Using the new ACM code of ethics in decision making
Communications of the ACM
Cryptography's role in securing the information society
Cryptography's role in securing the information society
Communications of the ACM
PGP: Pretty Good Privacy
Rights and Responsibilities of Participants in Networked Communities
Rights and Responsibilities of Participants in Networked Communities
Issues in New Information Technology
Issues in New Information Technology
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
WWW electronic commerce and java trojan horses
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Privacy in Location-Aware Computing Environments
IEEE Pervasive Computing
AAMAS'02 Proceedings of the 2002 international conference on Trust, reputation, and security: theories and practice
Privacy is a process, not a PET: a theory for effective privacy practice
Proceedings of the 2012 workshop on New security paradigms
Hi-index | 0.00 |
The technological challenges of securing networks are great, as recently witnessed in widespread denial of service and virus attacks. The human reaction to these attacks may be either a loss of trust or a willingness to tolerate increasing risk having weathered one assault. Examining human and computer interaction with a focus on evaluations, the human response to loss of trust is a key part of the search for more secure networks. The success of current efforts to design appropriate security mechanisms depends as much on an understanding of human extensions of trust to computers as it does on an understanding of underlying mathematics. However, the former has not been sufficiently examined.In this work we survey the findings in social psychology and philosophy with respect to trust. We introduce three hypotheses that remain unanswered with respect to the manner in which humans react to computers. We discuss potential design revisions in light of findings from other disciplines. Then we conclude by noting that research which empowers users to be their own security manager may be based on a fundamentally flawed view of human- computer interaction. We close by encouraging designers of computer security systems to examine the humans, which these systems are intended to empower, and recommend that any security system be built on the basis of understanding of human trust provided by the social sciences.