Skip to main content Accessibility help
×
Hostname: page-component-cd9895bd7-gxg78 Total loading time: 0 Render date: 2024-12-23T14:34:46.824Z Has data issue: false hasContentIssue false

References

Published online by Cambridge University Press:  01 April 2022

Victoria L. Lemieux
Affiliation:
University of British Columbia, Vancouver
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
Searching for Trust
Blockchain Technology in an Age of Disinformation
, pp. 203 - 246
Publisher: Cambridge University Press
Print publication year: 2022

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Accenture. (2016). Editing the uneditable blockchain: Why distributed ledger technology must adapt to an imperfect world. www.accenture.com/t00010101T000000__w__/es-es/_acnmedia/PDF-33/Accenture-Editing-Uneditable-Blockchain.pdfGoogle Scholar
Aikhenvald, A. Y. (2004). Evidentiality. Oxford University Press.Google Scholar
Ajaka, N., Kessler, G., & Samuels, E. (2019). Seeing isn’t believing: The fact checker’s guide to manipulated video. Washington Post. www.washingtonpost.com/graphics/2019/politics/fact-checker/manipulated-video-guideGoogle Scholar
Alesina, A., & Wacziarg, R. (2000). The economics of civic trust. In Pharr, S. J. & Putnam, R. D. (Eds.), Disaffected democracies: What’s troubling the trilateral countries? (pp. 149170). Princeton University Press.Google Scholar
Amazeen, M. A. (2015). Revisiting the epistemology of fact-checking. Critical Review, 27(1), 122. https://doi.org/10.1080/08913811.2014.993890CrossRefGoogle Scholar
Anderson, B. (1991). Imagined communities: Reflections on the origin and spread of nationalism. Verso.Google Scholar
Anduck, . (2018). Blockchain in words. https://bitcoinstrings.comGoogle Scholar
Aneesh, A. (2002). Technologically coded authority: The post-industrial decline in bureaucratic hierarchies [Conference paper]. 4th International Summer Academy on Technology Studies: “Technology and the Public,” Deutschlandsberg, Austria, July 7–13, 2002. www.researchgate.net/publication/254843955_Technologically_Coded_Authority_The_Post-Industrial_Decline_in_Bureaucratic_HierarchiesGoogle Scholar
Antonopoulos, A. (2014, February 20). Bitcoin security model: Trust by computation. A shift from trusting people to trusting math. Radar. http://radar.oreilly.com/2014/02/bitcoin-security-model-trust-by-computation.htmlGoogle Scholar
Arendt, H. (1978, October 26). Hannah Arendt: From an interview. New York Review of Books. www.nybooks.com/articles/1978/10/26/hannah-arendt-from-an-interviewGoogle Scholar
Arizti, P., Brumby, J., Manning, N., Senderowitsch, R., & Thomas, T. (Eds.) (2010). Results, performance budgeting and trust in government. World Bank. http://hdl.handle.net/10986/27895CrossRefGoogle Scholar
Arrow, K. J. (1972). Gifts and exchanges. Philosophy & Public Affairs, 1(4), 343362. www.jstor.org/stable/2265097Google Scholar
Arrow, K. J. (1974). The limits of organization. W. W. Norton & Company.Google Scholar
Arthur, C. (2013, August 23). Tech giants may be huge, but nothing matches big data. Guardian. www.theguardian.com/technology/2013/aug/23/tech-giants-dataGoogle Scholar
Ashforth, B. E., & Mael, F. (1989). Social identity theory and the organization. Academy of Management Review, 14(1), 2039. https://doi.org/10.2307/258189Google Scholar
Askew, K. (2020, July 1). From fjord to fork: Norwegian collaboration leverages blockchain for “safer, better seafood.” Food Navigator.com. www.foodnavigator.com/Article/2020/07/01/Norwegian-collaboration-leverages-blockchain-for-safer-better-seafoodGoogle Scholar
Atzori, M. (2015). Blockchain technology and decentralized governance: Is the state still necessary? http://dx.doi.org/10.2139/ssrn.2709713Google Scholar
Austin, J. L. (1962). Sense and sensibilia (Warnock, G. J., Ed.). Clarendon Press.Google Scholar
Austin, J. L. (1975). How to do things with words (2nd ed.). Oxford University Press.Google Scholar
Ayyub, R. (2018, November 21). I was the victim of a deepfake porn plot intended to silence me. HuffPost UK. www.huffingtonpost.co.uk/entry/deepfake-porn_uk_5bf2c126e4b0f32bd58ba316Google Scholar
Baier, A. (1986). Trust and antitrust. Ethics, 96(2), 231260. https://doi.org/10.1086/292745Google Scholar
Baker, J. (1987). Trust and rationality. Pacific Philosophical Quarterly, 68(1), 113. https://doi.org/10.1111/j.1468-0114.1987.tb00280.xGoogle Scholar
Balliet, D., & Van Lange, P. A. M. (2013). Trust, conflict, and cooperation: A meta-analysis. Psychological Bulletin, 139(5), 10901112. https://doi.org/10.1037/a0030939Google Scholar
Bandyopadhyay, P. (2018, December 3). The origin of blockchain – from cypherpunks to Satoshi to IBM. Medium. https://medium.com/datadriveninvestor/cypherpunks-to-satoshi-to-ibm-819ebcfdd674Google Scholar
Bankole, K. (2019, April 2). Code pattern: Deploy a blockchain network to regulate food shipments along a supply chain. IBM. https://developer.ibm.com/technologies/blockchain/patterns/monitor-food-shipments-using-blockchain/Google Scholar
Bannister, F., & Connolly, R. (2011). Trust and transformational government: A proposed framework for research. Government Information Quarterly, 28(2), 137147. https://doi.org/10.1016/j.giq.2010.06.010Google Scholar
Barber, B. (1983). The logic and limits of trust. Rutgers University Press.Google Scholar
Bartoletti, M., & Pompianu, L. (2017). An empirical analysis of smart contracts: Platforms, applications, and design patterns. In Brenner, M., Rohloff, K., Bonneau, J., Miller, A., Ryan, P. Y. A., Teague, V., Bracciali, A., Sala, M., Pintore, F., & Jakobsson, M. (Eds.), Financial Cryptography and Data Security, FC 2017. Lecture notes in computer science, vol. 10323 (pp. 494509). Springer. https://doi.org/10.1007/978-3-319-70278-0_31Google Scholar
Basol, M., Roozenbeek, J., & van der Linden, S. (2020). Good news about bad news: Gamified inoculation boosts confidence and cognitive immunity against fake news. Journal of Cognition, 3(1), 2. http://doi.org/10.5334/joc.91Google Scholar
Basu, S. (1997). The conservatism principle and the asymmetric timeliness of earnings. Journal of Accounting and Economics, 24(1), 337. https://doi.org/10.1016/S0165-4101(97)00014-1CrossRefGoogle Scholar
Basu, S., & Waymire, G. B. (2006). Recordkeeping and human evolution. Accounting Horizons, 20(3), 201229. https://doi.org/10.2308/acch.2006.20.3.201Google Scholar
Basu, S., Kirk, M., & Waymire, G. (2009). Memory, transaction records, and “The Wealth of Nations.” Accounting, Organizations and Society, 34(8), 895917. https://doi.org/10.1016/j.aos.2009.07.002Google Scholar
Bates, M. J. (1999). The invisible substrate of information science. Journal of the American Society for Information Science, 50(12), 10431050. https://doi.org/10.1002/(SICI)1097-4571(1999)50:12<1043::AID-ASI1>3.0.CO;2-XGoogle Scholar
Batista, D., Kim, H., Lemieux, V. L., Stancic, H., & Unnithan, C. (2021). Blockchains and provenance: How a technical system for tracing origins, ownership and authenticity can transform social trust. In Lemieux, V. L. & Feng, C. (Eds.), Building decentralized trust (pp. 111128). Springer.Google Scholar
Baumgaertner, B., Carlisle, J. E., & Justwan, F. (2018) The influence of political ideology and trust on willingness to vaccinate. PLoS ONE, 13(1). https://doi.org/10.1371/journal.pone.019172Google Scholar
Baycara, Y. (2014, December 2). “Business records” exception to hearsay in the Ontario Evidence Act. CanLII Connects. https://canliiconnects.org/en/commentaries/34810#_ftn2Google Scholar
Baydakova, A. (2021, January 28). Inside Iran’s onslaught on bitcoin mining. Coindesk. www.coindesk.com/inside-irans-onslaught-on-bitcoin-miningGoogle Scholar
BBC. (2021, January 22). Google threatens to withdraw search engine from Australia. BBC News. www.bbc.com/news/world-australia-55760673Google Scholar
Beal, P. (2011). Diplomatic. In Beal, P., A dictionary of English manuscript terminology, 1450–2000. Oxford University Press. Online ed.Google Scholar
Beatty, P., Reay, I., Dick, S., & Miller, J. (2011). Consumer trust in e-commerce web sites: A meta-study. ACM Computing Surveys, 43(3), 146. https://doi.org/10.1145/1922649.1922651Google Scholar
Becker, L. C. (1996). Trust as noncognitive security about motives. Ethics, 107(1), 4361. www.jstor.org/stable/2382243Google Scholar
Berger, P. L., & Luckmann, T. (1966). The social construction of reality: A treatise in the sociology of knowledge. Anchor Books.Google Scholar
Berman, E. M. (1997). Dealing with cynical citizens. Public Administration Review, 57(2), 105112. https://doi.org/10.2307/977058Google Scholar
Berti-Equille, L., & Ba, M. L. (2016). Veracity of big data: Challenges of cross-modal truth discovery. Journal of Data and Information Quality, 7(3), 13. https://doi.org/10.1145/2935753Google Scholar
Berti-Équille, L., & Borge-Holthoefer, J. (2015). Veracity of data: From truth discovery computation algorithms to models of misinformation dynamics. Synthesis Lectures on Data Management, 7(3), 1155. https://doi.org/10.2200/S00676ED1V01Y201509DTM042Google Scholar
Bhattacharjee, A., Badsha, S., Shahid, A. R., Livani, H., & Sengupta, S. (2020). Block-phasor: A decentralized blockchain framework to enhance security of synchrophasor. In Proceedings of the 2020 IEEE Kansas Power and Energy Conference (KPEC), Manhattan, KS, USA, July 13–14, 2020 (pp. 290295). IEEE. https://doi.org/10.1109/KPEC47870.2020.9167676Google Scholar
Bheemaiah, K. (2015). Why business schools need to teach about the blockchain. http://dx.doi.org/10.2139/ssrn.2596465Google Scholar
Bitcoin. (2015a, June 26). Implementation of BIP 101: Maximum block size increase#6341. GitHub. https://github.com/bitcoin/bitcoin/pull/6341Google Scholar
Bitcoin. (2015b, August 6). Implement hard fork to allow bigger blocks. GitHub. https://github.com/bitcoinxt/bitcoinxt/commit/946e3ba8c7806a66c2b834d3817ff0c986c0811bGoogle Scholar
Bitcoin. (2021). BitcoinCore: Bitcoin development. Bitcoin. https://bitcoin.org/en/development#dev-communitiesGoogle Scholar
Bitcoin improvement proposals. (2020, May 13). In Bitcoin Wiki. https://en.bitcoin.it/wiki/Bitcoin_Improvement_ProposalsGoogle Scholar
Bitcoin SV. (2019, May 23). Bitcoin creator Craig S. Wright (Satoshi Nakamoto) granted US copyright registrations for the Bitcoin white paper and code. Cision PR Newswire. www.prnewswire.com/news-releases/bitcoin-creator-craig-s-wright-satoshi-nakamoto-granted-us-copyright-registrations-for-the-bitcoin-white-paper-and-code-300855914.htmlGoogle Scholar
Bitcoin Wiki. (2018). How many confirmations is enough? Bitcoin Wiki. https://en.bitcoin.it/wiki/Confirmation#How_Many_Confirmations_Is_EnoughGoogle Scholar
Bitcoin XT. (2020, June 30). In Bitcoin Wiki. https://en.bitcoin.it/wiki/Bitcoin_XTGoogle Scholar
Bitnation. (2019). Enter Pangea: The internet of sovereignty. Bitnation. https://tse.bitnation.coGoogle Scholar
Bjarnason, E. (2019, April 15). Iceland is a bitcoin miner’s haven, but not everyone is happy. Al Jazeera. www.aljazeera.com/features/2019/4/15/iceland-is-a-bitcoin-miners-haven-but-not-everyone-is-happyGoogle Scholar
Blind, P. K. (2007, June 26–29). Building trust in government in the twenty-first century: Review of the literature and emerging issues [Paper presentation]. 7th Global Forum on Reinventing Government, Building Trust in Government, Vienna, Austria.Google Scholar
Blumler, J. G. (2016). The fourth age of political communication. Politiques de Communication, 1(6), 1930. https://doi.org/10.3917/pdc.006.0019Google Scholar
Bodó, B. (2020, July). Mediated trust: A theoretical framework to address the trustworthiness of technological trust mediators. New Media & Society. https://doi.org/10.1177/1461444820939922Google Scholar
Borgman, C. L. (2016). Big data, little data, no data: Scholarship in the networked world. MIT Press.Google Scholar
Borkowski, M., Sigwart, M., Frauenthaler, P., Hukkinen, T., & Schulte, S. (2019). DeXTT: Deterministic cross-blockchain token transfers. IEEE Access, 7, 111030111042. https://doi.org/10.1109/ACCESS.2019.2934707CrossRefGoogle Scholar
Bosri, R., Uzzal, A. R., Omar, A. A., Hasan, A. S. M. T., & Bhuiyan, M. Z. A. (2019). Towards a privacy-preserving voting system through blockchain technologies. In Proceedings of the IEEE 17th International Conference on Dependable, Autonomic and Secure Computing, IEEE 17th International Conference on Pervasive Intelligence and Computing, IEEE 5th International Conference on Cloud and Big Data Computing, IEEE 4th Cyber Science and Technology Congress (DASC/PICom/CBDCom/CyberSciTech 2019), Fukuoka, Japan, August 5–8, 2019 (pp. 602608). IEEE. https://doi.org/10.1109/DASC/PiCom/CBDCom/CyberSciTech.2019.00116Google Scholar
Boynton, J. (2021, February 4). Note to readers: Our disappearing headlines. Toronto Star. www.thestar.com/business/opinion/2021/02/04/note-to-readers-our-disappearing-headlines.htmlGoogle Scholar
Bradbury, D. (2013, October 24). Bitcoin core development update #5 brings better transaction fees and embedded data. Coindesk. www.coindesk.com/bitcoin-core-dev-update-5-transaction-fees-embedded-dataGoogle Scholar
Brandtzaeg, P. B., & Følstad, A. (2017). Trust and distrust in online fact-checking services. Communications of the ACM, 60(9), 6571. https://doi.org/10.1145/3122803Google Scholar
Bratspies, R. M. (2018). Cryptocurrency and the myth of the trustless transaction. Michigan Technology Law Review, 25(1). https://repository.law.umich.edu/mttlr/vol25/iss1/2Google Scholar
Brenneke, A. (1953). Archivkunde. Ein beitrag zur theorie und geschichte des Europäischen archivwesens. Koehler & Amelang.Google Scholar
Briet, S. (2006). What is documentation? English translation of the classic French text (Day, R. E., Martinet, L., & Anghelescu, H. G. B., Trans. & Eds.). Scarecrow Press. Original work published in 1951.Google Scholar
Broad, C. D. (1925). The mind and its place in nature. Routledge & Kegan Paul.Google Scholar
Brooke, C. N. I. (1970). The teaching of diplomatic. Journal of the Society of Archivists, 4(1), 19. https://doi.org/10.1080/00379817009513930Google Scholar
Brown, J. S., & Duguid, P. (1996). The social life of documents; introduction by Esther Dyson. First Monday, 1(1). https://doi.org/10.5210/fm.v1i1.466Google Scholar
Brunton, F. (2019). Digital cash: A cultural history. Princeton University Press.Google Scholar
Bui, T., Cooper, D., Collomosse, J., Bell, M., Green, A., Sheridan, J., Higgins, J., Das, A., Keller, J., Thereaux, O., & Brown, A. (2019). ARCHANGEL: Tamper-proofing video archives using temporal content hashes on the blockchain. In Proceedings of the 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), Long Beach, CA, USA, June 16–17, 2019 (pp. 27932801). https://doi.org/10.1109/CVPRW.2019.00338CrossRefGoogle Scholar
Bui, T., Cooper, D., Collomosse, J., Bell, M., Green, A., Sheridan, J., Higgins, J., Das, A., Keller, J. R., & Thereaux, O. (2020). Tamper-proofing video with hierarchical attention autoencoder hashing on blockchain. IEEE Transactions on Multimedia, 22(11), 28582872. https://doi.org/10.1109/TMM.2020.2967640Google Scholar
Bumblauskas, D., Mann, A., Dugan, B., & Rittmer, J. (2020). A blockchain use case in food distribution: Do you know where your food has been? International Journal of Information Management, 52. https://doi.org/10.1016/j.ijinfomgt.2019.09.004Google Scholar
Buneman, P., & Tan, W. C. (2007). Provenance in databases. In SIMGOD ’07: Proceedings of the 2007 ACM SIGMOD International Conference on Management of Data, Beijing, China, June 12–14, 2007 (pp. 11711173). Association for Computing Machinery. https://doi.org/10.1145/1247480.1247646Google Scholar
Bureau of Canadian Archivists. (2008). Rules for archival description: Appendix D: Glossary. Bureau of Canadian Archivists – Planning Committee on Descriptive Standards.Google Scholar
Buterin, V. (2013). Ethereum white paper. Ethereum. https://ethereum.org/en/whitepaperGoogle Scholar
Butijn, B-J., Tamburi, D. A., & van den Heuvel, W. J. (2020). Blockchains: A systematic multivocal literature review. ACM Computing Surveys, 53(3), 137. https://doi.org/10.1145/3369052Google Scholar
Butterfield, A., Ngondi, G. E., & Kerr, A. (Eds.). (2016). Abstraction. In A dictionary of computer science (7th ed.). Oxford University Press. Online ed. https://doi.org/10.1093/acref/9780199688975.001.0001Google Scholar
Cahlan, S. (2020, February 13). How misinformation helped spark an attempted coup in Gabon. Washington Post. www.washingtonpost.com/politics/2020/02/13/how-sick-president-suspect-video-helped-sparked-an-attempted-coup-gabonGoogle Scholar
Cai, L., & Zhu, Y. (2015). The challenges of data quality and data quality assessment in the big data era. Data Science Journal, 14. http://doi.org/10.5334/dsj-2015-002Google Scholar
Caplan, R., Hanson, L., & Donovan, J. (2018, February 21). Dead reckoning: Navigating content moderation after “fake news.” Data & Society Research Institute. https://datasociety.net/library/dead-reckoningGoogle Scholar
Carmen, A. (2016, September 13). The World Anti-Doping Agency says it was hacked by Russia. The Verge. www.theverge.com/2016/9/13/12903546/wada-attack-cyber-russia-anti-dopingGoogle Scholar
Carter, D. (2016). Hustle and brand: The sociotechnical shaping of influence. Social Media + Society, 2(3). https://doi.org/10.1177/2056305116666305Google Scholar
Carter, R. G. S. (2006). Of things said and unsaid: Power, archival silences, and power in silence. Archivaria, 61, 215233. https://archivaria.ca/index.php/archivaria/article/view/12541Google Scholar
Casey, E. (2019). The chequered past and risky future of digital forensics. Australian Journal of Forensic Sciences, 51(6), 649664. https://doi.org/10.1080/00450618.2018.1554090Google Scholar
Casey, M. J. (2021, February 26). Funding culture and empowering artists with NFTs, featuring Lethabo Huma and Cuy Sheffield [Audio podcast episode]. In Money Reimagined. CoinDesk. www.coindesk.com/podcasts/coindesks-money-reimagined/nfts-culture-art-power-podcastGoogle Scholar
Castaldo, S., Premazzi, K., & Zerbini, F. (2010). The meaning (s) of trust: A content analysis on the diverse conceptualizations of trust in scholarly research on business relationships. Journal of Business Ethics, 96(4), 657668. https://doi.org/10.1007/s10551-010-0491-4Google Scholar
