NSPW '97 Proceedings of the 1997 workshop on New security paradigms
What makes Internet users visit cyber stores again? key design factors for customer loyalty
Proceedings of the SIGCHI conference on Human Factors in Computing Systems
Trust in e-commerce vendors: a two-stage model
ICIS '00 Proceedings of the twenty first international conference on Information systems
Building Trustworthy Software Agents
IEEE Internet Computing
Persuasive Technology: Using Computers to Change What We Think and Do
Persuasive Technology: Using Computers to Change What We Think and Do
Shiny happy people building trust?: photos on e-commerce websites and consumer trust
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Trustbuilders and Trustbusters
I3E '01 Proceedings of the IFIP Conference on Towards The E-Society: E-Commerce, E-Business, E-Government
A Computational Model of Trust and Reputation for E-businesses
HICSS '02 Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS'02)-Volume 7 - Volume 7
On-line trust: concepts, evolving themes, a model
International Journal of Human-Computer Studies - Special issue: Trust and technology
Empirical research in on-line trust: a review and critical assessment
International Journal of Human-Computer Studies - Special issue: Trust and technology
Developing trust in internet commerce
CASCON '03 Proceedings of the 2003 conference of the Centre for Advanced Studies on Collaborative research
Phishing: Cutting the Identity Theft Line
Phishing: Cutting the Identity Theft Line
Personalization versus Privacy: An Empirical Examination of the Online Consumer's Dilemma
Information Technology and Management
The mechanics of trust: a framework for research and design
International Journal of Human-Computer Studies
The battle against phishing: Dynamic Security Skins
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
Phishing Exposed
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Do security toolbars actually prevent phishing attacks?
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Decision strategies and susceptibility to phishing
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Individual Trust in Online Firms: Scale Development and Initial Test
Journal of Management Information Systems
Communications of the ACM
Fighting phishing at the user interface
Fighting phishing at the user interface
Protecting people from phishing: the design and evaluation of an embedded training email system
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
In praise of forgiveness: Ways for repairing trust breakdowns in one-off online interactions
International Journal of Human-Computer Studies
Hi-index | 0.00 |
Trust is an important component of online transactions. The increasing amount and sophistication of spam, phishing, and other semantic attacks increase users' uncertainty about the consequences of their actions and their distrust towards other online parties. In this paper, we highlight some key characteristics of a model that we are developing to represent and compare the online trust decision processes of "expert" and "non-expert" computer users. We also report on preliminary data we are gathering to validate, refine, and apply our model. This research is part of a broader project that aims at developing tools and training modules to help online users make good trust decisions.