Article

Trust, Complexity and Control: Confidence in a Convergent World

Authors:
To read the full-text of this research, you can request a copy directly from the author.

Abstract

An increasing reliance on the Internet and mobile communication has deprived us of our usual means of assessing another party's trustworthiness. This is increasingly forcing us to rely on control. Yet the notion of trust and trustworthiness is essential to the continued development of a technology-enabled society. Trust, Complexity and Control offers readers a single, consistent explanation of how the sociological concept of 'trust' can be applied to a broad spectrum of technology-related areas; convergent communication, automated agents, digital security, semantic web, artificial intelligence, e-commerce, e-government, privacy etc. It presents a model of confidence in which trust and control are driven and limited by complexity in one explanatory framework and demonstrates how that framework can be applied to different research and application areas. Starting with the individual's assessment of trust, the book shows the reader how application of the framework can clarify misunderstandings and offer solutions to complex problems. The uniqueness of Trust, Complexity and Control is its interdisciplinary treatment of a variety of diverse areas using a single framework. Sections featured include: Trust and distrust in the digital world. The impact of convergent communication and networks on trust. Trust, economy and commerce. Trust-enhancing technologies. Trust, Complexity and Control is an invaluable source of reference for both researchers and practitioners within the Trust community. It will also be of benefit to students and lecturers in the fields of information technology, social sciences and computer engineering.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the author.

... Trustworthiness is the quality of a node in which it performs as it should across a wide range of situations [13]. In this paper, we assume that trustworthiness cannot be directly measured, although various entities may provide their opinions of a node's trustworthiness. ...
... Reputation is the extent of the trustworthiness of a node, as agreed upon by the population of nodes [13] based on opinions about trustworthiness. In this paper, reputation is calculated iteratively from opinions, the reputations of the nodes that provide opinions, and previous reputations. ...
... It needs to take into account two aspects: the computation of opinions (i.e., how several opinions are fused into a single reputation value), and the decay in reputation (i.e., how a reputation changes over time). Several algorithms can be used to fuse opinions into reputations [13], and the choice depends on the ability of nodes to issue opinions, their computational capability, bandwidth constraints, etc. ...
Article
Full-text available
The uncertainty introduced by the use of low-cost sensors in ad-hoc sensor networks is an ongoing concern that can be alleviated at the network level through a hybrid solution that relies on the use of reference nodes and reputation-based trust management. As reference nodes impose a significant expense, it is important to minimize their number while maximizing their impact on the reduction of uncertainty. This paper presents a multidimensional analytical model developed through simulations that helps in predicting the extent of the decrease in uncertainty caused by an increase in the fraction of reference nodes in hybrid ad-hoc networks. The model shows that the marginal benefit of introducing reference nodes is much higher for networks with small fractions of such nodes, and quickly reaches near-saturation at about 5% of reference nodes, across all aspects of uncertainty.
... There is a significant amount of evidence that people treat computers as if they were other social agents (Reeves and Nass, 1996). Yet, the unification is not ready and technologies are still not accepted as equal social partners, especially as they lack advanced cognitive capabilities (Cofta, 2007). Others, such as Heidegger (1977) or Giddens (1984; and Giddens and Pierson (1998) to name just a few, claim that deployment of technology causes disembodiment and erosion of reality. ...
... There have been both demonizing and criticizing antagonists of technologies in the post-industrial epoch as much as favouring advocates. Technophobic and dystopic essentialism can be contrasted with technophilism in which technology is seen as a synonym for progress that enhances our control over nature (Kahn and Kellner, 2004), adding transparency to communication and increasing both personal and institutional trust (Cofta, 2007). There is a lot of research and discussion around humanizing ICTs both aesthetically (physical and interface design) and technically. ...
... There is a lot of research and discussion around humanizing ICTs both aesthetically (physical and interface design) and technically. Cofta (2007) proposes the concept of Trust-Enhancing-Technologies (TET) that embraces the essentials in the assessment of confidence -a set of technical properties that are valid in the digital space only. The principles of TET are (1) amplification of evidence of trust and control, (2) transparency and (3) better assessment of confidence, such as reputation-based systems. ...
Book
Full-text available
This book offers broad evidence on how new information and communication technologies (ICT) impact social development and contribute to social welfare. Its aim is to show how new technological solutions may contribute to society's welfare by encouraging new 'socially responsible' initiatives and practices as the broad adoption of new technologies becomes an integral component of organizations, and of the overall economy. Society and Technology: Opportunities and Challenges is designed to provide deep insight into theoretical and empirical evidence on ICT as socially responsible technologies. More specifically, it puts special focus on examining the following: • how channels of ICT impact on social progress, environmental sustainability and instability • the role of ICT in creating social networks, with positive and negative consequences of networking • how ICT encourages education, skills development, institutional development, etc. • the ethical aspects of technological progress, and • technology management for social corporate responsibility. The book is written primarily for scholars and academic professionals from a wide variety of disciplines that are addressing issues of economic development and growth, social development, and the role of technology progress in broadly defined socioeconomic progress. It is also an invaluable source of knowledge for graduate and postgraduate students, particularly within economic and social development, information and technology, worldwide studies, social policy or comparative economics.
... ICT infrastructure is therefore a medium and a message, while the challenge is to communicate trustworthiness of those who operate it (if there is any). Such trustworthiness can be demonstrated by a variety of means, following the variety trust heuristics [39]. Value compatibility is the key approach here, where such a compatibility is the perception that the institution that deploys ICT and the user of the ICT share a certain set of values reflected in their intentions and actions [24]. ...
... Similar to Google, Facebook's trustworthiness as a platform is neither questioned nor challenged, despite their occasional privacy blunders and technical problems. • EBay operates as an active intermediary of commercial transactions, and this position requires a significant amount of trust in eBay [39]. Further, its reputation rating system is the most popular example of a collective assessment of commercial trustworthiness. ...
... There are several formalisations that satisfy scalability needs, e.g., [22] or an overview in [199]. 5. Formal systems of trust can be also abused and attacked, which adds the requirement of attack-resistance. While there are possibly several attack methods [39], some systems deal with them much better than others [91,111]. ...
Book
Full-text available
The existence of large information and communication technology (ICT) structures, such as the Internet and the Web, and their impact on our everyday lives is an unquestionable fact of modern life. Trust and trustworthiness of such systems is often taken for granted, and accepted as a solution to all the ills of our society, duly replicated on the Web. However, there is no agreement on how to develop trustworthy systems. There is even no agreement on what 'trustworthy Web' may actually mean. The Trustworthy and Trusted Web is a thorough investigation of the complex question of trustworthy ICT. It analyses this concept from the dual perspectives of the technical architecture and the sociological angle of the creation of social reality. It addresses conditions to discuss trustworthiness of ICT, discussing whether a single notion of trustworthiness can be agreed upon and whether it will generate useful design criteria for trustworthy ICT. Against the background defined by theories of social systems, The Trustworthy and Trusted Web reveals the structure behind conflicts and misunderstandings of our modern perception of the trustworthiness of ICT. It proposes a systemic approach that should bring trustworthy ICT, trustworthy Web and trustworthy Semantic Web closer to everyday reality. The Trustworthy and Trusted Web is an excellent book for anyone who is interested in learning about, analysing, designing or implementing trustworthy IC, and specifically trustworthy Web. It is comprehensive and informative in analysing the current situation while being prescriptive and visionary in proposed solutions.
... Yet another (Castelfranchi and Falcone 2000) claim is that trust is a choice in itself as there is always an option of not trusting. Others (Cofta 2007) indicate that in situations of no choice, people may not trust but masquerade it with a trust-like behaviour. ...
... Note that this model introduces the duality of trust and control that itself deserves a discussion, as instruments of control often relate to risk-based measures. For an extended discussion see (Cofta 2007). ...
... Literature tends to distinguish between the internal state of trusting and the external behaviour that is identical with trusting (Cofta 2007). Solomon and Flores (2003) specifically distinguish between the authentic trust where mutual trust is freely and willingly granted and situation where trust is unilateral, not though through, forced under duress or otherwise non-authentic. ...
Article
Full-text available
Trust tends to be described through the lens of a rational choice of a trustor driven by the trustworthiness of a trustee. This, however, does not exhaust scenarios where people seem to be comfortable trusting without having an actual choice or not trusting while having a selection of potential trustees. This paper proposes that there should be another force at work that only expresses itself through the rationality in situations of choice. It is the self-preservation that strongly influences our decisions, specifically when choices seem to diminish. Ignoring this force makes the theory of trust incomplete. This paper brings this area of social behaviour closer to computational trust by proposing a unifying model that builds on theories of social systems. It focuses specifically on the containment of complexity and the associated risk to self-preservation, where trust is not an option but a necessity. The model, by being both simple and expressive, can computationally explain several phenomena associated with trusting in situations where self-preservation may be under a threat. This is further demonstrated by several use cases.
... Cofta [10] studies the relationship between trust and control, seeing them as both competing and complementing. The proposed model of a decision to trust incorporates both elements and is applied specifically to situations there modern technology is a visible component. ...
... The simple question of how to express trust in a numerical form has a large number of answers: from binary to continuous, from one dimensional to three dimensional, from objective to subjective, from fixed numbers to temporal logic (see e.g. [10] for an overview). Results brought in by different researchers cannot be compared or consolidated, thus fragmenting the discipline. ...
