In this paper we outline a methodological framework for studying the inter-organizational aspects of paradoxes and specify this in relation to grand challenges. Grand challenges are large-scale, complex, enduring problems that affect large populations, have a strong social component, and appear intractable. Our methodological insights draw from our study of the insurance protection gap, a grand challenge that arises when economic losses from large-scale disaster significantly exceed the insured loss, leading to economic and social hardship for the affected communities. We provide insights into collecting data to uncover the paradoxical elements inherent in grand challenges and then propose three analytical techniques for studying inter-organizational paradoxes: zooming in and out, tracking problematization, and tracking boundaries and boundary organizations. These techniques can be used to identify and follow how contradictions and interdependences emerge and dynamically persist within interorganizational interactions and how these shape and are shaped by the unfolding dynamics of the grand challenge. Our techniques and associated research design help advance paradox theorizing by moving it to the inter-organizational and systemic level. This paper also illustrates paradox as a powerful lens through which to further our understanding of grand challenges.
This study examines how organizations construct and manage risk objects as a duality of harm-benefit within their normal operations. It moves beyond the existing focus on accidents, disasters and crisis. We study the risk-transfer processes of 35 insurers where they navigate the tension of retaining risk in their insurance portfolio to increase the benefit of making profit and transferring risk to reinsurance to reduce the harm of paying claims. We show that organizations' constructions of risk are underpinned by everyday risk management practices of centralizing, calculating and diversifying. Through variation in these practices, not all organizations seek balance and we in turn uncover the sensemaking processes of abstracting and localizing that enable organizations to prioritize harm or benefit. This contributes to the risk literature by illuminating the co-constitutive relationship between risk sensemaking processes and everyday risk management practices. Following the complex linkages involved in the construction of risk objects as sources of harmbenefit, our analysis also contributes to the literature on dualities. It shows that while immediate trade-offs between harm-benefit occur, prioritizing one element of the duality is ultimately a means for attaining the other. Thus, while initial imbalance is evident, prioritization can be an enabling approach to navigating duality. All authors contributed equally to this work. We would like to thank Editor Professor Pei Sun and the anonymous reviewers for their constructive feedback during the review process. We also thank Yuval Millo, Anette Mikes and other participants at the Cass Constructing Financial Risk Workshop, April 2015 and colleagues at EGOS 2015 and AOM 2016 for their helpful comments on earlier drafts of this paper. The authors acknowledge support from the following grants: Economic and Social Research Council
We propose a new Timed Release Cryptography (TRC) scheme which is based on bilinear pairings together with an S/Key-like procedure used for private key generation. Existing schemes for this task, such as time-lock puzzle approach, provide an approximate release time, dependent on the recipients' CPU speed and the beginning time of the decryption process. Additionally, some other server-based schemes do not provide scalability and anonymity because the server is actively involved in the encryption or the decryption. However, there are already protocols based on bilinear pairings that solve most of the problems referred. Our goal is to extend and combine the existing protocols with desirable properties in order to create a secure, fast and scalable TRC scheme applied to dependent or sequential events. For this purpose we used continuous hashed time-instant private keys (hash chain) in the same way the S/Key system works. Our approach decreases dramatically the number of past time-instant private keys the server stores and only two keys are needed, the last one to construct the previous keys and the first one to recursively verify the authenticity of the next keys.
Hadoop is a fault tolerant Java framework that supports data distribution and process parallelization using commodity hardware. Based on the provided scalability and the independence of task execution, we combined Hadoop with crawling techniques to implement various applications that deal with large amount of data. Our experiments show that Hadoop is a very useful and trustworthy tool for creating distributed programs that perform better in terms of computational efficiency.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.