74,912 research outputs found

    Reputation and ethical behaviour in a crisis: predicting survival

    Get PDF
    Purpose – The purpose of this paper is to explore the interrelation of reputation with corporate performance in a crisis and consider the factors that make up the balance between strong recovery, bare survival and failure. The emphasis is on corporate communication and corporate governance. Design/methodology/approach – The current debate on reputation and the validity of the term reputation management is reviewed and cases studies from Australia and the UK are examined. Findings – The paper finds that, in the case studies, poor management, unethical practices, a lack of engagement with customers and other stakeholders, indifferent or aggressive performances by CEOs and lack of preparedness for crisis communication severely or terminally affected the organisations. It identifies a new reputational factor of predictability and considers why some organisations survive a crisis that has strong negative ethical dimensions while others fail. Originality/value – This paper scrutinises existing concepts of reputation and reputation management and finds that they are not able to predict recovery, survival or failure of organisations. A new definition of reputation is put forward and the factor of predictability is emphasised in proposals for new applied theory

    Trust Evaluation for Embedded Systems Security research challenges identified from an incident network scenario

    Get PDF
    This paper is about trust establishment and trust evaluations techniques. A short background about trust, trusted computing and security in embedded systems is given. An analysis has been done of an incident network scenario with roaming users and a set of basic security needs has been identified. These needs have been used to derive security requirements for devices and systems, supporting the considered scenario. Using the requirements, a list of major security challenges for future research regarding trust establishment in dynamic networks have been collected and elaboration on some different approaches for future research has been done.This work was supported by the Knowledge foundation and RISE within the ARIES project

    Trusted operational scenarios - Trust building mechanisms and strategies for electronic marketplaces.

    Get PDF
    This document presents and describes the trusted operational scenarios, resulting from the research and work carried out in Seamless project. The report presents identified collaboration habits of small and medium enterprises with low e-skills, trust building mechanisms and issues as main enablers of online business relationships on the electronic marketplace, a questionnaire analysis of the level of trust acceptance and necessity of trust building mechanisms, a proposal for the development of different strategies for the different types of trust mechanisms and recommended actions for the SEAMLESS project or other B2B marketplaces.trust building mechanisms, trust, B2B networks, e-marketplaces

    Private Data System Enabling Self-Sovereign Storage Managed by Executable Choreographies

    Full text link
    With the increased use of Internet, governments and large companies store and share massive amounts of personal data in such a way that leaves no space for transparency. When a user needs to achieve a simple task like applying for college or a driving license, he needs to visit a lot of institutions and organizations, thus leaving a lot of private data in many places. The same happens when using the Internet. These privacy issues raised by the centralized architectures along with the recent developments in the area of serverless applications demand a decentralized private data layer under user control. We introduce the Private Data System (PDS), a distributed approach which enables self-sovereign storage and sharing of private data. The system is composed of nodes spread across the entire Internet managing local key-value databases. The communication between nodes is achieved through executable choreographies, which are capable of preventing information leakage when executing across different organizations with different regulations in place. The user has full control over his private data and is able to share and revoke access to organizations at any time. Even more, the updates are propagated instantly to all the parties which have access to the data thanks to the system design. Specifically, the processing organizations may retrieve and process the shared information, but are not allowed under any circumstances to store it on long term. PDS offers an alternative to systems that aim to ensure self-sovereignty of specific types of data through blockchain inspired techniques but face various problems, such as low performance. Both approaches propose a distributed database, but with different characteristics. While the blockchain-based systems are built to solve consensus problems, PDS's purpose is to solve the self-sovereignty aspects raised by the privacy laws, rules and principles.Comment: DAIS 201

    Callisto: a cryptographic approach to detecting serial perpetrators of sexual misconduct

    Get PDF
    Sexual misconduct is prevalent in workplace and education settings but stigma and risk of further damage deter many victims from seeking justice. Callisto, a non-profit that has created an online sexual assault reporting platform for college campuses, is expanding its work to combat sexual assault and harassment in other industries. In this new product, users will be invited to an online "matching escrow" that will detect repeat perpetrators and create pathways to support for victims. Users submit encrypted data about their perpetrator, and this data can only be decrypted by the Callisto Options Counselor (a lawyer), when another user enters the identity of the same perpetrator. If the perpetrator identities match, both users will be put in touch independently with the Options Counselor, who will connect them to each other (if appropriate) and help them determine their best path towards justice. The client relationships with the Options Counselors are structured so that any client-counselor communications would be privileged. A combination of client-side encryption, encrypted communication channels, oblivious pseudo-random functions, key federation, and Shamir Secret Sharing keep data confidential in transit, at rest, and during the matching process with the guarantee that only the lawyer ever has access to user submitted data, and even then only when a match is identified.Accepted manuscrip

    Trust and Reciprocity with Transparency and Repeated Interactions

    Get PDF
    This paper uses data from a controlled laboratory environment to study the impact of transparency (i.e., complete information versus incomplete information) and repeated interactions on the level of trust and trustworthiness in an investment game setting. The key findings of the study are that transparency (complete information) significantly increases trusting behavior in one-shot interactions. This result persists in repeated interactions. Further, transparency appears important for trustworthiness in one-shot interactions. In addition, repeated interaction increases trust and reciprocity with or without transparency. These results suggest transparency is important in building trust in business environments such as alliances and joint-ventures which are loosely connected organizational forms that bring together otherwise independent firms. It also provides support for the Sarbanes-Oxley Act of 2002 (SOX) and similar legislation elsewhere which attempt to regain investors’ trust in corporate management and financial markets by stipulating enhanced disclosures.Transparency; Trust; Reciprocity; Repeated interaction; Business Alliances; SOX

    Under Construction (Identities, Communities and Visual Overkill)

    Get PDF
    Most of modern identities emerge from mediated interactions in public and virtual spaces. There are no acknowledged authorities to watch over organizational identities and grant them legitimacy. These identities are renegotiated in real and virtual communities, often carry a permanent label 'under construction' and can be violently contested in public space. Garrulous behaviour stimulated by interactive media and by the forthcoming Evernet allows for a gradual build-up of individual and social response to the visual overkill in media-regulated societies. Voicing the images over, we mobilize for action, dismantle institutional structures and generally speaking mix gate-keeping with data-dating, thus contributing to the overall change of world's cultural climate - one of bricks, clicks and flicks. Benetton's Toscani campaign and Napster's ordeal are cases in point.corporate identity;cultural climate;flicks;virtual community;visual overkill
    • 

    corecore