... • How an experiment is to be conducted and research interpreted. For example, the discipline can assume that the 'Game of Trust' [10] or the 'Prisoner's Dilemma' is a valid method to determine the extent of trust without further investigation into subjective psychological processes. ...
... The current approach to trust and trustworthiness, as discussed throughout literature (see e.g. [8] for an overview) tends to focus on the relationship between an enlightened trustor (the one who potentially trusts) and a trustee (the one that is hopefully trusted). The current approach can be characterised by the following assumptions, immediately contrasted with the properties of the IoT: ...
... Ergonomics approached the problem of trusting machines from a more pragmatic angle: to what extent it is advisable to support the development of such trust in machines, knowing that they are in fact not intentional, as the 'as if intentional' behaviour can be easily traced to clever programming. The notion of an appropriate level of trust has been developed [20] (see also [8] for a similar consideration), where the main objective is not to encourage more trust than is due. ...
Chapter
The emergence of the IoT as an everyday fact raises the question how the IoT can be trusted. Considering that the IoT is pervasive to the level of being secretive, practically monopolistic and that human participation is often involuntary, it hardly satisfies the assumptions that associate the often researched types of trust relationships. In order to study trust in the IoT, alternative views on trust may be needed. This paper analyses the IoT as a representation of imperfect systems, i.e. systems that by architectural choices are unable to guarantee predictably repeatable operations. This property may invalidate the metaphor of trusting technology that is constructed out of replicating human-to-human trust. This paper examines alternative views on trust that may better fit the specificity of the IoT and generally imperfect systems, adopted from psychology, sociology or ergonomics. While no definitive approach is indicated, this paper serves as an overview of possible directions in trust research.
... The relationship between trust and control mechanisms is complex in nature. It is widely debated by scholars but has not been definitively concluded (Soren, 2010;Costa and Frankema, 2007;Cofta, 2007;Long and Sitkin, 2006;Dekkar, 2004;Das and Teng, 1998;Bradach and Eccles, 1989). The trust and control linkage is conceptualized by various scholars as substitutive (Bradach and Eccles 1989;Dekkar 2004;Cofta, 2007) and/or complementary (Costa and Frankema, 2007;Das and Teng, 1998). ...
... It is widely debated by scholars but has not been definitively concluded (Soren, 2010;Costa and Frankema, 2007;Cofta, 2007;Long and Sitkin, 2006;Dekkar, 2004;Das and Teng, 1998;Bradach and Eccles, 1989). The trust and control linkage is conceptualized by various scholars as substitutive (Bradach and Eccles 1989;Dekkar 2004;Cofta, 2007) and/or complementary (Costa and Frankema, 2007;Das and Teng, 1998). The trust and control relationship in the context of microfinance operations is explored in this research to understand how managers use those mechanisms to address the needs of FSS versus clients' social development needs. ...
Article
This study explores how managers of microfinance institutions (MFIs) use trust - control mechanisms in the operation proce sses to mitigate the problem of mission drift arising out of the need to meet the dual goals of social development and financial self - sustainability. Using a case study methodology, purposive sampling, and replication logic, data from the operations proces ses of four geographically different sites of a microfinance institution in Gujarat, India were analyzed. The findings suggest that the managers of microfinance institutions balance integrity - trust, benevolence - trust, competence - trust, and control mechanis ms to achieve dual goals of social development and financial self - sustainability. The conditions and contingencies under which trust - control mechanisms are most effective for mitigating mission drift are identified. The findings also indicate that managers of the microfinance institution use calculative and relational forms of trust to achieve the empowerment of women borrowers along with the fulfilment of the aims of financial self - sustainability. Finally, the study places mission drift mitigation within i ts ethical context by examining client vulnerability and the MFI’s operational responses .
... En fonction du contexte -les protocoles de sécurité, le Web, la réputation -les modèles différent. Ils sont interdisciplinaires (McKnight et Chervany, 1996), techniques (Cofta, 2007b), transactionnels, dédiés au e-commerce (Egger, 2003), ou dans le champ de la communication (Karsenty, 2011). Notre démarche consiste à reformuler, réinterroger les pratiques et ne prend pas appui sur un modèle existant. ...
... Le postulat de la méfiance organisée est souligné par des experts 43 comme par la littérature récente (Kaplan et Francou, 2012). Une dépendance croissante à la communication internet et mobile nous a privé de nos moyens habituels d'évaluation de la fiabilité de l'autre partie, nous obligeant de plus en plus à nous appuyer sur le contrôle (Cofta, 2007b). Mais quels sont les choix des opérateurs de télécommunications dans un espace ouvert où il est impossible de maitriser totalement l'identité et les intentions des participants ? ...
Conference Paper
Dans cet article exploratoire, nous nous interrogeons sur la capacité des firmes du secteur des télécommunications à aborder le thème de la confiance et à la traduire dans des dispositifs sociaux techniques (produits et services) ou des activités immatérielles (comme les processus de conception ou de communication). Nous limiterons nos observations au cas de la « confiance décidée » (Luhmann, 2001), orientée vers l’autre et impliquant « toujours une part de risque » puisque la confiance viserait « à réduire l’incertitude et, en conséquence, le sentiment de risque » (Karsenty, 2011). Nous utiliserons l’approche de la « communication-incertitude » pour sa capacité à relier la création de sens et l’incertitude ainsi que la théorie de l’acteur–réseau, pour sa disposition à utiliser la métaphore du réseau hétérogène et des opérations de traduction entre les actants. A partir des discours portant sur la stratégie d’opérateurs en télécommunications, nous avons examiné comment la sécurité digitale se traduisait dans les dispositifs sociotechniques, puis nous nous sommes intéressés à la question de l’identité comme préalable à l’établissement de la confiance ainsi qu’à des exemples concrets et innovants. Nous proposons une ébauche de modèle conceptuel de la confiance, dépassant la simple question du déficit d’information. Nous avons retenu cinq grands axes concernant les praticiens de l'industrie des télécommunications : il est nécessaire de considérer dynamiquement la confiance à travers un cycle de vie ; l’identité des acteurs dans le monde digital doit être repensée comme une identité « non-façonnée1 » (fragmentée dans le temps et l’espace, pouvant masquer les intentions) ; la confiance est toujours partielle et fait l’objet d’une évaluation continue sous la forme d’un contrôle bienveillant ; L’industrie des télécommunications raisonnant à l’aide d’un modèle de « sécurité en profondeur », il faut raisonner en termes de « confiance en profondeur » ; enfin pour glisser d’un environnement défensif vers un environnement accueillant, nous proposons de changer de paradigme : l’incertitude peut engendrer un risque sous la forme d’une menace mais aussi d’une opportunité.
... Recall that trust is, essentially, choosing to put yourself in a position where outcomes that matter to you are in the hands of another. It is a response to risk where we do not have control (Cofta, 2007;Deutsch, 1962). To put it another way, trust is a way of intentionally accepting that some things are out of our control. ...
Article
Full-text available
The trustworthiness (or otherwise) of AI has been much in discussion of late, not least because of the recent publication of the EU Guidelines for Trustworthy AI. Discussions range from how we might make people trust AI to AI being not possible to trust, with many points inbetween. In this article, we question whether or not these discussions somewhat miss the point, which is that people are going ahead and basically doing their own thing anyway, and that we should probably help them. Acknowledging that trust is a heuristic that is widely used by humans in a range of situations, we lean on the literature concerning how humans make trust decisions, to arrive at a general model of how people might consider trust in AI (and other artefacts) for specific purposes in a human world. We then use a series of thought experiments and observations of trust and trustworthiness, to illustrate the use of the model in taking a functionalist perspective on trust decisions, including with machines. Our hope is that this forms a useful basis upon which to develop intelligent systems in a way that considers how and when people may trust them, and in doing so empowers people to make better trust decisions about AI.
... Finally, trust, as well as distrust, exists on several levels, such as interpersonal, organizational, and societal. Trust specialists often concentrate on a specific level or type of trust, such as political trust like citizens' trust in political institutions, or trust between trade partners or in society (Banerjee et al., 2006;Beatton, 2007;Child, 2001;Cofta, 2007;Das & Teng, 1998;Dasgupta, 1998;Hoffman, 2002;Mayer et al., 1995;Rotenberg, 2018Rotenberg, , 2020Roud & Haugen Gausdal, 2019;Seppänen et al., 2007;Six, 2005;Smith & Van de Ven, 1992;Sztompka, 1999;Tan & Theon, 2000). Yet these levels and types of trust are interconnected. ...
Chapter
Chapter 8 of The Psychology of Foreign Policy focuses on trust and mistrust, moving from individuals to intersubjectivity and social psychology. Trust is intuitively integral to international politics, both in terms of interpersonal, interorganizational and more broadly interstate relations. Although practitioners have always recognised the importance of trust, it has taken a long time for researchers to discover—or to some extent rediscover—the concept in International Relations. Paradoxically, the prevailing understanding that the anarchic nature of the international system (the absence of hierarchical authority) leads to a security dilemma between states is based on the causal role of mistrust. If mistrust is such a central source of conflict in international relations, how could we create and maintain trust? Theories of trust can be roughly divided into rationalist, cultural and psychological schools. The chapter presents concise reviews and analyses of these approaches and identifies the mechanisms through which trust is assumed to affect decision-making. The chapter then examines—partly on the basis of first-hand empirical material—how trust was created between the leaders of the superpowers at the end of the Cold War and how it eroded afterward. The chapter concludes with a critical discussion identifying some challenges and promises for bringing the concept of trust closer to foreign policy decision-making studies.
