43,745 research outputs found

    Critique of Architectures for Long-Term Digital Preservation

    Get PDF
    Evolving technology and fading human memory threaten the long-term intelligibility of many kinds of documents. Furthermore, some records are susceptible to improper alterations that make them untrustworthy. Trusted Digital Repositories (TDRs) and Trustworthy Digital Objects (TDOs) seem to be the only broadly applicable digital preservation methodologies proposed. We argue that the TDR approach has shortfalls as a method for long-term digital preservation of sensitive information. Comparison of TDR and TDO methodologies suggests differentiating near-term preservation measures from what is needed for the long term. TDO methodology addresses these needs, providing for making digital documents durably intelligible. It uses EDP standards for a few file formats and XML structures for text documents. For other information formats, intelligibility is assured by using a virtual computer. To protect sensitive information—content whose inappropriate alteration might mislead its readers, the integrity and authenticity of each TDO is made testable by embedded public-key cryptographic message digests and signatures. Key authenticity is protected recursively in a social hierarchy. The proper focus for long-term preservation technology is signed packages that each combine a record collection with its metadata and that also bind context—Trustworthy Digital Objects.

    Trust and reciprocity effect on electronic word-of-mouth in online review communities

    Get PDF
    Purpose Social media developments in the last decade have led to the emergence of a new form of word of mouth (WOM) in the digital environment. Electronic word-of-mouth (eWOM) is considered by many scholars and practitioners to be the most influential informal communication mechanism between businesses and potential and actual consumers. The purpose of this paper is to extend knowledge about WOM in this new context by proposing a conceptual framework that enables a better understanding of how trust and reciprocity influence eWOM participation in ORCs. Design/methodology/approach This study applies non-probability convenience sampling technique to conduct a quantitative study of data from an online survey of 189 members of ORCs. Partial least squares (PLS) is used to analyse the correlations between individuals’ intention to seek opinion, to give their own opinion and to pass on the opinion of another within ORCs. Findings The data analysis reveals that opinion seeking within ORCs had a direct effect on opinion giving and opinion passing. Ability trust and integrity trust had a positive effect on opinion seeking, while benevolence trust had a direct positive effect on opinion passing. Reciprocity had a direct impact on opinion passing. While reciprocity did not affect opinion giving, the relationship between these two concepts was mediated by integrity trust. Research limitations/implications By studying the complexities that characterise the relationships between reciprocity, trust and eWOM, the study extends understanding of eWOM in ORCs. Originality/value To the best of the authors’ knowledge, this is one of only a few papers that have examined the complex interrelationships between reciprocity, trust and eWOM in the context of ORCs

    Trust: a planning guide for wildfire agencies and practitioners

    Get PDF
    In increasing numbers, agency personnel, interest groups, and residents of at-risk communities are coming together to consider wildfire problems and taking steps to solve them. Particularly with regard to fire management, trust among parties is an essential element to successful local programs. Despite a growing body of research literature on this topic, there are few practical guides for fire managers and practitioners about how to build and evaluate trust amongst stakeholders. This guides aims to bring clarity to the trust concept and focus it specifically for use in fire management settings. Authors: Bruce Shindler and Christine Olsen, College of Forestry Oregon State University Oregon, USA Sarah McCaffrey, USDA Forest Service Northern Research Station USA Bonita McFarlane and Amy Christianson, Natural Resources Canada Canadian Forest Service Alberta, Canada Tara McGee, Department of Earth and Atmospheric Sciences University of Alberta Alberta, Canada Allan Curtis and Emily Sharp, Charles Sturt University New South Wales, Australi

    Economics and Engineering for Preserving Digital Content

    Get PDF
    Progress towards practical long-term preservation seems to be stalled. Preservationists cannot afford specially developed technology, but must exploit what is created for the marketplace. Economic and technical facts suggest that most preservation ork should be shifted from repository institutions to information producers and consumers. Prior publications describe solutions for all known conceptual challenges of preserving a single digital object, but do not deal with software development or scaling to large collections. Much of the document handling software needed is available. It has, however, not yet been selected, adapted, integrated, or deployed for digital preservation. The daily tools of both information producers and information consumers can be extended to embed preservation packaging without much burdening these users. We describe a practical strategy for detailed design and implementation. Document handling is intrinsically complicated because of human sensitivity to communication nuances. Our engineering section therefore starts by discussing how project managers can master the many pertinent details.

