Trust

game
  • Engineering
Trust Foster trust in scientific innovation, engineering design and technology adoption through transparency, reliability, ethical practices and the cultivation of social capital for collaboration

Waterloo Engineering research in the news

This opinion piece by Dean Mary Wells of Waterloo Engineering and Dean Suzanne Kresta of the University of Prince Edward Island's Faculty of Sustainable Design Engineering recently appeared in the Globe and Mail.

Nearly a century ago, Canadian engineers conducted the first iron ring ceremony, a way for the profession to symbolize its commitment to the public good following a moment of failure and broken trust.

This opinion piece by the University of Waterloo’s Dr. Mary Wells, dean of Engineering; Dr. Lai-Tze Fan, Canada Research Chair in Technology and Social Change; and Dr. Ashley Mehlenbacher, Canada Research Chair in Science, Health, and Technology Communication, appeared today in the Toronto Star.

 It’s been more than a month since U.S. Vice President Kamala Harris launched her bid for the presidency and already AI-generated disinformation is working to smear her name. She’s not alone.

Explore Trust research labs and centres

Meet our researchers and discover their areas of expertise

AI & Data 

AI and data involve collecting, processing, and analyzing large datasets to train algorithms, enabling machines to recognize patterns, make decisions, and generate insights for automation, prediction, and intelligent problem-solving.


Application Security 

Application security involves designing, implementing, and testing software to protect applications from vulnerabilities, threats, and attacks, ensuring data integrity, confidentiality, and reliable, secure operation throughout the software lifecycle.


Communications and Collaborative Problem Solving 

Communications and collaborative problem solving involve sharing information, ideas, and feedback effectively within teams to jointly identify challenges, develop solutions, and achieve goals through coordinated, cooperative efforts.


Complex Systems and Organizational Theory

Complex systems and organizational theory studies interconnected structures, behaviours, and emergent patterns within organizations, examining adaptation, decision-making, networks, and feedback to improve resilience, strategy, coordination, and system-level performance.


Cybersecurity, Cryptography, and Privacy 

Cybersecurity, cryptography, and privacy involve protecting digital systems and data from unauthorized access or attacks, using encryption, secure protocols, and privacy measures to ensure confidentiality, integrity, and trustworthiness of information.


Decision Making 

Decision making is the process of analyzing information, evaluating options, and selecting the best course of action to achieve goals, often incorporating data, logic, experience, and risk assessment.


Design and Product Development 

Design and product development involve creating, testing, and refining products or systems, combining creativity, engineering, and user feedback to deliver functional, efficient, and market-ready solutions.


Engineering Design Education

Engineering design education investigates how learners develop design knowledge, skills, and mindsets, and studies teaching methods, tools, teamwork, creativity, and assessment to improve design learning and instructional effectiveness.


Ethics, History, and Societal Impact 

Ethics, history, and societal smpact examines moral principles, historical contexts, and technology’s consequences to understand how human values, past events, and social systems shape decisions, responsibilities, and equitable futures globally.

Human and Technological Systems

Human and technological systems explore interactions between people and complex technologies, studying behaviour, design, interfaces, data, and organizational contexts to optimize performance, safety, usability, and societal outcomes across interconnected domains.


Human-Machine Interaction 

Human–machine learning involves designing systems where humans and machines collaboratively learn, adapt, and improve performance, leveraging human intuition and machine computation to enhance decision-making, problem-solving, and predictive capabilities.


Information Security 

Information security involves protecting digital and physical data from unauthorized access, theft, or damage, ensuring confidentiality, integrity, and availability while managing risks and maintaining trust in information systems.


Management of Technology and Technology Innovation

Management of technology and technology innovation examines how organizations develop, implement, and commercialize new technologies, integrating strategy, processes, resources, and culture to accelerate innovation, competitiveness, and sustainable value creation globally.


Modelling and Simulation 

Modelling and simulation involve creating digital or mathematical representations of real-world systems to analyze behaviour, predict outcomes, and test scenarios, supporting decision-making, design, and optimization without physical trials.


Negotiations and Conflict Management 

Negotiations and conflict management involve resolving disputes and reaching agreements through communication, compromise, and problem-solving, aiming to balance interests, maintain relationships, and achieve mutually acceptable outcomes.


Network Security 

Network security involves protecting computer networks from unauthorized access, attacks, or disruptions by implementing policies, hardware, and software measures to ensure data integrity, confidentiality, and reliable connectivity.


Northern and Indigenous Architecture

Northern and Indigenous architecture centers on place-based design grounded in cultural knowledge, climate resilience, community needs, sustainable materials, and storytelling, honoring traditions while supporting self-determination and responsive built environments in northern regions.


Operational Security 

Operational security (OPSEC) involves identifying and protecting sensitive information, assessing risks, and implementing procedures to prevent adversaries from exploiting vulnerabilities in organizational operations.


Software Analysis and Testing 

Software analysis and testing involve examining code and applications to identify defects, ensure functionality, verify performance, and validate that software meets requirements and quality standards before deployment.


Theoretical and Applied Control 

Theoretical and applied control involves designing and analyzing systems to regulate behaviour, using mathematical models and practical techniques to ensure stability, performance, and desired outcomes in engineering and technology.

Learn more about Trust research