61,110 research outputs found

    Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and Deployments

    Get PDF
    Decentralized systems are a subset of distributed systems where multiple authorities control different components and no authority is fully trusted by all. This implies that any component in a decentralized system is potentially adversarial. We revise fifteen years of research on decentralization and privacy, and provide an overview of key systems, as well as key insights for designers of future systems. We show that decentralized designs can enhance privacy, integrity, and availability but also require careful trade-offs in terms of system complexity, properties provided, and degree of decentralization. These trade-offs need to be understood and navigated by designers. We argue that a combination of insights from cryptography, distributed systems, and mechanism design, aligned with the development of adequate incentives, are necessary to build scalable and successful privacy-preserving decentralized systems

    The Transformation of Trust in China’s Alternative Food Networks: Disruption, Reconstruction, and Development

    Get PDF
    Food safety issues in China have received much scholarly attention, yet few studies systematically examined this matter through the lens of trust. More importantly, little is known about the transformation of different types of trust in the dynamic process of food production, provision, and consumption. We consider trust as an evolving interdependent relationship between different actors. We used the Beijing County Fair, a prominent ecological farmers’ market in China, as an example to examine the transformation of trust in China’s alternative food networks. We argue that although there has been a disruption of institutional trust among the general public since 2008 when the melamine-tainted milk scandal broke out, reconstruction of individual trust and development of organizational trust have been observed, along with the emergence and increasing popularity of alternative food networks. Based on more than six months of fieldwork on the emerging ecological agriculture sector in 13 provinces across China as well as monitoring of online discussions and posts, we analyze how various social factors—including but not limited to direct and indirect reciprocity, information, endogenous institutions, and altruism—have simultaneously contributed to the transformation of trust in China’s alternative food networks. The findings not only complement current social theories of trust, but also highlight an important yet understudied phenomenon whereby informal social mechanisms have been partially substituting for formal institutions and gradually have been building trust against the backdrop of the food safety crisis in China

    Shall I post this now? Optimized, delay-based privacy protection in social networks

    Get PDF
    The final publication is available at Springer via http://dx.doi.org/10.1007/s10115-016-1010-4Despite the several advantages commonly attributed to social networks such as easiness and immediacy to communicate with acquaintances and friends, significant privacy threats provoked by unexperienced or even irresponsible users recklessly publishing sensitive material are also noticeable. Yet, a different, but equally significant privacy risk might arise from social networks profiling the online activity of their users based on the timestamp of the interactions between the former and the latter. In order to thwart this last type of commonly neglected attacks, this paper proposes an optimized deferral mechanism for messages in online social networks. Such solution suggests intelligently delaying certain messages posted by end users in social networks in a way that the observed online activity profile generated by the attacker does not reveal any time-based sensitive information, while preserving the usability of the system. Experimental results as well as a proposed architecture implementing this approach demonstrate the suitability and feasibility of our mechanism.Peer ReviewedPostprint (author's final draft

    How Social Reputation Networks Interact with Competition in Anonymous Online Trading: An Experimental Study

    Get PDF
    Many Internet markets rely on ‘feedback systems’, essentially social networks of reputation, to facilitate trust and trustworthiness in anonymous transactions. Market competition creates incentives that arguably may enhance or curb the effectiveness of these systems. We investigate how different forms of market competition and social reputation networks interact in a series of laboratory online markets, where sellers face a moral hazard. We find that competition in strangers networks (where market encounters are one-shot) most frequently enhances trust and trustworthiness, and always increases total gains-from-trade. One reason is that information about reputation trumps pricing in the sense that traders usually do not conduct business with someone having a bad reputation not even for a substantial price discount. We also find that a reliable reputation network can largely reduce the advantage of partners networks (where a buyer and a seller can maintain repeated exchange with each other) in promoting trust and trustworthiness if the market is sufficiently competitive. We conclude that, overall, competitive online markets have more effective social reputation networks.reputation systems, e-commerce, internet markets, trust

    Vodafone: the relationship between brand image and online marketing strategies

    Get PDF
    The competition in global marketplaces is progressively increasing due to a large number of local players that form the telecom industry. For this reason, it is essential for companies to establish a strong brand image to maintain its position in the market. Vodafone has been one of the fastest growing companies in the world. Nevertheless, it still holds the number two position in the telecom European market and the sixth, in the international sphere. This aspect encourages us to dig into which factors need to be considered to reach the zenith. We have focused on the international online marketing strategies that are used by telecommunication companies to establish and enhance brand image in the global market. With the example of Vodafone, the research concentrates on the intricacies of the relationship between brand image and online marketing strategies in order to enhance brand image internationally, in the context of the global telecom sector. For this purpose, two detailed online surveys were conducted to gather opinion about the effects of online marketing strategies on brand image. It also aims to find the gaps in the online strategies and improve them in order to boost up the brand image of Vodafone

    Data centric trust evaluation and prediction framework for IOT

    Get PDF
    © 2017 ITU. Application of trust principals in internet of things (IoT) has allowed to provide more trustworthy services among the corresponding stakeholders. The most common method of assessing trust in IoT applications is to estimate trust level of the end entities (entity-centric) relative to the trustor. In these systems, trust level of the data is assumed to be the same as the trust level of the data source. However, most of the IoT based systems are data centric and operate in dynamic environments, which need immediate actions without waiting for a trust report from end entities. We address this challenge by extending our previous proposals on trust establishment for entities based on their reputation, experience and knowledge, to trust estimation of data items [1-3]. First, we present a hybrid trust framework for evaluating both data trust and entity trust, which will be enhanced as a standardization for future data driven society. The modules including data trust metric extraction, data trust aggregation, evaluation and prediction are elaborated inside the proposed framework. Finally, a possible design model is described to implement the proposed ideas
    • …
    corecore