Free Essay

Trust Is Key

In:

Submitted By Maximorne
Words 1532
Pages 7
Trust is Key Though I may not have the quintessential wisdom from old age I do have experience dealing with trust and the many ways it can screw with someone’s mind. Like most children I was forced to trust the judgment from my parents since they were all I knew from my birth. Neither of my parents went to college, but tried to groom me into a college prepared student. That didn’t go so well. I had no idea what I was doing, and neither did they. The school I went to did no college preparation what so ever, and my parents saw nothing wrong with that. So finally when I graduated I had no idea what I was going to do or how to even proceed. My parents led me to believe that I could go wherever I wanted, so I did. I went to Rhode Island College, and after one semester my parents said that there was no way I was going there and that I needed to come home and pick somewhere else to go. I had invested a lot into that college, and they tore it away. They told me that they have picked a new college for me to go to and I’d be starting in a few weeks. It was culinary school, and though I didn’t mind the classes I hated the outcome. So then I went to Suffolk Community College, with no help from them, and no support in order to start a career path that actually interests me. What I have learned through my limited experiences with life and trust is to be very wary of who you trust, and always trust yourself. Trust needs to be a two way road, and though you cannot get through life only trusting yourself, there needs to be a line where you can distinguish between trusting others or only yourself. The Road by Cormac McCarthy, “The Right to Remain” by Melanie Marnich, “Straightway” by Mark Wisniewski, and “Autobiography of Eve” by Ansel Elkins all deal with trust with their characters, and how they need to trust themselves or the people they’re with. In “Autobiography of Eve”, by Ansel Elkins, Eve needs to rely on herself to get out into an unknown world. “I stood alone in terror at the threshold between Paradise and Earth” (Elkins, line 7-8). Here Eve is by herself, she has no one to trust, but that only helps her to move to an unknown land because she is forced to trust herself and no one else. She knows that she is the only one who she can trust and embraces it, and listens to herself. “There I heard a mysterious echo: my own voice singing to me from across the forbidden side” (Lines 9-12). She trusts in herself to do what she needs to do: get out of Paradise to get to Earth, and with her own life she trusts herself only. “I leapt to freedom” (Lines 16-17). In order to get the courage to leap from Paradise, Eve needs to trust herself, and just like with myself, change is scary and when I had no one to trust I had to trust myself, just like Eve has to. Sometimes I had people to have faith in, and when I did things were easier to figure out. When I was in Rhode Island College my best friend, Nick, was always there for me. He’d drive me around, or come visit me on campus often just so we could hang out and not be alone. People don’t always have someone to lean on, but when they do they should take advantage of it and appreciate that person. Mark Wisniewski’s “Straightway” features a man Tre, who has to trust in his two friends in order to turn a thousand dollars into enough to leave the state and start a new life. Bark trusts Tre with his truck, even knowing that Tre cannot drive, but he trusts him in order to do the job they need to do. “Bark, I say, you know I can’t drive. Sure you can, he says. Just start it, put it in gear, and steer is so you don’t hit nothing” (Wisniewski, 301). To bet on the horses to win more money all three members of the group need to trust in each other, and more specifically in Bark to pick the right horses in the right races in order to win enough money to put their past behind them. At the same time Bark needs to trust himself because everything