... Note that there are additional limitations on the values that variables can assume that come from the coding convention used throughout the literature [29], as well as from the application area. Therefore: ...
Article
Full-text available
Uncertainty in dense heterogeneous IoT sensor networks can be decreased by applying reputation-inspired algorithms, such as the EWMA (Exponentially Weighted Moving Average) algorithm, which is widely used in social networks. Despite its popularity, the eventual convergence of this algorithm for the purpose of IoT networks has not been widely studied, and results of simulations are often taken in lieu of the more rigorous proof. Therefore the question remains, whether under stable conditions, in realistic situations found in IoT networks, this algorithm indeed converges. This paper demonstrates proof of the eventual convergence of the EWMA algorithm. The proof consists of two steps: it models the sensor network as the UOG (Uniform Opinion Graph) that enables the analytical approach to the problem, and then offers the mathematical proof of eventual convergence, using formalizations identified in the previous step. The paper demonstrates that the EWMA algorithm converges under all realistic conditions.
... The standard ISO/IEC 27000:2018 [1] defines information security as preservation of confidentiality, integrity and availability of information; in addition, other properties, such as authenticity, trustworthiness, accountability, non-repudiation, traceability, and reliability can be involved. Trust establishment guarantees that the origin and the destination of the data and documents are authentic (authenticity) and trustworthy (trustworthiness), while security ensures that data and documents are protected against any modification by untrusted parties (integrity) [2][3][4]. The implementation of trust relies on the Regulation (EU) N°910/2014 on electronic identification and trust services for electronic transactions in the internal market (hereafter the eIDAS Regulation). ...
Chapter
Full-text available
While information security nowadays represents a core concern for any organization, Trust Management is usually less elaborated and is only important when two or more organizations cooperate towards a common objective. The overall Once-Only Principle Project (TOOP) architecture relies on the concept of trusted sources of information and on the existence of a secure exchange channel between the Data Providers and the Data Consumers in this interaction framework. Trust and information security are two cross-cutting concerns of paramount importance. These two concerns are overlapping, but not identical and they span all of the interoperability layers, from the legal down to the technical, passing through organizational and semantic layers. While information security aims at the preservation of confidentiality, integrity and availability of information, trust establishment guarantees that the origin and the destination of the data and documents are authentic (authenticity) and trustworthy (trustworthiness), and that data and documents are secured against any modification by untrusted parties (integrity). In this chapter, the TOOP Trust Architecture is presented, starting from a simple abstract model of interaction between two agents down to the detailed end-to-end trust establishment architecture, modeled onto the Toop Reference Architecture presented in the previous chapter.
... Trust establishment on the other hand is about the guarantees, that the origin and the destination of the data and documents are authentic (authenticity) and trustworthy (trustworthiness), and that data and documents are secured against any modification by untrusted parties (integrity) [18][19][20]. Additional trust management can include authorization, accountability, non-repudiation, traceability, and confidentiality. ...
Chapter
Full-text available
The Once-Only Principle requires the public administrations to ensure that citizens and businesses supply the same information only once to the Public Administration as a whole. Widespread use of the Once-Only Principle has the potential to simplify citizens’ life, make businesses more efficient, and reduce administrative burden in the European Union. The Once-Only Principle project (TOOP) is an initiative, financed by the EU Program Horizon 2020, to explore the possibility to enable the cross-border application of the Once-Only Principle by demonstrating it in practice, through the development of selected piloting applications for specific real-world use cases, enabling the connection of different registries and architectures in different countries for better exchange of information across public administrations. These piloting ICT systems are designed as a result of a pan-European collaboration and they adopt a federated model, to allow for a high degree of independence between the participating parties in the development of their own solutions. The main challenge in the implementation of an OOP solution is the diversity of organizations, procedures, data, and services on all four main levels of interoperability: legal, organizational, semantic, and technical. To address this challenge, TOOP is developing and testing the TOOP Reference Architecture (TOOPRA) to assist organizations in the cross-border implementation of the OOP. The paper outlines the TOOPRA users, principles, and requirements, presents an overview of the architecture development, describes the main views of TOOPRA, discusses architecture profiling, and analyses the TOOPRA sustainability issues.
... The employees have to trust their organizational technological change is beneficial for them and in response, organizations have to trust engineers and technology operators (Lacohée, Cofta, Phippen & Furnell, 2008). The discussion regarding Trust and technology relationship is in its growth period and is unified into a socio-technical view from the social actor's perspective on trust (Cofta, 2007). This research has also selected trust as one of variables which are strongly correlated with the characteristics and behavior of a person. ...
Article
Full-text available
The aim of the study is to find out a successful way of managing the organizational change in public sector organizations. The research is based on a structured questionnaire survey. The data was collected in some of the top public sector organizations in Pakistan. The study suggests that Stress, Trust, and Ethics have a strong relationship with Organizational Change Management. Organizations must minimize the workplace stress, maximize trust of workers on management and organization and ensure ethics for organization change management. The managerial implication of the research is, bringing and making any organizational change is very difficult without employee-friendly working environment of the organization. The results of the study make it easy, how to put employees on the right track for achieving organizational goals and objectives in any Organizational Change by using Facilitation.
... Trust. In the context of using technology, the construct trust has been usually associated with the reliability of a technology (e.g., Cofta, 2007). On the other hand, a financial transaction can be understood as an interaction between two social actors as, e.g., a consumer and a firm. ...
... Fuzzy logic can be effectively used in recommendation-based systems to deliver the final value of trustworthiness, specifically when evidence of trustworthiness are incomparable or fuzzy by themselves. Further, it can be used to express a wide range of trust-related situations such as the lack of information or distrust (i.e. in nodes that seem to be overtaken by the adversary) [8]. ...
... As the modern version of equity crowdfunding is facilitated with the help of the Internet, it is regarded as a multilayered network of relationships (Cofta, 2007). While the access to verified information is complex, investors might have to rely on their own peers, or other factors, to make an investment decision. ...
... trust literature can also be ordered based on the application domain for which it is useful, like recommendation [37], [59], [74]- [76], [79], [80], reputation [30], [33], [81], web syndication [82], peer-to-peer systems [38], [40], negotiation [83], [84], healthcare [66], filtering [85], question answering [86], multi-agent systems [9], [33], [87], [88]. One should keep in mind that trust models can be applied to different application domains. ...
... 97) and that confidence is based on neglecting the possibility of disappointment or the opportunity to intervene. Some approaches distinguish between trust and confidence by considering trust as a phenomenon based on proximity, commonly shared values, and empathy, and confidence as based on knowledge and control, mutual dependence, and hierarchies (e.g., Cofta, 2007;Noteboom, 2006;Seligman, 2011). In the following, we refer to Tschannen-Moran and Hoy's notion of trust including confidence as its foundation. ...
Article
Full-text available
http://www.phil.muni.cz/journals/index.php/studia-paedagogica/article/view/1627 https://digilib.phil.muni.cz/handle/11222.digilib/136522
... Damit unterscheidet sich eine Blockchain grundlegend von etablierten Vertrauensmodellen , welche die Vertrauenswürdigkeit und Beweiskraft in der digitalen Kommunikation heute definieren (vgl. z.B. Cofta 2007; Sel 2015). Diese basieren alle auf einer Vermittlung durch Dritte in Form von natürlichen oder juristischen Personen, deren Vertrauenswürdigkeit die Akteure der Transaktion entweder vertraglich direkt vereinbaren oder durch eine staatliche Akkreditierung des Dritten indirekt unterstellen, und die somit für ihr Verhalten und ihre Leistungen als handelnde Personen rechtlich zur Verantwortung gezogen werden können. ...
Thesis
Full-text available
Wird eine Blockchain für geschäftsrelevante Transaktionen genutzt, so müssen die in ihr aufgezeichneten Nachweise als Records angesehen werden, die gesetzlichen Pflichten zur Aufbewahrung oder Archivierung unterliegen. Eine Blockchain ist ein von aussen nicht beeinflussbares System aus dezentral verteilten, autonom agierenden Rechnern, das ohne vertrauenswürdige Dritte die Authentizität und Integrität der in der Blockchain aufgezeichneten Records gewährleistet. Dadurch stellt diese neue Technologie herkömmliche Prinzipien in Frage, nach denen Vertrauenswürdigkeit von Records heute beurteilt wird, insbesondere jenes der Verantwortlichkeit für die Obhut der Records durch eine natürliche oder juristische Person. Eine systematische Untersuchung der Blockchain-Technologie unter den Gesichtspunkten des Records Management fehlt bisher. Diese Arbeit identifiziert die wesensbestimmenden Eigenschaften von Blockchains und beurteilt sie nach den Kriterien der modernen archivischen Diplomatik und an Hand der Anforderungen in der Schweizer und internationalen Norm ISO 15489 (Records Management). Die Untersuchung kommt zum Schluss, dass eine Blockchain zwar grundsätzlich als Gefäss für vertrauenswürdige – authentische und zuverlässige — Records im herkömmlichen Sinne tauglich ist, jedoch nur bei einem geschlossenen, privaten Betriebsmodell der Blockchain. Die Arbeit diskutiert zudem den möglichen Nutzen der Blockchain-Technologie als Instrument des Records Management. Dieser liegt primär bei Records, die in disparaten und verteilten Informationssystemen geführt werden und somit nicht unter die Kontrolle eines dedizierten elektronischen Records Management Systems (ERMS) gebracht werden können. Eine Blockchain kann dazu dienen, für solche Records einen gemeinsamen Geschäftskontext systemübergreifend zu identifizieren und verfügbar zu machen.
