; (vi) the use by Brazilian legislator of the legal technique of separate estate combined with fiduciary ownership; (vii) the adoption by Brazilian law of fudicia as the type of contract that will enable people to use the techniques of fiduciary ownership and separate estate; (viii) fiducia as a mean to incorporate in Brazilian law the essential elements of the trust described by the Hague Convention; and (ix) the importance of fiducia as a mean to fill in several gaps of the Brazilian law.
1082

Collaborative Trust: A Case Study Of Trust Evolution in a Public/Nonprofit Partnership

Odumodu, Maria Stella 01 January 2014 (has links)
Lack of trust between nonprofit organizations and the communities in which they are located is a well-documented problem in the academic literature. The nature of this mistrust is far less understood, and little is known how community-nonprofit collaborations can overcome these gaps in trust. Guided by Simmel's theory of trust, this study examined the role of collaborative trust between public and non-profit organizations with a focus on better understanding how trust evolves. The research questions focused on how trust was defined and the factors that enhanced and inhibited trust evolution within the context of collaborations between nonprofit organizations and communities. Data were gathered through structured, in-depth interviews with 14 staff and stakeholders, a focus group of 4 management committee members, and the examination of partnership documents.Data from the interviews and documents were inductively coded and then organized around key themes. The themes from the content analysis indicated that the 3 chief executive officers in the partnership embraced the concept of collaboration, invested time at trust building activities, and obtained stakeholder support. This study contributes to positive social change by providing information for policy makers and administrators of public and nonprofit organizations facing similar contexts about how the development of trust can remove the barriers and sustain collaboration to deliver social program services efficiently and equitably.
1083

A development of secure and optimized AODV routing protocol using ant algorithm / Developpement d'un protocole de routage AODV sécurisé et optimisé utilisant les algorithmes de colonies de fourmis