    Understanding the construction of marketers’ credibility by NZ senior managers: An interpretive study

    Get PDF
    Academics report that marketers are losing their influence in the boardroom due in part to serious challenges to marketing’s credibility. Although the credibility of marketing sources has received much attention since the early 1950s, research into how individuals in business organisations construct the credibility of marketers is scarce. This study, using in-depth interviews, describes how seven senior managers from different New Zealand businesses construct the credibility of marketers. For these senior managers, the credibility of marketers is grounded in their performance in delivering commercial outcomes. The findings also suggest that senior managers construct credibility in terms of a work aspect and a social aspect of a marketer’s performance, and that both these aspects have to be present if the marketer is to be considered credible. The work aspect of performance is made up of a marketer’s Pedigree, Projects, and Pervasive Influence. The Pedigree of a marketer includes their qualifications, skills and background. A degree is usually the minimum qualification required, particularly for more senior marketing roles. Skills expected from marketers include leadership, management, sales and intuition. With regard to background, the marketer needs to demonstrate they have achieved commercial outcomes in previous employment to be considered credible. Projects describes how marketers must design and implement cogent marketing plans, work effectively without supervision, achieve commercial outcomes in a clever or creative way, and provide evidence that their projects have contributed to commercial outcomes. Pervasive Influence describes how marketers influence others in the organisation toward customer-centricity. Marketers can lose credibility in the work aspect of their performance when they have no structured purpose to their marketing research, are unable to execute marketing plans or are unable to demonstrate the results of a marketing project. The social aspect of a marketer’s performance is made up of Personal Integrity and Professional Conduct. Personal Integrity describes marketers who are respected, take pride in their work, strive to improve themselves and are not precious. Professional Conduct describes a marketer who relates and collaborates competently and professionally with others, and is a team fit. Marketers lose credibility in the social aspect of their performance when they are precious, flighty, argumentative, and only out for themselves. This paper contributes a framework that describes the construction of a marketer’s credibility from a senior manager’s perspective. It also introduces a new understanding of credibility, grounded in performance terms, which is distinct from past conceptualisations of credibility found in the literature, which is based on expertise and trustworthiness. These findings demonstrate that while a marketer might be considered an expert and trustworthy, if they are not delivering commercial outcomes then they may not be considered credible, from a senior manager’s perspective

    Graduates of Character - Values and Character: Higher Education and Graduate Employment

    Get PDF
    Graduates of Character is the product of an empirical enquiry into the values, virtues, dispositions and attitudes of a sample of students and employees who volunteered to be involved. The research team sought host sites which would offer a diverse set of interviewees in gender, ethnicity, religion and aspiration. In this study we discuss what character is taken to mean by students and employees in their years of higher education and employment. We examine what their values are, what they gain from the university, what they believe employers look for when recruiting, what they hope to give to an employer, and what they expect from their employer. We then explore who or what influenced their values and moral development. We also examined the role of the personal tutor or mentor, and the persons or services to which they might go for personal and/or professional support

    Theoretical model of trust-based relationships in building information modelling supply chain for construction projects

    Get PDF
    The structure of relationships among project participants has a significant impact on trust development, while the number of participants involved in the relationship increases the complexity of trust. Hence, it becomes inappropriate to generalise the existing dimension and components of trustbased relationships to trust-based relationships among the building information modelling (BIM) supply chain members because of the multiple structures of relationship and the numerous interpersonal and inter-organisations that participate on BIM-based construction projects. This article investigates the nature of trust-based relationships among the BIM supply chain members and establishes whether the requirements of  the BIM process influence trust-based relationships among the BIM supply chain members. A five-stage PRISMA was adopted for systematic reviews and meta analysis. The systematic review enabled the development of a theoretical model of trustbased relationships in BIM supply chain which was subjected to meta-analysis for validation. The findings revealed that trust-based relationships among the BIM supply chain members entail trusting and trustworthy behaviours, positive expectations, and positive reputations, under which twenty-seven components were identified and classified appropriately. The article concludes that the nature of trustbased relationships among the BIM supply chain members, as influenced by the requirements of the BIM process, can be explained as trusting and trustworthy behaviours, positive expectations, and positive reputations. The article advances the understanding of trust-based relationships among the BIM supply chain members and recommends a first-hand investigation into the nature of trust-based relationships among the BIM supply chain members in future studies.&nbsp

    Trust Based Participant Driven Privacy Control in Participatory Sensing

    Full text link
    Widespread use of sensors and multisensory personal devices generate a lot of personal information. Sharing this information with others could help in various ways. However, this information may be misused when shared with all. Sharing of information between trusted parties overcomes this problem. This paper describes a model to share information based on interactions and opinions to build trust among peers. It also considers institutional and other controls, which influence the behaviour of the peers. The trust and control build confidence. The computed confidence bespeaks whether to reveal information or not thereby increasing trusted cooperation among peers.Comment: 14 page
    • 

    corecore