Castells, M. (2009). The rise of the network society: The information age: Economy, society and culture, vol. 1 (2nd ed.). Wiley-Blackwell.Google Scholar
Ceci, S. J., & Williams, W. M. (2020, October 25). The psychology of fact-checking. Scientific American. www.scientificamerican.com/article/the-psychology-of-fact-checking1Google Scholar
Cencetti, G. (1939). Il fondamento teorico della dottrina archivistica. Archivi 6, pp. 713 (reprinted in 1970 in Scritti archivistici, pp. 3846).Google Scholar
Chan, C. C. K., Kumar, V., Delaney, S., & Gochoo, M. (2020). Combating deepfakes: Multi-LSTM and blockchain as proof of authenticity for digital media. In Proceedings of 2020 IEEE/ITU International Conference on Artificial Intelligence for Good (AI4 G), Geneva, Switzerland, September 21–25, 2020 (pp. 5562). IEEE. https://doi.org/10.1109/AI4G50087.2020.9311067Google Scholar
Charikar, M., Steinhardt, J., & Valiant, G. (2017). Learning from untrusted data. In STOC 2017: Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing, Montreal, Canada, June 2017 (pp. 4760). Association of Computing Machinery. https://doi.org/10.1145/3055399.3055491Google Scholar
Charles, W., Marler, N., Long, L., & Manion, S. (2019). Blockchain compliance by design: Regulatory considerations for blockchain in clinical research. Frontiers in Blockchain, 2. https://doi.org/10.3389/fbloc.2019.00018Google Scholar
Chavez-Dreyfuss, G. (2015, May 15). Honduras to build land title registry using bitcoin technology. Reuters. www.reuters.com/article/usa-honduras-technology-idINKBN0O01V720150515Google Scholar
Cheema, G. S. (2010). Building trust in government: An introduction. In Cheema, G. S. & Popovski, V. (Eds.), Building trust in government: Innovations in governance reform in Asia (pp. 121). United Nations University Press. https://collections.unu.edu/eserv/UNU:2502/ebrary9789280811896.pdfGoogle Scholar
Choi, W., & Haigh, M. (2019). Analyzing divergent methodologies for political fact checking: United States and South Korea. Proceedings of the Association for Information Science and Technology, 56(1), 627628. https://doi.org/10.1002/pra2.112Google Scholar
Choy, W. L., & Teng, P. (2017). When smart contracts are outsmarted: The parity wallet “freeze” and software liability in the Internet of value. National Law Review, 11(77). www.natlawreview.com/article/when-smart-contracts-are-outsmarted-parity-wallet-freeze-and-software-liabilityGoogle Scholar
Christensen, D. (2007). Epistemology of disagreement: The good news. Philosophical Review, 116(2), 187217. https://doi.org/10.1215/00318108-2006-035Google Scholar
Christensen, D. (2009). Disagreement as evidence: The epistemology of controversy. Philosophy Compass, 4(5), 756767. https://doi.org/10.1111/j.1747-9991.2009.00237.xGoogle Scholar
Christensen, D. (2013). Epistemic modesty defended. In Christensen, D. & Lackey, J. (Eds.), The epistemology of disagreement: New essays (pp. 125). Oxford University Press.Google Scholar
Christidis, K., & Devetsikiotis, M. (2016). Blockchains and smart contracts for the internet of things. IEEE Access, 4, 22922303. https://doi.org/10.1109/ACCESS.2016.2566339Google Scholar
Clanchy, M. T. (1980). “Tenacious letters”: Archives and memory in the Middle Ages. Archivaria, 11, 115125. https://archivaria.ca/index.php/archivaria/article/view/1084Google Scholar
Clanchy, M. T. (2012). From memory to written record: England 1066–1307 (3rd ed.). Wiley-Blackwell.Google Scholar
Clark, J. (2016). The long road to Bitcoin. In Narayanan, A. et al. Bitcoin and cryptocurrency technologies: A comprehensive introduction (pp. ixxxvii). Princeton University Press.Google Scholar
Cobain, I. (2016). The history thieves: Secrets, lies and the shaping of a modern nation. Portobello Books.Google Scholar
Coeckelbergh, M., & Reijers, W. (2016). Cryptocurrencies as narrative technologies. ACM SIGCAS Computers and Society, 45(3), 172178. https://doi.org/10.1145/2874239.2874264Google Scholar
Cohen, F. (2015). A tale of two traces – Diplomatics and forensics. In Peterson, G. & Shenoi, S. (Eds.), IFIP advances in information and communication technology, vol. 462. Advances in Digital Forensics XI, DigitalForensics 2015, Orlando, FL, USA, January 26–28, 2015 (pp. 327). Springer. https://doi.org/10.1007/978-3-319-24123-4_1Google Scholar
Coleman, J. S. (1990). Foundations of social theory. Harvard University Press.Google Scholar
Collomosse, J., Bui, T., Brown, A., Sheridan, J., Green, A., Bell, M., Fawcett, J., Higgins, J., & Thereaux, O. (2018). ARCHANGEL: Trusted archives of digital public documents. In Proceedings of DocEng ’18: 18th ACM Symposium on Document Engineering, Halifax, NS, Canada, August 28–31, 2018 (pp. 14). Association for Computing Machinery. https://doi.org/10.1145/3209280.3229120Google Scholar
Computer History Museum. (2003). The origins and impact of VisiCalc. Computer History Museum. https://computerhistory.org/events/origins-impact-visicalc/Google Scholar
Computer History Museum. (2021). Timeline of computer history: Software & languages. Computer History Museum. www.computerhistory.org/timeline/software-languages/Google Scholar
Conway, P. (2010). Modes of seeing: Digitized photographic archives and the experienced user. American Archivist, 73(2), 425462. www.jstor.org/stable/23290754Google Scholar
Cook, J., Lewandowsky, S., & Ecker, U. K. H. (2017). Neutralizing misinformation through inoculation: Exposing misleading argumentation techniques reduces their influence. PloS one, 12(5), e0175799. https://doi.org/10.1371/journal.pone.0175799Google Scholar
Cook, T. (2009). CHR forum: The archive(s) is a foreign country: Historians, archivists, and the changing archival landscape. Canadian Historical Review, 90(3), 497534. https://doi.org/10.3138/chr.90.3.497Google Scholar
Cornelius, K. B. (2018). Standard form contracts and a smart contract future. Internet Policy Review, 7(2). https://doi.org/10.14763/2018.2.790Google Scholar
Cornelius, K. B. (2020). Smart contracts as evidence: Trust, records, and the future of decentralized transactions. In Hunsinger, J., Allen, M. M. & Klastrup, L. (Eds.), Second international handbook of internet research (pp. 627646). Springer. https://doi.org/10.1007/978-94-024-1555-1_28Google Scholar
Cosmides, L., & Tooby, J. (1992). Cognitive adaptations for social exchange. In Barkow, J. H., Tooby, J. & Cosmides, L. (Eds.), The adapted mind: Evolutionary psychology and the generation of culture (pp. 163228). Oxford University Press.Google Scholar
Cramer, M. (2020, January 18). National Archives apologizes for altering image of 2017 Women’s March. New York Times. www.nytimes.com/2020/01/18/us/national-archives-womens-march-images.htmlGoogle Scholar
Cukier, K., & Mayer-Schoenberger, V. (2013). The rise of big data: How it’s changing the way we think about the world. Foreign Affairs, 92(3), 2840. www.jstor.org/stable/23526834Google Scholar
Daian, P. (2016, June 18). Analysis of the DAO exploit. Hacking, Distributed. https://hackingdistributed.com/2016/06/18/analysis-of-the-dao-exploit/Google Scholar
Dale, K., Sunkavalli, K., Johnson, M. K., Vlasic, D., Matusik, W. & Pfister, H. (2011). Video face replacement. In Proceedings of ACM SIGGRAPH Asia 2011 Conference (SA ’11), Hong Kong, China, December 13–15, 2011 (Article 130). Association of Computing Machinery. https://doi.org/10.1145/2024156.2024164Google Scholar
Dalesio, E. (2012, March 14). NC county sues banks over mortgage robo-signing. Yahoo! News. https://news.yahoo.com/news/nc-county-sues-banks-over-212905726.htmlGoogle Scholar
Daniels, M. F, & Walch, T. (1984). A modern archives reader. National Archives and Records Service, US General Services Administration.Google Scholar
Das, D., & Dutta, A. (2020). Bitcoin’s energy consumption: Is it the Achilles heel to miner’s revenue? Economics Letters, 186. https://doi.org/10.1016/j.econlet.2019.108530Google Scholar
Dasgupta, P. (1988). Trust as a commodity. In Gambetta, D. (Ed.), Trust: Making and breaking cooperative relations (pp. 4972). Basil Blackwell.Google Scholar
Dasgupta, S. (2014). It began with Babbage: The genesis of computer science. Oxford University Press.Google Scholar
Dasgupta, S. (2016). Computer science: A very short introduction. Oxford University Press.Google Scholar
Decred. (n.d.). History. Decred. www.decred.org/historyGoogle Scholar
Decred. (2021, April 8). Decred’s proposal platform politeia: The decision-making force behind the ~$125 M Decred DAO. [Video]. YouTube. www.youtube.com/watch?v=dfpUgwXBUmMGoogle Scholar
De Filippi, P. F., & Wright, A. (2018). Blockchain and the law: The rule of code. Harvard University Press.Google Scholar
De Filippi, P. F., Mannan, M., & Reijers, W. (2020). Blockchain as a confidence machine: The problem of trust & challenges of governance. Technology in Society, 62. https://doi.org/10.1016/j.techsoc.2020.101284Google Scholar
Delmolino, K., Arnett, M., Kosba, A., Miller, A., & Shi, E. (2016). Step by step towards creating a safe smart contract: Lessons and insights from a cryptocurrency lab. In Clark, J., Meiklejohn, S., Ryan, P. Y. A., Wallach, D., Brenner, M. & Rohloff, K. (Eds.), Lecture notes in computer science, vol. 9604: FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised selected papers (pp. 7994). Springer. https://doi.org/10.1007/978-3-662-53357-4_6Google Scholar
Derakhshan, H., & Wardle, C. (2017). Information disorder: Definitions. In Understanding and addressing the disinformation ecosystem [Papers from the workshop held at the Annenberg School for Communication, December 15–16, 2017], (pp. 512). Annenberg School for Communication (University of Pennsylvania), First Draft, & Knight Foundation. https://firstdraftnews.org/wp-content/uploads/2018/03/The-Disinformation-Ecosystem-20180207-v4.pdf?x67996Google Scholar
Derrida, J. (1996). Archive fever: A Freudian impression. University of Chicago Press.Google Scholar
de Soto, H. (2000). The mystery of capital: Why capitalism triumphs in the West and fails everywhere else. Basic Books.Google Scholar
Deutch, J. (2020). Challenges in codifying events within large and diverse data sets of human rights documentation: Memory, intent, and bias. International Journal of Communication 14, 50555071. https://web.b.ebscohost.com/ehost/pdfviewer/pdfviewer?vid=0&sid=adf7998a-49eb-4c56-b683-aff7f3e7d317%40sessionmgr103Google Scholar
Deutsch, M., & Gerard, H. B. (1955). A study of normative and informational social influences upon individual judgment. Journal of Abnormal and Social Psychology, 51(3), 629636. https://doi.org/10.1037/h0046408Google Scholar
de Vries, A. (2018). Bitcoin’s growing energy problem. Joule, 2(5), 801805. https://doi.org/10.1016/j.joule.2018.04.016Google Scholar
Diffie, W. (1988). The first ten years of public-key cryptography. Proceedings of the IEEE, 76(5), 560577. https://doi.org/10.1109/5.4442Google Scholar
Digiconomist. (2021). Bitcoin energy consumption index. Digiconomist. https://digiconomist.net/bitcoin-energy-consumptionGoogle Scholar
Digital Currency Initiative. (n.d.). Bitcoin Core development. MIT Media Lab. https://dci.mit.edu/bitcoin-core-developmentGoogle Scholar
Directorate-General for Communication Networks, Content and Technology. (2018). A multi-dimensional approach to disinformation: Report of the independent high level group on fake news and online disinformation. European Commission. http://ec.europa.eu/newsroom/dae/document.cfm?doc_id=50271Google Scholar
DiResta, R. (2019, December 30). Year in review: “Journalists need to recognise they are a target of influence operations.” First Draft. https://firstdraftnews.org/latest/year-in-review-journalists-need-to-recognise-they-are-a-target-of-influence-operations/Google Scholar
DiResta, R. (2020, July 31). AI-generated text is the scariest deepfake of all. Wired. www.wired.com/story/ai-generated-text-is-the-scariest-deepfake-of-all/Google Scholar
Dixit, A., & Norta, A. (2018). A self-aware contract for decentralized peer-to-peer (P2P) commerce. In Proceedings: 2018 IEEE 3rd International Workshops on Foundations and Applications of Self* Systems (FAS* W), Trento, Italy, September 3–7, 2018 (pp. 1719). IEEE. https://doi.org/10.1109/FAS-W.2018.00018Google Scholar
Donaldson, D. R. (2019). Trust in archives – Trust in digital archival content framework. Archivaria, 88, 5083. https://archivaria.ca/index.php/archivaria/article/view/13697Google Scholar
Donaldson, D. R., & Bell, L. (2019). Security, archivists, and digital collections. Journal of Archival Organization, 15(1–2), 119. https://doi.org/10.1080/15332748.2019.1609311Google Scholar
Dooley, J. F. (2018). History of cryptography and cryptanalysis: Codes, Ciphers, and their algorithms. Springer.Google Scholar
Dotan, J. (2021, June 10). Trustless truth: How private and public ledgers can take on misinformation and win [Keynote presentation]. Hyperledger Global Forum 2021, Virtual. www.youtube.com/watch?v=w1r3Fsjaw0sGoogle Scholar
Dretske, F. I. (1982). A cognitive cul-de-sac. Mind, 91(361), 109111. www.jstor.org/stable/i313351Google Scholar
Du, M., Chen, Q., Chen, J., & Ma, X. (2020). An optimized consortium blockchain for medical information sharing. IEEE Transactions on Engineering Management (early access). https://doi.org/10.1109/TEM.2020.2966832Google Scholar
Duddu, V. (2018). A survey of adversarial machine learning in cyber warfare. Defence Science Journal, 68(4), 356366. https://doi.org/10.14429/dsj.68.12371Google Scholar
Dunn, J. (1988). Trust and political agency. In Gambetta, D. (Ed.), Trust: Making and breaking cooperative relations (pp. 7393). Basil Blackwell.Google Scholar
Dupont, Q. (2019). Cryptocurrencies and blockchains. Polity Press.Google Scholar
Duranti, L. (1989). The odyssey of records managers. Part II: From the Middle Ages to modern times. Records Management Quarterly, 23(4), 310.Google Scholar
Duranti, L. (1995). Reliability and authenticity: The concepts and their implications. Archivaria, 39, 510. https://archivaria.ca/index.php/archivaria/article/view/12063/13035Google Scholar
Duranti, L. (1996). Archives as place. Archives and Manuscripts, 24(2), 242255. https://publications.archivists.org.au/index.php/asa/article/view/8579Google Scholar
Duranti, L. (1998). Diplomatics: New uses for an old science. Scarecrow Press.Google Scholar
Duranti, L. (1999). Concepts and principles for the management of electronic records, or records management theory is archival diplomatics. Records Management Journal, 9(3), 149171. https://doi.org/10.1108/EUM0000000007248Google Scholar
Duranti, L. (2009). From digital diplomatics to digital records forensics. Archivaria, 68, 3966. https://archivaria.ca/index.php/archivaria/article/view/13229Google Scholar
Duranti, L. (2018). Whose truth? Records and archives as evidence in the era of post-truth and disinformation. In Brown, C. (Ed.), Archival futures (pp. 1932). Facet.Google Scholar
Duranti, L., & Michetti, G. (2016). The archival method. In Gilliland, A., McKemmish, S. & Lau, A. J. (Eds.), Research in the archival multiverse (pp. 7595). Monash University Publishing.Google Scholar
Duranti, L., & Preston, R. (Eds.) (2008). International research on permanent authentic records in electronic systems (InterPARES) 2: Experiential, interactive and dynamic records. Associazione Nazionale Archivistica Italiana. www.interpares.org/ip2/display_file.cfm?doc=ip2_book_complete.pdfGoogle Scholar
Duranti, L., & Rogers, C. (2012). Trust in digital records: An increasingly cloudy legal area. Computer Law & Security Review, 28(5), 522531. https://doi.org/10.1016/j.clsr.2012.07.009Google Scholar
Duranti, L., & Rogers, C. (2019). Trusting records in the cloud. Facet Publishing.Google Scholar
Duranti, L., & Thibodeau, K. (2006). The concept of record in interactive, experiential and dynamic environments: The view of InterPARES. Archival Science, 6(1), 1368. https://doi.org/10.1007/s10502-006-9021-7Google Scholar
Dutton, W. H., Reisdorf, B., Dubois, E., & Blank, G. (2017). Social shaping of the politics of internet search and networking: Moving beyond filter bubbles, echo chambers, and fake news (Working Paper No. 2944191). Quello Center. http://dx.doi.org/10.2139/ssrn.2944191Google Scholar
Dwyer, C. (2017, February 3). Is blockchain a “future of work gamechanger”? CPO Rising. https://cporising.com/2017/02/03/is-blockchain-a-future-of-work-gamechanger-2/Google Scholar
Economist. (2015a, October 31). Blockchains: The great chain of being sure about things. Economist, (417), 2124. www.economist.com/briefing/2015/10/31/the-great-chain-of-being-sure-about-thingsGoogle Scholar
Economist. (2015b, October 31). The promise of the blockchain: The trust machine. Economist, (417), 13. www.economist.com/leaders/2015/10/31/the-trust-machineGoogle Scholar
Economist. (2017, May 6). The world’s most valuable resource is no longer oil, but data. Economist. www.economist.com/leaders/2017/05/06/the-worlds-most-valuable-resource-is-no-longer-oil-but-dataGoogle Scholar
Edelman. (2015). 2015 Edelman trust barometer: Executive summary. www.edelman.com/trust/2015-trust-barometerGoogle Scholar
Edelman. (2016). 2016 Edelman trust barometer: Executive summary. www.edelman.com/trust/2016-trust-barometerGoogle Scholar
Edelman. (2017). 2017 Edelman trust barometer. www.edelman.com/trust/2017-trust-barometerGoogle Scholar
Edelman. (2020). 2020 Edelman trust barometer. www.edelman.com/trust/2020-trust-barometerGoogle Scholar
Edwards, M. (2015, April 20). The trust deficit – concepts and causes of low public trust in governments (E/C.16/2015/CRP.3/Rev.1) [Paper presentation]. 14th Session of the United Nations Committee of Experts on Public Administration, New York. https://publicadministration.un.org/en/cepa/session14Google Scholar
Elga, A. (2007). Reflection and disagreement. Noûs, 41(3), 478502. https://doi.org/10.1111/j.1468-0068.2007.00656.xGoogle Scholar
Elghawaby, A. (2018, August 2). Social media’s self-regulation isn’t enough. Centre for International Governance Innovation. www.cigionline.org/articles/social-medias-self-regulation-isnt-enoughGoogle Scholar
EMA [European Medicines Agency]. (2021, January 25). Cyberattack on EMA – update 6. www.ema.europa.eu/en/news/cyberattack-ema-update-6Google Scholar
