Archives as a trusted third party in maintaining and preserving digital records in the cloud environment

2016 ◽  
Vol 26 (2) ◽  
pp. 170-184 ◽  
Author(s):  
Wei Guo ◽  
Yun Fang ◽  
Weimei Pan ◽  
Dekun Li

Purpose This paper aims to present a case wherein a public archive intervenes in maintaining and preserving digital records (including underlying technological infrastructure) created by a private company to protect the trustworthiness of records, thereby helping the company to discharge their accountability. Design/methodology/approach This paper details the intervention of Tianjin Municipal Archives in the management of the records of Tianjin Otis Elevator Co., Ltd, the technical infrastructure that enables and supports such configuration, the issues encountered and the theoretical implications of this case. Findings This case suggests that not only does the concept of archives as a trusted third party remain relevant in the changing technological environment but also, in certain cases (e.g. wherein the supplier of evidentiary documents holds a monopoly over an industry), archives are becoming increasingly critical in maintaining the reliability and authenticity of digital records in the cloud environment. Research limitations/implications Given the challenges raised by the emerging cloud environment, it is vital to develop a renewed understanding of the concept of archives as a trusted third party, the relationship between archives and commercial third party services and the relationship between public archives and private records. Furthermore, this case identifies the need to re-examine archival methodologies to protect the authenticity of structured data. Originality/value This case exemplifies how archives can help private organizations address issues related to guaranteeing and demonstrating the evidential nature of digital records and provides empirical evidence for archives being conceptualized as a trusted third party in maintaining and preserving digital records.

2015 ◽  
Vol 27 (6) ◽  
pp. 1054-1081 ◽  
Author(s):  
Imran Rahman ◽  
Jeongdoo Park ◽  
Christina Geng-qing Chi

Purpose – This quasi-experimental study aimed to investigate, drawing upon influential discounting behavior theory and cognition – affect – behavior (C-A-B) paradigm, consumers’ reactions to the phenomenon of “greenwashing” in the lodging industry. More specifically, this paper proposed and tested a theoretical model that examined whether recognizing the ulterior motive caused consumer skepticism about hotels’ environmental claims, which in turn influenced consumers’ intention to participate in linen reuse program and intention to revisit the hotel. Additionally, the moderating effects of ecological concern on the relationship between skepticism and intention to participate and between skepticism and intention to revisit were examined. Design/methodology/approach – A quasi-experimental design was used with two conditions (control vs ulterior motive) employing staff members of a US public university as study participants. In total, 638 useful responses were received. Findings – The results of this study revealed that an ulterior motive of hotels’ environmental claims evoked consumer skepticism, which, in turn, negatively influenced consumers’ intention to participate in the linen reuse program and intention to revisit the hotel. Skepticism was found to partially mediate the relationships between ulterior motive and intention to participate and between ulterior motive and intention to revisit. Consumers’ ecological concern was not found to moderate the relationship between skepticism and intention to participate in the linen reuse program and skepticism and intention to revisit the hotel. In addition, a significant positive direct effect between ecological concern and intention to participate and a non-significant effect between ecological concern and revisit intention were revealed. Research limitations/implications – Focus on consumers’ response to the ulterior motive of environmental claims advances an understanding of consumers’ attitudes and perceptions about hotels’ green practices. Practical implications – Findings suggest that hotels need to be watchful so that consumers do not become skeptical. Therefore, it is of utmost importance that managers do everything possible to give customers no room for doubt. Hoteliers need to spend more effort in installing comprehensive green programs and make true green claims by keeping the potential consequences of greenwashing in mind. Hoteliers also need to seek out third-party certifications that require the hotel to meet certain standards, which will help ensure credibility in the eyes of consumers. Originality/value – Hospitality literature has seldom explored this gray area of green marketing, and, in this regard, this study serves as a guide to hoteliers and researchers alike. The authors thereby anticipate that this study would encourage more research in this often overlooked but highly important area.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Jiajun Liu ◽  
Pingyu Jiang

PurposeSocial manufacturing has emerged. It aims to integrate the manufacturing resources of micro- and small-scale manufacturing enterprises (MSMEs) and help MSMEs cope with the dynamic, service-oriented and personalized market demands. In social manufacturing, MSMEs cooperate with each other through manufacturing resource sharing. However, because MSMEs are distributed and decentralized, the efficiency of establishing reliable cooperation between MSMEs is relatively low. Therefore, this paper presents a blockchain-driven cyber-credit evaluation system (BCCES) to implement distributed cyber-credit evaluation. BCCES can provide reliable cyber-credit for distributed MSMEs without the trusted third party. This can improve the efficiency of establishing reliable cooperation among unauthentic MSMEs.Design/methodology/approachThe paper proposes a BCCES to evaluate MSMEs' cyber-credit in decentralized environment. In BCCES, a cyber-credit evaluation model is proposed by improving set pair analysis (SPA) method, and cyber-credit smart contract and distributed consensus mechanism are designed according to the runtime logic of distributed cyber-credit evaluation.FindingsThe results confirmed that BCCES is feasible and effective to implement cyber-credit evaluation without the trusted third party. With the advantages of blockchain, BCCES can automatically realize cyber-credit evaluation through smart contract and distributed consensus. At the same time, BCCES can evaluate the real-time cyber-credit of MSMEs based on their latest service evaluation. In addition, we can design corresponding smart contracts according to actual requirements, which makes blockchain applicable to different distributed scenarios.Originality/valueThe paper combines blockchain and SPA to implement cyber-credit evaluation in social manufacturing and provides a new feasible idea for cyber-credit evaluation without the trusted third party. This can also provide MSMEs a reference of applying blockchain to other distributed scenarios through combining smart contract and different algorithms.