rides on his choice of horses in order to get enough money for the trio to live on (pages 306-307). Part of trusting is mistrusting. I mistrusted my parents when they told me that I could go to college, and again when they told me they found a college for me to go to, without my thoughts on the matter. In “The Right to Remain” by Melanie Marnich the mother, Amy, and son, Josh, mistrust the father, Peter for good reason. He is cheating on his wife, Amy, and Josh figures it out and together with Amy they plan to tell Peter and fix things. Josh lost trust in Peter a long time ago, and shows it by giving him one more chance, but in reality there is no chance because Josh knows Peter is cheating on his mother. “Yeah there is. And I already know it. Because I called the phone company and got your cell phone records. But I want you to say it. Say it and I’ll stop” (Marnich, Page 179). Amy had no reason to mistrust Peter until Josh mentioned that he is cheating on her. Her trust was shattered, much like mine when I was told I can no longer continue my educational path in Rhode Island. “The thing is, I had no idea. He’s the one who figured it out. Not me. I believed every late night. He’s pretty smart, though, isn’t he?” (Page 180). Amy’s mistrust extends to her mistrust of cellphones. Amy sees through Peter’s ruse of using a cellphone in order to cheat on her. “Cell phones changed the rules. Accessibility doesn’t preclude guilt. As a matter of fact, it’s the perfect cover” (Page 179). Just like me, it’s hard to trust family, especially when there’s evidence that mistrust is present. As I said before: trust is a two way street. In Cormac McCarthy’s The Road trust is evident in both the boy and man. They need to trust one another, but also themselves in order to survive a post-apocalyptic world. The man constantly asks the boy to trust him, and though sometimes it goes wrong, it normally goes right. As the relationships between the two evolve, their trust becomes less on themselves and more on each other. Anytime the man finds a house he needs to ask the boy to trust him that it’s fine to go inside. “The boy didn’t want him to go upstairs. We have to take a look. Okay. Okay? Just like that?” (McCarthy, Pages 210 – 211). Even though the man lied to the boy, the boy trusted him when he shot the bowman with the flare gun. “Did you kill him? No. Is that the truth? Yes. Okay.” (Page 270). Trust between the boy and man is tested over and over throughout the novel. When the man trusted the boy with the lamp and the oil it was misplaced because the boy did not screw the lamp back together and the gas leaked (Page 176). When the boy contracts food poisoning he needs to trust the man in order to get over it. The boy and man need to trust each other and work together in order to survive the terrible world they’re in (Page 247). The boy trusts the man, “I believe you. Okay. I always believe you,” even when the boy is almost killed, and his life is in the man’s hands. The last time the man asks the boy to trust him is just before the man dies. He wants to boy to trust that he’ll survive, and that he will find people. Which he does, “I’m really scared Papa. I know. But you’ll be okay. I know you are” (Page 279) As with my life, trust is a very important aspect to have. As seen in “Autobiography of Eve,” you need to trust yourself, especially when there is no one else. I had to trust my friends like the trio did in “Straightway.” Survival, in both the urban world and in a post-apocalyptic one is dependent on trust, as shown in The Road. Finally I had quite a bit of mistrust, just like Amy and Josh in “The Right to Remain.” Overall I learned that trust is the key to any relationship, including the relationship with myself. I needed to trust my friends and family, even when they hurt me. In the future trust will be even more viable when I can compare it to my past experiences and judge how well someone can be trusted and what I am capable of doing myself.