Enders, A. M., Uscinski, J. E., Klofstad, C., & Stoler, J. (2020). The different forms of COVID-19 misinformation and their consequences. Harvard Kennedy School (HKS) Misinformation Review. https://doi.org/10.37016/mr-2020-48Google Scholar
Eppard, P. (2008). Appendix 20: Creator guidelines: Making and maintaining digital materials: Guidelines for individuals. In Duranti, L. & Preston, R. (Eds.), International research on permanent authentic records in electronic systems (InterPARES) 2: Experiential, interactive and dynamic records (pp. 684697). Associazione Nazionale Archivistica Italiana. www.interpares.org/ip2/display_file.cfm?doc=ip2_book_appendix_20.pdfGoogle Scholar
Eskandari, S., Clark, J., Barrera, D., & Stobert, E. (2015, February 7). A first look at the usability of bitcoin key management [Paper presentation]. 2015 Network and Distributed System Security (NDSS) Symposium, San Diego, CA, United States. www.ndss-symposium.org/wp-content/uploads/2017/09/05_3_3.pdfGoogle Scholar
Espinal, R., Hartlyn, J., & Kelly, J. M. (2006). Performance still matters: Explaining trust in government in the Dominican Republic. Comparative Political Studies, 39(2), 200223. https://doi.org/10.1177/0010414005281933Google Scholar
Ess, C. M. (2020). Trust and information communications technologies. In Simon, J. (Ed.), The Routledge handbook of trust and philosophy. Routledge.Google Scholar
Ethereum. (2021a). Glossary. Ethereum. https://ethereum.org/en/glossaryGoogle Scholar
Ethereum. (2021b, March 12). ERC 721 Non-fungible token standard. Ethereum. https://ethereum.org/en/developers/docs/standards/tokens/erc-721Google Scholar
Ethos.dev. (2020, May 23). The Beacon Chain Ethereum 2.0 explainer you need to read first. ethos.dev. https://ethos.dev/beacon-chainGoogle Scholar
European Commission (2018, March). A multi-dimensional approach to disinformation: Report of the independent high level group on fake news and online disinformation. European Union. https://op.europa.eu/en/publication-detail/-/publication/6ef4df8b-4cea-11e8-be1d-01aa75ed71a1/language-enGoogle Scholar
Eyal, I., & Sirer, E. G. (2014). Majority is not enough: Bitcoin mining is vulnerable. In Christin, N. & Safavi-Naini, R. (Eds.), Lecture notes in computer science, vol. 8437: Financial Cryptography and Data Security: 18th International Conference, FC2014, Christ Church, Barbados, March 3–7, 2014, revised selected papers (pp. 436454). Springer.Google Scholar
Faller, M. T. (2002). Semantics and pragmatics of evidentials in Cuzco Quechua [Doctoral dissertation, Stanford University].Google Scholar
Fallis, D. (2006). Social epistemology and information science. Annual Review of Information Science and Technology, 40(1), 475519. https://doi.org/10.1002/aris.1440400119Google Scholar
Faulkner, P. (2007a). A genealogy of trust. Episteme, 4(3), 305321. https://doi.org/10.3366/E174236000700010XGoogle Scholar
Faulkner, P. (2007b). On telling and trusting. Mind, 116(464), 875902. https://doi.org/10.1093/mind/fzm875Google Scholar
FBI. (2019). 2019 Internet crime report. Federal Bureau of Investigation. https://ic3pdfs.blob.core.usgovcloudapi.net/docs/2019_IC3Report.pdfGoogle Scholar
Federal Republic of Germany. (2017, September 1). Gesetz zur Verbesserung der Rechtsdurchsetzung in sozialen Netzwerken (Netzwerksdurchsetzungsgesetz –NetzDG). Bundesgesetzblatt [BGBl.] [Federal Law Gazette] I at 3352. https://perma.cc/4LPN-WS7Z (original), http://perma.cc/J86H-GTY4 (unofficial English translation).Google Scholar
Federal Trade Commission. (2019). Consumer information: How to recognize and avoid phishing scams. www.consumer.ftc.gov/articles/how-recognize-and-avoid-phishing-scamsGoogle Scholar
Feldman, R. (2006). Epistemological puzzles about disagreement. In Hetherington, S. (Ed.), Epistemic futures (pp. 216236). Oxford University Press.Google Scholar
Feldman, R. (2007). Reasonable religious disagreement. In Antony, L. (Ed.), Philosophers without gods: Meditations on atheism and the secular life (pp. 194214). Oxford University Press.Google Scholar
Ferguson, M. C. (1960–1). A day in court in Justinian’s Rome: Some problems of evidence, proof, and justice in Roman law. Iowa Law Review, 46.Google Scholar
Fernández-Caramès, T. M., & Fraga-Lamas, P. (2020). Towards post-quantum blockchain: A review on blockchain cryptography resistant to quantum computing attacks. IEEE Access, 8, 2109121116. https://doi.org/10.1109/ACCESS.2020.2968985Google Scholar
Ferrara, E., Varol, O., Davis, C., Menczer, F., & Flammini, A. (2016). The rise of social bots. Communications of the ACM, 59(7), 96104. https://doi.org/10.1145/2818717Google Scholar
Filippova, E., Scharl, A., & Filippov, P. (2019). Blockchain: An empirical investigation of its scope for improvement. In Joshi, J., Nepal, S., Zhang, Q. & Zhang, L. J.. (Eds.), Lecture notes in computer science, vol. 11521: Blockchain – ICBC 2019: Second international conference, held as part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25–30, 2019, proceedings (pp. 117). Springer.Google Scholar
Finck, M. (2018). Blockchains and data protection in the European Union. European Data Protection Law Review, 4(1), 1735. https://doi.org/10.21552/edpl/2018/1/6Google Scholar
Finney, H. (2008, November 8). Bitcoin P2P e-cash paper. Cryptography Mailing List. https://satoshi.nakamotoinstitute.org/emails/cryptography/6Google Scholar
Fiorina, M. P. (1978). Economic retrospective voting in American national elections: A micro-analysis. American Journal of Political Science, 22(2), 426443. https://doi.org/10.2307/2110623Google Scholar
Fisher, M., Cox, J. W., & Hermann, P. (2016, December 6). Pizzagate: From rumor, to hashtag, to gunfire in DC. Washington Post. www.washingtonpost.com/local/pizzagate-from-rumor-to-hashtag-to-gunfire-in-dc/2016/12/06/4c7def50-bbd4-11e6-94ac-3d324840106c_story.htmlGoogle Scholar
Flores, D., Lacombe, C., & Lemieux, V. (2018). Real estate transaction recording in the blockchain in Brazil (RCPLAC-01 Case study 1). https://blogs.ubc.ca/recordsinthechain/2018/01/26/real-estate-transaction-recording-in-the-blockchain-in-brazil/Google Scholar
Flynn, L. R., Goldsmith, R. E., & Eastman, J. K. (1996). Opinion leaders and opinion seekers: Two new measurement scales. Journal of the Academy of Marketing Science, 24(2), 137147. https://doi.org/10.1177/0092070396242004Google Scholar
Force, D. C. (2010). From Peruvian guano to electronic records: Canadian e-discovery and records professionals. Archivaria, 69, 4975. https://archivaria.ca/index.php/archivaria/article/view/13261Google Scholar
Foucault, M. (1973). The order of things: An archaeology of the human sciences. Vintage.Google Scholar
Foucault, M. (1980). Power/knowledge: Selected interviews and other writings, 1972–1977. Vintage.Google Scholar
Frenda, S. J., Knowles, E. D., Saletan, W., & Loftus, E. F. (2013). False memories of fabricated political events. Journal of Experimental Social Psychology, 49(2), 280286. https://doi.org/10.1016/j.jesp.2012.10.013Google Scholar
Froehlich, T. J. (2020). Ten lessons for the age of disinformation. In Dalkir, K & Katz, R (Eds.), Navigating fake news, alternative facts, and misinformation in a post-truth world (pp. 3688). IGI Global.Google Scholar
Fukuyama, F. (1995). Trust: The social virtues and the creation of prosperity. Free Press.Google Scholar
Gambetta, D. (Ed.) (1988). Trust: Making and breaking cooperative relations. Basil Blackwell.Google Scholar
Gani, Y., & Aşkaroğlu, M. M. (2019). A voting application which provides data security via blockchain technology. In Proceedings of the 2019 4th International Conference on Computer Science and Engineering (UBMK), Samsun, Turkey, September 11–15, 2019 (pp. 773777). IEEE. https://doi.org/10.1109/UBMK.2019.8907111Google Scholar
Gao, X., Clark, G. D., & Lindqvist, J. (2016). Of two minds, multiple addresses, and one ledger: Characterizing opinions, knowledge, and perceptions of Bitcoin across users and non-users. In Proceedings of the 34th Annual CHI Conference on Human Factors in Computing Systems, CHI’16, San Jose, CA, USA, May 7–12, 2016 (pp. 16561668). Association for Computing Machinery.Google Scholar
Garfinkel, H. (Ed.). (2017). Routledge revivals: Ethnomethodological studies of work. Routledge. Original work published in 1986.Google Scholar
Gerard, D. (2017). Attack of the 50 foot blockchain: Bitcoin, blockchain, Ethereum & smart contracts. David Gerard.Google Scholar
Gettier, E. L. (1963). Is justified true belief knowledge? Analysis, 23(6), 121123. https://doi.org/10.1093/analys/23.6.121Google Scholar
Ghanem, B., Rosso, P., & Rangel, F. (2020). An emotional analysis of false information in social media and news articles. ACM Transactions on Internet Technology, 20(2). https://doi.org/10.1145/3381750Google Scholar
Giddens, A. (1990). The consequences of modernity. Stanford University Press.Google Scholar
Gilliland, A. J., McKemmish, S., & Lau, A. J. (Eds.) (2016). Research in the archival multiverse. Monash University Publishing.Google Scholar
Gingras, R. (2016, October 13). Labeling fact-check articles in Google News. Google: The Keyword. https://blog.google/outreach-initiatives/google-news-initiative/labeling-fact-check-articles-google-newsGoogle Scholar
Goldman, A. I. (1986). Epistemology and cognition. Harvard University Press.Google Scholar
Goldman, A. I. (1999). Knowledge in a social world. Clarendon Press.Google Scholar
Goldman, A. & Beddor, B. (2016). Reliabilist epistemology. In Zalta, E. N. (Ed.), The Stanford encyclopedia of philosophy (Winter ed.). Stanford University. https://plato.stanford.edu/archives/win2016/entries/reliabilismGoogle Scholar
Goldman, A., & O’Connor, C. (2021). Social epistemology. In Zalta, E. N. (Ed.), The Stanford encyclopedia of philosophy (Spring ed.). Stanford University. https://plato.stanford.edu/archives/spr2021/entries/epistemology-socialGoogle Scholar
Goldthorpe, J. H. (1991). The uses of history in sociology: Reflections on some recent tendencies. British Journal of Sociology, 42(2), 211230. https://doi.org/10.2307/590368Google Scholar
Goldwasser, S., Micali, S., & Rackoff, C. (1989). The knowledge complexity of interactive proof systems. SIAM Journal on Computing, 18(1), 186208. https://doi.org/10.1137/0218012Google Scholar
Golumbia, D. (2016). The politics of Bitcoin: Software as right-wing extremism. University of Minnesota Press.Google Scholar
Goodyear, S. (2021, January 15). This man owns $321 M in bitcoin – but he can’t access it because he lost his password. CBC Radio: As It Happens. www.cbc.ca/radio/asithappens/as-it-happens-friday-edition-1.5875363/this-man-owns-321m-in-bitcoin-but-he-can-t-access-it-because-he-lost-his-password-1.5875366Google Scholar
Gorwa, R. (2019). What is platform governance? Information, Communication & Society, 22(6), 854871. https://doi.org/10.1080/1369118X.2019.1573914Google Scholar
Graham, P., & Bachman, Z. (2019). Counterexamples to testimonial transmission. In Fricker, M., Graham, P. J., Henderson, D., & Pedersen, N. J. L. L. (Eds.), The Routledge handbook of social epistemology (pp. 6178). Routledge.Google Scholar
Graves, L., & Cherubini, F. (2016). The rise of fact-checking sites in Europe. Reuters Institute.Google Scholar
Green, A., Bell, M., Sheridan, J., Collomosse, J. P., Bui, T., Brown, A., Fawcett, J., Thereaux, O., & Tennison, J. (2018). Using blockchain to engender trust in public digital archives. In Proceedings of iPRES 2018, 15th International Conference on Digital Preservation, Boston, MA, USA, September 24–28, 2018. iPRES. https://osf.io/kefj8Google Scholar
Greenspan, G. (2015, November 2). Smart contracts: The good, the bad and the lazy. Multichain. www.multichain.com/blog/2015/11/smart-contracts-good-bad-lazyGoogle Scholar
Greenspan, G. (2017, May 9). The Blockchain immutability myth. Coindesk. www.coindesk.com/blockchain-immutability-mythGoogle Scholar
Gregor, S. (2006). The nature of theory in information systems. MIS Quarterly, 30(3), 611642. https://aisel.aisnet.org/misq/vol30/iss3/5/Google Scholar
Grönlund, Å., & Horan, T. A. (2005). Introducing e-gov: history, definitions, and issues. Communications of the Association for Information Systems, 15(1). https://doi.org/10.17705/1CAIS.01539Google Scholar
Guess, A. M., Lerner, M., Lyons, B., Montgomery, J. M., Nyhan, B., Reifler, J., & Sircar, N. (2020). A digital media literacy intervention increases discernment between mainstream and false news in the United States and India. Proceedings of the National Academy of Sciences, 117(27), 1553615545. https://doi.org/10.1073/pnas.1920498117Google Scholar
Habermas, J., McCarthy, T., & McCarthy, T. (1984). The theory of communicative action, vol. 1. Beacon Press.Google Scholar
Haley, M. S. (2020, March 16). Arweave’s permanent “library of Alexandria” on blockchain to halt censorship, empower information. Forbes. www.forbes.com/sites/michaelhaley/2020/03/16/arweaves-permanent-library-of-alexandria-on-blockchain-to-halt-censorship-empower-information/Google Scholar
Hamouda, H., Bushey, J., Lemieux, V., Stewart, J., Rogers, C., Cameron, J., Thibodeau, K., & Feng, C. (2019). Extending the scope of computational archival science: A case study on leveraging archival and engineering approaches to develop a framework to detect and prevent “fake video.” In 2019 IEEE International Conference on Big Data (Big Data), Los Angeles, CA, USA, 2019 (pp. 30873097). IEEE. https://doi.org/10.1109/BigData47090.2019.9006170Google Scholar
Hannam, K. (2017). This emerging tech company has put Asia’s tuna on the blockchain. Forbes. www.forbes.com/sites/keshiahannam/2016/09/30/this-emerging-tech-company-has-put-asias-tuna-on-the-blockchainGoogle Scholar
Hardin, R. (2002). Trust and trustworthiness. Russell Sage Foundation.Google Scholar
Hardwig, J. (1991). The role of trust in knowledge. Journal of Philosophy, 88(12), 693708. https://doi.org/10.2307/2027007Google Scholar
Harsin, J. (2018a). A critical guide to fake news: From comedy to tragedy. Pouvoirs, 164(1), 99119. https://doi.org/10.3917/pouv.164.0099Google Scholar
Harsin, J. (2018b). Post-truth and critical communication studies. In Oxford research encyclopedia of communication. Oxford University Press. https://doi.org/10.1093/acrefore/9780190228613.013.757Google Scholar
Harsin, J. (2019). Post-truth and critical communication. In Cloud, D. L. (Ed.), The Oxford encyclopedia of communication and critical cultural studies. Oxford University Press. https://doi.org/10.1093/acref/9780190459611.001.0001Google Scholar
Harwell, D. (2019, June 13). Scramble is on to detect, stop “deepfake” videos. Washington Post.Google Scholar
Hasher, L., Goldstein, D., & Toppino, T. (1977). Frequency and the conference of referential validity. Journal of Verbal Learning and Verbal Behavior, 16(1), 107112. https://doi.org/10.1016/S0022-5371(77)80012-1Google Scholar
Hayes, P. J. (2011). Bollandists. In Kurian, G. T. (Ed.), The encyclopedia of Christian civilization. Wiley Online. https://doi.org/10.1002/9780470670606.wbecc0173Google Scholar
Hazlett, A. (2015). The maturation of the Gettier problem. Philosophical Studies, 172(1), 16. https://doi.org/10.1007/s11098-014-0385-xGoogle Scholar
Hearn, M. (2015a, August 15). Why is Bitcoin forking? Medium. https://medium.com/faith-and-future/why-is-bitcoin-forking-d647312d22c1Google Scholar
Hearn, M. (2015b, August 27). An XT FAQ. Medium. https://medium.com/@octskyward/an-xt-faq-38e78aa32ff0Google Scholar
Hearn, M. (2016, January 14). The resolution of the Bitcoin experiment. Mike’s Blog. https://blog.plan99.net/the-resolution-of-the-bitcoin-experiment-dabb30201f7#.fn9ngkl1pGoogle Scholar
Hearn, M. (2020, December 12). The philosophical origins of Bitcoin’s civil war. Mike’s Blog. https://blog.plan99.net/the-philosophical-origins-of-bitcoins-civil-war-400468335377Google Scholar
Heeks, R. (1998). Information systems and public sector accountability (Information Systems for Public Sector Management Working Paper no. 1). Institute for Development Policy and Management. https://dx.doi.org/10.2139/ssrn.3540081Google Scholar
Heeks, R. (2006). Implementing and managing eGovernment: An international text. Sage.Google Scholar
Heintze, T., & Bretschneider, S. (2000). Information technology and restructuring in public organizations: Does adoption of information technology affect organizational structures, communications, and decision making? Journal of Public Administration Research and Theory, 10(4), 801830. https://doi.org/10.1093/oxfordjournals.jpart.a024292Google Scholar
Heintzman, R. (2007, May 14). Toward a new moral contract: Reclaiming trust in public service [Lecture]. The Vanier Lecture, Regina, SK, Canada.Google Scholar
Held, V. (1984). Rights and goods: Justifying social action. Free Press, Collier Macmillan.Google Scholar
Henderson, M. T., & Churi, S. (2019). The trust revolution: How the digitization of trust will revolutionize business and government. Cambridge University Press.Google Scholar
Herlihy, M. (2018). Atomic cross-chain swaps. In PODC ’18: Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing, Egham, United Kingdom, July 23–27, 2018 (pp. 245254). Association for Computing Machinery. https://doi.org/10.1145/3212734.3212736Google Scholar
Hermida, A. (2013). #Journalism: Reconfiguring journalism research about Twitter, one tweet at a time. Digital Journalism, 1(3), 295313. https://doi.org/10.1080/21670811.2013.808456Google Scholar
Hern, A. (2016, July 7). Blockchain: The answer to life, the universe and everything? Guardian. www.theguardian.com/world/2016/jul/07/blockchain-answer-life-universe-everything-bitcoin-technologyGoogle Scholar
Hetherington, M. J. (2005). Why trust matters: Declining political trust and the demise of American liberalism. Princeton University Press.Google Scholar
Hetherington, M. J., & Rudolph, T. J. (2008). Priming, performance, and the dynamics of political trust. Journal of Politics, 70(2), 498512. https://doi.org/10.1017/S0022381608080468Google Scholar
Hevner, A. R., & Berndt, D. J. (2000). Eras of business computing. Advances in Computers, 52, 190. https://doi.org/10.1016/S0065-2458(00)80016-9Google Scholar
