Search results

1 – 10 of over 41000
Article
Publication date: 18 July 2016

Wei Guo, Yun Fang, Weimei Pan and Dekun Li

This paper aims to present a case wherein a public archive intervenes in maintaining and preserving digital records (including underlying technological infrastructure) created by…

4636

Abstract

Purpose

This paper aims to present a case wherein a public archive intervenes in maintaining and preserving digital records (including underlying technological infrastructure) created by a private company to protect the trustworthiness of records, thereby helping the company to discharge their accountability.

Design/methodology/approach

This paper details the intervention of Tianjin Municipal Archives in the management of the records of Tianjin Otis Elevator Co., Ltd, the technical infrastructure that enables and supports such configuration, the issues encountered and the theoretical implications of this case.

Findings

This case suggests that not only does the concept of archives as a trusted third party remain relevant in the changing technological environment but also, in certain cases (e.g. wherein the supplier of evidentiary documents holds a monopoly over an industry), archives are becoming increasingly critical in maintaining the reliability and authenticity of digital records in the cloud environment.

Research limitations/implications

Given the challenges raised by the emerging cloud environment, it is vital to develop a renewed understanding of the concept of archives as a trusted third party, the relationship between archives and commercial third party services and the relationship between public archives and private records. Furthermore, this case identifies the need to re-examine archival methodologies to protect the authenticity of structured data.

Originality/value

This case exemplifies how archives can help private organizations address issues related to guaranteeing and demonstrating the evidential nature of digital records and provides empirical evidence for archives being conceptualized as a trusted third party in maintaining and preserving digital records.

Details

Records Management Journal, vol. 26 no. 2
Type: Research Article
ISSN: 0956-5698

Keywords

Article
Publication date: 1 April 1996

William Ross and Jessica LaCroix

The present paper reviews the research literature on trust in bargaining and mediation. Several models of trust within the bargaining process are also described. It is concluded…

4458

Abstract

The present paper reviews the research literature on trust in bargaining and mediation. Several models of trust within the bargaining process are also described. It is concluded that trust means different things, depending upon the relationship under investigation. Trust among negotiators can refer to a personality trail (how trusting a negotiator is of others) or to a temporary state. Within the state perspective, trust often refers to one of three orientations: (1) cooperative motivational orientation (MO), (2) patterns of predictable behavior, (3) a problem‐solving orientation. Trust between a negotiator and constituents usually refers to a cooperative MO (i.e., shared loyalty) between these two groups. The addition of a mediator can impact both the opposing negotiators' relationship and each negotiator‐constituent relationship; the mediator also has direct and indirect relationships with the parties and their constituents. Future directions for research on trust are identified.

Details

International Journal of Conflict Management, vol. 7 no. 4
Type: Research Article
ISSN: 1044-4068

Article
Publication date: 12 September 2008

Penelope Sue Greenberg, Ralph H. Greenberg and Yvonne Lederer Antonucci

Business process outsourcing (BPO) has become so prevalent that a new term, the extended enterprise, has arisen to describe this approach to structuring an organization. The…

3116

Abstract

Purpose

Business process outsourcing (BPO) has become so prevalent that a new term, the extended enterprise, has arisen to describe this approach to structuring an organization. The purpose of this paper is to integrate the information systems and the interfirm governance literatures to develop a framework for the role of trust in the governance of extended enterprises.

Design/methodology/approach

This paper uses transaction cost economics (TCE) to identify the elements and stages of BPO relationships. This paper then integrates those elements with the types of trust identified in the information systems (IS) literature to develop a framework.

Findings

TCE identifies three elements that influence the design and function of interfirm relationships: the transaction, the transaction environment and the parties (the client and the vendors). TCE also recognizes three stages in the transaction: contact, contract, and control. The IS literature identifies three types of trust: trusted systems, trusted institutions, and trusted partners. The paper links the two literatures into a framework identifying the type of trust related to each of the TCE elements; it then uses these linkages to identify the types of trust appropriate for each stage of the BPO relationship.

Originality/value

This paper integrates the IS and interfirm governance literatures concerning trust in interorganizational relationships in an effort to offer a framework for building and sustaining trust between BPO vendors and clients and to identify potential directions for future research.

