76,712 research outputs found
Recommended from our members
Diversity Means Justice: Growing Grassroots Library Staff Diversity Leaders
Paper presented at the ACRL (Association of College & Research Libraries) 2015 Conference in Portland, Oregon.UT Librarie
Reputation and ethical behaviour in a crisis: predicting survival
Purpose â The purpose of this paper is to explore the interrelation of reputation with corporate
performance in a crisis and consider the factors that make up the balance between strong recovery,
bare survival and failure. The emphasis is on corporate communication and corporate governance.
Design/methodology/approach â The current debate on reputation and the validity of the term
reputation management is reviewed and cases studies from Australia and the UK are examined.
Findings â The paper finds that, in the case studies, poor management, unethical practices, a lack of
engagement with customers and other stakeholders, indifferent or aggressive performances by CEOs
and lack of preparedness for crisis communication severely or terminally affected the organisations. It
identifies a new reputational factor of predictability and considers why some organisations survive a
crisis that has strong negative ethical dimensions while others fail.
Originality/value â This paper scrutinises existing concepts of reputation and reputation
management and finds that they are not able to predict recovery, survival or failure of
organisations. A new definition of reputation is put forward and the factor of predictability is
emphasised in proposals for new applied theory
Trust Evaluation for Embedded Systems Security research challenges identified from an incident network scenario
This paper is about trust establishment and trust
evaluations techniques. A short background about trust, trusted
computing and security in embedded systems is given. An analysis
has been done of an incident network scenario with roaming
users and a set of basic security needs has been identified.
These needs have been used to derive security requirements for devices and systems, supporting the considered scenario. Using the requirements, a list of major security challenges for future research regarding trust establishment in dynamic networks have been collected and elaboration on some different approaches for future research has been done.This work was supported by the Knowledge foundation and RISE within the ARIES project
Trusted operational scenarios - Trust building mechanisms and strategies for electronic marketplaces.
This document presents and describes the trusted operational scenarios, resulting from the research and work carried out in Seamless project. The report presents identified collaboration habits of small and medium enterprises with low e-skills, trust building mechanisms and issues as main enablers of online business relationships on the electronic marketplace, a questionnaire analysis of the level of trust acceptance and necessity of trust building mechanisms, a proposal for the development of different strategies for the different types of trust mechanisms and recommended actions for the SEAMLESS project or other B2B marketplaces.trust building mechanisms, trust, B2B networks, e-marketplaces
Private Data System Enabling Self-Sovereign Storage Managed by Executable Choreographies
With the increased use of Internet, governments and large companies store and
share massive amounts of personal data in such a way that leaves no space for
transparency. When a user needs to achieve a simple task like applying for
college or a driving license, he needs to visit a lot of institutions and
organizations, thus leaving a lot of private data in many places. The same
happens when using the Internet. These privacy issues raised by the centralized
architectures along with the recent developments in the area of serverless
applications demand a decentralized private data layer under user control. We
introduce the Private Data System (PDS), a distributed approach which enables
self-sovereign storage and sharing of private data. The system is composed of
nodes spread across the entire Internet managing local key-value databases. The
communication between nodes is achieved through executable choreographies,
which are capable of preventing information leakage when executing across
different organizations with different regulations in place. The user has full
control over his private data and is able to share and revoke access to
organizations at any time. Even more, the updates are propagated instantly to
all the parties which have access to the data thanks to the system design.
Specifically, the processing organizations may retrieve and process the shared
information, but are not allowed under any circumstances to store it on long
term. PDS offers an alternative to systems that aim to ensure self-sovereignty
of specific types of data through blockchain inspired techniques but face
various problems, such as low performance. Both approaches propose a
distributed database, but with different characteristics. While the
blockchain-based systems are built to solve consensus problems, PDS's purpose
is to solve the self-sovereignty aspects raised by the privacy laws, rules and
principles.Comment: DAIS 201
Callisto: a cryptographic approach to detecting serial perpetrators of sexual misconduct
Sexual misconduct is prevalent in workplace and education settings
but stigma and risk of further damage deter many victims from
seeking justice. Callisto, a non-profit that has created an online sexual assault reporting platform for college campuses, is expanding its
work to combat sexual assault and harassment in other industries.
In this new product, users will be invited to an online "matching
escrow" that will detect repeat perpetrators and create pathways
to support for victims. Users submit encrypted data about their
perpetrator, and this data can only be decrypted by the Callisto
Options Counselor (a lawyer), when another user enters the identity of the same perpetrator. If the perpetrator identities match,
both users will be put in touch independently with the Options
Counselor, who will connect them to each other (if appropriate) and
help them determine their best path towards justice. The client relationships with the Options Counselors are structured so that any
client-counselor communications would be privileged. A combination of client-side encryption, encrypted communication channels,
oblivious pseudo-random functions, key federation, and Shamir
Secret Sharing keep data confidential in transit, at rest, and during
the matching process with the guarantee that only the lawyer ever
has access to user submitted data, and even then only when a match
is identified.Accepted manuscrip
Trust and Reciprocity with Transparency and Repeated Interactions
This paper uses data from a controlled laboratory environment to study the impact of transparency (i.e., complete information versus incomplete information) and repeated interactions on the level of trust and trustworthiness in an investment game setting. The key findings of the study are that transparency (complete information) significantly increases trusting behavior in one-shot interactions. This result persists in repeated interactions. Further, transparency appears important for trustworthiness in one-shot interactions. In addition, repeated interaction increases trust and reciprocity with or without transparency. These results suggest transparency is important in building trust in business environments such as alliances and joint-ventures which are loosely connected organizational forms that bring together otherwise independent firms. It also provides support for the Sarbanes-Oxley Act of 2002 (SOX) and similar legislation elsewhere which attempt to regain investorsâ trust in corporate management and financial markets by stipulating enhanced disclosures.Transparency; Trust; Reciprocity; Repeated interaction; Business Alliances; SOX
Under Construction (Identities, Communities and Visual Overkill)
Most of modern identities emerge from mediated interactions in public and virtual spaces. There are no acknowledged authorities to watch over organizational identities and grant them legitimacy. These identities are renegotiated in real and virtual communities, often carry a permanent label 'under construction' and can be violently contested in public space. Garrulous behaviour stimulated by interactive media and by the forthcoming Evernet allows for a gradual build-up of individual and social response to the visual overkill in media-regulated societies. Voicing the images over, we mobilize for action, dismantle institutional structures and generally speaking mix gate-keeping with data-dating, thus contributing to the overall change of world's cultural climate - one of bricks, clicks and flicks. Benetton's Toscani campaign and Napster's ordeal are cases in point.corporate identity;cultural climate;flicks;virtual community;visual overkill
- âŠ