Hey, J. (2004). The data, information, knowledge, wisdom chain: The metaphorical link. In Ocean teacher: A training system for ocean data and information management. Intergovernmental Oceanographic Commission. www.dataschemata.com/uploads/7/4/8/7/7487334/dikwchain.pdfGoogle Scholar
Hiatt, A. (2004). The making of medieval forgeries: False documents in fifteenth-century England. University of Toronto Press.Google Scholar
Hieronymi, P. (2008). The reasons of trust. Australasian Journal of Philosophy, 86(2), 213236. https://doi.org/10.1080/00048400801886496Google Scholar
Higgins, S. (2014, November 19). Factom outlines record-keeping network that utilises Bitcoin’s blockchain. Coindesk. www.coindesk.com/factom-white-paper-outlines-record-keeping-layer-bitcoinGoogle Scholar
Hill Collins, P. (2015). Black feminist thought: Knowledge, consciousness, and the politics of empowerment (2nd ed.). Routledge.Google Scholar
Hinchman, E. S. (2005). Telling as inviting to trust. Philosophy and Phenomenological Research, 70(3), 562587. https://doi.org/10.1111/j.1933-1592.2005.tb00415.xGoogle Scholar
Hirsch, D. D. (2013). The glass house effect: Big data, the new oil, and the power of analogy. Maine Law Review, 66(2), article 3. https://digitalcommons.mainelaw.maine.edu/mlr/vol66/iss2/3Google Scholar
Hirschman, A. O. (1978). Exit, voice, and the state. World Politics, 31(1), 90107. https://doi.org/10.2307/2009968Google Scholar
Hoffman, R. (2014, November 17). The future of the Bitcoin ecosystem and “trustless trust” – Why I invested in Blockstream. LinkedIn. www.linkedin.com/pulse/20141117154558–1213-the-future-of-the-bitcoin-ecosystem-and-trustless-trust-why-i-invested-in-blockstreamGoogle Scholar
Hofman, D., Lemieux, V. L., Joo, A., & Batista, D. A. (2019). “The margin between the edge of the world and infinite possibility”: Blockchain, GDPR and information governance. Records Management Journal, 29(1/2), 249257. https://doi.org/10.1108/RMJ-12-2018-0045Google Scholar
Horsburgh, H. J. N. (1961). Trust and social objectives. Ethics, 72(1), 2840. https://doi.org/10.1086/291373Google Scholar
Huguet, A., Baker, G., Hamilton, L. S., & Pane, J. F. (2021). Media literacy standards to counter truth decay (RR-A112-12). RAND Corporation. https://doi.org/10.7249/RRA112-12Google Scholar
Hui, Y. (2012). What is a digital object? Metaphilosophy, 43(4), 380395. https://doi.org/10.1111/j.1467-9973.2012.01761.xGoogle Scholar
Humphreys, R. (2021, January 19) Is bitcoin a scam? [Audio podcast episode]. Guardian. www.theguardian.com/news/audio/2021/jan/19/is-bitcoin-a-scamGoogle Scholar
Husain, S. O., Franklin, A., & Roep, D. (2020). The political imaginaries of blockchain projects: Discerning the expressions of an emerging ecosystem. Sustainability Science, 15, 379394. https://doi.org/10.1007/s11625-020-00786-xGoogle Scholar
Husserl, E. (1970). The crisis of European sciences and transcendental phenomenology: An introduction to phenomenological philosophy (D. Carr, Trans.). Northwestern University Press. Original work published in 1954.Google Scholar
Hyperledger. (2019). Hyperledger membership overview: January 2019. Hyperledger. www.hyperledger.org/wp-content/uploads/2019/01/Membership-Benefits.pdfGoogle Scholar
Hyperledger / fabric-rfcs. (2021). In GitHub. https://github.com/hyperledger/fabric-rfcsGoogle Scholar
IBM. (n.d.). IBM Food Trust: A new era for the world’s food supply. IBM. www.ibm.com/blockchain/solutions/food-trustGoogle Scholar
IBM. (2019). About IBM Food Trust. IBM. www.ibm.com/downloads/cas/8QABQBDRGoogle Scholar
Ijiri, Y. (1975). Theory of accounting measurement: Studies in accounting research # 10. American Accounting Association.Google Scholar
Imbert, F. (2017, September 12). JP Morgan CEO Jamie Dimon says bitcoin is a “fraud” that will eventually blow up. CNBC. www.cnbc.com/2017/09/12/jpmorgan-ceo-jamie-dimon-raises-flag-on-trading-revenue-sees-20-percent-fall-for-the-third-quarter.htmlGoogle Scholar
Internet Archive. (n.d.). Wayback machine. Internet Archive. https://archive.orgGoogle Scholar
InterPARES 2 Project. (2021a). Document. In The InterPARES 2 project glossary. www.interpares.org/ip2/display_file.cfm?doc=ip2_glossary.pdfGoogle Scholar
InterPARES 2 Project. (2021b). The InterPARES 2 project glossary. www.interpares.org/ip2/display_file.cfm?doc=ip2_glossary.pdfGoogle Scholar
InterPARES 2 Project. (2021c). Juridical system. In The InterPARES 2 project glossary. www.interpares.org/ip2/display_file.cfm?doc=ip2_glossary.pdfGoogle Scholar
InterPARES 2 Project, Terminology Cross-domain Task Force. (2008). Ontology C: Trustworthiness of a record. In Duranti, L. & Preston, R (Eds.), International research on permanent authentic records in electronic systems (InterPARES) 2: Experiential, interactive and dynamic records (p. 731). Associazione Nazionale Archivistica Italiana. www.interpares.org/ip2/display_file.cfm?doc=ip2_ontology_c.pdfGoogle Scholar
Ireton, C., & Posetti, J. (Eds.) (2018). Journalism, fake news and disinformation. Handbook for journalism education and training. UNESCO. https://en.unesco.org/sites/default/files/journalism_fake_news_disinformation_print_friendly_0.pdfGoogle Scholar
ISO [International Organization for Standardization]. (2016). Information and documentation – Records management – Part I: Concepts and principles. (ISO Standard No. 15489: 2016). www.iso.org/standard/62542.htmlGoogle Scholar
ISO [International Organization for Standardization]. (2017). Electronic fee collection – Guidelines for security protection profiles. (ISO Standard No. 17574:2017). www.iso.org/standard/70051.htmlGoogle Scholar
ISO [International Organization for Standardization]. (2018a). Information technology – Security techniques – Information security management systems – Overview and vocabulary. (ISO Standard No. 27000:2018). www.iso.org/standard/73906.htmlGoogle Scholar
ISO [International Organization for Standardization]. (2018b). Risk management – Guidelines. (ISO Standard No. 31000:2018). www.iso.org/standard/65694.htmlGoogle Scholar
ISO [International Organization for Standardization]. (2020a). Blockchain and distributed ledger technologies – Vocabulary. (ISO Standard No. 22739:2020). www.iso.org/standard/73771.htmlGoogle Scholar
ISO [International Organization for Standardization]. (2020b). Information and documentation – Records management – Core concepts & vocabulary. (ISO Standard No. 30300:2020). www.iso.org/standard/74291.htmlGoogle Scholar
ISO [International Organization for Standardization]. (2021). Blockchain and distributed ledger technologies – Reference architecture. (ISO Standard No. 23257:2021 [under development]). www.iso.org/standard/75093.htmlGoogle Scholar
ITV News (2014, February 26). 30 facts for 30 years – The truth about “Spitting Image.” ITV News. www.itv.com/news/central/2014–02–26/30-facts-for-30-years-the-truth-about-spitting-imageGoogle Scholar
Jamieson, K. H., & Cappella, J. N. (2008). Echo chamber: Rush Limbaugh and the conservative media establishment. Oxford University Press.Google Scholar
Jeffries, A. (2018, March 7). “Blockchain” is meaningless. The Verge. www.theverge.com/2018/3/7/17091766/blockchain-bitcoin-ethereum-cryptocurrency-meaningGoogle Scholar
Jenkinson, H. (1922). A manual of archive administration including the problems of war archives and archive making, vol. 4. Clarendon Press.Google Scholar
Jenkinson, H. (1937). A manual of archive administration. (New and revised edition.) P. Lund, Humphries.Google Scholar
Jenkinson, H. (1944). Reflections of an archivist. Contemporary Review, 165, 355361.Google Scholar
Jo, E. S., & Gebru, T. (2020). Lessons from archives: Strategies for collecting sociocultural data in machine learning. In FAT* ’20: Proceedings of the 2020 Conference on Fairness, Accountability, and Transparency, Barcelona, Spain, January 27–30, 2020 (pp. 306316). Association for Computing machinery. https://doi.org/10.1145/3351095.3372829Google Scholar
Job, J. (2005). How is trust in government created? It begins at home, but ends in the parliament. Australian Review of Public Affairs, 6(1), 123. www.australianreview.net/journal/v6/n1/job.htmlGoogle Scholar
Johnson, J. (2019, October 25). The Filipino anti-false content bill: Fake news and free expression. Oxford Human Rights Hub. https://ohrh.law.ox.ac.uk/the-filipino-anti-false-content-bill-fake-news-and-free-expressionGoogle Scholar
Jones, K. (1996). Trust as an affective attitude. Ethics, 107(1), 425. https://doi.org/10.1086/233694Google Scholar
Kahneman, D. (2011). Thinking fast and slow. Farrar, Strauss & Giroux.Google Scholar
Kaminska, I. (2017). A module in fake news from the info-wars of ancient Rome. Financial Times. www.ft.com/content/aaf2bb08-dca2-11e6-86ac-f253db7791c6Google Scholar
Kandel, S., Paepcke, A., Hellerstein, J. M., & Heer, J. (2012). Enterprise data analysis and visualization: An interview study. IEEE Transactions on Visualization and Computer Graphics, 18(12), 29172926. https://doi.org/10.1109/TVCG.2012.219Google Scholar
Kandukuri, B. R., Paturi, V. R., & Rakshit, A. (2009). Cloud security issues. In 2009 IEEE International Conference on Services Computing, Bangalore, India, September 21–25, 2009 (pp. 517520). IEEE. https://doi.org/10.1109/SCC.2009.84Google Scholar
Kapantai, E., Christopoulou, A., Berberidis, C., & Peristeras, V. (2020). A systematic literature review on disinformation: Toward a unified taxonomical framework. New Media & Society, 23(5), 13011326. https://doi.org/10.1177/1461444820959296Google Scholar
Karataş, A., & Şahin, S. (2017). A review on social bot detection techniques and research directions. In Sağıroğlu, Ş, Alkan, M., & Akleylek, S. (Eds). Proceedings of the 10th International Conference on Information Security & Cryptology (ISCTURKEY 2017), Ankara, Turkey, October 20–21, 2017 (pp. 156161). ISC Turkey. www.iscturkey.org/assets/files/ISC_Turkey_2017_Bildiriler_Kitabi.pdfGoogle Scholar
Kastrenakes, J. (2021, March 25). Your million-dollar NFT can break tomorrow if you’re not careful. The Verge. www.theverge.com/2021/3/25/22349242/nft-metadata-explained-art-crypto-urls-links-ipfsGoogle Scholar
Keim, D. Kohlhammer, J., Ellis, G., & Mansmann, F. (Eds.). (2010). Mastering the information age: Solving problems with visual analytics. Eurographics Association.Google Scholar
Kelley, D. R. (2012). Philology and history. In Rabasa, J., Sato, M., Tortarolo, E., & Woolf, D. (Eds.) The Oxford history of historical writing, vol. 3: 1400–1800 (pp. 233243). Oxford University Press.Google Scholar
Kelly, B. (2016, September 30). The case against editable blockchains. Coindesk. www.coindesk.com/sorry-accenture-bitcoins-un-editable-blockchain-feature-not-flawGoogle Scholar
Kelly, T. (2010). Peer disagreement and higher order evidence. In Feldman, R. & Warfield, T. (Eds.), Disagreement (pp. 111174). Oxford University Press.Google Scholar
Kent, K. S. (2013). Propaganda, public opinion, and the second South African Boer War. Inquiries Journal, 5(10). www.inquiriesjournal.com/a?id=781Google Scholar
Keren, A. (2014). Trust and belief: A preemptive reasons account. Synthese, 191(12), 25932615. https://doi.org/10.1007/s11229-014-0416-3Google Scholar
Kietzmann, J., Lee, L. W., McCarthy, I. P., & Kietzmann, T. C. (2020). Deepfakes: Trick or treat? Business Horizons, 63(2), 135146. https://doi.org/10.1016/j.bushor.2019.11.006Google Scholar
King, S., & Nadal, S. (2012). PPCoin: Peer-to-peer crypto-currency with proof-of-stake [White paper]. Decred. https://decred.org/research/king2012.pdfGoogle Scholar
Klonick, K. (2017). The new governors: The people, rules, and processes governing online speech. Harvard Law Review, 131, 15981670. https://harvardlawreview.org/2018/04/the-new-governors-the-people-rules-and-processes-governing-online-speechGoogle Scholar
Knight, W. (2018, May 23). The US military is funding an effort to catch deepfakes and other AI trickery. MIT Technology Review. www.technologyreview.com/2018/05/23/142770/the-us-military-is-funding-an-effort-to-catch-deepfakes-and-other-ai-trickeryGoogle Scholar
Knowles, D. (1959). Jean Mabillon. Journal of Ecclesiastical History, 10(2), 153173. https://doi.org/10.1017/S0022046900062308Google Scholar
Koenig, M. A., & McMyler, B. (2019). Understanding the evidential, uncovering the interpersonal. In Fricker, M., Graham, P. J., Henderson, D., & Pedersen, N. J. L. L. (Eds.), The Routledge handbook of social epistemology (pp. 103114). Routledge.Google Scholar
Koens, T., & Poll, E. (2019). Assessing interoperability solutions for distributed ledgers. Pervasive and Mobile Computing, 59. https://doi.org/10.1016/j.pmcj.2019.101079Google Scholar
Konstantinov, N., & Lampert, C. (2019). Robust learning from untrusted sources. In Chaudhuri, K. & Salakhutdinov, R. (Eds.), Proceedings of the 36th International Conference on Machine Learning, PMLR 97, Long Beach, CA, USA, June 9–15, 2019 (pp. 34883498). PMLR. http://proceedings.mlr.press/v97/konstantinov19a.htmlGoogle Scholar
Korotkova, N. (2016). Disagreement with evidentials: A call for subjectivity. In Hunter, J., Simons, M., & Stone, M. (Eds.), JerSem: The 20th Workshop on the Semantics and Pragmatics of Dialogue, New Brunswick, NJ, USA, July 16–18, 2016 (pp. 6575). SemDial.Google Scholar
Korte, N. E. (2005). Procopius’ portrayal of Theodora in the Secret History. Hirundo: The McGill Journal of Classical Studies, 3, 109130. www.mcgill.ca/classics/files/classics/2004–09.pdfGoogle Scholar
Krombholz, K., Judmayer, A., Gusenbauer, M., & Weippl, E. (2016). The other side of the coin: User experiences with bitcoin security and privacy. In Grossklags, J. & Preneel, B. (Eds.), Lecture notes in computer science, vol. 9603: Financial Cryptography and Data Security, 20th International Conference, FC 2016, Christ Church, Barbados, February 22–26, 2016, revised selected papers (pp. 555580). Springer.Google Scholar
Kshetri, N. (2018). 1 Blockchain’s roles in meeting key supply chain management objectives. International Journal of Information Management, 39, 8089. https://doi.org/10.1016/j.ijinfomgt.2017.12.005Google Scholar
Kumar, A., & Kumar, S. (2020). A systematic review of the research on disruptive technology – Blockchain. In 2020 5th International Conference on Communication and Electronics System (ICCES 2020), Coimbatore, India, June 10–12, 2020, proceedings (pp. 900905). IEEE.Google Scholar
Kuran, T., & Sunstein, C. R. (1999). Availability cascades and risk regulation. Stanford Law Review, 51(4), 683. https://ssrn.com/abstract=138144Google Scholar
Lackey, J. (2006). Knowing from testimony. Philosophy Compass, 1(5), 432448. https://doi.org/10.1111/j.1747-9991.2006.00035.xGoogle Scholar
Lackey, J. (2008). Learning from words: Testimony as a source of knowledge. Oxford University Press.Google Scholar
Lafourcade, P., & Lombard-Platet, M. (2020). About blockchain interoperability. Information Processing Letters, 161, 105976. https://doi.org/10.1016/j.ipl.2020.105976Google Scholar
Lahno, B. (2001). Institutional trust: A less demanding form of trust? RELEA: Revista Latinoamerica de Estudios Avanzados, 15, 1958.Google Scholar
Lahno, B. (2020). Trust and emotion. In Simon, J. (Ed.), The Routledge handbook of trust and philosophy (pp. 147159). Taylor & Francis.Google Scholar
Lamport, L., Shostak, R., & Pease, M. (1982). The Byzantine generals problem. ACM Transactions on Programming Languages and Systems, 4(3), 382401. https://doi.org/10.1145/357172.357176Google Scholar
Laney, D. (2001). 3D Data management: Controlling data volume, velocity, and variety. META Group.Google Scholar
Laslett, P. (Ed.) (1988). Locke: Two treatises of government. Cambridge University Press.Google Scholar
Latour, B. (1986). Visualization and cognition. In Kulick, H. (Ed.), Knowledge and society studies in the sociology of culture past and present (pp. 140). Jai Press.Google Scholar
Latour, B. (1987). Science in action: How to follow scientists and engineers through society. Harvard University Press.Google Scholar
Latour, B. (1992). Where are the missing masses? The sociology of a few mundane artifacts. In Bijker, W. E. & Law, J. (Eds.), Shaping technology/building society: Studies in sociotechnical change (pp. 225258). MIT Press.Google Scholar
Latour, B., & Venn, C. (2002). Morality and technology. Theory, Culture & Society, 19(5–6), 247260. https://doi.org/10.1177/026327602761899246Google Scholar
Latour, B., & Woolgar, S. (1979). Laboratory life: The social construction of scientific facts. Sage.Google Scholar
Laudon, K. C., & Laudon, J. P. (2015). Management information systems: Managing the digital firm (14th ed.). Pearson.Google Scholar
The Law Dictionary. (n.d.). What is business record exception? In The law dictionary: Featuring Black’s law dictionary free online legal dictionary (2nd ed.). https://thelawdictionary.org/business-record-exceptionGoogle Scholar
Lazarenko, A., & Avdoshin, S. (2018). Financial risks of the blockchain industry: A survey of cyberattacks. In Arai, K., Bhatia, R., & Kapoor, S. (Eds.), Advances in intelligent systems and computing, vol. 881: Proceedings of the Future Technologies Conference (FTC) 2018, FTC 2018, Vancouver, BC, Canada, November 13–14, 2018 (pp. 368384). Springer. https://doi.org/10.1007/978-3-030-02683-7_26Google Scholar
Lazer, D., Baum, M., Grinberg, N., Friedland, L., Joseph, K., Hobbs, W., & Mattsson, C. (2017). Combating fake news: An agenda for research and action. Harvard Kennedy School Shorenstein Center on Media, Politics and Public Policy. https://shorensteincenter.org/combating-fake-news-agenda-for-researchGoogle Scholar
Lazer, D. M. J., Baum, M. A., Benkler, Y., Berinsky, A. J., Greenhill, K. M., Menczer, F., Metzger, M. J., Nyhan, B., Pennycook, G., Rothschild, D., Schudson, M., Sloman, S. A., Sunstein, C. R., Thorson, E. A., Watts, D. J., & Zittrain, J. L. (2018). The science of fake news. Science, 359(6380), 10941096. https://doi.org/10.1126/science.aao2998Google Scholar
LeCun, Y., Bengio, Y., & Hinton, G. (2015). Deep learning. Nature, 521(7553), 436444. https://doi.org/10.1038/nature14539Google Scholar
Lee, C., & Woods, K. (2014). Enabling digital forensics practices in libraries, archives and museums: The BitCurator experience [Conference presentation]. Digital Forensics Research Workshop, The Digital Forensic Research Conference, DFRWS 2014 USA, Denver, CO, USA, August 3–6,2014. https://dfrws.org/presentation/enabling-digital-forensics-practices-in-libraries-archives-and-museums-the-bitcurator-experienceGoogle Scholar