... When an outcome is entirely certain, for instance, trust is unnecessary because people can make decisions and act with absolute certainty of the consequences, i.e., one has full confidence in achieving the outcome that is expected. Extensive research suggests that trust is used as a mechanism for reducing complexity and intensive cognitive processing[61,71,[75][76][77], particularly in uncertain or 'risky' situations where people must make cost-benefit appraisals and evaluate the likelihood of loss (vs. gains). ...
Article
Full-text available
Addressing the challenge of peak demand is a major priority for energy utilities, regulators and policymakers worldwide. Against this backdrop, residential demand management solutions – including direct load control technology that allows utilities to turn specific household appliances on and off during peak periods – are becoming increasingly important. While such technology has been available for decades, acceptance and adoption among residential consumers has not always kept pace. Why is this so? Drawing on key principles from psychology and behavioural economics, we propose that consumer distrust can play a significant role in the uptake of demand management solutions. As part of a large field study, a survey-experiment was conducted to investigate householders’ willingness to participate in a direct load control program offered by an Australian energy company. To specifically examine the relationship between self-reported distrust and willingness to participate, and how this relationship might be influenced, the survey included an unobtrusive experimental manipulation: a simple two-sentence message designed to rebuild consumer trust and confidence in the utility was conveyed to a randomly-selected subsample of participants. Results suggested that participants’ self-professed distrust in the utility was associated with significantly lower willingness to register for the DLC program. This unwillingness was modestly reduced for those participants who received the trust-restoring message upfront. Together, these results suggest that distrust may serve as an important decision-making heuristic used by consumers when choosing whether to accept new demand management technology and services. Implications for future research and practice are discussed.
Article
Full-text available
Trust can be considered as a multidisciplinary concept, which is strongly related to the context and it falls in different fields such as Philosophy, Psychology or Computer Science. Trust is fundamental in every relationship, because without it, an entity will not interact with other entities. This aspect is very important especially in the Internet of Things (IoT), where many entities produced by different vendors and created for different purposes have to interact among them through the internet often under uncertainty. Trust can overcome this uncertainty, creating a strong basis to ease the process of interaction among these entities. We believe that considering trust in the IoT is fundamental, and in order to implement it in any IoT entity, it is fundamental to consider it through the whole System Development Life Cycle. In this paper, we propose an analysis of different works that consider trust for the IoT. We will focus especially on the analysis of frameworks that have been developed in order to include trust in the IoT. We will make a classification of them providing a set of parameters that we believe are fundamental in order to properly consider trust in the IoT. Thus, we will identify important aspects to be taken into consideration when developing frameworks that implement trust in the IoT, finding gaps and proposing possible solutions.
Chapter
Harmful repercussions from sharing sensitive or personal data can hamper institutions’ willingness to engage in data exchange. Thus, institutions consider Authenticity-Enhancing Technologies (AETs) and Privacy-Enhancing Technologies (PETs) to engage in Sovereign Data Exchange (SDE), i.e., sharing data with third parties without compromising their own or their users’ data sovereignty. However, these technologies are often technically complex, which impedes their adoption. To support practitioners select PETs and AETs for SDE use cases and highlight SDE challenges researchers and practitioners should address, this study empirically constructs a challenge-oriented technology mapping. First, we compile challenges of SDE by conducting a systematic literature review and expert interviews. Second, we map PETs and AETs to the SDE challenges and identify which technologies can mitigate which challenges. We validate the mapping through investigator triangulation. Although the most critical challenge concerns data usage and access control, we find that the majority of PETs and AETs focus on data processing issues.KeywordsSovereign data exchangeTechnology mappingPrivacy-enhancing technologiesAuthenticity-enhancing technologies
Chapter
This chapter aims to illustrate that there is a social value of Digital Transformation that has to be pursued in coordination with an economic value. The Digital Transformation Social Mindset (DTSM) is a new way to innovate in a complex and dynamic environment; it is an adaptive, flexible, imaginative mindset to cope with the dynamic complexity of the digital-analogic environment. The DTSM is keen on balancing technology with human, profit with planet, business with people. In one word, it is a mindset for a sustainable transformation. To define the DTSM, we may say that it is ‘the social value of DT, aiming to generate a sustainable innovation and supporting a new social role of institutions. In a Digital Sociology perspective, the DTSM is a transformational mindset providing new visions, values, and abilities to dynamically analyse the context and to courageously challenge the status quo. It generates innovation based on sociality by connecting people and technology to create social value that is aware of the environment, of ethical values, of women, and future generations’.
Article
Full-text available
Product-service systems (PSSs) have attracted researchers in engineering design for the past decades. Recent advances in digital technologies have expanded the potential functionalities that PSSs could deliver and designers' repertoire of tools and techniques to make new value propositions. The key to the success of new value propositions is to achieve customer acceptance and continuous use. However, little is known about the precise routes by which customers accept and use PSSs over time and its dynamics. This conceptual study aims to provide an enhanced view of customer acceptance and continuous use of PSSs by integrating multiple theories and literature streams. In this paper, we suggest three propositions based on the key concepts found in our literature review—well-being, trust and control—, and illustrate a conceptual framework that represents the dynamics of customer acceptance and continuous use of PSSs. Based on the proposed framework, we outline further research questions that could advance our knowledge about design for continuous use of PSSs.
Book
Full-text available
This open access State-of-the-Art Survey describes and documents the developments and results of the Once-Only Principle Project (TOOP). The Once-Only Principle (OOP) is part of the seven underlying principles of the eGovernment Action Plan 2016-2020. It aims to make the government more effective and to reduce administrative burdens by asking citizens and companies to provide certain standard information to the public authorities only once. The project was horizontal and policy-driven with the aim of showing that the implementation of OOP in a cross-border and cross-sector setting is feasible. The book summarizes the results of the project from policy, organizational, architectural, and technical points of view. This book has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 737460
Article
Full-text available
Rules 405(a) and 608(a) of the Federal Rules of Evidence allow the use of testimony about a witness's reputation to support or undermine his or her credibility in trial. This paper analyzes the evidential weight of such testimony from the point of view of social epistemology and the theory of social networks. Together they provide the necessary elements to analyze how reputation is understood in this case, and to assess the epistemic foundation of a reputational attribution. The result of the analysis will be that reputational testimony is extremely weak from an epistemological point of view, and that in many cases there are more reliable substitutes that achieve a similar purpose. The obvious fix, in my view, is to eliminate the use of reputation testimony to support or undermine the credibility, honesty, chastity or peacefulness of a witness.
Article
This article examines the problem of correlation and dialectical connection between the theories of social being and law in the works of the prominent philosophers of the XIX – XX centuries (Émile Durkheim, Max Weber, Karl Marx, Georges Gurvitch, Jean Baudrillard, Michel Foucault, Niklas Luhmann, Jürgen Habermas, and others) who worked at the intersection of several fields of social sciences and made significant contribution to the theory of state and law. These scholars predicted multiple problems of modernity; therefore, reference to their theoretical heritage is valuable in the search of new legal understanding, the need for which has existed for a long time. The scientific novelty consists in the analysis of views of the leading theoreticians who dealt with the correlation between law and social sciences. Social in the social sciences was often considered from the perspective of evolution of human relations. The essence of the social was revealed in various types of cohesion of population or connectedness between the members of social groups. In such relations, an important element was morality, which emerged much earlier than law. Morality emerged with the conception of the social, while law – only with the advent of the state. The classical social theories of the late XIX – early XX centuries, identified the concept of “society” mostly with the politically organized and territorially restricted society of the modern Western national state.
Article
Full-text available
The aim of this paper is to introduce a NUT model (NUT: network-uncertainty-trust) that aids the decrease of the uncertainty of measurements in autonomous hybrid Internet of Things sensor networks. The problem of uncertainty in such networks is a consequence of various operating conditions and varied quality of measurement nodes, making statistical approach less successful. This paper presents a model for decreasing the uncertainty through the use of socially inspired metaphors of reputation, trust, and confidence that are the untapped latent information. The model described in the paper shows how the individual reputation of each node can be assessed on the basis of opinions provided by other nodes of the hybrid measurement network, and that this method allows to assess the extent of uncertainty the node introduces to the network. This, in turn, allows nodes of low uncertainty to have a greater impact on the reconstruction of values. The verification of the model, as well as examples of its applicability to air quality measurements are presented as well. Simulations demonstrate that the use of the model can decrease the uncertainty by up to 55% while using the EWMA (exponentially weighted moving average) algorithm, as compared to the reference one.