Similar Documents

Premium Essay

Keys to Building Trust to Employees

...Keys to building trust to employees Any positive working relationship is based on trust. An environment of trust assumes that both parties will be safe, and it carries with it an implicit message that you have each other’s best interests in mind. That is why employees can accept criticism and even anger from a boss they trust. The employees know deep down that the boss really means to help. Trust is an interesting quality because, once it is lost, it is hard to recapture. Many professional relationships gasped their last breath with the words “I just do not trust you anymore.” Therefore, to have optimum working relationships, all parties must feel a sense of trust. The question then is, how do you develop trust between people in the workplace? After all, when you have people from various backgrounds coming to work together, they usually don’t have a history with each other, and there’s no base of trust to begin with and grow upon. That is the reason managers need to be proactive and create an environment of trust apparent to all. This article includes ways to do that. Limit Lecturing To ensure that employees will make good decisions, managers often begin to lecture. If you reflect on this, you will soon realize that lecturing and telling your employees what to do implies that you do not have faith in their decision-making abilities. This can result in their becoming defensive. In addition, the employees can lose faith in their own confidence to make decisions. If people do...

Words: 2121 - Pages: 9

Free Essay

Worksheet Analysis

...1 Question Decision Legacy What are the key ‘decisions’ the company has made since its inception? What was the situation when these decisions were made? Answer To cater to the healthcare requirements of rural population by hiring local women as Sahayikas Situation – Problem Positive outcomes I. Increasing population in rural India presents huge opportunity for providing healthcare II. The importance of women in the lives of people in rural India Negative outcomes i. ii. 3 What are the causes of these outcomes? Failure of other medical options and prevalence of quacks Abysmal healthcare conditions in rural India 2 Outcome: Importance of women Causes: Women directly responsible for health of children and can transfer best practices from generation to generation Outcome: Poor healthcare in rural India Causes: Prevalence of quacks as the only source of medical help in rural areas and lack of trust in other practices among people Problem: Low demand below the breakeven point making the program unsustainable Cause Lack of trust in modern medicine and lack of awareness among people in terms of ill effects of steroids Criteria Low number of patients and repeat patients  Awareness about the program as well as the ill effects of steroid injections   Trust and reliability of Piramal e-swasthya Confidence of people in Piramal workers Increasing awareness about the program as well as the ill effects of steroid injections Improving the trust and reliability of Piramal eswasthya Improving...

Words: 957 - Pages: 4

Free Essay

Key Manage, Emt

...Key Management Cheat Sheet Introduction This Key Management Cheat Sheet provides developers with guidance for implementation of cryptographic key management within an application in a secure manner. It is important to document and harmonize rules and practices for: key life cycle management (generation, distribution, destruction) key compromise, recovery and zeroization key storage key agreement across the organization. Key Management General Guidelines and Considerations Formulate a strategy for the overall organization's cryptographic strategy to guide developers working on different applications and ensure that each application's cryptographic capability meets minimum requirements and best practices. Identify the cryptographic and key management requirements for your application and map all components that process or store cryptographic key material. Use only reputable crypto libraries that are well maintained and updated, as well as tested and validated by 3rd party organizations (e.g., NIST/FIPS) Key Selection Selection of the cryptographic and key management algorithms to use within a given application should begin with an understanding of the objectives of the application. For example, if the application is required to store data securely, then the developer should select an algorithm suite that supports the objective of Data-At-Rest (DAR) security. Applications that are required to transmit and receive data would select an algorithm suite that supports...

Words: 1040 - Pages: 5

Free Essay

Intro to Pki

...A PKI allows client and server applications to gain trust in each other's authentication credentials in a highly scalable and efficient manner. Applications can then employ those credentials to perform strong authentication and make use of end-to-end confidentiality and integrity services. To show where a PKI might prove useful, let's look at the case study of a company called Exploration Air that wants its customers to have access to an internal Web server. Exploration Air expects a number of users in each customer organization to securely log on to the Web server. The challenge lies in managing authentication credentials for all those external users. If Exploration Air uses passwords, their IT department is expected to somehow identify those users, as well as process password changes for them. This solution does not scale well, and for a large number of users it becomes unmanageable. Attackers can also guess passwords, and passwords might not offer strong enough authentication for high-value transactions. With a PKI, Exploration Air can delegate the issuing of authentication credentials to certification authorities run by the customers themselves, or to a commercial certification authority. This way, the company needs to configure its Web server only to trust those authorities. Those credentials also offer strong authentication because they cannot be guessed. Now let's say that Exploration Air wants to exchange secure e-mail with users of the same customers. A password...

