Redirigiendo al acceso original de articulo en 21 segundos...
Inicio  /  Water  /  Vol: 9 Par: 2 (2017)  /  Artículo
ARTÍCULO
TITULO

Where There Is No History: How to Create Trust and Connection in Learning for Transformation in Water Governance

Jasper R. De Vries    
Séverine Van Bommel    
Chris Blackmore and Yoshiko Asano    

Resumen

Trust is often seen as an important element in settings of knowledge sharing and the co-creation of knowledge for dealing with transformations in water governance. However, seemingly similar conversations during a co-creation workshop in Uppsala resulted in both trust and distrust, and thereby influenced consequent possibilities for the co-creation of knowledge. Therefore, this article focuses on how trust influences knowledge sharing and how knowledge sharing influences trust. We use a case study approach to analyze the Uppsala co-creation workshop?part of the Climate Change Adaptation and Water Governance (CADWAGO) project?by comparing 25 conversations, making use of theories on swift trust and trust dynamics. We found four different conversation patterns (1) sending; (2) defending; (3) misunderstanding; and (4) connecting. The first three patterns influenced trust negatively and did not lead to knowledge sharing, whereas pattern four showed trust development and co-creation of knowledge. From our comparative analyses, we conclude that trust starts to emerge when there is mutual openness and empathy visible in turn-taking patterns. More specifically, trust emerges when communication styles allow for recognition and exploring underlying needs and wishes, resulting in a more dynamic dialogue, further trust development, and connection between actors. Our list of conversation patterns is provisional but we argue that understanding how different kinds of interactions can lead to trust or distrust is crucial to understanding why and how learning takes place?insights that are essential for fostering learning and transformations in water governance.

 Artículos similares

       
 
Swati Kumari, Vatsal Tulshyan and Hitesh Tewari    
Due to rising cyber threats, IoT devices? security vulnerabilities are expanding. However, these devices cannot run complicated security algorithms locally due to hardware restrictions. Data must be transferred to cloud nodes for processing, giving attac... ver más
Revista: Information

 
Nader Vahdati, Aamna Alteneiji, Fook Fah Yap and Oleg Shiryayev    
Engine mounts serve three primary purposes: (1) to support the weight of the engine, (2) to lessen the transmitted engine disturbance forces to the vehicle structure/chassis or airplane fuselage, and (3) to limit the engine motion brought on by shock exc... ver más
Revista: Applied Sciences

 
Reenu Mohandas, Mark Southern, Eoin O?Connell and Martin Hayes    
Deep learning based visual cognition has greatly improved the accuracy of defect detection, reducing processing times and increasing product throughput across a variety of manufacturing use cases. There is however a continuing need for rigorous procedure... ver más

 
Marcos Orellana, Patricio Santiago García, Guillermo Daniel Ramon, Jorge Luis Zambrano-Martinez, Andrés Patiño-León, María Verónica Serrano and Priscila Cedillo    
Health problems in older adults lead to situations where communication with peers, family and caregivers becomes challenging for seniors; therefore, it is necessary to use alternative methods to facilitate communication. In this context, Augmentative and... ver más

 
Julianno Amorim; João de Abreu e Silva     Pág. 21 - 40
Although issues of equity and accessibility have already been addressed in transportation, especially with regard to the distribution of costs and benefits, there is no consensus on which concept and metric of fairness would be most appropriate for the e... ver más