Analyzing trust in technology strategies

  • Authors:
  • Jennifer Horkoff;Eric Yu;Lin Liu

  • Affiliations:
  • University of Toronto, Toronto, Ontario, Canada;University of Toronto, Toronto, Ontario, Canada;Tsinghua University, Beijing, China

  • Venue:
  • Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

As technology design becomes increasingly motivated by business strategy, technology users become wary of vendor intentions. Conversely, technology producers must determine what strategies they can employ to gain the trust of consumers in order to acquire and retain their business. As a result, both parties have a need to understand how business strategies shape technology design, and how such designs alter relationships among stakeholders. In this work, we use the Trusted Computing domain as an example. Can the technology consumer trust the advertised intentions of Trusted Computing Technology? Can the providers of Trusted Computing gain the trust of consumers? We use the i* Modeling Framework to analyze the links between strategies and technologies in terms of a network of social intentional relationships. By applying the qualitative i* evaluation procedure, we probe the intentions behind the strategies of technology providers, facilitating an analysis of trust.