Details

Business Process Management Journal, vol. 14 no. 5
Type: Research Article
ISSN: 1463-7154

Keywords

Article
Publication date: 2 October 2007

Jari Salo and Heikki Karjaluoto

The purpose of this paper is to show that trust is an important factor for successful online transactions. Although the importance of trust has been examined from various…

12392

Abstract

Purpose

The purpose of this paper is to show that trust is an important factor for successful online transactions. Although the importance of trust has been examined from various perspectives, the studies on online trust have been fragmented in nature and are still in their infancy.

Design/methodology/approach

This paper explores factors that affect the formation of end‐user trust in online environments. The study proposes a conceptual framework, which categorises the affecting elements under internal and external factors affecting end‐user trust formation.

Findings

The results suggest that the actual outcome of trust‐enhancing methods in online environments should be the development of long‐term trusted customer relationships.

Research limitations/implications

More empirical research efforts need to be directed to study trust in online environments. This study is conceptual and qualitative in nature, which is its main limitation.

Practical implications

Companies operating in the online environment should focus their attention on the trust formation process and its management as well as creating and managing their relationships with important third parties.

Originality/value

The study is significant for two reasons. First, it synthesises online trust literature and, second, it presents an integrative trust model.

Details

Online Information Review, vol. 31 no. 5
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 3 April 2009

U.M. Mbanaso, G.S. Cooper, David Chadwick and Anne Anderson

This paper aims to describe a bilateral symmetric approach to authorization, privacy protection and obligation enforcement in distributed transactions. The authors introduce the…

Abstract

Purpose

This paper aims to describe a bilateral symmetric approach to authorization, privacy protection and obligation enforcement in distributed transactions. The authors introduce the concept of the obligation of trust (OoT) protocol as a privacy assurance and authorization mechanism that is built upon the XACML standard. The OoT allows two communicating parties to dynamically exchange their privacy and authorization requirements and capabilities, which the authors term a notification of obligation (NoB), as well as their commitments to fulfilling each other's requirements, which the authors term signed acceptance of obligations (SAO). The authors seek to describe some applicability of these concepts and to show how they can be integrated into distributed authorization systems for stricter privacy and confidentiality control.

Design/methodology/approach

Existing access control and privacy protection systems are typically unilateral and provider‐centric, in that the enterprise service provider assigns the access rights, makes the access control decisions, and determines the privacy policy. There is no negotiation between the client and the service provider about which access control or privacy policy to use. The authors adopt a symmetric, more user‐centric approach to privacy protection and authorization, which treats the client and service provider as peers, in which both can stipulate their requirements and capabilities, and hence negotiate terms which are equally acceptable to both parties.

Findings

The authors demonstrate how the obligation of trust protocol can be used in a number of different scenarios to improve upon the mechanisms that are currently available today.

Practical implications

This approach will serve to increase trust in distributed transactions since each communicating party receives a difficult to repudiate digitally signed acceptance of obligations, in a standard language (XACML), which can be automatically enforced by their respective computing machinery.

Originality/value

The paper adds to current research in trust negotiation, privacy protection and authorization by combining all three together into one set of standardized protocols. Furthermore, by providing hard to repudiate signed acceptance of obligations messages, this strengthens the legal case of the injured party should a dispute arise.

Details

Internet Research, vol. 19 no. 2
Type: Research Article
ISSN: 1066-2243

Keywords

Abstract

Details

The Definitive Guide to Blockchain for Accounting and Business: Understanding the Revolutionary Technology
Type: Book
ISBN: 978-1-78973-865-0

Article
Publication date: 11 December 2020

Jiajun Liu and Pingyu Jiang

Social manufacturing has emerged. It aims to integrate the manufacturing resources of micro- and small-scale manufacturing enterprises (MSMEs) and help MSMEs cope with the…

536

Abstract

Purpose

Social manufacturing has emerged. It aims to integrate the manufacturing resources of micro- and small-scale manufacturing enterprises (MSMEs) and help MSMEs cope with the dynamic, service-oriented and personalized market demands. In social manufacturing, MSMEs cooperate with each other through manufacturing resource sharing. However, because MSMEs are distributed and decentralized, the efficiency of establishing reliable cooperation between MSMEs is relatively low. Therefore, this paper presents a blockchain-driven cyber-credit evaluation system (BCCES) to implement distributed cyber-credit evaluation. BCCES can provide reliable cyber-credit for distributed MSMEs without the trusted third party. This can improve the efficiency of establishing reliable cooperation among unauthentic MSMEs.