Simaremare, Harris 29 November 2013 (has links)
Les réseaux sans fil sont devenus une technologie importante dans le secteur des télécommunications. L'une des principales technologies des réseaux sans fil sont les réseaux mobiles ad hoc (MANET). MANET est un système d'auto-configuration (autonome) des routeurs mobiles où les routeurs sont libres de se déplacer de façon aléatoire et de s'organiser arbitrairement. La topologie des réseaux sans fil peut alors changer rapidement et de manière imprévisible avec une grande mobilité et sans aucune infrastructure fixe et sans administration centrale. Les protocoles de routage MANET sont Ad Hoc on Demand Distance Vector (AODV), Optimized Link State Routing (OLSR), Topology Dissemination Based on Reverse-Path Forwarding (TBRPF) et Dynamic Source Routing (DSR).En raison des caractéristiques des réseaux mobiles ad hoc, les principaux problèmes concernent la sécurité, les performances du réseau et de la qualité de service. En termes de performances, AODV offre de meilleures performances que les autres protocoles de routage MANET. Cette thèse porte donc sur le développement d'un protocole sécurisé et sur l'acheminement optimisé basé sur le protocole de routage AODV. Dans la première partie, nous combinons la fonction de gateway de AODV + et la méthode reverse de R-AODV pour obtenir le protocole optimisé en réseau hybride. Le protocole proposé appelé AODV-UI. Mécanisme de demande inverse dans R-AODV est utilisé pour optimiser le rendement du protocole de routage AODV et le module de passerelle de AODV + est ajouté à communiquer avec le noeud d'infrastructure. Nous effectuons la simulation en utilisant NS-2 pour évaluer la performance de AODV-UI. Paramètres d'évaluation de la performance sont le taux de livraison de paquets de bout en bout retard et les frais généraux de routage. Les résultats des simulations montrent que AODV-UI surperformé AODV + en terme de performance.La consommation d'énergie et les performances sont évaluées dans les scénarios de simulation avec un nombre différent de noeuds source, la vitesse maximale différente, et également des modèles de mobilité différents. Nous comparons ces scénarios sous Random Waypoint (RWP) et Reference Point Group Mobility (RPGM) modèles. Le résultat de la simulation montre que sous le modèle de mobilité RWP, AODV-UI consommer petite énergie lorsque la vitesse et le nombre de nœuds accéder à la passerelle sont augmentés. La comparaison des performances lors de l'utilisation des modèles de mobilité différents montre que AODV-UI a une meilleure performance lors de l'utilisation modèle de mobilité RWP. Globalement, le AODV-UI est plus appropriée pour l'utilisation de modèle de mobilité RWP.Dans la deuxième partie, nous proposons un nouveau protocole AODV sécurisé appelé Trust AODV en utilisant le mécanisme de la confiance. Les paquets de communication sont envoyés uniquement aux nœuds voisins de confiance. Calcul de confiance est basée sur les comportements et les activités d'information de chaque nœud. Il est divisé en Trust Global (TG) et Trust Local (TL). TG est un calcul de confiance basée sur le total de paquets de routage reçues et le total de l'envoi de paquets de routage. TL est une comparaison entre les paquets reçus au total et nombre total de paquets transmis par nœud voisin de nœuds spécifiques. Noeuds concluent le niveau de confiance totale de ses voisins en accumulant les valeurs TL et TG. Quand un noeud est soupçonné d'être un attaquant, le mécanisme de sécurité sera l'isoler du réseau avant que la communication est établie. [...] / Currently wireless networks have grown significantly in the field of telecommunication networks. Wireless networks have the main characteristic of providing access of information without considering the geographical and the topological attributes of a user. One of the most popular wireless network technologies is mobile ad hoc networks (MANET). A MANET is a decentralized, self-organizing and infrastructure-less network. Every node acts as a router for establishing the communication between nodes over wireless links. Since there is no administrative node to control the network, every node participating in the network is responsible for the reliable operation of the whole network. Nodes forward the communication packets between each other to find or establish the communication route. As in all networks, MANET is managed and become functional with the use of routing protocols. Some of MANET routing protocol are Ad Hoc on Demand Distance Vector (AODV), Optimized Link State Routing (OLSR), Topology Dissemination Based on Reverse-Path Forwarding (TBRPF), and Dynamic Source Routing (DSR).Due to the unique characteristics of mobile ad hoc networks, the major issues to design the routing protocol are a security aspect and network performance. In term of performance, AODV has better performance than other MANET routing protocols. In term of security, secure routing protocol is divided in two categories based on the security method, i.e. cryptographic mechanism and trust based mechanism. We choose trust mechanism to secure the protocol because it has a better performance rather than cryptography method.In the first part, we combine the gateway feature of AODV+ and reverse method from R-AODV to get the optimized protocol in hybrid network. The proposed protocol called AODV-UI. Reverse request mechanism in R-AODV is employed to optimize the performance of AODV routing protocol and gateway module from AODV+ is added to communicate with infrastructure node. We perform the simulation using NS-2 to evaluate the performance of AODV-UI. Performance evaluation parameters are packet delivery rate, end to end delay and routing overhead. Simulation results show that AODV-UI outperformed AODV+ in term of performance. The energy consumption and performance are evaluated in simulation scenarios with different number of source nodes, different maximum speed, and also different mobility models. We compare these scenarios under Random Waypoint (RWP) and Reference Point Group Mobility (RPGM) models. The simulation result shows that under RWP mobility model, AODV-UI consume small energy when the speed and number of nodes access the gateway are increased. The performance comparison when using different mobility models shows that AODV-UI has a better performance when using RWP mobility model. Overall the AODV-UI is more suitable when using RWP mobility model.In the second part, we propose a new secure AODV protocol called Trust AODV using trust mechanism. Communication packets are only sent to the trusted neighbor nodes. Trust calculation is based on the behaviors and activities information’s of each node. It is divided in to Trust Global and Trust Local. Trust global (TG) is a trust calculation based on the total of received routing packets and the total of sending routing packets. Trust local (TL) is a comparison between total received packets and total forwarded packets by neighbor node from specific nodes. Nodes conclude the total trust level of its neighbors by accumulating the TL and TG values. When a node is suspected as an attacker, the security mechanism will isolate it from the network before communication is established. [...]
1084

