Social trust: a cognitive approach
Trust and deception in virtual societies
Improving the TCPA Specification
Computer
Towards Modeling and Reasoning Support for Early-Phase Requirements Engineering
RE '97 Proceedings of the 3rd IEEE International Symposium on Requirements Engineering
Security and Privacy Requirements Analysis within a Social Setting
RE '03 Proceedings of the 11th IEEE International Conference on Requirements Engineering
Do Viewpoints Lead to Better Conceptual Models? An Exploratory Case Study
RE '05 Proceedings of the 13th IEEE International Conference on Requirements Engineering
Designing for privacy in a multi-agent world
AAMAS'02 Proceedings of the 2002 international conference on Trust, reputation, and security: theories and practice
UMLtrust: towards developing trust-aware software
Proceedings of the 2008 ACM symposium on Applied computing
Applying strategic business modeling to understand disruptive innovation
Proceedings of the 10th international conference on Electronic commerce
Can Patterns Improve i* Modeling? Two Exploratory Studies
REFSQ '08 Proceedings of the 14th international conference on Requirements Engineering: Foundation for Software Quality
Analyzing goal models: different approaches and how to choose among them
Proceedings of the 2011 ACM Symposium on Applied Computing
Interactive Analysis of Agent-Goal Models in Enterprise Modeling
International Journal of Information System Modeling and Design
GRL model validation: a statistical approach
SAM'12 Proceedings of the 7th international conference on System Analysis and Modeling: theory and practice
Towards a Conceptual Model of User Acceptance of Location-Based Emergency Services
International Journal of Ambient Computing and Intelligence
Hi-index | 0.00 |
As technology design becomes increasingly motivated by business strategy, technology users become wary of vendor intentions. Conversely, technology producers must determine what strategies they can employ to gain the trust of consumers in order to acquire and retain their business. As a result, both parties have a need to understand how business strategies shape technology design, and how such designs alter relationships among stakeholders. In this work, we use the Trusted Computing domain as an example. Can the technology consumer trust the advertised intentions of Trusted Computing Technology? Can the providers of Trusted Computing gain the trust of consumers? We use the i* Modeling Framework to analyze the links between strategies and technologies in terms of a network of social intentional relationships. By applying the qualitative i* evaluation procedure, we probe the intentions behind the strategies of technology providers, facilitating an analysis of trust.