Heuristic evaluation of user interfaces
CHI '90 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
The media equation: how people treat computers, television, and new media like real people and places
Zero-interaction authentication
Proceedings of the 8th annual international conference on Mobile computing and networking
Trust and Distrust Definitions: One Bite at a Time
Proceedings of the workshop on Deception, Fraud, and Trust in Agent Societies held during the Autonomous Agents Conference: Trust in Cyber-societies, Integrating the Human and Artificial Perspectives
A Survey of Context-Aware Mobile Computing Research
A Survey of Context-Aware Mobile Computing Research
Trust and Reputation Model in Peer-to-Peer Networks
P2P '03 Proceedings of the 3rd International Conference on Peer-to-Peer Computing
Web Intelligence and Agent Systems
A Statistical Matching Approach to Detect Privacy Violation for Trust-Based Collaborations
WOWMOM '05 Proceedings of the First International IEEE WoWMoM Workshop on Trust, Security and Privacy for Ubiquitous Computing - Volume 03
The case for transient authentication
EW 10 Proceedings of the 10th workshop on ACM SIGOPS European workshop
A survey of trust and reputation systems for online service provision
Decision Support Systems
Social Science Computer Review
Context-Aware Computing Applications
WMCSA '94 Proceedings of the 1994 First Workshop on Mobile Computing Systems and Applications
Computing with Social Trust
Design for Trust in Ambient and Ubiquitous Computing
ATC '09 Proceedings of the 6th International Conference on Autonomic and Trusted Computing
Trust Theory: A Socio-Cognitive and Computational Model
Trust Theory: A Socio-Cognitive and Computational Model
Heuristic evaluation of persuasive health technologies
Proceedings of the 1st ACM International Health Informatics Symposium
"I regretted the minute I pressed share": a qualitative study of regrets on Facebook
Proceedings of the Seventh Symposium on Usable Privacy and Security
Hi-index | 0.00 |
In this paper, we introduce and discuss Foreground Trust. Foreground Trust, itself based on recent work in the area of Trust Enablement, is a paradigm for allowing devices in a human-device ecosystem the means to reason with and about trust in themselves, other devices, and humans, whilst allowing humans to make trusting decisions using their own internal models (whatever they may be) based on cues from the environment -- including the device(s) in use at the time. We discuss the paradigm, and present an actualization of it in the form of Device Comfort, a model of device reasoning based on environmental cues, and the use of the device status to help users make informed trusting and security decisions for themselves. In particular we focus on the interface between user and device to help the user make trust-based decisions and use second thoughts as a means to educate and raise user awareness about their security in online and mobile behaviours.