Words: 6278 - Pages: 26

Premium Essay

Human Resource

...e 5 elements of an effective team 2010 October 17 by Tim Riley | | | 0 inShare | | I recently went on a leadership course and one of the key focuses of the course was creating effective teams. The facilitator recommended a book called “The Five Dysfunctions of a Team” by Patrick Lencioni. Lencioni’s central theory is that there are 5 key elements to a cohesive team. In order of importance they are: 1. Trust – they trust one another 2. Healthy conflict – they engage in unfiltered conflict around ideas. 3. Commitment – they commit to decisions and plans of action. 4. Accountability – they hold one another accountable for delivering against those plans 5. Results focus - they focus on the achievement of collective results Trust is the foundation element because it is only with trust that team conflict can be possible. Teams become dysfunctional when they are unable to productively deal with conflict and all meaningful relationships require productive conflict for them to grow. When teams engage in productive conflict they can confidently commit to decisions. This is where real commitment to team goals happens. Without team commitment you cannot have accountability. If the team is to be accountable, everyone must have a clear understanding of what is expected of them. When teams are not held accountable they tend to look out for their own interests, rather than the interests of the team. A healthy team places team results as the most important goal of all....

Words: 1462 - Pages: 6

Free Essay

Lab 8

...In an encryption scheme, the message or information (referred to as plaintext) is encrypted using an encryption algorithm, turning it into an unreadable ciphertext . This is usually done with the use of an encryption key, which specifies how the message is to be encoded. Any adversary that can see the ciphertext should not be able to determine anything about the original message. An authorized party, however, is able to decode the ciphertext using a decryption algorithm, that usually requires a secret decryption key that adversaries do not have access to. For technical reasons, an encryption scheme usually needs a key-generation algorithm to randomly produce keys. There are two basic types of encryption schemes: Symmetric-key and public-key encryption. In symmetric-key schemes, the encryption and decryption keys are the same. Thus communicating parties must agree on a secret key before they wish to communicate. In public-key schemes, the encryption key is published for anyone to use and encrypt messages. However, only the receiving party has access to the decryption key and is capable of reading the encrypted messages. Public-key encryption is a relatively recent invention: historically, all encryption schemes have been symmetric-key (also called private-key) schemes. Data privacy is the ability to control the information one reveals about oneself over the Internet, and who can access that information, has become a growing concern. These concerns include whether email...

Words: 1540 - Pages: 7

Premium Essay

Providian Trust

...Providian Trust (1) What key issues and challenges led to the initiation of the Access+ project? The key issues and challenges let to the initiation are as follows: * The Pension and Institutional Trust Services business had $42.7 billion in assets in 1994,which was the tenth-largest provider and they were losing money. They had outdated reporting systems as far as the clients were concerned. The institutional custody business was becoming extremely technology-intensive, with some of the larger players outsourcing their entire backroom function in order to make large operations more effective. * Internal process: The administrative functions were being done both by the front and back offices. There is an environment where everybody could point a finger at everybody else if something went wrong. The trust officers blamed the operations people and the operations people blamed the trust officers. * Intense client demand: (2) What organizational changes that the company should have made during the project to ensure the success of the Access+ project? * The front office of PITS and Personal Trust and the back office of Operation department which were responsible for handling, settlement, and record keeping for securities should made the changes during the project. * All existing trust information would be converted to the Access Plus system and the Operations group would become the primary caretakers of the data, taking over sole responsibility...

Words: 763 - Pages: 4

Free Essay

The Relative Importance of Website Design Quality and Service Quality in Determining Consumers’ Online Repurchase Behavior

...eagerly decide to buy or decide not to buy, but what factors determine whether customers continue to buy? Website design quality is important because attracts customers to keep coming back to the website whether it is a simple thank you to keeping track of customer orders that have become complicated. Website design quality attracts customers to the website while service quality makes a difference by taking care of the service needs of the customer. Zhou, Lu, and Wang (2009) hypothesis that “compared with website design quality, service quality has a stronger effect on consumers’ satisfaction” (p. 329). The analysis will support the hypothesis that service quality is important in consumer behavior in repurchasing different products because trust is a key concept. Web design quality and service quality are both important to websites. The article, “The Relative Importance of Website Design Quality and Service Quality in...