Thesis
Full-text available
High speciality and criticality domains categorise the most researched areas in the field of Trust in Automation. Minimal studies have explored the nuances of the psycho-social environment and organisational culture in the development of appropriate mental models on dispositional trust. To aid integration of human operators with emergent specialised systems, there is ambition to introduce Human-Human/Human-System analogies with AI Avatars and 3D representations of environments (Ministry of Defence, 2018). Due to the criticisms in the literature of Human-Human and Human-System teaming analogues this research has explored personal narratives of civilians and military personnel about technology, adaptability and how to facilitate beneficial attitudes and behaviours in appropriate trust, reliance and misuse. A subdivision of the research explores the socio-cultural idiosyncrasies within the different echelons of the military as variances in authority and kinship provide insight on informing training targeted to unique domains. The thesis proposes that there are core hindrances to tacit trust facilitation with automation as cognitive rigidity towards individual and group identities impact socially constructed social responses and internal mental models. Furthermore, as automation broaches category boundaries there may be resistance and discomfort as a result of unpredictable social contracts whereby transactional and relational trust-related power dynamics are unknown or unpredictable.
Chapter
Companies are increasingly dependent on modern information and communication technology (ICT), yet the successful adoption of ICT systems stubbornly hovers at only around 50%, adding disappointment to business losses. Trust (both inter-personal and technology-related) has significant explanatory power when it comes to technology adoption, but only as part of a systematic methodology. Therefore, understanding more fully the interaction between human process and technology by adding the richness of socio-technical considerations to the design process of ICT systems should significantly improve adoption rates. At the same time, trust-based design has to demonstrate the (often neglected) business value of trust. 'Designing for trust', discussed in this chapter, is a design framework that consolidates trust governance and security management. Trust governance is a complete proposition that makes trust relevant to business practices, including the design and deployment of ICT systems. Trust governance incorporates the business justification of trust with an analytical framework, and a set of relevant tools and methods, as well as a maturity model. This chapter discusses how 'designing for trust' leverages trust governance into the design practices of ICT systems by complementing security-based methodologies, demonstrating the value of this approach.
These transactions publish research in computer-based methods of computational collective intelligence (CCI) and their applications in a wide range of fields such as performance optimization in IoT, big data, reliability, privacy, security, service selection, QoS and machine learning. This thirty-fourth issue contains 12 selected papers which present new findings and innovative methodologies as well as discuss issues and challenges in the field of collective intelligence in group decision making with special emphasize given to voting theory, power indices and graphs while addressing elections, social choices, IoT and allocation algorithms.
Conference Paper
Nowadays, we are witnessing the rise of new marketing strategies 3.0 or the data-driven and values-driven era. Instead of treating people simply as consumers, marketers treat them as whole human beings with spirits, hearts and minds, as well as market experts, at least for the product itself. This has developed a variety of Recommendation systems that many companies benefit from it. In this paper we will present a different kind of recommendation system and our proposed model based on trust and commitment theory.
Article
Full-text available
Wird eine Blockchain für geschäftsrelevante Transaktionen genutzt, so müssen die in ihr aufgezeichneten Nachweise als Records angesehen werden, die gesetzlichen Pflichten zur Aufbewahrung oder Archivierung unterliegen. Eine Blockchain ist ein von aussen nicht beeinflussbares System aus dezentral verteilten, autonom agierenden Rechnern, das ohne vertrauenswürdige Dritte die Authentizität und lntegrität der in der Blockchain aufgezeichneten Records gewährleistet. Dadurch stellt diese neue Technologie herkömmliche Prinzipien in Frage, nach denen Vertrauenswürdigkeit von Records heute beurteilt wird, insbesondere jenes der Verantwortlichkeit für die Obhut der Records durch eine natürliche oder juristische Person. Eine systematische Untersuchung der Blockchain-Technologie unter den Gesichtspunkten des Records Management fehlt bisher. Diese Arbeit identifiziert die wesensbestimmenden Eigenschaften von Blockchains und beurteilt sie nach den Kriterien der modernen archivischen Diplomatik und an Hand der Anforderungen in der Schweizer und internationalen Norm ISO 15489 (Records Management). Die Untersuchung kommt zum Schluss, dass eine Blockchain zwar grundsätzlich als Gefäss für vertrauenswürdige - authentische und zuverlässige - Records im herkömmlichen Sinne tauglich ist, jedoch nur bei einem geschlossenen, privaten Betriebsmodell der Blockchain. Die Arbeit diskutiert zudem den möglichen Nutzen der Blockchain-Technologie als lnstrument des Records Management. Dieser liegt primär bei Records, die in disparaten und verteilten lnformationssystemen geführt werden und somit nicht unter die Kontrolle eines dedizierten elektronischen Records Management Systems (ERMS) gebracht werden können. Eine Blockchain kann dazu dienen, für solche Records einen gemeinsamen Geschäftskontext systemübergreifend zu identifizieren und verfügbar zu machen.
Chapter
Developing a trustworthy information system is a challenging task. The overall trustworthiness of an information system depends on trust relationships that are generally assumed without adequate justification. However, lack of appropriate analysis of such relationships and of appropriate justification of relevant trust assumptions might lead to systems that fail to fully achieve their functionalities. Existing literature does not provide adequate guidelines for a systematic process or an appropriate modeling language to support such trust-focused analysis. This paper fills this gap by introducing a process that allows developers to capture possible trust relationships and to reason about them. The process is supported by a modeling language based on a set of concepts relating to trust and control and a CASE tool. An illustrative example from the UK health care domain is used to demonstrate the applicability and usefulness of the approach.
Chapter
Computational trust and reputation management now has a 20 years long tradition. As these services are tightly coupled to e-environments, the need for them has coincided with the proliferation of the e-business paradigm beginning in the 1990s. Consequently, the greater the proliferation of e-environments, the greater the need for such services. If trust and reputation play such an important role in different areas of our lives, e-environments can be no exception.
Conference Paper
Self-trust is overlooked in trust research. However, self-trust is crucial to a learner’s success in a digital learning space. In this paper, we review self-trust and the notion of self-efficacy used by the education researchers. We claim self-efficacy is self-trust. We then explore what self-trust and its expression means to one group of learners and use this data to provide design suggestions for digital learning spaces that improve students’ self-trust.
Conference Paper
By analysing cyber-security as a private protection market, and linking it with technological aspects and the dominating risk-environment, valuable insights into its workings can be gained, particularly when it comes to non- or semi-technical factors. Using high-granularity, empirical interview data (\(n = 140\)) as input, this paper presents insights about trust, signalling and cooperation among practitioners in the context of a complex field. At the moment, trust-building in the cyber-protection business is very personalised. Due to complexity and uncertainty, cooperation is based on social networks and reputation, while institutional signals are less significant than in other high-risk areas. While more research is necessary to unpack this issue, the analysis provides some understanding of how the field and technological aspects shape protection-market conditions, and how preferences regarding signalling and assessment change in practice according to the actors and organisations involved in a given situation. Evaluating other actors is generally based on above-mentioned personal factors, rather than institutional signalling.
Article
Context: Health care delivery, and therefore medical education, is an inherently risky business. Although control mechanisms, such as external audit and accreditation, are designed to manage risk in clinical settings, another approach is 'trust'. The use of entrustable professional activities (EPAs) represents a deliberate way in which this is operationalised as a workplace-based assessment. Once engaged with the concept, clinical teachers and medical educators may have further questions about trust. Objectives: This narrative overview of the trust literature explores how risk, trust and control intersect with current thinking in medical education, and makes suggestions for potential directions of enquiry. Methods: Beyond EPAs, the importance of trust in health care and medical education is reviewed, followed by a brief history of trust research in the wider literature. Interpersonal and organisational levels of trust and a model of trust from the management literature are used to provide the framework with which to decipher trust decisions in health care and medical education, in which risk and vulnerability are inherent. Conclusions: In workplace learning and assessment, the language of 'trust' may offer a more authentic and practical vocabulary than that of 'competency' because clinical and professional risks are explicitly considered. There are many other trust relationships in health care and medical education. At the most basic level, it is helpful to clearly delineate who is the trustor, the trustee, and for what task. Each relationship has interpersonal and organisational elements. Understanding and considered utilisation of trust and control mechanisms in health care and medical education may lead to systems that maturely manage risk while actively encouraging trust and empowerment.
Chapter
The problems found in the existing models push the researcher to look for a better solution for computational trust and computational reputation. According the problem exposed earlier, the newly proposed model should be a systematic model which supports both trust and reputation. The model should also take the learning capability for agents into consideration because agents cannot quickly adapt to the changes without learning. The model also needs to have the ability to make decisions according to its recognition of trust. Before actually building the model, it is necessary to analyze the concept of trust. Usually when people say trust they mean human trust, however, in this research trust refers to computational trust. How human trust is different from computational trust is a very interesting question. The answers to the question helped the researcher recover many features of computational trust and built a solid theoretical foundation for the proposed model. The definitions of trust in different disciplines such as economy, sociology and psychology will be compared. A possible definition of computational trust will be made and such trust from several different perspectives will be analyzed. The description of the model is important. As a whole, it is represented as a framework that defines components and component relationships. As the concrete components, the purposes and responsibilities of the specific component are explained. This is to illustrate the static structure of the model. The dynamic structure of the model is described as the process of executing the model.