Iterative algorithms for trust and reputation management and recommender systems

Ayday, Erman 10 November 2011 (has links)
This thesis investigates both theoretical and practical aspects of the design and analysis of iterative algorithms for trust and reputation management and recommender systems. It also studies the application of iterative trust and reputation management mechanisms in ad-hoc networks and P2P systems. First, an algebraic and iterative trust and reputation management scheme (ITRM) is proposed. The proposed ITRM can be applied to centralized schemes, in which a central authority collects the reports and forms the reputations of the service providers (sellers) as well as report/rating trustworthiness of the (service) consumers (buyers). It is shown that ITRM is robust in filtering out the peers who provide unreliable ratings. Next, the first application of Belief Propagation algorithm, a fully iterative probabilistic algorithm, on trust and reputation management (BP-ITRM) is proposed. In BP-ITRM, the reputation management problem is formulated as an inference problem, and it is described as computing marginal likelihood distributions from complicated global functions of many variables. However, it is observed that computing the marginal probability functions is computationally prohibitive for large scale reputation systems. Therefore, the belief propagation algorithm is utilized to efficiently (in linear complexity) compute these marginal probability distributions. In BP-ITRM, the reputation system is modeled by using a factor graph and reputation values of the service providers (sellers) are computed by iterative probabilistic message passing between the factor and variable nodes on the graph. It is shown that BP-ITRM is reliable in filtering out malicious/unreliable reports. It is proven that BP-ITRM iteratively reduces the error in the reputation values of service providers due to the malicious raters with a high probability. Further, comparison of BP-ITRM with some well-known and commonly used reputation management techniques (e.g., Averaging Scheme, Bayesian Approach and Cluster Filtering) indicates the superiority of the proposed scheme both in terms of robustness against attacks and efficiency. The introduction of the belief propagation and iterative message passing methods onto trust and reputation management has opened up several research directions. Thus, next, the first application of the belief propagation algorithm in the design of recommender systems (BPRS) is proposed. In BPRS, recommendations (predicted ratings) for each active user are iteratively computed by probabilistic message passing between variable and factor nodes in a factor graph. It is shown that as opposed to the previous recommender algorithms, BPRS does not require solving the recommendation problem for all users if it wishes to update the recommendations for only a single active user using the most recent data (ratings). Further, BPRS computes the recommendations for each user with linear complexity, without requiring a training period while it remains comparable to the state of art methods such as Correlation-based neighborhood model (CorNgbr) and Singular Value Decomposition (SVD) in terms of rating and precision accuracy. This work also explores fundamental research problems related to application of iterative and probabilistic reputation management systems in various fields (such as ad-hoc networks and P2P systems). A distributed malicious node detection mechanism is proposed for delay tolerant networks (DTNs) using ITRM which enables every node to evaluate other nodes based on their past behavior, without requiring a central authority. Further, for the first time. the belief propagation algorithm is utilized in the design and evaluation of distributed trust and reputation management systems for P2P networks. Several schemes are extensively simulated and are compared to demonstrate the effectiveness of the iterative algorithms and belief propagation on these applications.
1085

Problematics of property trust law in Lithuania / Turto patikėjimo teisės problematika Lietuvoje

