Legitimate by Design: Towards Trusted Virtual Community Environments
نویسندگان
چکیده
2 This work was supported in part by the New Jersey Information-Technology Opportunities for the Workforce, Education and Research (NJ I-TOWER) Project, funded by the New Jersey Commission on Higher Education (contract #01-801020-02) Abstract. Legitimacy is a key part of the social requirements specification for a trusted virtual community environment (VCE). If an environment is not seen as legitimate, social conflicts may reduce community benefits like trade and ecommerce. Legitimacy must be built into a VCE at design time, or it may not be possible at all. This can be done using a legitimacy requirements framework (LRF) which interprets historical "rights" in terms of ownership of generic VCE objects. This involves more than merely specifying who has the right to do what to what, because objects may contain other objects, objects may be dependent, rights may interact, groups may have rights, and there may be rights to rights. A LRF could be used by software designers to derive legitimacy requirements for a wide variety of multi-user systems, from chat rooms to virtual realities. It would draw focus to common problems, and aid their common solution. A simple LRF is presented to provide a basis for designers of virtual social environments to copy, discuss or deviate from.
منابع مشابه
Legitimate by design: towards trusted socio-technical systems
Legitimacy or “fairness” seems a key requirement for trust in computer-mediated social environments. Trust in turn seems necessary for productive community interactions like ecommerce. But unless legitimacy is built into social software, achieving trust may not be possible. This means expressing apparently vague social "rights" as specific information system (IS) requirements, i.e. carrying out...
متن کاملImproving results of urban design research by enhancing advanced semiexperiments in virtual environments
There is abundant literature regarding virtual reality as a technology of interest in the present age. However, there are few comprehensive studies on strategies that can improve the level of urban design research using this technique. To investigate the issue, this paper first reviews the concept of virtual reality. Next, the opinions of experts in the field of virtual reality technology are s...
متن کاملGTrust: a group based trust model
Nowadays, the growth of virtual environments such as virtual organizations, social networks, and ubiquitous computing, has led to the adoption of trust concept. One of the methods of making trust in such environments is to use a long-term relationship with a trusted partner. The main problem of this kind of trust, which is based on personal experiences, is its limited domain. Moreover, both par...
متن کاملPhishing website detection using weighted feature line embedding
The aim of phishing is tracing the users' s private information without their permission by designing a new website which mimics the trusted website. The specialists of information technology do not agree on a unique definition for the discriminative features that characterizes the phishing websites. Therefore, the number of reliable training samples in phishing detection problems is limited. M...
متن کاملTowards an Open Framework Leveraging a Trusted Execution Environment
Sensor data is a core component of big data. The abundance of sensor data combined with advances in data integration and data mining entails a great opportunity to develop innovative applications. However, data about our movements, our energy consumption or our biometry are personal data that we should have full control over. Likewise, companies face a trade-off as the benefits of innovative se...
متن کامل