Intangible Trust Requirements - How to Fill the Requirements Trust "Gap"?
نویسندگان
چکیده
Previous research efforts have been expended in terms of the capture and subsequent instantiation of "soft" trust requirements that relate to HCI usability concerns or in relation to "hard" tangible security requirements that primarily relate to security assurance and security protocols. Little direct focus has been paid to managing intangible trust related requirements per se. This 'gap' is perhaps most evident in the public B2C (Business to Consumer) ESystems we all use on a daily basis. Some speculative suggestions are made as to how to fill the 'gap'. Visual card sorting is suggested as a suitable evaluative tool; whilst deontic logic trust norms and UML extended notation are the suggested (methodologically invariant) means by which software development teams can perhaps more fully capture hence visualize intangible trust requirements.
منابع مشابه
Virtual Organisational Trust Requirements: Can Semiotics Help Fill The Trust Gap?
It is suggested that the use of the semiotic ladder, together with a supportive trust agent can be used together to better explicate “soft” trust issues in the context of Grid services. The contribution offered here is intended to fill a gap in current understanding and modelling of such issues and to support Grid service designers to better conceptualise, hence manage trust issues. The semioti...
متن کاملFilling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures
The last years have seen a major interest in designing and deploying trust management and public key infrastructures. Yet, it is still far from clear how one can pass from the organization and system requirements to the actual credentials and attribution of permissions in the PKI infrastructure. This paper presents a semi-formal and formal framework for filling this gap. We devise a methodology...
متن کاملINVESTIGATION OF BARRIERS AND REQUIREMENTS AFFECTING E-SHOPPING BEHAVIOR OF CUSTOMERS IN THE BOOK MARKET
<span style="color: #000000; font-family: Tahoma, sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: justify; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; display: inline !important; float: none; backgro...
متن کاملINVESTIGATION OF BARRIERS AND REQUIREMENTS AFFECTING E-SHOPPING BEHAVIOR OF CUSTOMERS IN THE BOOK MARKET
<span style="color: #000000; font-family: Tahoma, sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: justify; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; display: inline !important; float: none; backgro...
متن کاملA Framework for Systematic Refinement of Trustworthiness Requirements
The trustworthiness of systems that support complex collaborative business processes is an emergent property. In order to address users’ trust concerns, trustworthiness requirements of software systems must be elicited and satisfied. The aim of this paper is to address the gap that exists between end-users’ trust concerns and the lack of implementation of proper trustworthiness requirements. Ne...
متن کامل