Words: 1752 - Pages: 8

Premium Essay

Providian Trust Case

...HULT International Business School Module C Information technology management Professor: Jim Slusser PROVIDIAN TRUST: TRADITION AND TECHNOLOGY (A) Fenway Cohort Kamanasish Kundu 1. Business Context/Key Business Drivers * In 1994, Providian Trust, the tenth largest provider of financial and fiduciary services, slowly slipped away from profitability and competition due to the lack of efficient business processes and information technology. * The company was headquartered in New York and had three divisions Pension and Institutional Trust Services (PITS), Personal Trust and Trust Operations with a network of 216 branches. * To address the problems that Providian Trust were facing, Michael LeBlanc, the Senior Vice President of Trust, Investment and Treasury, took the initiative to lead the project aimed at not only implementing new technology but also reengineering Providian Trust’s business processes by implementing a major software system, Access plus, developed by Select One. The project, supposed to last for 20 months, cost $18 million, was finally approved by board members in April, 1994. * The key driver behind the above initiative was intense client demand on the part of PITS division, lack of control and discipline in the trust division, lack of operation efficiency and outdated reporting system. 2. Initiative Objectives/Benefits ...

Words: 986 - Pages: 4

Premium Essay

Leadership Inventory

...success of leadership of a team. Team environments thrive when effective managers are strong in these five leadership characteristics. It is realistic to think that every manager is not going to be naturally strong in each characteristic but if they are aware and frequently checking in with these five points as successful team can be built and lead. Empowering your Team I believe that having the ability to empower is a gift but can also be learned. It requires confidence, trust and the ability to read people and what motivates them. Gaining the trust of the people who follow you is key to a successful care team for the following reasons. Staff must trust your decisions and how they think you would care for patients yourself. If the staff that follows a manager does not believe that the manager could care for a patient with integrity, advocacy and accountability they will never be empowered by the manager to do the same. Managers who empower their staff lead by example first and by doing so build trust. They are then given the ability to empower staff as staff will desire to lead by the manager’s example. Empowerment is also very dependent on a leader’s ability to provide the tools and resources needed for an employee to excel at their job. Having the knowledge to provide direction is important, but just as important is knowing where direct employees to find the right answer. It’s empowering to get direction, and seek out and find the answers to overcome whatever obstacles arise...

Words: 1496 - Pages: 6

Premium Essay

Ssl Authentication

...especially during online transactions or when transmitting confidential information. Internet users have come to associate their online security with the lock icon that comes with an SSL-secured website or green address bar that comes with an extended validation SSL-secured website. SSL-secured websites also begin with https rather than http. All browsers have the capability to interact with secured web servers using the SSL protocol. However, the browser and the server need what is called an SSL Certificate to be able to establish a secure connection. SSL Certificates have a key pair: a public and a private key. These keys work together to establish an encrypted connection. The certificate also contains what is called the “subject,” which is the identity of the certificate/website owner. To get a certificate, you must create a Certificate Signing Request (CSR) on your server. This CSR creates the private key and a CSR data file that you send to the SSL Certificate issuer (called a...

Words: 999 - Pages: 4

Premium Essay

Mission Command

...mouthful. But, what does it really mean? In simplified terms, mission command is the way a leader develops and leads his subordinates into accomplishing the mission while leaving room for leaders to take ownership and initiative in completing the mission. Mission Command is comprised of six different principles, all of which are bound together by mutual trust. The first two principles: build cohesive teams through mutual trust and create shared understanding, are the foundation to Mission Command. A leader can establish a command climate that fosters mission command by ensuring there is mutual trust and shared understanding within the organization. These two concepts are gained through common experiences, communication, and collaboration. Through shared experiences, a team will have endured hardships together. When faced directly with challenges, it is the person to your right and left you look towards for encouragement and assistance. When the team makes it through the hardship together, the sense of unity fosters and develops trust amongst the members. Communication is essential when discussing the concepts of mutual trust and shared understanding. The leader can effectively express the intent when providing clear and concise orders to his/her subordinates. Communication must flow from the bottom up and back down in order to ensure shared understanding. Through this, the leader can identify areas of confusion or misunderstandings within...