Lee, G., & Perry, J. L. (2002). Are computers boosting productivity? A test of the paradox in state governments. Journal of Public Administration Research and Theory, 12(1), 77102. www.jstor.org/stable/3525740Google Scholar
Leibenstein, H. (1950). Bandwagon, snob, and Veblen effects in the theory of consumers’ demand. Quarterly Journal of Economics, 64(2), 183207. https://doi.org/10.2307/1882692Google Scholar
Leigh, A. (2006). Trust, inequality and ethnic heterogeneity. Economic Record, 82(258), 268280. https://doi.org/10.1111/j.1475-4932.2006.00339.xGoogle Scholar
Lemieux, V. L. (1993). Archival solitudes: The impact on appraisal and acquisition of legislative concepts of records and archives. Archivaria, 35, 153161. https://archivaria.ca/index.php/archivaria/article/view/11894Google Scholar
Lemieux, V. L. (Ed.). (2012). Financial analysis and risk management: Data governance, analytics and life cycle management. Springer.Google Scholar
Lemieux, V. L. (2014). Toward a “third order” archival interface: Research notes on some theoretical and practical implications of visual explorations in the Canadian context of financial electronic records. Archivaria, 78, 5393. https://archivaria.ca/index.php/archivaria/article/view/13721Google Scholar
Lemieux, V. L. (2016a). One step forward, two steps backward? Does e-government make governments in developing countries more transparent and accountable? (WDR 2016 Background Paper). World Bank. https://openknowledge.worldbank.org/handle/10986/23647Google Scholar
Lemieux, V. L. (2016b). Provenance: Past, present and future in interdisciplinary and multidisciplinary perspective. In Lemieux, V. L. (Ed.), Building trust in information (pp. 345). Springer.Google Scholar
Lemieux, V. L. (2016c). Trusting records: Is blockchain technology the answer? Records Management Journal, 26(2), 110139. https://doi.org/10.1108/RMJ-12-2015-0042Google Scholar
Lemieux, V. L. (2017a). Evaluating the use of blockchain in land transactions: An archival science perspective. European Property Law Journal, 6(3), 392440. https://doi.org/10.1515/eplj-2017-0019Google Scholar
Lemieux, V. L. (2017b). A typology of blockchain recordkeeping solutions and some reflections on their implications for the future of archival preservation. In Nie, J-Y, Obradovic, Z, Suzumura, T., Ghosh, R., Nambiar, R., Wang, C., Zang, H., Baeza-Yates, R., Hu, X., Kepner, J., Cuzzocrea, A., Tang, J., & Toyoda, M. (Eds.), Proceedings: 2017 IEEE International Conference on Big Data, Boston, MA, USA, December 11–14, 2017 (pp. 22712278). IEEE. https://doi.org/10.1109/BigData.2017.8258180Google Scholar
Lemieux, V. L. (2019). Blockchain and public recordkeeping: Of temples, prisons and the (re) configuration of power. Frontiers in Blockchain, 2. https://doi.org/10.3389/fbloc.2019.00005Google Scholar
Lemieux, V. L., & Feng, C. (2021). Theorizing from multidisciplinary perspectives on the design of blockchains and distributed ledger systems (part 2). In Lemieux, V. L. & Feng, C. (Eds.), Building decentralized trust: Multidisciplinary perspectives on the design of blockchains and distributed ledgers. Springer.Google Scholar
Lemieux, V., & Limonad, L. (2011). What “good” looks like: Understanding records ontologically in the context of the global financial crisis. Journal of Information Science, 37(1), 2939. https://doi.org/10.1177/0165551510391359Google Scholar
Lemieux, V. L., & Trapnell, S. E. (2016). Public access to information for development: A guide to the effective implementation of right to information laws. World Bank. https://elibrary.worldbank.org/doi/abs/10.1596/978-1-4648-0879-1Google Scholar
Lemieux, V. L., Hoffman, D., Batista, D., & Joo, A. (2019). Blockchain technology & recordkeeping. ARMA International Education Foundation. http://armaedfoundation.org/wp-content/uploads/2019/06/AIEF-Research-Paper-Blockchain-Technology-Recordkeeping.pdfGoogle Scholar
Lemieux, V. L., Voskobojnikov, A., & Meng, K. (2021). Addressing audit and accountability issues in self-sovereign identity blockchain systems using archival science principles [Conference paper]. IEEE COMPSAC ’21: Intelligent and Resilient Computing for a Collaborative World, 45th Anniversary Conference, virtual, July 12–16, 2021.Google Scholar
Lévi-Strauss, C. (1985). Structural analysis in linguistics and in anthropology. In Innis, R. E. (Ed.), Semiotics: An introductory anthology (pp. 110128). Indiana University Press. Originally published in 1963 in C. Lévi-Strauss, Structural anthropology. Basic Books.Google Scholar
Lewandowsky, S. (2020). The “post-truth” world, misinformation, and information literacy: A perspective from cognitive science. In Goldstein, S. (Ed.), Informed societies: Why information literacy matters for citizenship, participation and democracy (pp. 6988). Facet.Google Scholar
Lewandowsky, S., & van der Linden, S. (2021). Countering misinformation and fake news through inoculation and prebunking. European Review of Social Psychology, 138. https://doi.org/10.1080/10463283.2021.1876983Google Scholar
Lexico. (2021). Usability. Lexico. www.lexico.com/definition/usabilityGoogle Scholar
Li, J., Li, N., Peng, J., Cui, H., & Wu, Z. (2019). Energy consumption of cryptocurrency mining: A study of electricity consumption in mining cryptocurrencies. Energy, 168, 160168. https://doi.org/10.1016/j.energy.2018.11.046Google Scholar
Liberman, E. (2017, June 20). The age of disinformation. Quadangles Online, URI Alumni Magazine. https://web.uri.edu/quadangles/020-the-age-of-disinformationGoogle Scholar
Library of Congress. (n.d.). The deterioration and preservation of paper: Some essential facts. Library of Congress. www.loc.gov/preservation/care/deterioratebrochure.htmlGoogle Scholar
Ling, R. (2012). Taken for grantedness: The embedding of mobile communication into society. MIT Press.Google Scholar
Lipset, S. M., & Schneider, W. (1983). The confidence gap: Business, labor, and government in the public mind. Free Press.Google Scholar
Liu, L., & Özsu, M. T. (Eds.). (2009). Encyclopedia of database systems. Springer.Google Scholar
Liu, S., Mohsin, F., Xia, L., & Seneviratne, O. (2019). Strengthening smart contracts to handle unexpected situations. In Proceedings: 2019 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPCON), Newark, CA, USA, April 4–9, 2019 (pp. 182187). IEEE. https://doi.org/10.1109/DAPPCON.2019.00034Google Scholar
Liv, N., & Greenbaum, D. (2020). Deep fakes and memory malleability: False memories in the service of fake news. AJOB Neuroscience, 11(2), 96104. https://doi.org/10.1080/21507740.2020.1740351Google Scholar
Locke, J. (1689). Two treatises of government: In the former, the false principles, and foundation of Sir Robert Filmer, and his followers, are detected and overthrown. The latter is an essay concerning the true original, extent, and end of civil government. Awnsham Churchill.Google Scholar
Lockl, J., Schlatt, V., Schweizer, A., Urbach, N., & Harth, N. (2020). Toward trust in Internet of Things ecosystems: Design principles for blockchain-based IoT applications. IEEE Transactions on Engineering Management, 67(4), 12561270. https://doi.org/10.1109/TEM.2020.2978014Google Scholar
Lopp, J. (2018). Who controls Bitcoin Core? Cypherpunk Cogitations. https://blog.lopp.net/who-controls-bitcoin-core-/Google Scholar
Lorenz, C. (2001). History: Theories and methods. In Smelser, N. J. & Baltes, P. B. (Eds.), International encyclopedia of the social & behavioral sciences (pp. 68696876). Pergamon.Google Scholar
Lu, C., Batista, D., Hamouda, H., & Lemieux, V. (2020). Consumers’ intentions to adopt blockchain-based personal health records and data sharing: Focus group study. JMIR Formative Research, 4(11). https://doi.org/10.2196/21995Google Scholar
Lu, Q., Staples, M., O’Connor, H., Chen, S., & Guabtni, A. (2020). Software architecture for blockchain-based trade certificate systems. In Proceedings of the 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Toronto, ON, Canada, May 2–6, 2020 (pp. 13). IEEE. https://doi.org/10.1109/ICBC48266.2020.9169390Google Scholar
Ludäscher, B. (2016). A brief tour through provenance in scientific workflows and databases. In Lemieux, V. L. (Ed.), Building trust in information (pp. 103126). Springer.Google Scholar
Luhmann, N. (1979). Trust and power. Wiley & Sons.Google Scholar
Luhmann, N. (2000). Familiarity, confidence, trust: Problems and alternatives. In Gambetta, D. (Ed.), Trust: Making and breaking cooperative relations (Electronic ed.) (pp. 94107). University of Oxford.Google Scholar
Lund, N. W., & Skare, R. (2017). Document theory. In McDonald, J. D. and Levine-Clark, M. (Eds.), Encyclopedia of library and information sciences (4th ed.) (pp. 13721380). CRC Press. https://doi.org/10.1081/E-ELIS4-120053306Google Scholar
Lustig, J. (2020). Epistemologies of the archive: Toward a critique of archival reason. Archival Science, 20(1), 6589. https://doi.org/10.1007/s10502-019-09313-zGoogle Scholar
Lynch, C. A. (2001). When documents deceive: Trust and provenance as new factors for information retrieval in a tangled web. Journal of the American Society for Information Science and Technology, 52(1), 1217. https://doi.org/10.1002/1532-2890(2000)52:1<12::AID-ASI1062>3.0.CO;2-VGoogle Scholar
Lynch, C. A. (2017). Stewardship in the age of algorithms. First Monday, 22(12). https://doi.org/10.5210/fm.v22i12.8097Google Scholar
Lynch, C. A. (2018). Managing the cultural record in the information warfare era. EDUCAUSE Review, 53(6). https://er.educause.edu/articles/2018/10/managing-the-cultural-record-in-the-information-warfare-eraGoogle Scholar
Lyons, K. (2021, January 25). Twitter launches Birdwatch, a fact-checking program intended to fight misinformation. The Verge. www.theverge.com/2021/1/25/22248903/twitter-birdwatch-fact-checking-misinformationGoogle Scholar
Ma, J., Gao, W., Mitra, P., Kwon, S., Jansen, B. J., Wong, K. F., & Cha, M. (2016). Detecting rumors from microblogs with recurrent neural networks. In Proceedings of the 25th International Joint Conference on Artificial Intelligence (IJCAI 2016), New York, NY, USA, July 9–15, 2016 (pp. 38183824). AAAI Press. https://ink.library.smu.edu.sg/sis_research/4630Google Scholar
Mackenzie, A. (2014). Memcoin2: A hybrid proof of work/proof of stake cryptocurrency [White paper]. Decred. https://decred.org/research/mackenzie2013.pdfGoogle Scholar
MacKuen, M. B., Erikson, R. S., & Stimson, J. A. (1992). Peasants or bankers? The American electorate and the US economy. American Political Science Review, 86(3), 597611. https://doi.org/10.2307/1964124Google Scholar
MacNeil, H. (1992). Without consent: The ethics of disclosing personal information in public archives. Society of American Archivists and Scarecrow Press.Google Scholar
MacNeil, H. M. (1998). Trusting records: The evolution of legal, historical and diplomatic methods of assessing the trustworthiness of records, from antiquity to the digital age. [Doctoral dissertation, University of British Columbia]. http://hdl.handle.net/2429/10157Google Scholar
MacNeil, H. (2004). Contemporary archival diplomatics as a method of inquiry: Lessons learned from two research projects. Archival Science, 4(3–4), 199232. https://doi.org/10.1007/s10502-005-2592-xGoogle Scholar
MacNeil, H. (2009). Trusting description: Authenticity, accountability, and archival description standards. Journal of Archival Organization, 7(3), 89107. https://doi.org/10.1080/15332740903117693Google Scholar
MacNeil, H. (2013). Trusting records: Legal, historical and diplomatic perspectives, vol. 1. Springer.Google Scholar
MacNeil, H. (2016). Deciphering and interpreting an archival fonds and its parts: A comparative analysis of textual criticism and the theory of archival arrangement. In Gilliland, A., McKemmish., S., & Lau, A. J. (Eds.), Research in the archival multiverse (pp. 161197). Monash University Publishing.Google Scholar
MacNeil, H., Wei, C., Duranti, L., Gilliland-Swetland, A., Guercio, M., Hackett, Y., Hamidzadeh, B., Iacovino, L., Lee, B., McKemmish, S., Roeder, J., Ross, S., Wan, W-K., & Xiu, Z. Z. (2001). InterPARES 1 project book: Authenticity task force report. InterPARES. http://interpares.org/display_file.cfm?doc=ip1_atf_report.pdfGoogle Scholar
Maddocks, S. (2020). “A deepfake porn plot intended to silence me”: Exploring continuities between pornographic and “political” deep fakes. Porn Studies, 7(4), 415423. https://doi.org/10.1080/23268743.2020.1757499Google Scholar
Maniatis, P., Roussopoulos, M., Giuli, T. J., Rosenthal, D. S. H., & Baker, M. (2005). The LOCKSS peer-to-peer digital preservation system. ACM Transactions on Computer Systems, 23(1), 250. https://doi.org/10.1145/1047915.1047917Google Scholar
Mannheim, K. (1954). Ideology and utopia: An introduction to the sociology of knowledge. (L. Wirth & E. Shils, Trans.). Harcourt Brace & Company. Original work published in 1929.Google Scholar
Manoff, M. (2004). Theories of the archive from across the disciplines. Portal: Libraries and the Academy, 4(1), 925. https://doi.org/10.1353/pla.2004.0015Google Scholar
Mansbridge, J. (1997). Social and cultural causes of dissatisfaction with US government. In Nye, J. S., Jr., Zelikow, P. D., & King, D. C. (Eds.), Why people don’t trust government (pp. 133153). Harvard University Press.Google Scholar
Marciano, R., Lemieux, V., Hedges, M., Esteva, M., Underwood, W., Kurtz, M., & Conrad, M. (2018). Archival records and training in the age of big data. In Percell, J., Sarin, L. C., Jaeger, P. T., & Bertot, J. C. (Eds.), Re-envisioning the MLS: Perspectives on the future of library and information science education. Emerald Publishing. https://doi.org/10.1108/S0065-28302018000044B010Google Scholar
Marciano, R., Underwood, W., Hanaee, M., Mullane, C., Singh, A., & Tethong, Z. (2018). Automating the detection of personally identifiable information (PII) in Japanese-American WWII incarceration camp records. In Abe, N., Liu, H., Pu, C., Hu, X., Ahmed, N., Qiao, M., Song, Y., Kossmann, D., Liu, B., Lee, K., Tang, J., He, J., & Saltz, J. (Eds.), Proceedings of the 2018 IEEE International Conference on Big Data (Big Data), Seattle, WA, USA, December 10–13, 2018 (pp. 27252732). IEEE. https://doi.org/10.1109/BigData.2018.8622634Google Scholar
Marino, B., & Juels, A. (2016). Setting standards for altering and undoing smart contracts. In Alferes, J., Bertossi, L., Governatori, G., Fodor, P., & Roman, D. (Eds.), Lecture notes in computer science, vol. 9718: Rule technologies. Research, tools, and applications. 10th International Symposium, RuleML 2016, Stony Brook, NY, USA, July 6–9, 2016, proceedings (pp. 151166). Springer. https://doi.org/10.1007/978-3-319-42019-6_10Google Scholar
Martinez-Ávila, D., & Zandonade, T. (2020). Social epistemology in information studies: A consolidation. Brazilian Journal of Information Science, 14(1), 736. https://doi.org/10.36311/1981-1640.2020.v14n1.02.p7Google Scholar
Martinovic, I., Kello, L., & Sluganovic, I. (2017). Blockchains for governmental services: Design principles, applications, and case studies (Working Paper Series – No. 7). Centre for Technology and Global Affairs, University of Oxford. www.ctga.ox.ac.uk/sites/default/files/ctga/documents/media/wp7_martinovickellosluganovic.pdfGoogle Scholar
Mashatan, A., & Heintzman, D. (2021). The complex path to quantum resistance: Is your organization prepared? Queue,19(2), 6592. https://doi.org/10.1145/3466132.3466779Google Scholar
Mashatan, A., & Turetken, O. (2020). Preparing for the information security threat from quantum computers. MIS Quarterly Executive, 19(2), 157164. https://aisel.aisnet.org/misqe/vol19/iss2/7Google Scholar
Matthews, A., & Posetti, J. (2020, March 25). You cannot afford to ignore the disinformation crisis: A call to action for Canadian magazines [White paper]. Magazines Canada. https://magazinescanada.ca/pdf/you-cannot-afford-to-ignore-the-disinformation-crisis-a-call-to-action-for-canadian-magazinesGoogle Scholar
Maurer, W. M., & DuPont, Q. (2015, June 23). Ledgers and law in the blockchain. King’s Review. www.kingsreview.co.uk/essays/ledgers-and-law-in-the-blockchainGoogle Scholar
Maxwell, G. (2017, April 5). BIP proposal: Inhibiting a covert attack on the Bitcoin POW function. Bitcoin Dev Mailing List. www.mail-archive.com/[email protected]/msg05055.htmlGoogle Scholar
Mayer-Schönberger, V., & Cukier, K. (2013). Big data: A revolution that will transform how we live, work, and think. Houghton Mifflin Harcourt.Google Scholar
McDowell, A. (2002). Trust and information: The role of trust in the social epistemology of information science, Social Epistemology, 16(1), 5163. https://doi.org/10.1080/210132798Google Scholar
McKnight, D. H., Carter, M., Thatcher, J. B., & Clay, P. F. (2011). Trust in a specific technology: An investigation of its components and measures. ACM Transactions on Management Information Systems, 2(2), 125. https://doi.org/10.1145/1985347.1985353Google Scholar
McKnight, D. H., Choudhury, V., & Kacmar, C. (2002). Developing and validating trust measures for e-commerce: An integrative typology. Information Systems Research, 13(3), 334359. https://doi.org/10.1287/isre.13.3.334.81Google Scholar
McLeod, C. (2002). Self-trust and reproductive autonomy. MIT Press.Google Scholar
Mead, G. H. (1934). Mind, self and society: From the standpoint of a social behaviorist. University of Chicago Press.Google Scholar
Meijer, A. J. (2003). Trust this document! ICTs, authentic records and accountability. Archival Science, 3(3), 275290. https://doi.org/10.1007/s10502-004-1287-zGoogle Scholar
Meyerson, D., Weick, K. E., & Kramer, R. M. (1996). Swift trust and temporary groups. In Kramer, R. M. & Tyler, T. R. (Eds.), Trust in organizations: Frontiers of theory and research (pp. 166195). SAGE Publications. http://dx.doi.org/10.4135/9781452243610.n9Google Scholar
Mickens, J. (2018, June 4). Blockchains are a bad idea [Video]. YouTube. www.youtube.com/watch?v=15RTC22Z2xI&list=LL1wbwzUs5xzdGUAeCMP5e6Q&index=377Google Scholar
Millar, L. A. (2019). A matter of facts: The value of evidence in an information age. ALA Neal-Schuman.Google Scholar