Sakavičius, Justas 18 January 2012 (has links)
This dissertation is the first study in Lithuania to analyse Lithuanian trust of property law. Up to now, no one in legal studies has made any complex academic attempt to examine the genesis of property trust law, to discuss the characteristics of subjects and objects of this property trust law or to identify the most commonly occurring problems. There has been neither any thorough academic study concerning the sub-institutions of property trust law, i.e. the right to hold public property or private property in trust. The aim of the research is to comprehensively and systematically analyse, using foreign examples for comparison, the Lithuanian property trust law model, studying the aforementioned property law both as a coherent institution and as an amalgamation of two legal institutions intended for realisation of public and private ownership respectively. The dissertation also aims to reveal certain theoretical and practical issues and deficiencies in the regulation of property trust law in Lithuania, suggesting ways of filling gaps in Lithuanian law on both public and private property trust cases. / Ši disertacija yra pirmasis tyrimas Lietuvoje, analizuojantis Lietuvos turto patikėjimo teisę. Lietuvos teisės moksle iki šiol nebuvo nei vieno kompleksinio mokslinio bandymo, tirti turto patikėjimo teisės prigimtį, aptarti šios daiktinės teisės objektus, subjektų ypatumus, įvardinti dažniausiai pasitaikančias problemas. Nėra išsamių mokslinių tyrimų ir dėl turto patikėjimo teisės atskirų subinstitutų, t. y. dėl viešojo bei privataus turto patikėjimo teisės. Šio tyrimo tikslas yra išsamiai ir sistemiškai, remiantis užsienio teisės patirtimi, išanalizuoti Lietuvos turto patikėjimo teisės modelį, tiriant minėtą daiktinę tiek kaip vientisą institutą, tiek kaip dviejų teisinių institutų, skirtų viešosios bei privačios nuosavybės įgyvendinimui, samplaiką, atskleidžiant teorines bei praktines turto patikėjimo teisės reglamentavimo Lietuvoje problemas ir trūkumus, pasiūlant teisinio reglamentavimo spragų užpildymo būdus tiek viešojo, tiek privataus turto patikėjimo teisės atvejams.
1086

Implikasies van die bedanking van trustees / F.C. Fouché

Fouché, Francois Casper January 2008 (has links)
In a recent judgment by the Free State Provincial Division of the High Court of South Africa it was decided that a trustee who resigns is only relieved from his duties when his name is removed from the letter of authority by the Master of the High Court. This judgment has caused many questions to be raised regarding the implications of the resignation by a trustee. This judgment and the current legal position of the resigning trustee are investigated in this dissertation. The legal position of the resigning trustee seems to be uncertain, and the mentioned judgment should not be unreservedly accepted as correct. The role and responsibility of the Master of the High Court in this process is considered, as well as the legal position of the resigning trustee, the remaining trustees and third parties contracting with the trust. Certain conclusions are drawn and recommendations are made regarding this aspect of South African trust law. / Thesis (LL.M. (Estate Law))--North-West University, Potchefstroom Campus, 2009.
1087

Implikasies van die bedanking van trustees / F.C. Fouché

Fouché, Francois Casper January 2008 (has links)
In a recent judgment by the Free State Provincial Division of the High Court of South Africa it was decided that a trustee who resigns is only relieved from his duties when his name is removed from the letter of authority by the Master of the High Court. This judgment has caused many questions to be raised regarding the implications of the resignation by a trustee. This judgment and the current legal position of the resigning trustee are investigated in this dissertation. The legal position of the resigning trustee seems to be uncertain, and the mentioned judgment should not be unreservedly accepted as correct. The role and responsibility of the Master of the High Court in this process is considered, as well as the legal position of the resigning trustee, the remaining trustees and third parties contracting with the trust. Certain conclusions are drawn and recommendations are made regarding this aspect of South African trust law. / Thesis (LL.M. (Estate Law))--North-West University, Potchefstroom Campus, 2009.
1088

Performance Outcomes Of Interorganizational Trust In Buyer

Sengun, Ayse Elif 01 January 2005 (has links) (PDF)
This study examines the performance outcomes of interorganizational trust using both qualitative and quantitative methods. Using qualitative data from four informants and drawing on the literature on trust, we define interorganizational trust and derive a model of its outcomes. Regression analysis results indicate that trust is negatively related to transaction costs and positively related to cooperation, conflict resolution, satisfaction, and risk taking tendency. Dependence has a moderating effect on trust while predicting satisfaction. Confirmatory factor analysis revealed four trust components: goodwill trust, competence trust, contractual trust, and distrust. Further exploratory analyses between trust components and trust outcomes indicate that distrust is not a mere opposite of trust, but is a distinct component of it. Goodwill trust, by itself, is not sufficient for the reduction in transaction costs / it must be supplemented by the reliability and ability of the other party in the exchange relationship to fulfill obligations. Competence trust alone is not sufficient for better conflict resolution due to the divergence in the expectations of the exchange partners. Only goodwill trust affects the tendency towards risk taking, since it reduces the perceived potential for opportunistic behavior. As a result of this study, the concept of trust and its outcomes were investigated in the Turkish context, different components of trust were identified, and these components were linked to the outcomes of trust. In addition, risk taking tendency was tested as an outcome of trust, which is an important contribution to the research in this field.
1089

