2 resultados para REPUTATION

em Digital Commons - Michigan Tech


Relevância:

10.00% 10.00%

Publicador:

Resumo:

In 2002, motivated largely by the uncontested belief that the private sector would operate more efficiently than the government, the government of Cameroon initiated a major effort to privatize some of Cameroon’s largest, state-run industries. One of the economic sectors affected by this privatization was tea production. In October 2002, the Cameroon Tea Estate (CTE), a privately owned, tea-cultivating organization, bought the Tole Tea Estate from the Cameroon Development Corporation (CDC), a government-owned entity. This led to an increase in the quantity of tea production; however, the government and CTE management appear not to have fully considered the risks of privatization. Using classical rhetorical theory, Richard Weaver’s conception of “god terms” (or “uncontested terms”), and John Ikerd’s ethical approach to risk communication, this study examines risks to which Tole Tea Estate workers were exposed and explores rhetorical strategies that workers employed in expressing their discontent. Sources for this study include online newspapers, which were selected on the basis of their reputation and popularity in Cameroon. Analysis of the data shows that, as a consequence of privatization, Tole Tea Estate workers were exposed to three basic risks: marginalization, unfulfilled promises, and poor working conditions. Workers’ reactions to these risks tended to grow more emotional as management appeared to ignore their demands. The study recommends that respect for labor law, constructive dialogue among stakeholders, and transparency might serve as guiding principles in responding to the politics of privatization in developing countries.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

With wireless vehicular communications, Vehicular Ad Hoc Networks (VANETs) enable numerous applications to enhance traffic safety, traffic efficiency, and driving experience. However, VANETs also impose severe security and privacy challenges which need to be thoroughly investigated. In this dissertation, we enhance the security, privacy, and applications of VANETs, by 1) designing application-driven security and privacy solutions for VANETs, and 2) designing appealing VANET applications with proper security and privacy assurance. First, the security and privacy challenges of VANETs with most application significance are identified and thoroughly investigated. With both theoretical novelty and realistic considerations, these security and privacy schemes are especially appealing to VANETs. Specifically, multi-hop communications in VANETs suffer from packet dropping, packet tampering, and communication failures which have not been satisfyingly tackled in literature. Thus, a lightweight reliable and faithful data packet relaying framework (LEAPER) is proposed to ensure reliable and trustworthy multi-hop communications by enhancing the cooperation of neighboring nodes. Message verification, including both content and signature verification, generally is computation-extensive and incurs severe scalability issues to each node. The resource-aware message verification (RAMV) scheme is proposed to ensure resource-aware, secure, and application-friendly message verification in VANETs. On the other hand, to make VANETs acceptable to the privacy-sensitive users, the identity and location privacy of each node should be properly protected. To this end, a joint privacy and reputation assurance (JPRA) scheme is proposed to synergistically support privacy protection and reputation management by reconciling their inherent conflicting requirements. Besides, the privacy implications of short-time certificates are thoroughly investigated in a short-time certificates-based privacy protection (STCP2) scheme, to make privacy protection in VANETs feasible with short-time certificates. Secondly, three novel solutions, namely VANET-based ambient ad dissemination (VAAD), general-purpose automatic survey (GPAS), and VehicleView, are proposed to support the appealing value-added applications based on VANETs. These solutions all follow practical application models, and an incentive-centered architecture is proposed for each solution to balance the conflicting requirements of the involved entities. Besides, the critical security and privacy challenges of these applications are investigated and addressed with novel solutions. Thus, with proper security and privacy assurance, these solutions show great application significance and economic potentials to VANETs. Thus, by enhancing the security, privacy, and applications of VANETs, this dissertation fills the gap between the existing theoretic research and the realistic implementation of VANETs, facilitating the realistic deployment of VANETs.