Design/methodology/approach

The paper proposes a BCCES to evaluate MSMEs' cyber-credit in decentralized environment. In BCCES, a cyber-credit evaluation model is proposed by improving set pair analysis (SPA) method, and cyber-credit smart contract and distributed consensus mechanism are designed according to the runtime logic of distributed cyber-credit evaluation.

Findings

The results confirmed that BCCES is feasible and effective to implement cyber-credit evaluation without the trusted third party. With the advantages of blockchain, BCCES can automatically realize cyber-credit evaluation through smart contract and distributed consensus. At the same time, BCCES can evaluate the real-time cyber-credit of MSMEs based on their latest service evaluation. In addition, we can design corresponding smart contracts according to actual requirements, which makes blockchain applicable to different distributed scenarios.

Originality/value

The paper combines blockchain and SPA to implement cyber-credit evaluation in social manufacturing and provides a new feasible idea for cyber-credit evaluation without the trusted third party. This can also provide MSMEs a reference of applying blockchain to other distributed scenarios through combining smart contract and different algorithms.

Details

Industrial Management & Data Systems, vol. 121 no. 4
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 7 June 2013

Joshua Arvin S. Lat, Rod Xavier R. Bondoc and Kevin Charles V. Atienza

The SOUL System aims to provide a low‐cost secure online two‐factor authentication system that involves both a password and a security token in the form of an ordinary electronic…

1198

Abstract

Purpose

The SOUL System aims to provide a low‐cost secure online two‐factor authentication system that involves both a password and a security token in the form of an ordinary electronic container. Its main goal is to design and build a system that can easily be integrated to existing websites to make the login and registration processes more secure.

Design/methodology/approach

The three main parts of the system are the website, the ordinary hardware device, and trusted third party. The website must first be integrated with the web API provided and then registered to the trusted third party website to allow two‐factor authentication. It must be registered to the trusted third party so that it can be used to register and login to SOUL System integrated websites.

Findings

The design and implementation of the proposed two‐factor authentication system makes use of the hybrid cryptosystem, one‐time passwords, hash functions, trusted third parties, steganographic techniques, signed java applets and cross‐language cryptographic libraries. It protects users from well known attacks such as brute‐force attacks, collision attacks, dictionary attacks, keylogger attacks, man‐in‐the‐middle attacks, and even replay attacks. Currently, the system can be integrated to websites built in PHP, Python, and Java.

Originality/value

The SOUL System is the first two‐factor authentication system that uses both cryptography and steganography to provide secure online authentication with an ordinary USB flash drive. It is designed to work in major operating systems such as Windows, Mac OS X, and Linux with very minimal installation.

Article
Publication date: 6 September 2016

Lin Xiao, Zixiu Guo, John D’Ambra and Bin Fu

Although recent years have shown increasing popularity of e-commerce worldwide, there is still a lack of studies comprehensively exploring trust issue in e-commerce. Based on trust

3227

Abstract

Purpose

Although recent years have shown increasing popularity of e-commerce worldwide, there is still a lack of studies comprehensively exploring trust issue in e-commerce. Based on trust transfer theory and signaling theory, the purpose of this paper is to present an integrated research model to test the relationships between trust dimensions and e-loyalty, interactions among trust dimensions, as well as antecedents of different trust dimensions.

Design/methodology/approach

Data were collected through a web-based survey in Chinese markets and structural equation modeling with partial least squares was used to analyze the data.

Findings

The results identified that three trust dimensions all have significant impacts on e-loyalty, and relationships existed in different trust dimensions. Moreover, information quality and security protection are important factors determining institutional trust while store reputation is the most salient factor determining interpersonal trust.

Originality/value

This research contributes to the body of knowledge on trust by exploring the nature of trust with a multidimensional scale. Another theoretical contribution is the provision of a comprehensive understanding of the trust antecedents in e-commerce. Furthermore, this research benefits the companies doing e-businesses by allowing them to better understand how to improve consumers’ trust in the online environment and thus to retain and attract more loyal customers and succeed in online businesses.

Book part
Publication date: 30 September 2020

Saurav K. Dutta

Abstract

Details

The Definitive Guide to Blockchain for Accounting and Business: Understanding the Revolutionary Technology
Type: Book
ISBN: 978-1-78973-865-0

1 – 10 of over 41000