Violação e recuperação da confiança do cliente após o duplo desvio

Basso, Kenny January 2012 (has links)
Esta tese tem como objetivo central analisar a violação e recuperação da confiança do cliente na empresa após a recuperação de uma falha malsucedida – situação de duplo desvio. No escopo do objetivo central, é verificado o efeito intensificador da violação da confiança oriundo do duplo desvio; o efeito que a promessa de não recorrência das falhas e o pedido de desculpa, enquanto táticas de recuperação, possuem na confiança; o papel das atribuições de competência e integridade para explicar os efeitos das táticas de recuperação da confiança; e o efeito moderador tanto do tipo de violação da confiança quanto da distância temporal entre a ocorrência do duplo desvio e a inserção da tática, na relação entre a tática de recuperação e a confiança. Para verificar estes efeitos, quatro estudos experimentais foram operacionalizados. Os resultados do primeiro estudo indicam que a violação da confiança é maior após o duplo desvio, comparativamente com o nível de confiança identificado após o desvio simples. No segundo estudo, a possibilidade de recuperação da confiança por meio da promessa de não recorrência das falhas e do pedido de desculpa foi verificada. Os resultados deste segundo estudo indicam que tanto a promessa quanto o pedido de desculpa geram níveis mais elevados de confiança na empresa que a condição de controle (sem tática alguma) e outras duas táticas de recuperação da confiança utilizadas. Além disso, o estudo dois também apresenta que os efeitos das táticas de recuperação na confiança são totalmente mediados pelas atribuições de competência ou atribuições de integridade. No terceiro estudo, os resultados indicam que a efetividade da tática de recuperação depende do tipo de violação da confiança a que o sujeito foi submetido, sendo que a promessa gerou níveis mais elevados de confiança quando a violação da confiança foi baseada na competência, enquanto o pedido de desculpa gerou níveis mais elevados de confiança quando a violação da confiança foi baseada na integridade. No último estudo experimental, os resultados evidenciam uma interação entre a tática de recuperação da confiança e a distância temporal entre o duplo desvio e a inserção da tática, sendo que o pedido de desculpa gerou maiores níveis de confiança quando a distância foi curta (vs. longa), enquanto a promessa gerou maiores níveis de confiança quando esta distância foi longa (vs. curta). Baseado nisto, esta tese contribui para a literatura de Marketing e recuperação da confiança ao evidenciar que: o duplo desvio intensifica os efeitos negativos na confiança gerados pelo desvio simples; é possível recuperar a confiança após o duplo desvio, por meio da promessa e do pedido de desculpa; as pistas emitidas pela tática e a atribuição do sujeito explicam o funcionamento das táticas de recuperação da confiança; e tanto o tipo de violação da confiança quanto a distância temporal condicionam os efeitos das táticas de recuperação. / This dissertation aims at analyzing the breach and recovery of customer trust in the company after a poor failure recovery - a double deviation situation. Its objective is to investigate the greater effect of trust violation derived from the double deviation situation; the effect that the promise of non-recurrence of failures and apology as trust recovery tactics have on trust; the role of attributions of competence and integrity to explain the effects of trust recovery tactics; and the moderating effect of both trust violation type and temporal distance between the occurrence of double deviation and tactics insertion, in the relationship between recovery tactics and trust. In order to verify these effects, four experimental studies were operationalized. The results from the first study indicate that the breach of trust is higher after the double deviation, compared with the level of trust identified after the simple deviation. In the second study, the possibility of trust restitution by the promise of non-recurrence of failures and apology was verified. The results of this second study indicate that both promise and apology generate higher levels of trust in the company than the control condition (without any tactics) and two other tactics used to restore trust. Furthermore, the second study also shows that the effects of both recovery tactics on trust are fully mediated by attributions of competence or integrity. In the third study, the findings indicate that the effectiveness of recovery tactics depends on the type of trust violation to which the subject was submitted. Whereas the promise generated higher levels of trust when the violation was based on competence, the apology generated higher levels of trust when the violation was based on integrity. In the last experimental study, the results indicate an interaction between the trust recovery tactics and the temporal distance, between the double deviation and the tactics insertion, given that the apology has generated greater levels of trust when the distance was short (vs. long); while the promise generated higher levels of trust when this distance was long (vs. short). Based on that, this dissertation contributes to the marketing and trust recovery literature by showing that: the double deviation intensifies the negative effects on trust generated by the simple deviation, it is possible to rebuild trust after double deviation, through promise and apology; the cues expressed by the recovery tactics and the subject attribution explain the mechanism through which the trust recovery tactics operates; and both the violation of trust type, as well as the temporal distance condition the effects of recovery tactics.
1090

