The unintended effects of tamper-evident food closures
نویسندگان
چکیده
Restaurant-to-consumer food delivery has experienced disruption with the growth of third-party services such as DoorDash and Uber Eats. However, this platform-to-consumer method introduces increased opportunities for tampering contamination due to additional touchpoints in process. To mitigate these concerns, more restaurants are implementing tamper-evident closures seals attached containers used items. Drawing on signaling theory, we examine effect context through two experimental studies a focus group. Our results revealed negative willingness pay lowered quality evaluations, suggesting seal sends signals rather than intended message safety. This appears robust both beverages. We also demonstrate that consumers’ safety risk perception (FSRP) acts boundary condition, attenuating indirect high-FSRP consumers. • Significant pay. Food evaluations mediate Results replicated across live lab (N Study 1 =82; N 2 =243) experiments. attenuates
منابع مشابه
Tamper-Evident Complex Genomic Networks
Networks are important storage data structures now used to store personal information of individuals around the globe. With the advent of personal genome sequencing, networks are going to be used to store personal genomic sequencing of people. In contrast to social media networks, the importance of relationships in this genomic network is extremely significant. Losing connections between indivi...
متن کاملA Case for Tamper-Resistant and Tamper-Evident Computer Systems
Recent industrial efforts in architectural and system support for trusted computing still leave systems wide-open even to relatively simple and inexpensive hardware-based attacks. These attacks attempt to snoop or modify data transfer between various chips in a computer system such as between the processor and memory, and between processors in a multiprocessor interconnect network. Software sec...
متن کاملImplementing a Tamper-Evident Database System
Data integrity is an assurance that data has not been modified in an unknown or unauthorized manner. The goal of this paper is to allow a user to leverage a small amount of trusted client-side computation to achieve guarantees of integrity when interacting with a vulnerable or untrusted database server. To achieve this goal we describe a novel relational hash tree, designed for efficient databa...
متن کاملBasing Cryptographic Protocols on Tamper-Evident Seals
In this paper we attempt to formally study two very intuitive physical models: sealed envelopes and locked boxes, often used as illustrations for common cryptographic operations. We relax the security properties usually required from locked boxes (such as in bit-commitment protocols) and require only that a broken lock or torn envelope be identifiable to the original sender. Unlike the complete...
متن کاملAuditable Privacy: On Tamper-Evident Mix Networks
We introduce the notion of tamper-evidence for mix networks in order to defend against attacks aimed at covertly leaking secret information held by corrupted mix servers. This is achieved by letting observers (which need not be trusted) verify the absence of covert channels by means of techniques we introduce herein. Our tamper-evident mix network is a type of re-encryption mixnet in which a se...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Hospitality Management
سال: 2022
ISSN: ['1873-4693', '0278-4319']
DOI: https://doi.org/10.1016/j.ijhm.2022.103315