Conference Paper
According to the Situational Context Theory, the recent accelerated evolution of digital technology (IoT, Microchips) reinforces the trend of progressive reduction of the physical distances between an ‘Augmented individual’ (technology-empowered subjects playing their daily life decision-making processes based on multidimensional choice-sets) and technology. Technology becomes further more competent than the subject in dialoguing with the situational environment, both in the area of information building (search engines) and of location-based dialogue with the daily environment (IoT, NFC, VR). Because of reduced physical distances and the growth in competence of technology, the free-choice based subject’s responsibility, which initially appeared ‘augmented’, in reality decreases and becomes an illusion, quite as the cubism illusionism of Braque and Picasso painting. Indeed, in this frame of work, responsibility appears to shift from the augmented individual to organisations and institutions managing technology with competence, within a frame of a digital technology Corporate Social Responsibility.
Conference Paper
Full-text available
This poster presents the authors’ work to date on developing an application profile for authenticity metadata (the IPAM, or InterPARES Authenticity Metadata), including (1) the functional requirements, (2) metadata elements derived from the Chain of Preservation model from the InterPARES research project, (3) a crosswalk of a sample of IPAM elements to Dublin Core, PREMIS, and MoReq2010, (4) those elements deemed essential to presume the authenticity of a record as it moves from creation to permanent preservation, and (5) next steps, integrating the application profile into the Archivematica preservation system the core elements of the application profile relating to maintaining the presumption of authenticity through preservation and access.
Conference Paper
This paper presents an approach to semantic modelling of large-scale trust ecosystems to improve the interpretations of trust claims. The problem of interpreting trust claims is described and relevant types of reasoning are analysed. A model based on \(\mathcal {SROIQ}\) and OWL Description Logic is proposed. The novel elements are the creation of classes and properties on the basis of legal and regulatory sources that extend existing vocabularies (W3C, Dublin Core), and the use of these classes and properties to create assertions that represent information harvested from on-line information sources. The resulting model allows automated classification via a reasoner, as well as queries that support use cases from various actors. A general approach is presented, as well as results from a prototype implementation based on the European eIDAS and US FICAM trust ecosystems.
Chapter
We claim that the wider trust research area (academics and industry practitioners) strive to develop systems that are both trustworthy and foster trust. Evaluation methods follow this pursuit and measure for the presence of trust. However, if considered from a user’s perspective and if a digital environment is instead designed to empower users about their trust choices, then trust and distrust are valid options. How can environments, designed to empower users in their trust responses (referred to in this chapter as TEU environments), be evaluated? Practitioners need to be able to gauge their progress. In this chapter, we outline how a practitioner can work around some of the complexities surrounding the design of TEU environments and we present one evaluation method. To understand whether a TEU environment is indeed empowering a user regarding trust, we suggest investigating whether there is a change in a user’s level of uncertainty. A reduction in uncertainty is a proxy for both trust and distrust. When uncertainty is reduced a user is clearer about what to do and is not caught up in a cycle of exploring possibilities. Survey questions allowing responses on a Likert scale are one means to evaluate change.
Article
Full-text available
Misunderstandings arise in international trade due to difference in cultural background of trade partners. Trust and the role it plays in trade are influenced by culture. Considering that trade always involves working on the relationship with the trade partner, understanding the behaviour of the other is of the essence. This paper proposes to involve cultural dimensions in the modelling of trust in trade situations. A case study is presented to show a conceptuali-sation of trust with respect to the cultural dimension of performance orientation versus cooperation orientation.
Article
Full-text available
In trying to identify what makes for success in outsourcing, practitioners invariably highlight ‘relationships’ - but there are few precise findings on how such successful relationships should be developed. Successful relationships don’t just happen. In this paper we show that overall strategic business intention must determine the nature of the relationship and the contract. A detailed design is essential to build effective relationships throughout the life of the deal. This determines the key underlying drivers of behaviour, and whether power-based or trust-based relations emerge.
Article
Full-text available
Cultural psychology is a hybrid of social and developmental psychology on the one hand, and of cultural anthropology on the other. In this paper I will analyze the collective- cultural processes that set the stage for individual citizens of a society to develop trust in the benevolence of its social institutions. I will demonstrate that such trust is a necessary organizational illusion that functions as a promoter of social cohesiveness of social groups and guides the internalization of the acceptance of the meta-level "just world" sign-field by individual persons. Guided by such field, persons are likely to take the risk of trusting the public communicative messages of social institutions and become involved in both constructive and destructive acts. Such non-reflexive "basic trust" in the social authorities is both needed for a social system to function, and for individual persons to legitimize their actions. Yet civil society cannot remain non-reflexive, and it is through the development of social reflexivity that the basic characteristic of human survival—basic distrust in the social institutions—is developed. The latter is illustrated by the Galis and Haviv model of discursive inaction in case of genocides.
Article
Full-text available
This article aims at contributing to the understanding of the trust-control nexus. The objective is to bring the discussion around the relationship between both concepts a step further by identifying common foundations, distinctive mechanisms and key implications relevant for theory-building and empirical research on trust and control. First, the concept of trust and related concepts are introduced. Second, the developments related to the diminished effectiveness of control and a growing importance of trust in both intra- and inter-organizational relations are discussed. Finally, the state of the art regarding the trust-control nexus and a brief summary of the four articles included in this special issue are provided.
Article
Full-text available
It has been observed that the underlying reasons for the continuing growth of the "spam" problem are a lack of reliable sender authentication and the near-zero cost of sending huge volumes of marketing material worldwide, via email. Previous attempts to address these problems either change the fundamental properties of email, reducing its usefulness to legitimate senders, or require an infeasible move to new system architectures. In this paper we present two new techniques for increasing the level of sender authentication for legacy-system plain text email addresses. We then show how these Trustworthy Email Addresses (TEA) can be used in conjunction with a trust and risk-based security framework as an effective anti-spam tool. Our prototype Java implementation is then evaluated in the context of a spammer threat model with an economic analysis of the viability of each threat.
Technical Report
Full-text available
What does the word ‘trust’ mean? Scholars continue to express concern regarding their collective lack of consensus about trust’s meaning. Conceptual confusion on trust makes comparing one trust study to another problematic. To facilitate cumulative trust research, the authors propose two kinds of trust typologies: (a) a classification system for types of trust, and (b) definitions of six related trust types that form a model. Some of the model’s implications for management are also outlined.
Article
Full-text available
The SPKI Working Group has developed a standard form for digital certificates whose main purpose is authorization rather than authentication. These structures bind either names or explicit authorizations to keys or other objects. The binding to a key can be directly to an explicit key, or indirectly through the hash of the key or a name for it. The name and authorization structures can be used separately or together. We use S-expressions as the standard format for these certificates and define a canonical form for those S-expressions. As part of this development, a mechanism for deriving authorization decisions from a mixture of certificate types was developed and is presented in this document. This document gives the theory behind SPKI certificates and ACLs without going into technical detail about those structures or their uses.
Article
Full-text available
Trust is a key concept in business, particularly in electronic commerce (e-commerce). In order to understand online trust, one must first study trust research conducted in the offline world. The findings of such studies, dating from the 1950’s to the present, provide a foundation for online trust theory in e-commerce. This paper provides an overview of the existing trust literature from the fields of philosophy, psychology, sociology, management, and marketing. Based on these bodies of work, online trust is briefly explored. The range of topics for future research in online trust in e-commerce is presented.
Book
Full-text available
Dempster-Shafer theory offers an alternative to traditional probabilistic theory for the mathematical representation of uncertainty. The significant innovation of this framework is that it allows for the allocation of a probability mass to sets or intervals. Dempster-Shafer theory does not require an assumption regarding the probability of the individual constituents of the set or interval. This is a potentially valuable tool for the evaluation of risk and reliability in engineering applications when it is not possible to obtain a precise measurement from experiments, or when knowledge is obtained from expert elicitation. An important aspect of this theory is the combination of evidence obtained from multiple sources and the modeling of conflict between them. This report surveys a number of possible combination rules for Dempster-Shafer structures and provides examples of the implementation of these rules for discrete and interval-valued data.
Article
Full-text available
in this chapter we will examine the development and impact of trust in the context of close relationships we will begin with a definition of trust and a discussion of its roots in individuals' interpersonal histories we will go on to explore the development of trust in intimate relationships, emphasizing how its foundations are colored by the seminal experiences that mark different stages of interdependence we will then consider the various states of trust that can evolve and their consequences for people's emotions and perceptions in established relationships (PsycINFO Database Record (c) 2012 APA, all rights reserved)
Article
Full-text available
Related the points in C. E. Osgood's (1974) graduated and reciprocated initiatives in tension reduction (GRIT) proposal for reducing conflict through a program of conciliatory initiatives to theory and concepts concerned with developing trust and the attribution of trustworthiness. A framework for organizing and making meaningful the results of experimental game studies of conciliatory approaches to conflict management is provided. In general, support for the steps in the GRIT proposal was provided by these studies. The steps may be viewed as effective means for inducing attributions of trustworthiness and, because trust is essential to the resolution of mixed-motive conflict, for bringing about cooperation. It is suggested that some ambiguity remains concerning the requirements that the initiator precisely match the conciliatory and escalatory actions of the target. (4 p ref) (PsycINFO Database Record (c) 2012 APA, all rights reserved)
Article
Full-text available
Describes results of a program of research on interpersonal trust, defined as belief in social communications. Construction of a scale for measuring individual differences, construct validity studies, and investigations of antecedents of trust, correlates of trust, and changes of college student trust are included. The evidence supports the hypothesis of (a) stable individual differences in a generalized expectancy for interpersonal trust, and (b) the feasibility of studying such trust under a variety of conditions. (29 ref.) (PsycINFO Database Record (c) 2012 APA, all rights reserved)
Article
Full-text available
eBay is a highly visible company that has been immensely successful in their implementation of a business strategy that incorporates their information strategy. It is a shining example of an Internet era company that actually turns a profit, and managed to outlast the "dotcom crash". By remaining flexible and adaptable, the ever-changing eBay has developed a technology platform that differentiates them from their rivals. This paper analyzes the information technology strategy and information systems policy adopted by eBay to react to the business dynamics while maintaining the leading position in the industry. The company is resilient, versatile, and an excellent example of how a company can successfully leverage information technology for a competitive advantage.
