Trust and Risk in Internet Commerce
Trust and Risk in Internet Commerce
Peer-to-Peer: Harnessing the Power of Disruptive Technologies
Peer-to-Peer: Harnessing the Power of Disruptive Technologies
The internet as public space: concepts, issues, and implications in public policy
ACM SIGCAS Computers and Society
Issues in New Information Technology
Issues in New Information Technology
Valuation of Trust in Open Networks
ESORICS '94 Proceedings of the Third European Symposium on Research in Computer Security
Trust: A Collision of Paradigms
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
Informed Consent in the Mozilla Browser: Implementing Value Sensitive Design
HICSS '02 Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS'02)-Volume 8 - Volume 8
WWW electronic commerce and java trojan horses
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Trust in MDE components: the DOMINO experiment
Proceedings of the International Workshop on Security and Dependability for Resource Constrained Embedded Systems
The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study
Information Systems Research
The structure of the sense of security, anshin
CRITIS'07 Proceedings of the Second international conference on Critical Information Infrastructures Security
The sense of security and a countermeasure for the false sense
SP'11 Proceedings of the 19th international conference on Security Protocols
Pools, clubs and security: designing for a party not a person
Proceedings of the 2012 workshop on New security paradigms
Privacy is a process, not a PET: a theory for effective privacy practice
Proceedings of the 2012 workshop on New security paradigms
Materializing trust as an understandable digital concept
CHI '13 Extended Abstracts on Human Factors in Computing Systems
Hi-index | 0.00 |
Designing for trust requires identification of the sometimes subtle trust assumptions embedded into systems. Defining trust as the intersection of privacy, security and reliability can simplify the identification of trust as embedded in a technical design. Yet while this definition simplifies, it also illuminates a sometimes overlooked problem. Because privacy is an element of trust, purely operational definitions of trust are inadequate for developing systems to enable humans to extend trust across the network. Privacy is both operational (in the sharing of data) and internal (based on user perception of privacy). Designing trust metrics for the next generation Internet, and indeed implementing designs that embed trust for any digital environment. requires an understanding of not only the technical nuances of security but also the human subtleties of trust perception. What is needed is a greater understanding of how individuals interact with computers with respect to the extension of trust, and how those extensions can be addressed by design.