Users and Trust in Cyberspace
نویسندگان
چکیده
The underlying belief and knowledge models assumed by various kinds of authentication protocols have been studied for well over 10 years now. On the other hand, the related question of the generic trust assumptions, which underlie the settings where the protocols are run, has received less attention. Furthermore, the notion of trust, as it is typically defined, has more been based on the formal model used than the real user requirements posed by the application context and the actual people using the system. In this paper, we approach that problem from the users’ point of view. We briefly describe what are the psychological bases on which typical people build their trust assumptions on, and consider how these are reflected in a typical e-commerce setting today. Given this background, we proceed to contemplate how the systems could be made more trustworthy by explicitly representing the trust assumptions and requirements, and how these digital expressions of trust could be instrumented to and integrated with actual authentication protocols. Thus, our aim is to broaden the view from a protocol centric approach towards considering the actual users, and to provide some initial requirements for future operating systems and user interface design.
منابع مشابه
The Challenges and Trends of Deploying Blockchain in the Real World for the Users’ Need
Blockchain technology is a decentralized and open database maintained by a peer-to-peer network, offering a “trustless trust” for untrusted parties. Despite the fact that some researchers consider blockchain as a bubble, blockchain technology has the genuine potential to solve problems across industries. In this article, we provide an overview of the development that Blockchain technology has h...
متن کاملA Mechanism for Trust Sustainability Among Trusted Computing Platforms
Trust plays an important role in social life as well as in cyberspace. Trust establishment in cyberspace relies on human beings as well as digital components. Trusted computing platform (TCP) was proposed to improve the trust between users and their devices. However, current TCP lacks solutions for trust sustainability among TCPs, so that trust relationship might be broken after a period of tim...
متن کاملThe Role of e - Commerce Awareness on Increasing Electronic Trust
It is not long ago that e-commerce service has turned to be one of the most important applications of the Internet and www. In all aspects of human life, especially in business activity, the application of ICT is so strong that in near future, the world will witness inevitability of this technology in most of the daily issues. Regardless of its technological advantages in the areas of increasin...
متن کاملRe: Models for a Governance Structure for the National Strategy for Trusted Identities in Cyberspace
1. Will the process and outcome be seen as publicly legitimate? The envisioned identity ecosystem will affect many people in many ways, but the “steering” process will have questionable legitimacy unless it is open and genuinely representative of users’ interests. More generally, we question whether any putatively representative stakeholder process can be perceived as publicly legitimate in the...
متن کاملInvestigating Deception in Cyberspace
The use of anthropomorphic avatars provides Internet users the opportunity and freedom to present their desired identity. As cyberspace becomes a heaven for deceptive behavior, human-computer interaction research will need to be carried out to study and understand these deceptive behaviors. The objective of this research is to investigate the behavior of deceivers and truthtellers in the cybers...
متن کامل