Conference Paper
Full-text available
Distributed multi-agent systems propose new infrastructure solutions to support the interoperability of electronic services. Security is a central issue for such infrastructures and is compounded by their intrinsic openness, heterogeneity and because of the autonomous and potentially self-interested nature of the agents therein. This article reviews the work that the FIPA agent standards body has undertaken to specify security in multi-agent systems. This enables a discussion about the main issues that developers have to face at different levels (i.e., intra-platform, inter-platform and application level) when developing agent-based security solutions in various domains.
Conference Paper
Full-text available
Despite their many advantages, e-businesses lag behind brick and mortar businesses in several fundamental respects. This paper concerns one of these: relationships based on trust and reputation. Recent studies on simple reputation systems for e-Businesses such as eBay have pointed to the importance of such rating systems for deterring moral hazard and encouraging trusting interactions. However, despite numerous studies on trust and reputation systems, few have taken studies across disciplines to provide an integrated account of these concepts and their relationships. This paper first surveys existing literatures on trust, reputation and a related concept: reciprocity. Based on sociological and biological understandings of these concepts, a computational model is proposed. This model can be implemented in a real system to consistently calculate agents' trust and reputation scores.
Article
Full-text available
The concept of network efficiency, recently proposed to characterize the properties of small-world networks, is here used to study the effects of errors and attacks on scale-free networks. Two different kinds of scale-free networks, i.e., networks with power law P(k), are considered: (1) scale-free networks with no local clustering produced by the Barabasi–Albert model and (2) scale-free networks with high clustering properties as in the model by Klemm and Eguı́luz, and their properties are compared to the properties of random graphs (exponential graphs). By using as mathematical measures the global and the local efficiency we investigate the effects of errors and attacks both on the global and the local properties of the network. We show that the global efficiency is a better measure than the characteristic path length to describe the response of complex networks to external factors. We find that, at variance with random graphs, scale-free networks display, both on a global and on a local scale, a high degree of error tolerance and an extreme vulnerability to attacks. In fact, the global and the local efficiency are unaffected by the failure of some randomly chosen nodes, though they are extremely sensitive to the removal of the few nodes which play a crucial role in maintaining the network's connectivity.
Conference Paper
Full-text available
Concerns for personal information privacy could be produced during information collection, transmission and handling. In information handling, privacy could be compromised from both inside and outside of organizations. Within an organization, private data are generally protected by organizations' privacy policies and the corresponding platforms for privacy practices. However, private data could still be misused intentionally or unintentionally by individuals who have legitimate accesses to them. In general, activities of a database operator form a stochastic process, and at different time, privacy intrusion behavior may show different features. In particular, one's past activities can help determine the natures of his/her current practices. In this paper, we propose to use dynamic Bayesian networks to model such temporal environments and detect any privacy intrusions happened within them.
Conference Paper
Full-text available
This paper covers the research problem of supporting users' decision making in E-Commerce systems with complex choices, and design of an Adaptive Decision Support System (ADSS) which matches the appropriate tool support and decision strategy advice to the user's preferences and motivations. A preliminary requirements investigation will be described which used an adapted Wizard of Oz approach to test users' reaction to mock-ups of the ADSS with and without system advice. The requirements study tested users' reaction to the proposed tools and whether they were influenced by the system advice. This discussion will be followed by a description of the design and development of the ADSS and its architecture. The paper concludes with plans for future research.
Article
The study of trust in the context of technology adoption is one of initial trust formation. Due to the lack of complete information, an individual must make a 'leap of faith' when committing to the new technology. This leap of faith is trust. This study uses institution-based trust theory to link the characteristics of a new technology to the trusting stance of the potential adopter. This trusting stance is then linked to the technology adoption decision. The research model was tested using policy capturing. Policy capturing is a simulation-based decision modeling technique that allows the researcher to observe a simulation of actual decisions being made. The questionnaire was developed and administered to 181 undergraduate students. The results of this exploratory study suggest that trust is an important component in technology acceptance and adoption and that this construct should be incorporated into future research which focuses on technology adoption.
Article
Systems as diverse as genetic networks or the World Wide Web are best described as networks with complex topology. A common property of many large networks is that the vertex connectivities follow a scale-free power-law distribution. This feature was found to be a consequence of two generic mech-anisms: (i) networks expand continuously by the addition of new vertices, and (ii) new vertices attach preferentially to sites that are already well connected. A model based on these two ingredients reproduces the observed stationary scale-free distributions, which indicates that the development of large networks is governed by robust self-organizing phenomena that go beyond the particulars of the individual systems.
Article
The aim of this paper is to show how relevant is a trust model based on beliefs and their credibility. The approaches to the study of trust are various and very different from each of other. In our view, just a socio-cognitive approach to trust would be able to analyse the sub-components on which the final decision to trust or not is taken. In this paper we show an implementation of our socio-cognitive model of trust developed using the so-called Fuzzy Cognitive Maps. The model allows to distinguish between internal and external attributions and it introduced a degree of trust derived from the credibility of the trust beliefs, while the credibility of the beliefs derives from their sources and the sources' number, convergence, reliability (i.e. trust). With this implementation we show how the different components may change and how their impact can change depending on the specific situation and from the agent heuristics or personality. In particular, we analyse the different nature of the belief sources and their trustworthiness. We assumed different types of belief sources. For each trustier's belief one should consider what the content of the belief is, who/what the source is, how this source evaluates the belief, how the trustier evaluates this source (with respect to this belief). In addition for considering the contribution of different sources we need a theory of how they combine. The interesting thing in this paper is that starting from finding the sources of trust we are obliged to consider the trustworthiness of these sources.
Article
Abstract In todays modern society, users have certain requirements to the technology. They want to be able to access systems and perform tasks regardless of time and,location. The problem,that arises is how,one can be sure that a person is the one he or she is claiming to be. Consequently, a secure validation of identity in an insecure environment is needed. This is usually performed by means of something the person is, has or knows. The aim of this thesis is to determine,if it is possible to combine,different authentication methods, both biometrical and technical, and how this affects the security of the overall authentication routine. For example, an authentication procedure may include both password,and a smart card. Security and usability of such a system is studied. One may also use two or more approaches from the same category, e.g. using face recognition and fingerprint, which both are in the category refered to as something one is. This thesis studies if the overall authentication,system becomes,then stronger or weaker. Keywords: multimodal authentication, biometric, smart card, fingerprint, usability,
Article
The rapid increase in the use of open distributed systems has given rise to a number of important issues for computer scientists, some of which concern the organisation of interactions between computers, between humans, and between humans and computers. For instance, such interactions are the focus of attention in access control policies (Abadi et al., 1993), and in cryptographic protocols (Burrows et al., 1990), both of which specify the actions that are to be performed by the participating agents.
Article
Information is a central topic in computer science, cognitive science, and philosophy. In spite of its importance in the "information age," there is no consensus on what information is, what makes it possible, and what it means for one medium to carry information about another. Drawing on ideas from mathematics, computer science, and philosophy, this book addresses the definition and place of information in society. The authors, observing that information flow is possible only within a connected distribution system, provide a mathematically rigorous, philosophically sound foundation for a science of information. They illustrate their theory by applying it to a wide range of phenomena, from file transfer to DNA, from quantum mechanics to speech act theory.
Article
Uncertainty and sensitivity analyses for systems that involve both stochastic (i.e., aleatory) and subjective (i.e., epistemic) uncertainty are discussed. In such analyses, the dependent variable is usually a complementary cumulative distribution function (CCDF) that arises from stochastic uncertainty; uncertainty analysis involves the determination of a distribution of CCDFs that results from subjective uncertainty, and sensitivity analysis involves the determination of the effects of subjective uncertainty in individual variables on this distribution of CCDFs. Uncertainty analysis is presented as an integration problem involving probability spaces for stochastic and subjective uncertainty. Approximation procedures for the underlying integrals are described that provide an assessment of the effects of stochastic uncertainty, an assessment of the effects of subjective uncertainty, and a basis for performing sensitivity studies. Extensive use is made of Latin hypercube sampling, importance sampling and regression-based sensitivity analysis techniques. The underlying ideas, which are initially presented in an abstract form, are central to the design and performance of real analyses. To emphasize the connection between concept and computational practice, these ideas are illustrated with an analysis involving the MACCS reactor accident consequence model a, performance assessment for the Waste Isolation Pilot Plant, and a probabilistic risk assessment for a nuclear power station.