Miller, A. H., & Listhaug, O. (1984). Economic effects on the vote in Norway. Political Behavior, 6(4), 301319. https://doi.org/10.1007/BF00987069Google Scholar
Mirsky, Y., & Lee, W. (2021). The creation and detection of deepfakes: A survey. ACM Computing Surveys, 54(1), 141. https://doi.org/10.1145/3425780Google Scholar
Mirsky, Y., Mahler, T., Shelef, I., & Elovici, Y. (2019). CT-GAN: Malicious tampering of 3D medical imagery using deep learning. In SEC’19: Proceedings of the 28th USENIX Conference on Security Symposium, Santa Clara, CA, USA, August 14–16, 2019 (pp. 461478). USENIX Association.Google Scholar
Mishler, W., & Rose, R. (2001). What are the origins of political trust? Testing institutional and cultural theories in post-communist societies. Comparative Political Studies, 34(1), 3062. https://doi.org/10.1177/0010414001034001002Google Scholar
Missier, P., Moreau, L., Cheney, J., Lebo, T., & Soiland-Reyes, S. (2013). PROV-dictionary: Modeling provenance for dictionary data structures (W3 C Working Group Note April 30, 2013). World Wide Web Consortium. www.w3.org/TR/2013/NOTE-prov-dictionary-20130430Google Scholar
Mitre Corporation (MITRE). (2020). Common Attack Pattern Enumeration and Classification [database]. Mitre Corporation. https://capec.mitre.org/data/definitions/98.htmlGoogle Scholar
Montgomery, B. P. (2001). The Iraqi secret police files: A documentary record of the Anfal genocide. Archivaria, 52, 6999. https://archivaria.ca/index.php/archivaria/article/view/12815Google Scholar
Moreau, L. (2010). The foundations for provenance on the web. Now Publishers.Google Scholar
Morgan, R. M., & Hunt, S. D. (1994). The commitment-trust theory of relationship marketing. Journal of Marketing, 58(3), 2038. https://doi.org/10.1177/002224299405800302Google Scholar
Morisander, . (2018, March 23). The biggest smart contract hacks in history or how to endanger up to US $2.2 billion. Medium. https://medium.com/solidified/the-biggest-smartcontract-hacks-in-history-or-how-to-endanger-up-to-us-2-2-billion-d5a72961d15dGoogle Scholar
Mosseri, A. (2016, December 16). Addressing hoaxes and fake news. Facebook. https://about.fb.com/news/2016/12/news-feed-fyi-addressing-hoaxes-and-fake-newsGoogle Scholar
Mosseri, A. (2017, April 6). Working to stop misinformation and false news. Facebook. https://about.fb.com/news/2017/04/working-to-stop-misinformation-and-false-newsGoogle Scholar
Mourão, R. R., & Robertson, C. T. (2019). Fake news as discursive integration: An analysis of sites that publish false, misleading, hyperpartisan and sensational information. Journalism Studies, 20(14), 20772095. https://doi.org/10.1080/1461670X.2019.1566871Google Scholar
Mühle, A., Grüner, A., Gayvoronskaya, T., & Meinel, C. (2018). A survey on essential components of a self-sovereign identity. Computer Science Review, 30, 8086. https://doi.org/10.1016/j.cosrev.2018.10.002Google Scholar
Muller, M., Lange, I., Wang, D., Piorkowski, D., Tsay, J., Liao, Q. V., Dugan, C., & Erickson, T. (2019). How data science workers work with data: Discovery, capture, curation, design, creation. In CHI ’19: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, Glasgow, Scotland, May 4–9, 2019 (Paper 126). Association for Computing Machinery. https://doi.org/10.1145/3290605.3300356Google Scholar
Muller, S., Feith, J. A., & Fruin, R. (2003). Manual for the arrangement and description of archives (A. H. Leavitt, Trans.) (2nd ed.). Society of American Archivists. Original work published in 1920.Google Scholar
Müller, S. M., & Tworek, H. J. (2016). Imagined use as a category of analysis: New approaches to the history of technology. History and Technology, 32(2), 105119. https://doi.org/10.1080/07341512.2016.1218957Google Scholar
Murray, T. (2021, January 16). A man who says he threw away a hard drive loaded with 7,500 bitcoins in 2013 is offering his city $70 million to dig it up from the dump. Business Insider. www.businessinsider.com/man-offers-council-70-million-dig-up-bitcoin-hard-drive-2021–1Google Scholar
Myers West, S. (2018). Censored, suspended, shadowbanned: User interpretations of content moderation on social media platforms. New Media and Society, 20(11), 43664383. https://doi.org/10.1177/1461444818773059Google Scholar
Naab, T. K., Kalch, A., & Meitz, T. G. K. (2018). Flagging uncivil user comments: Effects of intervention information, type of victim, and response comments on bystander behavior. New Media and Society, 20(2), 777795. https://doi.org/10.1177/1461444816670923Google Scholar
Nadeau, M. (2020, July 9). What is cryptojacking? How to prevent, detect, and recover from it. CSO Online. www.csoonline.com/article/3253572/what-is-cryptojacking-how-to-prevent-detect-and-recover-from-it.htmlGoogle Scholar
Nakamoto, S. (2008a). A peer-to-peer electronic cash system. Bitcoin.org. https://bitcoin.org/bitcoin.pdfGoogle Scholar
Nakamoto, S. (2008b, October 31). Bitcoin P2P e-cash paper. Cryptography Mailing List. www.metzdowd.com/pipermail/cryptography/2008-October/014810.htmlGoogle Scholar
Nakamoto, S. (2008c, November 17). Bitcoin P2P e-cash paper. Cryptography Mailing List. www.metzdowd.com/pipermail/cryptography/2008-November/014863.htmlGoogle Scholar
Nakamoto, S. (2009a, January 9). Bitcoin v.0.1 released. Cryptography Mailing List. www.mail-archive.com/[email protected]/msg10142.htmlGoogle Scholar
Nakamoto, S. (2009b, February 11). Bitcoin open source implementation of P2P currency. P2P Foundation Forum. http://p2pfoundation.ning.com/forum/topics/bitcoin-open-sourceGoogle Scholar
Narayanan, A., Bonneau, J., Felton, E., Miller, A., & Goldfeder, S. (2016). Bitcoin and cryptocurrency technologies: A comprehensive introduction. Princeton University Press.Google Scholar
Naqvi, S. (2018). Challenges of cryptocurrencies forensics – A case study of investigating, evidencing and prosecuting organised cybercriminals. In ARES 2018: Proceedings of the 13th International Conference on Availability, Reliability and Security, Hamburg, Germany, August 27–30, 2018 (Article 63). Association for Computing Machinery. https://doi.org/10.1145/3230833.3233290Google Scholar
Newman, N., Fletcher, R., Kalogeropoulos, A., Levy, D. A. L., & Nielsen, R. K. (2018). Reuters institute digital news report 2018. Reuters Institute for the Study of Journalism. media.digitalnewsreport.org/wp-content/uploads/2018/06/digital-news-report-2018.pdf?x89475Google Scholar
Newton, K., & Norris, P. (2000). Confidence in public institutions: Faith, culture, or performance? In Pharr, S. J. & Putnam, R. D.. Disaffected democracies. What’s troubling the trilateral countries (pp. 5273). Princeton University Press.Google Scholar
Nickel, P. (2007). Trust and obligation-ascription. Ethical Theory and Moral Practice, 10(3), 309319. https://doi.org/10.1007/s10677-007-9069-3Google Scholar
Nickel, P. J. (2012). Trust and testimony. Pacific Philosophical Quarterly, 93(3), 301316. https://doi.org/10.1111/j.1468-0114.2012.01427.xGoogle Scholar
Nickel, P. J., Franssen, M., & Kroes, P. (2010). Can we make sense of the notion of trustworthy technology? Knowledge, Technology & Policy, 23(3–4), 429444. https://doi.org/10.1007/s12130-010-9124-6Google Scholar
Nickerson, R. S. (1998). Confirmation bias: A ubiquitous phenomenon in many guises. Review of General Psychology 2(2), 175220. https://doi.org/10.1037/1089-2680.2.2.175Google Scholar
Nikolić, I., Kolluri, A., Sergey, I., Saxena, P., & Hobor, A. (2018). Finding the greedy, prodigal, and suicidal contracts at scale. In ASAC ’18: Proceedings of the 34th Annual Computer Security Applications Conference, San Juan, Puerto Rico, USA, December 3–7, 2018 (pp. 653663). Association for Computing Machinery. https://doi.org/10.1145/3274694.3274743Google Scholar
Nirkin, Y., Keller, Y., & Hassner, T. (2019). FSGAN: Subject agnostic face swapping and reenactment. In Proceedings: 2019 International Conference on Computer Vision (ICCV), Seoul, South Korea, October 27–November 2, 2019 (pp. 71837192). IEEE. https://doi.org/10.1109/ICCV.2019.00728Google Scholar
Nissenbaum, H. (2001). Securing trust online: Wisdom or oxymoron? Boston University Law Review, 81(30), 635664. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2573181Google Scholar
North, D. C. (1990). A transaction cost theory of politics. Journal of Theoretical Politics, 2(4), 355367. https://doi.org/10.1177/0951692890002004001Google Scholar
North, D. C., & Thomas, R. P. (1973). The rise of the western world: A new economic history. Cambridge University Press.Google Scholar
Nunziato, D. C. (2020). Misinformation mayhem: Social media platforms’ efforts to combat medical and political misinformation. George Washington University Law School (GW Law) Faculty Publications and Other Works. https://scholarship.law.gwu.edu/cgi/viewcontent.cgi?article=2758&context=faculty_publicationsGoogle Scholar
Nguyen, C. T. (in press). Trust as an unquestioning attitude. In Gendler, T. S., & Hawthorne, J. (Eds.), Oxford studies in epistemology, vol. 7. Oxford University Press.Google Scholar
Nye, J. S. (1997). Introduction: The decline of confidence in government. In Nye, J. S., Jr., Zelikow, P. D., & King, D. C. (Eds.), Why people don’t trust government (pp. 119). Harvard University Press.Google Scholar
Object Management Group. (2020). Home. Unified Modelling Language. www.uml.org/index.htmGoogle Scholar
Occeñola, P. (2018, December 15). Fake news, real women: Disinformation gone macho. Rappler. https://specials.rappler.com/newsbreak/in-depth/217563-disinformation-gone-macho/index.htmlGoogle Scholar
Oclarino, R. (2020, September 15). Blockchain’s technology of trust. ISO News. www.iso.org/news/isofocus_142–5.htmlGoogle Scholar
O’Connor, T. (2020). Emergent properties. In E. N. Zalta (Ed.), Stanford encyclopedia of philosophy (Fall 2020 ed.) https://plato.stanford.edu/entries/properties-emergentGoogle Scholar
OECD [Organisation for Economic Co-operation and Development]. (2013). Government at a glance 2013. https://doi.org/10.1787/gov_glance-2013-enGoogle Scholar
O’Neal, S. (2019, January 3). From Dorian Nakamoto to Elon Musk: The incomplete list of people speculated to be Satoshi Nakamoto. CoinTelegraph. https://cointelegraph.com/news/from-dorian-nakamoto-to-elon-musk-the-incomplete-list-of-people-speculated-to-be-satoshi-nakamotoGoogle Scholar
O’Neil, C., & Schutt, R. (2013). Doing data science: Straight talk from the frontline. O’Reilly Media.Google Scholar
O’Neill, O. (2020). Questioning trust. In Simon, J. (Ed.), The Routledge handbook of trust and philosophy (pp. 1727). Taylor & Francis.Google Scholar
Origgi, G. (2004). Is trust an epistemological notion? Episteme, 1(1), 6172. https://doi.org/10.3366/epi.2004.1.1.61Google Scholar
Origgi, G. (2019). Trust and reputation as filtering mechanism for knowledge. In Fricker, M., Graham, P. J., Henderson, D., & Pedersen, N. J. L. L. (Eds.), The Routledge handbook of social epistemology (pp.7886). Routledge.Google Scholar
Origgi, G. (2020). Trust and reputation. In Simon, J. (Ed.), The Routledge handbook of trust and philosophy (pp. 8896). Taylor & Francis.Google Scholar
Orphan block. (2019, May 16). In Bitcoin Wiki. https://en.bitcoin.it/wiki/Orphan_BlockGoogle Scholar
OSCE [Organization for Security and Co-operation in Europe]. (2017, March 3). Joint declaration on freedom of expression and “fake news”, disinformation and propaganda. Organization for Security and Co-operation in Europe. www.osce.org/fom/302796Google Scholar
Owens, T. (2018). The theory and craft of digital preservation. Johns Hopkins University Press.Google Scholar
Oxford University Press (2016, November). Word of the year 2016. Oxford University Press. https://languages.oup.com/word-of-the-year/2016Google Scholar
Oxford University Press. (2021a) Cartulary, n. In Oxford English dictionary. www.oed.com/view/Entry/28326Google Scholar
Oxford University Press. (2021b). Data, n.1. In Oxford English dictionary. www.oed.com/view/Entry/159867Google Scholar
Oxford University Press. (2021c). Document, n. In Oxford English dictionary. www.oed.com/view/Entry/56328Google Scholar
Oxford University Press. (2021d). Record, n.1 and adj. In Oxford English dictionary. www.oed.com/view/Entry/159867Google Scholar
Oxford University Press. (2021e). Testimony, n. In Oxford English dictionary. www.oed.com/view/Entry/199748Google Scholar
Palmer, C. K., Rowell, C., & Lemieux, V. L. (2021). Multidisciplinary blockchain research and design: A case study in moving from theory to pedagogy to practice. In Toeppe, K., Yan, H., & Chu, S. K. W. (Eds.), Lecture notes in computer science, vol. 12645: Diversity, Divergence, Dialogue, 16th International Conference, iConference 2021, Beijing, China, March 17–31, 2021, Proceedings, Part I (pp. 587602). Springer. https://doi.org/10.1007/978-3-030-71292-1_46Google Scholar
Parsons, T. (1954). Psychology and sociology. In Gillin, J. (Ed.), For a science of social man: Convergences in anthropology, psychology, and sociology (pp. 67101). MacMillan Co.Google Scholar
Pattenden-Fail, J., Ballaux, B., Sørensen, A. B., Kruse, F., & Thøgersen, J. (2008). Report on usage models for libraries, archives, and data centres, results of the second iteration. Deliverable PP/3-D2v1.3. Preservation and Long-term Access through NETworked Services (PLANETS) Project. www.planets-project.eu/docs/reports/Planets_PP3-D2ReportOnUsageModels.pdfGoogle Scholar
Pearce-Moses, R. (2005). A glossary of archival and records terminology. Society of American Archivists. https://files.archivists.org/pubs/free/SAA-Glossary-2005.pdfGoogle Scholar
Pearce-Moses, R. (2018). Record. In InterPARES trust terminology. https://interparestrust.org/terminology/term/record/enGoogle Scholar
Peng, R. D. (2011). Reproducible research in computational science. Science, 334(6060), 12261227. https://doi.org/10.1126/science.1213847Google Scholar
Pennycook, G., & Rand, D. G. (2021). Research note: Examining false beliefs about voter fraud in the wake of the 2020 presidential election. Harvard Kennedy School (HKS) Misinformation Review. https://doi.org/10.37016/mr-2020-51Google Scholar
Pérez-Rosas, V., Kleinberg, B., Lefevre, A., & Mihalcea, R. (2018). Automatic detection of fake news. In Bender, E. M., Derczynski, L., Isabelle, P. (Eds.), Proceedings of the 27th International Conference on Computational Linguistics (COLING 2018), Santa Fe, New Mexico, USA, August 20–26, 2018 (pp. 33913401). Association for Computational Linguistics. www.aclweb.org/anthology/C18-1287Google Scholar
Pettit, P. (1995). The cunning of trust. Philosophy & Public Affairs, 24(3), 202225. https://doi.org/10.1111/j.1088-4963.1995.tb00029.xGoogle Scholar
Phillips, R., & Wilder, H. (2020). Tracing cryptocurrency scams: Clustering replicated advance-fee and phishing websites. In Proceedings: 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Toronto, ON, Canada, May 2–6, 2020 (pp. 159166). IEEE. https://doi.org/10.1109/ICBC48266.2020.9169433Google Scholar
Piore, A. (2018, November 19). New internet: Blockchain technology could help us take back our data from Facebook, Google and Amazon. Newsweek. www.newsweek.com/2018/11/16/new-internet-blockchain-technology-could-help-us-take-back-our-data-facebook-1222860.htmlGoogle Scholar
Pitropakis, N., Panaousis, E., Giannetsos, T., Anastasiadis, E., & Loukas, G. (2019). A taxonomy and survey of attacks against machine learning. Computer Science Review, 34. https://doi.org/10.1016/j.cosrev.2019.100199Google Scholar
Plutchak, S. T. (2018). Op ed: Epistemology – A matter of trust. Against the Grain, 30(6). https://doi.org/10.7771/2380-176X.8207Google Scholar
Pogue, D. (2017, February 1). The ultimate cure for the fake news epidemic will be more skeptical readers. Scientific American, 316(2), 24. https://doi.org/10.1038/scientificamerican0217-24Google Scholar
Pollitt, M. (2010). A history of digital forensics. In Chow, K. P. & Shenoi, S (Eds). IFIP advances in information and communication technology, vol. 337: Advances in Digital Forensics VI. DigitalForensics 2010, Hong Kong, China, January 4–6, 2010. (pp. 315). Springer. https://doi.org/10.1007/978-3-642-15506-2_1Google Scholar
Pomerantsev, P. (2015, January 4). Inside Putin’s information war. Politico. www.politico.com/magazine/story/2015/01/putin-russia-tv-113960Google Scholar
Pomerantsev, P. (2019, July 27). The disinformation age: A revolution in propaganda. Guardian. www.theguardian.com/books/2019/jul/27/the-disinformation-age-a-revolution-in-propagandaGoogle Scholar
Poole, A. H. (2020). An ethical quandary that dare not speak its name: Archival privacy and access to queer erotica. Library & Information Science Research, 42(2). https://doi.org/10.1016/j.lisr.2020.101020Google Scholar
Poon, J., & Dryja, T. (2016). The bitcoin lightning network: Scalable off-chain instant payments [White paper]. Lightning Network. www.bitcoinlightning.com/wp-content/uploads/2018/03/lightning-network-paper.pdfGoogle Scholar
Poovey, M. (1998). A history of the modern fact: Problems of knowledge in the sciences of wealth and society. University of Chicago Press.Google Scholar
Popovski, V. (2010). Conclusion: Trust is a must in government. In Cheema, G. S. & Popovski, V. (Eds.), Building trust in government: Innovations in governance reform in Asia (pp. 234239). United Nations University Press. https://collections.unu.edu/eserv/UNU:2502/ebrary9789280811896.pdfGoogle Scholar
Popper, N. (2016a). Digital gold: Bitcoin and the inside story of the misfits and millionaires trying to reinvent money. Harper Paperbacks.Google Scholar
Popper, N. (2016b, January 14). A Bitcoin believer’s crisis of faith. New York Times. www.nytimes.com/2016/01/17/business/dealbook/the-bitcoin-believer-who-gave-up.htmlGoogle Scholar
Popper, N., & Lattman, P. (2013, April 11). Never mind Facebook; Winklevoss twins rule in digital money. New York Times. https://dealbook.nytimes.com/2013/04/11/as-big-investors-emerge-bitcoin-gets-ready-for-its-close-up/Google Scholar
Posetti, J. (2018). Combatting online abuse: When journalists and their sources are targeted. In Ireton, C. & Posetti, J. (Eds.) Journalism, fake news and disinformation: Handbook for journalism education and training (pp. 109120). UNESCO. https://en.unesco.org/sites/default/files/journalism_fake_news_disinformation_print_friendly_0.pdfGoogle Scholar