Words: 1053 - Pages: 5

Premium Essay

Pretty Good Privacy

...Chapter – 1 Introduction Virtually all businesses, most government agencies and many individuals now have web sites. The number of individuals and companies with internet access is expanding rapidly and all of these have graphical user browser. As a result businesses are enthusiastic about setting up facilities on the web for electronic commerce. But in real web and internet are vulnerable to compromises with various sorts. As business wake up to this reality, the demand for secure web services grows. There are two types of threats to the web services : 1.1 Passive attacks : It is eavesdropping on network traffic between browser and server and gaining access to information on a web site that is supposed to be restricted. 1.2 Active attack : It includes impersonating another user, altering messages in transit between client and server and altering information on a web site. In all distributed environment electronic mail is the most heavily used network based application. It is the only application that is widely used across all architecture and vendor platforms. Users expect to be able to and do, send mail to others who are connected directly or indirectly to the internet. PGP(Pretty Good Privacy) is an open-source freely available software for E-Mail security. It provides authentication through the use of digital signature, confidentiality through the use of symmetric block encryption, compression using the ZIP algorithm, E-Mail compatibility using...

Words: 27771 - Pages: 112

Premium Essay

External Analysis of the Real Estate

...Johnson & Wales University ScholarsArchive@JWU MBA Student Scholarship The Alan Shawn Feinstein Graduate School 2-9-2012 Analysis of the Real Estate Investment Trust (REIT) Industry Frederic Juillet Johnson & Wales University - Providence, fredjuillet@gmail.com Follow this and additional works at: http://scholarsarchive.jwu.edu/mba_student Part of the Accounting Commons, Business Administration, Management, and Operations Commons, Business and Corporate Communications Commons, Finance and Financial Management Commons, Marketing Commons, Real Estate Commons, and the Strategic Management Policy Commons Repository Citation Juillet, Frederic, "Analysis of the Real Estate Investment Trust (REIT) Industry" (2012). MBA Student Scholarship. Paper 6. http://scholarsarchive.jwu.edu/mba_student/6 This Research Paper is brought to you for free and open access by the The Alan Shawn Feinstein Graduate School at ScholarsArchive@JWU. It has been accepted for inclusion in MBA Student Scholarship by an authorized administrator of ScholarsArchive@JWU. For more information, please contact egearing@jwu.edu. G Feinstein Graduate School Analysis of the Real Estate Investment Trust (REIT) Industry An industry Analysis Submitted in Partial Fulfillment of the Requirements for the MBA Degree Course: MGMT 6800 Instructor, Gary Gray Ph.D Faculty Advisor, Martin Sivula, Ph.D. Frédéric Juillet February 9, 2012 INDUSTRY ANALYSIS Executive Summary In 2009, most REITs...

Words: 11759 - Pages: 48

Premium Essay

Rhino

...Why do you think it is so hard for people to trust others (in particular, leaders)? Under the best circumstances, how long does it take for people to trust new leaders? What are the variables that you have seen from your own experience that may make this time shorter or longer? Trust is something that is earned and not easily given. Trust given to Christian Leaders is especially hard to receive due to the fact that there have been many false teachers that have swindled others through money and power. There are numerous televised preachers in the past 30 years that have been arrested for scams or other crimes. Things like this have produced skeptics within the Church towards leaders. In addition, the average pastor only stays at a church for five years. This can also cause trust issues among church leadership because of lack of commitment. On the flip side, a lot of pastors leave because there is no confidence in his leadership. According to Malphurs, it takes at least 5 years to build trust from a church. I would have to concur with this assessment. Trust has to be earned and it is only earned through time. You have to give others a reason to trust you. Being in a leadership position does not automatically demand trust. As stated earlier, many churches are filled with leadership skeptics because of past disappointments with their leadership. Because of this, trust takes more time and effort. It is not easy and requires patience from the leader. I would have...

Words: 388 - Pages: 2