2016 ◽  
Vol 45 (2) ◽  
pp. 214-231 ◽  
Author(s):  
Jin Feng Uen ◽  
Shu-Yuan Chen ◽  
Hsien-Chun Chen ◽  
Chih-Tang Lin

Purpose – The purpose of this paper is to investigate the cross-level relationship between moral obligation violation, overall justice climate, and survivors’ commitment. Design/methodology/approach – Data were obtained from 25 companies with 261 individual employees’ cases from three main industries in Taiwan (n=25/261). Findings – Organizations which have moral obligation violation during layoff would directly influence survivors’ perceptions of justice and further affect survivors’ level of affective commitment. Originality/value – This is one of the first studies to provide evidence of the relationship between moral obligation violation, overall justice climate and survivors’ affective commitment. Additionally, most studies of survivors’ attitude and behavior are based on the third-party perspective; this study is the first to argue that survivors are also affected by employers’ layoff as well as victims. The influence of layoff will lead to survivors’ subsequent attitude and behavior.


2017 ◽  
Vol 5 (4) ◽  
pp. 642-655 ◽  
Author(s):  
Mazhar Ali ◽  
Saif U. R. Malik ◽  
Samee U. Khan

2015 ◽  
Vol 8 (1) ◽  
pp. 74-91 ◽  
Author(s):  
Miia Martinsuo ◽  
Rami Sariola

Purpose – The purpose of this paper is to increase understanding on the emergence of mutually beneficial relationships between component suppliers and third parties in projects, and their interaction practices in the project and potential new services. Design/methodology/approach – A qualitative, exploratory research strategy is employed in the context of construction projects, with construction component manufacturers as the focal component suppliers. In total 22 interviews were conducted with structural engineers and architects as relevant third parties, to discover the specifics of component suppliers’ third-party relationship development in construction projects. Findings – The results show the crucial role of third parties in the constructor’s and customer’s decision-making process, and various ways for component suppliers to develop the relationship toward the third parties. The results offer important knowledge about the cooperation between construction component suppliers and third parties and means to increase the centrality of component suppliers in the project network. Research limitations/implications – The research was delimited to structural engineers and architects as third parties in construction projects in one country. Further research is encouraged on third-party cooperation in other kinds of project networks, other kinds of third parties, and the various forms of triadic cooperation in project networks. Practical implications – The results encourage component suppliers to take a proactive approach in developing relationships with third parties, when strengthening their network position. The paper introduces practical ways in which component suppliers may take action toward generating powerful main contractor-supplier-third-party triads. Originality/value – Limited research attention has been directed at third parties and triadic cooperation in project networks. This paper offers important knowledge about the relationship between component suppliers and third parties, particularly in terms of third parties’ expectations and practical initiatives to enhance the relationships.


Author(s):  
Songzhu Mei ◽  
Cong Liu ◽  
Yong Cheng ◽  
Jiangjiang Wu ◽  
Zhiying Wang

Author(s):  
V E Sathishkumar ◽  
Wesam Atef Hatamleh ◽  
Abeer Ali Alnuaim ◽  
Mohamed Abdelhady ◽  
B. Venkatesh ◽  
...  

Information ◽  
2021 ◽  
Vol 12 (9) ◽  
pp. 340
Author(s):  
Ping Zhang ◽  
Huanhuan Chi ◽  
Jiechang Wang ◽  
Youlin Shang

Compared with the traditional system, cloud storage users have no direct control over their data, so users are most concerned about security for their data stored in the cloud. One security requirement is to resolve any threats from semi-trusted key third party managers. The proposed data security for cloud environment with semi-trusted third party (DaSCE) protocol has solved the security threat of key managers to some extent but has not achieved positive results. Based on this, this paper proposes a semi-trusted third-party data security protocol (ADSS), which can effectively remove this security threat by adding time stamp and blind factor to prevent key managers and intermediaries from intercepting and decrypting user data. Moreover, the ADSS protocol is proved to provide indistinguishable security under a chosen ciphertext attack. Finally, the performance evaluation and simulation of the protocol show that the ADSS security is greater than DaSCE, and the amount of time needed is lower than DaSCE.


Sign in / Sign up

Export Citation Format

Share Document