Posetti, J., & Matthews, A. (2018). A short guide to the history of “fake news” and disinformation. International Center for Journalists. www.icfj.org/sites/default/files/2018–07/A%20Short%20Guide%20to%20History%20of%20Fake%20News%20and%20Disinformation_ICFJ%20Final.pdfGoogle Scholar
Prasajo, E. C. D. (2015, April 21). Strengthening innovation, prioritization, informed decision-making and the integration of policy development processes for enhanced impact (E/C.16/2015/4) [Report presentation]. 14th Session of the United Nations Committee of Experts on Public Administration, New York. https://undocs.org/E/C.16/2015/4Google Scholar
Prat, N. & Madnick, S. (2007). Evaluating and aggregating data believability across quality sub-dimensions and data lineage (ESD Working Paper 2008–05). Massachusetts Institute of Technology: Engineering Systems Division. http://hdl.handle.net/1721.1/102858Google Scholar
Prat, N., & Madnick, S. (2008). Measuring data believability: A provenance approach. In Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008), Waikoloa, HI, USA, January 7–10, 2008 (pp. 393393). IEEE. https://doi.org/10.1109/HICSS.2008.243Google Scholar
Proctor, R. N., & Schiebinger, L. (Eds.) (2008). Agnotology: The making & unmaking of ignorance. Stanford University Press.Google Scholar
Putnam, R. D. (2000). Bowling alone: The collapse and revival of American community. Simon & Schuster.Google Scholar
Rabinowitz, M., Latella, L., Stern, C., & Jost, J. T. (2016). Beliefs about childhood vaccination in the United States: Political ideology, false consensus, and the illusion of uniqueness. PLoS ONE, 11(7). https://doi.org/10.1371/journal.pone.0158382Google Scholar
Raj, J., & Owen, M. (2003). BPMN and business process management: Introduction to the new business process modeling standard. Popkin Software. Available at: www.omg.org/bpmn/Documents/6AD5D16960.BPMN_and_BPM.pdfGoogle Scholar
Ram, S., & Liu, J. (2006). Understanding the semantics of data provenance to support active conceptual modeling. In Chen, P. P., & Wong, L. Y. (Eds.), Lecture notes in computer science, vol. 4512: Active conceptual modeling of learning: Next generation learning-base system development, Proceedings of Active Conceptual Modeling-Learning (ACM-L) Workshop, Tucson, AZ, USA, November 8, 2006 (pp. 1729). Springer. https://doi.org/10.1007/978-3-540-77503-4_3Google Scholar
Rampton, S. (2005, March 26). Fake news? We told you so, ten years ago. PR Watch. www.prwatch.org/news/2005/03/3518/fake-news-we-told-you-so-ten-years-agoGoogle Scholar
Rashidian, N. (2020, December 17). Platforms and publishers: The great pandemic funding push. Columbia Journalism Review. www.cjr.org/tow_center_reports/platforms-publishers-pandemic-funding-news.phpGoogle Scholar
Ratzan, L. (2004). Understanding information systems: What they do and why we need them. American Library Association.Google Scholar
Recker, J., Indulska, M., Green, P., Burton-Jones, A., & Weber, R. (2019). Information systems as representations: A review of the theory and evidence. Journal of the Association for Information Systems, 20(6), 735786. https://doi.org/10.17705/1jais.00550Google Scholar
Reynolds, L. D., & Wilson, N. G. (1991). Scribes and scholars: A guide to the transmission of Greek and Latin literature (3rd ed.). Oxford University Press.Google Scholar
Ridge, M. [@mia_out], Scheltjens, S. [@saschel], Barnes, G. [@barnaclebarnes], @thesherrin, Clancy, E. [@clancynewyork], Ryan, T. R. [@TinaRiversRyan], Rodley, E. [@erodley], Houben, R. [@shadur], Lih, A. [@fuzheado], & @WAHa_06x36. (2021, March 13–14).The point of open access for digitised collections was to let a thousand flowers bloom … [Twitter thread]. Twitter. https://twitter.com/mia_out/status/1370728396599230464?s=21Google Scholar
Riedl, M. J., Whipple, K. N, & Wallace, R. (2021). Antecedents of support for social media content moderation and platform regulation: The role of presumed effects on self and others. Information, Communication & Society. https://doi.org/10.1080/1369118X.2021.1874040Google Scholar
Rochefort, A. (2020). Regulating social media platforms: A comparative policy analysis. Communication Law and Policy, 25(2), 225260. https://doi.org/10.1080/10811680.2020.1735194Google Scholar
Roeder, J., Eppard, P., Underwood, W., & Lauriault, T. P. (2008). Part three: Authenticity, reliability and accuracy of digital records in the artistic, scientific and governmental sectors. Domain 2 task force report. In Duranti, L. & Preston, R. (Eds.), International research on permanent authentic records in electronic systems (InterPARES) 2: Experiential, interactive and dynamic records (pp. 120159). Associazione Nazionale Archivistica Italiana. www.interpares.org/ip2/display_file.cfm?doc=ip2_book_part_3_domain2_task_force.pdfGoogle Scholar
Rogers, C. (2015). Virtual authenticity: Authenticity of digital records from theory to practice. [Doctoral dissertation, University of British Columbia]. http://hdl.handle.net/2429/52722Google Scholar
Roon, M. (2016, June 2). Blockchains – A new source of truth. LinkedIn. www.linkedin.com/pulse/blockchains-new-source-truth-micha-roon/Google Scholar
Rorty, R. M. (Ed.). (1992). The linguistic turn: Essays in philosophical method. University of Chicago Press.Google Scholar
Rosenfeld, M. (2012). Overview of colored coins. Bitcoil. https://bitcoil.co.il/BitcoinX.pdfGoogle Scholar
Rosenthol, L., Parsons, A., Scouten, E., Aythora, J., MacCormack, B., England, P., Levallee, M., Dotan, J., Hanna, S., Farid, H., & Gregory, S. (2020, August). The content authenticity initiative: Setting the standard for digital content attribution. Coalition for Content Provenance and Authenticity. https://c2pa.org/about/resourcesGoogle Scholar
Rosling, H. (2018). Factfulness: Ten reasons we’re wrong about the world – and why things are better than you think. Flatiron Books.Google Scholar
Rouhani, S., & Deters, R. (2019). Security, performance, and applications of smart contracts: A systematic survey. IEEE Access, 7, 5075950779. https://doi.org/10.1109/ACCESS.2019.2911031Google Scholar
Rousseau, D. M., Sitkin, S. B., Burt, R. S., & Camerer, C. (1998). Not so different after all: A cross-discipline view of trust. Academy of Management Review, 23(3), 393404. https://doi.org/10.5465/amr.1998.926617Google Scholar
Ruchansky, N., Seo, S., & Liu, Y. (2017). CSI: A hybrid deep model for fake news detection. In CIKM ’17: Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, Singapore, November 6–10, 2017 (pp. 797806). Association for Computing Machinery. https://doi.org/10.1145/3132847.3132877Google Scholar
Saberi, S., Kouhizadeh, M., Sarkis, J., & Shen, L. (2019). Blockchain technology and its relationships to sustainable supply chain management. International Journal of Production Research, 57(7), 21172135. https://doi.org/10.1080/00207543.2018.1533261Google Scholar
Saha, B., & Srivastava, D. (2014). Data quality: The other face of big data. In 2014 IEEE 30th International Conference on Data Engineering (ICDE), Chicago, IL, USA, March 31–April 4, 2014, conference proceedings (pp. 12941297). IEEE.Google Scholar
Sanitt, A. (2021, February). What sort of property is a cryptoasset? Norton Rose Fulbright. www.nortonrosefulbright.com/en/knowledge/publications/26ade77a/what-sort-of-property-is-a-cryptoasset#1Google Scholar
Saracevic, T. (2017). Information Science. In MacDonald, J. D. & Levine-Clark, M. (Eds.), Encyclopedia of library and information science (4th ed.) (pp. 22162231). CRC Press.Google Scholar
Sas, C., & Khairuddin, I. E. (2017). Design for trust: An exploration of the challenges and opportunities of bitcoin users. In Proceedings of the 2017 ACM SIGCHI conference on Human Factors in Computing Systems, CHI’17, Denver, CO, USA, May 6 –11, 2017 (pp. 64996510). Association for Computing Machinery.Google Scholar
Scaling Bitcoin. (n.d.). Scaling Bitcoin workshops for the engineering and academic community. Scaling Bitcoin. https://scalingbitcoin.orgGoogle Scholar
Schellenberg, T. R. (1956). Modern archives. University of Chicago Press.Google Scholar
Schick, N. (2020). Deepfakes: The coming infocalypse. Twelve.Google Scholar
Searle, J. R. (1985). Expression and meaning: Studies in the theory of speech acts. Cambridge University Press.Google Scholar
Searle, J. R. (1999). Mind, language and society: Philosophy in the real world. Basic Books.Google Scholar
Searle, J. R. (2010). Making the social world: The structure of human civilization. Oxford University Press.Google Scholar
Segregated Witness. (2021, March 14). Bitcoin Wiki. https://en.bitcoin.it/wiki/Segregated_WitnessGoogle Scholar
Seligman, A. B. (1997). The problem of trust. Princeton University Press.Google Scholar
Shankaranarayanan, G., & Blake, R. (2017). From content to context: The evolution and growth of data quality research. Journal of Data and Information Quality, 8(2), Article 9. https://doi.org/10.1145/2996198Google Scholar
Shankaranarayanan, G., Iyer, B., & Stoddard, D. (2012). Quality of social media data and implications of social media for data quality. In Proceedings of the 17th International Conference on Information Quality, IQ 2012, Paris, France, November 16–17, 2012 (pp. 311325). MIT.Google Scholar
Shapin, S. (1994). A social history of truth. Chicago University Press.Google Scholar
Shera, J. H. (1961). What is librarianship? Louisiana Library Association, 24(3), 9597.Google Scholar
Shera, J. H. (1968). An epistemological foundation for library science. In Montgomery, E. B. (Ed.), The foundations of access to knowledge: A symposium. Syracuse University Press.Google Scholar
Shera, J. H. (1972). The foundations of education for librarianship. Becker and Hayes.Google Scholar
Shrestha, A. K., & Vassileva, A. (2019) User acceptance of usable blockchain-based research data sharing system: An extended TAM-based study. In 2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), Los Angeles, CA, USA, December 12–14, 2019 (pp. 203208). IEEE.Google Scholar
Siegel, D. (2016, June 19). Understanding the DAO hack for journalists. Medium. https://pullnews.medium.com/understanding-the-dao-hack-for-journalists-2312dd43e993Google Scholar
Silverman, C. (2016, November 16). This analysis shows how viral fake election news stories outperformed real news on Facebook. BuzzFeed News. www.buzzfeednews.com/article/craigsilverman/viral-fake-election-news-outperformed-real-news-on-facebookGoogle Scholar
Simmhan, Y. L., Plale, B., & Gannon, D. (2005). A survey of data provenance in e-science. ACM SIGMOD Record, 34(3), 3136. https://doi.org/10.1145/1084805.1084812Google Scholar
Simon, H. A. (2013). Administrative behavior (4th ed.). Simon and Schuster.Google Scholar
Singh, A., & Chatterjee, K. (2017). Cloud security issues and challenges: A survey. Journal of Network and Computer Applications, 79, 88115. https://doi.org/10.1016/j.jnca.2016.11.027Google Scholar
Skarpelis, A. (2019). Life on file: archival epistemology as theory. Comparative and Historical Sociology. http://chs.asa-comparative-historical.org/life-on-file-archival-epistemology-as-theoryGoogle Scholar
Skarpelis, A. K. M. (2020). Life on file: Archival epistemology and theory. Qualitative Sociology, 43, 385405. https://doi.org/10.1007/s11133-020-09460-1Google Scholar
Smart, P. R., & Shadbolt, N. R. (2015). Social machines. In Encyclopedia of information science and technology (3rd ed.) (pp. 68556862). IGI Global.Google Scholar
Smit, F., Glaudemans, A., & Jonker, R. (Eds.). (2017). Archives in liquid times. Stichting Archiefpublicaties.Google Scholar
Smith, A. (1776). The wealth of nations. W. Strahan & T. Cadell.Google Scholar
Smith, D. E. (1990). Texts, facts and femininity: Exploring the relations of ruling. Routledge.Google Scholar
Sozeri, E. K. (2020, February 28). How the alt-right’s PizzaGate conspiracy hid real scandal in Turkey. daily dot. www.dailydot.com/debug/pizzagate-alt-right-turkey-trolls-child-abuseGoogle Scholar
Spinney, L. (2017). How Facebook, fake news and friends are warping your memory. Nature, 543 (7644). www.nature.com/news/how-facebook-fake-news-and-friends-are-warping-your-memory-1.21596Google Scholar
Stančić, H. (Ed.). (2020). Trust and records in an open digital environment. Routledge.Google Scholar
State of Arizona. (2017). Signatures; Electronic Transactions; Blockchain Technology, HB 2417, 53rd Legislature, 1st Regular Session (AZ 2017). https://legiscan.com/AZ/text/HB2417/id/1588180/Arizona-2017-HB2417-Chaptered.htmlGoogle Scholar
State of Vermont. (2016). An Act Relating to Miscellaneous Economic Development Provisions, (Act 157), 2015/2016 Session (VT 2016). https://legislature.vermont.gov/Documents/2016/Docs/ACTS/ACT157/ACT157%20As%20Enacted.pdfGoogle Scholar
Steele, C. W. J., Hannigan, T. R., Glaser, V. L., Toubiana, M., & Gehman, J. (2020). Macrofoundations: Exploring the institutionally situated nature of activity. In Steele, C. W. J., Hannigan, T. R.. Glaser, V. L., Toubiana, M., & Gehman, J. (Eds.), Macrofoundations: Exploring the institutionally situated nature of activity (Research in the sociology of organizations, vol. 68) (pp. 316). Emerald Publishing.Google Scholar
Stenberg, G. (2006). Conceptual and perceptual factors in the picture superiority effect. European Journal of Cognitive Psychology, 18(6), 813847. https://doi.org/10.1080/09541440500412361Google Scholar
Stoler, A. (2002). Colonial archives and the arts of governance. Archival Science, 2(1/2), 87109. https://doi.org/10.1007/BF02435632Google Scholar
Stoler, A. L. (2010). Along the archival grain: Epistemic anxieties and colonial common sense. Princeton University Press.Google Scholar
Storch, S. (1998). Diplomatics: Modern archival method or medieval artifact. American Archivist, 61(2), 365383. https://doi.org/10.17723/aarc.61.2.h0358316qn85p2lmGoogle Scholar
Straits Times. (2017, January 6). Indonesia to set up agency to combat fake news. Straits Times. www.straitstimes.com/asia/se-asia/indonesia-to-set-up-agency-to-combat-fake-news-0Google Scholar
Straub, D. W. (2012). Editor’s comments: Does MIS have native theories? MIS Quarterly, 36(2), iiixii. https://doi.org/10.2307/41703457Google Scholar
Suisani, A., Clifford, A., Stone, A., Beijnoff, E., Rizun, P., Tschipper, P., Federova, A., Feng, C., Lemieux, V., & Matthews, S. (2017). Measuring maximum sustained transaction throughput on a global network of Bitcoin nodes. Paper presented at Scaling Bitcoin 2017 “Scaling the Edge,” November 4–5, 2017, Stanford, CA, USA.Google Scholar
Sullivan, H. (2015, February 9). What can governments and leaders do when trust evaporates? The Conversation. http://theconversation.com/what-can-governments-and-leaders-do-when-trust-evaporates-37333Google Scholar
Sunarya, P. A., Henderi, Sulistiawati, Khoirunisa, A., & Nursaputri, P. (2020). Blockchain family deed certificate for privacy and data security. In ICIC ’20: Proceeding of the 5th International Conference on Informatics and Computing, Gorontalo, Indonesia, November 3–4, 2020 (pp. 361365). IEEE. https://doi.org/10.1109/ICIC50835.2020.9288528Google Scholar
Sundar, S. S. (2008). The MAIN model: A heuristic approach to understanding technology effects on credibility. In Metzger, M. J. & Flanagin, A. J. (Eds.), Digital media, youth, and credibility (pp. 73100). John D. MacArthur Foundation Series on Digital Media and Learning. MIT Press. https://doi.org/10.1162/dmal.9780262562324.073Google Scholar
Swan, M. (2015). Blockchain: Blueprint for a new economy. O’Reilly.Google Scholar
Sward, A., Vecna, I., & Stonedahl, F. (2018). Data insertion in bitcoin’s blockchain. Ledger, 3. https://doi.org/10.5195/ledger.2018.101Google Scholar
Szabo, N. (1994). Smart contract. PiPiWiki. https://pipiwiki.com/wiki/Agoric_computingGoogle Scholar
Szabo, N. (1997). Formalizing and securing relationships on public networks. First Monday. https://firstmonday.org/ojs/index.php/fm/article/download/548/469Google Scholar
Szabo, N. (2017, February 9). Money, blockchains, and social scalability. Unenumerated. http://unenumerated.blogspot.com/2017/02/money-blockchains-and-social-scalability.htmlGoogle Scholar
Szalachowski, P. (2019). PADVA: A blockchain-based TLS notary service. In Proceedings of the 2019 IEEE 25th International Conference on Parallel and Distributed Systems (ICPADS 2019), Tianjin, China, December 4–6,2019 (pp. 836843). IEEE. https://doi.org/10.1109/ICPADS47876.2019.00124Google Scholar
Tandoc Jr, E. C., Lim, Z. W., & Ling, R. (2018). Defining “fake news”: A typology of scholarly definitions. Digital Journalism, 6(2), 137153. https://doi.org/10.1080/21670811.2017.1360143Google Scholar
Tapscott, D., & Tapscott, A. (2016). Blockchain revolution: How the technology behind bitcoin is changing money, business, and the world. Penguin.Google Scholar
Taylor, C. (2004). What is a “social imaginary”? In Taylor, C., Modern social imaginaries (pp. 2330). Duke University Press.Google Scholar
Theiss-Morse, E., & Hibbing, J. R. (2005). Citizenship and civic engagement. Annual Review of Political Science, 8, 227249. https://doi.org/10.1146/annurev.polisci.8.082103.104829Google Scholar
Thielman, S. (2016, August 22). Same Russian hackers likely breached the Olympic drug-testing agency and DNC. Guardian. www.theguardian.com/technology/2016/aug/22/russian-hackers-world-anti-doping-agency-dnc-hack-fancy-bearGoogle Scholar
Thomassen, T. (2015). Archival science. In Duranti, L. & Franks, P. C., Encylopedia of archival science (pp. 8486). Rowman & Littlefield.Google Scholar
Tobin, A., & Reed, D. (2016). Inevitable rise of self-sovereign identity. Sovrin Foundation. https://sovrin.org/library/inevitable-rise-of-self-sovereign-identity/Google Scholar
Tout, T. F. (1919). Mediaeval forgers and forgeries. Bulletin of the John Rylands Library, 5(3–4), 208234. www.jstor.org/stable/10.2307/community.28210958Google Scholar
Treat, D. (2016, September 20/21). Accenture: Absolute immutability will slow blockchain progress. Coindesk. www.coindesk.com/absolute-immutability-will-slow-permissioned-blockchain-progressGoogle Scholar
Treisman, A. (1985). Preattentive processing in vision. Computer Vision, Graphics, and Image Processing, 31(2), 156177. https://doi.org/10.1016/S0734-189X(85)80004-9Google Scholar