Kontrollerad tillit : Linjechefers syn på tillitsbaserad styrning, uppföljning och kvalitetsutveckling.

Witt, Hanna January 2018 (has links)
Innebörden i regeringens satsning på tillitsbaserad styrning är att medarbetarnas erfarenhet och verksamhetsnära kunskap på ett bättre sätt ska tas tillvara och att behovet av kontroll ska balanseras mot förtroende för medarbetarna. Att släppa på detaljstyrningen och lämna mer handlingsutrymme till medarbetarna går väl i takt med teorin om offensiv kvalitetsutveckling. I en organisation där ansvar och befogenheter delegeras till medarbetarna känner de motivation, resultaten förbättras och ledningen får till följd av detta ett än mer ökat förtroende för dem. Minskad detaljstyrning betyder dock inte att man helt kan släppa på kontrollen. Kontrollsystem är viktiga  då det är genom dem som ledningen kan tillse att medarbetarna agerar och presterar i linje med verksamhetens mål. Syftet med uppsatsen har varit att skapa kunskap om hur linjechefer uppfattar att  relationen mellan tillit och kontroll kan antingen bidra till eller hindra kvalitetsutveckling inom myndigheter. I studien har utforskats om det finns några teoretiska likheter mellan den tillitsbaserade styrningen och offensiv kvalitetsutveckling. Studien har haft en kvalitativ forskningsansats och metoden för datainsamling har varit semistrukturerade, berättande intervjuer.  Slutsatserna är att de intervjuade cheferna anser att ökad tillit bidrar till kvalitetsutveckling, att tydliga ramar främjar tillit samt att tillit inte är synonymt med brist på styrning. Cheferna lägger vikt vid att finnas till hands när det behövs och menar att det är lättare både för dem själva och för medarbetarna att ta ut svängarna när gränserna för handlingsutrymmet finns tydligt angivna. Studien bidrar till en bättre förståelse för hur linjechefer på en statlig myndighet ser på tillit och kontroll. / The Swedish Government’s reform to ensure trust based governance aims to create an environment that makes use of employees’ experience and knowledge and balances the need for control against trust. Steering that does not control in detail, but rather allows those conducting operations room for manoeuvre, has much in common with the theory of total quality management. In an organization that delegates responsibility and authority, employees will feel motivated, results will improve and management’s trust in employees will increase. Still, control systems are important since they provide management with information to ensure that employees act and perform in accordance with organizational goals. The aim of the thesis has been to create knowledge about first line managers’ view on the relationship between trust and control, and if that balance can either contribute to, or impede, quality development within governmental authorities. The study involves an exploration of theoretical similarities between trust based governance and total quality management. The research method has been qualitative and the method for data collection has been semi-structured, narrative interviews. The result of the study indicates that the interviewed managers believe that trust contributes to quality development, that a clear framework can promote trust and that trust not is equivalent to absence of steering. The managers emphasize the importance of being available when needed and believe that it is easier for both them and their employees to perform within a clearly defined room for action. The study contributes to a better understanding for government employed first line managers’ views on trust and control. / <p>2018-06-27</p>

Page generated in 0.0275 seconds