Article
This paper discusses the concepts of time, trust and information in relationship to virtual teams (also known as dispersed collaborative teams). Students were allowed to do their collaborative work in various settings including working as a virtual team communicating entirely via e-mail. A pluralist research approach was adopted in which questionnaires were used to collect quantitative data and recordings were made of both e-mail and f-to-f discussions and these all provided data to be interpreted. Thus, an interpretive research strategy was used. Habermas' Theory of Communicative Action was used in the in-depth analysis of the discourse that took place in order to compare the type of collaboration that occurred in the different types of team. It is important to note that the action research cannot be considered to have 'been successful' but lessons were nevertheless learned. A relationship was noted between the amount and kind of information that can be shared, the time taken to share this information and the nature of the relationships within the teams. Although the action research was carried out in an educational setting, and hence was focussed on collaborative learning, it has relevance in virtual organisations of all types.
Article
Introduction, 99. — I. Some general features of rational choice, 100.— II. The essential simplifications, 103. — III. Existence and uniqueness of solutions, 111. — IV. Further comments on dynamics, 113. — V. Conclusion, 114. — Appendix, 115.
Article
suggests a conceptual framework that explores organizational trust through the attitudes and behaviors of managers and highlights the interactive role of trust in managerial philosophies and organizational forms / offers general propositions concerning the differential trust requirements of alternative organizational forms / suggests a conceptual calculus for considering the costs of failing to meet the minimum level of trust for each organizational form / describes the forces shaping an emerging new managerial philosophy that focuses explicitly on trust and trust investments form, philosophies, and the impact of trust [owner-managed entrepreneurial form, vertically integrated functional form, diversified divisionalized form, mixed matrix form, network form] / costs and investments: the calculus of trust and controls / the human investment philosophy / investing in trust in the network form [investing in capabilities and trust at the individual, team, firm, and network levels] (PsycINFO Database Record (c) 2012 APA, all rights reserved)
Article
Electronic mediated communication is an increasingly popular form of communication within and across organisations. This paper presents research on the implementation, training and use of video-conferencing systems on different sites of a multi-national oil company. We find that error, delay but mainly social costs influence the choice and use of this communication medium.
Article
There are two schools of thought on how network structures create the competitive advantage known as social capital. One school focuses on the advantages of closure. A network is closed to the extent that people in it are connected by strong relationships. Typical forms of closure are dense networks in which everyone is connected to everyone else, and hierarchical networks in which people are connected indirectly through mutual relations with a few leaders at the center of the network. Both forms provide numerous communication channels, which facilitates the enforcement of sanctions against misbehavior. Closure lowers the risk of trust, and so facilitates collaborative efforts that require trust. A second school of thought focuses on the advantages of brokerage. Markets and organizations are assumed to be a network of interdependent groups in which information flows at higher velocity within than between groups such that separate groups come to know about different things.
Article
Reputations that are transmitted from person to person can deter moral hazard and discourage entry by bad types in markets where players repeat transactions but rarely with the same player. On the Internet, information about past transactions may be both limited and potentially unreliable, but it can be distributed far more systematically than the informal gossip among friends that characterizes conventional marketplaces. One of the earliest and best known Internet reputation systems is run by eBay, which gathers comments from buyers and sellers about each other after each transaction. Examination of a large data set from 1999 reveals several interesting features of this system, which facilitates many millions of sales each month. First, despite incentives to free ride, feedback was provided more than half the time. Second, well beyond reasonable expectation, it was almost always positive. Third, reputation profiles were predictive of future performance. However, the net feedback scores that eBay displays encourages Pollyanna assessments of reputations, and is far from the best predictor available. Fourth, although sellers with better reputations were more likely to sell their items, they enjoyed no boost in price, at least for the two sets of items that we examined. Fifth, there was a high correlation between buyer and seller feedback, suggesting that the players reciprocate and retaliate.
Article
The practices of public surveillance, which include the monitoring of individuals in public through a variety of media (e.g., video, data, online), are among the least understood and controversial challenges to privacy in an age of information technologies. The fragmentary nature of privacy policy in the United States reflects not only the oppositional pulls of diverse vested interests, but also the ambivalence of unsettled intuitions on mundane phenomena such as shopper cards, closed-circuit television, and biometrics. This Article, which extends earlier work on the problem of privacy in public, explains why some of the prominent theoretical approaches to privacy, which were developed over time to meet traditional privacy challenges, yield unsatisfactory conclusions in the case of public surveillance. It posits a new construct, "contextual integrity," as an alternative benchmark for privacy, to capture the nature of challenges posed by information technologies. Contextual integrity ties adequate protection for privacy to norms of specific contexts, demanding that information gathering and dissemination be appropriate to that context and obey the governing norms of distribution within it. Building on the idea of "spheres of justice," developed by political philosopher Michael Walzer, this Article argues that public surveillance violates a right to privacy because it violates contextual integrity; as such, it constitutes injustice and even tyranny.
Article
Several properties of online interaction are challenging the accumulated wisdom of trading communities on how to produce and manage trust. Online reputation reporting systems have emerged as a promising trust management mechanism in such settings. The objective of this paper is to contribute to the construction of online reputation reporting systems that are robust in the presence of unfair and deceitful raters. The paper sets the stage by providing a critical overview of the current state of the art in this area. Following that, it identifies a number of important ways in which the reliability of the current generation of reputation reporting systems can be severely compromised by unfair buyers and sellers. The central contribution of the paper is a number of novel "immunization mechanisms" for effectively countering the undesirable effects of such fraudulent behavior. The paper describes the mechanisms, proves their properties and explains how various parameters of the marketplace microstructure, most notably the anonymity and authentication regimes, can influence their effectiveness. Finally, it concludes by discussing the implications of the findings for the managers and users of current and future electronic marketplaces and identifies some important open issues for future research.
Conference Paper
In this paper we present and analyse a service-oriented trust management framework based on the integration of role-based modelling and risk assessment in order to support trust management solutions. We also survey recent definitions of trust and subsequently introduce a service-oriented definition of trust, and analyse some general properties of trust in e-services, emphasising properties underpinning the propagation and transferability of trust.
Article
This study examines the determinants of inter-organizational trust by using survey data from just over 1000 suppliers in the automotive industry. We define trust and derive a model of its determinants from transaction cost economics, game theory and sociological exchange theory. Regression analysis results indicate that determinants of trust are different from determinants of opportunism. US-Japanese differences are found in three respects: (i) the way trust is conceptualised by suppliers is richer in Japan than in the US; (ii) the level of trust is higher in Japan than in the US; and (iii) the factors facilitating trust and those attenuating opportunism differ in the US and Japan.
Article
With an increasing number of technologies supporting transactions over distance and replacing traditional forms of interaction, designing for trust in mediated interactions has become a key concern for researchers in human computer interaction (HCI). While much of this research focuses on increasing users’ trust, we present a framework that shifts the perspective towards factors that support trustworthy behavior. In a second step, we analyze how the presence of these factors can be signalled. We argue that it is essential to take a systemic perspective for enabling well-placed trust and trustworthy behavior in the long term. For our analysis we draw on relevant research from sociology, economics, and psychology, as well as HCI. We identify contextual properties (motivation based on temporal, social, and institutional embeddedness) and the actor's intrinsic properties (ability, and motivation based on internalized norms and benevolence) that form the basis of trustworthy behavior. Our analysis provides a frame of reference for the design of studies on trust in technology-mediated interactions, as well as a guide for identifying trust requirements in design processes. We demonstrate the application of the framework in three scenarios: call centre interactions, B2C e-commerce, and voice-enabled on-line gaming.
Conference Paper
To prevent or alleviate conflicts in multi-agent environ- ments, it is important to distinguish between situations where another agent has misbehaved intentionally and situations where the misbehavior was accidental. One situation where this problem arises is the Noisy Iterated Prisoner's Dilemma, a version of the Iterated Prisoner's Dilemma (IPD) in which there is a nonzero probability that a "cooperate" action will accidentally be changed into a "defect" action and vice versa. Tit-For-Tat and other strategies that do quite well in the ordi- nary (non-noisy) IPD can do quite badly in the Noisy IPD. This paper presents a technique called symbolic noise detec- tion, for detecting whether anomalies in player's behavior are deliberate or accidental. This idea to use player's determin- istic behavior to tell whether an action has been affected by noise. We also present DBS, an algorithm that uses symbolic noise detection in the Noisy IPD. DBS constructs a model of the other agent's deterministic behavior, and watches for any deviation from this model. If the other agent's next ac- tion is inconsistent with this model, the inconsistency can be due either to noise or to a genuine change in their behavior; and DBS can often distinguish between two cases by waiting to see whether this inconsistency persists in next few moves. This technique is effective because many IPD players often have clear deterministic patterns of behavior. We entered several different implementations of DBS in the 2005 Iterated Prisoner's Dilemma competition, in Category 2 (noisy environments). Out of the 165 contestants in this cate- gory, most of DBS implementations ranked among top ten. The best one ranked third, and it was beaten only by two "master-and-slaves strategy" programs that each had a large number of "slave" programs feeding points to them.