Truby, J. (2018). Decarbonizing Bitcoin: Law and policy choices for reducing the energy consumption of blockchain technologies and digital currencies. Energy Research & Social Science, 44, 399410. https://doi.org/10.1016/j.erss.2018.06.009CrossRefGoogle Scholar
Turner, F. C., & Martz, J. D. (1997). Institutional confidence and democratic consolidation in Latin America. Studies in Comparative International Development, 32(3), 6584. https://doi.org/10.1007/BF02687331Google Scholar
Turner, S. (2019). The philosophical origins of classical sociology of knowledge. In Fricker, M., Graham, P. J., Henderson, D., & Pedersen, N .J. L. L. (Eds.), The Routledge handbook of social epistemology (pp. 3139). Routledge.Google Scholar
Tworek, H., & Leerssen, P. (2019). An analysis of Germany’s NetxDG law. Transatlantic High Level Working Group on Content Moderation Online and Freedom of Expression. www.ivir.nl/publicaties/download/NetzDG_Tworek_Leerssen_April_2019.pdfGoogle Scholar
Uscinski, J. E. (2015). The epistemology of fact checking (is still naìve): Rejoinder to Amazeen. Critical Review, 27(2), 243252. https://doi.org/10.1080/08913811.2015.1055892CrossRefGoogle Scholar
Uscinski, J. E., & Butler, R. W. (2013). The epistemology of fact checking. Critical Review, 25(2), 162180. https://doi.org/10.1080/08913811.2013.843872Google Scholar
Vaccari, C., & Chadwick, A. (2020). Deepfakes and disinformation: Exploring the impact of synthetic political video on deception, uncertainty, and trust in news. Social Media + Society, 6(1). https://doi.org/10.1177/2056305120903408Google Scholar
Vaidhyanathan, S. (2012). The Googlization of everything (and why we should worry). University of California Press.Google Scholar
van Bussel, G-J. (2017). The theoretical framework of the “archive-as-is.” An organization oriented view on archives. Part I. Setting the stage: Enterprise information management and archival theories. In Smit, F., Glaudemans, A., & Jonker, R. (Eds.), Archives in liquid times (pp. 1741). Stichting Archiefpublicaties.Google Scholar
Van der Linden, C. (2020, August 12). Canada is not immune to the politics of coronavirus masks. The Conversation. https://theconversation.com/canada-is-not-immune-to-the-politics-of-coronavirus-masks-144110Google Scholar
Van de Walle, S., Van Roosbroek, S., & Bouckaert, G. (2008). Trust in the public sector: Is there any evidence for a long-term decline? International Review of Administrative Sciences, 74(1), 4764. https://doi.org/10.1177/0020852307085733Google Scholar
van Elswyk, P. (2019). Testimony and grammatical evidentials. In Fricker, M., Graham, P. J., Henderson, D., & Pedersen, N. J. L. L. (Eds.), The Routledge handbook of social epistemology (pp. 135144). Routledge.Google Scholar
van Ruth, S. M., Luning, P. A., Silvis, I. C. J., Yang, Y., & Huisman, W. (2018). Differences in fraud vulnerability in various food supply chains and their tiers. Food Control, 84, 375381. https://doi.org/10.1016/j.foodcont.2017.08.020Google Scholar
van Wirdum, A. (2017, August 23). The long road to SegWit: How Bitcoin’s biggest protocol upgrade became reality. Bitcoin Magazine. https://bitcoinmagazine.com/articles/long-road-segwit-how-bitcoins-biggest-protocol-upgrade-became-realityGoogle Scholar
Varol, O., Ferrara, E., Menczer, F., & Flammini, A. (2017). Early detection of promoted campaigns on social media. EPJ Data Science, 6(1). https://doi.org/10.1140/epjds/s13688-017-0111-yGoogle Scholar
Vigna, P., & Casey, M. J. (2018). The truth machine: The blockchain and the future of everything. Picador.Google Scholar
Vincent, J. (2018, August 23). Browser plug-ins that spot fake news show the difficulty of tackling the “information apocalypse.” The Verge. www.theverge.com/2018/8/23/17383912/fake-news-browser-plug-ins-ai-information-apocalypseGoogle Scholar
Vivek, S. K., Yashank, R. S., Prashanth, Y., Yashas, N., & Namratha, M. (2020). E-voting System using Hyperledger Sawtooth. In 2020 International Conference on Advances in Computing, Communication & Materials (ICACCM), Dehradun, India, August 21–22, 2020 (pp. 2935). IEEE. https://doi.org/10.1109/ICACCM50413.2020.9212945Google Scholar
Vogels, E. A., Perrin, A., & Anderson, M. (2020, August 19). Most Americans think social media sites censor political viewpoints. Pew Research Center. www.pewresearch.org/internet/2020/08/19/most-americans-think-social-media-sites-censor-political-viewpointsGoogle Scholar
Von Bertalanffy, L. (1950). An outline of general system theory. British Journal for the Philosophy of Science, 1(2), 134165. https://doi.org/10.1093/bjps/I.2.134Google Scholar
Von Bertalanffy, L. (1968). General system theory: Foundations, development, applications. Braziller.Google Scholar
von Ranke, L. (1824) Die Geschichten der romanischen und germanischen Völker von 1494 bis 1535 [The history of the Latin and Teutonic nations, 1494–1535]. G. Reimer.Google Scholar
Voskobojnikov, A., Obada-Obieh, B., Huang, Y., & Beznosov, K. (2020). Surviving the cryptojungle: Perception and management of risk among North American cryptocurrency (non) users. In Bonneau, J. & Heninger, N. (Eds.), Lecture notes in computer science, vol. 12059: Financial Cryptography and Data Security, 24th International Conference, FC 2020, Koto Kinabalu, Malaysia, February 10–14, 2020, revised selected papers (pp. 595614). Springer.Google Scholar
Vosoughi, S., Roy, D., & Aral, S. (2018). The spread of true and false news online. Science, 359(6380), 11461151. https://doi.org/10.1126/science.aap9559Google Scholar
WADA [World Anti-Doping Agency]. (2016, September 23). Cyber hack update: Data leak concerning 41 athletes from 13 countries and 17 sports. World Anti-Doping Agency. www.wada-ama.org/en/media/news/2016–09/cyber-hack-update-data-leak-concerning-41-athletes-from-13-countries-and-17Google Scholar
Walch, A. (2015). The bitcoin blockchain as financial market infrastructure: A consideration of operational risk. New York University Journal of Legislation & Public Policy, 18, 837893. Available at SSRN: https://ssrn.com/abstract=2579482Google Scholar
Walch, A. (2017a). The path of the blockchain lexicon (and the law). Review of Banking & Financial Law, 36(2), 713765. www.bu.edu/rbfl/files/2017/09/p729.pdfGoogle Scholar
Walch, A. (2017b). Blockchain’s treacherous vocabulary: One more challenge for regulators. Journal of Internet Law, 21(2),1, 916. Available at SSRN: https://ssrn.com/abstract=3019328Google Scholar
Walch, A. (2018). Open-source operational risk: should public blockchains serve as financial market infrastructures? In Chuen, D. L. K. & Deng, R. (Eds.), Handbook of blockchain, digital finance, and inclusion, vol. 2: ChinaTech, Mobile Security, and Distributed Ledger (pp. 243269). Academic Press.CrossRefGoogle Scholar
Walter, N., Cohen, J., Holbert, R. L., & Morag, Y. (2020). Fact-checking: A meta-analysis of what works and for whom. Political Communication, 37(3), 350375. https://doi.org/10.1080/10584609.2019.1668894Google Scholar
Wand, Y., & Weber, R. (1995). On the deep structure of information systems. Information Systems Journal, 5(3), 203223. https://doi.org/10.1111/j.1365-2575.1995.tb00108.xGoogle Scholar
Wang, C-C. (2020). Fake news and related concepts: Definitions and recent research development. Contemporary Management Research, 16(3), 145174. https://doi.org/10.7903/cmr.20677Google Scholar
Wang, S., Zhang, D., & Zhang, Y. (2019). Blockchain-based personal health records sharing scheme with data integrity verifiable. IEEE Access, 7, 102887102901. 10.1109/ACCESS.2019.2931531Google Scholar
Wang, X., Li, J., Kuang, X., Tan, Y-A., & Li, J. (2019). The security of machine learning in an adversarial setting: A survey. Journal of Parallel and Distributed Computing, 130, 1223. https://doi.org/10.1016/j.jpdc.2019.03.003Google Scholar
Warburton, N. (Ed.) (2018, March 14). Say goodbye to the information age: It’s all about reputation now. Aeon. https://aeon.co/ideas/say-goodbye-to-the-information-age-its-all-about-reputation-nowGoogle Scholar
Ward, M., Grinstein, G., & Keim, D. (2010), Interactive data visualization: Foundations, techniques, and applications. A K Peters.Google Scholar
Wardle, C. (2018). The need for smarter definitions and practical, timely empirical research on information disorder. Digital Journalism, 6(8), 951963. https://doi.org/10.1080/21670811.2018.1502047CrossRefGoogle Scholar
Wardle, C. (2019). Misinformation has created a new world disorder. Scientific American, September, 88–91. www.scientificamerican.com/article/misinformation-has-created-a-new-world-disorderGoogle Scholar
Wardle, C., & Derakhshan, H. (2017). Information disorder: Toward an interdisciplinary framework for research and policy making (Report No. DGI (2017) 09). Council of Europe. https://tverezo.info/wp-content/uploads/2017/11/PREMS-162317-GBR-2018-Report-desinformation-A4-BAT.pdfGoogle Scholar
Warner, M. (2012). Cybersecurity: A pre-history. Intelligence and National Security, 27(5), 781799. https://doi.org/10.1080/02684527.2012.708530Google Scholar
Warren, M. E. (2006). Democracy and deceit: Regulating appearances of corruption. American Journal of Political Science, 50(1), 160174. www.jstor.org/stable/3694263Google Scholar
Weeks, B. E. (2015) Emotions, partisanship, and misperceptions: How anger and anxiety moderate the effect of partisan bias on susceptibility to political misinformation. Journal of Communication, 65(4), 699719. https://doi.org/10.1111/jcom.12164Google Scholar
Weinberger, D. (2007). Everything is miscellaneous: The power of the new digital disorder. Macmillan.Google Scholar
Wempen, F. (2014). Computing fundamentals: IC3 edition. Wiley.Google Scholar
Wendling, M. (2016, December 22). The saga of “Pizzagate”: The fake story that shows how conspiracy theories spread. BBC News. www.bbc.com/news/blogs-trending-38156985Google Scholar
Werbach, K. (2018). Trust, but verify: Why the blockchain needs the law. Berkeley Technology Law Journal, 33(2), 487550. http://dx.doi.org/10.15779/Z38H41JM9 NGoogle Scholar
Werbach, K. (2019). Summary: Blockchain, the rise of trustless trust? Wharton PPI B-School for Public Policy Seminar Summaries. https://repository.upenn.edu/cgi/viewcontent.cgi?article=1002&context=pennwhartonppi_bschoolGoogle Scholar
West, D. M. (2017, December 18). Report: How to combat fake news and disinformation. Brookings Institute. www.brookings.edu/research/how-to-combat-fake-news-and-disinformationGoogle Scholar
Wiggers, K. (2019, December 11). Facebook, Microsoft, and others launch deepfake detection challenge. Venture Beat, The Machine. https://venturebeat.com/2019/12/11/facebook-microsoft-and-others-launch-deepfake-detection-challengeGoogle Scholar
Williams, A. (2018, February 9). 2004: When fake news was cool. New York Times. www.nytimes.com/2018/02/09/style/2004-when-fake-news-was-cool.htmlGoogle Scholar
Williams, C. (2005). Diplomatic attitudes: From Mabillon to metadata. Journal of the Society of Archivists, 26(1), 124. http://dx.doi.org/10.1080/00039810500047417Google Scholar
Williamson, O. E. (1993). Calculativeness, trust, and economic organization. Journal of Law and Economics, 36(1), 453486. https://doi.org/10.1086/467284Google Scholar
Wilson, M. I., Kellerman, A., & Corey, K. E. (2013). Global information society: Technology, knowledge, and mobility. Rowman & Littlefield.Google Scholar
Winner, L. (1978). Autonomous technology: Technics-out-of-control as a theme in political thought. MIT Press.Google Scholar
Winner, L. (1985). Do artifacts have politics? In Mackenzie, D. & Wajcman, J. (Eds.), The social shaping of technology. Open University Press.Google Scholar
Witkowski, T. H. (1991). Promise them anything: A cultural history of cigarette advertising health claims. Current Issues and Research in Advertising, 13(1–2), 393409. https://doi.org/10.1080/01633392.1991.10504973Google Scholar
Witten, I. B., & Knudsen, E. I. (2005). Why seeing is believing: Merging auditory and visual worlds. Neuron, 48(3), 489496. https://doi.org/10.1016/j.neuron.2005.10.020Google Scholar
Wolfson, R. (2020, June 25). From sea to table: Norway’s seafood industry hooks into IBM blockchain. CoinTelegraph. https://cointelegraph.com/news/from-sea-to-table-norways-seafood-industry-hooks-into-ibm-blockchainGoogle Scholar
Wood, G. (2016). Polkadot: Vision for a heterogeneous multi-chain framework [White Paper]. Polkadot. https://polkadot.network/PolkaDotPaper.pdfGoogle Scholar
Woodall, A., & Ringel, S. (2020). Blockchain archival discourse: Trust and the imaginaries of digital preservation. New Media & Society, 22(12), 22002217. https://doi.org/10.1177/1461444819888756Google Scholar
Woolley, S. C., & Guilbeault, D. R. (2017). Computational propaganda in the United States of America: Manufacturing consensus online. (Computational Propaganda Research Project Working Paper No. 2017.5). University of Oxford. https://blogs.oii.ox.ac.uk/politicalbots/wp-content/uploads/sites/89/2017/06/Comprop-USA.pdfGoogle Scholar
Wu, T. (2017). The attention merchants: The epic scramble to get inside our heads. Vintage.Google Scholar
Wüst, K., & Gervais, A. (2018). Do you need a blockchain? In 2018 Crypto Valley Conference on Blockchain Technology (CVCBT), Zug, Switzerland, June 20–22, 2018 (pp. 4554). IEEE.Google Scholar
Xiao, L., & Chen, S. (2020). Misinformation in the Chinese Weibo. In Meiselwitz, G. (Ed.), Lecture notes in computer science, vol. 12194: 12th International Conference on Social Computing and Social Media (SCSM 2020), held as part of the 22nd International Conference on Human-Computer Interaction (HCII 2020), Copenhagen, Denmark, July 19–24, 2020 (pp. 407418). Springer. https://doi.org/10.1007/978-3-030-49570-1_28Google Scholar
Xie, R., Wang, Y., Tan, M., Zhu, W., Yang, Z., Wu, J., & Jeon, G. (2020). Ethereum-blockchain-based technology of decentralized smart contract certificate system. IEEE Internet of Things Magazine, 3(2), 4450. https://doi.org/10.1109/IOTM.0001.1900094Google Scholar
Yang, W., Aghasian, E., Garg, S., Herbert, D., Disiuta, L., & Kang, B. (2019). A survey on blockchain-based internet service architecture: Requirements, challenges, trends, and future. IEEE Access, 7, 7584575872. https://doi.org/10.1109/ACCESS.2019.2917562Google Scholar
Yang, X., & Li, W. (2020). A zero-knowledge-proof-based digital identity management scheme in blockchain. Computers & Security, 99. https://doi.org/10.1016/j.cose.2020.102050Google Scholar
Yang, X., Pei, X., Wang, M., Li, T., & Wang, C. (2020). Multi-replica and multi-cloud data public audit scheme based on blockchain. IEEE Access, 8, 144809144822. https://doi.org/10.1109/ACCESS.2020.3014510Google Scholar
Yeo, G. (2007). Concepts of record (1): Evidence, information, and persistent representations. American Archivist, 70(2), 315343. www.jstor.org/stable/40294573Google Scholar
Yeo, G. (2008). Concepts of record (2): Prototypes and boundary objects. American Archivist, 71(1), 118143. www.jstor.org/stable/40294496Google Scholar
Yeo, G. (2012). Bringing things together: Aggregate records in a digital age. Archivaria, 74, 4391. https://archivaria.ca/index.php/archivaria/article/view/13407Google Scholar
Yeo, G. (2013). Trust and context in cyberspace. Archives and Records, 34(2), 214234. https://doi.org/10.1080/23257962.2013.825207Google Scholar
Yeo, G. (2015). Record(s). In Duranti, L. & Franks, P. C. (Eds.), Encyclopedia of archival science (pp. 315319). Rowman & Littlefield.Google Scholar
Yeo, G. (2017). Information, records, and the philosophy of speech acts. In Smit, F., Glaudemans, A., & Jonker, R. (Eds.), Archives in liquid times (pp. 92118). Stichting Archiefpublicaties.Google Scholar
Yeo, G. (2018). Records, information and data: Exploring the role of record-keeping in an information culture. Facet Publishing.Google Scholar
Yeung, K. (2019). Regulation by blockchain: The emerging battle for supremacy between the code of law and code as law. Modern Law Review, 82(2), 207239. www.modernlawreview.co.uk/march-2019/regulation-blockchain-emerging-battle-supremacy-code-law-code-law/Google Scholar
Yocom-Piatt, J. (2015, December 15). Decred: Rethink digital currency. Company Zero. https://blog.companyzero.com/2015/12/decred-rethink-digital-currency/Google Scholar
Yutia, S. N., & Rahardjo, B. (2019). Design of a blockchain-based e-tendering system: A case study in LPSE. In Proceedings: ICISS 2019: International Conference on ICT for Smart Society 2019: Innovation and Transformation Toward Smart Region, Bandung, Indonesia, November 19–20, 2019. IEEE. https://doi.org/10.1109/ICISS48059.2019.8969824Google Scholar
Zhang, L., & Clark, C. (Eds.). (2018). Affect, emotion, and rhetorical persuasion in mass communication. Routledge.Google Scholar
Zhang, X., & Ghorbani, A. A. (2020). An overview of online fake news: Characterization, detection and discussion. Information Processing & Management, 57(2). https://doi.org/10.1016/j.ipm.2019.03.004Google Scholar
Zhou, X., & Zafarani, R. (2020). A survey of fake news: Fundamental theories, detection methods, and opportunities. ACM Computing Surveys, 53(5), 140. https://doi.org/10.1145/3395046Google Scholar
Zhou, X., Zafarani, R., Shu, K., & Liu, H. (2019). Fake news: Fundamental theories, detection strategies and challenges. In WDSM’19: Proceedings of the Twelfth ACM international Conference on Web Search and Data Mining, Melbourne, VIC, Australia, February 11–15, 2019 (pp. 836837). Association for Computing Machinery.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • References
  • Victoria L. Lemieux, University of British Columbia, Vancouver
  • Book: Searching for Trust
  • Online publication: 01 April 2022
  • Chapter DOI: https://doi.org/10.1017/9781108877350.010
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • References
  • Victoria L. Lemieux, University of British Columbia, Vancouver
  • Book: Searching for Trust
  • Online publication: 01 April 2022
  • Chapter DOI: https://doi.org/10.1017/9781108877350.010
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • References
  • Victoria L. Lemieux, University of British Columbia, Vancouver
  • Book: Searching for Trust
  • Online publication: 01 April 2022
  • Chapter DOI: https://doi.org/10.1017/9781108877350.010
Available formats
×